I
nd
o
ne
s
ia
n J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
p
u
t
er
Science
Vo
l.
10
,
No
.
3
,
J
u
n
e
201
8
,
1
2
4
4
~
1
2
5
0
I
SS
N:
2502
-
4752
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ee
cs
.
v
1
0
.
i3
.
p
p
1
2
4
4
-
1
2
5
0
1244
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
co
r
e.
co
m/jo
u
r
n
a
ls
/in
d
ex
.
p
h
p
/
ijeec
s
Security o
f
a
New
Crypto
g
ra
phic
H
a
sh Funct
io
n
-
Ti
t
a
niu
m
Abdu
l
la
h Na
ze
eh
Sa
leh
1
,
M
o
ha
mm
a
d A.
Al
-
Ah
m
a
d
2
1
,2
Co
m
p
u
ter S
c
ien
c
e
De
p
a
rtm
e
n
t
,
Co
ll
e
g
e
o
f
Ba
sic
Ed
u
c
a
ti
o
n
.
P
u
b
l
ic A
u
th
o
rit
y
f
o
r
A
p
p
li
e
d
E
d
u
c
a
ti
o
n
a
n
d
T
ra
in
in
g
,
Ku
w
a
it
Cit
y
,
Ku
w
a
it
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Dec
1
9
,
2
0
1
7
R
ev
i
s
ed
J
an
2
0
,
2
0
1
8
A
cc
ep
ted
Mar
11
,
2
0
1
8
T
h
is
p
a
p
e
r
in
tro
d
u
c
e
s
th
e
se
c
u
rit
y
a
n
a
l
y
sis
o
f
T
it
a
n
iu
m
h
a
sh
f
u
n
c
ti
o
n
th
a
t
u
se
s
S
F
b
lo
c
k
c
ip
h
e
r
a
n
d
f
o
ll
o
w
s
sp
o
n
g
e
c
o
n
stru
c
ti
o
n
.
A
b
rief
d
e
sc
rip
ti
o
n
o
f
th
e
sp
o
n
g
e
f
u
n
c
ti
o
n
a
n
d
t
h
e
d
e
si
g
n
c
h
o
ice
o
f
T
it
a
n
iu
m
a
re
in
tro
d
u
c
e
d
.
Ba
sic
se
c
u
rit
y
c
rit
e
ria
o
f
r
a
n
d
o
m
f
u
n
c
ti
o
n
h
a
v
e
b
e
e
n
p
re
se
n
ted
a
n
d
s
tu
d
ie
d
o
n
T
it
a
n
iu
m
a
n
d
th
e
n
,
d
if
f
e
re
n
ti
a
l
c
r
y
p
tan
a
l
y
sis
o
n
T
it
a
n
iu
m
h
a
s
b
e
e
n
p
e
rf
o
r
m
e
d
a
n
d
sh
o
w
e
d
th
e
re
sis
tan
c
e
o
f
it
o
n
t
h
e
m
o
st
re
c
e
n
t
d
if
fe
re
n
ti
a
l
a
tt
a
c
k
s.
A
tab
le
o
f
se
c
u
rit
y
d
isc
u
ss
io
n
s
f
in
a
li
z
e
s
th
e
p
a
p
e
r
a
n
d
d
e
sc
rib
e
s
th
e
c
o
m
p
lex
it
y
o
f
T
it
a
n
iu
m
o
n
b
ru
te f
o
rc
e
c
r
y
p
tan
a
ly
sis.
K
ey
w
o
r
d
s
:
C
r
y
p
tan
a
l
y
s
is
C
r
y
p
to
g
r
ap
h
y
Hash
f
u
n
c
tio
n
P
r
eim
a
g
e
Sp
o
n
g
e
Co
p
y
rig
h
t
©
2
0
1
8
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
C
o
m
p
u
ter
Scien
ce
Dep
ar
t
m
en
t.
C
o
lleg
e
o
f
B
asic E
d
u
ca
tio
n
.
P
u
b
lic
Au
t
h
o
r
it
y
f
o
r
A
p
p
lied
E
d
u
ca
tio
n
an
d
T
r
ain
in
g
.
Ku
w
ait
C
it
y
,
Ku
w
a
it State
E
-
m
a
il:
m
alah
m
ad
s
@
y
ah
o
o
.
c
o
m
1.
I
NT
RO
D
UCT
I
O
N
Hash
f
u
n
ctio
n
s
ar
e
o
n
e
-
w
a
y
f
u
n
ct
io
n
s
u
s
ed
f
o
r
m
ap
p
in
g
v
ar
iab
le
in
p
u
t
s
ize
an
d
p
r
o
d
u
ce
f
i
x
ed
len
g
th
o
u
tp
u
t
d
i
g
est.
I
t
i
s
a
p
o
w
er
f
u
l
alg
o
r
it
h
m
to
v
er
if
y
d
ata
i
n
te
g
r
it
y
o
v
er
p
ee
r
s
.
T
h
er
e
ar
e
m
an
y
h
a
s
h
f
u
n
ctio
n
s
,
s
u
c
h
as
MD
5
[
1
]
,
SHA
1
[
2
]
an
d
Do
u
b
le
-
A
[
3
]
.
M
an
y
h
as
h
f
u
n
ctio
n
s
ac
ted
as
a
r
an
d
o
m
o
r
a
cle
f
o
r
a
tim
e
b
ein
g
.
Ho
w
e
v
er
,
t
h
e
r
e
v
o
lu
tio
n
o
f
c
o
m
p
u
ter
p
r
o
ce
s
s
o
r
s
en
h
a
n
ce
d
th
e
attac
k
s
o
n
s
u
ch
al
g
o
r
ith
m
s
.
T
h
e
co
n
ce
r
n
s
o
f
h
as
h
f
u
n
ctio
n
s
ec
u
r
it
y
ar
e
its
r
esis
tan
ce
to
t
h
e
b
asic
s
ec
u
r
i
t
y
cr
iter
ia;
p
r
ei
m
a
g
e,
s
ec
o
n
d
p
r
eim
a
g
e,
co
llis
io
n
an
d
len
g
th
e
x
te
n
s
io
n
s
.
A
ttac
k
er
s
tr
y
to
cr
ea
te
a
s
ce
n
ar
io
to
b
r
ea
k
o
n
e
o
f
t
h
e
s
ec
u
r
it
y
cr
iter
ia
b
y
co
m
p
r
o
m
i
s
in
g
an
d
t
h
e
an
al
y
z
in
g
h
as
h
s
tate
s
.
T
h
u
s
,
d
esig
n
er
s
’
g
o
al
i
s
b
u
i
ld
in
g
h
i
g
h
co
n
f
u
s
in
g
a
n
d
d
ef
u
s
in
g
to
cr
ea
te
w
h
at
s
o
ca
l
led
r
an
d
o
m
o
r
ac
le.
T
h
e
b
asic
s
ec
u
r
it
y
cr
iter
ia
o
f
h
as
h
es
is
i
ts
r
esi
s
tan
ce
to
p
r
ei
m
a
g
e,
s
ec
o
n
d
-
p
r
ei
m
a
g
e,
co
llis
io
n
a
n
d
r
ec
en
tl
y
le
n
g
t
h
ex
te
n
s
io
n
s
.
T
itan
iu
m
i
s
a
n
e
w
co
n
s
tr
u
cte
d
s
p
o
n
g
e
h
a
s
h
f
u
n
ctio
n
t
h
at
u
s
e
s
5
1
2
b
it
SF
b
lo
ck
cip
h
er
[
4
]
.
SF
is
a
b
lo
ck
cip
h
er
t
h
at
ta
k
e
s
5
1
2
p
lain
te
x
t
i
n
p
u
t,
5
1
2
b
it
k
e
y
an
d
ap
p
lies
f
o
u
r
o
p
er
atio
n
s
o
n
t
h
e
in
p
u
t
to
p
r
o
d
u
ce
5
1
2
b
it
o
u
tp
u
t c
ip
h
er
te
x
t.
