I
ndo
ne
s
i
a
n J
o
ur
na
l
o
f
E
l
e
c
t
r
i
c
a
l
E
ng
i
ne
e
r
i
ng
a
nd C
o
m
p
u
t
e
r
Sc
i
e
nc
e
V
o
l.
11
,
N
o.
2
,
A
ug
us
t
201
8
, p
p
.
68
8
~
69
5
I
SSN
:
2502
-
4752
,
D
O
I
:
10.
11
591/
i
j
eecs
.
v
11.
i
2
.p
p
688
-
6
95
688
Jou
r
n
al
h
om
e
p
age
:
h
ttp
:
//ia
e
s
c
or
e
.
c
om
/
j
our
nal
s
/
i
n
d
ex.
p
h
p
/
i
j
eecs
Side
-
Cha
nn
el Sec
urit
y
o
n
K
ey
E
x
c
ha
ng
e P
ro
t
o
co
l:
T
i
m
ing
a
nd
Rela
y
At
t
a
c
k
s
M
o
hd A
nua
r
M
a
t
I
s
a
,
H
a
bi
ba
h H
a
s
hi
m
,
Sy
e
d F
a
r
i
d Sy
e
d A
dna
n,
N
ur
N
a
bi
l
a
M
o
ha
m
e
d,
Y
a
s
in
F
it
r
i A
lia
s
F
acu
l
t
y
o
f
E
l
ect
r
i
cal
E
n
g
i
n
eer
i
n
g
,
40
45
0 U
i
T
M
S
ha
h A
l
a
m
,
S
e
l
a
ng
or
,
M
a
l
a
y
s
i
a
A
rt
i
cl
e
In
f
o
AB
S
T
RAC
T
A
r
tic
le
h
is
to
r
y
:
R
ecei
v
ed
Fe
b
1,
2018
Re
v
i
se
d
Ap
r
2
1
,
201
8
A
ccep
t
ed
Ap
r
2
7,
2
018
T
he
a
dv
a
nc
i
ng
o
f
K
e
y
E
x
c
ha
ng
e
P
r
ot
oc
ol
(
K
E
P
)
i
s
c
om
pul
s
or
y
t
o s
e
c
ur
e
t
he
c
onne
c
t
e
d w
or
l
d v
i
a
I
nt
e
r
ne
t
of
T
hi
ng
(
I
oT
)
,
c
r
y
pt
oc
ur
r
e
nc
y
a
nd bl
oc
k
c
ha
i
n,
v
ir
tu
a
l
in
te
llig
e
n
t,
s
m
a
r
t c
o
m
p
u
tin
g
e
tc
.
T
o
a
d
d
r
e
s
s
th
e
s
e
c
u
r
it
y
is
s
u
e
s
in
th
e
I
nt
e
r
ne
t
ba
s
e
d c
om
put
i
ng
s
y
s
t
e
m
s
,
t
hi
s
pa
pe
r
e
x
pl
or
e
s
t
he
s
i
de
-
ch
an
n
el
s
ecu
r
i
t
y
f
o
r
K
E
P
,
n
am
el
y
t
i
m
i
n
g
an
d
r
el
ay
at
t
ack
s
.
N
o
w
ad
a
y
s
,
v
a
r
i
o
u
s
K
E
P
v
ar
i
an
ces
ar
e u
s
ed
b
y
i
n
t
er
n
et
p
r
o
t
o
co
l
s
uc
h a
s
I
K
E
v
2/
3.
T
he
pur
po
s
e
of
K
E
P
i
s
t
o
en
ab
l
e a s
ecr
et
k
e
y
(
s
)
s
h
ar
i
n
g
b
et
w
e
en
t
w
o
o
r
m
o
r
e co
m
p
u
t
i
n
g
s
y
s
t
e
m
s
o
n
u
n
s
ecu
r
e n
et
w
o
r
k
.
L
at
er
,
t
h
e
s
ecr
et
k
e
y
(
s
)
i
s
u
s
ed
t
o
en
cr
y
p
t
al
l
d
at
a
t
r
a
ns
m
i
t
t
e
d
f
or
onl
i
ne
s
y
s
t
e
m
s
s
uc
h a
s
i
nt
e
r
ne
t
ba
nk
i
ng
,
c
r
y
pt
oc
ur
r
e
nc
y
t
r
an
s
act
i
o
n
,
I
o
T
s
er
v
i
ces
et
c.
T
h
e t
i
m
i
n
g
at
t
a
ck
w
a
s
ad
d
r
es
s
ed
b
y
an
ad
v
er
s
ar
y
m
o
d
el
an
d
s
ecu
r
i
t
y
a
s
s
u
m
p
t
i
o
n
s
.
T
h
e r
el
ay
at
t
ack
o
n
K
E
P
w
as
t
es
t
ed
b
y
an
ex
p
er
i
m
en
t
t
es
t
b
ed
b
et
w
een
a
k
e
y
f
o
b
an
d
car
u
s
i
n
g
R
as
p
b
er
r
y
P
i
an
d
R
F
m
o
d
u
l
e.
T
h
e ex
p
er
i
m
en
t
r
es
u
l
t
h
a
s
s
h
ow
n
t
ha
t
t
he
pr
o
pa
g
a
t
i
on
de
l
a
y
of
K
E
P
on R
F
c
om
m
uni
c
a
t
i
on i
s
i
nc
r
e
a
s
e
d by
100%
f
or
e
a
c
h r
e
l
a
y
n
o
d
e.
I
f
t
h
e K
E
P
r
u
n
t
i
m
e i
s
i
n
cr
eas
ed
g
r
eat
er
t
h
an
5
0
%
,
t
h
e K
E
P
a
ut
he
nt
i
c
a
t
i
on k
e
y
s
houl
d
be
di
s
c
a
r
de
d t
o
pr
e
v
e
nt
t
he
a
t
t
a
c
k
e
r
f
r
om
g
a
i
ni
ng
acces
s
t
o
t
h
e car
.
Ke
y
wo
rd
s
:
S
id
e
-
c
h
an
n
el
at
t
ac
k
T
i
mi
n
g
R
e
la
y
K
e
y
e
xc
ha
nge
p
r
o
t
o
c
o
l
D
if
f
ie
-
h
e
l
l
ma
n
C
opy
r
i
g
ht
©
201
8
I
ns
t
i
t
ut
e
o
f
A
d
v
anc
e
d E
ngi
ne
e
r
i
ng
an
d
Sc
i
e
nc
e
.
A
l
l
ri
g
h
t
s re
se
rv
e
d
.
Co
rre
sp
o
n
d
i
n
g
Au
t
h
o
r
:
M
o
h
d
A
n
u
ar
M
at
I
s
a
,
F
acu
l
t
y
o
f
E
l
ect
r
i
cal
E
n
g
i
n
eer
i
n
g
,
40
4
50
U
i
T
M
S
ha
h
A
l
a
m
,
S
e
l
a
ngo
r
,
M
a
l
a
ys
i
a
E
m
a
il:
a
nua
r
l
s
@
ho
t
m
a
i
l
.
c
o
m
1.
I
NT
RO
D
UCT
I
O
N
A
f
t
er
f
o
u
r
d
ecad
es
s
i
n
ce t
h
e
f
i
r
s
t
K
E
P
i
n
t
r
o
d
u
ced
b
y
D
i
f
f
i
e
-
H
e
l
l
m
a
n,
m
a
n
y
r
e
s
e
a
r
c
h
w
o
r
ks
ha
ve
b
een
d
o
n
e t
o
i
m
p
r
o
v
e t
h
e o
r
i
g
i
n
al
K
E
P
b
as
ed
o
n
t
h
e r
ecen
t
l
y
en
co
u
n
t
er
ed
s
ec
u
r
i
t
y
i
s
s
ue
s
.
T
hi
s
w
o
r
k
e
xp
l
o
r
e
s
th
e
s
e
c
u
r
it
y
o
f
K
E
P
a
g
a
i
n
s
t
ti
m
i
n
g
a
n
d
r
e
la
y
a
tta
c
k
s
.
T
h
e
t
i
m
i
n
g
a
tta
c
k
w
il
l p
r
o
v
id
e
a
d
d
itio
n
a
l i
n
f
o
r
m
a
tio
n
t
h
at
ca
n
b
e u
s
ed
b
y
a
n
at
t
ack
er
i
n
b
r
eak
i
n
g
a cr
y
p
t
o
g
r
ap
h
i
c co
m
m
u
n
i
cat
i
o
n
p
r
o
t
o
co
l
.
T
h
i
s
at
t
ac
k
w
i
l
l
r
ev
eal
c
r
y
p
t
o
gr
a
p
hi
c
r
un
t
i
m
e
s
d
ur
i
n
g
t
he
s
e
c
r
e
t
ke
y
ge
ne
r
a
t
i
o
n p
r
o
c
e
s
s
,
w
h
i
c
h c
o
ul
d
l
e
a
k t
he
s
e
c
r
e
t
ke
y
us
e
d
i
n
t
he
K
E
P
.
F
o
r
t
h
e r
el
ay
at
t
ack
,
t
h
e at
t
ack
er
w
i
l
l
r
el
a
y
R
F
f
r
a
m
es
t
h
r
o
u
g
h
l
o
n
g
d
i
s
t
an
ce a
n
d
i
t
can
p
r
et
en
s
e as
a
l
eg
i
t
i
m
at
e
n
o
d
e (
d
ev
i
ce)
w
h
i
l
e t
h
e l
e
g
i
t
i
m
at
e
n
o
d
e
i
s
f
ar
a
w
a
y
.
Mo
s
t
o
f
t
h
e r
el
a
y
at
t
ack
i
s
ap
p
l
i
ed
f
o
r
d
ecei
v
i
n
g
R
ad
i
o
-
f
r
e
q
ue
nc
y I
d
e
nt
i
f
i
c
a
t
i
o
n (
R
F
I
D
)
a
c
c
e
s
s
s
y
s
t
e
m
s
s
uc
h
a
s
d
o
o
r
a
nd
a
ut
o
m
o
t
i
ve
e
n
t
r
y
.
T
hi
s
w
o
r
k
w
i
l
l
ad
d
r
es
s
t
h
e
m
o
s
t
r
ecen
t
l
y
K
E
P
b
y
I
s
a M
.
A
.
M
e
t
al
.
[1
]
,
w
he
r
e
b
y t
he
a
ut
ho
r
s
s
ho
w
e
d
s
i
g
ni
f
i
c
a
n
t
w
or
ks
on
pr
ov
i
ng
t
h
e
s
e
c
u
r
i
t
y
of
K
E
P
a
g
a
i
n
s
t
v
a
r
i
ous
a
dv
e
r
s
a
r
y
m
ode
l
s
a
n
d s
i
de
-
c
h
an
n
el
s
ecu
r
i
t
y
.
T
h
is
p
a
r
a
g
r
a
p
h
w
ill ill
u
s
tr
a
te
th
e
p
a
p
e
r
o
r
g
a
n
iz
a
tio
n
a
s
f
o
llo
w
s
: T
h
is
s
e
c
tio
n
p
r
o
v
id
e
s
a
n
in
tr
o
d
u
c
tio
n
to
th
i
s
w
o
r
k
.
S
e
c
tio
n
2
d
is
c
u
s
s
t
h
e
o
r
ig
in
a
l D
H
K
E
a
n
d
its
c
r
y
p
to
g
r
a
p
h
ic
p
r
i
m
iti
v
e
s
.
S
e
c
tio
n
3
w
i
l
l
r
ev
i
s
i
t
t
h
e s
t
a
t
e o
f
t
h
e ar
t
i
n
K
E
P
.
S
ect
i
o
n
4
p
r
es
e
n
t
s
an
ad
v
er
s
ar
y
m
o
d
el
f
o
r
t
h
e t
i
m
i
n
g
at
t
ac
k
.
S
e
c
tio
n
5
p
r
e
s
e
nt
s
a
n a
t
t
a
c
k
m
o
d
e
l
f
o
r
t
he
r
e
l
a
y
a
t
t
a
c
k.
