I
nd
o
ne
s
ia
n J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
pu
t
er
Science
Vo
l.
3
7
,
No
.
3
,
Ma
r
ch
20
2
5
,
p
p
.
1
5
9
6
~
1
606
I
SS
N:
2
502
-
4
7
52
,
DOI
: 1
0
.
1
1
5
9
1
/ijee
cs
.v
3
7
.
i
3
.
pp
1
5
9
6
-
1
6
0
6
1596
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ee
cs
.
ia
esco
r
e.
co
m
Ana
ly
sis
of crypt
o
g
ra
phic methods
f
o
r ensu
ring
secu
rity in
the
field
o
f
int
e
rnet
of t
hi
ng
s
T
em
irbek
o
v
a
Z
ha
nerk
e
E
rla
no
v
na
1
,
Abdi
a
k
hm
et
o
v
a
Z
uk
hra
M
ura
t
o
v
na
1
,
T
y
ny
m
ba
y
ev
Sa
k
hy
ba
y
2
1
F
a
c
u
l
t
y
I
n
f
o
r
mat
i
o
n
Te
c
h
n
o
l
o
g
y
,
K
a
z
a
k
h
N
a
t
i
o
n
a
l
U
n
i
v
e
r
s
i
t
y
N
a
m
e
d
A
f
t
e
r
al
-
F
a
r
a
b
i
(
K
a
z
N
U
)
,
A
l
ma
t
y
,
K
a
z
a
k
h
st
a
n
2
F
a
c
u
l
t
y
o
f
C
o
mp
u
t
e
r
T
e
c
h
n
o
l
o
g
y
a
n
d
C
y
b
e
r
s
e
c
u
r
i
t
y
,
I
n
t
e
r
n
a
t
i
o
n
a
l
I
T
U
n
i
v
e
r
si
t
y
(
I
I
TU
)
,
A
l
mat
y
,
K
a
z
a
k
h
st
a
n
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Mar
12
,
2
0
2
4
R
ev
is
ed
Sep
26
,
2
0
2
4
Acc
ep
ted
Sep
30
,
2
0
2
4
Th
e
n
u
m
b
e
r
o
f
i
n
tern
e
t
o
f
t
h
in
g
s
(
Io
T)
d
e
v
ice
s
c
o
n
t
in
u
e
s
to
g
r
o
w,
a
n
d
so
d
o
th
e
a
ss
o
c
iate
d
c
o
n
c
e
rn
s
re
g
a
rd
i
n
g
t
h
e
ir
se
c
u
rit
y
a
n
d
p
riv
a
c
y
.
E
v
a
l
u
a
ti
n
g
t
h
e
e
ffica
c
y
o
f
c
ry
p
t
o
g
ra
p
h
ic
s
o
lu
t
io
n
s
with
i
n
I
o
T
sy
ste
m
s
e
m
e
rg
e
s
a
s
a
c
ru
c
ial
e
n
d
e
a
v
o
r
t
o
u
p
h
o
ld
t
h
e
in
teg
r
it
y
a
n
d
re
li
a
b
il
it
y
o
f
t
h
e
se
sy
ste
m
s.
Am
id
st
th
e
ra
p
id
e
v
o
lu
ti
o
n
o
f
Io
T
tec
h
n
o
lo
g
y
,
sa
fe
g
u
a
rd
in
g
t
h
e
c
o
n
fi
d
e
n
ti
a
li
t
y
,
in
teg
rit
y
,
a
n
d
a
v
a
il
a
b
il
it
y
o
f
d
a
t
a
e
m
e
rg
e
s
a
s
a
to
p
p
ri
o
rit
y
.
T
h
is
a
rti
c
le
unde
rsc
o
re
s
t
h
e
sig
n
ifi
c
a
n
c
e
o
f
d
e
p
lo
y
in
g
ro
b
u
st
c
r
y
p
t
o
g
ra
p
h
ic
a
l
g
o
rit
h
m
s
t
o
fo
rti
fy
I
o
T
d
e
v
ice
s
a
g
a
in
st
a
m
y
riad
o
f
p
o
te
n
ti
a
l
th
re
a
ts.
Eff
e
c
ti
v
e
e
v
a
lu
a
ti
o
n
o
f
c
ry
p
t
o
g
ra
p
h
ic
so
l
u
ti
o
n
s
with
in
Io
T
sy
ste
m
s
e
n
tails
a
c
o
m
p
re
h
e
n
siv
e
a
n
a
ly
sis
a
n
d
c
o
m
p
a
riso
n
o
f
d
i
v
e
r
s
e
a
lg
o
rit
h
m
s,
c
o
u
p
led
wit
h
a
n
a
ss
e
ss
m
e
n
t
o
f
t
h
e
ir
p
e
rfo
rm
a
n
c
e
,
re
sili
e
n
c
e
a
g
a
in
st
a
tt
a
c
k
s,
a
n
d
re
so
u
rc
e
u
ti
li
z
a
ti
o
n
.
Ce
n
tral
t
o
e
v
a
lu
a
ti
n
g
th
e
e
ffe
c
ti
v
e
n
e
ss
o
f
c
ry
p
t
o
g
ra
p
h
ic
so
l
u
ti
o
n
s
with
in
I
o
T
sy
ste
m
s
is
a
c
o
n
sid
e
ra
ti
o
n
o
f
v
a
rio
u
s
fa
c
to
rs
in
c
lu
d
i
n
g
c
o
m
p
u
tatio
n
a
l
c
o
m
p
lex
it
y
,
p
o
we
r
c
o
n
su
m
p
t
io
n
o
f
d
e
v
ice
s,
e
a
se
o
f
imp
lem
e
n
tatio
n
,
a
n
d
c
o
m
p
a
ti
b
il
i
ty
wit
h
e
x
ist
in
g
in
fra
s
tru
c
tu
re
s.
T
h
is
a
rti
c
le
re
v
iew
s
a
n
u
m
b
e
r
o
f
c
ry
p
to
g
ra
p
h
ic
so
lu
ti
o
n
s
in
c
l
u
d
i
n
g
Ri
v
e
st
–
S
h
a
m
ir
–
Ad
lem
a
n
(
RS
A
)
,
El
-
G
a
m
a
l,
P
a
il
li
e
r.
Th
e
se
a
lg
o
rit
h
m
s
a
re
imp
lem
e
n
ted
o
n
th
e
AT
m
e
g
a
2
5
6
0
m
icro
c
o
n
tro
ll
e
r,
wh
ich
a
ll
o
ws
fo
r
a
c
o
m
p
re
h
e
n
siv
e
a
ss
e
ss
m
e
n
t
o
f
k
e
y
p
a
ra
m
e
ters
su
c
h
a
s
e
fficie
n
c
y
in
term
s
o
f
e
n
c
ry
p
ti
o
n
a
n
d
d
e
c
ry
p
ti
o
n
ti
m
e
,
p
o
we
r
c
o
n
su
m
p
ti
o
n
,
a
n
d
m
e
m
o
ry
u
sa
g
e
o
f
Io
T
d
e
v
ice
s.
K
ey
w
o
r
d
s
:
AT
m
eg
a
2
5
6
0
m
icr
o
co
n
tr
o
ller
El
-
Gam
al
I
n
ter
n
et
o
f
th
in
g
s
s
y
s
tem
Pailli
er
R
SA
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Ab
d
iak
h
m
eto
v
a
Z
u
k
h
r
a
M
u
r
at
o
v
n
a
Facu
lty
I
n
f
o
r
m
atio
n
T
ec
h
n
o
l
o
g
y
,
Kaz
ak
h
Natio
n
al
Un
iv
er
s
it
y
Nam
ed
Af
ter
al
-
Far
a
b
i (
Kaz
NU)
Alm
aty
,
Kaz
ak
h
s
tan
E
m
ail:
zu
k
h
r
a.
a
b
d
iak
h
m
eto
v
a
@
g
m
ail.
co
m
1.
I
NT
RO
D
UCT
I
O
N
C
r
y
p
to
g
r
ap
h
ic
s
ec
u
r
ity
p
lay
s
a
p
iv
o
tal
r
o
le
in
en
s
u
r
in
g
th
e
co
n
f
id
en
tiality
o
f
d
ata
with
in
an
in
ter
n
et
o
f
th
in
g
s
(
I
o
T
)
s
y
s
tem
,
wh
er
e
n
u
m
er
o
u
s
d
ev
ices
in
ter
ac
t
an
d
ex
c
h
an
g
e
s
en
s
itiv
e
in
f
o
r
m
atio
n
[
1
]
.
T
h
ese
d
ev
ices
h
an
d
le
a
v
ast
ar
r
a
y
o
f
d
ata,
in
clu
d
in
g
p
er
s
o
n
al
d
et
ails
,
m
ed
ical
r
ec
o
r
d
s
,
an
d
f
in
an
cial
in
f
o
r
m
atio
n
.
Utilizin
g
cr
y
p
to
g
r
ap
h
ic
m
et
h
o
d
s
is
p
ar
am
o
u
n
t
t
o
en
cr
y
p
tin
g
t
h
is
d
ata,
th
er
eb
y
g
u
ar
a
n
teein
g
its
co
n
f
id
en
tiality
an
d
th
war
tin
g
u
n
a
u
th
o
r
ized
a
cc
ess
[
2
]
.
Giv
en
th
e
d
iv
e
r
s
e
r
an
g
e
o
f
cr
y
p
to
g
r
ap
h
ic
alg
o
r
i
th
m
s
av
ailab
le
f
o
r
im
p
lem
en
tatio
n
in
I
o
T
s
y
s
tem
s
,
it
b
ec
o
m
es
im
p
er
ativ
e
to
d
is
ce
r
n
th
e
m
o
s
t
s
u
itab
le
s
o
lu
tio
n
s
tailo
r
ed
to
th
e
s
p
ec
if
ic
r
eq
u
is
ites
an
d
co
n
s
tr
ain
ts
o
f
s
u
c
h
s
y
s
tem
s
.
T
h
r
o
u
g
h
th
e
ev
alu
atio
n
o
f
c
r
y
p
t
o
g
r
ap
h
i
c
s
o
lu
tio
n
s
,
f
ac
to
r
s
s
u
ch
as
p
er
f
o
r
m
a
n
ce
,
p
o
wer
co
n
s
u
m
p
tio
n
,
an
d
s
ec
u
r
ity
m
eticu
lo
u
s
ly
s
cr
u
tin
ized
,
en
a
b
lin
g
a
co
m
p
a
r
ativ
e
an
aly
s
is
.
T
h
is
en
d
ea
v
o
r
f
ac
ilit
ate
s
th
e
id
en
tific
atio
n
o
f
o
p
ti
m
al
alg
o
r
ith
m
s
t
h
at
alig
n
with
th
e
I
o
T
s
y
s
tem
'
s
r
eq
u
ir
em
e
n
ts
,
th
er
eb
y
e
n
s
u
r
i
n
g
r
o
b
u
s
t
p
r
o
tectio
n
o
f
d
ata
.
T
o
d
ay
,
t
h
e
I
o
T
p
r
esen
ts
n
u
m
er
o
u
s
b
e
n
ef
its
,
in
clu
d
in
g
au
to
m
atio
n
,
r
e
al
-
tim
e
m
an
ag
e
m
en
t,
a
n
d
t
h
e
a
g
g
r
eg
atio
n
o
f
v
ast
v
o
lu
m
es
o
f
d
ata.
Ho
wev
e
r
,
alo
n
g
s
id
e
th
ese
ad
v
an
tag
es,
n
ew
th
r
ea
ts
h
av
e
em
er
g
e
d
co
n
ce
r
n
in
g
th
e
co
n
f
id
en
tia
lity
,
in
teg
r
ity
,
an
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2
5
0
2
-
4
7
52
A
n
a
lysi
s
o
f c
r
yp
to
g
r
a
p
h
ic
met
h
o
d
s
fo
r
en
s
u
r
in
g
s
ec
u
r
ity
…
(
Temir
b
ek
o
va
Zh
a
n
erke
E
r
la
n
o
vn
a
)
1597
av
ailab
ilit
y
o
f
in
f
o
r
m
atio
n
with
in
I
o
T
n
etwo
r
k
s
.
T
h
is
u
n
d
er
s
co
r
es
th
e
cr
u
cial
r
o
le
o
f
cr
y
p
to
g
r
ap
h
ic
s
o
lu
tio
n
s
as in
d
is
p
en
s
ab
le
to
o
ls
f
o
r
s
af
e
g
u
ar
d
in
g
d
ata
a
n
d
en
s
u
r
in
g
s
e
cu
r
ity
with
in
th
e
I
o
T
ec
o
s
y
s
te
m
.
