T
E
L
K
O
M
N
I
K
A
T
elec
o
m
m
un
ica
t
io
n,
Co
m
pu
t
ing
,
E
lect
ro
nics
a
nd
Co
ntr
o
l
Vo
l.
1
9
,
No
.
4
,
A
u
g
u
s
t
2
0
2
1
,
p
p
.
1
1
1
8
~
1
1
2
5
I
SS
N:
1
6
9
3
-
6
9
3
0
,
ac
cr
ed
ited
First Gr
ad
e
b
y
Kem
en
r
is
tek
d
i
k
ti,
Dec
r
ee
No
: 2
1
/E/KPT
/2
0
1
8
DOI
: 1
0
.
1
2
9
2
8
/TE
L
KOM
NI
K
A.
v
1
9
i
4
.
1
8
7
2
1
1118
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//jo
u
r
n
a
l.u
a
d
.
a
c.
id
/in
d
ex
.
p
h
p
/TELK
OM
N
I
K
A
Desig
n and
imple
menta
tion o
f
a se
cured
S
DN
sy
ste
m ba
sed o
n
hy
brid encryp
ted
a
lg
o
rithms
Sa
m
ir
G
ha
ly
,
M
a
hm
o
o
d Z
a
k
i A
bd
ull
a
h
Co
m
p
u
ter E
n
g
in
e
e
rin
g
De
p
a
rtme
n
t,
C
o
ll
e
g
e
o
f
E
n
g
i
n
e
e
rin
g
,
M
u
sta
n
siriy
a
h
Un
i
v
e
rsity
,
Ba
g
h
d
a
d
,
Ira
q
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
No
v
1
9
,
2
0
2
0
R
ev
is
ed
Ma
r
1
,
2
0
2
1
Acc
ep
ted
Ma
r
1
0
,
2
0
2
1
S
o
ftwa
re
d
e
fin
e
d
n
e
two
rk
s
u
g
g
e
sts
c
e
n
tralizin
g
n
e
two
r
k
k
n
o
wle
d
g
e
in
o
n
e
n
e
two
rk
p
o
rti
o
n
b
y
se
p
a
ra
ti
n
g
th
e
ro
u
ti
n
g
(c
o
n
tr
o
l
p
la
n
e
)
m
e
c
h
a
n
is
m
fro
m
t
h
e
tran
sm
issio
n
n
e
two
rk
p
a
c
k
e
t
o
p
e
ra
ti
o
n
(
d
a
ta
p
lan
e
).
Th
e
c
o
n
tr
o
l
p
lan
e
is
c
o
m
p
o
se
d
o
f
o
n
e
,
tw
o
o
r
m
o
re
c
o
n
tr
o
ll
e
rs
wh
ich
a
re
c
o
n
si
d
e
re
d
a
s
s
o
ftwa
re
-
d
e
fin
e
d
n
e
two
rk
i
n
g
(
S
DN
)
n
e
t
wo
rk
b
ra
i
n
wh
e
re
th
e
re
a
l
in
te
ll
ig
e
n
c
e
is
in
c
o
rp
o
ra
ted
.
T
h
e
p
ro
c
e
ss
o
f
se
p
a
ra
ti
n
g
t
h
e
c
o
n
tro
l
u
n
it
fro
m
th
e
d
a
ta u
n
it
led
to
a
p
r
o
b
lem
re
late
d
to
p
o
o
r
se
c
u
rit
y
o
f
d
a
ta
se
n
t
i
n
th
e
n
e
two
rk
,
s
o
so
l
u
ti
o
n
s
to
t
h
e
se
p
r
o
b
lem
s
h
a
d
to
b
e
fo
u
n
d
.
In
t
h
is
p
a
p
e
r,
a
d
d
re
ss
th
is
p
ro
b
lem
b
y
imp
lem
e
n
ti
n
g
ro
b
u
st
a
l
g
o
ri
th
m
s
to
e
n
c
ry
p
t
i
n
fo
rm
a
ti
o
n
,
b
a
se
d
o
n
a
d
v
a
n
c
e
d
e
n
c
ry
p
ti
o
n
sta
n
d
a
rd
(AE
S
),
Ri
v
e
st
–
S
h
a
m
ir
–
Ad
lem
a
n
(RS
A),
a
n
d
h
y
b
ri
d
e
n
c
ry
p
ti
o
n
a
lg
o
rit
h
m
s
to
g
u
a
ra
n
tee
d
a
ta
p
ro
tec
ti
o
n
a
n
d
a
u
th
e
n
ti
c
it
y
.
Th
e
re
su
lt
s
sh
o
we
d
th
a
t
t
h
e
h
y
b
rid
c
o
d
in
g
m
e
th
o
d
is
b
e
tt
e
r
in
term
s
o
f
se
c
u
rit
y
a
n
d
imp
ro
v
e
d
t
ime
(fa
ste
r
th
a
n
R
S
A
a
lo
n
e
)
b
y
a
p
p
ly
in
g
se
v
e
ra
l
sc
e
n
a
rio
s
i
n
th
e
S
DN
n
e
two
rk
to
a
se
t
o
f
e
n
c
r
y
p
te
d
fil
e
s.
K
ey
w
o
r
d
s
:
Ad
v
a
n
c
e
d
e
n
c
r
y
p
ti
o
n
sta
n
d
a
r
d
alg
o
r
ith
m
Hy
b
r
id
alg
o
r
ith
m
Riv
e
st
–
S
h
a
m
ir
–
Ad
lem
a
n
alg
o
r
ith
m
SDN
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r
th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Sam
ir
Gh
aly
C
o
m
p
u
ter
E
n
g
in
ee
r
in
g
Dep
ar
t
m
en
t,
C
o
lleg
e
o
f
E
n
g
in
ee
r
in
g
Mu
s
tan
s
ir
iy
ah
Un
iv
er
s
ity
Al
-
B
ab
Al
-
Mu
ad
h
am
Stre
et,
B
ag
h
d
ad
,
I
r
aq
E
m
ail:
s
am
ir
8
9
g
h
aly
@
g
m
ail.
c
o
m
,
d
r
m
za
ali@
u
o
m
u
s
tan
s
ir
iy
ah
.
ed
u
.
i
q
1.
I
NT
RO
D
UCT
I
O
N
C
u
r
r
en
tly
,
I
n
ter
n
et
s
y
s
tem
s
s
u
ch
as
clo
u
d
s
er
v
ices
an
d
s
o
cial
n
etwo
r
k
s
ad
ju
s
t
th
eir
n
etwo
r
k
n
ee
d
s
d
y
n
am
ically
(
e.
g
.
,
to
p
o
lo
g
y
,
b
an
d
wid
th
r
eq
u
ir
em
en
ts
,
an
d
r
o
u
tin
g
in
f
o
r
m
atio
n
)
.
So
f
twar
e
d
ef
in
ed
n
etwo
r
k
s
was
d
ev
elo
p
ed
as
a
n
ew
n
etwo
r
k
ar
ch
itectu
r
e
to
s
o
lv
e
th
e
p
r
o
b
lem
to
m
ak
e
it
m
o
r
e
v
er
s
atile
in
s
o
f
twar
e
-
en
ab
le
d
n
etwo
r
k
c
o
n
tr
o
l.
W
ith
s
o
f
twar
e
-
d
ef
in
ed
n
etwo
r
k
in
g
(
SDN
)
,
a
ce
n
tr
alize
d
n
etwo
r
k
with
a
c
o
n
tr
o
ller
b
ased
o
n
s
o
f
twar
e
ca
n
m
ai
n
tain
th
e
n
et
wo
r
k
as
a
wh
o
le
t
o
s
im
p
lify
n
etwo
r
k
ar
c
h
itectu
r
e
a
n
d
o
p
er
a
tio
n
s
in
ce
it
is
o
n
ly
lo
g
ical
[
1
]
.
SDN
is
a
d
y
n
am
ic,
co
s
t
-
ef
f
ec
t
iv
e,
m
an
ag
ea
b
le,
an
d
ad
ap
ta
b
le
ar
ch
itectu
r
e
th
at
is
s
u
ited
f
o
r
d
y
n
a
m
ic
d
esig
n
o
f
cu
r
r
e
n
t
tech
n
o
lo
g
ies
with
h
ig
h
-
b
an
d
wid
t
h
[
2
]
.
