I
nd
o
ne
s
ia
n J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
pu
t
er
Science
Vo
l.
40
,
No
.
2
,
N
o
v
em
b
e
r
2
0
2
5
,
p
p
.
7
8
0
~
78
8
I
SS
N:
2
5
0
2
-
4
7
5
2
,
DOI
: 1
0
.
1
1
5
9
1
/ijeecs.v
40
.i
2
.
pp
780
-
78
8
780
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ee
cs.ia
esco
r
e.
co
m
H
a
sh
-
ba
sed m
ess
a
g
e authenticatio
n code wi
th
se
cur
e has
h
a
lg
o
rithm
-
2
5
6
f
o
r ef
fi
cient
data
sha
ring
in
blo
ckc
ha
in
Na
v
ee
nk
um
a
r
L
ing
a
ra
j
u,
M
a
njula
H
a
la
da
pp
a
Su
nk
a
da
k
a
t
t
e
D
e
p
a
r
t
me
n
t
o
f
C
o
mp
u
t
e
r
S
c
i
e
n
c
e
a
n
d
En
g
i
n
e
e
r
i
n
g
,
U
n
i
v
e
r
s
i
t
y
o
f
V
i
s
v
e
s
v
a
r
a
y
a
C
o
l
l
e
g
e
o
f
E
n
g
i
n
e
e
r
i
n
g
,
B
e
n
g
a
l
u
r
u
,
I
n
d
i
a
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Sep
3
,
2
0
2
4
R
ev
is
ed
J
u
l 1
0
,
2
0
2
5
Acc
ep
ted
Oct
1
4
,
2
0
2
5
Re
c
e
n
tl
y
,
c
lo
u
d
se
rv
e
rs
h
a
v
e
i
n
c
re
a
sin
g
ly
b
e
e
n
u
ti
li
z
e
d
f
o
r
sto
r
in
g
a
larg
e
a
m
o
u
n
t
o
f
d
a
ta,
wh
ich
is
st
o
re
d
i
n
th
e
fo
rm
o
f
c
i
p
h
e
rtex
t
.
In
a
d
e
c
e
n
tralise
d
sy
ste
m
,
th
e
c
o
m
m
u
n
ica
ti
o
n
o
v
e
rh
e
a
d
o
n
th
e
n
e
two
r
k
is
re
c
o
g
n
iz
e
d
a
s
th
e
m
a
in
p
ro
b
lem
d
u
e
t
o
th
e
n
u
m
e
ro
u
s
tran
sa
c
ti
o
n
d
a
ta
re
c
o
rd
e
d
a
c
ro
ss
th
e
d
a
ta
S
h
a
rd
i
n
g
a
n
d
n
o
d
e
s
wi
th
a
u
th
o
rize
d
u
se
rs.
Ha
sh
-
Ba
se
d
M
e
ss
a
g
e
Au
th
e
n
t
ica
ti
o
n
C
o
d
e
wit
h
S
e
c
u
r
e
Ha
sh
Alg
o
rit
h
m
-
2
5
6
-
b
it
(HM
AC
-
S
HA
-
2
5
6
b
i
t)
is
p
ro
p
o
se
d
f
o
r
se
c
u
re
a
n
d
e
ffe
c
ti
v
e
d
a
ta
sh
a
rin
g
i
n
b
l
o
c
k
c
h
a
in
t
o
o
v
e
rc
o
m
e
t
h
is
issu
e
.
T
h
e
se
c
u
re
a
lg
o
rit
h
m
HMAC
se
rv
e
s
f
o
r
a
u
th
e
n
ti
c
a
ti
n
g
b
o
t
h
th
e
d
a
ta
o
ri
g
in
a
n
d
i
n
teg
rit
y
.
Th
a
t
u
se
s
a
c
ry
p
to
g
ra
p
h
ic
h
a
sh
p
ro
c
e
d
u
re
in
c
o
m
b
i
n
a
ti
o
n
with
a
c
o
n
fid
e
n
ti
a
l
k
e
y
to
v
a
li
d
a
te
b
o
t
h
th
e
v
e
rif
i
c
a
ti
o
n
a
n
d
tam
p
e
r
-
p
ro
o
f
c
o
n
ten
t
o
f
a
m
e
ss
a
g
e
.
HMAC
c
o
n
sists
o
f
a
p
a
rti
c
u
l
a
r
c
o
n
ten
t
a
n
d
a
n
a
u
t
h
e
n
ti
c
a
ti
o
n
k
e
y
with
a
h
a
sh
in
g
c
o
d
e
v
a
l
u
e
.
In
t
h
e
Blo
c
k
c
h
a
in
fra
m
e
wo
rk
,
th
e
HMAC
a
lg
o
rit
h
m
is
u
ti
li
z
e
d
wit
h
th
e
S
HA
-
2
5
6
b
it
s
t
o
g
e
n
e
ra
te
a
n
d
v
a
l
id
a
te
t
h
e
si
g
n
a
t
u
re
s
o
f
m
a
n
y
tran
sa
c
ti
o
n
s.
S
HA
-
2
5
6
is
a
h
a
sh
a
lg
o
ri
th
m
th
a
t
c
re
a
tes
a
2
5
6
-
b
it
c
ry
p
t
o
g
ra
p
h
ic
c
h
e
c
k
s
u
m
.
Th
e
b
lo
c
k
c
h
a
in
u
se
s
HMAC
a
lo
n
g
wi
th
S
HA
-
2
5
6
b
it
s,
w
h
ich
is
a
sa
fe
a
n
d
c
lea
rly
e
x
p
re
ss
e
d
a
lg
o
r
it
h
m
t
o
a
ll
o
c
a
te
o
r
c
o
n
v
e
y
th
e
d
a
ta
se
c
u
r
e
ly
.
Th
e
Au
th
e
n
t
ica
ti
o
n
o
f
HMAC
-
S
HA
-
2
5
6
b
it
s
a
c
h
ie
v
e
s
th
e
o
p
ti
m
a
l
re
tri
e
v
a
l
ti
m
e
s
o
f
0
.
4
s
,
1
.
0
s
,
1
.
5
s,
1
.
9
s,
2
.
2
s,
a
n
d
2
.
8
s
f
o
r
f
il
e
siz
e
s
o
f
5
0
K
B,
1
0
0
KB,
1
5
0
KB
,
2
0
0
KB,
2
5
0
KB,
a
n
d
3
0
0
KB,
c
o
rre
sp
o
n
d
i
n
g
l
y
,
wh
e
n
c
o
m
p
a
re
d
to
in
terp
lan
e
tar
y
fil
e
sy
ste
m
(IP
F
S
).
K
ey
w
o
r
d
s
:
B
lo
ck
ch
ain
Hash
v
alu
e
Hash
-
b
ased
m
ess
ag
e
au
th
en
ticatio
n
co
d
e
Secr
et
k
ey
Secu
r
e
h
ash
alg
o
r
ith
m
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Nav
ee
n
k
u
m
a
r
L
in
g
a
r
aju
Dep
ar
tm
en
t o
f
C
o
m
p
u
ter
Scie
n
ce
an
d
E
n
g
in
ee
r
in
g
Un
iv
er
s
ity
o
f
Vis
v
esv
ar
ay
a
C
o
lleg
e
o
f
E
n
g
in
ee
r
i
n
g
B
en
g
alu
r
u
,
I
n
d
ia
E
m
ail:
n
av
ee
n
g
o
wd
ak
n
s
@
g
m
ail.
co
m
1.
I
NT
RO
D
UCT
I
O
N
T
h
e
Ap
p
licatio
n
o
f
n
etwo
r
k
-
b
ased
d
ig
ital
tech
n
o
lo
g
ies
h
a
s
d
ev
elo
p
ed
in
t
h
e
cu
r
r
en
t
e
r
a
,
in
t
h
at
clo
u
d
-
b
ased
s
to
r
a
g
e
(
C
B
S)
h
as
b
ee
n
id
en
tifie
d
as
a
p
o
ten
tia
l
f
r
am
ewo
r
k
th
at
h
elp
s
to
m
a
n
ag
e
th
e
ex
p
an
s
io
n
o
f
d
ig
ital
d
ata
tr
an
s
f
er
[
1
]
.
CBS
i
s
a
s
ig
n
if
ican
t
em
er
g
in
g
d
ev
elo
p
m
e
n
t
in
clo
u
d
c
o
m
p
u
tin
g
,
wh
ich
o
f
f
er
s
ef
f
icien
t
,
ef
f
ec
tiv
e
d
ata
m
an
a
g
em
en
t
s
o
lu
tio
n
s
in
m
u
ltime
d
ia
d
ata
[
2
]
.
C
lo
u
d
s
to
r
ag
e
tec
h
n
o
lo
g
y
is
f
ac
ed
with
ch
allen
g
es
s
u
ch
as
av
ailab
ilit
y
,
s
ec
u
r
ity
,
s
to
r
ag
e
r
eso
u
r
ce
l
im
itatio
n
s
,
m
in
im
al
co
n
s
is
ten
cy
,
p
o
o
r
s
ca
lab
ilit
y
p
er
f
o
r
m
an
ce
,
h
ig
h
co
s
t,
an
d
lack
o
f
in
ter
o
p
er
ab
ilit
y
[3
]
-
[5
].
T
h
ese
s
er
v
ice
p
r
o
v
id
er
s
ar
e
p
ar
ticu
lar
ly
unr
eliab
le
b
ec
a
u
s
e
th
ey
ar
e
s
en
s
itiv
e
to
attac
k
f
r
o
m
e
x
ter
n
al
cy
b
er
attac
k
e
r
s
,
o
th
e
r
wis
e
ev
en
in
ter
r
u
p
ted
b
y
th
eir
E
m
p
lo
y
ee
s
[
6
]
.
E
s
s
en
tially
,
th
is
en
ab
les
im
p
r
o
v
ed
d
ata
co
n
f
id
en
tiality
r
is
k
s
u
tili
zin
g
wh
ich
ev
er
cl
o
u
d
-
b
ased
d
ata
tr
an
s
m
is
s
io
n
p
r
o
to
co
l.
E
n
cr
y
p
tio
n
tech
n
i
q
u
es
is
a
cr
itical
s
ec
u
r
ity
f
ea
tu
r
e
f
o
r
s
ec
u
r
in
g
d
ata
ac
ce
s
s
r
ig
h
ts
[
7
],
[8
]
.
Ho
wev
er
,
b
lo
c
k
ch
ain
is
a
n
etwo
r
k
s
y
s
tem
th
at
en
s
u
r
es
d
ata
is
s
ec
u
r
e
f
r
o
m
v
ar
io
u
s
c
o
m
p
u
ter
s
th
at
ar
e
also
ca
lled
n
o
d
es
[
9
]
-
[
1
1
]
.
T
h
e
d
e
v
elo
p
m
e
n
t
an
d
in
teg
r
atio
n
o
f
b
lo
c
k
ch
ain
tech
n
o
lo
g
y
in
clo
u
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
Ha
s
h
-
b
a
s
ed
mess
a
g
e
a
u
t
h
en
ti
ca
tio
n
co
d
e
w
ith
s
ec
u
r
e
h
a
s
h
a
lg
o
r
ith
m
-
256
…
(
N
a
ve
en
ku
m
a
r
Lin
g
a
r
a
ju
)
781
s
to
r
ag
e
tak
e
an
ap
p
r
o
ac
h
to
ad
d
r
ess
th
e
is
s
u
e
s
o
f
av
ailab
ilit
y
an
d
s
ec
u
r
ity
in
clo
u
d
s
to
r
a
g
e
[
1
2
]
.
C
lo
u
d
s
to
r
ag
e
d
ata
is
s
u
itab
le
f
o
r
h
u
m
a
n
li
f
e
;
h
o
we
v
er
it
h
as
s
o
m
e
p
r
i
v
ac
y
an
d
s
ec
u
r
it
y
is
s
u
es
[
1
3
]
.
T
h
er
e
h
as
b
ee
n
a
p
r
o
life
r
atio
n
o
f
m
ess
ag
e
s
h
ield
ed
lik
e
m
ee
tin
g
r
ec
o
r
d
s
,
co
u
r
tr
o
o
m
ev
id
e
n
ce
,
m
ilit
ar
y
c
o
m
m
an
d
in
s
tr
u
ctio
n
s
,
co
m
m
u
n
icatio
n
r
ec
o
r
d
s
,
ed
u
ca
tio
n
al
p
latf
o
r
m
s
,
h
ea
lth
s
y
s
tem
s
,
b
u
s
in
ess
s
tr
ateg
y
,
an
d
o
th
er
p
r
iv
ate
in
f
o
r
m
atio
n
lik
e
n
atio
n
al
an
d
co
r
p
o
r
ate
co
n
f
id
e
n
tiality
an
d
i
n
d
iv
id
u
al
p
r
iv
ac
y
,
wh
ic
h
r
eq
u
ir
e
r
o
b
u
s
t
s
ec
u
r
ity
m
ea
s
u
r
es
to
p
r
o
tect
ag
ai
n
s
t
u
n
au
th
o
r
ized
ac
ce
s
s
an
d
e
n
s
u
r
e
d
ata
in
teg
r
ity
[
1
4]
-
[
1
6
].
T
h
e
estab
lis
h
ed
m
u
ltime
d
ia
d
ata
m
an
ag
em
e
n
t
to
o
ls
ar
e
in
s
u
f
f
icien
t
to
h
an
d
le
ex
p
o
n
e
n
tially
g
r
o
win
g
d
a
ta
v
o
lu
m
es
,
wh
ich
lead
s
to
en
h
an
ce
d
is
s
u
es
with
d
ata
s
to
r
ag
e
an
d
p
r
i
v
ac
y
s
h
ar
i
n
g
[
1
7
]
.
T
h
e
m
ajo
r
is
s
u
e
is
th
at
u
s
er
s
lack
co
n
tr
o
l
o
v
er
s
to
r
a
g
e
d
ata
,
wh
ich
c
o
m
p
r
o
m
is
es
its
s
ec
u
r
ity
wh
en
u
n
au
th
o
r
ize
d
attac
k
er
s
h
av
e
ac
ce
s
s
to
s
p
ee
ch
an
d
clo
u
d
d
ata
[
1
8
]
,
[1
9
]
.