Selectin
g
ef
f
ec
tiv
e
cr
y
p
to
g
r
a
p
h
ic
s
o
lu
tio
n
s
f
o
r
I
o
T
s
y
s
te
m
s
is
p
ar
am
o
u
n
t
f
o
r
en
s
u
r
in
g
th
e
s
ec
u
r
e
s
to
r
ag
e
o
f
d
e
v
ices
an
d
d
ata.
C
r
y
p
to
g
r
ap
h
ic
alg
o
r
it
h
m
s
an
d
p
r
o
to
co
ls
p
lay
a
v
ital
r
o
l
e
in
d
eli
v
er
in
g
d
ata
en
cr
y
p
tio
n
,
d
ev
ice
an
d
u
s
er
a
u
th
en
ticatio
n
,
as
well
as
s
af
eg
u
ar
d
in
g
ag
ain
s
t
attac
k
s
an
d
u
n
au
th
o
r
ize
d
ac
ce
s
s
.
T
h
is
u
n
d
er
s
co
r
es
th
e
cr
itical
im
p
o
r
tan
ce
o
f
m
eticu
lo
u
s
ly
ch
o
o
s
in
g
r
o
b
u
s
t
cr
y
p
t
o
g
r
a
p
h
ic
m
ec
h
an
is
m
s
to
f
o
r
tify
th
e
in
te
g
r
ity
an
d
c
o
n
f
id
en
tiality
o
f
I
o
T
ec
o
s
y
s
tem
s
.
T
o
ev
alu
ate
th
e
ef
f
icac
y
o
f
cr
y
p
to
g
r
ap
h
ic
s
o
lu
tio
n
s
in
I
o
T
s
y
s
tem
s
,
v
ar
io
u
s
asp
ec
ts
n
ee
d
to
co
n
s
id
er
.
Am
o
n
g
th
ese
f
ac
to
r
s
,
p
e
r
f
o
r
m
an
c
e
h
o
ld
s
s
ig
n
if
ican
t
im
p
o
r
tan
ce
,
as
I
o
T
s
y
s
tem
s
o
p
er
ate
in
r
ea
l
-
tim
e
s
ce
n
ar
io
s
n
ec
ess
itatin
g
th
e
p
r
o
ce
s
s
in
g
o
f
v
ast
d
ata
v
o
lu
m
es
with
m
in
im
al
d
elay
.
C
r
y
p
to
g
r
ap
h
ic
alg
o
r
ith
m
s
m
u
s
t
b
e
o
p
tim
ized
to
f
u
n
ctio
n
e
f
f
e
ctiv
ely
o
n
d
ev
ices
p
o
s
s
ess
in
g
lim
ited
co
m
p
u
tatio
n
al
r
eso
u
r
ce
s
an
d
lo
w
p
o
w
er
co
n
s
u
m
p
tio
n
ca
p
ab
ilit
ies.
I
n
ex
am
in
in
g
h
o
w
d
iv
er
s
e
cr
y
p
t
o
g
r
ap
h
ic
s
o
lu
tio
n
s
ca
n
ad
d
r
ess
th
e
d
em
a
n
d
s
o
f
I
o
T
s
y
s
tem
s
,
ca
r
ef
u
l a
tten
tio
n
was p
aid
to
v
ar
io
u
s
f
ac
ets
in
clu
d
in
g
p
er
f
o
r
m
a
n
ce
,
p
o
wer
ef
f
icien
cy
,
an
d
s
ec
u
r
ity
.
No
tab
ly
,
th
e
ass
ess
m
en
t
en
co
m
p
ass
ed
th
e
u
tili
za
tio
n
o
f
E
l
-
Gam
al,
Pailli
er
an
d
R
iv
est
–
Sh
am
ir
–
A
d
lem
an
(
R
SA
)
cr
y
p
to
g
r
ap
h
ic
alg
o
r
ith
m
s
,
all
in
teg
r
al
in
s
af
eg
u
ar
d
in
g
in
f
o
r
m
atio
n
wit
h
in
I
o
T
in
f
r
astru
ctu
r
es.
Du
e
to
th
e
co
n
s
tr
ain
ed
c
o
m
p
u
tin
g
r
eso
u
r
ce
s
,
lim
ited
m
em
o
r
y
,
an
d
ab
s
en
ce
o
f
r
o
b
u
s
t
p
r
o
ce
s
s
o
r
s
in
I
o
T
d
ev
i
ce
s
,
th
ey
ty
p
ically
d
o
n
o
t
u
tili
ze
s
o
p
h
is
ticated
o
p
er
atin
g
s
y
s
tem
s
b
u
t
r
ath
er
r
ely
o
n
lig
h
tweig
h
t
r
ea
l
-
tim
e
o
p
er
atin
g
s
y
s
tem
s
.
Mo
r
eo
v
er
,
I
o
T
d
e
v
ices
ar
e
s
u
s
ce
p
tib
le
to
v
ar
io
u
s
attac
k
s
,
with
p
h
y
s
ical
attac
k
s
b
ein
g
a
co
m
m
o
n
c
o
n
ce
r
n
.
Attack
er
s
m
ay
r
eso
r
t
to
tactics
s
u
ch
as
s
tealin
g
th
e
d
ev
ice,
p
r
o
b
in
g
it
in
a
c
o
n
tr
o
lle
d
en
v
ir
o
n
m
e
n
t
to
an
al
y
ze
its
in
ter
n
al
wo
r
k
i
n
g
s
,
o
r
attem
p
tin
g
to
r
e
v
er
s
e
en
g
in
ee
r
it
af
ter
p
u
r
ch
asin
g
it.
I
n
s
o
m
e
in
s
tan
ce
s
,
attac
k
er
s
m
ay
ex
p
lo
it
v
u
ln
er
a
b
ilit
ies
b
y
d
o
wn
lo
a
d
in
g
f
ir
m
war
e
f
r
o
m
o
f
f
icial
d
is
tr
ib
u
tio
n
ch
an
n
els,
an
aly
zin
g
it
to
u
n
co
v
er
s
ec
u
r
ity
k
ey
s
an
d
en
co
d
ed
p
ass
wo
r
d
s
.
Giv
e
n
th
ese
v
u
ln
er
ab
ilit
ies,
em
p
l
o
y
in
g
cr
y
p
t
o
g
r
ap
h
ic
m
eth
o
d
s
em
e
r
g
es
as
an
ef
f
ec
tiv
e
s
tr
ateg
y
to
en
h
a
n
ce
th
e
s
ec
u
r
it
y
o
f
I
o
T
d
e
v
ices a
n
d
m
itig
ate
p
o
ten
tial r
is
k
s
.
C
r
y
p
to
g
r
ap
h
ic
d
ata
en
cr
y
p
tio
n
is
th
e
p
r
im
ar
y
m
ea
n
s
o
f
p
r
o
tectin
g
in
f
o
r
m
atio
n
in
I
o
T
s
y
s
tem
s
.
B
er
tin
o
an
d
San
d
h
u
[
3
]
,
en
cr
y
p
tio
n
alg
o
r
ith
m
s
s
u
ch
as
AE
S
an
d
R
SA
ar
e
wid
ely
u
s
ed
to
e
n
s
u
r
e
th
e
co
n
f
id
en
tiality
o
f
tr
a
n
s
m
itted
d
ata.
Ho
wev
e
r
,
g
iv
en
t
h
e
li
m
ited
co
m
p
u
tin
g
r
eso
u
r
ce
s
o
f
I
o
T
d
ev
ices,
th
e
ef
f
icien
cy
an
d
p
e
r
f
o
r
m
an
ce
o
f
th
ese
alg
o
r
ith
m
s
m
u
s
t
b
e
tak
en
in
to
ac
co
u
n
t
Ass
ir
i
a
n
d
Alm
ag
wash
i
[
4
]
.
Yan
g
et
a
l
.
[
5
]
d
is
cu
s
s
s
y
m
m
etr
ic
an
d
asy
m
m
etr
ic
en
cr
y
p
tio
n
alg
o
r
ith
m
s
,
h
ash
f
u
n
ctio
n
s
,
an
d
au
th
en
ticatio
n
an
d
k
ey
m
an
ag
e
m
en
t
m
eth
o
d
s
.
Fo
r
e
ac
h
m
eth
o
d
,
its
ad
v
an
tag
es,
d
is
ad
v
an
tag
es
a
n
d
ap
p
licab
ilit
y
in
th
e
co
n
tex
t
o
f
I
o
T
s
y
s
tem
s
ar
e
ass
es
s
ed
.
Ma
et
a
l
.
[
6
]
an
al
y
ze
v
ar
io
u
s
en
cr
y
p
tio
n
a
n
d
h
ash
in
g
alg
o
r
ith
m
s
o
p
tim
ized
f
o
r
lo
w
-
p
e
r
f
o
r
m
an
ce
an
d
lo
w
-
p
o
wer
d
ev
ices.
Pa
r
ticu
lar
atten
tio
n
is
p
ai
d
to
th
e
ef
f
ec
tiv
e
n
ess
an
d
s
ec
u
r
ity
o
f
th
ese
m
et
h
o
d
s
in
th
e
co
n
te
x
t
o
f
th
e
I
o
T
en
v
ir
o
n
m
en
t.
Hellao
u
i
et
a
l
.
[
7
]
an
aly
ze
d
ata
t
r
an
s
f
er
p
r
o
to
co
ls
s
u
c
h
as
MQ
T
T
,
C
o
AP
an
d
HT
T
P,
an
d
p
r
o
p
o
s
e
cr
iter
ia
f
o
r
s
elec
tin
g
cr
y
p
to
g
r
ap
h
ic
m
eth
o
d
s
t
o
en
s
u
r
e
th
e
s
ec
u
r
ity
o
f
d
ata
tr
a
n
s
f
er
in
th
ese
p
r
o
to
c
o
ls
.
H
a
t
z
i
v
a
s
i
l
i
s
et
a
l
.
[
8
]
an
aly
ze
th
e
v
u
ln
er
ab
ilit
ies
an
d
th
r
ea
ts
ass
o
ciate
d
with
lo
w
-
lev
el
co
m
m
u
n
icatio
n
p
r
o
to
co
ls
an
d
p
r
o
p
o
s
e
cr
y
p
to
g
r
ap
h
ic
te
ch
n
iq
u
es
to
p
r
o
tect
ag
ain
s
t
s
u
ch
attac
k
s
.
D
h
an
d
a
et
a
l
.
[
9
]
d
is
cu
s
s
es
th
e
ch
allen
g
es
o
f
k
ey
m
an
ag
em
en
t
i
n
I
o
T
d
ep
lo
y
m
en
ts
a
n
d
p
r
o
v
id
es
r
ec
o
m
m
e
n
d
atio
n
s
f
o
r
im
p
r
o
v
in
g
k
e
y
m
an
ag
em
e
n
t
p
r
ac
tices
to
en
h
an
ce
th
e
s
ec
u
r
ity
o
f
I
o
T
s
y
s
tem
s
.
E
f
f
ec
tiv
e
ev
alu
atio
n
o
f
cr
y
p
to
g
r
ap
h
ic
s
o
lu
tio
n
s
in
v
o
lv
es
an
a
ly
zin
g
v
ar
io
u
s
m
etr
ics
s
u
ch
as
p
r
o
ce
s
s
in
g
s
p
ee
d
,
m
em
o
r
y
u
s
ag
e,
an
d
p
o
wer
c
o
n
s
u
m
p
tio
n
.
As
n
o
ted
b
y
Sak
h
i
et
al
.
[
1
0
]
th
e
ev
alu
atio
n
o
f
cr
y
p
to
g
r
ap
h
i
c
alg
o
r
ith
m
s
s
h
o
u
ld
tak
e
i
n
to
ac
co
u
n
t
t
h
e
r
eso
u
r
ce
r
eq
u
ir
em
e
n
ts
o
f
I
o
T
d
e
v
ices,
wh
ich
r
eq
u
ir
es
th
e
a
d
ap
tatio
n
o
f
tr
ad
itio
n
al
cr
y
p
to
g
r
a
p
h
ic
m
eth
o
d
s
to
en
s
u
r
e
th
eir
p
r
ac
t
ical
ap
p
licatio
n
.
T
h
e
r
esil
ien
ce
o
f
cr
y
p
to
g
r
ap
h
ic
s
o
lu
tio
n
s
to
v
ar
io
u
s
ty
p
es
o
f
attac
k
s
is
also
a
k
ey
asp
ec
t
o
f
th
e
ev
alu
atio
n
.
Acc
o
r
d
in
g
to
th
e
r
esear
ch
co
n
d
u
cte
d
b
y
Sin
g
h
et
a
l
.