T
itan
iu
m
tak
e
s
v
ar
iab
le
le
n
g
t
h
i
n
p
u
t a
n
d
p
r
o
d
u
ce
s
f
ix
ed
o
u
tp
u
t d
i
g
est 5
1
2
b
it
.
2.
RE
S
E
ARCH
M
E
T
H
O
D
O
L
O
G
Y
2
.
1
Sp
o
ng
e
F
un
ct
io
n O
v
er
v
iew
Sp
o
n
g
e
is
o
n
e
o
f
t
h
e
h
a
s
h
f
u
n
ctio
n
co
n
s
tr
u
ct
io
n
.
T
h
er
e
ar
e
s
o
m
e
co
n
s
tr
u
ctio
n
s
u
s
ed
f
o
r
b
u
ild
in
g
h
as
h
f
u
n
ctio
n
alg
o
r
it
h
e
m
s
u
c
h
as,
Me
r
k
le
–
Da
m
g
år
d
co
n
s
tr
u
ctio
n
.
I
t
h
as
i
s
s
u
es
w
it
h
th
e
d
ig
est
le
n
g
th
a
s
it
s
s
ec
u
r
it
y
i
s
d
ep
en
d
i
n
g
o
n
t
h
at
len
g
th
.
Sp
o
n
g
e
co
n
s
tr
u
ct
io
n
h
as
b
ee
n
in
tr
o
d
u
ce
d
b
y
Kec
ca
k
tea
m
[
5
-
6
]
.
I
t
a
i
m
s
to
s
p
lit
th
e
s
ec
u
r
it
y
le
v
el
o
f
t
h
e
alg
o
r
ith
m
f
r
o
m
t
h
e
d
ig
e
s
t
le
n
g
t
h
.
Sp
o
n
g
e
co
n
s
tr
u
ctio
n
h
as
th
r
ee
m
ai
n
p
h
ase
s
;
A
b
s
o
r
b
in
g
p
h
ase,
Sq
u
ee
zi
n
g
p
h
ase
a
n
d
th
e
tr
u
n
ca
tio
n
p
h
ase.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
S
ec
u
r
ity
o
f a
N
ew C
r
yp
to
g
r
a
p
h
ic
Ha
s
h
F
u
n
ctio
n
–
Tit
a
n
i
u
m
…
(
A
b
d
u
lla
h
N
a
z
ee
h
S
a
leh
)
1245
2
.
2
I
nn
er
Sta
t
e
Me
s
s
a
g
e
i
n
p
u
t
g
o
es
t
h
r
o
u
g
h
s
ev
er
al
iter
ated
o
p
er
atio
n
s
i
n
s
i
d
e
th
e
b
le
n
d
er
.
E
ac
h
o
p
er
atio
n
p
r
o
d
u
ce
s
d
if
f
er
e
n
t
o
u
tp
u
t
f
o
r
m
i
n
g
i
n
S
-
b
o
x
.
E
ac
h
S
-
b
o
x
is
a
s
ta
te
wh
ich
co
n
tai
n
s
t
h
e
b
in
ar
y
p
atte
r
n
o
f
t
h
e
alg
o
r
it
h
m
r
esu
lt.
T
h
e
s
tates
in
t
h
e
m
id
d
le
o
f
th
e
b
len
d
er
o
p
er
atio
n
s
ca
lled
in
n
er
s
ta
te
s
.
I
t
is
th
e
in
t
er
m
ed
iate
ch
ai
n
in
g
v
alu
e
s
t
h
at
is
f
o
r
m
ed
f
r
o
m
t
h
e
last
o
p
er
atio
n
p
er
f
o
r
m
ed
o
n
th
e
p
atter
n
.
(
1
)
L
e
n
g
t
h
p
ad
d
in
g
r
u
le
h
as
b
ee
n
i
m
p
le
m
en
ted
o
n
T
itan
i
u
m
.
A
d
d
in
g
p
r
ef
i
x
es
o
r
s
u
f
f
i
x
es
to
t
h
e
m
e
s
s
a
g
e
w
il
l
n
o
t
cr
ea
te
co
llis
io
n
s
w
it
h
len
g
th
p
ad
d
in
g
.
Ass
u
m
i
n
g
m
e
s
s
a
g
e
le
n
g
t
h
f
o
r
t
w
o
m
es
s
a
g
es
ar
e
s
a
m
e,
t
h
en
th
e
b
in
ar
y
p
atter
n
w
ill
b
e
d
i
f
f
er
en
t.
A
d
d
in
g
b
its
to
th
e
in
p
u
t
w
il
l
a
f
f
ec
t
th
e
m
e
s
s
a
g
e
b
i
n
ar
y
an
d
p
ad
d
in
g
b
its
.
T
h
en
,
d
if
f
er
e
n
t in
p
u
t.
Fig
u
r
e
1
.
Sp
o
n
g
e
co
n
s
tr
u
ctio
n
2
.
4
Abs
o
rbing
P
ha
s
e
r
-
b
it
m
e
s
s
a
g
e
b
lo
ck
s
ar
e
in
s
er
t
ed
to
th
e
b
len
d
er
b
y
XO
R
i
n
g
i
t
w
it
h
t
h
e
f
ir
s
t r
-
b
it
s
o
f
t
h
e
s
tate[
Fi
g
u
r
e
1
]
.
2
.
5
Ciph
er
F
c
ip
h
er
[
1
]
i
s
p
r
o
c
es
s
i
n
g
o
v
e
r
f
o
u
r
o
p
er
a
ti
o
n
s
;
s
u
b
-
b
y
t
e,
C
o
n
v
er
t
r
o
w
,
s
h
i
f
t
i
n
g
a
n
d
ad
d
r
o
u
n
d
k
e
y
.
Sub
-
B
y
t
e.
Data
ele
m
e
n
ts
is
s
u
b
-
b
y
ted
o
v
er
5
7
6
b
it
S
-
b
o
x
es.
Su
b
b
y
te
o
p
er
atio
n
p
r
o
p
e
r
ties
r
em
o
v
e
th
e
lin
ea
r
ch
ar
ac
ter
is
tic
s
.
T
h
er
ef
o
r
e,
lin
e
ar
cr
y
p
ta
n
al
y
s
i
s
is
n
o
t
ap
p
lica
b
le
o
n
T
itan
iu
m
S
-
b
o
x
e
s
.
Mo
r
eo
v
er
,
it
in
cr
ea
s
e
s
th
e
d
if
f
u
s
io
n
an
d
co
n
f
u
s
io
n
s
o
,
s
tu
d
y
in
g
t
h
e
li
n
ea
r
it
y
ef
f
ec
ti
v
en
e
s
s
o
f
d
if
f
er
en
tials
i
s
o
u
t
o
f
co
m
p
le
x
it
y
s
co
p
e
an
d
d
o
es n
o
t
cr
ea
te
an
ad
v
an
ta
g
e
to
th
e
attac
k
er
.
Co
nv
er
t
Ro
w
Ro
un
d.
I
n
t
h
is
s
ta
g
e,
T
itan
i
u
m
d
ata
e
le
m
e
n
t
i
s
b
le
n
d
ed
w
it
h
ea
c
h
o
th
er
’
s
,
p
r
ep
ar
in
g
it
to
th
e
n
ex
t
s
ta
g
e.
Af
ter
s
u
b
-
b
y
te
r
o
u
n
d
,
co
n
v
er
t
r
o
w
r
o
u
n
d
b
len
d
s
th
e
b
its
,
in
cr
ea
s
i
n
g
d
if
f
u
s
io
n
an
d
co
n
f
u
s
io
n
s
u
ch
th
at
k
e
ep
i
n
g
t
h
e
p
r
o
p
er
ties
o
f
s
m
all
d
if
f
er
en
ce
s
in
in
p
u
t is o
b
s
c
u
r
e.
2
.