SD
N
wo
r
k
s
to
s
tr
ip
th
e
d
ata
p
lan
e
f
r
o
m
th
e
co
n
tr
o
l
p
lan
e
an
d
p
r
o
g
r
am
m
atica
lly
i
t
co
n
tr
o
ls
th
e
f
lo
w
e
n
tr
ies
u
s
in
g
a
h
ig
h
-
le
v
el
p
r
o
g
r
a
m
.
T
h
e
SDN
co
n
tr
o
ller
co
n
v
er
ts
th
e
a
p
p
licatio
n
s
lay
e
r
s
p
ec
if
icatio
n
s
to
th
e
i
n
f
r
astru
c
tu
r
e
lay
er
i
n
s
tr
u
ctio
n
s
an
d
co
n
f
ig
u
r
atio
n
s
[
3
]
.
T
h
e
o
p
er
ato
r
s
in
SDN
ca
n
ea
s
ily
ch
an
g
e
th
e
f
l
o
w
tab
les
in
s
wi
tch
es,
an
d
th
e
co
m
p
u
tin
g
d
e
v
ices
ca
n
o
p
er
ate
as
co
n
tr
o
l
s
y
s
tem
s
to
s
im
p
lify
th
e
m
an
ag
em
en
t
an
d
u
s
ag
e
o
f
S
DNs
[
4
]
.
Sep
ar
atio
n
p
r
o
ce
s
s
lead
s
to
wea
k
en
in
g
th
e
s
ec
u
r
ity
r
atio
o
f
th
e
in
f
o
r
m
atio
n
s
en
t
in
th
e
n
etwo
r
k
,
s
o
Pro
tectio
n
o
f
d
ata
is
o
n
e
o
f
th
e
im
p
o
r
tan
t
th
i
n
g
s
th
at
r
esear
ch
er
s
ca
r
e
ab
o
u
t,
in
c
lu
d
in
g
th
e
u
s
e
o
f
en
cr
y
p
tio
n
m
eth
o
d
s
.
Pro
tectio
n
is
a
p
r
im
ar
y
co
n
ce
r
n
f
o
r
d
i
g
ital
co
n
n
ec
tio
n
s
ev
e
r
y
d
ay
[
5
]
.
E
n
cr
y
p
tio
n
ca
n
p
r
o
tect
d
ata
tr
a
n
s
f
o
r
m
atio
n
an
d
d
ata
au
th
e
n
ticatio
n
s
to
r
ag
e
[
6
]
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
Desig
n
a
n
d
imp
leme
n
ta
tio
n
o
f
a
s
ec
u
r
ed
S
DN
s
ystem
b
a
s
ed
o
n
h
yb
r
id
…
(
S
a
mir
Gh
a
ly
)
1119
I
r
f
an
et
a
l.
[
7
]
p
r
o
p
o
s
ed
d
e
v
elo
p
in
g
a
s
o
f
twar
e
s
p
ec
if
ied
n
et
wo
r
k
s
ec
u
r
ity
ar
ch
itectu
r
e
u
s
in
g
a
s
p
ec
ial
co
n
tr
o
ller
ty
p
e
(
f
lo
wv
is
o
r
)
with
ad
v
an
ce
d
en
cr
y
p
tio
n
s
tan
d
ar
d
(
AE
S
)
en
cr
y
p
tio
n
a
lg
o
r
ith
m
a
n
d
th
e
m
ea
s
u
r
em
en
t
tim
e
o
f
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
f
iles
.
C
h
ao
et
a
l.
[
8
]
s
tu
d
i
ed
h
o
w
ca
n
SDN
h
elp
to
id
en
tify
an
d
m
itig
ate
co
m
p
r
o
m
is
ed
s
witch
es
u
n
d
er
a
p
r
ac
tical
m
o
d
el
o
f
th
r
ea
t.
T
h
r
ee
p
r
o
m
is
in
g
s
tr
ateg
ies
in
tr
o
d
u
ce
d
,
co
m
p
ar
ed
an
d
ad
d
r
ess
ed
th
e
r
esear
ch
p
r
o
b
lem
s
.
First
is
to
d
etec
t
er
r
o
r
s
,
s
ec
o
n
d
is
a
way
to
d
etec
t
m
alicio
u
s
k
ey
s
,
a
n
d
th
ir
d
is
a
m
eth
o
d
o
f
m
in
im
izin
g
m
alf
u
n
ctio
n
s
b
y
en
cr
y
p
tin
g
th
e
co
n
ten
ts
o
f
th
e
p
ac
k
ag
e.
T
s
elio
s
et
a
l.
[
9
]
p
r
o
v
id
e
a
s
u
m
m
ar
y
o
f
SDN
p
r
o
tectio
n
in
co
n
n
ec
tio
n
to
in
ter
n
et
o
f
th
in
g
s
(
I
o
T
)
clo
u
d
s
,
id
en
tif
y
th
e
B
lo
ck
ch
ain
ar
ch
itectu
r
e
l
ea
d
er
s
,
an
d
ad
v
o
ca
tes
th
e
f
ac
to
r
s
th
at
m
ak
e
B
lo
ck
ch
ain
an
ef
f
ec
tiv
e
s
o
lu
tio
n
s
ec
u
r
ity
elem
en
t.
T
h
is
s
o
lu
ti
o
n
e
n
ab
les
th
e
en
cr
y
p
ted
t
r
a
n
s
m
is
s
io
n
o
f
d
ata
b
etwe
en
i
n
ter
co
n
n
ec
te
d
n
o
d
es
ir
r
esp
ec
tiv
e
o
f
n
etwo
r
k
s
ize
o
r
g
eo
g
r
a
p
h
ical
d
is
tr
ib
u
tio
n
.
M
ah
m
u
d
et
a
l.
[
1
0
]
a
n
aly
ze
th
e
p
u
b
lic
an
d
p
r
iv
ate
k
ey
g
en
er
atio
n
o
u
tp
u
t
o
f
R
iv
est
–
Sh
am
ir
–
Ad
lem
an
(
R
SA
)
an
d
e
n
ter
p
r
is
e
r
eso
u
r
ce
p
lan
n
in
g
(
E
R
P)
ce
n
tr
al
co
m
p
o
n
en
t
(
E
C
C
)
s
y
s
tem
to
p
r
o
tect
th
e
p
atien
ts
'
m
ed
ical
r
e
p
o
r
t
b
ased
o
n
a
p
o
r
tab
le
d
o
cu
m
en
t
f
o
r
m
at
(
PDF
)
f
ile
th
at
co
m
es
f
r
o
m
a
d
atab
ase
an
d
th
e
E
C
C
m
eth
o
d
r
esu
lts
,
wh
ich
g
iv
es
th
e
h
ig
h
est
in
ten
s
ity
p
er
b
it
o
f
an
y
s
m
aller
k
ey
cr
y
p
to
s
y
s
tem
.
Sh
ar
m
a
et
a
l.
[1
1]
p
r
o
p
o
s
ed
a
n
o
v
el
tech
n
i
q
u
e,
i.e
.
,
t
h
e
e
x
p
er
im
en
tal
r
esu
lts
o
f
th
e
I
L
PS
f
o
r
s
af
e
s
h
ar
in
g
o
f
c
o
n
f
id
e
n
tial
h
ea
lth
in
f
o
r
m
atio
n
in
b
ig
d
ata
b
y
e
n
ab
lin
g
f
in
e
-
g
r
ain
ed
ac
ce
s
s
u
s
in
g
th
e
R
SA
k
ey
m
ec
h
an
is
m
.
T
h
e
r
esu
lts
s
h
o
w
th
at
th
e
p
r
o
p
o
s
ed
s
o
lu
tio
n
p
r
o
te
cts
p
r
iv
ac
y
with
s
u
b
s
tan
tially
r
ed
u
ce
d
k
e
y
m
an
ag
em
en
t
co
m
p
le
x
ity
.
Sar
i
et
a
l
.
[
1
2
]
s
tu
d
y
u
s
es th
e
R
SA a
lg
o
r
ith
m
with
th
e
Gen
etic
alg
o
r
ith
m
to
g
en
e
r
ate
a
s
tr
o
n
g
er
a
n
d
m
o
r
e
q
u
ick
ly
,
a
n
d
ef
f
icien
t
p
r
ese
n
tatio
n
o
f
th
e
en
cr
y
p
tio
n
to
s
ec
u
r
ely
s
en
d
an
e
-
m
ail.
T
h
e
r
esu
lts
s
h
o
w
th
at
th
e
ad
v
an
tag
e
o
f
th
e
av
alan
ch
e
ef
f
ec
t h
as in
cr
ea
s
ed
.