B
y
f
o
cu
s
in
g
o
n
ef
f
ec
tiv
e
d
ata
s
h
ar
in
g
,
th
is
r
esear
ch
lead
s
to
s
ca
lab
le
b
lo
ck
ch
ai
n
s
o
lu
tio
n
s
th
at
ar
e
s
u
itab
le
f
o
r
r
ea
l
-
tim
e
ap
p
licatio
n
s
s
u
ch
as
s
ec
u
r
e
d
ata
s
h
ar
in
g
[
2
0
]
.
T
h
em
o
s
t
o
f
th
e
tr
ad
itio
n
al
d
ata
-
s
h
ar
in
g
m
eth
o
d
s
d
em
an
d
o
n
o
f
f
lin
e
tr
an
s
m
is
s
io
n
th
at
lack
s
p
r
ac
tical
ity
an
d
p
r
o
n
e
to
s
ig
n
if
ican
t
is
s
u
es
lik
e
d
ata
lo
s
s
[
2
1
]
.
Fu
r
th
er
m
o
r
e,
th
e
r
is
k
o
f
p
r
iv
ac
y
b
r
ea
ch
es
b
ased
o
n
in
ter
n
et
o
f
th
in
g
s
(
I
o
T
)
lead
s
to
d
is
s
u
ad
e
in
d
iv
i
d
u
als
f
r
o
m
p
a
r
ticip
ate
in
I
o
T
d
ata.
W
h
ile
th
e
I
o
T
b
ased
d
at
a
co
llectio
n
m
ajo
r
ly
im
p
r
o
v
es th
e
d
ec
is
io
n
-
m
ak
i
n
g
th
er
eb
y
e
n
s
u
r
in
g
s
ec
u
r
ity
an
d
p
r
iv
ac
y
i
n
en
tire
p
r
o
ce
s
s
ar
e
e
s
s
en
tial [
2
2
]
.
J
ay
ab
alan
an
d
J
ey
a
n
th
i
[
2
3
]
i
m
p
lem
en
ted
a
elastic
b
l
o
ck
ch
ain
f
r
am
ew
o
r
k
th
r
o
u
g
h
O
ff
-
C
h
ain
-
I
PF
S
f
o
r
d
ata
p
r
i
v
ac
y
a
n
d
s
ec
u
r
ity
.
T
h
e
s
y
m
m
et
r
ic
k
e
y
en
c
r
y
p
ti
o
n
was
u
tili
ze
d
ea
r
lier
th
en
d
ata
s
to
r
in
g
i
n
I
PF
S
y
s
tem
m
o
d
el
f
o
r
d
ata
cr
y
p
to
g
r
ap
h
ic
tr
an
s
f
o
r
m
atio
n
,
an
d
a
d
u
al
-
k
ey
en
c
r
y
p
tio
n
s
ch
em
e
s
er
v
ed
as
u
tili
ze
d
t
o
p
ass
o
n
th
e
s
in
g
le
-
k
ey
en
c
r
y
p
t
io
n
f
o
r
p
r
o
d
u
cin
g
s
ec
u
r
e
k
ey
e
n
ca
p
s
u
latio
n
to
ap
p
r
o
v
e
d
en
tit
ies.
T
h
e
elec
tr
o
n
ic
s
ig
n
atu
r
e
en
ab
les
th
e
tr
an
s
ac
tio
n
in
t
o
v
alid
a
n
d
au
th
o
r
ized
ac
ce
s
s
n
o
d
es
,
a
n
d
h
ash
in
g
wa
s
d
o
n
e
th
r
o
u
g
h
th
e
SHA
-
2
5
6
alg
o
r
ith
m
.
Ho
wev
e
r
,
it
s
u
f
f
er
ed
f
r
o
m
s
ca
lab
ilit
y
an
d
in
d
eter
m
in
ate
k
ey
m
an
a
g
em
en
t
f
o
r
ac
ce
s
s
co
n
tr
o
l
p
o
licies
d
u
e
to
th
e
u
til
izatio
n
o
f
s
ea
r
ch
ab
le
en
cr
y
p
ti
o
n
alg
o
r
ith
m
s
.
W
an
g
an
d
Gu
an
[
2
4
]
in
tr
o
d
u
ce
d
a
b
lo
ck
ch
ain
-
b
ased
tr
ac
ea
b
le
an
d
s
ec
u
r
e
d
ata
-
s
h
ar
in
g
a
p
p
r
o
ac
h
.
A
s
ec
u
r
e
d
ata
s
to
r
ag
e
ap
p
r
o
ac
h
was
d
ev
elo
p
ed
wh
ich
in
teg
r
ates
o
f
f
an
d
o
n
-
ch
ain
ass
o
ciatio
n
.
T
h
e
d
ev
el
o
p
ed
m
o
d
el
was
s
to
r
ed
,
s
h
a
r
in
g
d
ata
r
ec
o
r
d
s
o
n
b
lo
ck
ch
ain
a
n
d
s
h
o
ws
as
v
i
s
u
al
r
ep
r
esen
tatio
n
to
r
ec
o
g
n
ize
th
e
tr
ac
k
in
g
r
eq
u
ir
em
e
n
t
o
f
d
ata
p
ar
ties
.
Ho
wev
er
,
th
e
m
o
d
el
f
o
c
u
s
ed
o
n
s
in
g
le
-
p
o
in
t
f
ailu
r
e
wh
ic
h
is
in
h
er
en
t
in
th
e
ce
n
tr
alize
d
s
y
s
tem
d
u
e
to
th
e
class
ical
ac
ce
s
s
co
n
tr
o
l
s
o
lu
ti
o
n
.
L
iu
et
a
l.
[
2
5
]
s
u
g
g
ested
a
m
u
lti
-
au
th
o
r
ity
attr
ib
u
te
-
d
r
i
v
en
ac
ce
s
s
co
n
t
r
o
l
m
an
ag
em
en
t
in
b
lo
ck
ch
ai
n
f
r
am
ewo
r
k
f
o
r
allo
ca
tio
n
o
f
d
ata
co
m
m
u
n
icatio
n
.
T
h
e
b
lo
ck
ch
ain
k
ep
t
cr
y
p
to
g
r
ap
h
ic
t
r
an
s
f
o
r
m
atio
n
d
ata
to
o
b
tain
d
etailed
w
ith
f
lex
ib
le
p
e
r
m
is
s
io
n
co
n
t
r
o
l
au
th
o
r
izatio
n
.
A
p
r
o
to
co
l
d
esig
n
e
d
f
o
r
s
ec
u
r
e
k
ey
cr
ea
tio
n
was
u
s
ed
in
s
ec
r
et
k
ey
p
r
o
d
u
ctio
n
t
o
r
ea
lize
th
e
s
ec
u
r
e
d
is
tr
ib
u
tio
n
o
f
k
e
y
u
s
er
s
th
r
o
u
g
h
an
attr
ib
u
te
au
th
o
r
ity
.
Ho
wev
er
,
th
e
co
m
m
u
n
icatio
n
o
v
e
r
h
ea
d
o
n
t
h
e
n
etwo
r
k
is
r
ec
o
g
n
ized
as
th
e
m
ain
p
r
o
b
lem
d
u
e
to
th
e
n
u
m
er
o
u
s
d
ata
b
ac
k
u
p
s
an
d
th
e
d
ata
s
p
r
ea
d
ac
r
o
s
s
m
u
ltip
le
n
o
d
es th
at
ca
n
o
n
l
y
b
e
r
etr
iev
ed
b
y
u
s
er
s
wh
o
h
av
e
b
ee
n
b
o
th
au
th
e
n
ticated
an
d
a
u
th
o
r
ized
.
Gao
et
a
l.
[
2
6
]
p
r
esen
ted
a
b
lo
ck
ch
ain
with
Hier
ar
ch
ical
b
lo
ck
ch
ain
r
eso
u
r
ce
s
ch
ed
u
l
in
g
f
o
r
an
o
p
tim
ized
d
ata
co
n
f
id
e
n
tiality
an
d
p
r
o
tectio
n
s
y
s
tem
.
Mo
n
it
o
r
in
g
p
ast
wo
r
k
h
elp
s
to
m
an
ag
e
p
ee
r
co
n
tain
er
s
tatu
s
an
d
s
y
s
tem
r
eso
u
r
ce
s
,
wh
ich
en
ab
les
to
h
an
d
lin
g
o
f
ad
d
itio
n
al
task
s
an
d
ac
ce
s
s
ib
le
s
o
u
r
ce
s
am
o
n
g
ass
o
ciate
d
in
f
r
astru
ctu
r
e
n
o
d
e
s
.
Ho
wev
er
,
th
e
m
o
d
el
s
u
f
f
er
e
d
f
r
o
m
lo
ad
-
h
an
d
lin
g
lim
itatio
n
s
b
ec
au
s
e
th
e
to
tal
n
u
m
b
er
o
f
n
etwo
r
k
in
g
h
o
s
ts
an
d
en
d
-
u
s
er
s
g
r
ew
wh
ich
r
esu
ltin
g
in
less
p
er
f
o
r
m
an
ce
.
Ug
o
ch
u
k
wu
et
a
l.
[
2
7
]
im
p
lem
en
ted
a
s
ec
u
r
e
an
d
e
f
f
ec
tiv
e
d
is
tr
ib
u
tio
n
s
to
r
ag
e
m
o
d
el
u
s
in
g
I
PF
S
in
b
lo
ck
c
h
ain
.
T
h
e
m
o
d
el
r
eso
lv
ed
th
e
lo
g
is
tic
s
y
s
tem
p
r
iv
ac
y
,
in
ter
o
p
er
a
b
ilit
y
,
an
d
s
ec
u
r
ity
ch
allen
g
es
,
an
d
it
g
en
er
ates
lo
g
is
tic
r
ec
o
m
m
en
d
atio
n
s
to
ad
o
p
t
b
lo
ck
ch
ain
.
Ho
wev
er
,
th
e
i
n
teg
r
atio
n
o
f
v
ar
io
u
s
b
lo
c
k
ch
ain
n
etwo
r
k
s
was
ch
allen
g
in
g
b
ec
au
s
e
o
f
th
e
in
t
er
o
p
er
a
b
ilit
y
is
s
u
e
.
Fro
m
th
e
an
aly
s
is
,
th
e
ex
is
tin
g
m
o
d
el
h
as
li
m
itatio
n
s
,
s
u
ch
as
it
s
u
f
f
er
s
f
r
o
m
s
ca
lab
ilit
y
an
d
in
d
ete
r
m
in
ate
k
e
y
m
an
ag
em
en
t
f
o
r
ac
ce
s
s
co
n
tr
o
l
p
o
licies
d
u
e
to
th
e
u
tili
za
tio
n
o
f
a
s
ea
r
ch
ab
le
en
cr
y
p
tio
n
alg
o
r
ith
m
.
I
t
f
o
cu
s
ed
o
n
s
in
g
le
-
p
o
i
n
t
f
ailu
r
e
,
wh
ic
h
is
in
h
er
en
t
in
th
e
ce
n
tr
alize
d
s
y
s
tem
d
u
e
to
th
e
class
ical
ac
ce
s
s
co
n
tr
o
l
s
o
lu
ti
o
n
.
T
h
e
co
m
m
u
n
icatio
n
o
v
e
r
h
ea
d
o
n
th
e
n
etwo
r
k
is
r
ec
o
g
n
ize
d
as
t
h
e
m
ai
n
p
r
o
b
lem
d
u
e
to
t
h
e
n
u
m
er
o
u
s
d
ata
b
ac
k
u
p
s
an
d
t
h
e
d
ata
s
p
r
ea
d
ac
r
o
s
s
m
u
ltip
le
n
o
d
es th
at
ca
n
o
n
ly
b
e
r
etr
iev
e
d
b
y
u
s
er
s
wh
o
h
a
v
e
b
ee
n
b
o
t
h
au
th
en
ticat
ed
a
n
d
a
u
th
o
r
ize
d
.
I
t
s
u
f
f
er
ed
f
r
o
m
lo
ad
-
h
an
d
lin
g
lim
itatio
n
s
b
ec
au
s
e
th
e
to
ta
l
n
u
m
b
e
r
o
f
n
etwo
r
k
in
g
h
o
s
ts
an
d
e
n
d
-
u
s
er
s
g
r
ew
wh
ic
h
r
esu
ltin
g
in
less
p
er
f
o
r
m
an
ce
.
T
h
e
in
teg
r
atio
n
o
f
v
ar
io
u
s
b
lo
c
k
ch
ain
n
etwo
r
k
s
was
ch
allen
g
in
g
b
ec
au
s
e
o
f
th
e
in
t
er
o
p
er
a
b
ilit
y
is
s
u
e.
T
h
e
co
n
tr
i
b
u
tio
n
o
f
th
is
r
esear
ch
is
s
u
m
m
ar
ized
as f
o
llo
ws:
−
HM
AC
i
s
a
s
ec
u
r
e
alg
o
r
ith
m
ic
u
s
er
v
er
if
icatio
n
s
y
s
tem
in
wh
ich
a
cr
y
p
to
g
r
ap
h
ic
s
ec
u
r
e
h
ash
in
g
m
ec
h
an
is
m
is
ap
p
lied
m
u
tu
a
lly
alo
n
g
with
a
s
y
m
m
etr
ic
k
ey
to
d
eter
m
in
e
b
o
th
th
e
a
u
th
en
ticity
an
d
in
teg
r
ity
o
f
th
e
d
ata
b
lo
c
k
.
HM
AC
co
n
s
is
ts
o
f
a
p
ar
ticu
lar
d
ata
b
lo
ck
an
d
a
s
y
m
m
etr
ic
k
ey
with
a
s
ec
u
r
e
h
ash
co
d
e.