6
Cry
pta
na
ly
s
is
P
re
i
m
a
g
e.
Hash
f
u
n
ct
io
n
s
s
h
o
u
ld
b
e
o
n
e
-
w
a
y
p
r
o
p
er
ty
s
u
ch
th
at
k
n
o
w
in
g
th
e
o
r
ig
in
al
m
es
s
a
g
e
f
r
o
m
th
e
d
ig
e
s
t
is
n
o
t
p
o
s
s
ib
le
w
it
h
co
m
p
lex
i
t
y
lo
w
er
t
h
an
2
c
.
T
h
er
e
ar
e
m
an
y
w
a
y
s
to
b
r
ea
k
t
h
i
s
p
r
o
p
er
ty
s
u
ch
a
s
g
i
v
in
g
p
r
ef
ix
es
to
th
e
m
e
s
s
a
g
e
o
r
g
o
in
g
b
ac
k
w
ar
d
s
t
h
r
o
u
g
h
i
n
ter
m
ed
iate
c
h
ain
in
g
v
alu
e
s
r
ea
c
h
in
g
to
t
h
e
m
o
th
er
s
tate
th
e
n
th
e
o
r
ig
i
n
al
m
e
s
s
a
g
e
o
r
ev
en
w
it
h
b
r
u
te
f
o
r
ce
attac
k
.
P
r
eim
a
g
e
is
to
o
b
tain
th
e
o
r
ig
in
a
l
s
tate
f
r
o
m
a
gi
v
e
n
d
ig
e
s
t[
Fi
g
u
r
e
2
]
.
T
itan
iu
m
s
p
o
n
g
e
h
a
s
h
f
u
n
ctio
n
h
a
s
1
0
2
4
-
b
it
ca
p
ac
it
y
a
n
d
b
itra
te
o
f
5
7
6
b
it.
Sin
ce
th
e
ca
p
a
cit
y
i
s
th
e
s
ec
u
r
it
y
p
ar
a
m
eter
f
o
r
s
p
o
n
g
e
co
n
s
tr
u
ctio
n
an
d
its
s
ec
u
r
it
y
is
s
p
lit
f
r
o
m
t
h
e
d
ig
e
s
t
len
g
t
h
[
5
]
,
th
e
m
in
i
m
u
m
co
m
p
le
x
it
y
f
o
r
T
itan
iu
m
a
g
ai
n
s
t p
r
ei
m
ag
e
at
tack
i
s
2
2c
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l.
10
,
No
.
3
,
J
u
n
e
2
0
1
8
:
1
2
4
4
–
1
2
5
0
1246
C
o
llis
io
n
s
.
C
o
llis
io
n
i
s
to
f
i
n
d
d
if
f
er
en
t
i
n
p
u
t
th
at
lead
s
to
th
e
s
a
m
e
d
i
g
est
[
7
]
.
C
o
llis
io
n
r
esi
s
ta
n
ce
its
el
f
i
s
a
g
en
er
al
cr
iter
io
n
,
s
o
t
h
er
e
ar
e
m
an
y
w
a
y
s
t
h
at
attac
k
er
s
u
s
e
to
o
b
tain
co
llis
io
n
s
i
n
t
h
e
h
as
h
f
u
n
ctio
n
s
u
ch
a
s
f
i
n
d
in
g
co
llis
io
n
s
i
n
i
n
ter
m
ed
i
ate
ch
ai
n
in
g
v
al
u
es
b
y
ap
p
l
y
in
g
d
if
f
er
en
t
s
ce
n
ar
io
s
to
estab
li
s
h
t
h
e
attac
k
s
.
T
h
e
m
i
n
i
m
u
m
co
m
p
le
x
it
y
r
eq
u
ir
e
d
f
o
r
r
an
d
o
m
o
r
ac
le
is
2
c
.
A
tt
ac
k
er
s
ca
n
b
r
ea
k
th
e
co
m
p
lex
it
y
to
h
alf
b
y
u
s
i
n
g
b
ir
th
d
a
y
t
h
eo
r
y
i
n
p
r
o
b
ab
ilit
y
s
ci
en
ce
[
F
ig
u
r
e
3
]
.
I
n
s
i
m
p
le,
it
co
u
ld
b
e
b
y
s
u
r
r
o
u
n
d
in
g
all
p
r
o
b
ab
ilit
y
s
tatics
f
o
r
th
e
d
i
g
est.
Fo
r
in
s
tan
ce
,
a
class
r
o
o
m
w
i
th
t
w
el
v
e
s
t
u
d
e
n
ts
.
O
n
e
s
tu
d
e
n
t
s
h
o
u
ld
s
h
ar
e
th
e
s
a
m
e
b
ir
t
h
d
a
y
w
it
h
a
co
lleag
u
e.
B
y
s
o
m
e
p
r
o
b
ab
ilit
y
ca
lcu
la
tio
n
s
,
t
h
e
co
m
p
lex
it
y
m
ig
h
t
b
e
b
r
o
k
en
to
th
e
h
al
f
.
Seco
nd
P
re
i
m
a
g
e.
Seco
n
d
p
r
ei
m
a
g
e
i
s
t
h
e
ad
v
a
n
ce
s
o
f
co
ll
is
io
n
attac
k
.
I
t
i
s
to
f
i
n
d
t
h
e
s
ec
o
n
d
m
e
s
s
a
g
e
f
r
o
m
a
g
i
v
e
n
d
ig
e
s
t
an
d
k
n
o
w
n
f
ir
s
t
m
es
s
ag
e
w
i
th
its
h
a
s
h
v
al
u
e[
Fi
g
u
r
e
4
]
[
7
]
.
Fig
u
r
e
2
.
Seco
n
d
P
r
eim
a
g
e
L
eng
t
h e
x
t
en
s
io
n.
L
e
n
g
t
h
e
x
te
n
s
io
n
is
o
n
e
o
f
t
h
e
s
ec
u
r
it
y
cr
iter
ia
f
o
r
h
as
h
f
u
n
ctio
n
s
.
Has
h
f
u
n
ctio
n
s
ca
n
b
e
u
s
ed
as
Me
s
s
a
g
e
Au
t
h
en
ticatio
n
C
o
d
e
s
.
H(
Secr
et
|
|
Me
s
s
a
g
e)
.
T
h
er
ef
o
r
e,
an
y
w
ea
k
n
es
s
i
n
th
e
h
a
s
h
s
tr
u
ct
u
r
e
w
il
l t
h
r
ea
t
th
e
M
AC
an
d
af
f
ec
t t
h
e
s
er
v
er
f
iles
v
alid
atio
n
[
9
]
.
I
n
th
i
s
ca
s
e,
s
er
v
er
ca
lc
u
late
s
th
e
m
e
s
s
a
g
e
d
ig
e
s
t
an
d
d
et
er
m
in
e
s
i
f
it
i
s
a
v
a
lid
r
eq
u
e
s
t
o
r
n
o
t.
T
h
eo
r
etica
lly
,
a
ttac
k
er
s
m
a
y
f
o
r
g
e
m
o
d
if
ied
r
eq
u
est
w
i
th
o
u
t
k
n
o
w
in
g
t
h
e
s
ec
r
et
th
at
t
h
e
s
er
v
er
u
s
es
b
y
ap
p
en
d
in
g
s
o
m
e
d
ata
to
t
h
e
m
ess
a
g
e
an
d
s
er
v
er
s
till
s
ee
s
it a
s
a
v
alid
r
eq
u
est
(
2
)
.
|
|
(
2
)
Sin
ce
le
n
g
t
h
ex
te
n
s
io
n
attac
k
s
d
ep
en
d
o
n
f
i
n
d
in
g
co
lli
s
io
n
s
i
n
t
h
e
in
ter
n
al
s
tate,
T
itan
i
u
m
i
ter
ates
o
n
2
4
tim
es
a
n
d
ea
ch
o
p
er
atio
n
u
p
d
ates
th
e
w
h
o
le
s
tate.