[
1
1
]
it
is
n
ec
es
s
ar
y
to
co
n
d
u
ct
r
e
g
u
lar
v
u
ln
e
r
ab
ilit
y
test
s
an
d
u
p
d
ate
cr
y
p
to
g
r
ap
h
ic
alg
o
r
ith
m
s
in
r
esp
o
n
s
e
to
n
e
w
th
r
ea
ts
.
C
r
y
p
to
g
r
ap
h
ic
m
eth
o
d
s
s
h
o
u
ld
b
e
ab
le
to
with
s
tan
d
b
o
th
c
u
r
r
e
n
t
an
d
p
o
ten
tial f
u
tu
r
e
attac
k
s
,
in
clu
d
in
g
q
u
an
t
u
m
co
m
p
u
tin
g
attac
k
s
.
W
ith
th
e
r
ap
id
d
ev
elo
p
m
en
t
o
f
tech
n
o
lo
g
y
an
d
th
e
em
er
g
en
ce
o
f
n
ew
th
r
ea
ts
,
co
n
s
tan
t
u
p
d
atin
g
o
f
cr
y
p
to
g
r
ap
h
ic
s
o
lu
tio
n
s
is
r
eq
u
ir
ed
.
R
esear
ch
s
u
ch
as
th
e
wo
r
k
Sin
g
h
et
a
l
.
[
1
2
]
h
ig
h
li
g
h
ts
th
e
n
ee
d
f
o
r
a
d
y
n
am
ic
ap
p
r
o
ac
h
to
cr
y
p
to
g
r
a
p
h
ic
s
e
cu
r
ity
th
at
in
clu
d
es
r
eg
u
lar
test
in
g
an
d
u
p
d
atin
g
o
f
th
e
alg
o
r
ith
m
s
u
s
ed
.
E
f
f
ec
tiv
ely
ev
alu
atin
g
cr
y
p
to
g
r
ap
h
ic
s
o
lu
tio
n
s
in
I
o
T
s
y
s
tem
s
is
a
co
m
p
lex
an
d
m
u
ltifa
ce
ted
task
th
at
r
eq
u
ir
es
co
n
s
id
er
atio
n
o
f
m
an
y
f
ac
to
r
s
,
in
clu
d
in
g
p
er
f
o
r
m
an
ce
,
attac
k
r
esis
tan
ce
,
an
d
r
eso
u
r
ce
co
n
s
tr
ain
ts
.
B
u
t
th
e
au
th
o
r
s
d
id
n
o
t
co
n
s
id
er
v
ar
io
u
s
cr
y
p
to
g
r
ap
h
ic
tech
n
iq
u
es,
s
u
ch
as
p
e
r
f
o
r
m
an
ce
,
p
o
we
r
co
n
s
u
m
p
tio
n
,
a
n
d
m
em
o
r
y
u
s
ag
e,
o
r
p
r
o
v
i
d
e
r
ec
o
m
m
en
d
atio
n
s
f
o
r
t
h
eir
u
s
e
in
s
p
ec
if
ic
s
ce
n
ar
io
s
.
E
f
f
ec
t
iv
e
ev
alu
atio
n
o
f
c
r
y
p
to
g
r
ap
h
ic
s
o
lu
tio
n
s
in
I
o
T
s
y
s
tem
s
is
th
e
b
asis
f
o
r
en
s
u
r
in
g
r
eliab
ilit
y
,
s
ec
u
r
ity
an
d
p
r
iv
ac
y
o
f
d
ata.
T
h
is
ev
alu
at
io
n
n
o
t
o
n
ly
h
elp
s
p
r
o
tect
ag
ain
s
t
c
u
r
r
en
t
t
h
r
ea
t
s
,
b
u
t
also
allo
ws
s
y
s
tem
s
to
ad
ap
t
t
o
f
u
tu
r
e
c
h
allen
g
es.
W
ith
th
e
g
r
o
win
g
n
u
m
b
er
o
f
co
n
n
ec
ted
d
e
v
ices
an
d
in
cr
ea
s
in
g
v
o
lu
m
es
o
f
tr
a
n
s
m
itted
in
f
o
r
m
atio
n
,
h
ig
h
-
q
u
ality
cr
y
p
to
g
r
a
p
h
ic
p
r
o
tectio
n
is
b
ec
o
m
in
g
an
in
t
eg
r
al
p
ar
t
o
f
r
eliab
le
a
n
d
s
ec
u
r
e
I
o
T
s
y
s
tem
s
.
T
h
is
r
esear
ch
p
ap
er
d
is
cu
s
s
es
th
e
u
s
e
o
f
ef
f
ec
tiv
e
cr
y
p
to
g
r
a
p
h
i
c
al
g
o
r
ith
m
s
to
p
r
o
tect
I
o
T
d
ev
ices
f
r
o
m
v
ar
io
u
s
th
r
ea
ts
,
an
d
also
co
n
d
u
cts
a
co
m
p
r
eh
e
n
s
iv
e
ass
ess
m
en
t
o
f
k
ey
p
ar
a
m
eter
s
,
s
u
ch
as
ef
f
ici
en
cy
in
ter
m
s
o
f
en
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
tim
e,
p
o
wer
co
n
s
u
m
p
tio
n
a
n
d
m
em
o
r
y
u
s
e.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
52
In
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
7
,
No
.
3
,
Ma
r
ch
20
2
5
:
1
596
-
1
6
0
6
1598
2.
M
E
T
H
O
D
Data
p
r
o
tectio
n
is
n
ec
ess
ar
y
t
o
en
s
u
r
e
th
at
t
h
e
d
ata
is
n
o
t
m
is
u
s
ed
o
r
ac
ce
s
s
ed
with
o
u
t
p
er
m
is
s
io
n
,
wh
ile
m
ain
tain
in
g
th
e
p
r
iv
ac
y
an
d
p
er
s
o
n
al
i
n
f
o
r
m
atio
n
o
f
th
e
u
s
er
.
I
n
th
is
r
esear
c
h
p
ap
e
r
,
asy
m
m
etr
ic
en
cr
y
p
tio
n
alg
o
r
ith
m
s
ar
e
u
s
ed
to
p
r
o
tect
d
ata
in
I
o
T
.
I
t
is
im
p
o
r
tan
t
t
o
ca
r
ef
u
lly
s
elec
t
an
d
im
p
lem
en
t
en
cr
y
p
tio
n
alg
o
r
ith
m
s
b
ased
o
n
th
e
s
p
ec
if
ic
n
ee
d
s
o
f
th
e
I
o
T
s
y
s
tem
,
an
d
s
ec
u
r
ely
m
a
n
ag
e
en
cr
y
p
tio
n
k
ey
s
to
m
ain
tain
en
cr
y
p
tio
n
i
n
teg
r
ity
.
2.
1
.
El
-
G
a
m
a
l c
r
y
pto
g
ra
ph
i
c
s
y
s
t
em
El
-
Gam
al
cr
y
p
to
g
r
ap
h
ic
s
y
s
tem
is
an
asy
m
m
etr
ic
cr
y
p
to
g
r
a
p
h
ic
p
r
o
t
o
co
l
b
ased
o
n
th
e
co
m
b
in
ato
r
ial
d
is
cr
ete
lo
g
ar
ith
m
p
r
o
b
lem
in
lim
ited
f
ield
s
[
1
3
]
,
[
1
4
]
.
T
h
e
E
l
-
Gam
al
cr
y
p
to
g
r
ap
h
ic
s
y
s
tem
co
n
s
is
ts
o
f
th
r
ee
m
ain
s
tep
s
:
1)
Gen
er
atin
g
t
h
e
k
ey
th
r
o
u
g
h
A
lice
g
en
er
atin
g
p
u
b
lic
an
d
p
r
iv
ate
k
e
y
s
.
Alice
g
e
n
er
ates
th
e
p
u
b
lic
k
e
y
a
n
d
s
en
d
s
it to
B
o
b
;
2)
B
o
b
u
s
es Alice
'
s
p
u
b
lic
k
ey
to
s
en
d
Alice
an
en
cr
y
p
ted
m
ess
ag
e
(
cip
h
e
r
tex
t)
;
3)
Alice
u
s
es B
o
b
'
s
p
r
iv
ate
k
ey
t
o
d
ec
r
y
p
t th
e
en
c
r
y
p
te
d
tex
t.
Key
g
en
er
atio
n
(
Alice
is
th
e
r
ec
ip
ien
t o
f
th
e
m
ess
ag
e)
:
−
s
elec
t
(
–
lar
g
e
p
r
im
e
n
u
m
b
er
);
−
f
in
d
in
g
th
e
s
im
p
le
r
o
o
t
:
;
−
a
r
an
d
o
m
in
teg
er
is
ch
o
s
en
as its
p
r
iv
ate
k
ey
(
1
<
<
−
1
);
−
ca
lcu
latio
n
:
=
.
−
p
u
b
lic
k
e
y
: (
,
,
)
,
clo
s
ed
k
ey
:
(
).
E
n
cr
y
p
tio
n
(
B
o
b
–
m
ess
ag
e
s
en
d
er
)
:
−
O
p
en
t
ex
t:
(
<
);
−
S
elec
t a
r
an
d
o
m
in
te
g
er
: (
1
<
<
−
1
an
d
gc
d
(
,
−
1
)
=
1
);
−
1
an
d
2
ca
lcu
latio
n
o
f
t
h
e
two
v
a
lu
es,
wh
er
e
1
=
,
2
=
×
.
De
cr
y
p
tio
n
(
Alice
is
th
e
r
ec
ip
ien
t o
f
th
e
m
ess
ag
e)
:
E
n
cr
y
p
te
d
tex
t: (
1
,
2
);
Op
en
t
ex
t:
=
×
−
1
−
.
E
x
am
p
le:
m
ess
ag
e
v
alu
e
b
y
A
SC
I
I
co
d
e:
[
4
]
=
{
67
,
1
1
1
, 1
09
,
1
12
}
Key
g
en
er
atio
n
:
=
137
=
3
=
85
=
%
=
3
85
%
137
=
10
Pu
b
lic
k
ey
:
(
,
,
)
,
p
r
iv
ate
k
e
y
:
.
E
n
cr
y
p
tio
n
:
=
55
[
0
]
=
3
55
%
137
=
104
,
[
0
]
=
10
55
×
67
%
137
=
130
[
1
]
=
3
55
%
137
=
104
,
[
1
]
=
10
55
×
111
%
137
=
107
[
2
]
=
3
55
%
137
=
104
,
[
2
]
=
10
55
×
109%
137
=
52
[
3
]
=
3
55
%
137
=
104
,
[
3
]
=
10
55
×
112
%
137
=
66
De
cr
y
p
tio
n
:
[
0
]
=
130
×
104
51
%
137
=
67
[
1
]
=
107
×
104
51
%
137
=
111
[
2
]
=
52
×
104
51
%
137
=
109
[
3
]
=
66
×
104
51
%
137
=
112
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2
5
0
2
-
4
7
52
A
n
a
lysi
s
o
f c
r
yp
to
g
r
a
p
h
ic
met
h
o
d
s
fo
r
en
s
u
r
in
g
s
ec
u
r
ity
…
(
Temir
b
ek
o
va
Zh
a
n
erke
E
r
la
n
o
vn
a
)
1599
2
.
2
.
P
a
illi
er
cr
y
pto
g
r
a
ph
ic
s
y
s
t
em
T
h
e
Pailli
er
cr
y
p
to
s
y
s
tem
s
ta
n
d
s
as
an
asy
m
m
etr
ic
alg
o
r
ith
m
r
en
o
wn
ed
f
o
r
its
u
n
iq
u
e
ca
p
ab
ilit
y
to
ex
ec
u
te
o
p
er
atio
n
s
lik
e
ad
d
itio
n
an
d
m
u
ltip
licatio
n
wh
ile
p
r
eser
v
in
g
th
e
in
teg
r
ity
o
f
b
o
th
en
cr
y
p
tio
n
an
d
en
cr
y
p
ted
d
ata
[
1
5
]
-
[
1
7
]
.
Key
g
en
er
atio
n
:
−
(
,
(
−
1
)
(
−
1
)
)
=
1
lar
g
e
p
r
im
es
an
d
s
atis
f
y
in
g
th
e
co
n
d
itio
n
ar
e
c
h
o
s
en
;
−
=
×
an
d
=
(
−
1
,
−
1
)
ca
lcu
lated
;
−
=
+
1
ca
lcu
lated
;
−
=
(
(
2
)
)
−
1
ca
lcu
lated
;
wh
er
e
(
)
=
(
−
1
)
;
−
p
u
b
lic
k
e
y
:
(
,
)
,
p
r
iv
ate
k
ey
:
(
,
)
.
E
n
cr
y
p
tio
n
:
−
m
ess
ag
e,
wh
er
e
∈
ℤ
;
−
(
∈
ℤ
2
∗
)
a
r
an
d
o
m
n
u
m
b
e
r
is
s
elec
ted
;
−
=
×
2
en
cr
y
p
te
d
tex
t is ca
lcu
lated
.
