I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
pu
t
er
E
ng
ineering
(
I
J
E
CE
)
Vo
l.
11
,
No
.
1
,
Feb
r
u
ar
y
2
0
2
1
,
p
p
.
589
~
595
I
SS
N:
2088
-
8
7
0
8
,
DOI
: 1
0
.
1
1
5
9
1
/
ijece
.
v
11
i
1
.
pp
5
8
9
-
5
9
5
589
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ec
e.
ia
esco
r
e.
co
m
Ada
ptive
k
ey
g
en
eratio
n
a
lg
o
rithm
b
a
sed o
n
s
o
ft
wa
re
e
ng
ineering
m
e
th
o
do
lo
g
y
M
ua
y
a
d Sa
dik
Cro
o
ck
,
Z
a
hra
a
Abba
s
H
a
s
s
a
n,
Sa
j
a
Dhy
a
a
K
hu
der
De
p
a
rtme
n
t
o
f
Co
m
p
u
ter E
n
g
in
e
e
rin
g
,
Un
i
v
e
rsity
o
f
Tec
h
n
o
l
o
g
y
,
Ir
a
q
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Mar
23
,
2
0
20
R
ev
is
ed
J
u
n
14
,
20
20
Acc
ep
ted
J
u
n
26
,
2
0
20
Re
c
e
n
tl
y
,
t
h
e
g
e
n
e
ra
ti
o
n
o
f
se
c
u
rit
y
k
e
y
s
h
a
s
b
e
e
n
c
o
n
si
d
e
re
d
fo
r
g
u
a
ra
n
tee
in
g
t
h
e
stro
n
g
e
st
o
f
th
e
m
in
term
s
o
f
ra
n
d
o
m
n
e
ss
.
In
a
d
d
it
i
o
n
,
th
e
so
ftwa
re
e
n
g
in
e
e
rin
g
m
e
th
o
d
o
lo
g
ies
a
re
a
d
o
p
ted
to
e
n
su
re
t
h
e
m
e
n
ti
o
n
e
d
g
o
a
l
is
re
a
c
h
e
d
.
In
th
is
p
a
p
e
r,
a
n
a
d
a
p
ti
v
e
k
e
y
g
e
n
e
ra
ti
o
n
a
l
g
o
rit
h
m
is
p
ro
p
o
se
d
b
a
se
d
o
n
so
ftwa
re
e
n
g
in
e
e
rin
g
tec
h
n
i
q
u
e
s.
T
h
e
a
d
o
p
te
d
so
ftwa
re
e
n
g
in
e
e
rin
g
tec
h
n
iq
u
e
is
se
lf
-
c
h
e
c
k
in
g
p
ro
c
e
ss
,
u
se
d
fo
r
d
e
tec
ti
n
g
th
e
fa
u
lt
in
th
e
u
n
d
e
rl
y
i
n
g
sy
ste
m
s.
T
h
is
tec
h
n
iq
u
e
c
h
e
c
k
s
th
e
g
e
n
e
ra
ted
se
c
u
ri
ty
k
e
y
s
in
term
s
o
f
v
a
li
d
it
y
b
a
se
d
o
n
ra
n
d
o
m
n
e
ss
fa
c
to
rs.
Th
e
se
fa
c
to
rs
in
c
lu
d
e
th
e
re
su
lt
s
o
f
Na
ti
o
n
a
l
In
sti
tu
te
o
f
S
ta
n
d
a
rd
Tes
t
(NIST
)
tes
ts.
In
c
a
se
th
e
ra
n
d
o
m
n
e
ss
fa
c
to
rs
a
re
l
e
s
s
th
a
n
th
e
a
c
c
e
p
ted
v
a
lu
e
s,
th
e
k
e
y
is
re
g
e
n
e
ra
ted
u
n
t
il
o
b
tain
in
g
th
e
v
a
li
d
o
n
e
.
It
is
imp
o
r
tan
t
t
o
n
o
te
t
h
a
t
th
e
se
c
u
rit
y
k
e
y
s
a
re
g
e
n
e
ra
ted
u
sin
g
sh
ift
re
g
ister
a
n
d
S
IG
ABA
t
e
c
h
n
iq
u
e
.
Th
e
p
ro
p
o
se
d
a
lg
o
rit
h
m
is
tes
ted
o
v
e
r
d
iffere
n
t
c
a
se
stu
d
ies
a
n
d
t
h
e
re
su
lt
s
sh
o
w t
h
e
e
ffe
c
ti
v
e
p
e
rfo
rm
a
n
c
e
o
f
it
to
p
r
o
d
u
c
e
we
ll
ra
n
d
o
m
g
e
n
e
r
a
ted
k
e
y
s.
K
ey
w
o
r
d
s
:
Key
g
en
er
atio
n
Secu
r
ity
Self
-
ch
ec
k
in
g
p
r
o
ce
s
s
SIG
AB
A
So
f
twar
e
en
g
in
ee
r
i
n
g
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Mu
ay
ad
Sad
ik
C
r
o
o
ck
,
Dep
ar
tm
en
t o
f
C
o
m
p
u
te
E
n
g
i
n
ee
r
in
g
,
Un
iv
er
s
ity
o
f
T
ec
h
n
o
lo
g
y
,
Al
-
s
in
aa
Stre
et,
B
ag
h
d
ad
,
I
r
a
q
.
E
m
ail:
Mu
ay
ad
.
S.C
r
o
o
c
k
@
u
o
tech
n
o
lo
g
y
.
ed
u
.
iq
,
1
2
0
0
5
2
@
u
o
tech
n
o
lo
g
y
.
e
d
u
.
iq
,
1
2
0
0
9
9
@
u
o
tech
n
o
lo
g
y
.
ed
u
.
iq
1.
I
NT
RO
D
UCT
I
O
N
I
n
th
e
last
y
ea
r
s
,
th
e
s
ea
r
ch
in
g
f
o
r
s
tr
o
n
g
s
ec
u
r
ity
k
e
y
s
th
at
s
tan
d
ag
ain
s
t
th
e
h
ac
k
er
k
ey
-
b
r
ea
k
in
g
m
eth
o
d
s
h
as
b
ee
n
in
cr
ea
s
ed
s
h
ar
p
ly
.
T
h
u
s
,
th
e
in
tr
o
d
u
ce
d
s
tu
d
ies,
m
eth
o
d
s
an
d
alg
o
r
ith
m
s
aim
ed
to
o
b
tain
th
ese
ty
p
es
o
f
k
ey
s
f
o
r
u
s
in
g
in
s
ec
u
r
ity
alg
o
r
ith
m
s
.
T
h
is
is
to
p
r
o
d
u
ce
a
s
ec
u
r
ity
lev
el
s
u
f
f
icien
tly
ac
ts
ag
ain
s
t
th
e
attac
k
s
an
d
h
ac
k
er
s
.
Dif
f
er
en
t
ap
p
r
o
ac
h
es
h
av
e
b
ee
n
ad
o
p
ted
to
g
en
e
r
ate
th
e
s
ec
u
r
ity
k
ey
s
with
h
ig
h
v
ar
iatio
n
i
n
lo
n
g
,
s
u
b
-
s
eq
u
en
ce
an
d
c
o
r
r
elatio
n
s
[
1
,
2
]
.
At
th
e
o
th
er
h
a
n
d
,
s
o
f
twar
e
en
g
in
ee
r
in
g
m
eth
o
d
s
h
av
e
b
e
en
c
o
m
b
in
e
d
with
t
h
e
s
e
ap
p
r
o
ac
h
es
to
i
n
cr
ea
s
e
th
e
r
eliab
ilit
y
o
f
th
e
g
en
er
ated
s
ec
u
r
ity
k
e
y
s
to
r
esis
t
th
e
d
o
m
in
ated
attac
k
s
o
v
er
n
u
m
er
o
u
s
a
p
p
licatio
n
s
.