−
I
n
b
lo
c
k
ch
ain
tec
h
n
o
lo
g
y
,
t
h
e
HM
AC
s
y
s
tem
ap
p
lies
SHA
-
2
5
6
as
its
m
eth
o
d
f
o
r
a
u
th
en
tic
atin
g
m
ess
ag
es
s
ec
u
r
ely
.
T
o
g
e
n
er
ate
a
n
d
a
u
th
en
ticate
th
e
s
ig
n
atu
r
es
o
f
n
u
m
e
r
o
u
s
t
r
an
s
ac
tio
n
s
.
SH
A
-
2
5
6
is
a
h
ash
alg
o
r
ith
m
th
at
cr
ea
tes
a
f
ix
e
d
-
len
g
th
2
5
6
-
b
it
h
ash
.
T
h
e
b
l
o
c
k
ch
ain
u
s
es
HM
AC
,
wh
ich
im
p
lem
en
ts
SHA
-
2
5
6
h
ash
i
n
g
alg
o
r
ith
m
,
it is
a
v
er
y
co
n
f
id
e
n
tial a
n
d
b
r
ief
ap
p
r
o
ac
h
es to
allo
ca
te
c
o
n
v
e
y
d
a
ta.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
40
,
No
.
2
,
No
v
em
b
er
20
25
:
7
8
0
-
78
8
782
T
h
e
r
esear
ch
p
ap
er
is
o
r
g
a
n
ized
as
f
o
llo
ws:
Sect
io
n
2
d
escr
ib
es
th
e
r
esear
ch
m
eth
o
d
f
o
r
ef
f
icien
t
d
ata
s
h
ar
in
g
in
b
lo
ck
ch
ai
n
;
S
ec
tio
n
3
s
h
o
ws
r
esu
lts
an
d
d
i
s
cu
s
s
io
n
in
ter
m
s
o
f
q
u
an
titat
iv
e
an
d
q
u
alitativ
e
an
aly
s
is
an
d
co
m
p
a
r
ativ
e
an
al
y
s
is
; t
h
e
c
o
n
clu
s
io
n
with
f
u
t
u
r
e
wo
r
k
o
f
th
is
r
esear
ch
is
g
iv
e
n
in
Sectio
n
4
.
2.
RE
S
E
RCH
M
E
T
H
O
D
I
n
a
d
ec
en
tr
alize
d
s
y
s
tem
,
th
e
n
etwo
r
k
co
m
m
u
n
icatio
n
o
v
er
h
ea
d
is
r
ec
o
g
n
ized
as
th
e
m
ain
p
r
o
b
lem
.
A
s
em
i
-
d
ec
en
tr
alize
d
ap
p
r
o
ac
h
is
p
r
o
v
id
ed
with
th
e
aim
o
f
r
ed
u
cin
g
c
o
m
m
u
n
icatio
n
o
v
er
h
ea
d
ca
u
s
ed
b
y
au
th
o
r
ized
u
s
er
s
r
ep
licatin
g
in
f
o
r
m
atio
n
o
n
d
is
tr
ib
u
ted
n
o
d
e
s
is
u
s
ed
in
wh
ich
HM
AC
-
SH
A
-
2
5
6
is
u
tili
ze
d
o
n
th
e
b
lo
ck
ch
ain
.
T
h
e
d
esig
n
ed
HM
AC
-
S
HA
-
2
5
6
is
ju
s
t
if
ied
b
ased
o
n
its
ca
p
ab
ilit
y
to
ad
d
r
ess
ch
allen
g
es
in
s
ec
u
r
e
d
ata
s
h
ar
in
g
in
b
lo
ck
ch
ain
.
T
h
e
ex
is
tin
g
m
eth
o
d
s
ar
e
s
u
f
f
er
ed
f
r
o
m
in
d
eter
m
in
ate
k
e
y
m
an
ag
em
en
t a
n
d
s
ca
lab
ilit
y
is
s
u
es
th
er
eb
y
lead
in
g
to
c
o
m
m
u
n
icatio
n
o
v
er
h
ea
d
.
HM
AC
-
SHA
-
2
5
6
in
teg
r
ates
cr
y
p
to
g
r
a
p
h
ic
h
ash
f
u
n
ctio
n
with
s
ec
r
et
k
ey
th
at
en
s
u
r
es
b
o
th
in
teg
r
ity
a
n
d
au
th
e
n
ticity
o
f
m
ess
ag
es.
Fig
u
r
e
1
d
e
p
icts
th
e
s
em
i
-
d
ec
en
tr
alize
d
s
y
s
tem
m
o
d
el.
I
n
itially
,
th
e
d
ata
o
wn
er
e
n
cr
y
p
ts
th
e
d
ata
a
n
d
u
p
lo
ad
s
i
t
to
a
clo
u
d
s
er
v
e
r
wh
ile
th
e
b
lo
ck
ch
ain
g
en
e
r
a
tes
h
ash
co
d
e
f
o
r
en
cr
y
p
te
d
d
ata.
T
h
e
h
ier
ar
ch
ical
s
tr
u
c
tu
r
e
is
f
o
r
m
ed
o
n
b
lo
ck
ch
ain
in
th
at
d
o
m
ain
a
u
th
o
r
ity
is
f
o
r
m
ed
b
y
its
d
is
tr
ib
u
ted
u
s
er
.
Fig
u
r
e
1
.
Sem
i
-
d
ec
en
tr
alize
d
s
y
s
tem
u
tili
zin
g
HM
AC
with
S
HA
-
256
T
h
e
o
n
e
d
o
m
a
i
n
u
s
e
r
h
a
s
a
c
c
e
s
s
t
o
a
n
d
s
a
v
e
s
d
a
t
a
c
o
p
i
e
s
w
h
i
l
e
o
t
h
e
r
d
o
m
a
i
n
u
s
e
r
s
a
r
e
u
n
a
b
l
e
t
o
a
c
c
e
s
s
a
n
d
t
r
a
n
s
f
e
r
t
h
e
d
a
t
a
.
W
h
e
n
t
h
e
d
a
t
a
u
s
e
r
n
e
e
d
s
t
o
a
c
c
e
s
s
d
a
t
a
a
n
d
u
p
l
o
a
d
i
t
b
y
t
h
e
o
w
n
e
r
,
t
h
e
u
s
e
r
a
c
c
e
s
s
e
s
i
t
f
r
o
m
d
o
m
a
i
n
a
u
t
h
o
r
i
t
y
a
n
d
d
e
c
r
y
p
t
s
a
c
t
u
a
l
c
o
n
t
e
n
t
o
n
t
h
e
i
r
l
o
c
a
l
m
a
c
h
i
n
e
t
h
r
o
u
g
h
d
e
c
r
y
p
t
i
o
n
.
H
e
r
e
,
d
u
a
l
l
e
v
e
l
k
e
y
m
a
n
a
g
e
m
e
n
t
t
e
c
h
n
i
q
u
e
h
a
s
d
e
v
e
l
o
p
e
d
;
f
i
r
s
t
t
h
e
e
n
c
r
y
p
t
i
o
n
t
i
m
e
o
n
t
h
e
i
n
f
o
r
m
a
t
i
o
n
h
o
l
d
e
r
a
n
d
s
e
c
o
n
d
B
l
o
c
k
c
h
a
i
n
f
r
a
m
e
w
o
r
k
v
i
a
f
o
r
m
i
n
g
h
a
s
h
v
a
l
u
e
.
H
M
A
C
s
e
r
v
e
s
a
s
a
c
r
y
p
t
o
g
r
a
p
h
i
c
m
e
c
h
a
n
i
s
m
f
o
r
a
u
t
h
e
n
t
i
c
a
t
i
o
n
s
y
s
t
e
m
i
n
w
h
i
c
h
a
c
r
y
p
t
o
g
r
a
p
h
i
c
h
a
s
h
i
n
g
a
l
g
o
r
i
t
h
m
i
s
a
p
p
l
i
e
d
c
o
n
c
u
r
r
e
n
t
l
y
w
i
t
h
a
s
y
m
m
e
t
r
i
c
k
e
y
t
o
d
e
t
e
r
m
i
n
e
b
o
t
h
t
h
e
a
u
t
h
e
n
t
i
c
i
t
y
a
n
d
i
n
t
e
g
r
i
t
y
o
f
t
h
e
m
e
s
s
a
g
e
.
H
M
A
C
i
s
c
o
n
s
i
s
t
s
o
f
a
p
a
r
t
i
c
u
l
a
r
d
a
t
a
b
l
o
c
k
a
n
d
a
s
y
m
m
e
t
r
i
c
k
e
y
w
i
t
h
a
s
e
c
u
r
e
h
a
s
h
c
o
d
e
.
S
H
A
-
2
5
6
i
s
a
h
a
s
h
a
l
g
o
r
i
t
h
m
t
h
a
t
c
r
e
a
t
e
s
a
c
o
n
s
t
a
n
t
-
l
e
n
g
t
h
2
5
6
b
i
t
s
h
a
s
h
c
o
d
e
a
l
g
o
r
i
t
h
m
.
T
h
e
B
l
o
c
k
c
h
a
i
n
m
e
c
h
a
n
i
s
m
u
t
i
l
i
s
i
n
g
h
a
s
h
m
e
s
s
a
g
e
a
u
t
h
e
n
t
i
c
a
t
i
o
n
c
o
d
e
(
H
M
A
C
)
w
h
i
c
h
i
m
p
l
e
m
e
n
t
s
s
e
c
u
r
e
h
a
s
h
a
l
g
o
r
i
t
h
m
t
e
c
h
n
i
q
u
e
s
(
S
H
A
-
2
5
6
-
b
i
t
)
,
i
t
i
s
a
v
e
r
y
c
o
n
f
i
d
e
n
t
i
a
l
a
n
d
b
r
i
e
f
a
p
p
r
o
a
c
h
e
s
t
o
a
l
l
o
c
a
t
e
o
r
c
o
n
v
e
y
d
a
t
a
.
M
e
s
s
a
g
e
a
u
t
h
e
n
t
i
c
a
t
i
o
n
i
s
a
p
r
o
c
e
d
u
r
e
t
o
v
e
r
i
f
y
t
h
e
m
e
s
s
a
g
e
a
u
t
h
e
n
t
i
c
i
t
y
i
n
w
h
i
c
h
t
w
o
s
i
g
n
i
f
i
c
a
n
t
f
a
c
t
o
r
s
a
r
e
t
a
k
e
n
i
n
t
o
m
e
s
s
a
g
e
a
u
t
h
e
n
t
i
c
a
t
i
o
n
v
e
r
i
f
i
c
a
t
i
o
n
l
i
k
e
s
o
u
r
c
e
a
n
d
t
h
e
m
e
s
s
a
g
e
a
r
e
u
n
a
b
l
e
t
o
b
e
m
o
d
i
f
i
e
d
.
F
i
g
u
r
e
2
p
r
e
s
e
n
t
s
t
h
e
d
a
t
a
-
b
l
o
c
k
s
t
r
u
c
t
u
r
e
f
o
r
t
h
e
w
h
o
l
e
m
e
s
s
a
g
e
i
n
t
e
g
r
i
t
y
v
e
r
i
f
i
c
a
t
i
o
n
p
r
o
c
e
d
u
r
e
t
h
a
t
c
o
n
t
a
i
n
s
a
p
r
i
v
a
t
e
k
e
y
f
o
r
p
r
o
d
u
c
i
n
g
i
n
f
o
r
m
a
t
i
o
n
i
n
t
o
t
h
e
a
l
g
o
r
i
t
h
m
s
t
r
u
c
t
u
r
e
.
Fig
u
r
e
2
.
HM
AC
b
ased
m
ess
ag
e
au
th
en
ticatio
n
p
r
o
ce
s
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
Ha
s
h
-
b
a
s
ed
mess
a
g
e
a
u
t
h
en
ti
ca
tio
n
co
d
e
w
ith
s
ec
u
r
e
h
a
s
h
a
lg
o
r
ith
m
-
256
…
(
N
a
ve
en
ku
m
a
r
Lin
g
a
r
a
ju
)
783
T
h
e
s
en
d
er
tr
an
s
m
its
th
e
m
ess
ag
e
with
its
M
AC
.
At
th
e
r
ec
eiv
er
en
d
,
th
e
r
ec
eiv
ed
MA
C
is
v
er
if
ied
u
s
in
g
th
e
s
am
e
s
ec
r
et
k
ey
.
I
f
b
o
th
MA
C
s
ar
e
s
im
ilar
,
it
co
n
f
ir
m
s
th
at
n
o
m
o
d
if
icatio
n
s
h
av
e
o
cc
u
r
r
ed
to
th
e
m
ess
ag
e
an
d
it
is
s
en
t
b
y
an
au
th
en
tic
s
en
d
er
.
T
h
e
en
cr
y
p
t
io
n
-
b
ased
HM
AC
is
b
ased
o
n
f
ix
ed
-
len
g
t
h
-
SHA
-
256
b
it
was
d
ev
elo
p
ed
in
th
is
r
esear
ch
to
p
r
o
d
u
ce
a
n
d
v
alid
ate
s
ig
n
atu
r
es
o
f
m
u
ltip
le
tr
a
n
s
ac
tio
n
s
,
en
s
u
r
in
g
th
at
th
e
d
ata
is
n
o
t
tam
p
er
e
d
with
o
r
d
is
clo
s
ed
.
T
h
e
g
iv
e
n
i
n
p
u
t
k
ey
is
in
itially
h
ash
ed
an
y
in
p
u
t
tex
t
t
h
r
o
u
g
h
HM
AC
an
d
th
e
in
p
u
t
k
ey
is
p
r
o
d
u
ce
d
th
r
o
u
g
h
XORi
n
g
o
p
er
atio
n
th
e
I
n
n
er
p
ad
(
I
p
ad
)
with
in
p
u
t
tex
t
(
I
P).
T
h
e
I
p
a
d
s
co
r
e
is
3
6
h
ex
with
6
4
b
y
te
tim
eo
u
t
wh
ic
h
is
b
ased
o
n
k
ey
le
n
g
th
.