T
h
u
s
,
k
e
y
o
p
tim
izatio
n
a
f
f
e
cts th
e
o
u
tp
u
t o
f
b
it
ch
an
g
es
in
th
e
d
ata
en
cr
y
p
ted
.
Fu
r
th
er
m
o
r
e
,
R
ah
m
ad
a
n
i
et
a
l.
[
1
3
]
p
r
o
p
o
s
ed
r
iv
est
cip
h
e
r
4
alg
o
r
ith
m
(
R
C
4
A
)
-
R
SA h
y
b
r
id
alg
o
r
ith
m
,
wh
ic
h
en
h
an
ce
s
R
C
4
A
k
ey
s
s
ec
u
r
ity
b
y
en
c
r
y
p
tio
n
o
f
k
ey
s
b
ef
o
r
e
s
en
d
in
g
t
h
em
to
th
e
r
ec
ip
ien
t.
R
C
4
A
en
cr
y
p
ts
th
e
d
ata,
an
d
R
SA
will
en
cr
y
p
t
t
h
e
KSA
R
C
4
A
k
ey
b
ef
o
r
e
s
en
d
in
g
it
to
r
ec
ip
ien
ts
.
T
h
e
h
y
b
r
id
alg
o
r
ith
m
o
f
e
n
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
is
8
8
.
7
7
%
q
u
ick
er
th
a
n
R
SA.
T
h
is
p
ap
er
ass
ess
es
an
d
co
n
tr
asts
th
e
p
er
f
o
r
m
an
ce
o
f
c
er
tain
en
cr
y
p
tio
n
(
AE
S+R
SA)
m
eth
o
d
s
b
ased
o
n
s
ec
u
r
ity
an
d
tim
e
.
2.
RE
S
E
ARCH
M
E
T
H
O
D
2
.
1
.
Ri
v
e
st
–
S
h
a
m
ir
–
Adl
e
m
a
n
(
RSA
)
T
h
e
R
SA
en
cr
y
p
tio
n
m
eth
o
d
is
o
n
e
o
f
th
e
m
o
s
t
co
m
m
o
n
p
u
b
lic
-
k
ey
e
n
cr
y
p
tio
n
s
tan
d
a
r
d
u
s
ed
to
p
r
o
tect
th
e
tr
an
s
m
is
s
io
n
o
f
d
at
a
[
1
4
]
.
R
SA
is
also
r
ef
e
r
r
ed
to
as
p
u
b
lic
-
k
e
y
en
c
r
y
p
tio
n
wh
e
r
e
ea
ch
u
s
er
p
r
o
d
u
ce
s
two
k
ey
s
[
1
5
]
.
T
h
e
Ov
er
all
p
r
o
ce
s
s
o
f
th
e
en
cr
y
p
tio
n
an
d
d
e
cr
y
p
tio
n
al
g
o
r
ith
m
s
h
o
wn
in
Fig
u
r
e
1
.
M
a
x
im
u
m
s
ize
o
f
k
ey
s
(
4
0
9
6
b
its
)
is
u
s
e
d
in
th
is
ar
ticle
.
To
im
p
r
o
v
e
t
h
e
r
o
b
u
s
tn
ess
o
f
th
e
al
g
o
r
ith
m
,
p
ad
d
in
g
b
it
s
will
b
e
u
s
ed
.
OAE
P
is
a
co
m
m
o
n
al
g
o
r
i
th
m
s
tan
d
ar
d
ized
i
n
PKC
S
#
1
u
s
ed
with
R
SA
alg
o
r
ith
m
to
g
en
e
r
ate
p
a
d
b
its
r
an
d
o
m
l
y
[
1
6
]
.
Fig
u
r
e
1
.
Flo
wch
ar
t
o
f
R
SA e
n
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
o
p
er
atio
n
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1693
-
6
9
3
0
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
,
Vo
l.
1
9
,
No
.
4
,
Au
g
u
s
t
2
0
2
1
:
1
1
1
8
-
1
1
2
5
1120
2
.
2
.
Ad
v
a
n
c
e
d
e
n
c
r
y
p
ti
o
n
sta
n
d
a
r
d
(AES)
NI
ST
p
r
o
p
o
s
ed
th
e
AE
S
in
2
0
0
1
[
1
7
]
.
I
t
is
a
s
y
m
m
etr
ic
-
k
ey
b
lo
ck
cip
h
e
r
[
1
8
]
.
T
h
e
k
e
y
len
g
th
o
f
AE
S
v
ar
y
in
g
b
etwe
en
1
2
8
,
1
9
2
,
a
n
d
2
5
6
b
its
[
1
9
]
.
AE
S
h
an
d
les
1
2
8
-
b
it
f
o
r
m
p
lain
tex
t
b
lo
ck
s
[
2
0
]
.
T
h
e
1
2
8
-
b
it
p
lain
tex
t
is
1
6
b
y
tes,
an
d
th
e
b
y
tes
ar
e
g
r
o
u
p
e
d
in
a
4
*
4
m
atr
ix
th
at
is
,
f
o
u
r
r
o
ws
an
d
f
o
u
r
co
lu
m
n
s
,
th
e
k
ey
len
g
th
d
ec
id
es th
e
n
u
m
b
er
o
f
r
o
u
n
d
s
t
o
b
e
p
er
f
o
r
m
ed
,
1
0
,
1
2
,
an
d
1
4
r
o
u
n
d
s
f
o
r
1
2
8
,
1
9
2
,
a
n
d
2
5
6
b
it k
ey
s
ize
,
r
esp
ec
tiv
ely
[
2
1
]
.
I
t
en
cr
y
p
ts
b
lo
ck
s
o
f
p
lain
tex
t,
ea
c
h
b
lo
c
k
co
n
tain
s
1
2
8
b
its
an
d
u
s
i
n
g
a
d
if
f
e
r
en
t
v
alu
e
o
f
k
ey
1
2
8
b
it
(
1
6
b
y
tes),
1
9
2
b
i
t
(
2
4
b
y
tes)
o
r
2
5
6
b
it
(
3
2
b
y
t
es)
d
ep
en
d
in
g
o
n
t
h
e
n
u
m
b
er
o
f
r
o
u
n
d
s
1
0
,
1
2
o
r
14
[
2
2
]
.
T
h
e
m
ax
im
u
m
s
ize
o
f
k
ey
(
2
5
6
b
its
)
ar
e
u
s
ed
in
th
is
p
ap
er
.
T
h
e
Ov
er
all
f
lo
wch
a
r
t
o
f
th
e
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
alg
o
r
ith
m
o
f
t
h
e
AE
S a
lg
o
r
ith
m
is
s
h
o
wn
in
Fig
u
r
e
2
.
Fig
u
r
e
2
.
Desig
n
f
lo
w
o
f
AE
S
alg
o
r
ith
m
[
2
3
]
2
.
3
.
H
y
brid
T
h
e
p
r
o
p
o
s
ed
cr
y
p
to
s
y
s
tem
p
r
esen
ts
a
d
ata
p
r
o
tectio
n
s
o
lu
tio
n
;
it
co
m
b
in
es
two
s
ep
ar
ate
en
cr
y
p
tio
n
alg
o
r
ith
m
s
.
B
o
th
th
e
s
y
m
m
etr
ical
an
d
asy
m
m
etr
ical
alg
o
r
ith
m
s
(
AE
S+R
SA)
ar
e
u
s
ed
an
d
th
e
s
tr
en
g
th
s
o
f
th
e
two
alg
o
r
ith
m
s
ar
e
in
co
r
p
o
r
at
e
d
in
th
e
h
y
b
r
id
e
n
cr
y
p
tio
n
s
y
s
t
em
.
I
n
g
en
er
al,
th
e
p
u
b
lic
a
n
d
p
r
iv
ate
k
e
y
r
em
ai
n
s
m
o
r
e
s
ec
u
r
e
with
h
y
b
r
i
d
e
n
cr
y
p
tio
n
cip
h
e
r
s
,
wh
ich
m
ak
es
th
is
h
y
b
r
id
al
g
o
r
ith
m
less
v
u
ln
er
ab
le
to
en
cr
y
p
tio
n
[
2
4
]
.
I
t h
y
b
r
id
izes th
e
asy
m
m
etr
ic
k
e
y
,
k
e
y
ex
ch
a
n
g
e
an
d
s
ec
r
et
s
h
ar
in
g
[
2
5
]
.
2
.
3
.
1
.