Fu
r
t
h
e
r
m
o
r
e,
ch
an
g
in
g
o
n
e
b
it
w
ill
c
h
an
g
e
at
least
h
al
f
o
f
th
e
s
ta
te
b
ites
an
d
t
h
e
attac
k
er
d
o
es n
o
t k
n
o
w
w
h
ic
h
p
ar
t h
as b
ee
n
tr
u
n
ca
ted
.
2
.
7
Adv
a
nced
Securit
y
a
na
ly
s
is
T
h
e
b
asic
s
ec
u
r
it
y
cr
iter
ia
f
o
r
h
as
h
f
u
n
ctio
n
s
ar
e
p
r
ei
m
a
g
e,
s
ec
o
n
d
p
r
ei
m
a
g
e,
co
llis
io
n
a
n
d
len
g
t
h
ex
ten
s
io
n
(
Used
w
it
h
M
A
C
s
)
.
T
h
e
b
asic
s
ec
u
r
it
y
clai
m
s
f
o
r
all
o
f
cr
iter
ia
s
h
o
u
ld
b
e
at
least
2
c
.
A
ttack
er
s
cr
ea
te
a
s
ce
n
ar
io
to
b
r
ea
k
o
n
e
o
r
m
o
r
e
o
f
th
o
s
e
cr
iter
ia
o
r
r
ed
u
ce
th
e
co
m
p
le
x
it
y
o
f
al
g
o
r
ith
m
,
w
h
e
th
er
it
i
s
a
th
eo
r
etica
l o
r
a
p
r
ac
tical
w
a
y
.
M
ulti
-
c
o
llis
io
n a
t
t
a
ck
.
C
ascad
in
g
h
as
h
e
s
ap
p
ea
r
ed
in
th
e
P
h
D
t
h
esi
s
o
f
B
.
P
r
en
ee
l
[
9
]
.
I
t
is
to
b
u
ild
a
co
n
cr
eted
h
as
h
d
ig
e
s
t
f
r
o
m
t
w
o
in
d
ep
en
d
e
n
t
h
a
s
h
alg
o
r
ith
m
s
.
I
t
in
cr
ea
s
es
t
h
e
s
ec
u
r
it
y
lev
el
w
i
th
a
f
f
ec
ti
n
g
th
e
to
tal
co
s
t
o
f
i
m
p
le
m
en
ta
tio
n
(
3
)
.
(
3
)
J
o
u
x
[
11
]
p
r
o
v
ed
th
at
ca
s
ca
d
i
n
g
h
a
s
h
e
s
d
o
es
n
o
t
m
ak
e
d
i
f
f
e
r
en
ce
.
T
h
e
co
m
p
lex
i
t
y
o
f
it
r
em
ai
n
s
a
s
i
f
it
is
o
n
l
y
o
n
e
h
a
s
h
alg
o
r
it
h
m
.
J
o
u
x
[
1
1
]
f
o
u
n
d
co
lli
s
io
n
s
with
m
es
s
ag
e
’
s
b
lo
ck
s
b
y
ex
h
a
u
s
ted
s
ea
r
c
h
u
s
i
n
g
p
r
e
-
co
m
p
u
ted
d
ata
s
tr
u
ct
u
r
e
to
co
m
p
ar
e
all
m
es
s
ag
e
’
s
p
air
s
to
o
b
tain
f
o
u
r
co
ll
is
io
n
s
(
C
o
llis
io
n
f
in
d
i
n
g
m
ac
h
in
e)
s
u
c
h
th
at
g
i
v
i
n
g
i
n
iti
al
v
alu
e
t
h
at
w
i
ll p
r
o
d
u
ce
s
t
wo
b
lo
ck
s
o
f
th
e
m
es
s
ag
e
(
4
)
[
Fig
u
r
e
5]
.
(
4
)
T
h
e
attac
k
is
b
ased
o
n
f
in
d
i
n
g
co
llis
io
n
s
at
in
ter
m
ed
iate
ch
a
in
i
n
g
v
al
u
es
b
et
w
ee
n
th
e
in
ter
n
al
s
tate
s
of
th
e
m
e
s
s
a
g
e
p
air
s
.
T
itan
iu
m
h
as
a
ca
p
ac
it
y
o
f
1
0
2
4
b
it
an
d
u
p
d
ate
s
ea
ch
s
tate
af
t
er
ea
ch
o
p
er
atio
n
.
C
o
n
s
id
er
in
g
b
ir
t
h
d
a
y
t
h
eo
r
y
,
t
h
e
co
m
p
lex
it
y
o
f
T
itan
iu
m
a
g
ain
s
t r
e
m
ai
n
s
2
c
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
S
ec
u
r
ity
o
f a
N
ew C
r
yp
to
g
r
a
p
h
ic
Ha
s
h
F
u
n
ctio
n
–
Tit
a
n
i
u
m
…
(
A
b
d
u
lla
h
N
a
z
ee
h
S
a
leh
)
1247
Fig
u
r
e
3
.
Mu
lti
-
C
o
lli
s
io
n
at
tac
k
H
er
din
g
At
t
a
ck
.
Her
d
in
g
h
as
h
es
is
t
h
e
ad
v
a
n
ce
s
o
f
Mu
lt
i
-
co
lli
s
io
n
attac
k
b
y
u
s
i
n
g
b
r
u
te
-
f
o
r
ce
to
cr
ea
te
a
tr
ee
o
f
d
ata
[
1
2
]
.
I
ts
id
ea
is
to
cr
ea
te
an
ar
r
ay
o
f
d
ata
s
tr
u
ct
u
r
e
w
h
i
ch
is
a
p
r
e
-
co
m
p
u
ted
tr
ee
f
o
r
in
ter
m
ed
iate
v
al
u
es
b
y
u
s
i
n
g
b
r
u
te
-
f
o
r
ce
.
T
h
en
,
r
u
n
e
x
h
au
s
ti
v
e
s
ea
r
ch
f
o
r
i
n
t
er
n
al
s
tates
th
at
co
llid
e
w
it
h
o
n
e
o
r
m
o
r
e
d
ata
s
tr
u
c
t
u
r
e
v
al
u
es.
Af
ter
th
e
co
ll
is
io
n
,
ad
d
in
g
s
h
o
r
t p
r
ef
ix
es to
th
e
s
tr
i
n
g
i
s
p
o
s
s
ib
le
w
it
h
ap
p
r
o
v
ed
v
alid
atio
n
.
T
itan
iu
m
f
o
llo
w
s
s
p
o
n
g
e
co
n
s
tr
u
ctio
n
a
n
d
u
s
e
s
S
F
cip
h
er
.
T
h
e
d
ig
est
i
s
tr
u
n
ca
ted
an
d
th
e
tr
u
n
ca
ted
p
ar
t
is
u
n
k
n
o
w
n
to
th
e
attac
k
e
r
.
Fu
r
th
er
m
o
r
e,
in
i
tial
v
a
lu
e
i
s
s
a
m
e
f
o
r
all
in
p
u
t
s
.
C
h
a
n
g
es
i
n
in
p
u
ts
a
f
f
ec
t
f
ir
s
t
s
tate
th
e
n
t
h
e
w
h
o
le
i
n
n
er
s
tat
es.
B
y
u
s
i
n
g
b
r
u
te
-
f
o
r
ce
,
th
e
co
m
p
lex
it
y
o
f
T
itan
iu
m
r
e
m
ai
n
s
a
t
m
in
i
m
u
m
2
c
w
it
h
t
h
e
c
o
n
s
id
er
atio
n
o
f
b
ir
th
d
a
y
th
eo
r
y
.
2
.
8
Dis
t
ing
ui
s
hers:
Dis
ti
n
g
u
i
s
h
er
s
is
u
s
ed
w
id
el
y
to
b
r
ea
k
s
ec
u
r
it
y
alg
o
r
it
h
m
s
a
s
it
h
as
m
an
y
tech
n
iq
u
e
s
to
u
s
e.