T
h
e
SHA
-
2
5
6
o
u
tp
u
t
o
f
h
ash
f
u
n
ctio
n
is
p
r
o
v
id
ed
i
n
to
n
e
x
t
SHA
-
256
f
o
r
g
en
er
atin
g
HM
AC
o
u
tp
u
t
d
esig
n
.
T
h
e
k
ey
in
p
u
t
is
XORed
b
y
Ou
ter
p
a
d
(
Op
ad
)
th
at
h
as
5
C
s
co
r
es
in
h
e
x
p
r
io
r
h
ash
in
g
p
r
i
m
ar
y
SHA
-
2
5
6
o
u
tp
u
t.
T
h
e
in
teg
r
atio
n
o
f
6
4
b
y
te
k
ey
,
0
,
Op
ad
o
u
tp
u
t
a
n
d
p
r
im
ar
y
SHA
-
2
5
6
o
u
t
p
u
t
a
r
e
h
ash
e
d
to
g
eth
er
t
o
g
e
n
er
ate
HM
AC
o
u
tp
u
t.
T
h
e
MA
C
is
esti
m
ated
b
y
HM
AC
f
u
n
ctio
n
o
v
er
tex
tu
al
d
ata
p
r
esen
tatio
n
as
s
h
o
w
n
in
th
e
eq
u
atio
n
.
(
1
)
,
W
h
er
e,
⨁
an
d
|
|
ar
e
d
en
o
tes XOR an
d
co
n
ca
te
n
atio
n
.
(
)
=
(
,
)
(
(
0
⨁
)
|
|
(
(
0
⨁
)
|
|
)
)
(
1
)
T
h
e
s
co
r
e
f
r
o
m
I
p
a
d
is
tr
an
s
f
e
r
r
ed
to
th
e
p
r
im
ar
y
SHA
-
2
5
6
d
esig
n
an
d
th
e
en
cr
y
p
ted
-
b
ased
HM
AC
co
m
p
u
te
p
r
o
d
u
ce
s
t
h
e
r
esu
lt
o
f
th
e
p
r
im
a
r
y
f
ix
ed
-
len
g
th
-
SHA
-
256
b
it
to
th
e
n
ex
t
f
ix
ed
-
len
g
th
-
SHA
-
256
b
it
to
attain
th
e
wh
o
le
HM
AC
p
r
o
d
u
ce
ou
tp
u
t.
Du
al
s
im
ilar
h
ash
co
d
e
m
et
h
o
d
f
r
am
ewo
r
k
s
ar
e
u
tili
ze
d
in
HM
AC
ar
ch
itectu
r
e
to
attain
its
r
esu
lt,
an
d
it
is
u
s
ed
in
HM
AC
ar
ch
itectu
r
e
f
o
r
th
e
wh
o
le
HM
AC
s
tr
u
ctu
r
e.
As
a
o
u
tp
u
t
,
o
f
th
e
p
r
im
ar
y
f
ix
ed
-
len
g
th
-
SHA
-
2
5
6
b
it
is
im
p
lem
en
ted
f
ir
s
t,
an
d
th
e
s
ec
o
n
d
a
r
y
SHA
-
256
b
it
wai
ts
u
n
til
it
r
ec
eiv
es
th
e
m
ess
ag
e
i
n
p
u
t
s
f
r
o
m
th
e
o
u
tp
u
t
s
o
f
th
e
p
r
im
ar
y
SHA
-
2
5
6
b
it
im
p
lem
e
n
tatio
n
.
Hen
ce
,
th
e
p
r
im
ar
y
SHA
-
2
5
6
v
alid
ity
s
t
ay
s
cr
itical
f
o
r
o
b
tain
in
g
r
esu
lt
in
g
HM
AC
b
ased
SH
A
-
256
b
i
t
.
T
h
e
6
4
-
b
it
s
tates
in
th
e
f
r
a
m
ewo
r
k
h
av
e
a
p
r
o
d
u
ce
d
in
p
u
t
s
s
eq
u
en
ce
s
f
o
r
p
r
i
m
ar
y
an
d
n
e
x
t
SHA
-
256
b
it
al
g
o
r
ith
m
s
tech
n
iq
u
es
.
T
o
tally
3
2
-
b
it
s
tate
ar
e
im
p
lem
en
ted
o
f
wh
ich
1
6
ar
e
f
o
r
th
e
p
r
im
ar
y
5
1
2
b
its
an
d
th
e
o
th
er
1
6
ar
e
f
o
r
th
e
n
ex
t
5
1
2
b
its
to
p
r
o
ce
s
s
th
e
p
r
im
ar
y
SHA
-
2
5
6
m
ess
ag
es.
T
h
e
m
ess
ag
e
u
s
es
th
e
p
r
im
ar
y
5
1
2
b
it
h
ash
f
u
n
ctio
n
r
esu
lt
to
attain
th
e
n
ex
t
5
1
2
b
it
r
esu
lt
in
th
e
in
p
u
t
m
ess
ag
e.
T
h
e
I
p
ad
h
as
a
s
im
ilar
c
o
n
ce
p
t
o
f
in
p
u
ttin
g
m
ess
ag
es
to
th
e
n
e
x
t
SHA
-
2
5
6
an
d
k
e
y
Op
a
d
is
in
te
g
r
ated
t
h
r
o
u
g
h
t
h
e
p
r
im
ar
y
SHA
-
2
5
6
r
esu
lt.
L
ik
e
ea
r
lier
SHA
-
256
b
it
p
r
o
ce
d
u
r
es,
th
e
r
esu
lt
o
f
th
e
n
ex
t
5
1
2
-
b
it
b
lo
c
k
s
in
f
ix
ed
-
len
g
th
-
SHA
-
256
b
i
t
p
r
o
ce
s
s
u
s
e
s
th
e
r
esu
lt
o
f
th
e
p
r
im
ar
y
5
1
2
b
it
b
lo
ck
s
f
r
o
m
th
e
a
n
o
th
er
h
ash
c
o
d
e
f
u
n
ctio
n
s
.
d
en
o
tes
th
e
HM
AC
d
esig
n
s
tr
u
ctu
r
e
with
a
d
u
al
SHA
-
2
5
6
h
ash
in
g
alg
o
r
ith
m
wh
ic
h
p
r
esen
ts
h
o
w
th
e
I
p
ad
d
ata
is
in
co
r
p
o
r
ated
b
y
tex
t
in
p
u
t
.
Fig
u
r
e
3
s
h
o
ws th
e
s
tr
u
ctu
r
e
o
f
HM
AC
-
SHA
-
256.
Fig
u
r
e
3
.
Stru
ctu
r
e
o
f
HM
AC
-
SHA
-
256
-
b
it
So
m
e
o
f
th
e
h
ash
f
u
n
ctio
n
s
h
a
v
e
p
r
o
p
e
r
ties
s
u
ch
as f
ix
ed
-
len
g
th
o
u
tp
u
t a
n
d
co
m
p
u
tatio
n
al
f
ea
s
ib
ilit
y
f
o
r
d
ef
in
i
n
g
lik
e
th
at
Hash
(
)
g
en
er
ated
h
ash
v
alu
e.
Similar
h
ash
co
d
es
ar
e
im
p
o
s
s
ib
le
to
f
in
d
,
an
d
th
ese
ch
ar
ac
ter
is
tics
ar
e
estab
li
s
h
ed
wea
k
h
ash
f
u
n
ctio
n
s
.
Mo
r
eo
v
er
,
n
o
p
air
(
,
)
is
f
o
u
n
d
f
o
r
th
a
t
Hash
(
)
=
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
40
,
No
.
2
,
No
v
em
b
er
20
25
:
7
8
0
-
78
8
784
h
ash
v
alu
e,
co
m
p
u
tatio
n
ally
(
)
.
SHA
-
2
5
6
p
r
o
ce
s
s
ed
5
1
2
b
it
m
ess
ag
e
in
p
u
t
an
d
1
6
0
b
it
p
r
im
ar
y
s
co
r
e
to
g
en
er
ate
1
6
0
b
it
h
ash
c
o
d
e
r
esu
lt.
T
h
e
i
n
p
u
t
m
ess
ag
e
b
lo
c
k
i
s
p
ad
d
ed
p
r
e
v
o
u
s
ly
in
th
e
SHA
-
256
b
it
o
p
er
atio
n
an
d
o
n
ce
it
is
r
ec
eiv
e
d
th
e
m
ess
ag
e
s
is
co
m
p
leted
b
y
d
a
ta
ap
p
en
d
in
g
a
s
in
g
le
o
n
e
-
b
it
.
Nex
t
ze
r
o
b
it
is
in
clu
d
ed
,
a
n
d
th
e
p
atter
n
is
co
n
tin
u
ed
u
n
til th
e
n
u
m
b
er
o
f
m
ess
ag
e
b
its
is
s
im
ilar
.
T
h
e
m
ess
ag
e
in
p
u
t a
b
ilit
y
is
5
1
2
b
its
a
n
d
its
s
ch
ed
u
le
r
ca
lc
u
lates
th
e
m
ess
ag
e
o
f
SHA
-
2
5
6
.
Fo
r
0
≤
≤
15
,
th
e
m
ess
ag
e
is
d
ir
ec
tly
ex
tr
ac
ted
f
r
o
m
in
p
u
t
m
ess
ag
e
wh
ile
f
o
r
16
≤
≤
63
,
th
e
m
ess
ag
e
esti
m
ated
b
y
th
e
e
q
u
atio
n
.
(
2
)
,
0
256
an
d
1
256
ar
e
p
r
esen
ted
in
t
h
e
(
3
)
an
d
(
4
)
,
=
0
≤
≤
15
=
1
256
(
−
2
)
+
−
7
+
0
256
(
−
15
)
+
−
16
16
≤
≤
63
(
2
)
0
256
(
)
=
7
(
)
+
18
(
)
+
3
(
)
(
3)
(
3
)
1
256
(
)
=
17
(
)
+
19
(
)
+
10
(
)
(
4)
(
4
)
W
h
er
e,
is
a
n
u
m
b
er
o
f
tr
a
n
s
f
o
r
m
atio
n
r
o
u
n
d
s
,
(
)
is
a
r
ig
h
t
r
o
tatio
n
o
f
th
r
o
u
g
h
b
its
,
(
)
is
a
r
ig
h
t
s
h
if
t
o
f
th
r
o
u
g
h
b
its
.
At
last
,
th
e
p
r
o
p
o
s
ed
HM
AC
-
SH
A
-
2
5
6
p
r
o
v
id
es
an
o
u
tp
u
t
wh
ich
s
ec
u
r
e
an
d
o
p
tim
ized
d
ata
d
is
tr
ib
u
tio
n
in
th
e
B
lo
ck
ch
ain
n
etwo
r
k
s
.
T
h
e
b
l
o
ck
ch
ai
n
u
s
es
s
ec
u
r
e
H
MA
C
with
SHA
-
2
5
6
,
it
is
a
en
c
r
y
p
t
ed
an
d
s
tr
ea
m
lin
ed
m
eth
o
d
to
b
r
o
ad
ca
s
t
o
r
ex
ch
a
n
g
e
d
ata.
T
h
e
A
lg
o
r
ith
m
1
f
o
r
s
ec
u
r
e
HM
AC
-
SHA
-
256
-
b
it is
g
iv
en
b
elo
w.
Alg
o
r
ith
m
1.
HM
AC
-
SHA
-
256
-
b
it
Input
:
HMAC
(
,
)
Output
:
HMAC
-
SHA
-
256 code
Step 1
:
if
(
(
)
>
_
)
then
=
−
256
(
)
Step 2
:
if
(
(
)
<
_
)
then
Pad
with zeros to
_
Step 3
:
_
=
⨁
Step 4
:
_
=
⨁
Step 5
:
ℎ
_
=
−
256
(
_
|
|
)
Step 6
:
=
−
256
(
_
|
|
ℎ
_
)
Step 7
:
Return HMAC
3.
O
UT
CO
M
E
S
AN
D
DIS
CUS
SI
O
N
T
h
e
cr
y
p
t
o
g
r
ap
h
ic
h
ash
co
d
e
p
r
o
d
u
ce
d
b
y
t
h
e
h
ash
f
u
n
ctio
n
o
f
th
e
SHA
-
2
5
6
-
b
it
is
s
im
u
lated
in
an
en
v
ir
o
n
m
en
t
o
f
p
y
t
h
o
n
la
n
g
u
ag
e
p
r
o
g
r
am
c
o
d
e
with
c
o
m
p
u
ter
s
y
s
tem
s
etu
p
th
e
W
in
d
o
ws
11
O
p
er
atin
g
s
y
s
tem
,
R
AM
1
2
GB
,
an
d
I
n
tel
i9
p
r
o
ce
s
s
o
r
.
T
h
e
s
ev
er
al
p
ar
am
eter
s
su
ch
as
T
h
e
ev
alu
atio
n
,
co
n
s
id
er
s
r
etr
iev
al
tim
e
to
g
eth
er
with
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
s
p
ee
d
an
d
s
y
s
tem
th
r
o
u
g
h
p
u
t.
f
o
r
esti
m
atin
g
th
e
HM
AC
-
SH
A
-
2
5
6
ef
f
icie
n
cy
.
T
h
e
d
if
f
e
r
en
t
f
ile
s
izes
s
u
ch
as
5
0
KB
,
1
0
0
KB
,
1
5
0
KB
,
2
0
0
KB
,
2
5
0
KB
,
an
d
3
0
0
KB
,
ar
e
co
n
s
id
er
e
d
to
an
aly
ze
th
e
r
etr
iev
al
tim
e
o
f
H
MA
C
-
SHA
-
2
5
6
.
T
h
e
d
if
f
er
e
n
t
s
h
ar
ed
d
ata
s
izes
,
s
u
ch
as
1
0
MB
-
6
0
MB
,
ar
e
co
n
s
id
er
ed
to
an
aly
ze
th
e
th
r
o
u
g
h
p
u
t
o
f
HM
AC
-
SHA
-
2
5
6
.