S
e
c
t
i
o
n 6
w
i
l
l
d
i
s
c
us
s
t
he
s
e
c
ur
i
t
y a
na
l
ys
i
s
f
o
r
t
he
t
i
m
i
n
g a
nd
r
el
a
y
at
t
ac
k
s
.
S
ect
i
o
n
7
w
i
l
l
s
h
o
w
t
h
e e
x
p
er
i
m
e
n
t
al
s
e
t
u
p
f
o
r
t
h
e r
el
a
y
at
t
ac
k
as
w
el
l
as
t
h
e e
x
p
er
i
m
en
t
r
e
s
u
lt
s
.
S
e
c
t
io
n
8
w
ill
d
is
c
u
s
s
t
he
r
e
s
u
l
t
s
o
f
t
he
r
e
l
a
y a
t
t
a
c
k e
xp
e
r
i
m
e
nt
a
nd
t
he
t
i
m
i
ng
a
t
t
a
c
k
s
e
c
ur
i
t
y
Evaluation Warning : The document was created with Spire.PDF for Python.
I
nd
o
ne
s
i
a
n J
E
l
e
c
E
ng
&
C
o
m
p
S
c
i
I
SSN
:
2502
-
4752
Si
de
-
C
hann
e
l
Se
c
ur
i
t
y
on K
e
y
E
x
c
hange
P
r
ot
oc
ol
:
T
i
m
i
ng
a
nd
R
el
ay
…
(
M
ohd A
nuar
M
at
I
s
a
)
689
r
ed
u
ct
i
o
n
.
S
ect
i
o
n
9
d
i
s
cu
s
s
e
s
t
h
i
s
p
ap
er
co
n
t
r
i
b
u
t
i
o
n
.
L
as
t
l
y
,
s
ect
i
o
n
1
0
co
n
cl
u
d
es
t
h
e r
es
e
ar
ch
w
o
r
k
d
o
n
e b
y
t
he
a
ut
ho
r
s
a
nd
a
l
s
o
o
f
f
e
r
s
a
n i
nt
r
o
d
uc
t
i
o
n t
o
t
he
f
ut
ur
e
w
o
r
k
.
2.
D
H
K
E
B
ACK
G
RO
UND
D
if
f
ie
-
H
e
ll
m
a
n
(
1
9
7
6
)
in
tr
o
d
u
c
e
d
th
e
f
ir
s
t
k
e
y
d
is
tr
ib
u
tio
n
p
r
o
to
c
o
l
[2
]
w
hi
c
h a
l
l
o
w
s
a
s
ecr
et
t
o
b
e
s
ha
r
e
d
i
n u
ns
e
c
ur
e
ne
t
w
o
r
k
s
.
D
i
f
f
i
e
-
H
e
l
l
m
a
n
k
e
y
e
x
c
h
a
ng
e
(
D
H
K
E
)
pr
ot
oc
ol
h
a
d s
ol
v
e
d a
t
r
a
di
t
i
on
a
l
b
a
nki
ng
p
r
o
b
l
e
m
i
n
s
ha
r
i
n
g
s
ym
m
e
t
r
i
c
ke
ys
.
B
e
f
o
r
e
D
H
K
E
,
t
he
s
ym
m
e
t
r
i
c
ke
ys
w
e
r
e
d
i
s
t
r
i
b
ut
e
d
b
y t
r
us
t
e
d
h
um
a
n
o
v
e
r
t
h
e
w
or
l
d.
I
t
r
e
qui
r
e
d h
u
m
a
n
a
n
d phy
s
i
c
a
l
m
e
di
um
t
o
s
h
a
r
e
t
h
e
s
ym
m
e
t
r
i
c
k
e
y
s
be
t
w
e
e
n ba
nk
s
.
A
t
t
h
a
t
m
o
m
e
n
t,
N
a
tio
n
a
l
I
n
s
titu
te
o
f
S
ta
n
d
a
r
d
s
a
n
d
T
e
c
h
n
o
lo
g
y
(
N
I
S
T
)
D
a
ta
E
n
c
r
y
p
ti
o
n
S
ta
n
d
a
r
d
(
D
E
S
)
w
a
s
u
s
e
d
a
s
a
s
y
m
m
e
t
r
i
c
c
r
y
p
t
o
s
y
s
t
e
m
f
o
r
b
a
n
ki
n
g.
T
hr
o
ug
h D
H
K
E
,
t
he
s
ha
r
i
ng
s
ym
m
e
t
r
i
c
ke
y
s
pr
obl
e
m
i
n
t
h
e
t
r
a
di
t
i
o
n
a
l
ba
n
k
i
ng
i
s
s
ol
v
e
d.
D
H
K
E
(
1976)
a
l
g
or
i
t
h
m
or
D
H
K
E
t
e
x
t
book
i
s
pr
e
s
e
n
t
e
d a
s
s
h
o
w
n i
n
F
i
g
ur
e
1
.
D
H
K
E
r
el
i
es
o
n
a d
i
s
cr
et
e l
o
g
p
r
o
b
l
em
a
s
t
h
e
f
o
u
n
d
at
i
o
n
m
at
h
e
m
at
i
cal
co
m
p
u
t
at
i
o
n
h
ar
d
n
e
s
s
,
w
h
ic
h
is
to
f
i
n
d
a
r
o
o
t in
m
o
d
u
la
r
a
r
ith
m
e
tic
.
T
h
e
r
o
o
t is
th
e
p
r
iv
a
te
p
a
r
a
m
e
te
r
s
a
nd
.
F
i
g
ur
e
1
.
D
H
K
E
c
r
y
p
t
o
s
ys
t
e
m
f
o
r
e
xc
ha
nge
a
s
ym
m
e
t
r
i
c
ke
y
3.
RE
C
E
NT
W
O
RK
S
O
N K
E
Y E
XCH
AN
G
E
P
RO
T
O
CO
L
A
f
t
er
f
o
u
r
d
ecad
es
s
i
n
ce i
t
s
i
n
t
r
o
d
u
c
t
i
on
,
m
a
ny
r
e
s
e
a
r
c
h
w
or
k
s
h
a
v
e
be
e
n
don
e
t
o i
m
pr
ov
e
D
H
K
E
b
as
ed
o
n
r
ecen
t
l
y
e
n
co
u
n
t
er
e
d
s
ecu
r
i
t
y
i
s
s
u
es
.
A
r
azi
B
.
[3
]
(
1
9
93
)
pr
o
po
s
e
d
a
n i
nt
e
gr
a
t
i
o
n o
f
ke
y e
xc
ha
nge
p
r
o
to
c
o
l a
n
d
N
I
S
T
d
ig
ita
l s
ig
n
a
tu
r
e
s
ta
n
d
a
r
d
(
D
S
S
)
f
o
r
e
s
t
a
b
lis
h
i
n
g
id
e
n
tit
y
a
s
s
u
r
a
n
c
e
f
o
r
a
ll k
e
y
e
x
c
h
a
n
g
e
pr
ot
oc
ol
pa
r
t
i
c
i
pa
n
t
s
.
K
oc
h
e
r
P
.
C
.
[4
]
(
1
9
9
6
)
h
as
s
h
o
w
n
a p
r
act
i
cal
s
i
d
e
-
c
ha
n
ne
l
a
t
t
a
c
k o
n
K
E
P
us
i
n
g t
i
m
i
ng
at
t
ack
f
o
r
cr
y
p
t
o
g
r
ap
h
i
c co
m
pu
t
a
t
i
on
.
R
a
ym
o
n
d e
t
a
l
.
(
20
02)
[5
]
p
r
o
p
o
s
ed
a c
o
l
l
ect
i
v
e
o
f
at
t
ack
s
i
n
t
h
e
D
H
K
E
pr
ot
oc
ol
a
n
d a
g
ood i
de
a
on
h
o
w
t
o
s
e
c
u
r
e
l
y
i
m
pl
e
m
e
n
t
t
h
e
D
H
pr
ot
oc
ol
i
n
v
a
r
i
ous
s
y
s
t
e
m
s
.
H
a
r
n
L
.
e
t
a
l
.
(
2004)
[6
]
pr
opos
e
d on
e
,
t
w
o
a
n
d t
h
r
e
e
r
ou
n
d
s
of
D
H
K
E
a
n
d di
g
i
t
a
l
s
i
g
n
a
t
u
r
e
a
l
g
or
i
t
hm
(
D
S
A
)
.
R.
C.
W
P
h
a
n
(
2005)
[
7]
f
i
xe
d
p
r
o
b
l
e
m
s
i
n t
he
f
i
xe
d
t
hr
e
e
-
r
o
u
n
d
DHKE
DS
A
[6
]
b
y
ad
d
i
n
g
a
f
o
r
w
ar
d
s
ecr
ec
y
a
nd
k
e
y
f
r
e
s
hn
e
s
s
a
s
r
e
qu
i
r
e
d i
n
a
k
e
y
e
x
c
h
a
ng
e
s
t
a
n
da
r
d.
Y
oon
e
t
a
l
.
(
2009)
[8
]
p
r
op
o
s
e
d a
n e
f
f
i
c
i
e
nt
D
H
K
E
h
as
h
m
es
s
ag
e
au
t
h
e
n
t
i
cat
i
o
n
co
d
e
(
H
M
A
C
)
w
i
t
h
f
o
r
wa
r
d
s
ecr
ecy
,
k
e
y
i
n
d
ep
en
d
en
ce
an
d
p
r
o
t
ect
i
o
n
ag
ai
n
s
t
s
es
s
i
o
n
s
t
a
t
e r
ev
eal
at
t
ac
k
s
.
T
h
e au
t
h
o
r
s
h
av
e
c
l
ai
m
ed
t
ha
t
t
h
ei
r
t
ech
n
i
q
u
e i
s
m
o
r
e ef
f
i
ci
e
n
t
t
h
an
J
eo
n
g
I
.
R
.
et
a
l.
[9
]
.
V
ie
t H
.
V
.
e
t a
l.
(
2
0
1
3
)
[
1
0]
pr
opos
e
d t
w
o D
H
K
E
D
S
A
pr
ot
oc
ol
s
t
h
a
t
h
a
v
e
s
a
t
i
s
f
i
e
d s
e
v
e
n
s
e
c
u
r
i
t
y
a
t
t
r
i
bu
t
e
s
f
or
a
k
e
y
e
x
c
h
a
ng
e
pr
ot
oc
ol
t
o be
a
s
s
um
e
d s
e
c
ur
e
[
10]
–
[
1
2]
,
na
m
e
l
y
k
no
w
n
ke
y a
ut
he
nt
i
c
a
t
i
o
n,
f
o
r
w
ar
d
s
ecr
ec
y
,
k
n
o
w
n
-
ke
y s
e
c
ur
i
t
y
,
u
n
kno
w
n
ke
y
-
s
ha
r
e
a
t
t
a
c
k,
ke
y r
e
l
a
y a
t
t
a
c
k,
ke
y
f
r
e
s
h
ne
s
s
a
nd
s
e
s
s
i
o
n
-
s
t
at
e r
ev
eal
[
10]
r
es
p
ect
i
v
el
y
.
M
an
d
al
S
.
et
al
.
(
2
0
1
4
)
[
13]
pr
op
os
e
a
m
u
l
t
i
-
p
ar
t
y
D
H
K
E
w
i
t
h
p
er
f
ect
f
o
r
w
ar
d
s
ecr
e
c
y
u
s
i
n
g
a
T
ru
s
t
e
d
T
h
i
rd
P
a
rt
y
(T
T
P
).
T
h
e
T
T
P
f
u
n
c
t
i
o
n
s
a
s
a
g
ro
u
p
c
o
n
t
ro
l
l
e
r f
o
r a
l
l
D
H
K
E
p
a
rt
i
c
i
p
a
n
t
s
.
G
o
l
a
K
.
K
.
e
t
a
l
.
(
2015
)
[
1
4]
p
r
o
p
o
s
ed
a s
ecu
r
e D
H
K
E
b
y
i
m
p
l
e
m
e
n
t
i
n
g
R
S
A
e
n
cr
y
p
t
i
o
n
a
n
d
d
ecr
y
p
t
i
o
n
o
n
D
H
K
E
s
ecr
et
s
.