I
t
is
th
e
s
tu
d
y
o
f
th
e
r
elatio
n
s
h
ip
b
etw
ee
n
in
p
u
ts
,
k
e
y
s
an
d
th
e
o
u
tp
u
t
s
to
d
is
clo
s
e
f
u
ll
o
f
t
h
e
k
e
y
o
r
p
ar
t
o
f
it.
Dis
ti
n
g
u
i
s
h
er
s
’
cr
y
p
ta
n
al
y
s
i
s
ai
m
s
to
b
r
ea
k
o
n
e
o
r
m
o
r
e
o
f
th
e
h
as
h
f
u
n
c
tio
n
s
ec
u
r
it
y
cr
iter
ia
(
P
r
eim
ag
e
–
Seco
n
d
p
r
ei
m
a
g
e
–
C
o
lli
s
io
n
–
le
n
g
t
h
e
x
te
n
s
io
n
)
t
h
r
o
u
g
h
p
ar
ticu
lar
cr
y
p
t
a
n
al
y
s
i
s
,
s
u
c
h
as
d
if
f
er
en
tial
cr
y
p
ta
n
al
y
s
i
s
.
Dif
f
er
ent
ia
ls
cr
y
pta
na
ly
s
is
.
Dif
f
er
en
t
ials
is
t
h
e
s
tu
d
y
o
f
t
h
e
r
elatio
n
s
h
ip
b
et
w
ee
n
i
n
p
u
t
s
a
n
d
o
u
tp
u
ts
.
I
t
is
ai
m
i
n
g
to
tr
ac
e
t
h
e
f
u
n
ctio
n
an
d
w
h
er
e
it
d
o
es
a
p
ar
ticu
lar
b
eh
av
io
r
s
u
c
h
th
a
t
ex
p
lo
itin
g
t
h
at
v
u
l
n
er
ab
ilit
y
an
d
d
is
clo
s
e
th
e
k
e
y
o
r
p
ar
t
o
f
th
e
k
e
y
[
1
4
]
.
I
t
is
b
ase
d
o
n
k
n
o
w
n
p
lai
n
te
x
t
-
cip
h
er
te
x
t
cr
y
p
ta
n
al
y
s
is
w
h
ic
h
is
a
p
a
ir
o
f
m
es
s
ag
e
s
th
a
t
h
as
a
p
ar
ticu
lar
s
tati
s
tical
p
r
o
p
er
ties
.
A
ttac
k
er
s
ap
p
l
y
th
e
ir
d
if
f
er
e
n
tial
attac
k
s
u
s
in
g
d
i
f
f
er
en
t
s
ce
n
ar
io
s
a
n
d
tech
n
iq
u
es
s
u
c
h
as,
s
lid
e
at
tac
k
,
r
o
tatio
n
al
an
d
tr
u
n
ca
ted
d
if
f
er
en
tia
ls
.
Ge
n
er
all
y
,
f
o
r
T
itan
iu
m
,
th
e
to
tal
co
s
t
o
f
g
e
n
er
atin
g
p
air
o
f
m
e
s
s
a
g
es
th
at
h
a
s
th
a
t p
ar
ticu
lar
s
tati
s
ti
ca
l
p
r
o
p
e
r
ties
is
2
2c
.
Sli
de
At
t
a
c
k
.
Sli
d
e
attac
k
is
k
n
o
w
n
p
lai
n
te
x
t
ch
ip
h
er
tex
t
attac
k
.
Ho
w
e
v
er
,
i
t
d
o
es
n
o
t
u
s
e
b
r
u
te
f
o
r
ce
attac
k
to
g
en
er
ate
t
h
e
p
air
s
.
I
t
d
ep
en
d
s
o
n
w
h
at
s
o
ca
lled
,
s
lid
p
air
s
.
T
h
e
g
i
v
en
v
ar
iab
les
f
o
r
th
e
atta
ck
er
is
th
e
m
e
s
s
a
g
e
(P
0
)
,
ch
ip
h
er
tex
t
(
C
0
)
o
f
t
h
e
P
0
an
d
t
h
e
a
s
s
u
m
ed
m
es
s
ag
e
(
P
1
)
.
A
t
tack
er
p
r
ete
n
d
s
t
h
at
P
1
e
q
u
als
R
1
o
f
P
1
t
h
e
n
f
4
o
f
p
0
s
h
o
u
ld
eq
u
al
R
4
o
f
P
1
.
Af
ter
t
h
at,
a
ttack
er
m
a
k
e
s
o
m
e
an
al
y
s
i
s
to
d
i
s
clo
s
e
t
h
e
k
e
y
u
s
ed
b
et
w
ee
n
f
4
a
n
d
C
1
.
I
f
attac
k
er
g
o
t
t
h
e
co
r
r
esp
o
n
d
in
g
k
e
y
,
ap
p
l
y
i
n
g
t
h
e
s
a
m
e
k
e
y
w
i
th
P
0
a
n
d
th
e
k
e
y
w
i
ll
p
r
o
d
u
ce
f
1
.
I
f
f
1
eq
u
als P
1
,
th
en
t
h
e
p
air
is
a
g
o
o
d
p
air
an
d
c
o
n
s
id
er
ed
as sl
id
p
air
as sh
o
w
n
b
elo
w
[
Fi
g
u
r
e
6
]
[
1
2
]
.
Sli
d
e
attac
k
i
s
e
f
f
icien
t
w
it
h
al
g
o
r
ith
m
t
h
at
u
s
es o
n
e
k
e
y
f
o
r
all
r
o
u
n
d
s
a
n
d
th
e
o
u
tp
u
t o
f
al
l r
o
u
n
d
s
i
s
k
n
o
w
n
f
o
r
t
h
e
at
tack
er
.
Ho
wev
er
,
T
itan
iu
m
u
p
d
ates
its
s
t
ate
ea
ch
r
o
u
n
d
an
d
i
ts
s
tate
s
d
o
n
o
t
p
r
esen
t
an
y
b
iases
to
ea
ch
o
t
h
er
.
Usi
n
g
XORi
n
g
b
et
w
ee
n
s
tates
m
a
k
e
s
th
e
s
tates
tak
e
t
h
e
d
i
f
f
u
s
io
n
an
d
th
e
co
n
f
u
s
io
n
p
r
o
p
er
ties
.
Fu
r
th
er
m
o
r
e,
th
e
o
u
tp
u
t
o
f
T
itan
i
u
m
is
tr
u
n
ca
ted
an
d
th
e
attac
k
er
d
o
es
n
o
t
k
n
o
w
w
h
ic
h
p
ar
t
h
as
b
ee
n
t
r
u
n
ca
ted
f
r
o
m
t
h
e
d
ig
e
s
t.
Usi
n
g
b
r
u
te
f
o
r
ce
attac
k
,
t
h
e
co
m
p
le
x
it
y
o
f
g
en
er
at
in
g
s
l
i
d
p
air
w
i
ll
d
ep
en
d
s
to
tall
y
o
n
k
n
o
w
n
p
lai
n
te
x
t
att
ac
k
w
h
ic
h
r
eq
u
ir
es
2
2c
p
o
s
s
ib
ilit
ies.
B
y
co
n
s
id
er
i
n
g
b
ir
th
d
a
y
th
eo
r
y
to
estab
lis
h
th
e
attac
k
,
th
e
co
m
p
le
x
it
y
o
f
g
en
er
atin
g
s
l
id
p
air
r
em
ai
n
s
2
c
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l.
10
,
No
.
3
,
J
u
n
e
2
0
1
8
:
1
2
4
4
–
1
2
5
0
1248
Fig
u
r
e
4
.
Sli
d
e
cr
y
p
ta
n
al
y
s
i
s
Ro
t
a
t
io
na
l c
ry
pt
a
na
ly
s
is
I
t
is
th
e
an
al
y
s
is
t
h
at
r
e
lies
o
n
AR
X
[
Mo
d
u
lar
ad
d
itio
n
,
R
o
tatio
n
an
d
XO
R
]
.