De
cr
y
p
tio
n
:
−
tu
r
n
s
o
u
t a
n
en
cr
y
p
ted
te
x
t
,
w
h
er
e
(
∈
ℤ
2
∗
)
;
−
=
(
2
)
×
o
p
en
te
x
t is ca
lcu
lated
.
Fo
r
ex
am
p
le
B
y
ASC
I
I
co
d
e:
[
4
]
=
{
67
,
1
1
1
,
1
0
9
,
1
1
2
}
Key
g
en
er
atio
n
:
=
31
,
=
37
=
×
=
31
×
37
=
1147
=
180
=
+
1
=
1147
+
1
=
1148
=
%
2
−
1
−
1
%
=
1148
180
%
1147
2
−
1
1147
−
1
%
1147
=
873
Pu
b
lic
k
ey
:
(
,
)
,
p
r
iv
ate
k
ey
:
(
,
)
.
E
n
cr
y
p
tio
n
:
=
600
[
0
]
=
1148
67
×
600
1147
%
1147
2
=
692336
[
1
]
=
1148
111
×
600
1147
%
1147
2
=
1614524
[
2
]
=
1148
109
×
600
1147
%
1147
2
=
265652
[
3
]
=
1148
112
×
600
1147
%
1147
2
=
490464
Dec
r
y
p
tio
n
:
[
0
]
=
6
92
3
3
6
1
8
0
%
1
1
4
7
2
−
1
1147
×
873
%
1147
=
67
[
1
]
=
1614524
180
%
1147
2
−
1
1147
×
873
%
1147
=
111
[
2
]
=
265652
1
8
0
%
1
1
4
7
2
−
1
1147
×
873
%
1147
=
109
[
3
]
=
4
90
4
6
4
180
%
1147
2
−
1
1147
×
873
%
1147
=
112
2
.
3
.
RSA
cr
y
pto
g
ra
ph
ic
s
y
s
t
em
I
n
1
9
7
7
,
R
iv
est
f
o
r
m
u
lated
an
alg
o
r
ith
m
b
ased
o
n
th
e
d
if
f
ic
u
lty
o
f
f
ac
to
r
in
g
th
e
p
r
o
d
u
ct
o
f
two
lar
g
e
p
r
im
e
n
u
m
b
er
s
.
I
n
th
e
f
u
tu
r
e,
th
is
alg
o
r
ith
m
an
d
th
e
en
tire
e
n
cr
y
p
tio
n
s
y
s
tem
was
n
am
ed
R
SA
af
ter
th
e
f
ir
s
t
letter
s
o
f
th
e
n
am
es o
f
th
e
cr
ea
to
r
s
[
1
8
]
-
[
2
1
]
.
B
ef
o
r
e
u
s
in
g
th
e
R
SA
alg
o
r
it
h
m
,
y
o
u
f
ir
s
t
n
ee
d
to
g
en
er
ate
p
u
b
lic
an
d
p
r
iv
ate
k
ey
s
ac
c
o
r
d
in
g
t
o
th
e
f
o
llo
win
g
s
ce
n
ar
io
:
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
52
In
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
7
,
No
.
3
,
Ma
r
ch
20
2
5
:
1
596
-
1
6
0
6
1600
−
C
h
o
o
s
e
two
lar
g
e
p
r
i
m
e
n
u
m
b
er
s
an
d
;
−
Dete
r
m
in
e
=
×
;
−
C
h
o
o
s
e
a
lar
g
e
r
an
d
o
m
n
u
m
b
er
,
wh
ich
s
h
o
u
l
d
b
e
co
p
r
im
e
with
th
e
r
esu
lt
o
f
m
u
ltip
licat
io
n
(
−
1
)
×
(
−
1
)
;
−
D
eter
m
in
e
a
n
u
m
b
er
,
f
o
r
wh
i
ch
th
e
r
elatio
n
(
×
)
(
(
−
1
)
×
(
−
1
)
)
=
1
is
s
atis
f
ied
;
−
P
u
b
lic
k
ey
-
(
,
)
,
p
r
iv
ate
k
ey
–
(
,
).
E
n
cr
y
p
tio
n
:
T
o
e
n
cr
y
p
t d
ata
u
s
in
g
a
p
u
b
lic
k
ey
(
e
,
n
)
,
th
e
f
o
llo
wi
n
g
s
tep
s
ar
e
p
er
f
o
r
m
e
d
:
−
S
p
lit
th
e
s
o
u
r
ce
tex
t in
to
b
lo
ck
s
,
ea
ch
o
f
wh
ich
ca
n
b
e
d
en
o
te
d
b
y
a
n
in
teg
er
f
r
o
m
0
to
(
−
1
)
;
−
E
n
cr
y
p
t
th
e
tex
t,
c
o
n
s
id
er
e
d
as
a
s
eq
u
en
ce
o
f
n
u
m
b
e
r
s
[
]
,
o
n
ea
ch
o
f
wh
ic
h
th
e
o
p
er
atio
n
[
]
=
(
[
]
)
is
p
er
f
o
r
m
e
d
.
Dec
r
y
p
tio
n
:
Dec
r
y
p
tio
n
is
d
o
n
e
in
t
h
e
s
am
e
way
as e
n
cr
y
p
tio
n
,
b
u
t
h
er
e
th
e
s
ec
r
et
k
ey
(
d
,
n
)
is
u
s
ed
:
T
h
e
o
p
e
r
atio
n
[
]
=
(
[
]
)
is
p
er
f
o
r
m
e
d
.
R
SA
–
E
x
am
p
le
I
n
p
u
t
tex
t:
ASC
I
I
co
d
es o
f
s
tr
in
g
ch
ar
ac
te
r
s
:
[
5
]
=
{7
8
,
1
1
7
,
1
1
4
,
1
0
0
,
9
7
}
Key
g
en
er
atio
n
:
=
13
,
=
29
=
×
=
13
×
29
=
377
(
)
=
(
−
1
)
(
−
1
)
=
12
×
28
=
336
=
5
,
=
269
Pu
b
lic
k
ey
:
(
,
)
,
p
r
iv
ate
k
ey
:
(
,
)
.
E
n
cr
y
p
tio
n
:
[
0
]
=
78
5
%
377
=
169
[
1
]
=
117
5
%
377
=
117
[
2
]
=
114
5
%
377
=
316
[
3
]
=
100
5
%
377
=
354
[
4
]
=
97
5
%
377
=
327
Dec
r
y
p
tio
n
:
[
0
]
=
169
269
%
377
=
78
[
1
]
=
117
269
%
377
=
117
[
2
]
=
316
269
%
377
=
114
[
3
]
=
354
269
%
377
=
100
[
4
]
=
327
269
%
377
=
97
T
o
b
o
ls
ter
th
e
s
ec
u
r
ity
o
f
I
o
T
d
ev
ices,
Atm
el
AVR
m
icr
o
co
n
tr
o
ller
s
wer
e
s
p
ec
if
ically
ch
o
s
en
t
o
im
p
lem
en
t,
ev
alu
ate,
an
d
a
n
a
ly
ze
cr
y
p
to
g
r
a
p
h
ic
alg
o
r
ith
m
s
.
R
en
o
wn
ed
f
o
r
t
h
eir
lo
w
p
o
wer
co
n
s
u
m
p
tio
n
,
Atm
el
AVR
m
icr
o
co
n
tr
o
ller
s
ar
e
p
ar
ticu
lar
ly
well
-
s
u
ited
f
o
r
I
o
T
d
ev
ices
r
elian
t
o
n
b
atter
y
p
o
wer
o
r
co
n
s
tr
ain
ed
p
o
wer
s
o
u
r
ce
s
[
2
2
]
,
[
23]
.
T
h
eir
co
s
t
-
ef
f
ec
tiv
e
n
ess
f
u
r
th
er
en
h
an
ce
s
th
eir
ap
p
ea
l
f
o
r
I
o
T
d
ev
ice
p
r
o
d
u
ctio
n
,
wh
er
e
co
s
t
co
n
s
id
er
atio
n
s
ar
e
p
ar
am
o
u
n
t.
Ad
d
itio
n
ally
,
Atm
el
AVR
m
i
cr
o
co
n
tr
o
ller
s
ar
e
eq
u
ip
p
e
d
with
b
u
ilt
-
in
p
e
r
ip
h
er
als
s
u
ch
as
ADC,
UA
R
T
,
SP
I
,
I
2
C
,
an
d
PW
M,
m
itig
atin
g
th
e
n
ee
d
f
o
r
s
u
p
p
lem
en
tar
y
co
m
p
o
n
e
n
ts
an
d
s
tr
ea
m
lin
in
g
th
e
d
esig
n
p
r
o
ce
s
s
f
o
r
I
o
T
d
e
v
ices
[
2
4
]
.
T
h
e
tech
n
ical
ch
ar
ac
ter
is
tics
o
f
th
e
AT
m
eg
a
2
5
6
0
m
icr
o
co
n
tr
o
ller
o
f
th
e
At
m
el
AVR f
am
ily
ar
e
s
h
o
wn
in
T
ab
le
1
.
I
n
th
is
r
esear
ch
,
USB
asp
v
2
.
0
as
s
h
o
wn
in
Fig
u
r
e
1
s
er
v
es
as
th
e
to
o
l
f
o
r
wr
itin
g
p
r
o
g
r
am
co
d
e
(
f
ir
m
war
e)
o
n
t
o
AVR
m
icr
o
c
o
n
tr
o
ller
s
v
ia
a
c
o
m
p
u
te
r
th
r
o
u
g
h
a
USB
in
ter
f
ac
e
[
2
5
]
.
T
h
is
p
r
o
g
r
a
m
m
er
g
r
a
n
ts
d
ir
ec
t
ac
ce
s
s
to
AVR
m
icr
o
co
n
tr
o
ller
s
f
o
r
p
r
o
g
r
am
m
in
g
an
d
d
eb
u
g
g
i
n
g
,
elim
in
atin
g
th
e
n
ec
ess
ity
f
o
r
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2
5
0
2
-
4
7
52
A
n
a
lysi
s
o
f c
r
yp
to
g
r
a
p
h
ic
met
h
o
d
s
fo
r
en
s
u
r
in
g
s
ec
u
r
ity
…
(
Temir
b
ek
o
va
Zh
a
n
erke
E
r
la
n
o
vn
a
)
1601
s
u
p
p
lem
en
tar
y
eq
u
ip
m
en
t.
I
t
f
ac
ilit
ates
th
e
d
ir
ec
t
d
o
wn
lo
ad
i
n
g
o
f
p
r
o
g
r
am
s
in
t
o
th
e
i
n
teg
r
ated
f
lash
m
em
o
r
y
o
f
th
e
AVR m
icr
o
co
n
tr
o
ller
.
T
ab
le
1
.
T
ec
h
n
ical
ch
ar
ac
ter
is
tics
o
f
th
e
AT
m
eg
a2
5
6
0
m
icr
o
co
n
tr
o
ller
D
e
scri
p
t
i
o
n
V
a
l
u
e
A
r
c
h
i
t
e
c
t
u
r
e
8
-
b
i
t
A
V
R
V
o
l
t
a
g
e
2
.
7
V
–
5
.
5
V
F
l
a
s
h
me
mo
r
y
2
5
6
K
B
S
R
A
M
8
K
B
EEPRO
M
4
K
B
C
l
o
c
k
s
p
e
e
d
A
b
o
v
e
1
6
M
H
z
I
/
O
p
i
n
s
86
A
n
a
l
o
g
i
n
p
u
t
p
i
n
s
16
U
A
R
T
4
SPI
1
I
2
C
1
A
D
C
r
e
so
l
u
t
i
o
n
10
-
b
i
t
Te
mp
e
r
a
t
u
r
e
-
4
0
°
C
t
o
8
5
°
C
Fig
u
r
e
1
.
USB
asp
v
2
.
0
p
r
o
g
r
a
m
m
er
E
n
cr
y
p
tio
n
alg
o
r
ith
m
s
wer
e
ca
lcu
lated
in
Atm
el
Stu
d
io
7
u
s
in
g
th
e
C
p
r
o
g
r
am
m
in
g
lan
g
u
ag
e.
T
h
e
p
s
eu
d
o
co
d
es
o
f
th
ese
alg
o
r
ith
m
s
ar
e
s
h
o
wn
in
Fig
u
r
es
2
.