F
a
t
h
i
r
a
d I
.
e
t
a
l
.
(
2016)
[
15]
r
ev
i
s
i
t
ed
D
H
K
E
co
m
m
er
ci
al
p
r
o
t
o
co
l
s
f
o
r
v
ar
i
o
u
s
n
et
w
o
r
k
a
t
t
ack
s
s
u
c
h
as
m
an
-
in
-
t
he
-
m
id
d
le
,
d
ig
ita
l c
e
r
ti
f
ic
a
te
(
p
a
r
a
m
e
te
r
s
o
n
T
L
S
/D
T
L
S
)
,
s
ig
n
a
tu
r
e
o
n
T
L
S
/D
T
L
S
/I
K
E
v
2
,
s
ig
n
a
t
u
r
e
o
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SSN
:
25
02
-
4752
I
nd
o
ne
s
i
a
n J
E
l
e
c
E
ng
&
C
o
m
p
S
c
i
,
V
o
l.
11
, N
o
.
2
,
A
ug
us
t
2018
:
6
88
–
695
690
SSH
a
n
d
T
L
S/
D
T
L
S,
p
r
e
-
s
ha
r
e
d
ke
y
o
n T
L
S
/
D
T
L
S
,
M
A
C
o
n I
P
s
e
c
(
I
K
E
v2
)
,
E
A
P
a
nd
t
hi
r
d
-
p
ar
t
y
s
er
v
er
o
n
I
K
E
v
2
,
cach
ed
s
h
ar
ed
s
ecr
et
o
r
S
A
S
o
n
Z
R
T
P
,
D
o
S
an
d
r
ep
l
y
r
es
p
ect
i
v
el
y
.
F
r
a
n
ci
l
l
o
n
et
al
.
(
2
0
1
1
)
[
1
6]
f
r
o
m
E
T
H
Z
u
r
i
ch
h
a
v
e s
h
o
w
n
p
r
act
i
cal
ex
p
e
r
i
m
e
nt
s
t
ha
t
c
a
n b
e
us
e
d
t
o
f
o
o
l
A
K
S
t
hr
o
u
gh r
e
l
a
y
a
t
t
a
c
ks
us
i
n
g l
a
r
ge
ti
m
i
n
g
d
e
la
y
s
f
o
r
lo
n
g
d
i
s
ta
n
c
e
s
a
n
d
m
u
ltip
le
r
e
la
y
s
f
o
r
r
a
d
io
-
ho
p
p
i
ng r
e
l
a
ys
a
t
l
o
ng
d
i
s
t
a
nc
e
s
.
T
he
m
o
s
t
r
ecen
t
w
o
r
k
w
a
s
d
o
n
e b
y
I
s
a
M.
A
.
M
.
et
al
.
(
2
0
1
7
)
[1
]
w
h
er
eb
y
a c
h
ai
n
o
f
K
E
P
w
i
t
h
r
el
a
y
at
t
ac
k
d
et
ect
i
o
n
i
s
u
s
ed
t
o
s
ecu
r
e co
m
m
u
n
i
cat
i
o
n
s
es
s
i
o
n
b
et
w
ee
n
au
t
o
m
o
t
i
v
e
(
car
)
an
d
k
ey
f
o
b
(
o
w
n
er
)
.
T
h
e cr
y
p
t
o
s
y
s
t
e
m
h
a
s
b
een
d
es
i
g
n
e
d a
n
d pr
ov
e
d by
r
e
f
e
r
r
i
n
g
t
o t
h
e
m
e
t
h
ods
b
y
V
i
e
t
[
10]
,
Y
oo
n
[8
]
,
J
e
o
ng [
2
8
]
a
nd
H
a
r
n
[6
]
.
T
h
e
pr
op
os
e
d K
E
P
by
I
s
a
[1
]
can
b
e u
s
ed
t
o
s
ecu
r
e s
y
m
m
e
t
r
i
c en
cr
y
p
t
i
o
n
i
n
n
et
w
o
r
k
ed
s
y
s
t
e
m
s
[
17]
–
[
19
]
.
4.
ADVE
R
S
ARY M
O
DE
L
F
O
R T
I
M
I
NG
A
T
T
ACK
T
he
p
a
p
e
r
ha
s
i
nt
r
o
d
uc
e
d
a
n
a
d
ve
r
s
a
r
y
m
o
d
e
l
us
i
n
g a
n i
nd
i
s
t
i
ng
ui
s
ha
b
i
l
i
t
y
e
xp
e
r
i
m
e
nt
w
i
t
h
t
i
m
i
ng
at
t
ack
s
o
n
K
E
P
.
I
n t
hi
s
a
d
ve
r
s
a
r
y
m
o
d
e
l
,
a
n a
d
ve
r
s
a
r
y
ha
s
t
he
kno
w
l
e
d
ge
o
f
a
d
a
p
t
i
ve
i
nd
i
s
t
i
n
g
ui
s
ha
b
i
l
i
t
y a
nd
t
i
m
i
n
g
k
n
o
w
l
ed
g
e t
h
at
ar
e acces
s
i
b
l
e b
y
an
o
r
acl
e.
T
h
i
s
m
o
d
el
al
l
o
w
s
t
h
e ad
v
er
s
ar
y
t
o
acces
s
i
d
en
t
i
cal
c
o
m
p
ut
i
ng r
e
s
o
ur
c
e
s
i
n t
e
r
m
s
o
f
c
o
m
p
ut
i
n
g ha
r
d
w
a
r
e
(
e
.
g.
C
P
U
)
.
T
he
a
d
ve
r
s
a
r
y
i
s
gi
ve
n t
he
k
no
w
l
e
d
ge
o
f
t
i
me
b
e
i
ng t
he
d
ur
a
t
i
o
n t
o
pe
r
f
o
r
m
c
r
y
p
t
o
gr
a
p
hi
c
c
o
m
p
ut
a
t
i
o
ns
(
e
.
g.
p
r
i
m
i
t
i
ve
c
o
m
p
ut
a
t
i
o
n a
nd
p
r
o
t
o
c
ol
e
xe
c
ut
i
o
n)
.
F
ur
t
he
r
m
o
r
e
,
t
he
a
d
ve
r
s
a
r
y
ha
s
t
he
k
no
w
l
e
d
ge
o
f
ne
t
w
o
r
k t
r
a
ns
m
i
s
s
i
o
n
d
e
l
a
y f
o
r
a
l
l
t
r
a
ns
a
c
t
i
o
ns
a
s
s
ho
w
n
i
n F
i
gur
e
s
2
a
nd
3
.
F
i
g
ur
e
2
.
I
n
d
is
tin
g
u
is
h
a
b
ilit
y
e
x
p
e
r
i
m
e
n
t
w
it
h
ti
m
i
n
g
a
tta
c
k
s
o
n
K
E
P
F
i
g
ur
e
3
.
A
r
el
a
y
at
t
ac
k
(
o
n
e r
el
a
y
)
b
et
w
ee
n
a k
e
y
f
o
b
an
d
car
Evaluation Warning : The document was created with Spire.PDF for Python.
I
nd
o
ne
s
i
a
n J
E
l
e
c
E
ng
&
C
o
m
p
S
c
i
I
SSN
:
2502
-
4752
Si
de
-
C
hann
e
l
Se
c
ur
i
t
y
on K
e
y
E
x
c
hange
P
r
ot
oc
ol
:
T
i
m
i
ng
a
nd
R
el
ay
…
(
M
ohd A
nuar
M
at
I
s
a
)
691
F
o
r
th
e
i
n
d
is
t
in
g
u
is
h
a
b
ilit
y
e
x
p
e
r
i
m
e
n
t,
t
h
e
A
d
v
e
r
s
a
r
y
w
i
ll s
e
n
d
t
w
o
p
a
ir
s
o
f
p
u
b
lic
p
a
r
a
m
e
te
r
s
(
0
,
0
)
a
nd
(
1
,
1
)
to
th
e
C
h
a
lle
n
g
e
r
.
R
e
f
e
r
r
in
g
to
F
i
gur
e
2
,
t
he
C
ha
l
l
e
nge
r
w
i
l
l
c
o
m
p
u
t
e
ke
y e
xc
ha
n
ge
s
0
a
nd
1
,
a
n
d
its
c
r
y
p
to
g
r
a
p
h
ic
c
o
m
p
u
ta
tio
n
a
l ti
m
in
g
s
0
a
nd
1
f
or
bot
h
p
u
b
l
i
c p
a
r
am
et
er
s
(
0
,
0
)
a
nd
(
1
,
1
)
.
T
h
en
t
h
e C
h
al
l
en
g
er
w
i
l
l
r
an
d
o
m
l
y
c
h
o
o
s
e ei
t
h
er
0
o
r
1
as
t
h
e ch
al
l
en
g
ed
k
e
y
∗
.
A
l
t
o
ge
t
he
r
t
he
∗
,
0
a
nd
1
ar
e s
en
t
t
o
t
h
e A
d
v
er
s
ar
y
.
T
h
e
A
d
v
e
r
s
a
r
y
n
e
e
d
s
to
d
is
tin
g
u
is
h w
he
t
he
r
t
he
ke
y
∗
i
s
0
1
w
it
h
t
h
e
a
d
d
itio
n
a
l
in
f
o
r
m
a
t
io
n
o
f
t
i
m
in
g
0
a
nd
1
.
I
f
t
h
e
pr
oba
bi
l
i
t
y
of
gu
e
s
s
i
n
g
t
h
e
c
or
r
e
c
t
ke
y
∗
i
s
g
r
eat
er
t
ha
n
1
2
a
s
s
ho
w
n i
n
F
i
gur
e
3
,
t
he
n
i
t
ca
n
b
e co
n
cl
u
d
ed
t
h
at
t
h
e
A
d
v
er
s
ar
y
h
as
t
h
e
“
ad
v
an
t
ag
e” a
n
d
t
h
e
g
i
v
e
n
pr
ot
oc
ol
∏
is
c
o
n
s
id
e
r
e
d
n
o
t s
e
c
u
r
e
in
te
r
m
s
o
f
i
n
d
is
t
in
g
u
is
h
a
b
ilit
y
e
x
p
e
r
i
m
e
n
t.
5.
RE
L
AY
AT
T
ACK
T
h
i
s
s
ec
t
i
o
n
p
r
es
en
t
s
t
h
e
r
el
ay
at
t
a
ck
b
y
an
ex
p
e
r
i
m
en
t
b
et
w
een
a k
ey
f
o
b
an
d
ca
r
.
T
o
mo
u
n
t
t
h
e r
el
ay
at
t
a
ck
,
an
a
d
v
e
r
s
a
r
y
w
i
l
l
s
et
u
p
at
l
e
as
t
o
n
e r
a
d
i
o
f
r
e
q
u
en
cy
(
R
F
)
r
el
ay
b
et
w
een
t
h
e k
e
y
f
o
b
an
d
c
ar
,
w
h
i
ch
w
i
l
l
act
as
a m
an
-
in
-
t
he
-
m
i
d
d
l
e
dur
i
ng s
e
c
ur
i
t
y
a
ut
he
nt
i
c
a
t
i
o
n s
e
s
s
i
o
ns
b
e
t
w
e
e
n t
he
ke
y
f
o
b a
nd
c
a
r
[1
6
]
.
T
he
r
el
ay
ed
s
e
c
ur
i
t
y
a
ut
he
nt
i
c
a
t
i
o
n
c
r
e
d
e
nt
i
a
l
s
w
i
l
l
a
ut
ho
r
i
z
e
t
he
c
a
r
t
o
be
l
oc
ke
d
or
unl
o
c
ke
d
e
ve
n t
ho
ugh t
he
c
a
r
’
s
o
w
n
e
r
(
w
ith
th
e
k
e
y
f
o
b
)
is
f
a
r
a
w
a
y
f
r
o
m
th
e
c
a
r
.