O
n
e
o
f
t
h
ese
m
eth
o
d
s
is
th
e
f
au
lt
to
ler
an
ce
tech
n
iq
u
e
th
at
i
s
b
ased
o
n
s
elf
-
ch
ec
k
i
n
g
p
r
o
ce
s
s
t
o
d
etec
t
th
e
h
ap
p
e
n
ed
f
a
u
lts
[
3
-
8
]
.
T
h
e
s
o
lu
tio
n
f
o
r
th
e
d
etec
ted
f
au
lt
ca
n
b
e
ad
d
r
ess
ed
th
r
o
u
g
h
o
u
t
d
if
f
er
en
t w
ay
s
d
ep
en
d
in
g
o
n
th
e
u
tili
ze
d
ap
p
licatio
n
.
Du
e
to
th
e
im
p
o
r
tan
ce
o
f
th
e
s
ec
u
r
ity
k
ey
m
an
a
g
em
en
t
in
th
e
s
ec
u
r
it
y
r
esear
ch
,
m
an
y
r
esear
ch
er
s
h
av
e
f
o
cu
s
ed
o
n
p
r
o
p
o
s
in
g
e
f
f
icien
t
alg
o
r
ith
m
s
.
I
n
[
9
]
,
th
e
au
th
o
r
s
p
r
o
v
id
e
d
a
s
tu
d
y
o
n
u
s
in
g
s
o
f
twar
e
en
g
in
ee
r
in
g
f
o
r
ev
alu
atin
g
th
e
s
ec
u
r
ity
r
is
k
s
in
clu
d
in
g
id
e
n
tific
atio
n
s
y
s
tem
in
h
u
m
an
s
u
s
in
g
s
o
m
e
im
ag
e
f
ea
tu
r
es
th
at
n
ee
d
s
o
f
twar
e
en
g
in
ee
r
in
g
f
o
r
p
r
o
d
u
ci
n
g
th
e
r
eliab
le
co
d
es.
I
n
[
1
0
]
,
a
co
m
p
lete
s
tu
d
y
f
o
r
h
ar
d
war
e
s
ec
u
r
ity
was
in
tr
o
d
u
ce
d
.
T
h
is
s
tu
d
y
in
clu
d
e
d
k
ey
p
o
in
ts
o
f
u
s
in
g
th
e
tech
n
iq
u
es
o
f
s
o
f
twar
e
en
g
in
ee
r
in
g
in
th
e
k
e
y
g
e
n
er
atio
n
an
d
m
an
a
g
em
en
t.
R
esear
ch
er
s
o
f
[
1
1
]
c
o
n
s
id
er
ed
th
e
s
ec
u
r
ity
o
f
clo
u
d
co
m
p
u
tin
g
in
ter
m
s
o
f
au
t
h
en
ticatio
n
lev
els.
T
h
e
in
tr
o
d
u
ce
d
m
eth
o
d
u
s
es
th
e
s
o
f
twar
e
en
g
in
ee
r
i
n
g
in
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
11
,
No
.
1
,
Feb
r
u
ar
y
2
0
2
1
:
589
-
5
9
5
590
m
an
ag
in
g
th
e
k
e
y
s
u
s
ed
in
a
u
th
en
ticatio
n
,
in
wh
ich
th
e
s
e
cu
r
ity
was
g
u
ar
a
n
teed
.
I
n
[
1
2
]
,
s
ec
u
r
e
k
e
y
s
wer
e
p
r
o
d
u
ce
d
f
o
r
cr
y
p
t
o
g
r
a
p
h
y
m
eth
o
d
s
to
b
e
u
s
ed
in
n
etwo
r
k
co
m
m
u
n
icatio
n
.
T
h
is
f
ield
h
a
d
an
im
p
o
r
ta
n
t
d
ata
to
b
e
tr
a
n
s
f
er
r
ed
an
d
th
is
was
th
e
r
ea
s
o
n
b
eh
i
n
d
p
r
o
v
id
in
g
it.
I
n
[
1
3
]
,
th
e
c
y
b
er
-
p
h
y
s
ical
s
y
s
tem
s
h
ad
b
ee
n
s
ec
u
r
ed
u
s
in
g
th
e
in
v
esti
g
ated
m
eth
o
d
b
ased
o
n
s
o
f
twar
e
en
g
in
ee
r
in
g
tech
n
o
lo
g
y
.
T
h
e
p
r
esen
ted
s
y
s
tem
wo
r
k
ed
at
th
e
p
h
y
s
ical
lay
er
to
ad
ap
t
th
e
h
ar
d
war
e
c
o
m
p
o
n
e
n
ts
with
in
th
e
s
y
s
tem
.
I
n
[
1
4
]
,
d
if
f
er
e
n
t
p
r
ac
tical
s
o
f
twar
e
en
g
in
ee
r
i
n
g
d
ev
elo
p
m
en
ts
f
o
r
s
ec
u
r
ity
s
y
s
tem
s
wer
e
in
tr
o
d
u
ce
d
.
T
h
e
s
tu
d
y
p
r
o
v
id
e
d
a
d
ee
p
-
th
in
k
i
n
g
wa
y
to
tack
le
th
e
p
r
o
b
lem
s
o
f
s
ec
u
r
ity
i
n
d
e
v
elo
p
in
g
th
e
u
s
ed
s
o
f
twar
e
.
T
h
e
au
th
o
r
s
o
f
[
1
5
]
in
tr
o
d
u
c
ed
a
d
y
n
am
ic
m
ec
h
a
n
is
m
f
o
r
g
en
er
atin
g
th
e
r
eq
u
ir
ed
s
ec
u
r
ity
k
ey
s
.
T
h
is
m
ec
h
an
is
m
was
b
ased
o
n
g
e
n
etic
alg
o
r
ith
m
in
a
d
d
itio
n
to
th
e
u
s
e
o
f
s
o
f
twar
e
en
g
i
n
ee
r
in
g
tech
n
o
lo
g
y
.
Mo
r
eo
v
er
,
m
u
ltip
le
k
ey
g
e
n
er
atio
n
m
eth
o
d
was
p
r
o
p
o
s
ed
in
[
1
6
]
.
T
h
ese
k
ey
s
we
r
e
em
p
lo
y
ed
in
co
m
b
in
atio
n
with
th
e
ac
tio
n
s
o
f
s
h
ar
in
g
an
d
b
ac
k
u
p
f
o
r
d
ata.
I
n
[
1
7
]
,
cip
h
er
in
g
m
eth
o
d
o
f
DE
S
was
co
m
b
in
ed
with
g
en
er
ated
k
ey
s
f
o
r
s
ec
u
r
in
g
th
e
s
to
r
ag
e
o
f
d
ata
in
clo
u
d
.
T
h
e
k
ey
s
wer
e
g
en
er
ated
b
ased
o
n
a
p
r
o
p
o
s
ed
alg
o
r
ith
m
t
h
at
d
ep
e
n
d
ed
o
n
s
o
f
twar
e
en
g
in
ee
r
in
g
.
T
h
e
au
th
o
r
s
o
f
[
1
8
]
p
r
esen
ted
d
esig
n
a
n
d
im
p
lem
e
n
tatio
n
o
f
k
ey
g
en
e
r
atio
n
u
s
ed
f
o
r
im
ag
e
s
ec
u
r
ity
.
T
h
e
im
ag
e
s
ec
u
r
ity
u
tili
ze
d
th
e
g
en
er
a
ted
k
ey
s
in
co
d
in
g
o
f
in
clu
d
ed
co
m
p
o
n
en
ts
.
I
n
[
1
9
]
,
m
em
o
r
y
ef
f
icien
t
b
ased
m
u
lti
k
ey
g
e
n
er
atio
n
m
et
h
o
d
was
p
r
o
p
o
s
ed
.
T
h
is
m
eth
o
d
h
as
b
ee
n
em
p
lo
y
ed
f
o
r
s
ec
u
r
in
g
th
e
s
e
n
s
itiv
e
d
ata
tr
an
s
f
er
o
v
e
r
I
o
T
tech
n
o
l
o
g
y
in
th
e
clo
u
d
e
n
v
ir
o
n
m
en
t.