R
o
tatio
n
s
ca
n
b
e
o
b
tain
ed
b
y
r
o
tatin
g
t
h
e
co
r
r
esp
o
n
d
in
g
w
o
r
d
.
R
o
tatio
n
al
cr
y
p
ta
n
al
y
s
i
s
ca
n
b
e
estab
li
s
h
ed
if
t
h
e
b
its
ar
e
f
r
ien
d
l
y
to
r
o
tate
p
r
o
p
er
ty
.
Ho
w
e
v
er
,
T
itan
iu
m
d
o
es
n
o
t
f
o
llo
w
AR
X
a
n
d
u
s
e
s
co
n
s
tan
t
i
n
its
o
p
er
atio
n
.
I
V
s
ar
e
s
a
m
e
f
o
r
all
m
ess
a
g
e
s
an
d
ca
p
ac
it
y
r
e
m
ai
n
s
w
i
th
a
f
ix
ed
v
alu
e
(
ze
r
o
)
[
1
5
]
.
T
runca
t
ed
diff
er
ent
ia
l c
ry
pt
a
na
ly
s
is
I
t
is
t
h
e
cr
y
p
tan
a
l
y
s
is
o
n
th
e
d
if
f
er
en
ce
s
i
n
i
n
p
u
ts
a
n
d
o
u
tp
u
ts
to
d
is
co
v
er
th
e
k
e
y
o
r
p
ar
t
o
f
it
.
T
r
u
n
ca
ted
d
if
f
e
r
en
t
ials
r
elies
o
n
k
n
o
w
n
p
lain
te
x
t
cip
h
er
tex
t
attac
k
.
I
t
s
tu
d
ies
t
h
e
b
eh
a
v
io
r
o
f
th
e
f
u
n
ctio
n
a
n
d
tr
ac
in
g
it
to
t
h
e
s
tag
e
t
h
at
th
e
f
u
n
ctio
n
m
a
k
e
s
a
d
i
f
f
er
e
n
t
b
eh
av
io
r
h
o
p
in
g
to
f
i
n
d
s
tati
s
tical
p
atter
n
s
i
n
Sb
o
x
e
s
d
is
tr
ib
u
tio
n
.
Attack
er
s
h
o
u
ld
o
b
tain
p
lain
t
e
x
t
a
n
d
th
e
co
r
r
e
s
p
o
n
d
in
g
cip
h
er
te
x
t.
O
n
ce
t
h
e
attac
k
er
g
ets
t
h
e
s
tatis
t
ical
p
r
o
p
er
ty
,
th
e
n
p
air
s
ca
lled
d
if
f
er
e
n
tials
[
1
6
]
.
T
itan
iu
m
h
as
a
co
n
s
tan
t
v
a
lu
e
(
C
,
I
V)
f
o
r
all
m
es
s
a
g
es
a
n
d
f
in
d
i
n
g
t
h
e
r
eq
u
ir
ed
p
air
s
n
ee
d
s
2
2c
p
o
s
s
ib
ilit
ies.
As
s
u
m
i
n
g
t
h
at
t
h
e
at
tack
er
is
ab
le
to
f
in
d
th
e
p
air
s
w
it
h
le
s
s
w
o
r
k
(
<2
c
)
,
t
h
e
d
ig
est
is
tr
u
n
ca
ted
an
d
attac
k
er
d
o
es n
o
t k
n
o
w
wh
ich
p
ar
t h
a
s
b
ee
n
tr
u
n
ca
ted
.
Sq
ua
re
a
t
t
a
ck
Sq
u
ar
e
o
r
i
n
teg
r
al
attac
k
i
s
a
d
i
f
f
er
e
n
tial
attac
k
b
ased
o
n
k
n
o
w
n
p
lain
te
x
t
cip
h
er
te
x
t
at
ta
ck
[
1
7
]
.
I
t
w
a
s
f
ir
s
t a
p
p
lied
o
n
b
lo
ck
cip
h
er
s
.
Ho
w
ev
er
,
t
h
e
tec
h
n
iq
u
e
h
er
e
is
to
f
in
d
t
h
e
co
r
r
esp
o
n
d
in
g
d
i
f
f
er
en
ce
s
in
th
e
b
lo
ck
r
ath
er
t
h
a
n
s
ev
er
al
b
it
s
.
I
t e
x
p
lo
its
th
e
p
r
o
p
er
ty
o
f
o
n
e
-
w
a
y
S
-
b
o
x
.
I
ts
p
air
s
s
h
o
u
ld
h
a
v
e
co
n
s
ta
n
ts
in
t
h
e
p
air
s
’
b
lo
ck
s
p
lu
s
v
ar
iab
les
a
n
d
th
e
n
attac
k
co
u
ld
b
e
estab
l
is
h
ed
w
it
h
th
o
s
e
s
tu
d
ied
v
ar
ia
b
les
an
d
co
n
s
id
er
ed
as in
te
g
r
al
p
air
s
.
T
itan
iu
m
h
as
a
ca
p
ac
it
y
o
f
1
0
2
4
b
it
an
d
n
e
v
er
a
f
f
ec
t
t
h
e
o
u
tp
u
t.
B
itra
te
v
al
u
es
o
f
T
i
tan
i
u
m
ar
e
ch
an
g
i
n
g
a
f
ter
ea
ch
o
p
er
atio
n
an
d
r
o
u
n
d
.
Fu
r
t
h
er
m
o
r
e,
th
e
d
i
g
est i
s
tr
u
n
ca
ted
an
d
th
e
f
u
ll d
ig
est i
s
o
b
s
cu
r
e.
L
inea
r
cr
y
pta
nly
s
is
L
i
n
ea
r
cr
y
p
tan
al
y
s
is
is
e
f
f
icie
n
t
w
it
h
alg
o
r
it
h
m
th
at
u
s
e
s
AR
X
[
A
d
d
–
R
o
tate
–
XOR].
I
n
th
is
attac
k
,
attac
k
er
tr
ie
s
to
o
b
tain
k
n
o
wn
p
lai
n
te
x
t
cip
h
er
tex
t
p
air
s
w
it
h
li
n
ea
r
it
y
p
r
o
p
o
r
tio
n
o
f
½
b
y
s
o
m
e
XO
R
s
o
p
er
atio
n
an
d
s
tatis
tical
s
t
u
d
ies.
I
t d
ep
en
d
s
o
n
th
e
ze
r
o
s
an
d
o
n
es
d
is
tr
ib
u
t
io
n
i
n
th
e
s
tate
[
F
ig
u
r
e
7
]
[
1
8
]
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
S
ec
u
r
ity
o
f a
N
ew C
r
yp
to
g
r
a
p
h
ic
Ha
s
h
F
u
n
ctio
n
–
Tit
a
n
i
u
m
…
(
A
b
d
u
lla
h
N
a
z
ee
h
S
a
leh
)
1249
T
itan
iu
m
h
as
a
ca
p
ac
it
y
o
f
1
0
2
4
b
it
w
h
ic
h
f
o
r
ce
s
attac
k
er
to
g
en
er
ate
2
2c
p
air
s
b
y
u
s
i
n
g
b
r
u
te
f
o
r
ce
attac
k
.
Mo
r
eo
v
er
,
S
-
b
o
x
es
u
s
e
d
in
T
itan
iu
m
ar
e
n
o
n
-
li
n
ea
r
it
y
p
r
o
p
er
ty
.
A
s
s
u
m
in
g
t
h
e
at
tack
er
s
u
cc
ee
d
s
in
ap
p
ly
i
n
g
th
e
li
n
ea
r
o
n
Sb
o
x
e
s
s
o
m
e
h
o
w
,
t
h
e
to
tal
co
s
t o
f
es
t
ab
lis
h
i
n
g
th
e
attac
k
is
2
2c
.