B
y
th
is
a
tta
c
k
,
th
e
a
d
v
e
r
s
a
r
y
w
ill
s
u
c
c
e
e
d
t
o
f
o
o
l th
e
a
u
to
m
o
tiv
e
k
e
y
le
s
s
s
y
s
te
m
s
(
A
K
S
)
u
s
in
g
a
t le
a
s
t
on
e
or
m
or
e
R
F
r
e
l
a
y
no
d
e
s
a
s
s
h
o
w
n
i
n F
i
gur
e
s
3
a
nd
4
.
T
h
e
r
e
i
s
no
a
n a
t
t
e
m
p
t
t
o
br
e
a
k c
r
y
p
t
o
gr
a
p
hi
c
e
nc
r
y
p
t
i
o
n ke
y b
y
t
he
a
d
ve
r
s
a
r
y
,
b
ut
t
hr
o
ugh r
e
l
a
y
i
ng
t
he
en
cr
y
p
t
e
d
R
F
c
o
m
m
u
n
i
cat
i
o
n
d
at
a b
et
w
een
t
h
e k
ey
f
o
b
an
d
ca
r
t
h
at
m
ak
es
t
h
e ex
i
s
t
i
n
g
A
K
S
v
u
l
n
er
a
b
l
e t
o
t
h
e
r
el
ay
at
t
a
ck
.
F
i
g
ur
e
4
.
A
dv
e
r
s
a
r
i
e
s
r
e
l
a
y
i
ng R
F
s
i
gn
a
l
f
or
l
ong
di
s
t
a
n
c
e
T
h
i
s
p
ar
ag
r
ap
h
ex
p
l
ai
n
s
t
h
e
r
e
l
ay
at
t
ack
b
e
t
w
een
t
h
e k
ey
f
o
b
an
d
ca
r
as
s
h
o
w
n
i
n
t
h
e
F
i
gur
e
3
.
I
n
t
he
S
te
p
1
,
th
e
c
a
r
w
ill s
e
n
d
p
u
b
l
ic
p
a
r
a
m
e
te
r
f
o
r
s
e
s
si
o
n
o
v
e
r
R
F
.
T
he
w
ill a
r
r
iv
e
a
t
th
e
k
e
y
f
o
b
e
i
th
e
r
w
ith
o
u
t a
r
e
la
y
o
r
r
el
ay
ed
b
y
t
h
e a
d
v
er
s
ar
y
.
I
f
w
i
t
h
o
u
t
a
r
el
ay
,
t
h
e
w
i
l
l
b
e
a
r
r
i
ve
d a
t
t
he
ke
y
f
ob b
y
a
t
r
a
n
sm
i
ss
i
o
n
d
e
l
a
y
fo
r
d
i
s
t
a
nc
e
.
I
f
r
e
l
a
ye
d
b
y t
he
a
d
v
e
r
s
a
r
y,
t
he
w
i
l
l
b
e ar
r
i
v
ed
at
t
h
e
a
d
v
er
s
ar
y
b
y
a t
r
an
s
m
i
ss
i
o
n
d
e
l
a
y
fo
r
d
i
s
ta
n
c
e
.
T
h
e
n
th
e
a
d
v
e
r
s
a
r
y
w
ill f
o
r
w
a
r
d
th
e
t
o
t
h
e
ke
y
f
o
b
b
y a
t
r
a
n
sm
i
ss
i
o
n
d
e
l
a
y
′
fo
r
d
i
s
t
an
ce.
T
h
er
ef
o
r
e
t
h
e
t
o
t
al
t
r
an
s
m
i
s
s
i
o
n
d
e
l
ay
b
y
t
h
e a
d
v
e
r
s
a
r
y
i
s
+
′
fo
r
2
d
i
s
t
an
ces
.
I
n
t
h
i
s
cas
e,
t
h
e
ca
r
o
w
n
er
(
h
o
l
d
k
ey
f
o
b
)
i
s
as
s
u
m
ed
t
h
a
t
h
e/
s
h
e
i
s
u
n
a
b
l
e t
o
s
ee t
h
e c
ar
a
t
2
d
i
s
t
a
nc
e
s
.
T
h
i
s
w
i
l
l
gr
a
nt
a
n
op
por
t
uni
t
y
t
o t
he
a
d
ve
r
s
a
r
y
t
o
m
o
unt
t
he
r
e
l
a
y
a
t
t
a
c
k
b
e
t
w
e
e
n t
he
c
a
r
a
n
d
ke
y
f
ob
a
t th
e
2
d
i
s
t
an
ces
.
I
n t
he
S
t
e
p
2
,
t
he
ke
y
f
o
b w
i
l
l
s
e
n
d
p
ubl
i
c
p
a
r
a
m
e
t
e
r
f
o
r
s
e
ss
i
o
n
o
v
e
r
R
F
.
T
he
w
ill
a
r
r
i
v
e
a
t
t
h
e
c
ar
ei
t
h
er
w
i
t
h
o
u
t
r
e
l
a
y
o
r
r
e
l
a
y
e
d
b
y
t
h
e ad
v
er
s
ar
y
.
I
f
w
i
t
h
o
u
t
a
r
e
l
a
y
,
t
h
e
w
ill b
e
a
r
r
i
ve
d a
t
t
h
e c
ar
b
y
a t
r
an
s
m
i
s
s
i
o
n
d
el
a
y
fo
r
d
i
s
t
an
ce
.
I
f
r
el
ay
ed
b
y
t
h
e a
d
v
e
r
s
a
r
y
,
t
h
e
w
ill
b
e
a
r
r
i
v
e
d
a
t
t
he
a
d
ve
r
s
a
r
y
b
y
a
t
r
a
ns
m
i
s
s
i
o
n de
l
a
y
fo
r
d
is
ta
n
c
e
.
T
h
e
n
th
e
a
d
v
e
r
s
a
r
y
w
ill
f
o
r
w
a
r
d
th
e
t
o
t
he
ca
r
b
y
a
t
r
an
s
m
i
s
s
i
o
n
d
el
ay
′
fo
r
d
i
s
t
a
nc
e
.
T
h
e
r
e
f
or
e
t
he
t
o
t
a
l
t
r
a
ns
m
i
s
s
i
o
n
de
l
a
y
b
y
t
he
a
d
ve
r
s
a
r
y
i
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SSN
:
25
02
-
4752
I
nd
o
ne
s
i
a
n J
E
l
e
c
E
ng
&
C
o
m
p
S
c
i
,
V
o
l.
11
, N
o
.
2
,
A
ug
us
t
2018
:
6
88
–
695
692
+
′
fo
r
2
d
i
s
t
a
nc
e
s
.
T
h
e
f
ol
l
o
w
i
n
g e
q
ua
t
i
o
ns
s
h
o
w
t
he
e
xa
m
p
l
e
s
o
f
R
F
c
o
m
m
uni
c
a
t
i
o
n
d
e
l
a
y
w
i
t
h
o
u
t
r
el
ay
at
t
a
ck
an
d
w
i
t
h
r
el
ay
at
t
ack
:
W
ith
o
u
t r
e
la
y
a
tt
a
c
k
:
=
+
′
W
i
t
h
o
n
e
r
el
ay
at
t
ack
:
′
=
+
′
+
+
′
6.
S
E
CUR
I
T
Y ANA
L
YS
I
S
T
h
is
s
e
c
ti
o
n
p
r
e
s
e
n
ts
th
e
s
e
c
u
r
ity
a
n
a
ly
s
is
f
o
r
tim
in
g
a
n
d
r
e
l
a
y
a
tta
c
k
s
a
s
f
o
ll
o
w
s
:
6
.
1.
T
i
m
i
n
g
A
t
t
ac
k
A
d
ve
r
s
a
r
y
m
o
d
e
l
:
I
nd
i
s
t
i
ngui
s
ha
b
i
l
i
t
y
e
xpe
r
i
m
e
nt
f
o
r
ke
y
e
x
c
ha
nge
pr
ot
oc
ol
.
A
d
ve
r
s
a
r
y
kno
w
l
e
d
ge
:
P
(
A
0
,
B
0
)
,
P
(
A
1
,
B
1
)
,
P
(
A
i
,
B
i
)
,
t
0
,
t
1
,
t
i
a
nd
k
i
.
A
d
v
er
s
a
r
y
l
i
m
i
t
at
i
o
n
:
T
h
e ad
v
er
s
ar
y
can
n
o
t
acc
es
s
t
h
e ch
al
l
e
n
g
ed
k
ey
s
k
0
a
nd
k
1
fro
m
P
(
A
0
,
B
0
)
a
nd
P
(
A
1
,
B
1
)
b
y
th
e
o
r
a
c
l
e
f
o
r
a
f
a
i
r
in
d
is
tin
g
u
is
h
a
b
ili
ty
e
x
p
e
r
im
e
n
t.
O
r
a
cl
e
k
ey
ex
ch
an
g
e c
o
m
p
u
t
at
i
o
n
:
T
h
e o
r
a
cl
e
k
n
o
w
s
al
l
s
ec
r
et
p
ar
am
et
er
s
(
e.
g
.
a
i
,
b
i
)
t
h
a
t
ar
e
r
eq
u
i
r
ed
t
o
co
m
p
u
t
e
k
0
,
k
1
,
k
i
b
y
p
u
b
l
i
c p
ar
am
et
er
s
P
(
A
0
,
B
0
)
,
P
(
A
1
,
B
1
)
,
P
(
A
i
,
B
i
)
.
T
h
e o
r
ac
l
e a
l
s
o
s
h
ar
e
s
t
h
e
tim
in
g
s
t
0
,
t
1
,
t
i
a
s r
e
q
u
e
s
t
e
d
b
y
t
he
A
d
ve
r
s
a
r
y
t
ha
t
gi
ve
s
a
dd
i
t
i
o
n
a
l
kno
w
l
e
d
ge
t
o
m
o
unt
t
he
t
i
m
i
ng a
t
t
a
c
ks
.
S
e
c
u
r
ity
a
s
s
u
m
p
tio
n
s
:
1
)
C
o
m
p
u
ta
t
io
n
a
l
D
if
f
ie
-
H
e
llm
a
n
(
C
D
H
)
p
r
o
b
l
e
m
is
h
a
r
d
in
th
e
c
y
c
lic
g
r
o
u
p
G
;
2
)
ha
s
h
f
unc
t
i
o
n
i
s
a
ha
s
h f
u
nc
t
i
o
n
w
i
t
h s
t
r
o
ng
c
ol
l
i
s
i
o
n
-
r
e
s
i
st
a
n
t
[
20]
; a
n
d
3
)
a
f
i
x
ed
-
tim
e
o
f
K
E
P
r
u
n
tim
e
f
o
r
a
l
l
f
i
xe
d
i
n
p
ut
l
e
ngt
h i
nt
o t
he
ke
y
e
xc
ha
nge
f
unc
t
i
o
n
t
ha
t
r
uns
i
n a
po
l
y
no
m
i
a
l
t
i
m
e
,
w
he
r
e
b
y
t
he
ke
y
e
xc
ha
nge
f
unc
t
i
o
n r
e
c
e
i
ve
s
a
ny
va
l
i
d
i
np
ut
w
i
t
h t
he
s
a
m
e
l
e
ngt
h (
e
.
g.
,
f
(
101
)
a
nd
f
(
0
01)
,
w
he
r
e
|
f
(1
0
1
)|
=
|
f
(0
0
1
)|
)
w
ill h
a
v
e
th
e
id
e
n
ti
c
a
l
r
u
n
tim
e
o
r
e
x
e
c
u
ti
o
n
f
o
r
a
ll c
o
n
d
iti
o
n
s
.
T
h
e
f
ix
e
d
-
ti
m
e
is
b
a
s
e
d
o
n
th
e
wo
r
s
t
-
cas
e s
cen
a
r
i
o
t
o
co
m
p
u
t
e t
h
e
K
E
P
r
u
n
t
i
m
e.
S
e
c
ur
i
t
y
r
e
d
uc
t
i
o
ns
:
T
he
p
r
ob
l
e
m
o
f
f
i
nd
i
ng a
ke
y
k
∗
is
r
e
d
u
c
e
d
t
o
th
e
p
r
o
b
le
m
o
f
in
d
is
t
in
g
u
is
h
a
b
il
ity
e
x
p
er
i
m
en
t
s
f
o
r
l
ar
g
e
n
e
xpe
r
i
m
e
nt
s
e
s
s
i
o
ns
.