W
h
er
e
Fig
u
r
e
2
(
a)
s
h
o
ws
th
e
p
s
eu
d
o
co
d
e
o
f
th
e
El
-
Gam
al
cr
y
p
to
s
y
s
tem
,
Fig
u
r
e
2
(
b
)
p
s
eu
d
o
c
o
d
e
o
f
th
e
Pailli
er
cr
y
p
to
s
y
s
tem
,
an
d
Fig
u
r
e
2
(
c)
p
s
eu
d
o
co
d
e
o
f
th
e
R
SA c
r
y
p
to
s
y
s
tem
.
T
h
e
s
ch
em
atic
d
iag
r
am
illu
s
tr
atin
g
th
e
co
n
n
ec
tio
n
b
etwe
e
n
th
e
AT
m
eg
a2
5
6
0
m
icr
o
co
n
tr
o
ller
an
d
th
e
USB
a
s
p
v
2
.
0
p
r
o
g
r
am
m
e
r
was
cr
ea
ted
u
s
in
g
th
e
Fritzin
g
p
r
o
g
r
am
.
T
h
i
s
v
is
u
al
r
ep
r
es
en
tatio
n
is
d
ep
icted
in
Fig
u
r
e
3,
p
r
o
v
id
i
n
g
a
clea
r
i
llu
s
tr
atio
n
o
f
th
e
wir
in
g
a
n
d
c
o
n
f
ig
u
r
atio
n
r
e
q
u
ir
ed
f
o
r
th
e
s
etu
p
.
Fo
llo
win
g
th
e
co
n
n
ec
tio
n
o
f
th
e
USB
asp
p
r
o
g
r
am
m
er
an
d
th
e
AT
m
eg
a
2
5
6
0
m
icr
o
co
n
tr
o
ller
,
t
h
e
USB
asp
was
s
u
b
s
eq
u
e
n
tly
lin
k
ed
to
th
e
co
m
p
u
ter
u
s
in
g
a
USB
ca
b
le.
Su
b
s
eq
u
en
t
test
i
n
g
o
f
th
e
cr
y
p
to
s
y
s
tem
s
was
c
o
n
d
u
cte
d
u
s
in
g
th
e
Kh
az
am
a
AVR p
r
o
g
r
am
.
(
a)
(
b
)
(
c)
Fig
u
r
e
2
.
E
n
cr
y
p
tio
n
alg
o
r
ith
m
:
(
a)
p
s
eu
d
o
co
d
e
o
f
t
h
e
E
l
-
G
am
al
cr
y
p
to
s
y
s
tem
,
(
b
)
p
s
eu
d
o
co
d
e
o
f
th
e
Pailli
er
cr
y
p
to
s
y
s
tem
,
an
d
(
c)
p
s
eu
d
o
c
o
d
e
o
f
th
e
R
SA c
r
y
p
to
s
y
s
tem
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
52
In
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
7
,
No
.
3
,
Ma
r
ch
20
2
5
:
1
596
-
1
6
0
6
1602
Fig
u
r
e
3
.
AT
m
e
g
a2
5
6
0
an
d
U
SB
asp
co
n
n
ec
tio
n
3.
RE
SU
L
T
ANAL
YSI
S
AND
DIS
CU
SS
I
O
N
T
h
e
Natio
n
al
I
n
s
titu
te
o
f
Stan
d
ar
d
s
an
d
T
ec
h
n
o
lo
g
y
(
NI
ST)
,
h
o
ld
s
th
e
r
esp
o
n
s
ib
ilit
y
o
f
d
e
v
is
in
g
an
d
ad
v
o
ca
tin
g
s
tan
d
ar
d
s
an
d
g
u
i
d
elin
es
to
en
s
u
r
e
th
e
s
ec
u
r
ity
an
d
in
ter
o
p
er
ab
ilit
y
o
f
in
f
o
r
m
atio
n
s
y
s
tem
s
[
2
6
]
,
[
2
7
]
.
I
n
r
ec
en
t
tim
es,
th
er
e
h
a
s
b
ee
n
a
s
u
r
g
e
in
d
em
a
n
d
f
o
r
lig
h
tweig
h
t
cr
y
p
t
o
g
r
ap
h
ic
alg
o
r
ith
m
s
,
p
ar
ticu
lar
l
y
th
o
s
e
th
at
ca
n
b
e
ef
f
icien
tly
i
m
p
lem
en
ted
o
n
d
ev
ices
with
co
n
s
tr
ain
ed
r
eso
u
r
ce
s
,
s
u
ch
a
s
I
o
T
d
e
v
ices
an
d
em
b
ed
d
e
d
s
y
s
tem
s
.
I
n
r
esp
o
n
s
e
to
th
is
g
r
o
win
g
n
ee
d
,
NI
ST
h
as
in
s
titu
ted
a
s
tan
d
ar
d
izatio
n
p
r
o
ce
s
s
f
o
r
lig
h
tweig
h
t
cr
y
p
to
g
r
ap
h
ic
alg
o
r
ith
m
s
an
d
h
as
estab
lis
h
ed
a
s
et
o
f
cr
iter
ia
f
o
r
ev
a
lu
atin
g
en
cr
y
p
tio
n
alg
o
r
ith
m
s
with
in
th
e
c
o
n
tex
t
o
f
I
o
T
s
ec
u
r
ity
.
T
h
ese
cr
iter
ia
,
o
u
tlin
ed
i
n
T
ab
le
2
,
ar
e
m
eticu
lo
u
s
ly
cr
af
ted
to
aid
I
o
T
d
e
v
elo
p
er
s
i
n
s
elec
tin
g
en
cr
y
p
tio
n
alg
o
r
ith
m
s
th
at
a
r
e
n
o
t
o
n
l
y
s
ec
u
r
e
b
u
t
also
wel
l
-
s
u
ited
f
o
r
s
p
ec
if
ic
u
s
e
ca
s
es.
T
ab
le
2
.
NI
ST
ev
al
u
atio
n
cr
ite
r
ia
f
o
r
e
n
cr
y
p
tio
n
alg
o
r
ith
m
s
P
h
y
s
i
c
a
l
P
e
r
f
o
r
ma
n
c
e
M
e
m
o
r
y
u
s
a
g
e
(
R
A
M
/
R
O
M
)
i
m
p
l
e
men
t
a
t
i
o
n
S
p
e
e
d
p
o
w
e
r
(
W
)
3
.
1
.
M
emo
ry
us
a
g
e
a
nd
v
elo
cit
y
Me
m
o
r
y
u
s
ag
e
in
Atm
el
Stu
d
io
7
ca
n
b
e
ea
s
ily
m
o
n
ito
r
ed
f
o
r
an
y
p
r
o
g
r
am
.
Af
te
r
wr
itin
g
th
e
p
r
o
g
r
a
m
,
s
im
p
ly
co
m
p
ile
th
e
s
o
lu
tio
n
b
y
s
elec
tin
g
“Bu
ild
”
an
d
th
en
“Bu
ild
So
lu
tio
n
”.
T
h
e
ass
em
b
ly
p
r
o
ce
s
s
is
th
en
d
is
p
lay
ed
in
th
e
o
u
tp
u
t
win
d
o
w
u
p
o
n
s
u
cc
ess
f
u
l
co
m
p
l
etio
n
.
I
n
ass
ess
in
g
th
e
en
c
r
y
p
tio
n
al
g
o
r
ith
m
s
,
v
ar
io
u
s
in
p
u
t
d
ata
m
em
o
r
y
s
i
ze
s
wer
e
test
ed
a
n
d
r
esu
lted
i
n
a
co
m
p
a
r
is
o
n
as
s
h
o
wn
in
F
ig
u
r
e
4
.
T
h
e
r
esu
lts
o
f
d
ata
an
d
p
r
o
g
r
am
m
em
o
r
y
u
s
ag
e
f
o
r
th
e
R
SA,
E
l
-
Gam
al,
an
d
Pailli
er
en
cr
y
p
tio
n
al
g
o
r
i
th
m
s
ar
e
tab
u
lat
ed
in
T
ab
le
3
a
n
d
s
h
o
wn
in
Fig
u
r
es 4
(
a)
an
d
4
(
b
)
.
T
h
e
u
s
e
o
f
p
r
o
g
r
am
m
e
m
o
r
y
(
b
y
tes)
an
d
d
ata
m
em
o
r
y
(
b
y
t
es)
in
a
m
ic
r
o
co
n
tr
o
ller
p
lay
s
a
k
ey
r
o
le
in
th
e
d
esig
n
an
d
o
p
er
atio
n
o
f
em
b
e
d
d
ed
s
y
s
tem
s
.
B
o
th
ty
p
es
o
f
m
em
o
r
y
h
av
e
th
eir
o
wn
u
n
iq
u
e
ch
ar
ac
ter
is
tics
an
d
im
p
o
r
tan
c
e
th
at
af
f
ec
t
th
e
p
er
f
o
r
m
an
c
e,
f
u
n
ctio
n
ality
,
an
d
r
eliab
ilit
y
o
f
th
e
d
ev
ice.
E
f
f
ec
tiv
e
m
a
n
ag
em
e
n
t
o
f
p
r
o
g
r
am
m
em
o
r
y
a
n
d
d
ata
is
th
e
b
asis
f
o
r
th
e
s
u
cc
ess
f
u
l
d
esi
g
n
a
n
d
o
p
er
atio
n
o
f
em
b
ed
d
e
d
s
y
s
tem
s
.
Un
d
er
s
tan
d
in
g
a
n
d
p
r
o
p
e
r
ly
u
s
in
g
th
e
s
e
r
eso
u
r
c
es
h
elp
s
en
s
u
r
e
s
tab
le
o
p
er
atio
n
o
f
t
h
e
d
ev
ice,
h
ig
h
p
e
r
f
o
r
m
an
ce
,
a
n
d
th
e
ab
ilit
y
to
e
x
p
an
d
f
u
n
ctio
n
ality
.
As
s
h
o
wn
in
T
ab
le
3
,
w
h
en
co
m
p
ar
in
g
th
e
u
s
ag
e
o
f
p
r
o
g
r
am
m
em
o
r
y
(
b
y
tes)
an
d
d
ata
m
em
o
r
y
(
b
y
te
s
)
in
th
e
m
icr
o
c
o
n
tr
o
ller
o
f
t
h
r
ee
cr
y
p
to
g
r
a
p
h
ic
alg
o
r
it
h
m
s
,
th
e
R
SA a
lg
o
r
ith
m
s
h
o
wed
an
e
f
f
ec
tiv
e
r
esu
lt.
-
I
m
p
lem
en
tatio
n
:
all
en
c
r
y
p
ti
o
n
alg
o
r
ith
m
s
im
p
lem
en
ted
in
th
is
p
ap
er
ar
e
s
o
f
twar
e
-
b
ased
en
cr
y
p
tio
n
alg
o
r
ith
m
s
.
T
h
e
co
d
e
th
at
is
wr
itten
in
Atm
el
Stu
d
io
i
s
s
o
f
t
war
e
im
p
lem
en
tatio
n
,
as
wr
itt
en
an
d
co
m
p
iled
to
b
e
ex
ec
u
ted
o
n
th
e
m
icr
o
co
n
tr
o
ller
.
L
o
a
d
in
g
th
e
co
d
e
o
n
to
th
e
m
icr
o
co
n
t
r
o
ller
u
s
in
g
USB
asp
p
r
o
g
r
a
m
m
er
in
v
o
lv
es
h
ar
d
war
e
im
p
lem
en
tatio
n
,
as
USB
a
s
p
h
ar
d
war
e
d
ev
ice
p
h
y
s
ically
co
n
n
ec
ted
to
th
e
m
icr
o
co
n
tr
o
ller
to
tr
a
n
s
f
er
th
e
co
m
p
iled
c
o
d
e
f
r
o
m
co
m
p
u
ter
to
th
e
m
icr
o
co
n
tr
o
ller
'
s
m
em
o
r
y
.
O
v
er
all,
th
e
en
cr
y
p
tio
n
alg
o
r
ith
m
th
at
im
p
lem
en
ted
is
a
s
o
f
twar
e
-
b
a
s
ed
en
cr
y
p
tio
n
alg
o
r
ith
m
,
b
u
t
th
e
p
r
o
ce
s
s
o
f
lo
ad
in
g
it
o
n
to
th
e
m
icr
o
co
n
tr
o
ller
in
v
o
lv
es
b
o
th
h
ar
d
war
e
an
d
s
o
f
twar
e
co
m
p
o
n
en
ts
.
T
r
an
s
f
er
r
in
g
c
o
d
e
in
to
th
e
m
icr
o
co
n
tr
o
ller
u
s
in
g
a
USB
a
s
p
p
r
o
g
r
am
m
er
en
tail
s
a
h
ar
d
war
e
im
p
lem
en
tatio
n
,
as
th
e
USB
a
s
p
h
ar
d
war
e
d
ev
ice
is
p
h
y
s
ically
lin
k
ed
to
th
e
m
icr
o
co
n
t
r
o
l
ler
to
tr
a
n
s
m
it
th
e
co
m
p
iled
co
d
e
f
r
o
m
th
e
co
m
p
u
ter
to
th
e
m
icr
o
c
o
n
tr
o
ll
er
'
s
m
em
o
r
y
.