At
th
e
o
th
er
s
id
e,
th
e
au
th
o
r
s
o
f
[
2
0
]
u
tili
ze
d
th
e
OFDM
s
u
b
ca
r
r
ier
r
esp
o
n
s
e
s
y
s
tem
s
f
o
r
tr
an
s
f
er
r
in
g
im
p
o
r
tan
t
d
ata
in
s
ec
u
r
e
way
.
T
h
e
u
s
ed
s
ec
u
r
ity
k
e
y
s
wer
e
g
en
er
ated
in
h
i
g
h
r
an
d
o
m
n
ess
to
en
s
u
r
e
th
e
s
tr
o
n
g
o
f
th
em
.
I
n
[
2
1
]
,
t
h
e
k
e
y
g
en
er
atio
n
m
eth
o
d
f
o
r
m
u
ltil
ev
el
q
u
an
ti
za
tio
n
was
p
r
o
v
id
ed
.
I
n
a
d
d
itio
n
,
th
e
p
r
e
-
p
r
o
ce
s
s
in
g
was
also
s
ec
u
r
ed
u
s
in
g
th
e
s
am
e
m
eth
o
d
.
T
h
ese
k
ey
s
wer
e
g
en
er
ated
u
s
in
g
s
o
f
twar
e
en
g
in
ee
r
in
g
tech
n
iq
u
es.
T
h
e
r
esear
ch
er
s
o
f
[
2
2
]
u
s
ed
th
e
g
en
etic
alg
o
r
ith
m
i
n
d
esig
n
in
g
th
e
k
ey
g
e
n
er
atio
n
m
eth
o
d
th
at
c
o
u
ld
g
u
ar
a
n
tee
h
ig
h
r
a
n
d
o
m
n
ess
.
T
h
e
en
h
an
ce
d
r
an
d
o
m
k
ey
s
wer
e
p
r
o
d
u
ce
d
f
o
r
s
y
m
m
etr
ic
o
n
es.
I
t
is
well
k
n
o
wn
th
at
th
e
r
es
ea
r
ch
er
s
o
f
[
9
-
2
2
]
wo
r
k
ed
h
ar
d
f
o
r
p
r
o
d
u
cin
g
h
ig
h
q
u
ality
s
ec
u
r
ity
m
eth
o
d
s
b
ased
o
n
r
a
n
d
o
m
g
e
n
er
ated
k
e
y
s
.
I
n
t
h
is
p
ap
er
,
a
n
ad
ap
tiv
e
r
a
n
d
o
m
k
ey
g
e
n
er
atio
n
alg
o
r
ith
m
is
p
r
o
p
o
s
ed
.
T
h
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
ad
o
p
ts
th
e
s
elf
-
ch
ec
k
in
g
p
r
o
ce
s
s
in
f
a
u
lt
d
etec
tio
n
as
a
p
ar
t
o
f
f
au
lt
to
ler
an
ce
tech
n
i
q
u
e
to
p
r
o
d
u
c
e
h
ig
h
r
a
n
d
o
m
n
ess
k
ey
s
.
T
h
e
NI
ST
test
s
ar
e
co
n
s
id
er
ed
as
a
s
u
cc
ess
th
r
esh
o
ld
f
o
r
s
elf
-
ch
ec
k
in
g
p
r
o
ce
s
s
.
T
h
e
g
en
er
ated
k
ey
s
s
h
o
u
ld
p
ass
th
e
allo
ca
ted
th
r
esh
o
ld
s
to
b
e
ad
o
p
ted
as
v
alid
k
ey
s
.
T
h
e
p
r
o
p
o
s
ed
al
g
o
r
ith
m
is
ev
alu
ated
in
ter
m
s
o
f
p
er
f
o
r
m
an
ce
a
n
d
t
h
e
o
b
tain
ed
r
esu
lts
p
r
o
v
e
th
e
claim
o
f
th
is
p
ap
er
.
2.
P
RO
P
O
SD SO
F
T
WAR
E
E
NG
I
NE
E
RI
NG
B
AS
E
D
M
E
T
H
OD
As
m
en
tio
n
ed
ab
o
v
e,
t
h
e
p
r
o
p
o
s
ed
m
eth
o
d
is
b
ased
o
n
s
o
f
t
war
e
en
g
in
ee
r
i
n
g
p
r
o
ce
s
s
to
p
r
o
d
u
ce
h
ig
h
q
u
ality
r
an
d
o
m
s
ec
u
r
ity
k
ey
s
.
I
n
o
r
d
er
to
ea
s
e
th
e
r
ea
d
in
g
f
lo
w,
th
is
s
ec
tio
n
i
s
d
iv
id
ed
in
to
t
h
e
f
o
llo
win
g
s
.
2
.
1
.
Str
uct
ure
o
f
t
he
pro
po
s
ed
a
lg
o
rit
hm
Fig
u
r
e
1
s
h
o
ws
th
e
s
tr
u
ctu
r
e
o
f
th
e
k
e
y
g
en
e
r
atio
n
alg
o
r
it
h
m
.
I
t
is
clea
r
ly
ex
p
lain
ed
th
at
th
e
d
ata
b
lo
ck
f
ir
s
tly
en
ter
s
to
th
e
SIG
AB
A
ap
p
r
o
ac
h
.
T
h
is
ap
p
r
o
ac
h
is
b
u
ilt
u
s
in
g
f
iv
e
m
ain
p
o
ly
n
o
m
ial
eq
u
atio
n
s
to
in
cr
ea
s
e
th
e
r
an
d
o
m
n
ess
in
ch
o
o
s
in
g
th
e
s
ee
d
s
f
o
r
s
h
if
t
r
eg
is
ter
.
SIG
A
B
A
wa
s
p
r
o
d
u
ce
d
in
W
o
r
ld
W
ar
2
to
en
cr
y
p
t
th
e
tr
a
n
s
m
itt
ed
m
ess
ag
es
as
s
h
o
wn
in
Fig
u
r
e
2
[
2
3
-
24
]
.
T
h
e
s
elec
ted
p
o
ly
n
o
m
ia
l
b
y
th
e
SIG
AB
A
ap
p
r
o
ac
h
with
3
2
-
b
it
is
p
ass
ed
to
th
e
least
f
o
r
war
d
ed
s
h
if
t
r
eg
is
ter
(
L
FS
R
)
.
T
h
e
L
F
S
R
is
r
esp
o
n
s
ib
l
e
o
n
g
en
er
atin
g
t
h
e
k
ey
with
1
2
8
-
b
i
t le
n
g
th
.
Fig
u
r
e
3
s
h
o
ws th
e
s
t
r
u
ctu
r
e
o
f
th
e
a
d
o
p
ted
L
FS
R
.
Fig
u
r
e
1
.
K
ey
g
en
er
ati
o
n
alg
o
r
ith
m
s
tr
u
ctu
r
e
Fig
u
r
e
2
.
SIG
AB
A
d
ev
ice
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
A
d
a
p
tive
ke
y
g
e
n
era
tio
n
a
lg
o
r
ith
m
b
a
s
ed
o
n
s
o
ftw
a
r
e
en
g
in
ee
r
in
g
meth
o
d
o
lo
g
y
(
Mu
a
y
a
d
S
a
d
ik
C
r
o
o
ck
)
591
Fig
u
r
e
3
.
L
FS
R
s
tr
u
ctu
r
e
2
.
2
.
P
r
o
po
s
ed
a
lg
o
rit
hm
Fig
u
r
e
4
(
s
h
o
w
n
in
Ap
p
e
n
d
ix
)
ex
p
lain
s
th
e
a
d
ap
tiv
e
k
e
y
g
en
er
atio
n
alg
o
r
ith
m
o
f
th
at
ad
o
p
ts
SIG
AR
A
m
eth
o
d
[
2
5
]
an
d
th
e
s
o
f
twar
e
en
g
in
ee
r
in
g
tec
h
n
iq
u
e
in
v
e
r
if
y
in
g
th
e
v
alid
ity
o
f
th
e
g
en
er
ate
d
k
e
y
s
.