Fig
u
r
e
5
.
L
in
ea
r
p
air
s
3.
DIS
CU
SS
I
O
N
S
T
ab
le
1
is
a
d
is
cu
s
s
io
n
f
o
r
T
itan
iu
m
o
n
a
n
y
d
e
s
ir
ed
d
ig
est le
n
g
t
h
w
it
h
d
i
f
f
er
e
n
t a
ttac
k
s
a
n
d
s
ec
u
r
it
y
cr
iter
ia.
T
h
e
co
m
p
lex
itie
s
ar
e
th
e
r
eq
u
ir
ed
co
s
t to
estab
lis
h
t
h
e
attac
k
u
s
i
n
g
b
r
u
te
f
o
r
ce
attac
k
tech
n
iq
u
e.
T
ab
le
1
.
Dis
cu
s
s
io
n
s
F
u
n
c
t
i
o
n
C
o
l
l
i
si
o
n
Pr
ei
-
mag
e
S
-
p
r
e
i
mag
e
D
i
st
i
n
g
u
i
s
h
e
r
s
T
i
t
a
n
i
u
m
-
2
5
6
R
.
S
p
o
n
g
e
-
2
5
6
2
256
2
512
2
512
2
512
T
i
t
a
n
i
u
m
-
5
1
2
R
.
S
p
o
n
g
e
-
5
1
2
2
512
2
1024
2
1024
2
1024
T
i
t
a
n
i
u
m
-
n
R
.
s
p
o
n
g
e
-
n
2
n
/
2
2
2c
2
2c
2
2c
4.
CO
NCLU
SI
O
N
T
itan
iu
m
h
as
h
f
u
n
ctio
n
h
a
s
b
ee
n
an
al
y
ze
d
.
I
t sh
o
w
s
a
r
esi
s
ta
n
ce
o
f
2
2
c
ag
ain
s
t t
h
e
s
t
u
d
ied
attac
k
s
.
I
ts
co
n
s
tr
u
ctio
n
a
n
d
cip
h
er
f
o
r
tif
ied
t
h
e
alg
o
r
it
h
m
b
y
s
u
r
r
o
u
n
d
in
g
it
w
i
th
h
i
g
h
d
i
f
f
u
s
io
n
a
n
d
co
n
f
u
s
io
n
w
it
h
tak
i
n
g
it
s
p
er
f
o
r
m
a
n
ce
o
f
t
h
e
a
lg
o
r
ith
m
i
n
th
e
co
n
s
id
er
atio
n
.
Usi
n
g
b
ig
g
er
ca
p
ac
it
y
i
n
cr
ea
s
es h
as
h
co
m
p
le
x
itie
s
.
Ho
w
e
v
er
,
b
ig
g
e
r
ca
p
ac
ity
m
ea
n
s
h
ig
h
er
ex
ec
u
tiv
e
co
s
ts
o
n
m
o
d
er
n
C
P
Us.
1
0
2
4
b
it c
a
p
ac
ity
i
s
a
r
ea
s
o
n
ab
le
s
ize.
T
h
e
s
ec
u
r
it
y
c
lai
m
s
o
f
it
f
u
l
f
il
l r
an
d
o
m
s
p
o
n
g
e
clai
m
s
w
h
ic
h
is
t
h
e
id
ea
l h
a
s
h
f
u
n
ctio
n
.
RE
F
E
R
E
NC
E
S
[1
]
R.
Riv
e
st,
T
h
e
M
D5
M
e
ss
a
g
e
-
Di
g
e
st
A
lg
o
rit
h
m
.
A
p
ril
1
9
9
2
.
[2
]
M
a
rc
S
tev
e
n
s,
El
ie Bu
rsz
tein
,
P
ie
rre
Ka
rp
m
a
n
,
A
n
g
e
A
lb
e
rti
n
i,
Ya
rik
M
a
rk
o
v
.
T
h
e
f
irst
c
o
ll
isio
n
f
o
r
f
u
ll
S
HA
-
1
[3
]
M
o
h
a
m
m
a
d
A
l
A
h
m
a
d
,
A
b
d
u
ll
a
h
Iss
a
,
A
b
d
u
ll
a
h
A
lsa
leh
,
"
Do
u
b
le
-
A
-
A
S
a
ls
a
2
0
li
k
e
-
T
h
e
De
sig
n
"
.
T
h
e
4
th
c
o
n
fer
e
n
c
e
o
f
Ad
v
a
n
c
e
d
C
o
m
p
u
ter
S
c
ien
c
e
Ap
p
li
c
a
t
io
n
s
a
n
d
T
e
c
h
n
o
l
o
g
ies
(
ACS
A
T
),
2
0
1
5
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
,
IEE
E
X
p
l
o
re
[4
]
A
Ne
w
Blo
c
k
Cip
h
e
r
f
o
r
Ne
two
rk
S
e
c
u
rit
y
,
Krip
a
,
M
e
g
h
a
R
Ka
m
a
t,
M
e
g
h
a
n
a
,
S
w
a
ti
D
P
a
i
&
M
r.
V
a
sa
n
th
Na
y
a
k
.
In
p
e
ria
l
J
o
r
n
a
l
o
f
I
n
ter
d
is
c
ip
li
n
a
ry
Res
e
a
rc
h
(
IJ
IR)
,
2
0
1
6
[5
]
G
u
id
o
Be
rto
n
i
,
Jo
a
n
Da
e
m
e
n
,
M
ich
a
e
l
P
e
e
ters
a
n
d
G
il
les
V
a
n
A
s
sc
h
e
.
Ke
c
c
a
k
sp
o
n
g
e
f
u
n
c
ti
o
n
f
a
m
il
y
m
a
in
d
o
c
u
m
e
n
t.
h
t
tp
:/
/k
e
c
c
a
k
.
n
o
e
k
e
o
n
.
o
rg
/Ke
c
c
a
k
-
m
a
in
-
2
.
1
.
p
d
f
/,
2
0
1
0
[6
]
S
p
o
n
g
e
F
u
n
c
ti
o
n
s.
G
u
id
o
B
e
rto
n
i
1
,
Jo
a
n
Da
e
m
e
n
1
,
M
ich
a
¨e
l
P
e
e
ters
2
,
a
n
d
G
il
les
V
a
n
.
A
ss
c
h
e
1
.
g
ro
.
n
o
e
k
e
o
n
@
n
o
e
k
e
o
n
.
o
rg
.
1
S
T
M
icro
e
lec
tro
n
ics
.
2
N
XP
S
e
m
ico
n
d
u
c
t
o
rs
[7
]
X
iao
y
u
n
W
a
n
g
,
De
n
g
g
u
o
F
e
n
g
,
X
u
e
ji
a
L
a
i,
Ho
n
g
b
o
Yu
,
“
Co
ll
isio
n
s
f
o
r
Ha
sh
F
u
n
c
ti
o
n
s
M
D4
,
M
D
5
,
HA
V
AL
-
128
a
n
d
RI
P
E
M
D
”
,
Ju
ly
2
7
,
2
0
0
8
.
[8
]
P
.
Ro
g
a
w
a
y
,
T
.
S
h
ri
m
p
to
n
,
“
Cry
p
to
g
ra
p
h
ic
Ha
sh
-
F
u
n
c
ti
o
n
Ba
sic
s:
De
f
in
it
io
n
s,
Im
p
li
c
a
ti
o
n
s,
a
n
d
S
e
p
a
ra
ti
o
n
s
f
o
r
P
re
im
a
g
e
Re
sista
n
c
e
,
S
e
c
o
n
d
-
P
re
im
a
g
e
Re
sista
n
c
e
,
a
n
d
Co
ll
isio
n
Re
sista
n
c
e
”
,
F
e
b
ru
a
ry
1
2
,
2
0
0
4
[9
]
Da
n
il
o
G
li
g
o
ro
sk
i,
L
e
n
g
th
Ex
ten
sio
n
A
tt
a
c
k
o
n
Na
rro
w
-
P
i
p
e
S
HA
-
3
Ca
n
d
id
a
tes
,
S
p
rin
g
e
r,
2
0
1
0
[1
0
]
B.
