{"title":"A New Higher Order Differential of Enocoro-128v2","authors":"Naoki Shibayama, Y. Igarashi","doi":"10.1109/CANDARW53999.2021.00070","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00070","url":null,"abstract":"This paper reports the strength of a pseudorandom number generator Enocoro-128v2, which was published as a stream cipher by Hitachi, Ltd. in 2010, against higher order differential cryptanalysis. Enocoro-128v2 is one of the candidate recommended ciphers of CRYPTREC, which is a project for the e-Government in Japan, and specified in ISO/IEC 29192-3:2012. It takes a 128-bit secret key and a 64-bit initial vector as input, and the update function is applied 96 times in the initialization process. It has been reported that a 21 initialization rounds of Enocoro-128v2 is attackable by chosen IV distinguishing attack. In this paper, we focused on a higher order differential of the initialization process of Enocoro-128v2. As a results, we found a new 22-round higher order differential characteristic, in which 16-th order differential equals to constant by computer experiment. Exploiting this characteristic, we also show that a 22 initialization rounds of Enocoro-128v2 can be attacked with 216 chosen IV.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127238272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC","authors":"Shuntaro Ema, Yuta Sato, K. Emura, T. Ohigashi","doi":"10.1109/CANDARW53999.2021.00061","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00061","url":null,"abstract":"In identity-based encryption (IBE), a key generation center (KGC) issues a secret key for an identity. Although any value can be used as a public key, the KGC has the potential to decrypt all ciphertexts even if it is not the actual destination. To solve this key escrow problem, Emura, Katsumata, and Watanabe (EKW) proposed an IBE scheme with security against KGC (ESORICS 2019) and provided a pairing-based construction by extending the Boneh-Franklin IBE scheme (CRYPTO 2001). Briefly, they used the Chow framework (PKC 2009), which introduced a new type of authority known as an identity-certifying authority (ICA). Each user obtains an identity certificate from the ICA and can anonymously obtain a secret key from the KGC through an interactive protocol. Though the KGC can issue a secret key without knowing the user’s identity, an additional communication (between the user and the ICA) and computation by the KGC are required compared to the conventional IBE scheme. In this paper, we implement the pairing-based EKW IBE scheme and show that the additional costs are insignificant compared to the Boneh-Franklin IBE scheme.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114673395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Interconnection Networks for Reducing Hardware Cost and Improving Path Diversity Based on Fat-Trees and Hypercubes","authors":"Yaodong Wang, Yamin Li","doi":"10.1109/CANDARW53999.2021.00049","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00049","url":null,"abstract":"Fat-tree topology is widely used in the interconnection network design of parallel supercomputers. In a classical fat-tree, a compute node is connected to a switch of leaf stage by a link. For a given large number of compute nodes, it needs lots of switches and links, resulting in high hardware costs. To solve this problem, this paper proposes two hybrid topologies named k-Cube k -Ary n-Tree (CAT) and Mirrored k -Cube k -Ary nTree (MiCAT), based on fat-trees and hypercubes. Instead of connecting k compute nodes directly to a leaf switch, we connect a k -cube to the switch of stage 0, and each switch of the k-cube part connects k nodes. That is, this k -cube consists of 2k−1 switches and k (2k −1) compute nodes. We evaluate the path diversity, cost, and performance of CAT and MiCAT. The results show that CAT and MiCAT can save up to 87% switches and 80% links in a large-scale parallel system, for example, if k = n = 8, compared to fat-trees, and meanwhile, both CAT and MiCAT have higher path diversities than fat-trees.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131713860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ariel Kamoyedji, N. Funabiki, Hein Htet, M. Kuribayashi
{"title":"A Proposal of Dynamic Job Scheduling Algorithm Considering CPU Core Utilization for User-PC Computing System","authors":"Ariel Kamoyedji, N. Funabiki, Hein Htet, M. Kuribayashi","doi":"10.1109/CANDARW53999.2021.00051","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00051","url":null,"abstract":"The User-PC computing system (UPC) has been studied as a very low cost distributed computing platform that leverages idling resources of users’ personal computers (PCs). Designed according to the master-worker model, the master PC accepts jobs from users and assigns them to available worker PCs. An efficient static job assignment algorithm considering CPU core utilization has already been devised for the UPC system. It finds an optimal assignment that minimizes the makespan in a static scenario, i.e. jobs are all available in the beginning and all worker PCs are idle. However, in reality, jobs dynamically join and leave the system and as such, some workers may be busy when new jobs arrive. In this paper, we propose a dynamic job scheduling algorithm for the UPC system by extending the static job assignment algorithm. It finds assigned workers to all queuing jobs either on new job arrival, or on job completion by a worker PC. For evaluation, we conducted experiments using six worker PCs and up to 42 jobs. Our algorithm could significantly reduce the makespan compared to other scheduling algorithms.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":" 105","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113952859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Performance Evaluation of Vehicular Swarm Intelligence for Seamless Route Guidance using Opportunistic Networking","authors":"Shogo Amita, A. Fujihara","doi":"10.1109/CANDARW53999.2021.00008","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00008","url":null,"abstract":"We considered a vehicular route guidance system in normal times that can be seamlessly transferable to a evacuation guidance system in times of disaster. In recent years, based on the high penetration rate and availability of smartphones, several swarm intelligence systems have been proposed where mobile nodes autonomously collect information on impassable and congested areas by disaster using their smartphone applications to guide evacuation by sharing the information with other nodes in proximity. It was not fully understood whether this guidance method in times of disaster is also effective as a route guidance method in normal times. For example, the impact of the method on travel time and distance have not been theoretically evaluated in normal times, where there are various destinations for each traffic vehicle. In addition, it was not known what proportion of the vehicles with proximity information sharing will be effective for smooth movement in normal times. In this study, we performed simulations of vehicles and their opportunistic networking in grid-like road networks assuming an urban area to investigate the effects of the number of traffic vehicles, the proportion of traffic vehicles sharing proximity information, and the number of road closures on distributions of travel time and distance. By using Wilcoxon signed-rank test, we found scenarios in which there was a significant difference in the distributions compared to the corresponding scenarios without proximity information sharing. As a result, we confirmed that if the proportion of vehicles sharing proximity information is more than 50%, significant differences in the distributions occur when the size of the road network and the number of vehicles are sufficiently large, where a large-scale traffic congestion is more likely to occur. We also confirmed more significant differences as increasing the number of road closures.