Alth
o
u
g
h
t
h
e
en
cr
y
p
tio
n
alg
o
r
ith
m
its
elf
is
ty
p
ically
s
o
f
twar
e
-
b
ased
,
th
e
p
r
o
ce
s
s
o
f
l
o
ad
in
g
it
in
to
th
e
m
icr
o
co
n
tr
o
ller
n
ec
ess
itate
s
th
e
in
v
o
l
v
em
en
t
o
f
b
o
t
h
h
ar
d
war
e
an
d
s
o
f
twar
e
co
m
p
o
n
en
ts
.
−
Velo
city
:
w
h
en
esti
m
atin
g
th
e
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
ti
o
n
v
elo
city
o
f
m
ic
r
o
co
n
tr
o
l
ler
en
cr
y
p
tio
n
alg
o
r
ith
m
s
,
m
y
r
iad
f
ac
t
o
r
s
c
o
m
e
in
to
p
lay
,
i
n
clu
d
in
g
m
i
cr
o
co
n
tr
o
ller
ar
ch
itectu
r
e,
cl
o
ck
f
r
e
q
u
en
c
y
,
m
em
o
r
y
s
ize,
an
d
alg
o
r
ith
m
im
p
lem
en
tatio
n
.
On
e
a
p
p
r
o
ac
h
to
g
au
g
i
n
g
t
h
e
v
el
o
city
o
f
an
e
n
cr
y
p
tio
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2
5
0
2
-
4
7
52
A
n
a
lysi
s
o
f c
r
yp
to
g
r
a
p
h
ic
met
h
o
d
s
fo
r
en
s
u
r
in
g
s
ec
u
r
ity
…
(
Temir
b
ek
o
va
Zh
a
n
erke
E
r
la
n
o
vn
a
)
1603
alg
o
r
ith
m
is
b
y
q
u
a
n
tify
in
g
t
h
e
n
u
m
b
e
r
o
f
clo
ck
c
y
cles
n
e
ce
s
s
ar
y
to
en
cr
y
p
t
a
m
ess
ag
e
o
f
a
p
ar
ticu
lar
s
ize.
T
h
is
ca
n
b
e
ac
c
o
m
p
lis
h
ed
u
tili
zin
g
a
tim
er
i
n
teg
r
at
ed
with
in
th
e
m
icr
o
co
n
tr
o
lle
r
,
co
u
p
led
with
m
ea
s
u
r
in
g
th
e
elap
s
ed
tim
e.
T
h
e
r
esu
lts
ar
e
d
escr
ib
ed
in
T
ab
le
4
an
d
d
em
o
n
s
tr
ated
in
Fig
u
r
e
5
,
an
d
ar
e
s
h
o
wn
i
n
Fig
u
r
e
5
(
a)
e
n
cr
y
p
tio
n
tim
e
Fig
u
r
e
5
(
b
)
d
ec
r
y
p
tio
n
tim
e.
(
a)
(
b
)
Fig
u
r
e
4
.
C
o
m
p
a
r
in
g
m
em
o
r
y
u
s
ag
e
r
esu
lts
f
o
r
R
SA,
E
l
-
Gam
al,
an
d
Pailli
er
en
cr
y
p
tio
n
(
a)
p
r
o
g
r
am
m
em
o
r
y
u
s
ag
e
a
n
d
(
b
)
d
ata
m
em
o
r
y
u
s
ag
e
T
ab
le
3
.
M
em
o
r
y
u
s
ag
e
r
esu
lt
s
f
o
r
R
SA
, El
-
Gam
al,
an
d
Pailli
er
en
cr
y
p
tio
n
En
c
r
y
p
t
i
o
n
a
l
g
o
r
i
t
h
ms
U
se
o
f
p
r
o
g
r
a
m me
mo
r
y
(
b
y
t
e
s)
D
a
t
a
mem
o
r
y
u
s
a
g
e
(
b
y
t
e
s)
I
n
p
u
t
d
a
t
a
:
1
6
b
y
t
e
s
R
S
A
3
9
8
6
3
2
8
El
G
a
m
a
l
8
4
0
4
4
4
8
P
a
i
l
l
i
e
r
6
1
7
6
3
6
0
I
n
p
u
t
d
a
t
a
:
3
2
b
y
t
e
s
R
S
A
4
1
0
0
6
0
0
El
G
a
m
a
l
8
4
1
6
8
4
8
P
a
i
l
l
i
e
r
6
2
0
4
6
3
2
I
n
p
u
t
d
a
t
a
:
64
b
y
t
e
s
R
S
A
4
6
7
2
1
1
4
4
El
G
a
m
a
l
8
4
4
8
1
6
4
8
P
a
i
l
l
i
e
r
6
2
3
8
1
1
7
6
I
n
p
u
t
d
a
t
a
:
1
2
8
b
y
t
e
s
R
S
A
5
3
0
6
2
2
3
2
El
G
a
m
a
l
8
5
1
2
3
2
4
8
P
a
i
l
l
i
e
r
6
3
0
2
2
2
6
4
I
n
p
u
t
d
a
t
a
:
2
5
6
b
y
t
e
s
R
S
A
5
4
3
6
4
4
0
8
El
G
a
m
a
l
8
6
4
2
6
4
4
8
P
a
i
l
l
i
e
r
6
4
3
2
4
4
4
0
T
ab
le
4
.
Velo
city
o
f
e
n
c
r
y
p
tio
n
a
lg
o
r
ith
m
s
(
e
n
cr
y
p
tio
n
,
de
cr
y
p
tio
n
)
En
c
r
y
p
t
i
o
n
a
l
g
o
r
i
t
h
ms
Ef
f
i
c
i
e
n
c
y
i
n
v
e
l
o
c
i
t
y
En
c
r
y
p
t
i
o
n
t
i
m
e
(
s)
De
c
r
y
p
t
i
o
n
t
i
m
e
(
s)
I
n
p
u
t
d
a
t
a
:
1
6
b
y
t
e
s
R
S
A
0
.
0
0
4
7
3
0
0
.
8
5
6
7
8
4
El
-
G
a
ma
l
0
.
0
1
4
3
1
7
0
.
0
4
3
7
6
P
a
i
l
l
i
e
r
0
.
1
6
9
0
2
5
0
.
3
9
2
4
8
7
I
n
p
u
t
d
a
t
a
:
32
b
y
t
e
s
R
S
A
0
.
0
0
9
4
6
1
.
7
1
3
5
6
8
El
-
G
a
ma
l
0
.
0
1
5
6
1
6
0
.
0
8
7
5
2
0
P
a
i
l
l
i
e
r
0
.
2
6
2
2
9
4
0
.
7
8
4
9
7
4
I
n
p
u
t
d
a
t
a
:
64
b
y
t
e
s
R
S
A
0
.
0
1
8
9
2
3
.
4
2
7
1
3
6
El
-
G
a
ma
l
0
.
0
1
8
2
1
4
0
.
3
5
0
0
8
0
P
a
i
l
l
i
e
r
0
.
4
5
0
2
9
4
1
.
5
6
9
9
4
8
I
n
p
u
t
d
a
t
a
:
1
28
b
y
t
e
s
R
S
A
0
.
0
3
7
8
4
6
.
8
5
4
2
7
2
El
-
G
a
ma
l
0
.
0
2
3
4
1
0
0
.
7
0
0
1
6
0
P
a
i
l
l
i
e
r
0
.
8
2
6
2
9
4
3
.
1
3
9
8
9
6
I
n
p
u
t
d
a
t
a
:
2
5
6
b
y
t
e
s
R
S
A
0
.
0
7
5
6
8
13
.
7
0
8
5
4
4
El
-
G
a
ma
l
0
.
0
3
3
8
0
2
1
.
4
0
0
3
2
0
P
a
i
l
l
i
e
r
1
.
5
7
8
2
9
4
6
.
2
7
9
7
9
2
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
52
In
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
7
,
No
.
3
,
Ma
r
ch
20
2
5
:
1
596
-
1
6
0
6
1604
(
a)
(
b
)
F
ig
u
re
5
.
C
o
m
p
ar
is
o
n
o
f
th
e
s
p
ee
d
r
esu
lts
o
f
asy
m
m
etr
ic
cip
h
er
alg
o
r
ith
m
s
(
a)
en
cr
y
p
tio
n
tim
e
a
n
d
(
b
)
d
e
cr
y
p
tio
n
tim
e
Velo
city
an
d
s
ec
u
r
ity
ar
e
p
iv
o
tal
co
n
s
id
er
atio
n
s
wh
en
ass
es
s
in
g
th
e
ef
f
icien
cy
o
f
en
cr
y
p
tio
n
alg
o
r
ith
m
s
o
n
a
m
icr
o
co
n
tr
o
ller
.
Fo
r
in
s
tan
ce
,
wh
ile
El
-
Gam
al
b
o
asts
b
o
th
r
o
b
u
s
t
s
ec
u
r
ity
an
d
r
ap
i
d
ex
ec
u
tio
n
,
th
e
Pailli
er
alg
o
r
ith
m
ex
h
ib
its
f
o
r
m
id
ab
le
cr
y
p
to
g
r
ap
h
ic
r
es
ilien
ce
y
et
s
u
f
f
er
s
f
r
o
m
s
lu
g
g
is
h
s
p
ee
d
.
T
h
er
ef
o
r
e,
wh
en
s
elec
tin
g
an
en
cr
y
p
tio
n
alg
o
r
ith
m
to
s
af
e
g
u
ar
d
I
o
T
d
ev
ices,
m
eticu
l
o
u
s
atten
tio
n
m
u
s
t
b
e
p
aid
to
b
o
th
s
ec
u
r
ity
im
p
er
ativ
es a
n
d
m
icr
o
c
o
n
tr
o
ller
p
er
f
o
r
m
an
ce
.
3.
2
.
P
o
wer
c
o
ns
um
ptio
n
T
h
e
p
o
wer
d
r
aw
o
f
th
e
AT
m
eg
a2
5
6
0
m
icr
o
c
o
n
tr
o
ller
h
i
n
g
es
o
n
v
ar
i
o
u
s
f
ac
to
r
s
,
in
cl
u
d
in
g
clo
c
k
f
r
eq
u
e
n
cy
,
o
p
er
atio
n
al
m
o
d
e,
an
d
th
e
u
tili
za
tio
n
o
f
p
e
r
ip
h
er
als
an
d
f
ea
tu
r
es.
Po
wer
c
o
n
s
u
m
p
tio
n
escalate
s
n
o
tab
ly
wh
e
n
th
e
m
icr
o
co
n
tr
o
ller
o
p
er
ates
in
a
n
ac
tiv
e
m
o
d
e,
ex
ec
u
tin
g
in
s
tr
u
ctio
n
s
an
d
e
n
g
ag
in
g
p
er
i
p
h
er
al
d
ev
ices.
T
h
is
c
o
n
s
u
m
p
tio
n
c
an
f
lu
ct
u
ate
f
r
o
m
a
f
ew
m
ill
iam
p
s
to
te
n
s
o
f
m
illi
am
p
s
.
I
t
is
im
p
er
ativ
e
t
o
ass
em
b
le
th
e
cir
cu
it
p
r
ec
is
ely
as
d
ep
icted
in
Fig
u
r
e
6
an
d
g
a
u
g
e
th
e
cu
r
r
en
t
in
t
h
e
m
icr
o
c
o
n
tr
o
ller
em
p
lo
y
in
g
th
e
UNI
-
T
UT
1
2
0
C
m
u
ltime
ter
.
Su
b
s
eq
u
e
n
t
to
cu
r
r
e
n
t
m
ea
s
u
r
em
en
t,
co
m
p
u
tatio
n
o
f
p
o
wer
c
o
n
s
u
m
p
tio
n
b
ec
o
m
es
ess
en
tial
u
tili
zin
g
th
e
f
o
r
m
u
la
=
×
,
wh
er
e
d
en
o
tes
v
o
ltag
e
(
u
tili
zin
g
Ar
d
u
in
o
5
V)
an
d
r
ep
r
esen
ts
th
e
m
ea
s
u
r
ed
cu
r
r
en
t.
T
h
e
o
u
tc
o
m
es
o
f
p
o
w
er
co
n
s
u
m
p
tio
n
f
o
r
e
n
cr
y
p
ti
o
n
alg
o
r
ith
m
s
ar
e
d
elin
ea
ted
in
T
a
b
le
5
.
Fig
u
r
e
6
.