H
y
brid
a
lg
o
ri
t
hm
f
o
r
e
ncry
ptio
n
a
nd
decr
y
ptio
n
f
ile
s
T
h
e
o
r
ig
in
al
d
ata
will
b
e
e
n
cr
y
p
ted
b
y
AE
S
alg
o
r
ith
m
u
s
in
g
2
5
6
b
its
o
f
k
ey
len
g
th
t
o
g
e
n
er
ate
en
cr
y
p
ted
tex
t.
AE
S
k
ey
is
en
cr
y
p
ted
b
y
u
s
in
g
4
0
9
6
-
b
it
p
u
b
lic
k
ey
o
f
th
e
R
SA
alg
o
r
ith
m
to
g
u
ar
a
n
tee
th
e
p
r
o
tectio
n
o
f
th
e
AE
S
alg
o
r
ith
m
,
an
d
an
in
s
ec
u
r
e
th
i
r
d
p
ar
t
y
ca
n
n
o
t
ac
ce
s
s
th
e
k
ey
.
T
h
e
d
e
cr
y
p
tio
n
p
r
o
ce
s
s
is
th
e
o
p
p
o
s
ite
o
f
en
c
r
y
p
tio
n
.
T
h
e
R
SA p
r
iv
ate
k
ey
is
u
s
ed
to
d
ec
o
d
e
th
e
n
ew
e
n
cr
y
p
ted
k
e
y
t
o
g
et
th
e
AE
S k
ey
.
Fin
ally
,
AE
S
k
ey
d
ec
r
y
p
ts
th
e
en
cr
y
p
ted
tex
t
to
g
et
th
e
o
r
ig
in
al
d
ata
.
T
h
e
b
lo
ck
d
iag
r
am
o
f
t
h
e
h
y
b
r
id
alg
o
r
ith
m
f
ile
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
m
eth
o
d
s
is
s
h
o
wn
in
Fig
u
r
e
3
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
Desig
n
a
n
d
imp
leme
n
ta
tio
n
o
f
a
s
ec
u
r
ed
S
DN
s
ystem
b
a
s
ed
o
n
h
yb
r
id
…
(
S
a
mir
Gh
a
ly
)
1121
(
a)
(
b
)
Fig
u
r
e
3
.
B
lo
ck
d
iag
r
am
o
f
th
e
h
y
b
r
i
d
alg
o
r
ith
m
:
(
a)
f
ile
en
cr
y
p
tio
n
m
eth
o
d
,
(
b
)
f
ile
d
ec
r
y
p
tio
n
m
et
h
o
d
2
.
4
.
M
ini
net
T
h
e
m
o
s
t
co
m
m
o
n
ly
u
s
ed
n
et
wo
r
k
s
im
u
lato
r
is
Min
in
e
t.
I
n
a
p
er
s
o
n
al
co
m
p
u
ter
,
c
r
ea
te
a
n
etwo
r
k
an
d
d
ev
elo
p
th
e
s
er
v
ices
ca
n
b
e
d
o
n
e
b
y
th
e
u
s
er
s
[
2
6
]
.
I
t
u
s
es
th
e
v
ir
tu
aliza
tio
n
o
f
OS
-
lev
els
to
p
r
o
v
id
e
r
ap
id
s
im
u
latio
n
s
p
ee
d
s
an
d
s
ca
lab
ilit
y
s
tr
en
g
th
s
;
t
h
e
Op
en
Flo
w
p
r
o
to
co
l
is
wh
o
lly
s
u
p
p
o
r
te
d
an
d
wo
r
k
s
with
o
p
en
-
s
o
u
r
ce
d
SDN
p
r
o
jects
[
2
7
]
.
Min
in
et
is
s
im
p
ler
to
u
s
e
t
h
an
an
y
o
t
h
er
s
im
u
latio
n
en
v
ir
o
n
m
en
t,
an
d
is
also
o
p
en
s
o
u
r
ce
[
2
8
]
.
T
h
r
ee
s
ce
n
ar
io
s
f
o
r
SDN
t
o
p
o
lo
g
ies
(
s
in
g
le,
lin
ea
r
,
an
d
tr
ee
)
as
s
h
o
wn
in
F
ig
u
r
es
4
(
a
)
,
(
b
)
,
an
d
(
c
)
r
esp
ec
tiv
ely
.
Data
s
en
t
d
u
r
in
g
th
ese
s
ce
n
ar
io
s
is
p
r
o
t
ec
ted
u
s
in
g
th
e
h
y
b
r
id
alg
o
r
ith
m
.
(
a)
(
b
)
(
c)
Fig
u
r
e
4
.
SDN
s
ce
n
ar
io
s
:
(
a)
s
in
g
le
SDN
to
p
o
lo
g
y
,
(
b
)
lin
ea
r
SDN
to
p
o
lo
g
y
,
(
c)
tr
ee
SDN
to
p
o
lo
g
y
3.
E
XP
E
R
I
M
E
N
T
S
Py
th
o
n
3
.
8
lan
g
u
ag
e
to
co
n
s
tr
u
ct
th
e
alg
o
r
ith
m
,
u
n
d
e
r
W
in
d
o
ws
1
0
6
4
-
b
it,
th
e
Vis
u
al
Stu
d
io
C
o
d
e
C
o
m
p
ilatio
n
Platfo
r
m
is
u
s
ed
in
th
is
s
tu
d
y
.
T
h
e
C
PU
I
NT
E
L
®
co
r
e(
T
M)
i3
-
2
3
1
0
M
@
2
.
1
GHz
,
R
AM
4
G
B
DDR3
an
d
HARD
3
2
0
GB
ar
e
d
ev
ice
s
p
ec
if
icatio
n
s
u
s
ed
.
T
h
e
ex
p
e
r
im
en
t
f
iles
ty
p
e
is
"
.
tx
t".
T
h
e
r
esu
lts
in
th
is
p
ap
er
d
e
p
en
d
o
n
th
r
ee
ap
p
r
o
ac
h
es a
s
s
h
o
wn
b
elo
w.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1693
-
6
9
3
0
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
,
Vo
l.
1
9
,
No
.
4
,
Au
g
u
s
t
2
0
2
1
:
1
1
1
8
-
1
1
2
5
1122
3
.
1
.
S
ec
uring
da
t
a
Secu
r
in
g
d
ata
s
en
t
in
SDN
n
et
wo
r
k
b
y
u
s
in
g
r
eliab
le
alg
o
r
ith
m
s
,
wh
ich
ar
e
AE
S
an
d
R
SA
a
lg
o
r
ith
m
s
,
an
d
b
u
ild
in
g
th
em
in
a
way
t
h
at
r
ed
u
ce
s
d
elay
tim
e,
im
p
r
o
v
ed
d
ata
s
ec
u
r
ity
,
an
d
co
m
p
a
r
es
r
esu
lts
with
th
e
p
u
b
lis
h
ed
r
esear
ch
I
s
r
aa
Hash
i
m
L
atif
[
2
9
]
.
Dif
f
er
en
t
s
izes
o
f
tex
t
f
iles
wer
e
u
s
ed
.
T
h
e
r
esu
lts
s
h
o
wed
im
p
r
o
v
em
e
n
t
in
tim
e
(
s
lig
h
tly
h
ig
h
er
th
a
n
th
e
AE
S
alg
o
r
ith
m
an
d
m
u
ch
less
th
an
th
e
R
SA
alg
o
r
ith
m
)
,
as
s
h
o
wn
in
T
ab
le
1
.
T
h
e
o
p
er
atio
n
s
tim
e
is
s
h
o
wn
in
F
ig
u
r
e
5
T
ab
le
1
.
T
o
tal
AE
S,
R
SA a
n
d
h
y
b
r
id
alg
o
r
ith
m
s
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
tim
e
Te
x
t
f
i
l
e
si
z
e
A
ES To
t
a
l
T
i
me
(
S
e
c
.
)
R
S
A
T
o
t
a
l
Ti
m
e
(
S
e
c
.
)
H
y
b
r
i
d
To
t
a
l
T
i
me
(
S
e
c
.
)
9
1
5
K
B
0
.
0
5
0
.
5
7
0
.
5
4
5
.
3
8
4
M
B
0
.
1
8
4
1
.
2
2
0
.
6
7
1
1
.
8
0
4
M
B
0
.
4
1
2
.
1
7
0
.
9
0
3
5
.
3
5
0
M
B
1
.
2
4
6
.
2
2
1
.
7
3
5
9
.
8
0
9
M
B
2
.
1
1
0
.
3
2
.
5
9
1
0
6
M
B
3
.
7
7
1
8
.
7
8
4
.
2
6
Fig
u
r
e
5
.
Op
e
r
atio
n
s
tim
e
3
.