T
h
e
ad
o
p
ted
s
tep
s
o
f
th
is
alg
o
r
ith
m
ca
n
b
e
s
u
m
m
ar
ized
as f
o
llo
ws:
-
Fo
r
ea
ch
lo
o
p
o
f
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
,
it c
h
o
o
s
es f
iv
e
p
o
ly
n
o
m
ial
eq
u
atio
n
s
th
at
ar
e
s
o
r
te
d
.
-
Acc
o
r
d
in
g
t
o
SIG
AB
A
ap
p
r
o
a
ch
,
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
ch
o
o
s
es
eq
u
atio
n
5
.
-
I
ts
ex
am
s
th
e
least si
g
n
if
ican
t b
it
(
L
SB
)
if
0
o
r
1
.
-
I
n
ca
s
e
th
e
L
SB
is
1
,
th
e
alg
o
r
i
th
m
s
elec
ts
p
ath
2
o
f
Fig
u
r
e
4
(
b
)
,
else it
s
elec
ts
p
ath
1
o
f
Fig
u
r
e
4
(
b
)
.
-
Path
1
ch
o
o
s
es e
q
u
ati
o
n
3
,
wh
ile
p
ath
2
ch
o
o
s
es e
q
u
atio
n
4
.
-
Path
1
ex
am
s
th
e
L
SB
o
f
e
q
u
a
tio
n
3
,
a
n
d
p
at
h
2
test
s
L
S o
f
e
q
u
atio
n
4
.
-
I
n
b
o
th
p
ath
s
,
if
th
e
L
SB
o
f
e
q
u
atio
n
(
3
an
d
4
)
is
1
,
it
s
elec
ts
eq
u
atio
n
2
a
n
d
i
f
L
SB
is
1
th
e
alg
o
r
ith
m
s
elec
ts
eq
u
atio
n
1
.
T
h
e
s
am
e
p
r
o
ce
d
u
r
e
is
p
er
f
o
r
m
ed
f
o
r
p
ath
2
.
-
T
h
e
r
esu
lts
o
f
p
ath
1
is
XORi
n
g
with
eq
u
atio
n
4
,
wh
ile
t
h
e
r
e
s
u
lts
o
f
p
ath
2
is
XORi
n
g
with
eq
u
atio
n
3
.
-
T
h
e
r
esu
lts
o
f
XOR is
co
n
s
id
e
r
ed
as a
s
ee
d
eq
u
atio
n
f
o
r
L
FS
R
,
as sh
o
wn
in
Fig
u
r
e
4
(
c
)
.
-
T
h
e
L
FS
R
r
ec
eiv
es th
e
s
ee
d
eq
u
atio
n
a
n
d
ap
p
lies
th
e
ad
o
p
te
d
p
r
o
ce
d
u
r
e
to
p
r
o
d
u
ce
1
2
8
-
b
i
t k
ey
.
-
T
h
e
o
b
tain
ed
k
e
y
is
test
ed
u
s
i
n
g
th
e
s
elf
-
ch
ec
k
in
g
p
r
o
ce
d
u
r
e.
T
h
is
is
d
o
n
e
b
y
ch
ec
k
in
g
th
e
v
alid
ity
o
f
th
e
k
ey
i
n
ter
m
s
o
f
r
a
n
d
o
m
n
e
s
s
u
s
in
g
NI
ST
(
f
r
eq
u
en
cy
an
d
s
er
ial)
test
s
.
T
h
e
r
esu
lts
ar
e
c
o
m
p
ar
ed
with
th
e
ac
ce
p
tab
le
th
r
esh
o
ld
s
.
I
n
ca
s
e
th
e
r
esu
lts
ar
e
o
u
t
o
f
th
e
ex
p
ec
ted
v
alu
es,
th
e
k
ey
is
r
ejec
ted
an
d
th
e
lo
o
p
r
etu
r
n
s
to
th
e
f
i
r
s
t
s
tep
o
f
th
e
p
r
o
p
o
s
e
d
al
g
o
r
ith
m
to
g
en
er
ate
n
ew
k
ey
.
Oth
er
wis
e,
th
e
r
esu
ltin
g
k
ey
is
v
alid
.
3.
E
XP
E
R
M
E
NT
AL
R
E
SU
L
T
S
I
n
o
r
d
er
t
o
test
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
o
f
g
e
n
er
atin
g
r
e
liab
le
s
ec
u
r
ity
k
ey
s
,
d
if
f
er
e
n
t
tr
ain
in
g
g
en
er
atio
n
s
f
o
r
k
e
y
s
ar
e
p
er
f
o
r
m
ed
.
Fig
u
r
e
5
s
h
o
ws
th
e
r
u
n
s
cr
ee
n
o
f
th
e
p
r
o
p
o
s
ed
al
g
o
r
ith
m
th
at
e
x
p
lain
th
e
p
r
o
ce
d
u
r
e
m
en
tio
n
ed
in
s
ec
tio
n
2
.
I
t
is
n
o
ted
th
at
th
er
e
ar
e
f
iv
e
p
o
ly
n
o
m
ial
eq
u
atio
n
s
th
at
cr
ea
te
f
iv
e
s
eq
u
en
ce
s
o
f
b
in
a
r
y
3
2
-
b
it.
Af
ter
ap
p
ly
i
n
g
t
h
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
,
t
h
e
test
in
g
r
esu
lts
o
f
NI
ST
f
r
eq
u
e
n
cy
a
nd
s
er
ial
ar
e
ap
p
ea
r
ed
to
ac
ce
p
t
th
e
g
e
n
er
ated
1
2
8
-
b
it
k
e
y
s
as
th
ey
p
ass
th
e
ac
ce
p
tab
le
th
r
esh
o
ld
r
an
g
es.
T
h
er
ef
o
r
e,
th
e
g
en
er
ated
k
ey
i
s
v
alid
.
Fig
u
r
e
5
.
Valid
g
en
er
ated
k
ey
ca
s
e
s
tu
d
y
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
11
,
No
.
1
,
Feb
r
u
ar
y
2
0
2
1
:
589
-
5
9
5
592
At
th
e
o
th
er
h
an
d
,
Fig
u
r
e
6
illu
s
tr
ates
th
e
s
ec
o
n
d
ca
s
e
s
tu
d
y
,
w
h
er
e
th
e
NI
ST
f
r
e
q
u
e
n
cy
test
is
p
ass
ed
,
wh
ile
th
e
s
er
ial
test
i
s
f
ailed
.
I
n
t
h
is
ca
s
e,
th
e
g
en
er
ated
k
e
y
is
c
o
n
s
id
er
ed
as
i
n
v
alid
a
n
d
r
ejec
ted
.
Acc
o
r
d
in
g
to
t
h
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
,
th
e
k
ey
is
r
eg
e
n
er
ated
f
r
o
m
ag
ain
f
o
llo
win
g
th
e
s
am
e
s
tep
s
.
T
h
e
r
e
g
en
er
ated
k
ey
is
p
ass
ed
b
o
th
NI
ST
test
s
as
s
h
o
wn
i
n
Fig
u
r
e
7
.
I
n
th
is
ca
s
e,
t
h
e
g
e
n
er
ated
k
e
y
is
v
alid
an
d
r
ea
d
y
to
b
e
u
s
ed
in
th
e
s
ec
u
r
ity
m
eth
o
d
s
.
Fig
u
r
e
6
.
I
n
v
alid
g
en
er
ated
k
e
y
ca
s
e
s
tu
d
y
Fig
u
r
e
7
.