Ar
d
u
in
o
cu
r
r
e
n
t m
ea
s
u
r
em
en
t sch
em
e
T
ab
le
5
.
Po
wer
c
o
n
s
u
m
p
tio
n
a
n
aly
s
is
o
f
e
n
cr
y
p
tio
n
a
lg
o
r
ith
m
s
En
c
r
y
p
t
i
o
n
a
l
g
o
r
i
t
h
ms
El
e
c
t
r
i
c
c
u
r
r
e
n
t
(
a
m
p
)
P
o
w
e
r
(
w
a
t
t
)
I
n
p
u
t
d
a
t
a
:
1
6
b
y
t
e
s
R
S
A
23
.
30
0
.
1
1
6
5
El
-
G
a
ma
l
21
.
61
0
.
1
0
8
0
5
P
a
i
l
l
i
e
r
23
.
14
0
.
1
1
5
7
I
n
p
u
t
d
a
t
a
:
3
2
b
y
t
e
s
R
S
A
2
3
.
3
2
0
.
1
1
6
6
El
-
G
a
ma
l
21
.
63
0
.
1
0
8
1
5
P
a
i
l
l
i
e
r
23
.
14
0
.
1
1
5
7
I
n
p
u
t
d
a
t
a
:
6
4
b
y
t
e
s
R
S
A
2
3
.
32
0
.
1
1
6
6
El
-
G
a
ma
l
21
.
65
0
.
1
0
8
2
5
P
a
i
l
l
i
e
r
23
.
16
0
.
1
1
5
8
I
n
p
u
t
d
a
t
a
:
1
2
8
b
y
t
e
s
R
S
A
23
.
33
0
.
1
1
6
6
5
El
-
G
a
ma
l
21
.
66
0
.
1
0
8
3
P
a
i
l
l
i
e
r
23
.
16
0
.
1
1
5
8
I
n
p
u
t
d
a
t
a
:
2
5
6
b
y
t
e
s
R
S
A
23
.
35
0
.
1
1
6
7
5
El
-
G
a
ma
l
22
.
68
0
.
1
1
3
4
P
a
i
l
l
i
e
r
23
.
18
0
.
1
1
5
9
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2
5
0
2
-
4
7
52
A
n
a
lysi
s
o
f c
r
yp
to
g
r
a
p
h
ic
met
h
o
d
s
fo
r
en
s
u
r
in
g
s
ec
u
r
ity
…
(
Temir
b
ek
o
va
Zh
a
n
erke
E
r
la
n
o
vn
a
)
1605
T
h
e
p
o
wer
co
n
s
u
m
p
tio
n
o
f
an
Ar
d
u
in
o
is
n
o
t
in
h
e
r
en
tl
y
tied
to
m
em
o
r
y
u
s
ag
e.
N
o
n
eth
eless
,
m
em
o
r
y
u
tili
za
tio
n
d
o
es
im
p
ac
t
th
e
Ar
d
u
in
o
'
s
g
en
er
al
p
er
f
o
r
m
an
ce
an
d
e
f
f
icac
y
,
co
n
s
eq
u
en
tly
in
f
lu
e
n
cin
g
p
o
wer
co
n
s
u
m
p
tio
n
.
W
h
en
a
n
ap
p
licatio
n
d
em
a
n
d
s
s
ig
n
if
ican
t
m
em
o
r
y
r
eso
u
r
ce
s
o
r
e
n
g
ag
es
in
in
tr
icate
d
ata
o
p
er
atio
n
s
,
it m
ay
n
ec
ess
itate
h
eig
h
ten
ed
co
m
p
u
tin
g
r
eso
u
r
c
es a
n
d
s
u
b
s
eq
u
en
tly
in
cr
ea
s
e
p
o
wer
r
eq
u
ir
e
m
en
ts
f
o
r
th
e
Ar
d
u
in
o
to
f
u
n
ctio
n
o
p
tim
ally
.
4.
CO
NCLU
SI
O
N
Ass
es
s
in
g
th
e
ef
f
icac
y
o
f
c
r
y
p
to
g
r
ap
h
ic
s
o
lu
tio
n
s
with
in
I
o
T
s
y
s
tem
s
is
p
ar
am
o
u
n
t
in
en
s
u
r
in
g
th
eir
s
ec
u
r
ity
an
d
r
eliab
ilit
y
.
W
ith
th
e
r
ap
id
ev
o
lu
tio
n
o
f
I
o
T
tech
n
o
l
o
g
y
,
s
af
eg
u
ar
d
in
g
d
ata
co
n
f
id
en
tiality
,
in
teg
r
ity
,
an
d
a
v
ailab
ilit
y
is
in
cr
ea
s
in
g
ly
cr
u
cial.
T
h
is
s
tu
d
y
u
n
d
er
s
co
r
es
th
e
s
ig
n
if
ican
ce
o
f
em
p
lo
y
in
g
r
o
b
u
s
t
cr
y
p
to
g
r
ap
h
ic
alg
o
r
ith
m
s
to
s
h
ield
I
o
T
d
ev
ices
f
r
o
m
d
i
v
er
s
e
th
r
ea
ts
.
T
h
e
ev
alu
atio
n
o
f
cr
y
p
to
g
r
ap
h
ic
s
o
lu
tio
n
s
in
I
o
T
s
y
s
tem
s
n
ec
e
s
s
itate
s
co
m
p
r
eh
en
s
iv
e
an
aly
s
is
an
d
co
m
p
ar
is
o
n
o
f
v
a
r
io
u
s
alg
o
r
ith
m
s
,
alo
n
g
with
ass
e
s
s
in
g
th
eir
p
er
f
o
r
m
a
n
ce
,
r
esil
ien
ce
ag
ain
s
t
attac
k
s
,
an
d
r
eso
u
r
ce
u
tili
za
tio
n
.
T
h
r
o
u
g
h
o
u
t
th
is
s
tu
d
y
,
s
ev
er
al
p
iv
o
tal
cr
iter
ia
em
e
r
g
ed
f
o
r
ev
alu
atin
g
th
e
ef
f
ec
tiv
en
ess
o
f
cr
y
p
t
o
g
r
ap
h
ic
s
o
lu
ti
o
n
s
in
I
o
T
s
y
s
tem
s
.
T
h
ese
in
clu
d
e
alg
o
r
ith
m
ic
c
o
m
p
u
tatio
n
al
c
o
m
p
lex
ity
,
d
ev
i
ce
p
o
wer
c
o
n
s
u
m
p
tio
n
,
ea
s
e
o
f
im
p
lem
e
n
tatio
n
,
an
d
co
m
p
atib
ilit
y
with
ex
is
tin
g
s
y
s
tem
s
.
C
o
n
s
eq
u
en
tly
,
id
en
tify
in
g
th
e
m
o
s
t
s
u
itab
le
s
o
lu
tio
n
s
tailo
r
ed
to
th
e
s
p
ec
if
ic
r
eq
u
ir
e
m
en
ts
an
d
c
o
n
s
tr
ain
ts
o
f
I
o
T
s
y
s
tem
s
b
ec
o
m
es
im
p
er
ativ
e.
Su
ch
ass
ess
m
en
ts
f
ac
ilit
ate
th
e
s
elec
tio
n
o
f
o
p
tim
al
e
n
cr
y
p
tio
n
alg
o
r
ith
m
s
p
o
is
ed
to
o
f
f
er
r
o
b
u
s
t p
r
o
tectio
n
f
o
r
I
o
T
d
ev
ice
s
.
RE
F
E
R
E
NC
E
S
[
1
]
M
.
A
.
A
l
h
i
j
a
,
O
.
A
l
-
B
a
i
k
,
A
.
H
u
ss
e
i
n
,
a
n
d
H
.
A
b
d
e
l
j
a
b
e
r
,
“
O
p
t
i
m
i
z
i
n
g
b
l
o
c
k
c
h
a
i
n
f
o
r
h
e
a
l
t
h
c
a
r
e
I
o
T:
a
p
r
a
c
t
i
c
a
l
g
u
i
d
e
t
o
n
a
v
i
g
a
t
i
n
g
sc
a
l
a
b
i
l
i
t
y
,
p
r
i
v
a
c
y
,
a
n
d
e
f
f
i
c
i
e
n
c
y
t
r
a
d
e
-
o
f
f
s,”
I
n
d
o
n
e
s
i
a
n
J
o
u
rn
a
l
o
f
El
e
c
t
ri
c
a
l
E
n
g
i
n
e
e
r
i
n
g
a
n
d
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
(
I
J
EEC
S
)
,
v
o
l
.
3
5
,
n
o
.
3
,
p
p
.
1
7
7
3
–
1
7
8
5
,
S
e
p
.
2
0
2
4
,
d
o
i
:
1
0
.
1
1
5
9
1
/
i
j
e
e
c
s
.
v
3
5
.
i
3
.
p
p
1
7
7
3
-
1
7
8
5
.
[
2
]
A
.
U
.
K
a
r
i
my
a
n
d
P
.
C
.
R
e
d
d
y
,
“
A
l
i
g
h
t
w
e
i
g
h
t
d
i
st
r
i
b
u
t
e
d
EL
M
-
b
a
se
d
sec
u
r
i
t
y
f
r
a
m
e
w
o
r
k
f
o
r
t
h
e
i
n
t
e
r
n
e
t
o
f
v
e
h
i
c
l
e
s,”
I
n
d
o
n
e
si
a
n
J
o
u
rn
a
l
o
f
E
l
e
c
t
r
i
c
a
l
En
g
i
n
e
e
ri
n
g
a
n
d
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
(
I
J
EEC
S
)
,
v
o
l
.
3
5
,
n
o
.
3
,
p
p
.
1
7
0
2
–
1
7
0
9
,
S
e
p
.
2
0
2
4
,
d
o
i
:
1
0
.
1
1
5
9
1
/
i
j
e
e
c
s
.
v
3
5
.
i
3
.
p
p
1
7
0
2
-
1
7
0
9
.
[
3
]
E.
B
e
r
t
i
n
o
a
n
d
R
.
S
a
n
d
h
u
,
“
D
a
t
a
b
a
s
e
se
c
u
r
i
t
y
-
c
o
n
c
e
p
t
s
,
a
p
p
r
o
a
c
h
e
s,
a
n
d
c
h
a
l
l
e
n
g
e
s,
”
I
EE
E
T
ra
n
s
a
c
t
i
o
n
s
o
n
D
e
p
e
n
d
a
b
l
e
a
n
d
S
e
c
u
r
e
C
o
m
p
u
t
i
n
g
,
v
o
l
.
2
,
n
o
.
1
,
p
p
.
2
–
1
8
,
Ja
n
.
2
0
0
5
,
d
o
i
:
1
0
.
1
1
0
9
/
TD
S
C
.
2
0
0
5
.
9
.
[
4
]
A
.
A
ssi
r
i
a
n
d
H
.
A
l
m
a
g
w
a
s
h
i
,
“
I
o
T
s
e
c
u
r
i
t
y
a
n
d
p
r
i
v
a
c
y
i
ss
u
e
s,
”
i
n
1
st
I
n
t
e
rn
a
t
i
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
C
o
m
p
u
t
e
r
Ap
p
l
i
c
a
t
i
o
n
s
a
n
d
I
n
f
o
rm
a
t
i
o
n
S
e
c
u
ri
t
y
,
I
C
C
AI
S
2
0
1
8
,
I
EEE,
A
p
r
.
2
0
1
8
,
p
p
.
1
–
5
.
d
o
i
:
1
0
.
1
1
0
9
/
C
A
I
S
.
2
0
1
8
.
8
4
4
2
0
0
2
.
[
5
]
W
.
Y
a
n
g
,
S
.
W
a
n
g
,
J.
H
u
H
u
,
a
n
d
N
.
M
.
K
a
r
i
e
,
“
M
u
l
t
i
m
e
d
i
a
sec
u
r
i
t
y
a
n
d
p
r
i
v
a
c
y
p
r
o
t
e
c
t
i
o
n
i
n
t
h
e
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s
:
r
e
s
e
a
r
c
h
d
e
v
e
l
o
p
me
n
t
s
a
n
d
c
h
a
l
l
e
n
g
e
s,
”
I
n
t
e
rn
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
M
u
l
t
i
m
e
d
i
a
I
n
t
e
l
l
i
g
e
n
c
e
a
n
d
S
e
c
u
ri
t
y
,
v
o
l
.
4
,
n
o
.
1
,
p
.
2
0
,
2
0
2
2
,
d
o
i
:
1
0
.
1
5
0
4
/
i
j
m
i
s.
2
0
2
2
.
1
2
1
2
8
2
.
[
6
]
Z.
M
a
,
L.
Z
h
u
,
F
.
R
.
Y
u
,
a
n
d
J.