2
.
T
hro
ug
hp
ut
T
h
e
p
r
o
d
u
ctio
n
r
ate
o
r
th
e
r
at
e
at
wh
ich
s
o
m
eth
in
g
is
p
r
o
d
u
ce
d
is
th
e
th
r
o
u
g
h
p
u
t.
T
o
ca
lcu
late
th
e
th
r
o
u
g
h
p
u
t
f
o
r
ea
ch
alg
o
r
ith
m
b
y
d
iv
id
in
g
th
e
s
u
m
o
f
tr
an
s
m
itted
f
iles
s
ize
b
y
alg
o
r
ith
m
to
tal
ev
alu
atio
n
T
im
e
f
o
r
c
o
d
in
g
an
d
d
ec
o
d
in
g
o
p
e
r
atio
n
s
[
2
4
]
.
T
h
r
o
u
g
h
p
u
t
o
f
AE
S,
R
S
A,
an
d
h
y
b
r
id
alg
o
r
ith
m
s
,
as
s
h
o
wn
in
T
ab
le
2
.
T
h
e
th
r
o
u
g
h
p
u
t
i
n
(
MB/S
ec
.
)
o
f
AE
S,
R
SA,
an
d
h
y
b
r
id
alg
o
r
ith
m
s
is
s
h
o
wn
in
F
ig
u
r
e
6
.
T
h
e
r
esu
lts
s
h
o
wed
in
cr
ea
s
ed
th
r
o
u
g
h
p
u
t
co
m
p
ar
ed
to
th
e
r
e
s
u
lts
o
f
I
s
r
a
a
Hash
im
L
atif
[
2
9
]
.
Ta
b
le
2
.
T
h
r
o
u
g
h
p
u
t v
alu
e
s
To
t
a
l
F
i
l
e
s S
i
z
e
A
ES
-
Th
r
o
u
g
h
p
u
t
R
S
A
-
Th
r
o
u
g
h
p
u
t
H
y
b
r
i
d
-
T
h
r
o
u
g
h
p
u
t
2
1
9
.
2
4
M
B
1
6
9
.
9
5
3
3
.
5
2
1
2
3
.
1
6
Fig
u
r
e
6
.
T
h
r
o
u
g
h
p
u
t
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
Desig
n
a
n
d
imp
leme
n
ta
tio
n
o
f
a
s
ec
u
r
ed
S
DN
s
ystem
b
a
s
ed
o
n
h
yb
r
id
…
(
S
a
mir
Gh
a
ly
)
1123
3
.
3
.
SDN
n
et
wo
rk
T
h
e
f
iles
en
cr
y
p
te
d
u
s
in
g
t
h
e
h
y
b
r
id
alg
o
r
ith
m
will
b
e
s
en
t
in
th
e
SDN
n
etwo
r
k
in
t
h
r
ee
s
ce
n
ar
io
s
(
s
in
g
le,
lin
ea
r
,
an
d
tr
ee
)
.
HPE
VAN
co
n
tr
o
ller
is
u
s
ed
[
3
0
]
.
T
h
e
tim
e
tak
en
f
o
r
tr
an
s
m
is
s
io
n
as
s
h
o
wn
in
th
e
T
ab
le
3
.
T
o
tal
tr
an
s
m
is
s
io
n
tim
e
o
f
f
iles
th
r
o
u
g
h
SDN
n
etw
o
r
k
as
s
h
o
wn
in
T
ab
le
4
.
T
h
e
F
ig
u
r
e
7
s
h
o
wn
th
e
s
en
d
in
g
tim
e
o
f
f
iles
.
Fig
u
r
e
8
s
h
o
ws th
e
o
v
er
all
tim
e
f
o
r
s
en
d
in
g
f
iles
th
r
o
u
g
h
SDN
n
etwo
r
k
.
T
ab
le
3
.
Fil
es t
r
an
s
m
is
s
io
n
tim
e
th
r
o
u
g
h
SDN
n
etwo
r
k
En
c
r
y
p
t
e
d
t
e
x
t
f
i
l
e
s
S
i
n
g
l
e
t
o
p
o
l
o
g
y
(
S
e
c
.
)
Li
n
e
a
r
t
o
p
o
l
o
g
y
(
S
e
c
.
)
Tr
e
e
t
o
p
o
l
o
g
y
(
S
e
c
.
)
Te
x
t
1
.
e
n
c
r
y
p
t
e
d
0
.
0
1
0
.
0
1
6
0
.
0
1
8
Te
x
t
2
.
e
n
c
r
y
p
t
e
d
0
.
0
3
0
.
0
4
0
.
0
7
Te
x
t
3
.
e
n
c
r
y
p
t
e
d
0
.
0
6
5
0
.
0
7
0
.
1
Te
x
t
4
.
e
n
c
r
y
p
t
e
d
0
.
2
0
.
2
5
0
.
3
Te
x
t
5
.
e
n
c
r
y
p
t
e
d
0
.
3
0
.
5
0
.
5
4
Te
x
t
6
.
e
n
c
r
y
p
t
e
d
0
.
7
1
1
.
2
T
ab
le
4
.
T
o
tal
t
r
an
s
m
is
s
io
n
tim
e
o
f
f
iles
th
r
o
u
g
h
SDN
n
etw
o
r
k
To
p
o
l
o
g
y
S
i
n
g
l
e
t
o
p
o
l
o
g
y
(
S
e
c
.
)
Li
n
e
a
r
t
o
p
o
l
o
g
y
(
S
e
c
.
)
Tr
e
e
t
o
p
o
l
o
g
y
(
S
e
c
.
)
To
t
a
l
t
i
me
o
f
a
l
l
e
n
c
r
y
p
t
e
d
f
i
l
e
s
1
.
3
0
5
1
.
8
7
6
2
.
2
2
8
Fig
u
r
e
7
.
Sen
d
in
g
tim
e
o
f
f
iles
Fig
u
r
e
8
.
Ov
e
r
all
tim
e
f
o
r
s
en
d
in
g
f
iles
th
r
o
u
g
h
SDN
n
etwo
r
k
4.
CO
NCLU
SI
O
N
B
ased
o
n
th
e
r
esu
lts
m
en
tio
n
e
d
ab
o
v
e,
it
is
p
o
s
s
ib
le
to
in
f
er
th
at
th
e
AE
S
-
R
SA
h
y
b
r
id
al
g
o
r
ith
m
ca
n
b
o
o
s
t
s
ec
u
r
ity
b
y
en
cr
y
p
tin
g
k
ey
s
in
d
is
tr
ib
u
tin
g
AE
S
k
ey
s
b
ef
o
r
e
s
en
d
in
g
it
to
th
e
r
ec
ip
ien
t.
Acc
o
r
d
in
g
to
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
m
eth
o
d
s
,
th
e
h
y
b
r
i
d
AE
S
-
R
SA
alg
o
r
ith
m
is
7
2
.
7
7
%
f
aster
th
an
R
SA.
T
h
e
f
iles
en
co
d
ed
b
y
th
e
h
y
b
r
id
m
eth
o
d
wer
e
s
en
t
th
r
o
u
g
h
t
h
e
SDN
n
etwo
r
k
in
th
r
ee
s
ce
n
ar
io
s
(
s
in
g
l
e,
lin
ea
r
,
an
d
tr
ee
)
,
wh
er
e
th
e
r
esu
lts
s
h
o
wed
th
at
a
s
in
g
le
to
p
o
lo
g
y
r
ep
r
esen
tat
io
n
o
f
th
e
n
etwo
r
k
g
iv
es
less
tim
e
wh
ile
s
en
d
in
g
f
iles
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1693
-
6
9
3
0
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
,
Vo
l.
1
9
,
No
.
4
,
Au
g
u
s
t
2
0
2
1
:
1
1
1
8
-
1
1
2
5
1124
ACK
NO
WL
E
DG
E
M
E
NT
Ma
n
y
th
an
k
s
f
o
r
Mu
s
tan
s
ir
iy
ah
Un
iv
er
s
ity
(
www.
Uo
m
u
s
tan
s
ir
iy
ah
.
ed
u
.
iq
)
B
ag
h
d
ad
,
I
r
aq
,
an
d
r
ev
iewe
r
s
.
RE
F
E
R
E
NC
E
S
[1
]
V.
M
o
n
it
a
,
I
.
D.
Ira
wa
ti
a
n
d
R
.