Valid
r
eg
en
er
ate
d
k
e
y
ca
s
e
s
tu
d
y
Fo
r
m
o
r
e
test
in
g
r
esu
lts
,
f
iv
e
ex
am
in
atio
n
s
ar
e
p
er
f
o
r
m
e
d
f
o
r
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
.
T
h
e
r
esu
lts
o
f
th
ese
ex
am
in
atio
n
s
ar
e
s
h
o
wn
T
ab
le
1
.
T
ab
le
2
ex
p
lain
s
th
e
r
esu
lt
an
aly
s
is
o
f
all
ca
s
e
s
tu
d
ies
in
clu
d
in
g
b
o
th
NI
ST
test
s
a
n
d
th
e
co
m
m
o
n
c
o
u
p
les
o
f
b
its
.
Al
l
ca
s
e
s
tu
d
ie
s
ar
e
p
ass
ed
an
d
p
r
o
d
u
ce
v
ali
d
k
ey
s
,
y
et
th
e
ca
s
e
s
tu
d
y
n
u
m
b
er
5
is
f
ailed
in
th
e
s
er
ial
test
.
T
h
u
s
,
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
u
s
es
th
e
s
o
f
twar
e
en
g
in
ee
r
in
g
b
ased
f
au
lt
to
ler
an
ce
to
r
e
g
en
er
ate
th
e
f
ailed
k
ey
.
T
h
e
r
eg
e
n
er
at
ed
k
ey
is
also
test
ed
o
v
er
th
e
s
am
e
NI
ST
test
s
.
T
h
e
o
b
tain
ed
r
eg
en
e
r
ated
k
ey
is
s
h
o
wn
in
T
ab
le
3
,
wh
ile
T
ab
le
4
lis
ts
th
e
an
aly
s
is
o
f
th
e
n
ew
k
ey
an
d
it
well
s
h
o
wn
th
at
th
e
k
e
y
is
p
ass
ed
b
o
th
test
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
A
d
a
p
tive
ke
y
g
e
n
era
tio
n
a
lg
o
r
ith
m
b
a
s
ed
o
n
s
o
ftw
a
r
e
en
g
in
ee
r
in
g
meth
o
d
o
lo
g
y
(
Mu
a
y
a
d
S
a
d
ik
C
r
o
o
ck
)
593
T
ab
le
1
.
Gen
e
r
ated
k
e
y
s
f
o
r
d
if
f
er
en
t c
ase
s
tu
d
ies
No
5
P
o
l
y
n
o
m
i
a
l
s a
s
i
n
p
u
t
t
o
S
I
G
B
A
(
8
B
i
t
s)
32
-
b
i
t
o
u
t
p
u
t
o
f
S
I
G
B
A
(
8
B
i
t
s)
G
e
n
e
r
a
t
e
d
k
e
y
s
(
1
2
8
B
i
t
s)
1
0
1
1
0
0
1
0
0
1
0
0
1
0
1
0
1
1
1
1
1
1
1
0
0
0
0
0
1
0
0
1
1
0
0
1
0
0
1
1
1
1
1
1
0
0
1
0
1
1
1
0
1
1
0
1
1
0
1
1
1
0
1
0
1
0
1
1
0
1
0
0
1
0
0
0
0
0
0
1
1
0
1
1
0
0
0
1
0
1
0
0
0
0
0
0
0
0
1
1
1
0
1
0
0
0
1
1
1
1
0
0
0
1
1
0
1
0
1
0
0
0
1
1
1
1
1
0
0
1
0
1
0
0
1
0
0
0
0
0
1
0
1
1
1
1
1
1
1
1
1
1
1
0
0
0
1
0
0
0
1
0
0
0
0
1
1
0
1
1
0
0
1
0
1
1
0
1
0
0
1
1
1
1
0
1
0
0
1
0
0
1
1
0
0
0
1
1
0
0
1
0
1
1
0
1
1
1
0
0
1
1
0
0
0
1
0
0
1
0
0
1
1
1
0
1
1
1
1
1
1
0
1
1
0
1
0
0
1
1
0
1
1
1
0
1
1
1
1
0
0
1
0
1
1
1
1
1
0
0
0
0
0
1
0
1
1
0
0
0
1
1
0
1
1
0
1
1
0
0
0
1
0
0
1
1
0
1
1
1
1
1
0
0
0
0
1
0
0
0
0
1
1
0
1
0
0
1
1
1
0
0
0
1
1
1
1
1
0
0
1
2
1
0
1
1
0
0
0
0
1
1
0
1
0
0
1
0
1
0
0
0
0
1
0
0
1
1
1
0
1
0
1
0
1
0
1
1
1
1
1
1
0
1
1
0
0
0
1
0
0
1
1
0
1
1
0
1
0
1
1
0
1
1
1
0
0
0
1
0
0
0
1
0
0
1
1
0
1
0
1
0
0
0
0
0
1
1
0
1
1
0
0
0
0
0
0
0
1
0
1
1
1
1
0
1
1
1
0
0
0
1
1
0
0
1
1
1
1
0
0
1
0
0
0
1
1
1
0
0
1
1
0
1
1
1
1
0
0
1
0
1
1
0
1
1
0
0
1
0
1
1
0
1
0
0
1
1
0
0
1
0
0
0
0
0
1
1
0
1
0
0
0
1
0
1
0
0
1
1
1
1
1
1
0
1
1
1
1
1
0
1
1
0
0
1
0
1
1
0
0
0
1
1
0
1
0
1
0
0
0
0
0
1
0
0
1
0
0
0
1
1
0
1
1
0
0
0
1
0
0
0
1
1
1
0
1
1
0
0
0
1
0
1
1
0
0
0
0
0
0
1
0
0
1
1
1
1
1
1
0
1
0
1
1
0
0
1
1
0
1
1
1
1
1
1
0
1
1
0
1
1
0
1
0
0
0
1
0
1
0
1
1
0
1
0
1
1
1
1
1
1
1
0
0
0
0
1
0
0
0
1
1
0
1
0
0
1
1
0
1
1
3
0
1
0
1
1
0
0
0
1
1
1
1
1
0
1
0
1
0
0
1
0
0
1
0
0
1
1
1
1
0
1
1
1
0
1
1
0
0
0
0
1
0
1
1
0
0
0
1
1
0
1
0
0
1
0
1
1
1
0
0
0
1
0
0
0
1
1
1
1
0
1
1
0
0
1
0
0
1
0
1
1
0
1
1
0
1
1
0
0
0
0
0
0
1
1
0
0
0
0
1
1
0
0
1
1
1
0
0
0
1
0
1
0
0
0
0
0
0
1
1
1
1
0
1
1
1
0
1
1
0
0
1
1
0
1
0
1
0
0
0
1
0
0
1
0
0
0
1
1
0
0
1
0
0
0
0
1
1
0
1
1
1
0
0
1
0
1
1
1
0
0
1
0
1
0
0
0
0
0
1
0
0
1
1
1
1
0
0
0
0
1
0
1
0
0
1
1
1
0
0
0
1
0
1
0
1
1
1
1
1
1
0
1
0
1
1
0
0
0
1
0
1
1
1
1
1
1
1
1
0
0
1
1
1
0
0
0
0
1
0
1
0
1
1
1
0
0
1
0
1
0
0
0
1
0
0
0
0
0
0
0
0
0
1
0
1
1
1
0
0
0
0
1
0
1
1
0
0
1
0
1
1
1
0
1
0
0
0
0
1
1
1
0
1
1
0
0
1
0
1
1
0
0
0
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
4
0
1
1
1
1
1
0
0
0
0
0
0
1
1
1
1
0
1
0
0
0
1
0
1
1
1
0
1