Ja
mes,
“
P
r
o
t
e
c
t
i
o
n
o
f
s
u
r
v
e
i
l
l
a
n
c
e
r
e
c
o
r
d
i
n
g
s
v
i
a
b
l
o
c
k
c
h
a
i
n
-
a
ssi
s
t
e
d
mu
l
t
i
me
d
i
a
s
e
c
u
r
i
t
y
,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
S
e
n
so
r
N
e
t
w
o
rks
,
v
o
l
.
3
7
,
n
o
.
2
,
p
.
6
9
,
2
0
2
1
,
d
o
i
:
1
0
.
1
5
0
4
/
I
JS
N
ET.
2
0
2
1
.
1
1
8
4
8
6
.
[
7
]
H
.
H
e
l
l
a
o
u
i
,
M
.
K
o
u
d
i
l
,
a
n
d
A
.
B
o
u
a
b
d
a
l
l
a
h
,
“
E
n
e
r
g
y
-
e
f
f
i
c
i
e
n
t
m
e
c
h
a
n
i
sms
i
n
s
e
c
u
r
i
t
y
o
f
t
h
e
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s:
a
su
r
v
e
y
,
”
C
o
m
p
u
t
e
r
N
e
t
w
o
r
k
s
,
v
o
l
.
1
2
7
,
p
p
.
1
7
3
–
1
8
9
,
N
o
v
.
2
0
1
7
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
c
o
m
n
e
t
.
2
0
1
7
.
0
8
.
0
0
6
.
[
8
]
G
.
H
a
t
z
i
v
a
si
l
i
s
,
K
.
F
y
sar
a
k
i
s,
I
.
P
a
p
a
e
f
st
a
t
h
i
o
u
,
a
n
d
C
.
M
a
n
i
f
a
v
a
s,
“
A
r
e
v
i
e
w
o
f
l
i
g
h
t
w
e
i
g
h
t
b
l
o
c
k
c
i
p
h
e
r
s,
”
J
o
u
rn
a
l
o
f
C
ry
p
t
o
g
r
a
p
h
i
c
E
n
g
i
n
e
e
ri
n
g
,
v
o
l
.
8
,
n
o
.
2
,
p
p
.
1
4
1
–
1
8
4
,
Ju
n
.
2
0
1
8
,
d
o
i
:
1
0
.
1
0
0
7
/
s1
3
3
8
9
-
0
1
7
-
0
1
6
0
-
y.
[
9
]
S
.
S
.
D
h
a
n
d
a
,
B
.
S
i
n
g
h
,
a
n
d
P
.
Ji
n
d
a
l
,
“
L
i
g
h
t
w
e
i
g
h
t
c
r
y
p
t
o
g
r
a
p
h
y
:
a
so
l
u
t
i
o
n
t
o
sec
u
r
e
I
o
T,
”
W
i
re
l
e
ss
Pe
rs
o
n
a
l
C
o
m
m
u
n
i
c
a
t
i
o
n
s
,
v
o
l
.
1
1
2
,
n
o
.
3
,
p
p
.
1
9
4
7
–
1
9
8
0
,
J
u
n
.
2
0
2
0
,
d
o
i
:
1
0
.
1
0
0
7
/
s
1
1
2
7
7
-
0
2
0
-
0
7
1
3
4
-
3.
[
1
0
]
A
.
S
a
k
h
i
,
S
.
E.
M
a
n
s
o
u
r
,
a
n
d
A
.
S
e
k
k
a
k
i
,
“
E
n
h
a
n
c
i
n
g
se
c
u
r
i
t
y
mec
h
a
n
i
sms
f
o
r
r
o
b
o
t
-
f
o
g
c
o
m
p
u
t
i
n
g
n
e
t
w
o
r
k
s,”
I
n
d
o
n
e
s
i
a
n
J
o
u
rn
a
l
o
f
E
l
e
c
t
ri
c
a
l
E
n
g
i
n
e
e
ri
n
g
a
n
d
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
(
I
J
E
EC
S
)
,
v
o
l
.
3
3
,
n
o
.
3
,
p
p
.
1
6
6
0
–
1
6
6
6
,
M
a
r
.
2
0
2
4
,
d
o
i
:
1
0
.
1
1
5
9
1
/
i
j
e
e
c
s
.
v
3
3
.
i
3
.
p
p
1
6
6
0
-
1
6
6
6
.
[
1
1
]
R
.
S
i
n
g
h
,
A
.
D
.
D
w
i
v
e
d
i
,
R
.
R
.
M
u
k
k
a
ma
l
a
,
a
n
d
W
.
S
.
A
l
n
u
ma
y
,
“
P
r
i
v
a
c
y
-
p
r
e
s
e
r
v
i
n
g
l
e
d
g
e
r
f
o
r
b
l
o
c
k
c
h
a
i
n
a
n
d
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s
-
e
n
a
b
l
e
d
c
y
b
e
r
-
p
h
y
si
c
a
l
sy
s
t
e
ms,”
C
o
m
p
u
t
e
rs
a
n
d
El
e
c
t
ri
c
a
l
En
g
i
n
e
e
ri
n
g
,
v
o
l
.
1
0
3
,
p
.
1
0
8
2
9
0
,
O
c
t
.
2
0
2
2
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
c
o
m
p
e
l
e
c
e
n
g
.
2
0
2
2
.
1
0
8
2
9
0
.
[
1
2
]
R
.
S
i
n
g
h
,
A
.
D
.
D
w
i
v
e
d
i
,
G
.
S
r
i
v
a
st
a
v
a
,
P
.
C
h
a
t
t
e
r
j
e
e
,
a
n
d
J
.
C
.
W
.
Li
n
,
“
A
p
r
i
v
a
c
y
-
p
r
e
ser
v
i
n
g
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s
smar
t
h
e
a
l
t
h
c
a
r
e
f
i
n
a
n
c
i
a
l
sy
s
t
e
m,”
I
E
EE
I
n
t
e
r
n
e
t
o
f
T
h
i
n
g
s
J
o
u
r
n
a
l
,
v
o
l
.
1
0
,
n
o
.
2
1
,
p
p
.
1
8
4
5
2
–
1
8
4
6
0
,
N
o
v
.
2
0
2
3
,
d
o
i
:
1
0
.
1
1
0
9
/
JI
O
T.
2
0
2
2
.
3
2
3
3
7
8
3
.
[
1
3
]
L.
M
a
l
i
n
a
,
J
.
H
a
j
n
y
,
P
.
D
z
u
r
e
n
d
a
,
a
n
d
S
.
R
i
c
c
i
,
“
Li
g
h
t
w
e
i
g
h
t
r
i
n
g
s
i
g
n
a
t
u
r
e
s
f
o
r
d
e
c
e
n
t
r
a
l
i
z
e
d
p
r
i
v
a
c
y
-
p
r
e
s
e
r
v
i
n
g
t
r
a
n
sa
c
t
i
o
n
s,
”
i
n
Pro
c
e
e
d
i
n
g
s
o
f
t
h
e
1
5
t
h
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
i
n
t
C
o
n
f
e
re
n
c
e
o
n
e
-
Bu
s
i
n
e
ss
a
n
d
T
e
l
e
c
o
m
m
u
n
i
c
a
t
i
o
n
s
,
S
C
I
TEPRE
S
S
-
S
c
i
e
n
c
e
a
n
d
Te
c
h
n
o
l
o
g
y
P
u
b
l
i
c
a
t
i
o
n
s
,
2
0
1
8
,
p
p
.
6
9
2
–
6
9
7
.
d
o
i
:
1
0
.
5
2
2
0
/
0
0
0
6
8
9
0
5
0
6
9
2
0
6
9
7
.
[
1
4
]
S
.
Ja
n
g
,
D
.
Li
m
,
J
.
K
a
n
g
,
a
n
d
I
.
J
o
e
,
“
A
n
e
f
f
i
c
i
e
n
t
d
e
v
i
c
e
a
u
t
h
e
n
t
i
c
a
t
i
o
n
p
r
o
t
o
c
o
l
w
i
t
h
o
u
t
c
e
r
t
i
f
i
c
a
t
i
o
n
a
u
t
h
o
r
i
t
y
f
o
r
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s,
”
Wi
re
l
e
ss
Pe
rso
n
a
l
C
o
m
m
u
n
i
c
a
t
i
o
n
s
,
v
o
l
.
9
1
,
n
o
.
4
,
p
p
.
1
6
8
1
–
1
6
9
5
,
D
e
c
.
2
0
1
6
,
d
o
i
:
1
0
.
1
0
0
7
/
s
1
1
2
7
7
-
0
1
6
-
3
3
5
5
-
0.
[
1
5
]
P
.
K
u
mar,
G
.
P
.
G
u
p
t
a
,
a
n
d
R
.
Tr
i
p
a
t
h
i
,
“
A
n
e
n
sem
b
l
e
l
e
a
r
n
i
n
g
a
n
d
f
o
g
-
c
l
o
u
d
a
r
c
h
i
t
e
c
t
u
r
e
-
d
r
i
v
e
n
c
y
b
e
r
-
a
t
t
a
c
k
d
e
t
e
c
t
i
o
n
f
r
a
mew
o
r
k
f
o
r
I
o
M
T
n
e
t
w
o
r
k
s,”
C
o
m
p
u
t
e
r
C
o
m
m
u
n
i
c
a
t
i
o
n
s
,
v
o
l
.
1
6
6
,
p
p
.
1
1
0
-
1
2
4
,
Ja
n
.
2
0
2
1
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
c
o
m
c
o
m.
2
0
2
0
.
1
2
.
0
0
3
.
[
1
6
]
R
.
I
n
d
r
a
y
a
n
i
,
H
.
A
.
N
u
g
r
o
h
o
,
R
.
H
i
d
a
y
a
t
,
a
n
d
I
.
P
r
a
t
a
ma
,
“
I
n
c
r
e
a
si
n
g
t
h
e
sec
u
r
i
t
y
o
f
M
P
3
st
e
g
a
n
o
g
r
a
p
h
y
u
s
i
n
g
A
ES
e
n
c
r
y
p
t
i
o
n
a
n
d
M
D
5
h
a
sh
f
u
n
c
t
i
o
n
,
”
i
n
Pr
o
c
e
e
d
i
n
g
s
-
2
0
1
6
2
n
d
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
r
e
n
c
e
o
n
S
c
i
e
n
c
e
a
n
d
T
e
c
h
n
o
l
o
g
y
-
C
o
m
p
u
t
e
r
,
I
C
S
T
2
0
1
6
,
I
EEE,
O
c
t
.
2
0
1
7
,
p
p
.
1
2
9
–
1
3
2
.
d
o
i
:
1
0
.
1
1
0
9
/
I
C
S
TC
.
2
0
1
6
.
7
8
7
7
3
6
1
.
[
1
7
]
C
.
D
o
b
r
a
u
n
i
g
,
M
.
E
i
c
h
l
s
e
d
e
r
,
F
.
M
e
n
d
e
l
,
a
n
d
M
.
S
c
h
l
ä
f
f
e
r
,
“
A
sc
o
n
v
1
.
2
:
l
i
g
h
t
w
e
i
g
h
t
a
u
t
h
e
n
t
i
c
a
t
e
d
e
n
c
r
y
p
t
i
o
n
a
n
d
h
a
sh
i
n
g
,
”
J
o
u
rn
a
l
o
f
C
ry
p
t
o
l
o
g
y
,
v
o
l
.
3
4
,
n
o
.
3
,
p
.
3
3
,
J
u
l
.
2
0
2
1
,
d
o
i
:
1
0
.
1
0
0
7
/
s
0
0
1
4
5
-
0
2
1
-
0
9
3
9
8
-
9.
[
1
8
]
R
.
R
e
d
h
u
a
n
d
E.
N
a
r
w
a
l
,
“
P
o
l
a
r
c
o
d
e
-
b
a
se
d
c
r
y
p
t
o
s
y
st
e
m:
c
o
m
p
a
r
a
t
i
v
e
st
u
d
y
a
n
d
a
n
a
l
y
si
s
o
f
e
f
f
i
c
i
e
n
c
y
,
”
I
n
d
o
n
e
si
a
n
J
o
u
r
n
a
l
o
f
El
e
c
t
r
i
c
a
l
En
g
i
n
e
e
ri
n
g
a
n
d
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
(
I
J
EE
C
S
)
,
v
o
l
.
3
2
,
n
o
.
2
,
p
p
.
8
0
4
-
8
1
0
,
N
o
v
.
2
0
2
3
,
d
o
i
:
1
0
.
1
1
5
9
1
/
i
j
e
e
c
s
.
v
3
2
.
i
2
.
p
p
8
0
4
-
8
1
0
.
Evaluation Warning : The document was created with Spire.PDF for Python.