Tu
ll
o
h
,
“
Co
m
p
a
riso
n
o
f
ro
u
ti
n
g
p
ro
t
o
c
o
l
p
e
rfo
rm
a
n
c
e
o
n
m
u
l
ti
m
e
d
ia
se
rv
ice
s
o
n
so
ftwa
re
d
e
fin
e
d
n
e
two
rk
,
”
Bu
ll
e
ti
n
o
f
El
e
c
trica
l
E
n
g
i
n
e
e
rin
g
a
n
d
In
fo
rm
a
ti
c
s
,
v
o
l.
9
,
n
o
.
4
,
p
p
.
1
6
1
2
-
1
6
1
9
,
A
u
g
.
2
0
2
0
,
d
o
i:
1
0
.
1
1
5
9
1
/ee
i.
v
9
i4
.
2
3
8
9
.
[2
]
L.
Ert
a
u
l
,
K.
Ve
n
k
a
tac
h
a
lam
a
n
d
N.
S
tar,
“
S
e
c
u
rit
y
o
f
so
ftwa
re
d
e
f
in
e
d
n
e
two
rk
s
(
S
DN
),
”
ICW
N’1
7
-
1
6
t
h
In
t’l
Co
n
f
W
ire
l.
Ne
two
rk
s
,
v
o
l.
1
7
,
n
o
.
4
,
p
p
.
2
4
-
3
0
,
2
0
1
7
.
[3
]
B.
M
lad
e
n
o
v
a
n
d
G
.
Ili
e
v
,
“
Op
t
ima
l
so
ftwa
re
-
d
e
fin
e
d
n
e
two
rk
t
o
p
o
lo
g
y
f
o
r
d
istri
b
u
te
d
d
e
n
ial
o
f
se
rv
ice
a
tt
a
c
k
m
it
ig
a
ti
o
n
,
”
Bu
ll
e
ti
n
o
f
E
lec
trica
l
En
g
in
e
e
rin
g
a
n
d
In
f
o
rm
a
ti
c
s
,
v
o
l.
9
,
n
o
.
6
,
p
p
.
2
5
8
8
-
2
5
9
4
,
De
c
.
2
0
2
0
,
d
o
i:
1
0
.
1
1
5
9
1
/ee
i.
v
9
i
6
.
2
5
8
1
.
[4
]
S
.
Ya
n
g
,
L
.
Cu
i
,
Z.
C
h
e
n
a
n
d
W.
Xia
o
,
“
An
Eff
icie
n
t
a
p
p
ro
a
c
h
to
ro
b
u
st
S
DN
c
o
n
tr
o
ll
e
r
p
lac
e
m
e
n
t
fo
r
se
c
u
rit
y
,
”
IEE
E
T
ra
n
s.
Ne
tw.
S
e
rv
.
M
a
n
a
g
.
,
v
o
l
.
1
7
,
n
o
.
3
,
p
p
.
1
6
6
9
-
1
6
8
2
,
S
e
p
t.
2
0
2
0
,
d
o
i:
1
0
.
1
1
0
9
/T
NSM
.
2
0
2
0
.
2
9
9
4
8
3
7
.
[5
]
M
.
A
.
A.
K.
Al
-
Da
b
b
a
s,
A.
Ala
b
a
ich
i
a
n
d
A.
S
.
Ab
b
a
s,
“
Du
a
l
m
e
t
h
o
d
c
ry
p
to
g
ra
p
h
y
ima
g
e
b
y
two
f
o
rc
e
se
c
u
re
a
n
d
ste
g
a
n
o
g
ra
p
h
y
se
c
re
t
m
e
ss
a
g
e
in
Io
T
,
”
T
EL
KOM
NIKA
T
e
lec
o
mm
u
n
ica
ti
o
n
C
o
mp
u
ti
n
g
El
e
c
tro
n
ics
a
n
d
Co
n
tro
l
.
,
v
o
l.
1
8
,
n
o
.
6
,
p
p
.
2
9
2
8
-
2
9
3
9
,
De
c
.
2
0
2
0
,
d
o
i:
1
0
.
1
2
9
2
8
/T
EL
KO
M
NIK
A.v
1
8
i
6
.
1
5
8
4
7
.
[6
]
A.
W.
A.
Qa
d
e
r,
I
.
E.
S
a
lem
a
n
d
H.
R.
Ab
d
u
lsh
a
h
e
e
d
,
“
A
n
e
w
a
l
g
o
rit
h
m
f
o
r
imp
lem
e
n
ti
n
g
m
e
ss
a
g
e
a
u
th
e
n
ti
c
a
ti
o
n
a
n
d
i
n
teg
rit
y
in
s
o
ftwa
re
imp
lem
e
n
tatio
n
s,”
T
E
L
KOM
NIKA
T
e
lec
o
mm
u
n
ica
ti
o
n
Co
m
p
u
ti
n
g
El
e
c
tro
n
ics
a
n
d
Co
n
tro
l
,
v
o
l.
1
8
,
n
o
.
5
,
p
p
.
2
5
4
3
-
2
5
4
8
,
Oc
t.
2
0
2
0
,
d
o
i:
1
0
.
1
2
9
2
8
/
TE
LKOM
NIK
A.V1
8
I5
.
1
5
2
7
6
.
[7
]
A.
Irfa
n
,
N.
Taj
a
n
d
S
.
A.
M
a
h
m
u
d
,
“
A
n
o
v
e
l
se
c
u
re
S
DN
/L
TE
b
a
se
d
a
rc
h
it
e
c
tu
re
fo
r
sm
a
rt
g
rid
se
c
u
rit
y
,
”
Pro
c
.
1
5
t
h
IEE
E
In
t
.
Co
n
f.
C
o
mp
u
t.
I
n
f.
T
e
c
h
n
o
l.
CI
T
2
0
1
5
,
1
4
t
h
IEE
E
In
t.
C
o
n
f
.
Ub
i
q
u
i
to
u
s
Co
mp
u
t.
Co
mm
u
n
.
IUCC
2
0
1
5
,
1
3
th
I
EE
E
I
n
t.
C
o
n
f.
De
p
e
n
d
a
b
le,
A
u
to
n
.
S
e
.
,
2
0
1
5
,
d
o
i:
1
0
.
1
1
0
9
/CIT
/IUCC/DASC/
P
ICOM
.
2
0
1
5
.
1
1
2
.
[8
]
T.
W.
Ch
a
o
,
e
t
a
l
.
,
“
S
e
c
u
rin
g
d
a
ta
p
lan
e
s
in
so
ftwa
re
-
d
e
fi
n
e
d
n
e
tw
o
rk
s,”
IEE
E
NET
S
OFT
2
0
1
6
-
2
0
1
6
IEE
E
Ne
tS
o
ft
Co
n
f.
W
o
rk
.
S
o
ft
w
a
re
-
De
fi
n
e
d
In
fra
stru
c
t
.
Ne
two
rk
s,
C
lo
u
d
s,
Io
T
S
e
rv
.
,
2
0
1
6
,
p
p
.
4
6
5
-
4
7
0
,
d
o
i:
1
0
.
1
1
0
9
/NET
S
O
F
T.
2
0
1
6
.
7
5
0
2
4
8
6
.
[9
]
C.
Tse
li
o
s,
I.
P
o
li
ti
s
a
n
d
S
.
K
o
tso
p
o
u
lo
s,
“
En
h
a
n
c
in
g
S
DN
se
c
u
rit
y
fo
r
io
t
-
re
late
d
d
e
p
l
o
y
m
e
n
ts
th
r
o
u
g
h
b
l
o
c
k
c
h
a
i
n
,
”
2
0
1
7
IE
EE
Co
n
f.
Ne
tw.
Fu
n
c
t.
Vi
rtu
a
l
iza
ti
o
n
S
o
ft
w.
De
fi
n
.
Ne
tw
o
rk
s,
NFV
-
S
DN
2
0
1
7
,
2
0
1
7
,
d
o
i:
1
0
.
1
1
0
9
/NF
V
-
S
DN
.
2
0
1
7
.
8
1
6
9
8
6
0
.
[1
0
]
A.
H.
M
a
h
m
u
d
,
B
.
W
.
An
g
g
a
,
To
m
m
y
,
A.
E.
M
a
rwa
n
a
n
d
R.
S
ireg
a
r,
“
P
e
rfo
rm
a
n
c
e
a
n
a
ly
sis
o
f
AES
-
Blo
wfish
h
y
b
ri
d
a
lg
o
rit
h
m
fo
r
se
c
u
rit
y
o
f
p
a
ti
e
n
t
m
e
d
ica
l
re
c
o
rd
d
a
ta,”
J
.
Ph
y
s.