1
1
0
0
0
1
0
0
0
1
1
1
0
1
0
1
0
1
1
0
0
1
1
1
0
0
1
0
1
0
1
0
1
0
0
0
1
1
1
1
1
1
0
1
0
1
0
0
1
1
1
1
1
0
1
0
0
0
1
1
0
0
0
1
0
1
0
1
0
1
1
1
1
1
1
0
0
1
0
1
0
1
1
1
1
1
1
0
1
1
0
0
0
0
0
1
1
0
0
1
1
0
0
0
1
1
0
0
1
1
1
1
0
1
0
0
1
0
1
0
0
1
0
1
1
1
0
0
1
1
0
0
0
0
1
1
1
0
0
1
0
0
0
0
0
0
0
1
1
0
0
1
1
1
1
0
1
0
1
1
0
0
0
1
1
1
0
1
1
1
1
1
1
1
0
1
0
0
0
1
0
1
1
0
0
0
0
0
1
1
1
0
0
1
0
0
0
0
0
1
1
0
1
1
1
0
1
0
1
1
1
1
1
1
1
0
0
1
1
0
1
0
1
0
1
1
0
1
1
1
1
0
0
0
1
0
0
1
1
1
0
0
0
0
0
1
0
1
1
1
1
1
0
1
0
0
0
1
0
1
1
1
1
0
0
1
1
1
1
0
0
0
0
0
1
0
1
1
0
1
0
0
0
1
0
1
0
1
0
1
0
0
5
1
0
1
1
0
0
0
1
0
1
1
0
1
1
0
1
0
0
1
1
1
0
0
1
0
0
0
1
1
0
1
0
0
1
0
0
1
0
1
0
0
1
1
1
1
1
0
1
0
1
1
1
1
1
0
1
1
0
0
1
1
1
1
0
1
0
0
1
1
1
1
0
0
0
0
1
1
1
0
0
0
1
1
0
1
0
1
1
1
0
1
1
0
0
0
1
1
1
1
0
1
0
0
0
1
1
0
0
0
1
0
1
0
1
1
1
0
1
0
0
0
1
1
1
0
1
0
0
1
0
0
0
1
1
0
0
0
0
0
1
0
0
0
0
1
1
1
1
1
1
0
1
1
0
1
1
1
0
1
1
0
0
1
0
1
1
1
1
0
1
1
1
0
0
0
1
0
1
0
1
0
0
1
0
1
0
1
0
1
0
1
1
0
0
1
1
0
1
0
0
0
0
0
1
1
0
0
1
1
0
1
0
0
1
0
0
1
0
1
1
1
1
0
0
1
0
0
0
1
1
0
1
0
0
1
0
1
0
1
0
0
0
0
1
0
0
1
0
1
0
0
1
0
1
1
1
1
1
0
1
0
0
1
0
1
0
1
0
0
0
1
0
1
0
1
0
0
0
0
1
1
0
1
1
0
1
0
0
1
1
0
1
0
1
0
1
0
1
0
0
1
0
1
0
0
0
0
1
1
1
0
0
0
1
0
1
1
0
1
1
T
ab
le
2
.
R
esu
lts
an
aly
s
is
f
o
r
5
ca
s
e
s
tu
d
ies
N
o
.
N
o
.
o
f
z
e
r
o
s
N
o
.
o
f
o
n
e
s
N
o
.
o
f
00
N
o
.
o
f
01
N
o
.
o
f
10
N
o
.
o
f
11
F
r
e
q
u
e
n
c
y
T
e
st
S
e
r
i
a
l
T
e
st
1
59
69
29
30
29
39
0
.
7
8
1
=
p
a
ss
1
.
4
4
7
=
p
a
ss
2
63
65
30
33
32
32
0
.
0
3
1
2
=
p
a
ss
0
.
1
1
8
=
P
a
ss
3
68
60
39
28
29
31
0
.
5
=
p
a
ss
1
.
8
5
4
=
p
a
ss
4
60
68
29
30
31
37
0
.
5
=
p
a
ss
0
.
7
2
0
=
P
a
ss
5
70
58
30
40
39
18
1
.
1
2
5
=p
a
ss
8
.
7
2
5
=N
o
t
p
a
ss
T
ab
le
3
.
R
eg
en
er
ate
d
k
ey
No
5
P
o
l
y
n
o
m
i
a
l
s a
s
i
n
p
u
t
t
o
S
I
G
B
A
(
8
B
i
t
s)
32
-
b
i
t
o
u
t
p
u
t
o
f
S
I
G
B
A
(
8
B
i
t
s)
G
e
n
e
r
a
t
e
d
k
e
y
s
(
1
2
8
B
i
t
s)
5
0
0
1
1
0
0
1
0
0
1
1
1
1
1
0
0
1
0
0
1
1
1
0
0
1
1
0
1
0
1
1
0
0
1
1
1
1
0
1
1
1
0
0
0
0
0
0
0
1
0
0
1
1
1
0
0
1
0
1
1
0
0
0
0
0
1
0
1
1
0
0
0
0
0
0
1
1
1
0
0
0
1
0
1
0
1
0
0
0
0
1
1
0
0
0
0
0
1
0
0
1
0
1
1
0
0
1
1
1
1
1
0
1
0
1
1
1
0
0
0
1
0
0
1
1
0
1
1
1
1
1
0
0
0
0
1
0
0
0
0
1
0
1
1
1
1
0
1
0
0
1
1
1
1
1
1
1
0
0
1
0
0
1
0
0
0
1
1
1
0
0
1
1
1
0
0
1
1
0
0
1
0
0
0
1
0
0
0
0
0
0
0
1
1
0
0
1
0
0
0
1
0
0
1
1
1
1
1
0
0
0
0
0
1
0
0
1
0
0
0
1
0
0
1
0
1
1
0
0
1
1
0
1
0
1
1
0
1
1
1
1
0
1
0
0
1
1
0
0
1
0
1
1
1
1
0
1
0
1
0
0
1
0
1
0
0
0
1
1
0
0
1
0
0
0
0
0
0
0
1
0
1
1
0
1
1
0
0
0
1
0
0
1
0
0
0
1
1
1
0
1
0
1
0
0
1
1
1
0
0
1
0
1
0
0
1
1
1
0
1
T
ab
le
4
.
R
eg
en
er
ate
d
k
ey
an
al
y
s
is
N
o
.
N
o
.
o
f
z
e
r
o
s
N
o
.
o
f
o
n
e
s
N
o
.
o
f
00
N
o
.
o
f
01
N
o
.
o
f
10
N
o
.
o
f
11
F
r
e
q
u
e
n
c
y
Te
st
S
e
r
i
a
l
Te
st
5
68
60
33
35
35
24
0
.
5
p
a
ss
2
.
1
0
6
2
9
p
a
ss
4.
CO
NCLU
SI
O
N
An
ad
ap
tiv
e
k
e
y
g
e
n
er
atio
n
alg
o
r
ith
m
b
ased
o
n
s
o
f
twa
r
e
en
g
i
n
ee
r
in
g
p
r
o
ce
s
s
was
p
r
o
p
o
s
ed
.
T
h
is
alg
o
r
ith
m
aim
ed
to
g
en
er
ate
s
ec
u
r
ity
k
ey
s
o
f
1
2
8
-
b
i
t
with
h
ig
h
r
an
d
o
m
n
ess
to
en
s
u
r
e
th
e
ac
ce
p
ted
r
esil
ien
ce
ag
ain
s
t
th
e
attac
k
s
.
T
h
e
s
o
f
twar
e
en
g
i
n
ee
r
in
g
f
a
u
lt
t
o
ler
an
ce
tech
n
iq
u
e
was
u
s
ed
f
o
r
c
h
ec
k
in
g
th
e
g
en
er
ate
d
k
ey
s
in
ter
m
s
o
f
r
an
d
o
m
n
ess
b
ased
o
n
NI
S
T
test
s
.
T
h
ese
test
s
wer
e
em
p
lo
y
ed
as
ac
ce
p
ted
th
r
esh
o
ld
to
b
e
d
ec
id
e
d
if
th
e
g
en
er
ated
k
e
y
s
wer
e
v
alid
o
r
n
o
t.