P
re
n
e
e
l.
“
A
n
a
ly
sis
a
n
d
d
e
sig
n
o
f
c
ry
p
to
g
ra
p
h
ic
h
a
sh
f
u
n
c
ti
o
n
s
”
.
P
h
D
th
e
sis,
Ka
th
o
li
e
k
e
Un
i
v
e
rsit
y
L
e
u
v
e
n
,
Ja
n
u
a
ry
1
9
9
3
.
[1
1
]
A
.
Jo
u
x
.
“
M
u
lt
ico
l
li
sio
n
s
i
n
it
e
r
a
ted
h
a
sh
f
u
n
c
ti
o
n
s.
A
p
p
l
ica
ti
o
n
to
c
a
sc
a
d
e
d
c
o
n
str
u
c
ti
o
n
s
”
.
I
n
M
.
K.
F
ra
n
k
li
n
,
e
d
it
o
r,
CRY
P
T
O,
v
o
lu
m
e
3
1
5
2
o
f
L
e
c
tu
re
No
tes
in
Co
m
p
u
ter S
c
ien
c
e
,
p
a
g
e
s 3
0
6
–
3
1
6
.
S
p
ri
n
g
e
r,
2
0
0
4
.
[1
2
]
Jo
h
n
Ke
lsy
&
T
a
d
a
y
o
sh
i
Ko
h
n
o
,
He
rd
in
g
Ha
sh
F
u
n
c
ti
o
n
s an
d
t
h
e
No
stra
d
a
m
u
s
A
tt
a
c
k
,
Ja
n
u
a
r
y
2
0
0
6
[1
3
]
M
ich
a
e
l
T
u
n
sta
ll
,
Pr
a
c
ti
c
a
l
c
o
mp
lex
it
y
d
if
fer
e
n
ti
a
l
c
ry
p
ta
n
a
lys
is
a
n
d
f
a
u
lt
a
n
a
lys
is
o
f
A
ES
,
S
p
r
in
g
e
r,
2
0
1
1
[1
4
]
T
a
k
a
n
o
ri
Iso
b
e
,
T
o
sh
ih
ir
o
O
h
i
g
a
sh
i,
M
a
sa
k
a
tu
M
o
rii
,
“
S
li
d
e
Cry
p
tan
a
l
y
sis
o
f
L
ig
h
t
w
e
ig
h
t
S
trea
m
Cip
h
e
r
RA
K
A
P
OSHI
”
,
S
p
rin
g
e
r
,
2
0
1
2
[1
5
]
D
m
it
r
y
Kh
o
v
ra
to
v
ich
,
Iv
ica
Nik
o
li
c
,
Ro
tati
o
n
a
l
Cry
p
tan
a
ly
si
s o
f
ARX
,
2
0
1
0
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l.
10
,
No
.
3
,
J
u
n
e
2
0
1
8
:
1
2
4
4
–
1
2
5
0
1250
[1
6
]
T
a
k
u
m
a
Ko
y
a
m
a
L
e
i
Wan
g
Yu
S
a
sa
k
iK
a
z
u
o
S
a
k
i
y
a
m
a
Ka
z
u
o
Oh
ta,
Ne
w
T
ru
n
c
a
ted
Di
ff
e
re
n
ti
a
l
C
ry
p
tan
a
l
y
sis
o
n
3
D Bl
o
c
k
Cip
h
e
r
[1
7
]
L
a
rs Kn
u
d
se
n
Da
v
id
W
a
g
n
e
r.
In
teg
ra
l
Cry
p
t
a
n
a
lys
is
,
S
p
rin
g
e
r,
2
0
0
2
[1
8
]
Jo
o
Ye
o
n
Ch
o
,
L
in
e
a
r
Cry
p
ta
n
a
ly
sis o
f
Red
u
c
e
d
-
Ro
u
n
d
P
RE
S
EN
T
.
S
p
rin
g
e
r,
2
B
I
O
G
RAP
H
I
E
S
O
F
AUTH
O
RS
A
b
d
u
ll
a
h
Na
z
e
e
h
S
a
leh
A
b
d
u
ll
a
h
Na
z
e
e
h
S
a
leh
re
c
e
i
v
e
d
h
is
b
a
c
h
e
lo
r
d
e
g
re
e
in
Ed
u
c
a
ti
o
n
,
Co
m
p
u
ter
f
ro
m
P
u
b
li
c
A
u
th
o
rit
y
f
o
r
A
p
p
li
e
d
E
d
u
c
a
ti
o
n
a
n
d
T
ra
in
in
g
–
P
A
A
E
T
,
Ku
w
a
it
S
tate
in
2
0
1
6
.
He
is
a
M
a
ste
r
d
e
g
re
e
stu
d
e
n
t,
C
o
m
p
u
ter
S
c
ien
c
e
–
In
ter
n
a
ti
o
n
a
l
Isla
m
ic
Un
iv
e
rsity
o
f
M
a
la
y
sia
,
IIUM
a
n
d
w
o
rk
in
g
f
o
r
Ba
n
k
Bo
u
b
y
a
n
–
Ku
w
a
it
a
s
I.
T
.
S
e
rv
ice
D
e
sk
En
g
i
n
e
e
r.
A
b
d
u
ll
a
h
is
i
n
tere
ste
d
in
c
r
y
p
to
g
ra
p
h
y
re
se
a
rc
h
in
g
,
d
e
v
e
lo
p
in
g
a
n
d
h
a
s
p
u
b
li
sh
e
d
p
a
p
e
rs
o
n
c
r
y
p
to
g
ra
p
h
y
to
p
ics
.
M
o
h
a
m
m
a
d
A
b
d
u
late
e
f
A
l
A
h
m
a
d
M
o
h
a
m
m
a
d
A
b
d
u
late
e
f
A
l
A
h
m
a
d
re
c
e
iv
e
d
h
is
b
a
c
h
e
l
o
r
d
e
g
re
e
in
c
o
m
p
u
ter en
g
in
e
e
rin
g
f
ro
m
u
n
iv
e
rsity
o
f
th
e
p
a
c
if
ic i
n
2
0
0
2
,
h
is
m
a
ste
r
in
c
o
m
p
u
ter en
g
in
e
e
rin
g
f
ro
m
G
u
lf
u
n
iv
e
rsit
y
in
Ba
h
ra
in
in
2
0
1
1
,
a
n
d
h
is
P
h
D d
e
g
re
e
in
c
o
m
p
u
ter sc
ien
c
e
f
ro
m
in
tern
a
ti
o
n
a
l
Isla
m
ic Un
iv
e
rsit
y
M
a
la
y
sia
(IIUM
)
in
2
0
1
5
.
His res
e
a
rc
h
a
re
a
is
in
f
o
r
m
a
ti
o
n
se
c
u
rit
y
w
h
ich
f
o
c
u
se
s o
n
c
r
y
p
to
g
ra
p
h
ic alg
o
rit
h
m
s an
d
p
ro
t
o
c
o
ls.
M
y
f
a
v
o
u
rit
e
sp
e
c
if
ic res
e
a
rc
h
to
p
ics
a
re
d
e
sig
n
in
g
a
n
d
a
n
a
ly
sis o
f
h
a
sh
f
u
n
c
ti
o
n
s,
c
ry
p
to
c
u
rre
n
c
y
a
n
d
c
r
y
p
to
g
ra
p
h
y
in
g
e
n
e
ra
l.
M
y
f
a
v
o
rit
e
h
a
sh
f
u
n
c
ti
o
n
s are
G
e
a
r,
Do
u
b
le A
a
n
d
T
it
a
n
iu
m
c
r
y
p
to
g
ra
p
h
ic h
a
sh
f
u
n
c
ti
o
n
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.