T
h
e
d
if
f
er
en
t
s
h
ar
ed
d
ata
s
izes
,
s
u
ch
as
1
MB,
an
d
1
0
MB
-
4
0
MB
,
ar
e
co
n
s
id
er
ed
to
an
aly
ze
th
e
en
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
tim
e
o
f
HM
AC
-
SH
A
-
256.
I
n
Fig
u
r
e
4
,
th
e
HM
AC
-
SH
A
-
2
5
6
p
e
r
f
o
r
m
an
ce
is
esti
m
ated
b
y
r
etr
iev
al
tim
e
with
f
il
e
s
izes
o
f
5
0
KB
,
1
0
0
KB
,
1
5
0
KB
,
2
0
0
K
B
,
2
5
0
KB
,
an
d
3
0
0
KB
.
T
h
e
I
PF
S,
E
llip
tic
C
u
r
v
e
Dig
ital
S
ig
n
atu
r
e
Alg
o
r
ith
m
(
E
C
DSA)
,
HM
AC
,
an
d
SHA
-
2
5
6
a
r
e
tak
en
as
s
tate
-
of
-
a
r
t
m
eth
o
d
s
,
a
n
d
th
eir
p
er
f
o
r
m
a
n
ce
is
co
m
p
ar
ed
with
HM
AC
-
SH
A
-
2
5
6
.
T
h
e
HM
A
C
-
SHA
-
2
5
6
ac
h
iev
es
b
est
r
etr
iev
al
tim
e
o
f
0
.
4
s
,
1
.
0
s
,
1
.
5
s
,
1
.
9
s
,
2
.
2
s
,
a
n
d
2
.
8
s
f
o
r
t
h
e
f
ile
s
ize
o
f
5
0
KB
,
1
0
0
KB
,
1
5
0
KB
,
2
0
0
KB
,
2
5
0
KB
,
an
d
3
0
0
KB
,
r
esp
ec
tiv
ely
.
I
n
Fig
u
r
e
5
,
th
e
HM
AC
-
SH
A
-
2
5
6
p
er
f
o
r
m
an
c
e
is
esti
m
ated
b
y
th
r
o
u
g
h
p
u
t
with
a
s
h
ar
e
d
d
ata
s
ize
o
f
1
0
MB
-
6
0
MB.
T
h
e
I
PF
S,
E
C
DSA,
HM
A
C
,
an
d
SHA
-
2
5
6
is
tak
en
as
s
tate
-
of
-
th
e
-
ar
t
m
et
h
o
d
s
,
an
d
th
e
ir
p
er
f
o
r
m
a
n
ce
is
co
m
p
ar
ed
with
HM
AC
-
SHA
-
2
5
6
.
T
h
e
HM
AC
-
SHA
-
2
5
6
ac
h
iev
es
th
e
b
est
th
r
o
u
g
h
p
u
t
o
f
1
8
6
,
1
8
5
,
1
9
2
,
1
8
7
,
196
,
a
n
d
1
8
9
f
o
r
th
e
s
h
ar
ed
d
a
ta
s
ize
o
f
1
0
MB
-
6
0
MB
,
r
esp
e
ctiv
ely
.
I
n
Fig
u
r
e
s
6
an
d
7
,
th
e
p
er
f
o
r
m
an
ce
o
f
HM
AC
-
SHA
-
2
5
6
is
esti
m
ated
b
ased
o
n
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
tim
e
f
o
r
s
h
ar
ed
d
at
a
s
izes
o
f
1
MB,
1
0
MB
-
4
0
MB.
T
h
e
I
PF
S,
E
C
DSA,
HM
AC
,
SHA
-
2
5
6
is
ta
k
en
as
s
tate
-
of
-
ar
t
m
eth
o
d
s
an
d
th
eir
p
er
f
o
r
m
an
ce
is
co
m
p
ar
ed
with
HM
AC
-
SH
A
-
2
5
6
.
T
h
e
cr
y
p
to
g
r
ap
h
ic
HM
AC
-
SH
A
-
256
b
it
ac
h
iev
es
th
e
b
est
e
n
cr
y
p
tio
n
tim
e
o
f
6
m
s
,
7
2
m
s
,
1
2
2
m
s
,
1
7
3
m
s
an
d
2
4
5
m
s
f
o
r
th
e
s
h
ar
ed
d
at
a
s
ize
o
f
1
MB,
an
d
1
0
MB
-
4
0
MB
co
r
r
esp
o
n
d
in
g
ly
.
Similar
ly
,
th
e
h
ash
c
o
d
e
p
r
o
d
u
ce
d
b
y
t
h
e
h
ash
f
u
n
ctio
n
o
f
th
e
SHA
-
256
b
it
a
ch
iev
es
th
e
lea
d
in
g
d
ec
r
y
p
tio
n
tim
e
s
o
f
3
m
s
,
3
6
m
s
,
4
7
m
s
,
8
8
m
s
an
d
1
2
3
m
s
f
o
r
th
e
s
h
ar
ed
d
ata
s
ize
o
f
1
MB,
a
n
d
1
0
MB
-
4
0
MB c
o
r
r
esp
o
n
d
in
g
ly
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
Ha
s
h
-
b
a
s
ed
mess
a
g
e
a
u
t
h
en
ti
ca
tio
n
co
d
e
w
ith
s
ec
u
r
e
h
a
s
h
a
lg
o
r
ith
m
-
256
…
(
N
a
ve
en
ku
m
a
r
Lin
g
a
r
a
ju
)
785
Fig
u
r
e
4
.
R
etr
iev
al
tim
e
o
f
H
MA
C
-
SHA
-
256
Fig
u
r
e
5
.
T
h
r
o
u
g
h
p
u
t o
f
HM
AC
-
SHA
-
256
Fig
u
r
e
6
.
E
n
cr
y
p
tio
n
tim
e
o
f
HM
AC
-
SH
A
-
256
Fig
u
r
e
7
.
Dec
r
y
p
tio
n
tim
e
o
f
HM
AC
-
SH
A
-
256
3
.
1
.
Co
m
pa
r
is
o
n
s
t
ud
y
T
h
e
co
m
p
ar
is
o
n
s
tu
d
y
o
f
E
n
cr
y
p
tio
n
-
b
ased
HM
AC
-
SHA
-
256
-
b
it
with
ex
is
tin
g
te
ch
n
iq
u
es
is
d
is
cu
s
s
ed
in
th
is
s
u
b
s
ec
tio
n
i
n
ter
m
s
o
f
r
etr
iev
al
tim
e
,
to
g
eth
er
with
en
cr
y
p
tio
n
an
d
d
e
cr
y
p
tio
n
s
p
ee
d
,
an
d
s
y
s
tem
th
r
o
u
g
h
p
u
t.
.
T
h
e
ex
is
tin
g
m
eth
o
d
s
,
lik
e
I
PF
S
[
2
1
]
an
d
I
PF
S
-
E
C
C
f
ile
s
y
s
tem
[
22
]
,
ar
e
tak
en
a
n
d
d
if
f
er
en
tiated
with
HM
AC
-
SHA
-
2
5
6
.
Fr
o
m
Fig
u
r
e
8
,
th
e
e
n
c
r
y
p
tio
n
-
b
ased
HM
AC
-
SHA
-
256
-
b
it
ac
h
ie
v
es th
e
b
est
r
etr
iev
al
tim
e
s
o
f
0
.
4
s
,
1
.
0
s
,
1
.
5
s
,
1
.
9
s
,
2
.
2
s
,
a
n
d
2
.
8
s
f
o
r
th
e
f
ile
s
izes
o
f
5
0
KB
,
1
0
0
KB
,
1
5
0
KB
,
2
0
0
KB
,
2
5
0
KB
,
an
d
3
0
0
KB
,
co
r
r
esp
o
n
d
in
g
ly
.
Fro
m
Fig
u
r
e
9
,
th
e
HM
AC
-
SH
A
-
2
5
6
ac
h
iev
es
th
e
b
est
th
r
o
u
g
h
p
u
t
o
f
1
8
6
,
1
8
5
,
1
9
2
,
1
8
7
,
1
9
6
,
an
d
1
8
9
f
o
r
th
e
s
h
ar
e
d
d
ata
s
ize
o
f
1
0
MB
-
6
0
MB
,
r
esp
ec
tiv
ely
.
F
r
o
m
Fig
u
r
e
10
,
th
e
HM
AC
-
SH
A
-
256
-
b
it
a
ch
iev
e
s
th
e
m
o
s
t
ef
f
icien
t
d
ec
r
y
p
tio
n
tim
e
o
f
3
m
s
,
3
6
m
s
,
4
7
m
s
,
8
8
m
s
,
an
d
1
2
3
m
s
f
o
r
th
e
s
h
ar
ed
d
ata
s
ize
o
f
1
MB,
1
0
MB
-
4
0
MB
co
r
r
esp
o
n
d
in
g
ly
.
Fro
m
Fig
u
r
e
1
1
,
th
e
en
c
r
y
p
t
io
n
-
b
ased
HM
AC
-
SHA
-
256
-
b
it
ac
h
iev
es
th
e
m
o
s
t
ef
f
icien
t
d
ec
r
y
p
tio
n
tim
e
o
f
3
m
s
,
3
6
m
s
,
4
7
m
s
,
8
8
m
s
,
an
d
1
2
3
m
s
f
o
r
t
h
e
s
h
ar
ed
d
ata
s
ize
o
f
1
MB,
1
0
M
B
-
4
0
MB c
o
r
r
esp
o
n
d
in
g
ly
.
Fig
u
r
e
8
.
C
o
m
p
a
r
is
o
n
in
ter
m
s
o
f
r
etr
iev
al
tim
e
Fig
u
r
e
9
.
C
o
m
p
a
r
is
o
n
in
ter
m
s
o
f
t
h
r
o
u
g
h
p
u
t
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
40
,
No
.
2
,
No
v
em
b
er
20
25
:
7
8
0
-
78
8
786
Fig
u
r
e
1
0
.
C
o
m
p
ar
is
o
n
o
f
en
c
r
y
p
tio
n
tim
e
Fig
u
r
e
1
1
.
C
o
m
p
ar
is
o
n
o
f
d
ec
r
y
p
tio
n
tim
e
3
.
2
.
Dis
cus
s
io
n
T
h
e
ex
is
tin
g
tech
n
iq
u
es
s
u
c
h
as
I
PF
S
[
2
1
]
s
u
f
f
er
e
d
f
r
o
m
s
ca
lab
ilit
y
an
d
in
d
eter
m
in
ate
k
e
y
m
an
ag
em
en
t
f
o
r
ac
ce
s
s
co
n
tr
o
l
p
o
licies
d
u
e
to
th
e
u
tili
za
tio
n
o
f
s
ea
r
ch
a
b
le
e
n
cr
y
p
tio
n
al
g
o
r
ith
m
s
.
T
h
e
I
PF
S
-
E
C
C
[
2
2
]
s
u
f
f
er
ed
f
r
o
m
s
ca
la
b
ilit
y
an
d
in
d
eter
m
in
ate
k
ey
m
an
ag
em
en
t
f
o
r
ac
ce
s
s
co
n
tr
o
l
p
o
licies
d
u
e
to
th
e
u
tili
za
tio
n
o
f
s
ea
r
c
h
ab
le
e
n
cr
y
p
tio
n
al
g
o
r
ith
m
s
.
T
o
o
v
er
c
o
m
e
th
ese
p
r
o
b
lem
s
,
th
e
en
cr
y
p
tio
n
-
b
ased
HM
AC
-
SHA
-
2
5
6
b
it
is
p
r
o
p
o
s
ed
f
o
r
e
n
cy
p
ted
an
d
ef
f
ec
tiv
e
in
f
o
r
m
atio
n
d
is
tr
ib
u
tio
n
in
b
l
o
ck
ch
a
in
.
T
h
e
en
c
r
y
p
tio
n
-
b
ased
HM
AC
is
a
s
ec
u
r
e
cr
y
p
to
g
r
ap
h
ic
v
alid
atio
n
s
y
s
tem
in
th
at
a
cr
y
p
to
g
r
ap
h
ic
s
ec
u
r
e
h
ash
f
u
n
ctio
n
is
em
p
lo
y
ed
with
a
s
y
m
m
etr
ic
k
ey
to
estab
lis
h
b
o
th
th
e
s
o
u
r
ce
v
alid
atio
n
an
d
d
ata
r
eliab
ilit
y
o
f
th
e
m
ess
ag
e.
I
n
b
lo
ck
ch
ain
,
th
e
HM
AC
is
im
p
lem
en
ted
with
f
ix
e
d
len
g
t
h
SHA
-
2
5
6
b
it
to
g
en
e
r
ate
a
n
d
a
u
th
en
ticate
th
e
s
ig
n
atu
r
es
o
f
s
ev
er
al
tr
a
n
s
ac
tio
n
s
.
SHA
-
2
5
6
is
a
h
ash
alg
o
r
ith
m
th
at
cr
ea
tes
a
f
ix
ed
-
len
g
th
-
2
5
6
-
b
it
cr
y
p
to
g
r
ap
h
ic
h
ash
.
T
h
e
b
lo
c
k
ch
ain
u
tili
ze
s
en
cr
y
p
tio
n
b
ased
HM
AC
is
u
s
in
g
SHA
-
2
5
6
b
it,
it
is
a
en
cr
y
p
ted
an
d
co
n
cise a
p
p
r
o
ac
h
to
d
is
tr
ib
u
te
o
r
c
o
m
m
u
n
icate
d
ata.
T
h
e
r
esu
lt
o
f
th
is
r
esear
ch
s
h
o
ws
th
at
th
e
HM
AC
-
SHA
-
2
5
6
im
p
r
o
v
es
s
ec
u
r
ity
f
o
r
d
ata
s
h
ar
in
g
in
b
lo
ck
ch
ain
t
h
r
o
u
g
h
m
in
i
m
izin
g
r
etr
iev
al
tim
e,
en
h
an
cin
g
th
r
o
u
g
h
p
u
t
an
d
o
p
tim
izin
g
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
.