T
h
e
p
r
o
p
o
s
ed
alg
o
r
it
h
m
was
test
ed
o
v
er
d
if
f
er
en
t
ca
s
e
s
tu
d
ies
an
d
th
e
o
b
tain
ed
r
esu
lts
p
r
o
v
ed
th
e
v
alid
ity
o
f
th
is
alg
o
r
ith
m
in
ter
m
s
o
f
g
en
er
atin
g
r
eliab
le
an
d
r
a
n
d
o
m
k
ey
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
11
,
No
.
1
,
Feb
r
u
ar
y
2
0
2
1
:
589
-
5
9
5
594
AP
P
E
NDI
X
(
a)
(
c)
(
b
)
Fig
u
r
e
4
.
Pro
p
o
s
ed
alg
o
r
ith
m
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
A
d
a
p
tive
ke
y
g
e
n
era
tio
n
a
lg
o
r
ith
m
b
a
s
ed
o
n
s
o
ftw
a
r
e
en
g
in
ee
r
in
g
meth
o
d
o
lo
g
y
(
Mu
a
y
a
d
S
a
d
ik
C
r
o
o
ck
)
595
RE
F
E
R
E
NC
E
S
[1
]
E
.
Ba
rk
e
r
a
n
d
A
.
R
o
g
i
n
sk
y
,
“
Re
c
o
m
m
e
n
d
a
ti
o
n
fo
r
Cry
p
to
g
ra
p
h
ic
Ke
y
G
e
n
e
ra
ti
o
n
,
”
NIS
T
P
u
b
li
c
a
ti
o
n
,
2
0
1
9
.
[2
]
B
.
Bu
c
h
a
n
a
n
,
“
Th
e
Ha
c
k
e
r
a
n
d
t
h
e
S
tate
:
Cy
b
e
r
Attac
k
s a
n
d
th
e
Ne
w No
rm
a
l
o
f
G
e
o
p
o
li
t
ics
,
”
Po
li
t
ics
o
f
Priva
c
y
&
S
u
rv
e
il
la
n
c
e
,
2
0
2
0
.
[3
]
I
.
S
o
m
m
e
rv
il
le,
“
S
o
ftwa
re
e
n
g
in
e
e
rin
g
,
”
1
0
t
h
E
d
it
i
o
n
,
Pea
rs
o
n
E
d
u
c
a
ti
o
n
,
In
c
,
2
0
1
7
.
[4
]
R
.
J.
El
li
s
o
n
,
e
t
a
l.
,
“
Ev
a
l
u
a
ti
n
g
a
n
d
M
it
ig
a
ti
n
g
S
o
f
twa
re
S
u
p
p
ly
C
h
a
in
S
e
c
u
ri
ty
Ris
k
s
,
”
Res
e
a
rc
h
,
T
e
c
h
n
o
l
o
g
y
,
a
n
d
S
y
ste
m S
o
l
u
ti
o
n
s (R
T
S
S
)
a
n
d
C
E
RT
Pro
g
ra
ms
,
2
0
1
0
.
[5
]
M
.
Ku
u
ti
laa
,
e
t
a
l.
,
“
Ti
m
e
P
re
ss
u
r
e
in
S
o
ftwa
re
En
g
in
e
e
rin
g
:
A
S
y
s
tem
a
ti
c
Re
v
iew
,
”
E
l
siv
e
r
,
2
0
2
0
.
[6
]
L.
M
o
tt
o
la
,
e
t
a
l
.
,
“
S
imp
li
f
y
i
n
g
th
e
In
teg
ra
t
io
n
o
f
W
irele
ss
S
e
n
so
r
Ne
two
r
k
s
in
t
o
B
u
sin
e
ss
P
r
o
c
e
ss
e
s
,
”
IEE
E
T
ra
n
sa
c
ti
o
n
o
n
S
o
ft
w
a
re
En
g
in
e
e
rin
g
,
v
o
l.
4
5
,
n
o
.
6
,
p
p
.
5
7
6
-
5
9
6
,
2
0
1
9
.
[7
]
Ay
u
b
a
J
.
,
e
t
a
l.
,
“
S
o
ftwa
re
De
v
e
l
o
p
m
e
n
t
o
f
I
n
teg
ra
ted
W
irele
ss
S
e
n
so
r
Ne
two
rk
s
f
o
r
Re
a
lT
ime
M
o
n
it
o
rin
g
o
f
Oil
a
n
d
G
a
s
F
lo
w
Ra
te
M
e
terin
g
I
n
f
ra
stru
c
tu
re
,
”
J
o
u
r
n
a
l
o
f
I
n
fo
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
y
&
S
o
f
twa
re
En
g
i
n
e
e
rin
g
,
v
o
l
.
8
,
n
o
.
2
,
pp
. 1
-
1
0
,
2
0
1
8
.
[8
]
I
.
Alm
o
m
a
n
i
a
n
d
A
.
Alr
o
m
i
,
“
In
t
e
g
ra
ti
n
g
S
o
ftwa
re
E
n
g
i
n
e
e
rin
g
P
r
o
c
e
ss
e
s in
th
e
De
v
e
lo
p
m
e
n
t
o
f
Ef
ficie
n
t
In
tr
u
sio
n
De
tec
ti
o
n
S
y
ste
m
s i
n
Wi
re
les
s S
e
n
so
r
Ne
two
r
k
s
,
”
J
o
u
r
n
a
l
o
f
S
e
ms
o
rs
,
v
o
l.
2
0
,
n
o
.
5
,
p
p
.
1
-
2
8
,
2
0
2
0
.
[9
]
S
.
D.
Kh
u
d
h
u
r
a
n
d
M
.
S
.
Cro
o
c
k
,
“
De
n
tal
X
-
Ra
y
Ba
se
d
Hu
m
a
n
Id
e
n
ti
fica
ti
o
n
S
y
ste
m
fo
r
F
o
re
n
sic
,
”
En
g
i
n
e
e
rin
g
a
n
d
T
e
c
h
n
o
l
o
g
y
J
o
u
rn
a
l
,
v
o
l
.
3
5
,
n
o
.
1
,
p
p
.
4
9
-
6
0
,
2
0
1
7
.
[1
0
]
Y
.
Jin
,
“
I
n
tro
d
u
c
ti
o
n
to
Ha
rd
wa
re
S
e
c
u
rit
y
,
”
J
o
u
r
n
a
l
o
f
El
e
c
tro
n
ics
,
v
o
l.
4
,
p
p
.
7
6
3
-
7
8
4
,
2
0
1
5
.
[1
1
]
S
.
De
y
a
n
d
S
.
D.
Jo
sh
i,
“
ECC
B
a
se
d
Au
th
e
n
ti
c
a
ti
o
n
S
y
ste
m
fo
r
P
e
rfo
rm
a
n
c
e
Im
p
ro
v
e
m
e
n
t
in
S
e
c
u
rit
y
o
f
Clo
u
d
,
”
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
Ad
v
a
n
c
e
d
Res
e
a
rc
h
in
Co
mp
u
te
r
S
c
ie
n
c
e
a
n
d
S
o
ft
wa
re
En
g
i
n
e
e
rin
g
,
v
o
l.
6
,
n
o
.
3
,
p
p
.
8
2
0
-
8
2
3
,
2
0
1
6
.
[1
2
]
S
u
re
sh
H
.
a
n
d
R
.
S
.
He
g
a
d
i,
“
D
CA
-
S
NC:
Du
a
l
Cry
p
t
o
sy
ste
m
Arc
h
it
e
c
tu
re
fo
r
S
e
c
u
re
Ne
two
rk
C
o
m
m
u
n
ica
ti
o
n
,
”
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
Ad
v
a
n
c
e
d
Res
e
a
rc
h
in
Co
mp
u
ter
S
c
ie
n
c
e
a
n
d
S
o
ft
wa
re
En
g
i
n
e
e
rin
g
,
v
o
l.
7
,
n
o
.
1
,
p
p
.
1
9
8
-
2
0
5
,
2
0
1
7
.
[1
3
]
S
.