Co
n
f.
S
e
r.
,
v
o
l
.
1
0
0
7
,
n
o
.
1
,
2
0
1
8
,
d
o
i:
1
0
.
1
0
8
8
/1
7
4
2
-
6
5
9
6
/
1
0
0
7
/
1
/0
1
2
0
1
8
.
[1
1
]
K.
S
h
a
rm
a
,
A.
Ag
ra
wa
l,
D.
P
a
n
d
e
y
,
R.
A.
Kh
a
n
a
n
d
S
.
K.
Di
n
k
a
r,
“
RS
A
b
a
se
d
e
n
c
ry
p
ti
o
n
a
p
p
ro
a
c
h
fo
r
p
re
se
rv
i
n
g
c
o
n
fid
e
n
ti
a
li
t
y
o
f
b
i
g
d
a
ta,”
J
.
Ki
n
g
S
a
u
d
U
n
iv.
-
Co
m
p
u
t
.
In
f.
S
c
i.
,
Oc
t.
2
0
1
9
,
d
o
i:
1
0
.
1
0
1
6
/j
.
j
k
su
c
i.
2
0
1
9
.
1
0
.
0
0
6
.
[1
2
]
I.
C.
S
a
ri,
M
.
Zarlis
a
n
d
T.
T
u
lu
s,
“
Op
ti
m
iza
ti
o
n
o
f
d
a
ta en
c
ry
p
ti
o
n
m
o
d
e
li
n
g
u
sin
g
RS
A
c
ry
p
t
o
g
ra
p
h
y
a
lg
o
rit
h
m
a
s
se
c
u
rit
y
e
-
m
a
il
d
a
ta
,
”
J
.
P
h
y
s.
Co
n
f.
S
e
r.
,
v
o
l.
1
4
7
1
,
n
o
.
1
,
2
0
2
0
,
d
o
i:
1
0
.
1
0
8
8
/1
7
4
2
-
6
5
9
6
/
1
4
7
1
/
1
/0
1
2
0
6
8
.
[1
3
]
R.
Ra
h
m
a
d
a
n
i
,
T
.
T
.
A
.
P
u
tri
,
S
.
S
ria
d
h
i,
R.
D.
S
a
ri
a
n
d
H.
D
.
Hu
tah
a
e
a
n
,
“
Da
ta
se
c
u
rit
y
sy
ste
m
u
sin
g
h
y
b
ri
d
c
ry
p
to
s
y
ste
m
RC4
A
-
RS
A
a
lg
o
rit
h
m
,
”
IOP
Co
n
f.
S
e
r.
M
a
ter
.
S
c
i.
E
n
g
.
,
v
o
l.
8
3
0
,
n
o
.
3
,
M
a
y
2
0
2
0
,
d
o
i
:
1
0
.
1
0
8
8
/
1
7
5
7
-
8
9
9
X/
8
3
0
/
3
/0
3
2
0
0
8
.
[1
4
]
W.
S
u
silo
,
J.
T
o
n
ie
n
a
n
d
G
.
Ya
n
g
,
“
Div
id
e
a
n
d
c
a
p
tu
re
:
A
n
im
p
ro
v
e
d
c
ry
p
tan
a
ly
sis
o
f
th
e
e
n
c
r
y
p
ti
o
n
sta
n
d
a
r
d
a
lg
o
rit
h
m
RS
A,”
Co
m
p
u
t
.
S
ta
n
d
.
In
ter
fa
c
e
s
,
v
o
l.
7
4
,
F
e
b
.
2
0
2
1
,
d
o
i
:
1
0
.
1
0
1
6
/j
.
c
si.
2
0
2
0
.
1
0
3
4
7
0
.
[1
5
]
T.
P
.
Im
e
si
-
il
e
a
n
d
O.
S
tate
,
“
Vill
a
n
o
v
a
jo
u
rn
a
l
o
f
sc
ien
c
e
,
tec
h
n
o
l
o
g
y
a
n
d
m
a
n
a
g
e
m
e
n
t
,
”
Vi
ll
a
n
o
v
a
J
.
S
c
i.
T
e
c
h
n
o
l.
M
a
n
a
g
.
,
v
o
l
.
1
,
n
o
.
1
,
p
p
.
4
2
–
5
1
,
2
0
1
9
.
[1
6
]
S
.
S
e
l
v
a
k
u
m
a
r,
S
.
Ba
id
a
n
d
V.
S
h
a
h
,
“
S
e
c
u
re
S
h
a
rin
g
o
f
Da
ta
in
P
ri
v
a
te
Clo
u
d
b
y
R
S
A
-
OA
EP
Al
g
o
ri
th
m
,
”
v
o
l.
1
1
5
,
n
o
.
6
,
p
p
.
6
8
9
-
6
9
5
,
2
0
1
7
.
[1
7
]
S
.
Kh
u
d
h
a
ir
S
a
lah
,
W.
Ra
sh
e
e
d
Hu
m
o
o
d
,
A.
Ot
h
m
a
n
Kh
a
laf
a
n
d
Z.
Kh
y
io
o
n
A
b
d
a
lrd
h
a
,
“
S
u
b
jec
t
Re
v
iew
:
Co
m
p
a
riso
n
Be
twe
e
n
3
DES
,
AES
a
n
d
HiS
e
a
Alg
o
rit
h
m
s,”
In
t
.
J
.
S
c
i.
Res
.
S
c
i.
En
g
.
T
e
c
h
n
o
l.
,
De
c
.
2
0
1
9
,
d
o
i:
1
0
.
3
2
6
2
8
/
ij
srs
e
t1
9
6
6
2
5
.
[1
8
]
R.
Nig
o
ti
,
M
.
J
h
u
ria
a
n
d
S
.
S
in
g
h
,
“
A
s
u
rv
e
y
o
f
c
ry
p
t
o
g
ra
p
h
ic
a
l
g
o
rit
h
m
s
f
o
r
c
l
o
u
d
c
o
m
p
u
t
in
g
,
”
Cl
o
u
d
Co
m
p
u
ti
n
g
,
M
a
y
2
0
1
3
.
[1
9
]
S
.
Zain
e
l
d
e
e
n
a
n
d
A.
Ate
,
“
Im
p
r
o
v
e
d
c
lo
u
d
d
a
ta
tran
sfe
r
se
c
u
rit
y
u
sin
g
h
y
b
rid
e
n
c
ry
p
ti
o
n
a
l
g
o
r
it
h
m
,
”
In
d
o
n
e
s.
J
.
El
e
c
tr.
En
g
.
Co
m
p
u
t
.
S
c
i.
,
v
o
l.
2
0
,
n
o
.
1
,
p
p
.
5
2
1
-
5
2
7
,
2
0
2
0
,
d
o
i:
1
0
.
1
1
5
9
1
/i
jee
c
s.v
2
0
.
i
1
.
p
p
5
2
1
-
5
2
7
.
[2
0
]
A
.
Y.
Hin
d
i,
“
A
n
o
v
e
l
m
e
th
o
d
fo
r
d
i
g
it
a
l
d
a
ta
e
n
c
o
d
in
g
-
d
e
c
o
d
in
g
,
”
T
EL
KOM
NIKA
T
e
lec
o
mm
u
n
ica
ti
o
n
Co
mp
u
ti
n
g
El
e
c
tro
n
ics
a
n
d
C
o
n
tro
l
,
v
o
l.
1
8
,
n
o
.
5
,
p
p
.
2
7
7
2
-
2
7
7
9
,
Oc
t.
2
0
2
0
,
d
o
i:
1
0
.
1
2
9
2
8
/
TE
LKOMNIKA.v
1
8
i
5
.
1
4
2
7
9
.
[2
1
]
V.
S
.
A
p
a
rn
a
,
A.
Ra
jan
,
I
.
Ja
iraj,
a
n
d
B.
Na
n
d
i
ta,
P
.
M
a
d
h
u
s
o
o
d
a
n
a
n
a
n
d
A.
A.
S
.
Re
m
y
a
,
“
Im
p
lem
e
n
tatio
n
o
f
AES
a
lg
o
rit
h
m
o
n
tex
t
a
n
d
ima
g
e
u
si
n
g
M
ATLAB,
”
Pro
c
.
In
t
.
Co
n
f.
T
re
n
d
s
El
e
c
tro
n
.
I
n
f
o
rm
a
ti
c
s,
2
0
1
9
,
d
o
i:
1
0
.
1
1
0
9
/ICOEI.
2
0
1
9
.
8
8
6
2
7
0
3
.
[2
2
]
A.
K.