T
h
e
f
in
d
i
n
g
s
d
en
o
te
th
at
th
e
in
co
r
p
o
r
atio
n
o
f
HM
AC
with
S
HA
-
2
5
6
p
r
o
v
id
es
b
etter
cr
y
p
to
g
r
ap
h
ic
ap
p
r
o
ac
h
wh
ic
h
m
ea
s
u
r
es
d
ata
au
t
h
en
ticatio
n
a
n
d
i
n
teg
r
ity
th
er
eb
y
m
a
k
in
g
it
b
etter
f
o
r
d
ec
en
tr
alize
d
d
ata
s
h
ar
in
g
s
y
s
tem
.
T
h
e
o
b
tain
ed
r
etr
iev
al
tim
e
an
d
t
h
r
o
u
g
h
p
u
t
en
h
an
ce
s
th
e
m
eth
o
d
ef
f
ec
tiv
en
ess
s
p
ec
if
ically
in
lar
g
e
-
s
ca
le
d
ata
tr
an
s
m
is
s
io
n
.
4.
CO
NCLU
SI
O
N
I
n
th
is
m
an
u
s
cr
ip
t,
th
e
en
cr
y
p
tio
n
-
b
ased
HM
AC
-
SHA
-
256
b
it
is
p
r
o
p
o
s
ed
f
o
r
en
cr
y
p
ted
an
d
ef
f
ec
tiv
e
in
f
o
r
m
atio
n
ex
ch
a
n
g
in
g
in
b
lo
ck
c
h
ain
n
etwo
r
k
.
T
h
e
en
cr
y
p
tio
n
-
b
ased
HM
AC
i
s
a
cr
y
p
to
g
r
ap
h
ic
ac
ce
s
s
v
alid
atio
n
s
y
s
tem
in
th
at
cr
y
p
to
g
r
ap
h
ic
h
ash
in
g
f
u
n
c
tio
n
is
u
tili
ze
d
s
im
u
ltan
eo
u
s
ly
with
a
p
r
iv
ate
k
e
y
to
s
p
ec
if
y
b
o
th
th
e
au
th
e
n
tic
ity
an
d
in
teg
r
ity
o
f
th
e
d
ata
b
lo
ck
.
HM
AC
is
co
n
t
ai
ns
o
f
a
m
ess
ag
e
an
d
a
en
cr
y
p
ted
k
ey
with
a
h
ash
co
d
e
.
I
n
B
lo
ck
ch
ain
n
etwo
r
k
,
t
h
e
en
cr
y
p
tio
n
-
b
ased
HM
AC
is
u
tili
ze
d
with
f
ix
ed
-
len
g
th
-
SHA
-
256
b
it
to
g
en
er
at
e
an
d
v
er
i
fy
s
ig
n
atu
r
es
o
f
s
ev
er
al
tr
an
s
ac
tio
n
s
.
SHA
-
256
b
it
is
a
h
ash
alg
o
r
ith
m
t
h
at
cr
ea
tes
a
f
ix
ed
-
len
g
th
-
2
5
6
-
b
it
h
ash
co
d
e
.
T
h
e
b
lo
c
k
ch
ain
u
s
es
en
c
r
y
p
tio
n
-
b
ased
H
MA
C
u
s
in
g
SHA
-
256
b
it
,
i
t
is
a
s
ec
u
r
e
an
d
co
n
cise
ap
p
r
o
ac
h
s
to
d
is
tr
ib
u
te
o
r
co
m
m
u
n
icate
d
ata.
I
n
th
is
wo
r
k
,
th
e
f
ile
s
ize
o
f
r
etr
iev
al
tim
e
is
co
n
s
id
er
ed
as
5
0
KB
,
1
0
0
KB
,
1
5
0
KB
,
2
0
0
KB
,
2
5
0
KB
an
d
3
0
0
KB
.
T
h
e
s
h
ar
ed
d
ata
s
ize
o
f
th
r
o
u
g
h
p
u
t
is
1
0
-
6
0
,
e
n
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
tim
e
is
1
MB,
1
0
MB
-
4
0
MB.
T
h
e
HM
AC
-
SH
A
-
256
b
it
ac
h
iev
es
m
o
s
t
ef
f
ec
tiv
e
m
ess
ag
e
e
n
c
r
y
p
tio
n
tim
e
o
f
7
2
m
s
an
d
d
ec
r
y
p
tio
n
tim
e
o
f
3
6
m
s
f
o
r
t
h
e
s
h
ar
e
d
d
ata
s
ize
o
f
1
0
MB.
T
h
e
ex
is
tin
g
ap
p
r
o
ac
h
es
s
u
f
f
er
f
r
o
m
in
d
eter
m
in
ate
k
ey
m
an
ag
em
e
n
t
an
d
s
ca
lab
ilit
y
,
HM
A
C
-
SHA
-
2
5
6
p
r
o
v
id
es
ef
f
ec
tiv
e
a
n
d
s
ec
u
r
e
d
ata
s
h
ar
in
g
th
r
o
u
g
h
in
co
r
p
o
r
atin
g
c
r
y
p
to
g
r
ap
h
ic
h
ash
f
u
n
ctio
n
s
with
s
ec
r
et
k
ey
.
T
h
e
k
ey
f
in
d
in
g
s
s
h
o
w
th
at
th
e
m
o
d
el
r
ed
u
ce
s
th
e
r
etr
iev
al
tim
e,
im
p
r
o
v
es
th
r
o
u
g
h
p
u
t,
e
n
cr
y
p
ti
o
n
an
d
d
ec
r
y
p
tio
n
tim
e.
T
h
e
r
esear
ch
s
ets
n
ew
p
o
s
s
ib
ilit
ies
f
o
r
f
u
tu
r
e
ad
v
an
ce
m
en
ts
t
h
at
i
n
v
o
lv
e
d
ev
elo
p
in
g
s
tr
o
n
g
er
c
r
y
p
t
o
g
r
ap
h
ic
ap
p
r
o
ac
h
es
alo
n
g
s
id
e
ef
f
icien
cy
m
o
d
if
icatio
n
s
an
d
m
u
ltip
le
b
lo
ck
ch
ain
s
y
s
tem
a
n
d
d
ec
en
tr
alize
d
clo
u
d
s
to
r
ag
e
a
p
p
licatio
n
.
Fu
tu
r
e
r
esear
ch
ai
m
s
to
im
p
r
o
v
e
s
ec
u
r
ity
m
ea
s
u
r
es
o
f
th
e
s
y
s
tem
wh
ile
ad
ap
tin
g
th
e
m
eth
o
d
to
n
ew
b
lo
ck
c
h
ain
d
e
v
elo
p
m
e
n
ts
f
o
r
s
u
s
tain
ab
ilit
y
an
d
r
eliab
le
p
er
f
o
r
m
an
ce
.
F
UNDING
I
NF
O
R
M
A
T
I
O
N
Au
th
o
r
s
s
tate
n
o
f
u
n
d
in
g
in
v
o
lv
ed
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
Ha
s
h
-
b
a
s
ed
mess
a
g
e
a
u
t
h
en
ti
ca
tio
n
co
d
e
w
ith
s
ec
u
r
e
h
a
s
h
a
lg
o
r
ith
m
-
256
…
(
N
a
ve
en
ku
m
a
r
Lin
g
a
r
a
ju
)
787
AUTHO
R
CO
NT
RI
B
UT
I
O
NS ST
A
T
E
M
E
N
T
T
h
is
jo
u
r
n
al
u
s
es
th
e
C
o
n
tr
ib
u
to
r
R
o
les
T
ax
o
n
o
m
y
(
C
R
ed
iT)
to
r
ec
o
g
n
ize
in
d
iv
id
u
al
au
th
o
r
co
n
tr
ib
u
tio
n
s
,
r
ed
u
ce
au
th
o
r
s
h
ip
d
is
p
u
tes,
an
d
f
ac
ilit
ate
co
llab
o
r
atio
n
.
Na
m
e
o
f
Aut
ho
r
C
M
So
Va
Fo
I
R
D
O
E
Vi
Su
P
Fu
Nav
ee
n
k
u
m
a
r
L
in
g
ar
aju
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
Ma
n
ju
la
Hala
d
ap
p
a
Su
n
k
ad
ak
atte
✓
✓
✓
✓
✓
✓
✓
C
:
C
o
n
c
e
p
t
u
a
l
i
z
a
t
i
o
n
M
:
M
e
t
h
o
d
o
l
o
g
y
So
:
So
f
t
w
a
r
e
Va
:
Va
l
i
d
a
t
i
o
n
Fo
:
Fo
r
mal
a
n
a
l
y
s
i
s
I
:
I
n
v
e
s
t
i
g
a
t
i
o
n
R
:
R
e
so
u
r
c
e
s
D
:
D
a
t
a
C
u
r
a
t
i
o
n
O
:
W
r
i
t
i
n
g
-
O
r
i
g
i
n
a
l
D
r
a
f
t
E
:
W
r
i
t
i
n
g
-
R
e
v
i
e
w
&
E
d
i
t
i
n
g
Vi
:
Vi
su
a
l
i
z
a
t
i
o
n
Su
:
Su
p
e
r
v
i
s
i
o
n
P
:
P
r
o
j
e
c
t
a
d
mi
n
i
st
r
a
t
i
o
n
Fu
:
Fu
n
d
i
n
g
a
c
q
u
i
si
t
i
o
n
CO
NF
L
I
C
T
O
F
I
N
T
E
R
E
S
T
ST
A
T
E
M
E
NT
T
h
e
au
th
o
r
s
s
tate
n
o
co
n
f
lict o
f
in
ter
est.
DATA AV
AI
L
AB
I
L
I
T
Y
Data
av
ailab
ilit
y
d
o
es n
o
t a
p
p
l
y
to
th
is
p
ap
e
r
as n
o
n
ew
d
ata
wer
e
cr
ea
ted
o
r
an
aly
ze
d
in
th
is
s
tu
d
y
.
RE
F
E
R
E
NC
E
S
[
1
]
S
.
U
p
p
a
l
,
B
.
K
a
n
se
k
a
r
,
S
.
M
i
n
i
,
a
n
d
D
.
T
o
s
h
,
“
H
e
a
l
t
h
D
o
t
e
:
a
b
l
o
c
k
c
h
a
i
n
-
b
a
se
d
mo
d
e
l
f
o
r
c
o
n
t
i
n
u
o
u
s
h
e
a
l
t
h
mo
n
i
t
o
r
i
n
g
u
si
n
g
i
n
t
e
r
p
l
a
n
e
t
a
r
y
f
i
l
e
sy
s
t
e
m
,
”
H
e
a
l
t
h
c
a
r
e
A
n
a
l
y
t
i
c
s
,
v
o
l
.
3
,
p
.
1
0
0
1
7
5
,
N
o
v
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
h
e
a
l
t
h
.
2
0
2
3
.
1
0
0
1
7
5
.
[
2
]
G
.
X
u
,
J.
Zh
a
n
g
,
U
.
G
.
O
.
C
l
i
f
f
,
a
n
d
C
.
M
a
,
“
A
n
e
f
f
i
c
i
e
n
t
b
l
o
c
k
c
h
a
i
n
-
b
a
se
d
p
r
i
v
a
c
y
-
p
r
e
s
e
r
v
i
n
g
s
c
h
e
me
w
i
t
h
a
t
t
r
i
b
u
t
e
a
n
d
h
o
m
o
m
o
r
p
h
i
c
e
n
c
r
y
p
t
i
o
n
,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
I
n
t
e
l
l
i
g
e
n
t
S
y
s
t
e
m
s
,
v
o
l
.
3
7
,
n
o
.
1
2
,
p
p
.
1
0
7
1
5
–
107
5
0
,
D
e
c
.
2
0
2
2
,
d
o
i
:
1
0
.
1
0
0
2
/
i
n
t
.
2
2
9
4
6
.
[
3
]
D
.
Z
h
a
n
g
,
S
.
W
a
n
g
,
Y
.
Zh
a
n
g
,
Q
.
Z
h
a
n
g
,
a
n
d
Y
.
Zh
a
n
g
,
“
A
se
c
u
r
e
a
n
d
p
r
i
v
a
c
y
-
p
r
e
s
e
r
v
i
n
g
me
d
i
c
a
l
d
a
t
a
s
h
a
r
i
n
g
v
i
a
c
o
n
so
r
t
i
u
m
b
l
o
c
k
c
h
a
i
n
,
”
S
e
c
u
ri
t
y
a
n
d
C
o
m
m
u
n
i
c
a
t
i
o
n
N
e
t
w
o
rks
,
v
o
l
.
2
0
2
2
,
p
p
.
1
–
1
5
,
M
a
y
2
0
2
2
,
d
o
i
:
1
0
.
1
1
5
5
/
2
0
2
2
/
2
7
5
9
7
8
7
.
[
4
]
Q
.
Z
h
a
n
g
a
n
d
Z.
Z
h
a
o
,
“
D
i
s
t
r
i
b
u
t
e
d
st
o
r
a
g
e
sc
h
e
m
e
f
o
r
e
n
c
r
y
p
t
i
o
n
sp
e
e
c
h
d
a
t
a
b
a
s
e
d
o
n
b
l
o
c
k
c
h
a
i
n
a
n
d
I
P
F
S
,
”
J
o
u
rn
a
l
o
f
S
u
p
e
rc
o
m
p
u
t
i
n
g
,
v
o
l
.
7
9
,
n
o
.
1
,
p
p
.
8
9
7
–
9
2
3
,
Ja
n
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
0
7
/
s
1
1
2
2
7
-
0
2
2
-
0
4
7
0
2
-
1.
[
5
]
A
.
G
.
A
l
z
a
h
r
a
n
i
,
A
.
A
l
h
o
m
o
u
d
,
a
n
d
G
.
W
i
l
l
s,
“
A
f
r
a
mew
o
r
k
o
f
t
h
e
c
r
i
t
i
c
a
l
f
a
c
t
o
r
s
f
o
r
h
e
a
l
t
h
c
a
r
e
p
r
o
v
i
d
e
r
s
t
o
s
h
a
r
e
d
a
t
a
se
c
u
r
e
l
y
u
si
n
g
b
l
o
c
k
c
h
a
i
n
,
”
I
E
EE
Ac
c
e
ss
,
v
o
l
.