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122742120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A GPU Implementation of Watercolor Painting Image Generation","authors":"Jiamian Huang, Yasuaki Ito, K. Nakano","doi":"10.1109/CANDARW53999.2021.00031","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00031","url":null,"abstract":"Stroke-based rendering is a technique to generate images with the painting effect of an actual brush stroke by repeating a drawing, called a stroke, many times. In this paper, we propose a watercolor image generation with stroke-based rendering. We use a physical model that simulates a watercolor painting on paper by computing the movement of water and pigment. This method requires a large number of strokes to be drawn one by one, and the computational cost of watercolor simulation for each stroke drawn is also very high. Therefore, to reduce the generation time, we propose a parallel algorithm for drawing multiple strokes simultaneously. The idea of the parallel algorithm is to generate multiple strokes independently. However, since some of the generated strokes have overlaps, such strokes cannot be drawn simultaneously. In our approach, we find non-overlapping strokes by reducing this problem to the independent point set problem and solving it instead. Furthermore, we implement this parallel algorithm on the GPU. Experimental results show that the proposed GPU implementation on NVIDIA GeForce RTX 3090 attains a speed-up factor of up to 75 over a sequential execution on the CPU.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122823504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sven Köhler, Lukas Wenzel, Max Plauth, Pawel Böning, Philipp Gampe, Leonard Geier, A. Polze
{"title":"Recognizing HPC Workloads Based on Power Draw Signatures","authors":"Sven Köhler, Lukas Wenzel, Max Plauth, Pawel Böning, Philipp Gampe, Leonard Geier, A. Polze","doi":"10.1109/CANDARW53999.2021.00053","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00053","url":null,"abstract":"The power draw of computing infrastructure— besides being a critical operating resource—can give valuable insights into the type and behavior of workloads running on it. In consequence, runtime power analysis can be a promising non-invasive monitoring approach. Recent work has shown that a system’s power draw can support reliable conclusions about running workloads, which serves as a basis for runtime placement decisions to adapt the system’s cumulative energy demand to the available energy supply in a volatile electricity grid.In this work, we reproduce earlier findings on the classification of running workload from a set of previously known workloads purely through external power measurements. Using a k-nearest neighbors classifier, we identify workloads of the NAS benchmark suite with a macro F1-score of 98% for OpenMP-based implementations and 85% for MPI-based implementations.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116506795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enhancement of Physical Web with Stateful BLE Beacons","authors":"Kobayashi Kakeru, S. Fujita","doi":"10.1109/CANDARW53999.2021.00011","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00011","url":null,"abstract":"In this paper, we propose a stateful enhancement of the Physical Web, which is known as an important application of the Bluetooth Low Energy (BLE) technology. We implemented a prototype system consisting of a BLE central and peripherals (i.e., BLE beacon) implemented in Android devices, and an external server written in PHP and PostgreSQL. If the state is stored in the BLE beacon, the prototype system takes 1.0 sec longer to acquire the desired Web page than the normal implementation without state, and if the state is stored in the external server, the response time increased by about 1.0 sec, while it depends on the location of the external server in the network.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126238174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A machine learning-based NIDS that collects training data from within the organization and updates the discriminator periodically and automatically","authors":"Hideya Sato, R. Kobayashi","doi":"10.1109/CANDARW53999.2021.00077","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00077","url":null,"abstract":"To mitigate ever-changing cyber-attacks, we propose a machine-learning network-based intrusion detection system (NIDS). To address issues with related studies for a target organization, we use mirror ports to recover benign communications, and set up a honeypot to collect malicious communications. By extracting features from communication data and applying training, we create a machine learning NIDS for a target organization that reflects the latest communication data. As a result of the validation, we used RF (Random Forest) and MLP (Multilayer perceptron) as the learning algorithms, which had excellent decision accuracy. For communication data acquired by an automatic collection system, we performed discrimination according to the machine learning with the extracted features and obtained a very low false positive rate. These results show the importance of collecting benign and malicious communications within the installation organization.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"29 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116414636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting Music Arrangement, Ringer Assignment, and Score Preparation for Musicbell Ensembles","authors":"Shumpei Miyake, Keita Ushida","doi":"10.1109/CANDARW53999.2021.00092","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00092","url":null,"abstract":"The authors focus on arrangement and practice support of musicbell ensembles. The repertories for musicbells often have to be arranged by non-expert directors. The authors developed a support software which reduces trial-and-errors and saves time in the arrangement work. The software can also generate scores for ringers who are not familiar with music. The authors were able to make a score which musicbell ensembles could perform, with the support of the software. And it managed to be almost the same as the score arranged by an expert at which the authors aimed.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116417081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}