T
he
k
∗
s
a
tis
f
ie
s
th
e
in
d
is
t
in
g
u
is
h
a
b
i
lity
e
x
p
e
r
im
e
n
ts
f
o
r
k
e
y
e
xc
ha
nge
pr
ot
oc
o
l
i
f
a
n
d
o
nl
y
i
f
t
he
a
d
ve
r
s
a
r
y
a
d
va
nt
a
ge
ε
(
n
)
is
n
e
g
lig
ib
le
f
o
r
th
e
la
r
g
e
n
e
xp
e
r
i
m
e
nt
s
e
s
s
i
o
ns
.
S
ecu
r
i
t
y
ar
g
u
m
en
t
s
:
B
y
t
h
e
s
ecu
r
i
t
y
as
s
u
m
p
t
i
o
ns
1)
,
2)
a
nd
3
)
,
t
h
e
a
d
va
nt
a
ge
o
ve
r
pr
o
ba
b
i
l
i
s
t
i
c
p
ol
y
no
m
i
a
l
-
t
i
m
e (
P
P
T
)
n
eg
l
i
g
i
b
l
e.
I
f
t
h
e
w
o
r
s
t
cas
e f
i
x
ed
-
ti
m
e
c
r
y
p
to
g
r
a
p
h
ic
c
o
m
p
u
ta
ti
o
n
is
i
m
p
le
m
e
n
te
d
i
n
K
E
P
,
t
he
A
d
ve
r
s
a
r
y
w
i
l
l
not
be
a
b
l
e
t
o
d
i
s
t
i
ngui
s
h w
he
t
he
r
t
he
k
e
y
∗
i
s
0
1
w
ith
th
e
a
d
d
iti
o
n
a
l
in
f
o
r
m
a
tio
n
o
f
t
im
in
g
0
a
nd
1
.
T
h
e w
o
r
s
t
ca
s
e f
i
x
ed
-
tim
e
c
r
y
p
t
o
g
r
a
p
h
i
c
c
o
m
p
u
ta
ti
o
n
s
w
ill
r
e
n
d
e
r
th
e
A
d
v
e
r
s
a
r
y
c
a
p
a
b
ili
ty
to
m
o
u
n
t
th
e
tim
in
g
a
tt
a
c
k
s
o
n
th
e
K
E
P
im
p
le
m
e
n
ta
ti
o
n
a
lm
o
s
t
in
f
e
a
s
i
b
le
b
e
c
a
u
s
e
tim
in
g
0
a
nd
1
a
r
e
not
t
he
a
c
t
ua
l
K
E
P
c
r
y
p
t
o
gr
a
p
hi
c
r
unt
i
m
e
s
.
T
he
r
e
f
o
r
e
,
t
he
A
d
ve
r
s
a
r
y
l
o
s
t
i
n t
h
e
i
nd
i
s
t
i
ngui
s
ha
b
i
l
i
t
y
e
xpe
r
i
m
e
n
t
b
y
t
he
ne
gl
i
gi
b
l
e
a
d
va
nt
a
ge
.
6
.
2 R
e
l
ay A
t
t
a
c
k
A
t
t
ack
m
o
d
e
l
:
R
el
ay
A
t
t
ack
o
n
K
E
P
A
d
ve
r
s
a
r
y
kno
w
l
e
d
ge
:
p
ca
r
i
a
nd
p
kf
o
b
i
Re
l
a
y
a
tta
c
k
e
x
p
e
r
im
e
n
t: T
h
e
A
d
v
e
r
s
a
r
y
w
ill r
e
la
y
a
ll
en
cr
y
p
t
e
d
R
F
co
m
m
u
n
i
cat
i
o
n
d
a
t
a b
et
w
een
t
h
e
ke
y
f
o
b
a
nd c
a
r
a
s
s
ho
w
n i
n
F
i
gur
e
3
.
A
d
v
er
s
a
r
y
l
i
m
i
t
at
i
o
n
:
T
h
e A
d
v
er
s
a
r
y
m
a
y
d
ep
l
o
y
m
o
r
e t
h
a
n
o
n
e R
F
r
el
ay
n
o
d
es
f
o
r
an
e
xt
e
ns
i
v
e
d
is
t
a
n
c
e
b
e
tw
e
e
n
th
e
k
e
y
f
o
b
a
n
d
c
a
r
,
b
u
t it
w
ill
in
t
r
o
d
u
c
e
m
o
r
e
R
F
tr
a
n
s
m
is
s
io
n
d
e
la
y
s
.
T
h
is
a
s
s
u
m
p
tio
n
is
al
s
o
i
n
c
l
u
d
ed
t
h
a
t
t
h
e
ad
v
er
s
ar
y
can
n
o
t
ac
ces
s
o
r
d
i
r
ect
l
y
t
em
p
e
r
t
h
e k
ey
f
o
b
an
d
ca
r
.
A
d
ve
r
s
a
r
y
go
a
l
:
T
o l
oc
k
o
r
unl
o
c
k
t
he
c
a
r
(
or
dr
i
v
ew
ay
t
h
e ca
r
)
u
s
i
n
g
t
h
e
r
el
ay
at
t
a
ck
.
A
d
v
e
r
s
a
r
y
c
o
m
p
u
ta
ti
o
n
:
T
h
e
A
d
v
e
r
s
a
r
y
w
ill i
m
p
le
m
e
n
t
s
to
r
e
a
n
d
f
o
r
w
a
r
d
o
f
a
l
l
e
n
cr
y
p
t
ed
R
F
co
m
m
u
n
i
cat
i
o
n
d
a
t
a
b
e
t
w
een
t
h
e k
ey
f
o
b
an
d
ca
r
i
n
o
n
e
o
r
m
o
r
e R
F
r
el
ay
n
o
d
es
as
s
h
o
w
n
i
n
t
h
e F
i
g
u
r
es
3
a
nd
4
.
S
e
c
u
r
ity
a
s
s
u
m
p
tio
n
s
:
I
t is
i
d
e
n
tic
a
l t
o
th
e
s
e
c
u
r
ity
a
s
s
u
m
p
ti
o
n
s
1
u
n
til
3
in
th
e
tim
in
g
a
tta
c
k
.
I
n
a
d
d
it
io
n
t
o
th
e
tim
in
g
a
tta
c
k
s
e
c
u
r
ity
a
s
s
u
m
p
tio
n
s
,
4
)
a
n
y
r
e
l
a
y
e
d
R
F
co
m
m
u
n
i
cat
i
o
n
d
at
a
b
et
w
een
t
h
e k
ey
f
o
b
a
nd c
a
r
w
i
l
l
i
nt
r
od
uc
e
R
F
t
r
a
n
s
m
i
s
si
o
n
d
e
l
a
y
s
t
ca
r
i
′
a
nd
t
kf
o
b
i
′
b
e
cau
s
e
o
f
t
h
e
i
m
p
l
em
en
t
at
i
o
n
o
f
s
t
o
r
e
an
d
f
or
w
a
r
d by
o
n
e
o
r
m
o
r
e
R
F
r
el
ay
n
o
d
es
.
5
)
I
f
K
E
P
i
m
p
l
e
m
en
t
s
R
F
co
m
m
u
n
i
cat
i
o
n
d
e
l
ay
d
et
ect
i
o
n
(
o
r
R
F
t
i
m
e
o
ut
)
be
t
w
e
e
n t
he
ke
y
f
ob
a
n
d
car
,
i
t
ca
n
d
et
e
ct
t
h
e
R
F
t
r
a
n
s
m
i
s
si
o
n
d
e
l
a
y
s
′
a
nd
′
t
h
a
t
ar
e
Evaluation Warning : The document was created with Spire.PDF for Python.
I
nd
o
ne
s
i
a
n J
E
l
e
c
E
ng
&
C
o
m
p
S
c
i
I
SSN
:
2502
-
4752
Si
de
-
C
hann
e
l
Se
c
ur
i
t
y
on K
e
y
E
x
c
hange
P
r
ot
oc
ol
:
T
i
m
i
ng
a
nd
R
el
ay
…
(
M
ohd A
nuar
M
at
I
s
a
)
693
i
n
t
r
o
d
u
ce
d
b
y
t
h
e r
el
ay
at
t
ack
n
o
d
e(
s
)
b
e
cau
s
e
o
f
t
h
e
wo
r
s
t
-
cas
e s
c
en
a
r
i
o
o
f
t
h
e K
E
P
i
n
R
F
co
m
m
u
n
i
cat
i
o
n
d
el
ay
s
ar
e
a
nd
.
S
ecu
r
i
t
y
r
ed
u
ct
i
o
n
:
T
h
e
p
r
o
b
l
em
o
f
r
el
ay
i
n
g
K
E
P
f
o
r
R
F
co
m
m
u
n
i
cat
i
o
n
d
at
a i
s
r
e
d
u
ce
d
t
o
t
h
e
pr
o
bl
e
m
of
n
ot
i
nt
r
od
uc
i
ng R
F
t
r
a
n
s
m
i
s
si
o
n
d
e
l
a
ys
′
a
nd
′
b
et
w
een
t
h
e k
ey
f
o
b
an
d
c
ar
f
o
r
d
i
s
ta
n
c
e
.
T
h
e
K
E
P
s
a
tis
f
ie
s
th
e
s
e
c
u
r
ity
a
g
a
in
s
t
r
e
la
y
a
tta
c
k
if
a
n
d
o
n
ly
if
th
e
A
d
v
e
r
s
a
r
y
is
n
o
t a
b
l
e
t
o
lo
c
k
o
r
u
n
lo
c
k
th
e
ca
r
(
o
r
d
r
i
v
ew
ay
t
h
e ca
r
)
u
s
i
n
g
t
h
e
r
e
l
ay
at
t
ack
b
y
2
d
i
s
t
an
ce
.
O
n
e m
ay
r
ef
e
r
t
o
R
F
c
o
m
m
u
n
i
cat
i
o
n
b
et
w
een
t
h
e k
ey
f
o
b
an
d
ca
r
f
o
r
t
h
e
r
e
l
ay
at
t
ack
ex
p
er
i
m
en
t
s
u
s
i
n
g
ch
ai
n
ed
K
E
P
(
C
K
E
P
)
p
r
o
p
o
s
e
d
b
y
M.
A
.
M
I
s
a
et
al
.
[
1]
,
[
21
]
,
[
22]
i
n
t
h
e n
e
x
t
s
e
c
t
i
o
n
.
T
h
e
r
e ar
e
t
h
r
ee e
x
p
er
i
m
e
n
t
a
l
s
et
u
p
s
f
o
r
t
h
e
di
s
t
a
nc
e
,
n
a
m
e
l
y
1
,
2.
5 a
nd 5
m
et
er
s
.
7.
RE
L
AY AT
T
ACK
E
XP
E
R
I
M
E
NT
7.
1
E
x
p
eri
m
en
t
S
et
u
p
F
i
g
ur
e
4
s
ho
w
s
t
he
e
xp
er
i
m
e
n
t
s
et
u
p
f
o
r
C
K
E
P
p
u
b
l
i
c p
ar
am
et
er
e
x
ch
a
n
g
es
o
v
er
R
F
w
i
t
h
o
u
t
a r
el
a
y
,
o
n
e r
el
a
y
n
o
d
e a
n
d
t
w
o
r
el
a
y
n
o
d
es
r
es
p
ect
i
v
el
y
.
T
h
i
s
w
o
r
k
h
as
s
el
ec
t
ed
C
K
E
P
t
h
at
p
r
o
p
o
s
ed
b
y
M.
A
.
M
I
s
a
e
t a
l.
[
1]
,
[
21]
,
[
2
2]
as
K
E
P
f
o
r
t
h
e r
el
ay
at
t
ac
k
ex
p
er
i
m
e
n
t
.