1
0
,
p
p
.
4
1
0
6
4
–
4
1
0
7
7
,
2
0
2
2
,
d
o
i
:
1
0
.
1
1
0
9
/
A
C
C
ESS
.
2
0
2
2
.
3
1
6
2
2
1
8.
[
6
]
I
.
K
h
a
n
a
n
d
M
.
H
a
l
a
d
a
p
p
a
,
“
R
i
s
k
-
A
w
a
r
e
M
u
l
t
i
-
A
g
e
n
t
A
d
v
a
n
t
a
g
e
A
c
t
o
r
-
C
r
i
t
i
c
B
a
se
d
R
e
s
o
u
r
c
e
A
l
l
o
c
a
t
i
o
n
f
o
r
C
-
V
2
X
C
o
mm
u
n
i
c
a
t
i
o
n
i
n
C
e
l
l
u
l
a
r
N
e
t
w
o
r
k
s
,
”
Pr
o
c
e
e
d
i
n
g
s
o
f
E
n
g
i
n
e
e
ri
n
g
a
n
d
T
e
c
h
n
o
l
o
g
y
I
n
n
o
v
a
t
i
o
n
(
PETI
)
,
v
o
l
.
2
9
,
p
p
.
4
7
–
6
0
,
F
e
b
.
2
0
2
5
,
d
o
i
:
1
0
.
4
6
6
0
4
/
p
e
t
i
.
2
0
2
4
.
1
4
1
3
6
.
[
7
]
L.
H
o
n
g
,
K
.
Zh
a
n
g
,
J
.
G
o
n
g
,
a
n
d
H
.
Q
i
a
n
,
“
A
p
r
a
c
t
i
c
a
l
a
n
d
e
f
f
i
c
i
e
n
t
b
l
o
c
k
c
h
a
i
n
-
a
ssi
st
e
d
a
t
t
r
i
b
u
t
e
-
b
a
se
d
e
n
c
r
y
p
t
i
o
n
sc
h
e
m
e
f
o
r
a
c
c
e
ss
c
o
n
t
r
o
l
a
n
d
d
a
t
a
s
h
a
r
i
n
g
,
”
S
e
c
u
ri
t
y
a
n
d
C
o
m
m
u
n
i
c
a
t
i
o
n
N
e
t
w
o
rks
,
v
o
l
.
2
0
2
2
,
p
p
.
1
–
1
4
,
S
e
p
.
2
0
2
2
,
d
o
i
:
1
0
.
1
1
5
5
/
2
0
2
2
/
4
9
7
8
8
0
2
.
[
8
]
D
.
B
r
a
b
i
n
,
C
.
A
n
a
n
t
h
,
a
n
d
S
.
B
o
j
j
a
g
a
n
i
,
“
B
l
o
c
k
c
h
a
i
n
b
a
se
d
sec
u
r
i
t
y
f
r
a
m
e
w
o
r
k
f
o
r
sh
a
r
i
n
g
d
i
g
i
t
a
l
i
ma
g
e
s
u
si
n
g
r
e
v
e
r
si
b
l
e
d
a
t
a
h
i
d
i
n
g
a
n
d
e
n
c
r
y
p
t
i
o
n
,
”
Mu
l
t
i
m
e
d
i
a
T
o
o
l
s
a
n
d
A
p
p
l
i
c
a
t
i
o
n
s
,
v
o
l
.
8
1
,
n
o
.
1
7
,
p
p
.
2
4
7
2
1
–
2
4
7
3
8
,
J
u
l
.
2
0
2
2
,
d
o
i
:
1
0
.
1
0
0
7
/
s
1
1
0
4
2
-
022
-
1
2
6
1
7
-
5.
[
9
]
S
.
J.
H
si
a
o
a
n
d
W
.
T.
S
u
n
g
,
“
B
l
o
c
k
c
h
a
i
n
-
B
a
s
e
d
S
u
p
p
l
y
C
h
a
i
n
I
n
f
o
r
mat
i
o
n
S
h
a
r
i
n
g
M
e
c
h
a
n
i
sm
,
”
I
EEE
Ac
c
e
ss
,
v
o
l
.
1
0
,
p
p
.
7
8
8
7
5
–
7
8
8
8
6
,
2
0
2
2
,
d
o
i
:
1
0
.
1
1
0
9
/
A
C
C
ESS
.
2
0
2
2
.
3
1
9
4
1
5
7
.
[
1
0
]
M
.
B
i
n
S
a
i
f
,
S
.
M
i
g
l
i
o
r
i
n
i
,
a
n
d
F
.
S
p
o
t
o
,
“
Ef
f
i
c
i
e
n
t
a
n
d
sec
u
r
e
d
i
st
r
i
b
u
t
e
d
d
a
t
a
s
t
o
r
a
g
e
a
n
d
r
e
t
r
i
e
v
a
l
u
si
n
g
i
n
t
e
r
p
l
a
n
e
t
a
r
y
f
i
l
e
sy
st
e
m
a
n
d
b
l
o
c
k
c
h
a
i
n
,
”
F
u
t
u
re
I
n
t
e
r
n
e
t
,
v
o
l
.
1
6
,
n
o
.
3
,
p
.
9
8
,
M
a
r
.
2
0
2
4
,
d
o
i
:
1
0
.
3
3
9
0
/
f
i
1
6
0
3
0
0
9
8
.
[
1
1
]
C
.
L
a
i
,
Z.
M
a
,
R
.
G
u
o
,
a
n
d
D
.
Z
h
e
n
g
,
“
S
e
c
u
r
e
m
e
d
i
c
a
l
d
a
t
a
s
h
a
r
i
n
g
sc
h
e
me
b
a
se
d
o
n
t
r
a
c
e
a
b
l
e
r
i
n
g
s
i
g
n
a
t
u
r
e
a
n
d
b
l
o
c
k
c
h
a
i
n
,
”
Pe
e
r
-
to
-
P
e
e
r
N
e
t
w
o
rk
i
n
g
a
n
d
A
p
p
l
i
c
a
t
i
o
n
s
,
v
o
l
.
1
5
,
n
o
.
3
,
p
p
.
1
5
6
2
–
1
5
7
6
,
M
a
y
2
0
2
2
,
d
o
i
:
1
0
.
1
0
0
7
/
s
1
2
0
8
3
-
0
2
2
-
0
1
3
0
3
-
w.
[
1
2
]
G
.
L
i
n
,
H
.
W
a
n
g
,
J
.
W
a
n
,
L.
Z
h
a
n
g
,
a
n
d
J
.
H
u
a
n
g
,
“
A
b
l
o
c
k
c
h
a
i
n
-
b
a
s
e
d
f
i
n
e
-
g
r
a
i
n
e
d
d
a
t
a
sh
a
r
i
n
g
s
c
h
e
me
f
o
r
e
-
h
e
a
l
t
h
c
a
r
e
sy
st
e
m,
”
J
o
u
rn
a
l
o
f
S
y
s
t
e
m
s
Arc
h
i
t
e
c
t
u
re
,
v
o
l
.
1
3
2
,
p
.
1
0
2
7
3
1
,
N
o
v
.
2
0
2
2
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
sy
s
a
r
c
.
2
0
2
2
.
1
0
2
7
3
1
.
[
1
3
]
A
.
Li
u
e
t
a
l
.
,
"
D
y
n
a
S
h
a
r
d
:
S
e
c
u
r
e
a
n
d
A
d
a
p
t
i
v
e
B
l
o
c
k
c
h
a
i
n
S
h
a
r
d
i
n
g
P
r
o
t
o
c
o
l
W
i
t
h
H
y
b
r
i
d
C
o
n
se
n
s
u
s
a
n
d
D
y
n
a
mi
c
S
h
a
r
d
M
a
n
a
g
e
m
e
n
t
,
"
i
n
I
EEE
I
n
t
e
r
n
e
t
o
f
T
h
i
n
g
s
J
o
u
r
n
a
l
,
v
o
l
.
1
2
,
n
o
.
5
,
p
p
.
5
4
6
2
-
5
4
7
5
,
1
M
a
r
c
h
1
,
2
0
2
5
,
d
o
i
:
1
0
.
1
1
0
9
/
JI
O
T.
2
0
2
4
.
3
4
9
0
0
3
6
.
[
1
4
]
S
.
S
a
t
h
i
y
a
D
e
v
i
a
n
d
A
.
B
h
u
v
a
n
e
sw
a
r
i
,
“
D
e
s
i
g
n
o
f
e
f
f
i
c
i
e
n
t
st
o
r
a
g
e
a
n
d
r
e
t
r
i
e
v
a
l
o
f
me
d
i
c
a
l
r
e
c
o
r
d
s
i
n
b
l
o
c
k
c
h
a
i
n
b
a
s
e
d
o
n
I
n
t
e
r
P
l
a
n
e
t
a
r
y
F
i
l
e
S
y
st
e
m
a
n
d
mo
d
i
f
i
e
d
b
l
o
o
m
t
r
e
e
,
”
S
e
c
u
ri
t
y
a
n
d
Pr
i
v
a
c
y
,
v
o
l
.
6
,
n
o
.
5
,
S
e
p
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
0
2
/
sp
y
2
.
3
0
1
.
[
1
5
]
S
.
A
.
H
.
M
o
h
s
a
n
,
A
.
R
a
z
z
a
q
,
S
.
A
.
K
.
G
h
a
y
y
u
r
,
H
.
K
.
A
l
k
a
h
t
a
n
i
,
N
.
A
l
-
K
a
h
t
a
n
i
,
a
n
d
S
.
M
.
M
o
st
a
f
a
,
“
D
e
c
e
n
t
r
a
l
i
z
e
d
p
a
t
i
e
n
t
-
c
e
n
t
r
i
c
r
e
p
o
r
t
a
n
d
m
e
d
i
c
a
l
i
ma
g
e
m
a
n
a
g
e
me
n
t
s
y
st
e
m
b
a
s
e
d
o
n
b
l
o
c
k
c
h
a
i
n
t
e
c
h
n
o
l
o
g
y
a
n
d
t
h
e
i
n
t
e
r
-
p
l
a
n
e
t
a
r
y
f
i
l
e
s
y
st
e
m,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
f
E
n
v
i
ro
n
m
e
n
t
a
l
R
e
se
a
rc
h
a
n
d
Pu
b
l
i
c
H
e
a
l
t
h
,
v
o
l
.
1
9
,
n
o
.
2
2
,
p
.
1
4
6
4
1
,
N
o
v
.
2
0
2
2
,
d
o
i
:
1
0
.
3
3
9
0
/
i
j
e
r
p
h
1
9
2
2
1
4
6
4
1
.
[
1
6
]
B
.
Li
a
n
d
M
.
M
a
,
“
A
n
a
d
v
a
n
c
e
d
h
i
e
r
a
r
c
h
i
c
a
l
i
d
e
n
t
i
t
y
-
b
a
s
e
d
s
e
c
u
r
i
t
y
m
e
c
h
a
n
i
sm
b
y
b
l
o
c
k
c
h
a
i
n
i
n
n
a
m
e
d
d
a
t
a
n
e
t
w
o
r
k
i
n
g
,
”
J
o
u
rn
a
l
o
f
N
e
t
w
o
rk
a
n
d
S
y
s
t
e
m
s
Ma
n
a
g
e
m
e
n
t
,
v
o
l
.
3
1
,
n
o
.
1
,
p
.
1
3
,
Ja
n
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
0
7
/
s
1
0
9
2
2
-
022
-
0
9
6
8
9
-
x.
[
1
7
]
K
.
S
h
u
a
i
b
,
J.
A
b
d
e
l
l
a
,
F
.
S
a
l
l
a
b
i
,
a
n
d
M
.
A
.
S
e
r
h
a
n
i
,
“
S
e
c
u
r
e
d
e
c
e
n
t
r
a
l
i
z
e
d
e
l
e
c
t
r
o
n
i
c
h
e
a
l
t
h
r
e
c
o
r
d
s
s
h
a
r
i
n
g
sy
st
e
m
b
a
s
e
d
o
n
b
l
o
c
k
c
h
a
i
n
s,”
J
o
u
r
n
a
l
o
f
K
i
n
g
S
a
u
d
U
n
i
v
e
rsi
t
y
-
C
o
m
p
u
t
e
r
a
n
d
I
n
f
o
rm
a
t
i
o
n
S
c
i
e
n
c
e
s
,
v
o
l
.
3
4
,
n
o
.
8
,
p
p
.
5
0
4
5
–
5
0
5
8
,
S
e
p
.
2
0
2
2
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
j
k
s
u
c
i
.
2
0
2
1
.
0
5
.
0
0
2
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
40
,
No
.
2
,
No
v
em
b
er
20
25
:
7
8
0
-
78
8
788
[
1
8
]
R
.
B
h
a
n
,
R
.
P
a
m
u
l
a
,
P
.
F
a
r
u
k
i
,
a
n
d
J.
G
a
j
r
a
n
i
,
“
B
l
o
c
k
c
h
a
i
n
-
e
n
a
b
l
e
d
se
c
u
r
e
a
n
d
e
f
f
i
c
i
e
n
t
d
a
t
a
s
h
a
r
i
n
g
sch
e
me
f
o
r
t
r
u
st
m
a
n
a
g
e
me
n
t
i
n
h
e
a
l
t
h
c
a
r
e
smar
t
p
h
o
n
e
n
e
t
w
o
r
k
,
”
J
o
u
r
n
a
l
o
f
S
u
p
e
r
c
o
m
p
u
t
i
n
g
,
v
o
l
.
7
9
,
n
o
.
1
4
,
p
p
.
1
6
2
3
3
–
1
6
2
7
4
,
S
e
p
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
0
7
/
s
1
1
2
2
7
-
023
-
0
5
2
7
2
-
6.
[
1
9
]
S
.