Ur
Re
h
m
a
n
a
n
d
V
.
G
ru
h
n
,
“
An
Eff
e
c
ti
v
e
S
e
c
u
rit
y
Re
q
u
irem
e
n
ts
En
g
in
e
e
rin
g
F
ra
m
e
wo
rk
f
o
r
Cy
b
e
r
-
P
h
y
sic
a
l
S
y
ste
m
s
,
”
T
e
c
h
n
o
l
o
g
ies
,
v
o
l.
6
,
n
o
.
6
5
,
p
p
.
1
-
2
0
,
2
0
1
8
.
[1
4
]
S
a
fe
Co
d
e
,
“
F
u
n
d
a
m
e
n
tal
P
ra
c
ti
c
e
s fo
r
S
e
c
u
re
S
o
ftwa
re
,
”
T
h
ird
Ed
it
io
n
,
S
AF
ECo
d
e
,
2
0
1
8
.
[1
5
]
C
.
Ch
u
n
k
a
,
e
t
a
l.
,
“
An
e
fficie
n
t
m
e
c
h
a
n
ism
to
g
e
n
e
ra
te
d
y
n
a
m
ic
k
e
y
s
b
a
se
d
o
n
g
e
n
e
ti
c
a
lg
o
rit
h
m
,
”
S
p
e
c
ia
l
Iss
u
e
Arti
c
le
,
W
il
e
y
,
p
p
.
1
-
1
0
,
2
0
1
8
.
[1
6
]
R.
Ha
rih
a
ra
n
,
e
t
a
l.
,
“
M
u
lt
ip
le
k
e
y
G
e
n
e
ra
ti
o
n
f
o
r
S
e
c
u
ri
n
g
Da
ta
S
h
a
ri
n
g
a
n
d
Ba
c
k
u
p
,
”
I
n
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
En
g
i
n
e
e
rin
g
a
n
d
A
d
v
a
n
c
e
d
T
e
c
h
n
o
lo
g
y
,
v
o
l.
8
,
n
o
.
6
,
p
p
.
1
6
6
-
1
6
9
,
2
0
1
9
.
[1
7
]
M
.
Taja
m
m
u
l
a
n
d
R
.
P
a
rv
e
e
n
,
“
Ke
y
Ge
n
e
ra
ti
o
n
Alg
o
rit
h
m
Co
u
p
led
with
DE
S
fo
r
S
e
c
u
rin
g
Clo
u
d
S
t
o
ra
g
e
,
”
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
E
n
g
in
e
e
rin
g
a
n
d
A
d
v
a
n
c
e
d
T
e
c
h
n
o
l
o
g
y
,
v
o
l.
8
,
n
o
.
5
,
p
p
.
1
4
5
2
-
1
4
5
8
,
2
0
1
9
.
[1
8
]
A
.
S
h
a
rm
a
,
e
t
a
l.
,
“
De
sig
n
a
n
d
Im
p
lem
e
n
tatio
n
o
f
k
e
y
G
e
n
e
ra
ti
o
n
Al
g
o
rit
h
m
fo
r
S
e
c
u
re
Im
a
g
e
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
E
n
g
i
n
e
e
rin
g
a
n
d
A
d
v
a
n
c
e
d
T
e
c
h
n
o
l
o
g
y
,
v
o
l
.
8
,
n
o
.
2
,
p
p
.
5
1
3
9
-
5
1
4
6
,
2
0
1
9
.
[1
9
]
C
.
Th
iru
m
a
lai
a
n
d
H
.
Ka
r,
“
M
e
m
o
ry
Eff
icie
n
t
M
u
lt
i
Ke
y
(M
EM
K)
Ge
n
e
ra
ti
o
n
S
c
h
e
m
e
fo
r
S
e
c
u
re
Tran
sp
o
rtati
o
n
o
f
S
e
n
siti
v
e
Da
ta
o
v
e
r
Clo
u
d
a
n
d
Io
T
De
v
ice
s
,
”
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
In
n
o
v
a
ti
o
n
s
i
n
Po
we
r
a
n
d
Ad
v
a
n
c
e
d
Co
mp
u
t
in
g
T
e
c
h
n
o
l
o
g
ies
,
p
p
.
1
-
6
,
2
0
1
7
.
[2
0
]
J
.
Z
h
a
n
g
,
e
t
a
l.
,
“
Eff
icie
n
t
Ke
y
G
e
n
e
ra
ti
o
n
b
y
Ex
p
lo
i
ti
n
g
Ra
n
d
o
m
n
e
ss
fro
m
C
h
a
n
n
e
l
Re
sp
o
n
se
s
o
f
I
n
d
iv
i
d
u
a
l
OFDM
S
u
b
c
a
rriers
,
”
IEE
E
T
r
a
n
s
a
c
ti
o
n
s
o
n
Co
mm
u
n
ica
t
io
n
s
,
v
o
l.
6
4
,
p
p
.
2
5
7
8
-
2
5
8
8
,
2
0
1
6
.
[2
1
]
M
.
Yu
li
a
n
a
,
e
t
a
l.
,
“
A
S
im
p
le
S
e
c
re
t
Ke
y
G
e
n
e
ra
ti
o
n
b
y
Us
in
g
a
Co
m
b
in
a
ti
o
n
o
f
P
re
-
P
r
o
c
e
ss
in
g
M
e
th
o
d
wi
th
a
M
u
lt
il
e
v
e
l
Qu
a
n
t
iza
ti
o
n
,
”
J
o
u
r
n
a
l
o
f
En
tro
p
y
,
v
o
l.
2
1
,
n
o
.
1
9
2
,
p
p
.
1
-
2
5
,
2
0
1
9
.
[2
2
]
A
.
Z
.
Zak
a
ria,
e
t
a
l
.
,
“
En
h
a
n
c
in
g
t
h
e
Ra
n
d
o
m
n
e
ss
o
f
S
y
m
m
e
tri
c
Ke
y
u
sin
g
G
e
n
e
ti
c
Alg
o
rit
h
m
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
In
n
o
v
a
ti
v
e
T
e
c
h
n
o
lo
g
y
a
n
d
Exp
lo
ri
n
g
E
n
g
in
e
e
rin
g
,
v
o
l.
8
,
n
o
.
8
S
,
p
p
.
3
2
7
-
3
3
0
,
2
0
1
9
.
[2
3
]
Lev
e
l
1
Va
li
d
a
ti
o
n
,
“
S
i
g
a
b
a
G
a
te
wa
y
F
IP
S
1
4
0
-
1
No
n
-
P
ro
p
rieta
ry
S
e
c
u
rit
y
P
o
li
c
y
,
”
M
u
lt
i
-
c
h
ip
st
a
n
d
a
l
o
n
e
,
2
0
0
1
.
[2
4
]
H
.
E
.
Kw
o
n
g
,
“
C
ry
p
tan
a
ly
sis
o
f
t
h
e
S
ig
a
b
a
Ci
p
h
e
r
,
”
S
a
n
J
o
sé
S
tate
Un
iv
e
rsit
y
,
2
0
0
8
.
[2
5
]
S
h
.
M
.
Na
se
r,
M
.
S
.
Cro
o
c
k
,
“
De
v
e
lo
p
e
d
Li
g
h
twe
ig
h
t
Au
t
h
e
n
ti
c
a
ti
o
n
a
n
d
Ke
y
M
a
n
a
g
e
m
e
n
t
P
r
o
to
c
o
l
fo
r
Wi
re
les
s
S
e
n
so
r
Ne
two
r
k
,
”
I
n
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
A
d
v
a
n
c
e
d
Res
e
a
rc
h
i
n
S
c
ie
n
c
e
,
En
g
in
e
e
rin
g
a
n
d
T
e
c
h
n
o
lo
g
y
,
Vo
l.
5
,
No
.
8
,
p
p
.
6
6
0
6
-
6
6
1
9
,
2
0
1
8
.
Evaluation Warning : The document was created with Spire.PDF for Python.