T
h
e ex
p
er
i
m
en
t
s
et
u
p
w
as
u
s
ed
t
o
m
eas
u
r
e t
i
m
e
o
f
f
l
i
ght
(
T
o
F
)
o
f
R
F
c
o
m
m
uni
c
a
tio
n
b
y
a
r
o
u
n
d
tr
ip
ti
m
e
(
R
T
T
)
d
is
ta
n
c
e
e
s
ti
m
a
tio
n
m
e
t
h
o
d
[2
3
],
[2
4
]
.
T
ab
l
e 1
s
h
o
w
s
h
ar
d
w
ar
e an
d
s
o
f
t
w
ar
e u
s
ed
f
o
r
t
h
e r
e
l
a
y
at
t
a
ck
ex
p
er
i
m
en
t
.
T
ab
l
e
1
.
H
ar
d
w
ar
e an
d
s
o
f
t
w
a
r
e f
o
r
r
el
ay
at
t
ac
k
ex
p
er
i
m
en
t
T
es
t
b
ed
S
et
u
p
D
e
s
c
r
ip
t
io
n
s
H
a
rd
w
a
re
R
a
s
p
b
e
r
r
y
P
i 2
M
o
d
e
l
B
,
9
0
0
MH
z
A
R
M
C
o
r
te
x
-
A
7
C
P
U
(
o
v
e
r
c
l
o
c
k
t
o
1
G
H
z
)
,
Q
u
a
d
C
o
r
e
s
C
P
U
,
L
1
3
2
K
B
(
e
ach
co
r
e
)
an
d
L
2
5
1
2
K
B
(
s
h
a
r
e
d
)
c
a
c
h
e
s
a
n
d
1
G
B
R
A
M
.
C
i
s
e
c
o
S
l
i
c
e
o
f
R
a
d
i
o:
S
R
F
R
a
d
i
o
M
od
u
l
e
w
i
t
h
o
n
-
b
o
a
r
d
"
c
h
i
p
"
a
n
t
e
n
n
a
(
T
e
x
a
s
I
n
s
t
r
u
m
e
n
t
s
C
C
1
1
1
0
-
C
C
1
11
1
)
.
S
o
f
t
wa
r
e
R
a
s
p
b
i
a
n
8
(
J
e
s
s
i
e
)
O
S
,
L
i
n
u
x
K
e
r
n
e
l
4
.
4
.
2
1
-
v
7
+
a
n
d
P
y
t
h
o
n
3
.
4
2
.
7
.
2
E
x
pe
r
i
m
e
nt
R
e
s
ul
t
s
T
he
r
e
s
ul
t
s
i
n
F
i
gur
e
5
h
a
s
s
h
o
w
n
t
h
at
t
h
e
av
er
a
g
e p
r
o
p
ag
at
i
o
n
d
el
a
y
f
o
r
1
,
2
.
5
an
d
5
m
et
er
s
t
h
a
t
ar
e
co
n
s
i
s
t
en
t
(
v
al
u
e
v
er
y
cl
o
s
e)
b
y
t
h
e
g
i
v
e
n
s
i
m
u
l
a
t
i
o
n
d
i
s
t
an
ces
d
u
e t
o
“t
h
e
p
r
o
p
ag
at
i
o
n
s
p
eed
o
f
r
ad
i
o
w
a
v
es
i
n
ai
r
ap
p
r
o
ac
h
es
t
h
e s
p
eed
o
f
l
i
g
h
t
”
[
23]
.
F
o
r
ex
am
p
l
e,
t
h
e
p
r
o
p
ag
at
i
o
n
d
el
ay
o
f
C
K
E
P
(
w
i
t
h
o
u
t
r
el
a
y
)
f
o
r
1
m
e
t
e
r
i
s
0.
0086
63,
2.
5
m
e
t
e
r
i
s
0.
008
54
2 a
nd
5 m
e
t
e
r
i
s
0
.
0
0
8
58
8
r
e
s
p
e
c
t
i
ve
l
y
.
T
he
r
e
s
u
l
t
s
ha
ve
s
ho
w
n
t
ha
t
t
h
e
pr
opa
g
a
t
i
on
de
l
a
y
on
R
F
f
or
on
e
r
e
l
a
y
i
s
i
n
c
r
e
a
s
e
d b
y
101.
1%
a
n
d f
or
t
w
o r
e
l
a
y
s
i
s
i
nc
r
e
a
s
e
d by
210.
4%
.
T
h
e p
r
o
p
ag
at
i
o
n
d
el
a
y
o
n
R
F
al
l
o
w
s
o
n
e
t
o
d
et
ect
a r
el
a
y
at
t
ack
(
s
)
i
s
b
ei
n
g
m
o
u
n
t
e
d b
y on
e
or
m
or
e
r
e
l
a
y
n
o
d
es
.
R
e
f
er
r
i
n
g
t
o
t
h
e
eq
u
at
i
o
n
(
1
)
,
o
n
e
m
a
y
u
s
e t
h
e
g
i
v
en
eq
u
at
i
o
n
t
o
d
et
ect
t
h
e r
el
a
y
a
t
t
ack
b
et
w
ee
n
a
car
a
nd
ke
y
f
o
b
w
he
r
e
b
y
a
n a
ut
h
e
nt
i
c
a
t
i
o
n ke
y
m
u
s
t
b
e
d
i
s
c
a
r
d
e
d
d
ue
t
o
RRF
>
W
R
F
.
T
he
a
ut
he
nt
i
c
a
t
i
o
n ke
y
(c
ry
p
t
o
g
ra
p
h
i
c
k
e
y
) i
s
u
s
e
d
t
o
l
o
c
k/
unl
o
c
k o
r
s
t
a
r
t
c
a
r
e
ng
i
ne
i
f
t
he
C
K
E
P
s
uc
c
e
s
s
f
ul
l
y
ve
r
i
f
i
e
d
.
I
n ge
ne
r
a
l
,
t
h
e p
r
o
p
ag
at
i
o
n
d
el
a
y
o
n
R
F
i
s
i
n
cr
eas
ed
b
y
1
0
0
%
f
o
r
each
r
el
a
y
n
o
d
e,
e.
g
.
i
f
t
h
r
ee r
el
a
y
s
ar
e p
r
es
en
t
ed
,
t
h
en
t
h
e R
F
p
r
o
p
ag
at
i
o
n
d
el
a
y
co
u
l
d
b
e i
n
cr
eas
ed
b
y
at
l
eas
t
3
00%
.
B
a
s
e
d
o
n t
he
e
xp
e
r
i
m
e
nt
r
e
s
ul
t
s
o
f
t
he
r
e
l
a
y a
t
t
a
c
k a
s
s
ho
w
n
i
n t
he
F
i
g
ur
e
5
,
i
f
a
n a
d
ve
r
s
a
r
y
m
o
u
nt
s
th
e
r
e
la
y
a
tta
c
k
,
th
e
n
it
w
i
ll in
t
r
o
d
u
c
e
th
e
R
F
c
o
m
m
u
n
ic
a
tio
n
d
e
la
y
a
s
th
e
f
o
llo
w
in
g
E
q
ua
t
i
o
n:
RRF
>
W
R
F
(
1)
)
W
he
r
e
b
y:
RRF
is
th
e
to
ta
l ti
m
e
o
f
R
F
c
o
m
m
u
n
ic
a
tio
n
(
i
n
c
l
u
d
in
g
r
e
la
y
e
d
R
F
)
.
W
R
F
is
th
e
ti
m
e
o
f
t
h
e
w
o
r
s
t
-
cas
e
C
K
E
P
R
F
co
m
m
u
n
i
ca
t
i
o
n
d
el
a
y
(
ex
p
ect
ed
d
el
a
y
)
.
I
f
(
RRF
>
W
)
,
t
h
en
t
h
e C
K
E
P
au
t
h
e
n
t
i
ca
t
i
o
n
k
e
y
w
i
l
l
b
e d
i
s
car
d
e
d
an
d
t
h
e car
i
s
s
af
e f
r
o
m
t
h
e
r
el
a
y
at
t
ack
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SSN
:
25
02
-
4752
I
nd
o
ne
s
i
a
n J
E
l
e
c
E
ng
&
C
o
m
p
S
c
i
,
V
o
l.
11
, N
o
.
2
,
A
ug
us
t
2018
:
6
88
–
695
694
F
i
g
ur
e
5
.
T
h
e
c
om
pa
r
i
s
on
of
C
C
A
P
c
o
m
m
un
i
c
a
t
i
on
pr
opa
g
a
t
i
on
de
l
a
y
ov
e
r
R
F
8.
D
I
SC
U
SSI
O
N
T
hi
s
w
o
r
k ha
s
c
o
nd
uc
t
e
d
e
xp
e
r
i
m
e
n
t
s
f
o
r
e
va
l
ua
t
i
n
g t
he
s
e
c
ur
i
t
y o
f
K
E
P
a
ga
i
n
s
t
t
i
m
i
n
g
a
nd
r
e
l
a
y
a
tta
c
k
s
.
R
e
f
e
r
r
in
g
to
th
e
s
e
c
u
r
it
y
a
n
a
l
y
s
is
f
o
r
ti
m
i
n
g
a
tta
c
k
in
S
e
c
tio
n
4
,
th
e
f
ix
e
d
-
t
i
me
o
f
K
E
P
r
u
n
t
i
me
(
s
ecu
r
i
t
y
a
s
s
u
m
p
t
i
o
n
3
)
can
b
e d
ep
l
o
y
ed
t
o
p
r
ev
en
t
an
at
t
a
ck
er
(
s
)
f
r
o
m
g
ai
n
i
n
g
an
ad
v
a
n
t
ag
e t
o
b
r
eak
K
E
P
us
i
n
g t
i
m
i
ng
a
t
t
a
c
k.
A
no
t
he
r
m
e
t
ho
d
t
o
p
r
e
ve
nt
t
he
t
i
m
i
ng a
t
t
a
c
k
u
s
i
ng b
l
i
nd
i
n
g i
n
K
E
P
c
r
y
p
t
o
gr
a
p
hi
c
c
o
m
p
u
ta
tio
n
[4
],
[2
5
]
.
H
o
w
e
v
er
,
t
h
i
s
m
e
t
h
o
d
w
i
l
l
i
n
cr
eas
e
cr
y
p
t
o
g
r
ap
h
i
c co
m
p
u
t
at
i
o
n
r
u
n
t
i
m
e co
m
p
ar
ed
t
o
t
he
f
i
xe
d
K
E
P
r
u
n
ti
m
e
.
B
li
n
d
in
g
w
ill c
r
e
a
te
d
i
f
f
e
r
e
n
t K
E
P
r
u
n
t
i
m
e
f
o
r
t
h
e
s
a
m
e
i
n
p
u
t p
a
r
a
m
e
te
r
s
,
w
h
ic
h
w
il
l
g
iv
e
m
is
le
a
d
i
n
g
ti
m
i
n
g
in
f
o
r
m
a
tio
n
to
t
h
e
a
tta
c
k
e
r
i
n
m
o
u
n
ti
n
g
th
e
ti
m
i
n
g
a
tta
c
k
.
F
u
r
th
e
r
m
o
r
e
,
to
s
e
c
u
r
e
K
E
P
f
r
o
m
t
h
e r
el
a
y
at
t
ac
k
as
af
o
r
e
m
en
t
i
o
n
ed
i
n
S
ect
i
o
n
s
6
a
nd
7,
t
he
r
unt
i
m
e
f
o
r
K
E
P
m
us
t
b
e
c
l
o
s
e
s
t
t
o
t
he
f
i
xe
d
r
u
n
ti
m
e
b
e
c
a
u
s
e
it
w
i
ll
h
e
lp
C
K
E
P
to
d
e
te
c
t R
F
c
o
m
m
u
n
i
c
a
tio
n
d
e
la
y
w
h
e
n
th
e
a
tta
c
k
e
r
(
s
)
is
d
e
p
lo
y
i
n
g
R
F
r
e
la
y
n
o
d
e
(
s
)
b
e
t
w
e
e
n
c
a
r
a
n
d
k
e
y
f
o
b
.