Be
rm
a
n
i,
M
.
E.
M
a
n
a
a
a
n
d
A.
Al
-
S
a
li
h
,
“
Eff
icie
n
t
c
ry
p
to
g
ra
p
h
y
tec
h
n
iq
u
e
s
fo
r
ima
g
e
e
n
c
ry
p
ti
o
n
i
n
c
l
o
u
d
sto
ra
g
e
,
”
Per
io
d
.
E
n
g
.
Na
t
.
S
c
i.
,
v
o
l.
8
,
n
o
.
3
,
p
p
.
1
3
5
9
-
1
3
7
3
,
2
0
2
0
,
d
o
i:
1
0
.
2
1
5
3
3
/
p
e
n
.
v
8
i3
.
1
4
6
5
.
g
6
1
9
.
[2
3
]
Ve
n
k
a
tes
h
a
G.
,
Din
e
sh
S
.
,
a
n
d
M
a
n
ju
n
a
th
M
.
,
“
AES
b
a
se
d
a
lg
o
rit
h
m
f
o
r
ima
g
e
e
n
c
ry
p
ti
o
n
a
n
d
d
e
c
ry
p
ti
o
n
,
”
Per
sp
e
c
ti
v
e
s in
c
o
mm
u
n
ica
ti
o
n
,
E
mb
e
d
d
e
d
-
S
y
ste
ms
a
n
d
S
i
g
n
a
l
-
Pr
o
c
e
ss
in
g
,
v
o
l.
2
,
n
o
.
1
1
,
p
p
.
3
4
2
-
3
4
5
,
F
e
b
.
2
0
1
9
.
[2
4
]
E.
Ji
n
tch
a
ra
d
z
e
a
n
d
M
.
Ia
v
ich
,
“
Hy
b
ri
d
imp
lem
e
n
tatio
n
o
f
Tw
o
fis
h
,
AE
S
,
El
G
a
m
a
l
a
n
d
RS
A
c
ry
p
t
o
sy
st
ems
,
”
2
0
2
0
IEE
E
E
a
st
-
W
e
st De
sig
n
&
T
e
st S
y
mp
o
siu
m (E
W
DTS
)
,
S
e
p
t.
2
0
2
0
,
d
o
i:
1
0
.
1
1
0
9
/ew
d
ts5
0
6
6
4
.
2
0
2
0
.
9
2
2
4
9
0
1
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
Desig
n
a
n
d
imp
leme
n
ta
tio
n
o
f
a
s
ec
u
r
ed
S
DN
s
ystem
b
a
s
ed
o
n
h
yb
r
id
…
(
S
a
mir
Gh
a
ly
)
1125
[2
5
]
B.
S
.
Al
-
A
t
tab
,
“
Hy
b
ri
d
d
a
ta
e
n
c
r
y
p
ti
o
n
tec
h
n
i
q
u
e
f
o
r
d
a
ta
se
c
u
rit
y
in
c
lo
u
d
c
o
m
p
u
ti
n
g
,
”
I
n
t.
C
o
n
f
.
I
n
n
o
v
.
I
T
M
a
n
a
g
.
,
p
p
.
2
2
1
-
2
2
4
,
2
0
1
7
.
[2
6
]
Y.
Li
,
X
.
G
u
o
,
X.
P
a
n
g
,
B
.
P
e
n
g
,
X.
Li
a
n
d
P
.
Z
h
a
n
g
,
“
P
e
rfo
rm
a
n
c
e
a
n
a
ly
sis
o
f
flo
o
d
li
g
h
t
a
n
d
r
y
u
S
DN
c
o
n
tro
ll
e
rs
u
n
d
e
r
m
i
n
in
e
t
sim
u
lato
r
,
”
2
0
2
0
I
EE
E/
CIC
In
t
.
Co
n
f.
C
o
mm
u
n
.
C
h
in
a
,
ICCC
W
o
rk
.
2
0
2
0
,
p
p
.
8
5
-
9
0
,
A
u
g
.
2
0
2
0
,
d
o
i:
1
0
.
1
1
0
9
/ICCCW
o
rk
sh
o
p
s
4
9
9
7
2
.
2
0
2
0
.
9
2
0
9
9
3
5
.
[2
7
]
S
.
Lee
,
J.
Al
i
a
n
d
B.
H
.
R
o
h
,
“
P
e
rfo
rm
a
n
c
e
c
o
m
p
a
riso
n
o
f
s
o
ft
wa
re
d
e
fin
e
d
n
e
two
r
k
i
n
g
sim
u
la
to
rs
f
o
r
tac
ti
c
a
l
n
e
two
rk
:
M
in
i
n
e
t
v
s.
OPNET
,
”
2
0
1
9
In
t.
C
o
n
f
.
Co
mp
u
t.
Ne
tw.
Co
mm
u
n
.
ICNC
2
0
1
9
,
F
e
b
.
2
0
1
9
,
d
o
i:
1
0
.
1
1
0
9
/ICCNC.2
0
1
9
.
8
6
8
5
5
7
2
.
[2
8
]
H.
M
.
No
m
a
n
a
n
d
M
.
N.
Ja
sim
,
“
P
OX
c
o
n
tro
ll
e
r
a
n
d
Op
e
n
F
lo
w
p
e
rfo
rm
a
n
c
e
e
v
a
lu
a
ti
o
n
i
n
so
ftwa
re
d
e
fin
e
d
n
e
two
r
k
s
(S
DN
)
u
sin
g
M
i
n
i
n
e
t
e
m
u
lato
r,
”
I
OP
Co
n
f
.
S
e
r.:
M
a
ter
.
S
c
i.
En
g
.
v
o
l.
8
8
1
n
o
.
1
,
2
0
2
0
.
[2
9
]
I.
H.
Latif,
“
T
ime
e
v
a
lu
a
ti
o
n
o
f
d
iffere
n
t
c
ry
p
to
g
ra
p
h
y
a
lg
o
r
it
h
m
s
u
sin
g
lab
v
iew
,
”
IOP
Co
n
f.
S
e
r.
M
a
ter
.
S
c
i.
En
g
.
,
v
o
l.
7
4
5
,
n
o
.
1
,
2
0
2
0
,
d
o
i:
1
0
.
1
0
8
8
/1
7
5
7
-
8
9
9
X/
7
4
5
/1
/
0
1
2
0
3
9
.
[3
0
]
A.
Ab
d
e
laz
iz
,
e
t
a
l.
,
“
Distri
b
u
te
d
c
o
n
tr
o
ll
e
r
c
lu
ste
ri
n
g
i
n
so
ftwa
r
e
d
e
fin
e
d
n
e
tw
o
rk
s,”
PL
o
S
O
n
e
,
v
o
l.
1
2
,
n
o
.
4
,
p
p
.
1
-
1
9
,
Ap
r.
2
0
1
7
,
d
o
i:
1
0
.
1
3
7
1
/j
o
u
r
n
a
l.
p
o
n
e
.
0
1
7
4
7
1
5
.
B
I
O
G
RAP
H
I
E
S
O
F
AUTH
O
RS
S
a
m
ir
G
h
a
ly
re
c
e
iv
e
d
h
is
B
a
c
h
e
lo
r
d
e
g
re
e
in
Co
m
p
u
ter
En
g
i
n
e
e
rin
g
,
fro
m
Al
M
u
sta
n
siri
y
a
h
Un
iv
e
rsit
y
,
Ira
q
i
n
2
0
1
2
.
His
in
tere
sts
i
n
v
o
l
v
e
S
DN
a
n
d
Virtu
a
li
z
a
ti
o
n
Ne
two
rk
Arc
h
it
e
c
tu
re
Ma
h
m
o
o
d
Za
k
i
Abd
u
l
la
h
is
o
n
e
o
f
a
n
a
ss
o
c
iate
p
r
o
fe
ss
o
r
d
o
c
to
r
a
t
M
u
sta
n
siri
y
a
Un
iv
e
rsity
Ba
g
h
d
a
d
-
Ira
q
.
He
h
o
ld
s
a
P
h
D
d
e
g
re
e
in
c
o
m
p
u
ter
e
n
g
in
e
e
rin
g
a
n
d
h
a
s
m
a
n
y
b
o
o
k
s i
n
c
o
m
p
u
ter en
g
in
e
e
rin
g
,
n
e
two
rk
s,
sm
a
rt
sy
ste
m
s a
n
d
i
n
fo
r
m
a
ti
o
n
tec
h
n
o
l
o
g
y
Evaluation Warning : The document was created with Spire.PDF for Python.