I
f
th
e
r
u
n
ti
m
e
K
E
P
is
n
o
t f
i
x
e
d
,
it is
d
if
f
ic
u
lt to
c
o
m
p
a
r
e t
h
e r
u
n
t
i
m
e
o
f
w
ith
o
u
t r
e
la
y
a
n
d
r
e
la
y
e
d
R
F
c
o
m
m
u
n
ic
a
tio
n
.
R
e
f
e
r
r
in
g
to
th
e
e
x
p
e
r
i
m
e
n
t r
e
s
u
lts
f
o
r
r
e
la
y
a
tta
c
k
u
s
i
n
g
C
K
E
P
,
w
he
n t
he
C
K
E
P
r
unt
i
m
e
i
s
i
nc
r
e
a
s
e
d
b
y
5
0
%
,
t
he
C
K
E
P
a
ut
he
nt
i
c
a
t
i
o
n ke
y
s
ho
ul
d
b
e
d
i
s
c
a
r
d
e
d t
o
p
r
ev
en
t
t
h
e
at
t
ack
er
f
r
o
m
g
ai
n
i
n
g
a
cces
s
t
o
t
h
e car
.
T
h
e ex
p
er
i
m
e
n
t
r
es
u
l
t
s
h
a
v
e al
s
o
s
h
o
w
n
t
h
at
t
h
e
pr
opa
g
a
t
i
on
de
l
a
y
on
R
F
c
om
m
un
i
c
a
t
i
o
n
i
s
i
n
c
r
e
a
s
e
d by
100%
f
or
e
a
c
h
r
e
l
a
y
n
ode
.
T
h
i
s
w
i
l
l
h
e
l
p i
n
d
et
ect
i
n
g
t
h
e
n
u
m
b
er
o
f
r
el
a
y
n
o
d
es
t
h
at
ar
e b
ei
n
g
u
s
ed
d
u
r
i
n
g
t
h
e r
el
a
y
at
t
ack
b
et
w
ee
n
car
a
nd
ke
yf
o
b
.
9.
C
O
N
TR
I
B
U
TIO
N
T
hi
s
p
a
p
e
r
ha
s
i
m
p
r
o
ve
d
K
E
P
s
e
c
ur
i
t
y b
y
s
u
gge
s
t
i
ng a
m
e
t
h
o
d
t
o
d
e
t
e
c
t
a
nd
pr
e
ve
nt
b
o
t
h t
i
m
i
ng a
nd
r
el
a
y
at
t
ack
s
.
T
h
e f
i
x
ed
-
t
i
m
e
o
f
K
E
P
r
unt
i
m
e
c
a
n he
l
p
t
o
p
r
e
ve
nt
t
he
t
i
m
i
ng a
t
t
a
c
k
w
i
t
h a
l
o
w
c
o
m
p
ut
i
ng c
o
s
t
c
om
pa
r
e
d t
o t
h
e
bl
i
n
di
n
g
m
e
t
ho
d
.
F
ur
t
he
r
m
o
r
e
,
t
he
f
i
xe
d
-
t
i
m
e o
f
K
E
P
r
u
n
t
i
m
e (
e.
g
.
C
K
E
P
)
can
b
e u
s
ed
t
o
d
et
ect
an
d
s
ec
u
r
e an
au
t
o
m
o
t
i
v
e s
y
s
t
e
m
f
r
o
m
t
h
e r
el
a
y
at
t
ac
k
.
T
h
i
s
m
et
h
o
d
w
i
l
l
e
n
ab
l
e t
h
e
C
K
E
P
t
o
cal
cu
l
a
t
e
t
h
e
R
F
p
r
o
p
ag
at
i
o
n
d
el
a
y
w
h
i
ch
ei
t
h
er
t
h
er
e i
s
R
F
r
el
a
y
n
o
d
e(
s
)
b
et
w
een
car
a
n
d
k
ey
f
o
b
,
o
r
d
i
r
ect
R
F
co
m
m
u
n
i
cat
i
o
n
b
et
w
ee
n
car
an
d
k
e
y
f
o
b
.
T
h
i
s
w
i
l
l
p
r
ev
en
t
t
h
e
r
el
a
y
at
t
ack
t
h
at
w
as
s
u
c
ces
s
f
u
l
l
y
t
e
s
t
ed
b
y
E
T
H
Z
u
r
i
ch
r
es
ear
ch
l
ab
[
16]
.
10.
CO
NCL
U
S
I
O
N
T
h
i
s
p
ap
er
h
as
r
ev
i
s
i
t
ed
t
h
e s
t
at
e o
f
ar
t
o
f
K
E
P
w
h
i
c
h
p
r
es
e
n
t
ed
i
n
S
ect
i
o
n
s
2
an
d
3
.
B
as
ed
o
n
t
h
e
r
e
vi
e
w
,
t
hi
s
w
o
r
k f
o
und
no
ne
o
f
t
he
p
r
e
c
e
d
e
nt
w
o
r
k
ha
s
t
e
s
t
e
d
t
he
K
E
P
s
e
c
ur
i
t
y a
ga
i
n
s
t
t
he
r
e
l
a
y a
t
t
a
c
k b
y
ex
p
er
i
m
e
n
t
al
t
e
s
t
b
ed
.
T
h
i
s
w
o
r
k
h
a
s
p
r
es
en
t
ed
t
h
e
m
et
h
o
d
t
o
d
et
ect
an
d
p
r
e
ve
nt
b
o
t
h t
i
m
i
ng a
nd
r
e
l
a
y a
t
t
a
c
ks
i
n K
E
P
.
T
he
f
i
xe
d
-
t
i
m
e o
f
K
E
P
r
u
n
t
i
m
e ca
n
b
e u
s
ed
t
o
d
et
ect
b
o
t
h
at
t
ack
s
.
F
o
r
t
h
e
f
u
t
u
r
e
w
o
r
k
,
t
h
e au
t
h
o
r
s
w
il
l e
x
p
lo
r
e
o
th
e
r
s
id
e
-
c
ha
nne
l
a
t
t
a
c
ks
o
n K
E
P
s
uc
h a
s
p
o
w
e
r
a
na
l
y
s
i
s
a
t
t
a
c
k.
ACK
NO
W
L
E
D
G
E
M
E
NT
S
T
he
a
ut
ho
r
s
w
o
ul
d
l
i
ke
t
o
a
c
kno
w
l
e
d
ge
t
he
M
i
ni
s
t
r
y
o
f
E
d
uc
a
t
i
o
n (
M
O
E
)
M
a
l
a
ys
i
a
f
o
r
p
r
o
vi
d
i
ng
t
he
gr
a
nt
6
0
0
-
R
M
I
/N
R
G
S
5
/3
(
5
/2
0
1
3
)
,
a
n
d
U
n
iv
e
r
s
iti
T
e
k
n
o
lo
g
i M
A
R
A
(
U
iT
M
)
f
o
r
s
u
p
p
o
r
tin
g
th
is
r
es
ear
ch
w
o
r
k
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
nd
o
ne
s
i
a
n J
E
l
e
c
E
ng
&
C
o
m
p
S
c
i
I
SSN
:
2502
-
4752
Si
de
-
C
hann
e
l
Se
c
ur
i
t
y
on K
e
y
E
x
c
hange
P
r
ot
oc
ol
:
T
i
m
i
ng
a
nd
R
el
ay
…
(
M
ohd A
nuar
M
at
I
s
a
)
695
R
EF
ER
EN
C
ES
[
1]
M
oh
d A
nua
r
M
a
t
I
s
a
,
H
a
s
hi
m
,
H
.
,
A
dna
n,
S
.
F
.
S
.
,
M
a
r
b
uk
ha
r
i
,
N
.
a
nd M
oha
m
e
d,
N
.
N
.
,
"
A
n a
ut
om
obi
l
e
s
e
c
ur
i
t
y
pr
ot
oc
ol
:
S
i
de
-
c
h
a
n
n
e
l s
e
c
u
r
ity
a
g
a
in
s
t tim
in
g
a
n
d
r
e
la
y
a
tta
c
k
s
"
,
I
nt
e
r
nat
i
o
nal
J
o
ur
n
al
of
E
l
e
c
t
r
o
n
i
c
Se
c
ur
i
t
y
an
d
D
ig
ita
l
Fo
r
e
n
s
ic
s
,
v
o
l
.
9,
no.
3,
pp
.
23
9
–
25
3,
20
17
.
[
2]
D
i
f
f
i
e
,
W
.
a
nd H
e
l
l
m
a
n,
M
.
E
.
,
"
N
e
w
D
i
r
e
c
t
i
ons
i
n C
r
y
pt
og
r
a
phy
"
,
i
n
I
E
E
E
T
r
ans
ac
t
i
o
ns
on I
nf
or
m
at
i
o
n T
he
or
y
,
197
6,
pp
.
6
44
–
65
4.
[
3]
A
r
a
z
i
,
B
.
,
"
I
nt
e
g
r
a
t
i
ng
a
k
e
y
di
s
t
r
i
but
i
on
pr
oc
e
d
ur
e
i
nt
o t
he
di
g
i
t
a
l
s
i
g
na
t
ur
e
s
t
a
nda
r
d"
,
i
n
E
l
ect
r
o
n
ic
s
L
e
tte
r
s
,
1
9
93,
v
ol
.
2
9,
no.
1
1,
p.
96
6.
[
4]
K
o
c
h
e
r
,
P
.
,
"
T
im
in
g
a
tta
c
k
s
o
n
i
m
p
le
m
e
n
ta
tio
n
s
o
f
D
if
f
ie
-
H
el
l
m
a
n
,
R
S
A
,
D
S
S
,
an
d
o
t
h
er
s
y
s
t
e
m
s
"
,
i
n
A
dv
anc
e
s
i
n
C
r
y
pt
ol
o
gy
—
CR
Y
P
T
O
’9
6
,
19
96.
[
5]
R
a
y
m
o
n
d
,
J
.
a
n
d
S
t
ig
lic
,
A
.
,
"
S
e
c
u
r
ity
is
s
u
e
s
in
th
e
D
if
f
ie
-
H
el
l
m
an
k
e
y
ag
r
ee
m
en
t
p
r
o
t
o
co
l
"
,
i
n
M
c
G
ill U
n
iv
e
r
s
ity
T
e
c
hni
c
al
M
a
nus
c
r
i
p
t
,
20
02.
[
6]
H
a
r
n
, L
., M
e
h
t
a
, M
. a
n
d
H
s
i
n
,
W
.
-
J
.
,
"
I
n
te
g
r
a
tin
g
D
i
f
f
ie
-
H
e
ll
m
a
n
K
e
y
Ex
c
h
a
n
g
e
in
to
th
e
D
ig
ita
l S
ig
n
a
tu
r
e
Al
g
o
r
i
t
h
m
(
D
S
A)
"
,
I
E
E
E
C
om
m
u
ni
c
at
i
ons
L
e
t
t
e
r
s
,
v
ol
.
8,
no.
3,
p
p
.
19
8
–
20
0,
20
04
.
[
7]
P
h
a
n
,
R
.
C
.
,
"
F
ix
in
g
th
e
I
n
te
g
r
a
te
d
D
if
f
ie
-
H
el
l
m
an
-
D
S
A
K
e
y
E
x
c
ha
ng
e
P
r
ot
oc
ol
"
,
I
E
E
E
C
o
mmu
n
i
c
a
t
i
o
n
s L
e
t
t
e
rs
,
v
ol
.
9,
n
o.
6,
pp.
5
70
–
5
72,
2
00
5.
[
8]
Y
o
o
n
, E
.
J
. a
n
d
Y
o
o
,
K
. Y
.
,
"
An
e
ffic
ie
n
t D
if
fie
-
He
l
l
ma
n
-
M
A
C
k
ey exch
a
n
g
e s
ch
em
e"
,
in
20
09
4t
h
I
n
te
r
n
a
tio
n
a
l
C
onf
e
r
e
nc
e
on I
n
nov
a
t
i
v
e
C
om
put
i
ng
,
I
nf
or
m
a
t
i
on a
n
d C
o
nt
r
o
l
,
I
C
I
C
I
C
20
09
,
20
09
,
pp.
3
98
–
4
00.
[
9]
J
e
o
n
g
, I
. R
., K
w
o
n
, J
.
O
. a
n
d
L
e
e
, D
. H
., "
S
t
r
o
n
g
D
i
f
f
i
e
-
H
el
l
m
an
-
D
S
A
ke
y e
xc
h
a
n
ge
"
,
I
E
E
E
C
om
m
uni
c
at
i
o
n
s
L
et
t
er
s
,
vo
l
.
11
,
n
o.
5,
pp
.
4
32
–
43
3,
2
00
7.
[
1
0]
V
i
e
t
, H
.
V
a
n
, M
i
n
h
, N
. H
., T
r
u
y
e
n
, B
. T
. a
n
d
N
g
a
, N
. T
.,
"I
m
pr
ov
i
ng o
n t
he
I
nt
e
gr
at
e
d D
i
f
f
i
e
-
He
l
l
ma
n
-
G
O
S
T
.
R
94
K
ey A
g
r
eem
en
t
P
r
o
t
o
co
l
s
"
,
in
T
hi
r
d W
or
l
d C
o
ng
r
e
s
s
on I
nf
or
m
a
t
i
on a
nd C
om
m
uni
c
a
t
i
on T
e
c
hno
l
og
i
e
s
(
W
I
C
T
)
,
201
3,
pp
.
1
05
–
10
9.
[
1
1]
C
an
et
t
i
,
R
.
a
n
d
Kr
a
w
c
z
y
k
,
H.
,
"
An
a
l
y
si
s o
f
K
e
y
-
E
xc
ha
ng
e
P
r
o
t
oc
o
l
s
a
nd T
he
i
r
U
s
e
f
or
B
ui
l
d
i
ng
S
e
c
ur
e
C
ha
n
ne
l
s
"
,
in
A
dv
anc
e
s
i
n
C
r
y
pt
ol
ogy
—
E
U
R
O
C
R
Y
P
T
2
0
0
1
,
2
00
1,
pp.
4
53
–
4
74.
[
1
2]
M
e
n
e
z
e
s
, A
. J
., O
o
r
s
c
h
o
t
,
P
. C
.
V
a
n
a
n
d
V
a
n
s
t
o
n
e
, S
. A
.,
H
a
nd
b
ook
of
A
pp
l
i
e
d C
r
y
p
t
o
gr
ap
hy
,
5
t
h
e
d
.
CRC
P
re
s
s
,
199
6.
[
1
3]
M
a
nda
l
,
S
.
a
nd
M
o
ha
nt
y
,
S
.
,
"
M
u
lti
-
p
a
r
t
y key
-
exch
a
n
g
e
w
i
t
h
p
er
f
ect
f
o
r
w
a
r
d
s
ecr
ecy"
,
in
20
14
1
3
t
h I
nt
e
r
na
t
i
ona
l
C
onf
e
r
e
nc
e
on I
nf
or
m
a
t
i
on T
e
c
hnol
og
y
,
I
C
I
T
2014
,
2
01
5,
no.
M
a
y
,
pp.
3
62
–
3
67.
[
1
4]
G
o
l
a
, K
. K
., R
a
t
h
o
r
e
, R
.
,
S
h
ar
m
a,
V
.
an
d
K
an
d
p
al
,
M
.
,
"
S
ecu
r
e
K
ey E
xch
a
n
g
e
i
n
D
i
f
f
i
e H
el
l
m
a
n
K
ey E
xch
a
n
g
e
A
l
gor
i
t
hm
"
,
i
n
I
n
t
er
n
at
i
o
n
al
C
o
n
f
er
en
ce o
f
A
d
v
an
ce R
es
ear
ch
an
d
I
n
n
o
v
at
i
o
n
(
I
C
A
R
I
-
20
15)
,
2
01
5,
pp.
47
3
–
47
5.
[
1
5]
F
a
t
hi
r
a
d,
I
.
,
D
e
v
l
i
n,
J
.
a
nd A
t
s
ha
ni
,
S
.
,
"
N
e
t
w
or
k
-
S
p
eci
f
i
c A
tta
c
k
s
o
n
D
i
f
f
ie
-
H
el
l
m
an
K
e
y
-
E
xc
h
a
n
ge
i
n
C
o
m
m
er
ci
al
P
r
o
t
o
co
l
s
"
,
I
nt
e
r
nat
i
ona
l
J
o
ur
na
l
of
C
om
put
e
r
T
he
or
y
an
d E
ngi
ne
e
r
i
ng
,
v
ol
.
8,
no
.
2
,
p
.
12
9,
20
16.
[
1
6]
F
r
a
nc
i
l
l
o
n,
A
.
,
D
a
ne
v
,
B
.
a
n
d C
a
pk
un,
S
.
,
"
R
e
l
a
y
A
t
t
a
c
k
s
on
P
a
s
s
i
v
e
K
e
y
l
e
s
s
E
nt
r
y
a
nd S
t
a
r
t
S
y
s
t
e
m
s
i
n
M
od
e
r
n
Ca
rs
"
,
N
e
t
w
or
k
and D
i
s
t
r
i
but
e
d S
y
s
t
e
m
Se
c
ur
i
t
y
Sy
m
pos
i
um
,
pp
.
4
31
–
43
9,
20
11
.
[
1
7]
A
r
i
va
z
ha
ga
n,
A
.
,
"
R
T
L
M
ode
l
l
i
n
g
f
or
t
he
C
i
phe
r
B
l
oc
k
C
ha
i
n
i
ng
M
o
de
(
C
B
C
)
f
or
D
a
t
a
S
e
c
ur
i
t
y
"
,
I
ndone
s
i
an
J
our
n
al
o
f
E
l
e
c
t
r
i
c
al
E
n
gi
ne
e
r
i
n
g
an
d C
om
put
e
r
Sc
i
e
nc
e
,
vo
l
. 8
, n
o
.
3
, p
p
.
7
0
9
–
71
1,
20
17
.
[
1
8]
C
hoi
,
Y
.
,
"
C
r
y
pt
a
na
l
y
s
i
s
on P
r
i
v
a
c
y
-
A
w
ar
e T
w
o
-
F
a
c
t
or
A
ut
he
nt
i
c
a
t
i
on
P
r
ot
oc
ol
f
or
W
i
r
e
l
e
s
s
S
e
n
s
or
N
e
t
w
or
k
s
"
,
I
nd
one
s
i
a
n J
o
ur
na
l
o
f
E
l
e
c
t
r
i
c
al
E
ngi
ne
e
r
i
ng
an
d C
om
p
ut
e
r
Sc
i
e
n
c
e
,
v
ol
.
8,
n
o.
2,
pp.
2
96
–
3
01,
2
0
17.
[
1
9]
Awa
d
a
l
l
a
,
M
.
,
A
l
M
a
a
s
hr
i
,
A
.
,
P
a
t
hur
i
,
L
.
a
nd
A
hm
a
d,
A
.
,
"
C
us
t
o
m
i
z
e
d ha
r
dw
a
r
e
c
r
y
pt
o e
ng
i
ne
f
or
w
i
r
e
l
e
s
s
s
e
ns
or
ne
t
w
or
k
s
"
,
I
ndo
ne
s
i
a
n J
o
ur
na
l
of
E
l
e
c
t
r
i
c
al
E
n
gi
ne
e
r
i
ng
an
d C
om
put
e
r
Sc
i
e
nc
e
,
v
o
l
.
7,
no.
1,
p
p.
2
63
–
27
5,
20
17
.
[
2
0]
Cra
m
e
r,
R.
a
n
d
S
h
o
u
p
,
V
.
,
"
A
P
ra
c
tic
a
l P
u
b
lic
K
e
y
C
r
y
p
to
s
y
s
te
m
P
r
o
v
a
b
ly
S
e
c
u
r
e
A
g
a
in
s
t
A
d
a
p
tiv
e
C
h
o
s
e
n
C
ip
h
e
r
te
x
t A
tta
c
k
"
,
in
L
e
c
t
ur
e
N
o
t
e
s
i
n C
om
put
e
r
Sc
i
e
nc
e
:
A
dv
a
nc
e
s
i
n C
r
y
pt
ol
ogy
—
C
R
Y
P
T
O
’
9
8
,
19
9
8,
pp
.
1
–
1
8.
[
2
1]
M
oh
d A
nua
r
M
a
t
I
s
a
,
H
a
s
hi
m
,
H
.
,
M
a
na
n
,
J
.
A
.
,
A
dna
n,
S
.
F
.
S
.
a
nd M
a
hm
od
,
R
.
,
"
A
S
er
i
es
o
f
S
ecr
et
K
e
y
s
i
n
a
K
e
y
D
is
tr
ib
u
tio
n
P
r
o
to
c
o
l"
,
in
T
r
ans
ac
t
i
ons
o
n E
n
gi
ne
e
r
i
n
g T
e
c
hno
l
o
gi
e
s
:
W
or
l
d C
on
gr
e
s
s
on E
ngi
ne
e
r
i
ng a
n
d
C
om
put
e
r
Sc
i
e
nc
e
20
14
,
20
15
,
p
p.
1
93
–
20
7.
[
2
2]
M
oh
d A
nua
r
M
a
t
I
s
a
,
H
a
bi
ba
h
H
a
s
hi
m
,
J
a
m
a
l
ul
-
l
ai
l
A
b
M
an
an
,
S
y
ed
F
a
r
i
d S
y
e
d
A
dna
n a
nd R
a
m
l
a
n M
a
h
m
od,
"
A
n E
x
pe
r
i
m
e
nt
a
l
S
t
udy
o
f
C
r
y
pt
og
r
a
ph
y
C
a
pa
bi
l
i
t
y
us
i
ng
C
ha
i
ne
d K
e
y
E
x
c
ha
ng
e
S
c
he
m
e
f
or
E
m
be
dde
d
D
ev
i
ce
s
"
,
i
n
L
e
c
t
ur
e
N
ot
e
s
i
n
E
n
g
i
ne
e
r
i
ng
an
d C
om
put
e
r
Sc
i
e
nc
e
,
2
014
,
v
ol
.
1,
p
p.
51
0
–
51
5.
[
2
3]
M
ar
k
an
t
o
n
ak
i
s
,
K
.
an
d
M
ay
es
,
K
.,
Se
c
ur
e
s
m
ar
t
e
m
be
dde
d
de
v
i
c
e
s
,
pl
at
f
or
m
s
a
nd
ap
pl
i
c
a
t
i
o
ns
.
S
pr
i
ng
e
r
-
V
er
l
ag
N
e
w
Y
or
k
,
201
4.
[
2
4]
G
o
e
l
, U
., W
i
t
t
i
e
, M
.
P
., C
l
a
f
f
y
,
K
. C
. a
n
d
L
e
, A
., "
S
u
r
v
e
y
o
f
e
n
d
-
to
-
en
d
m
o
b
i
l
e n
et
w
o
r
k
m
eas
u
r
e
m
en
t
t
es
t
b
ed
s
,
t
o
o
l
s
,
an
d
s
er
v
i
ces
"
,
I
E
E
E
C
om
m
uni
c
a
t
i
o
ns
S
ur
v
e
y
s
and T
ut
or
i
a
l
s
,
vo
l
.
18
,
n
o.
1.
pp
.
1
05
–
12
3,
20
16
.
[
2
5]
G
ar
r
et
t
,
D
.
an
d
W
ar
d
,
M
.
,
"
B
li
n
d
e
d
D
if
fie
-
H
e
l
l
m
an:
P
r
e
v
e
nt
i
n
g E
av
e
s
dr
o
ppe
r
s
f
r
om
T
r
ac
k
i
ng
P
ay
m
e
nt
s
",
in
I
n
t
er
n
at
i
o
n
al
C
o
n
f
er
en
ce o
n
R
es
ear
ch
i
n
S
ecu
r
i
t
y
S
t
an
d
ar
d
i
s
at
i
o
n
,
201
4,
pp
.
7
9
–
9
2.
Evaluation Warning : The document was created with Spire.PDF for Python.