M
.
U
mr
a
n
,
S
.
L
u
,
Z
.
A
.
A
b
d
u
l
j
a
b
b
a
r
,
a
n
d
V
.
O
.
N
y
a
n
g
a
r
e
si
,
“
M
u
l
t
i
-
c
h
a
i
n
b
l
o
c
k
c
h
a
i
n
b
a
s
e
d
s
e
c
u
r
e
d
a
ta
-
s
h
a
r
i
n
g
f
r
a
m
e
w
o
r
k
f
o
r
i
n
d
u
st
r
i
a
l
I
o
Ts
sm
a
r
t
d
e
v
i
c
e
s
i
n
p
e
t
r
o
l
e
u
m
i
n
d
u
s
t
r
y
,
”
I
n
t
e
r
n
e
t
o
f
T
h
i
n
g
s
,
v
o
l
.
2
4
,
p
.
1
0
0
9
6
9
,
D
e
c
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
i
o
t
.
2
0
2
3
.
1
0
0
9
6
9
.
[
2
0
]
A
.
I
.
B
a
su
k
i
,
D
.
R
o
s
i
y
a
d
i
,
H
.
S
u
sa
n
t
o
,
I
.
S
e
t
i
a
w
a
n
,
a
n
d
T.
I
.
S
a
l
i
m,
“
P
r
i
v
a
c
y
-
p
r
e
s
e
r
v
i
n
g
r
e
s
e
r
v
a
t
i
o
n
m
o
d
e
l
f
o
r
p
u
b
l
i
c
f
a
c
i
l
i
t
i
e
s
b
a
s
e
d
o
n
p
u
b
l
i
c
B
l
o
c
k
c
h
a
i
n
,
”
I
n
t
e
rn
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
E
l
e
c
t
r
i
c
a
l
a
n
d
C
o
m
p
u
t
e
r
E
n
g
i
n
e
e
ri
n
g
(
I
J
E
C
E)
,
v
o
l
.
1
4
,
n
o
.
4
,
p
p
.
4
4
1
8
–
4
4
2
9
,
A
u
g
.
2
0
2
4
,
d
o
i
:
1
0
.
1
1
5
9
1
/
i
j
e
c
e
.
v
1
4
i
4
.
p
p
4
4
1
8
-
4
4
2
9
.
[
2
1
]
I
.
K
h
a
n
a
n
d
M
.
H
a
l
a
d
a
p
p
a
,
“
D
y
n
a
mi
c
R
e
s
o
u
r
c
e
R
e
ser
v
a
t
i
o
n
u
s
i
n
g
D
e
e
p
R
e
i
n
f
o
r
c
e
me
n
t
Le
a
r
n
i
n
g
:
O
p
t
i
mi
z
i
n
g
R
e
so
u
r
c
e
A
l
l
o
c
a
t
i
o
n
f
o
r
P
l
a
t
o
o
n
-
B
a
se
d
C
-
V
2
X
N
e
t
w
o
r
k
s,
”
E
n
g
i
n
e
e
r
i
n
g
L
e
t
t
e
rs
(
EL)
,
v
o
l
.
3
3
,
n
o
.
5
,
p
p
.
1
3
7
2
–
1
3
8
1
,
M
a
y
2
0
2
5
.
[
2
2
]
I
.
L.
H
.
A
l
sa
mm
a
k
,
M
.
F
.
A
l
o
m
a
r
i
,
I
.
S
h
a
k
i
r
N
a
si
r
,
a
n
d
W
.
H
.
I
t
w
e
e
,
“
A
mo
d
e
l
f
o
r
b
l
o
c
k
c
h
a
i
n
-
b
a
se
d
p
r
i
v
a
c
y
-
p
r
e
ser
v
i
n
g
f
o
r
b
i
g
d
a
t
a
u
sers o
n
t
h
e
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
,
”
I
n
d
o
n
e
s
i
a
n
J
o
u
r
n
a
l
o
f
E
l
e
c
t
ri
c
a
l
E
n
g
i
n
e
e
ri
n
g
a
n
d
C
o
m
p
u
t
e
r S
c
i
e
n
c
e
(
I
J
E
EC
S
)
,
v
o
l
.
2
6
,
n
o
.
2
,
p
.
9
7
4
,
M
a
y
2
0
2
2
,
d
o
i
:
1
0
.
1
1
5
9
1
/
i
j
e
e
c
s.v
2
6
.
i
2
.
p
p
9
7
4
-
9
8
8
.
[
2
3
]
J.
Ja
y
a
b
a
l
a
n
a
n
d
N
.
Je
y
a
n
t
h
i
,
“
S
c
a
l
a
b
l
e
b
l
o
c
k
c
h
a
i
n
m
o
d
e
l
u
si
n
g
o
f
f
-
c
h
a
i
n
I
P
F
S
st
o
r
a
g
e
f
o
r
h
e
a
l
t
h
c
a
r
e
d
a
t
a
sec
u
r
i
t
y
a
n
d
p
r
i
v
a
c
y
,
”
J
o
u
rn
a
l
o
f
Pa
r
a
l
l
e
l
a
n
d
D
i
st
r
i
b
u
t
e
d
C
o
m
p
u
t
i
n
g
,
v
o
l
.
1
6
4
,
p
p
.
1
5
2
–
1
6
7
,
J
u
n
.
2
0
2
2
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
j
p
d
c
.
2
0
2
2
.
0
3
.
0
0
9
.
[
2
4
]
Z.
W
a
n
g
a
n
d
S
.
G
u
a
n
,
“
A
b
l
o
c
k
c
h
a
i
n
-
b
a
s
e
d
t
r
a
c
e
a
b
l
e
a
n
d
s
e
c
u
r
e
d
a
t
a
-
s
h
a
r
i
n
g
sc
h
e
m
e
,
”
Pe
e
rJ
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
,
v
o
l
.
9
,
p
.
e
1
3
3
7
,
A
p
r
.
2
0
2
3
,
d
o
i
:
1
0
.
7
7
1
7
/
P
EE
R
J
-
C
S
.
1
3
3
7
.
[
2
5
]
C
.
Li
u
,
F
.
X
i
a
n
g
,
a
n
d
Z.
S
u
n
,
“
M
u
l
t
i
a
u
t
h
o
r
i
t
y
a
t
t
r
i
b
u
t
e
-
b
a
s
e
d
a
c
c
e
ss
c
o
n
t
r
o
l
f
o
r
su
p
p
l
y
c
h
a
i
n
i
n
f
o
r
m
a
t
i
o
n
s
h
a
r
i
n
g
i
n
b
l
o
c
k
c
h
a
i
n
,
”
S
e
c
u
r
i
t
y
a
n
d
C
o
m
m
u
n
i
c
a
t
i
o
n
N
e
t
w
o
r
k
s
,
v
o
l
.
2
0
2
2
,
p
p
.
1
–
1
8
,
A
p
r
.
2
0
2
2
,
d
o
i
:
1
0
.
1
1
5
5
/
2
0
2
2
/
8
4
9
7
6
2
8
.
[
2
6
]
J.
L
.
G
a
o
e
t
a
l
.
,
“
T
o
w
a
r
d
Ef
f
i
c
i
e
n
t
B
l
o
c
k
c
h
a
i
n
f
o
r
t
h
e
I
n
t
e
r
n
e
t
o
f
V
e
h
i
c
l
e
s
w
i
t
h
H
i
e
r
a
r
c
h
i
c
a
l
B
l
o
c
k
c
h
a
i
n
R
e
so
u
r
c
e
S
c
h
e
d
u
l
i
n
g
,
”
El
e
c
t
r
o
n
i
c
s
,
v
o
l
.
1
1
,
n
o
.
5
,
p
.
8
3
2
,
M
a
r
.
2
0
2
2
,
d
o
i
:
1
0
.
3
3
9
0
/
e
l
e
c
t
r
o
n
i
c
s
1
1
0
5
0
8
3
2
.
[
2
7
]
N
.
A
.
U
g
o
c
h
u
k
w
u
,
S
.
B
.
G
o
y
a
l
,
A
.
S
.
R
a
j
a
w
a
t
,
C
.
V
e
r
m
a
,
a
n
d
Z.
I
l
l
e
s,
“
E
n
h
a
n
c
i
n
g
l
o
g
i
st
i
c
s
w
i
t
h
t
h
e
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s:
a
s
e
c
u
r
e
d
a
n
d
e
f
f
i
c
i
e
n
t
d
i
st
r
i
b
u
t
i
o
n
a
n
d
st
o
r
a
g
e
mo
d
e
l
u
t
i
l
i
z
i
n
g
b
l
o
c
k
c
h
a
i
n
i
n
n
o
v
a
t
i
o
n
s
a
n
d
i
n
t
e
r
p
l
a
n
e
t
a
r
y
f
i
l
e
s
y
st
e
m
,
”
I
EEE
A
c
c
e
ss
,
v
o
l
.
1
2
,
p
p
.
4
1
3
9
–
4
1
5
2
,
2
0
2
4
,
d
o
i
:
1
0
.
1
1
0
9
/
A
C
C
ESS
.
2
0
2
3
.
3
3
3
9
7
5
4
.
B
I
O
G
RAP
H
I
E
S O
F
AUTH
O
RS
Na
v
e
e
n
k
u
m
a
r
Lin
g
a
r
a
ju
is
a
Re
se
a
rc
h
S
c
h
o
lar
a
t
th
e
De
p
a
rt
m
e
n
t
o
f
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
En
g
i
n
e
e
rin
g
,
Un
iv
e
rsity
o
f
Visv
e
sv
a
ra
y
a
Co
ll
e
g
e
o
f
En
g
in
e
e
rin
g
,
Ba
n
g
a
l
o
re
Un
iv
e
rsity
,
Be
n
g
a
l
u
ru
,
In
d
ia.
He
c
o
m
p
lete
d
h
is
Ba
c
h
e
l
o
r'
s
De
g
re
e
in
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
En
g
i
n
e
e
rin
g
fr
o
m
Visv
e
sv
a
ra
y
a
Tec
h
n
o
l
o
g
ica
l
Un
i
v
e
rsity
a
n
d
p
u
rs
u
e
d
a
M
a
ste
r'
s
in
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
E
n
g
i
n
e
e
rin
g
a
t
UV
CE,
Ba
n
g
a
l
o
re
.
Na
v
e
e
n
k
u
m
a
r
L
'
s
e
x
p
e
rti
se
sp
a
n
s
d
i
v
e
rse
d
o
m
a
in
s,
i
n
c
lu
d
in
g
c
y
b
e
rse
c
u
rit
y
,
b
lo
c
k
c
h
a
in
,
c
o
m
p
u
ter n
e
two
r
k
s,
c
lo
u
d
se
c
u
rit
y
,
d
a
ta m
in
i
n
g
,
firew
a
ll
s
a
n
d
VPN
s,
c
ry
p
t
o
g
r
a
p
h
y
,
a
rt
ifi
c
ial
in
telli
g
e
n
c
e
,
a
n
d
m
a
c
h
in
e
lea
rn
i
n
g
i
n
c
y
b
e
rse
c
u
rit
y
,
c
y
b
e
r
-
p
h
y
sic
a
l
sy
ste
m
se
c
u
rit
y
,
n
e
u
ra
l
n
e
two
r
k
s,
e
d
g
e
c
o
m
p
u
ti
n
g
,
a
n
d
c
y
b
e
rse
c
u
rit
y
i
n
6
G
n
e
two
rk
s.
Hi
s
c
o
m
m
it
m
e
n
t
to
p
i
o
n
e
e
rin
g
re
se
a
rc
h
is
d
e
m
o
n
stra
ted
b
y
h
is
p
re
se
n
tatio
n
o
f
a
n
IEE
E
c
o
n
f
e
re
n
c
e
p
a
p
e
r,
h
i
g
h
li
g
h
t
in
g
h
is
e
n
th
u
sia
sm
fo
r
a
d
v
a
n
c
i
n
g
tec
h
n
o
l
o
g
ica
l
k
n
o
wle
d
g
e
a
n
d
sh
a
p
in
g
t
h
e
fu
t
u
re
o
f
c
o
m
p
u
ter
sc
i
e
n
c
e
a
n
d
Ne
two
rk
se
c
u
rit
y
sy
ste
m
s.
He
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
n
a
v
e
e
n
g
o
wd
a
k
n
s@
g
m
a
il
.
c
o
m
.
Ma
n
ju
l
a
H
a
la
d
a
p
p
a
S
u
n
k
a
d
a
k
a
tte
c
u
rre
n
tl
y
a
P
ro
fe
ss
o
r
in
t
h
e
De
p
a
rtme
n
t
o
f
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
En
g
in
e
e
ri
n
g
a
t
th
e
U
n
iv
e
rsit
y
Visv
e
sv
a
ra
y
a
Co
ll
e
g
e
o
f
En
g
in
e
e
rin
g
,
Ba
n
g
a
lo
re
Un
i
v
e
rsity
,
Be
n
g
a
lu
ru
,
h
a
s
e
sta
b
li
sh
e
d
h
e
rse
lf
a
s
a
p
r
o
m
in
e
n
t
fi
g
u
re
in
t
h
e
field
.
Ho
ld
i
n
g
a
B
.
E.
,
M
.
Tec
h
.
,
a
n
d
P
h
.
D.
in
C
o
m
p
u
ter
S
c
ien
c
e
a
n
d
En
g
i
n
e
e
rin
g
,
sh
e
h
a
s
h
o
n
e
d
h
e
r
e
x
p
e
rti
se
i
n
c
o
m
p
u
ter
n
e
tw
o
rk
s,
wire
les
s
se
n
so
r
n
e
two
r
k
s,
d
a
ta
m
in
i
n
g
,
c
l
o
u
d
c
o
m
p
u
ti
n
g
,
a
rti
ficia
l
in
telli
g
e
n
c
e
,
m
a
c
h
in
e
lea
rn
in
g
,
a
n
d
fe
d
e
ra
ted
lea
rn
in
g
.
Driv
e
n
b
y
a
p
a
ss
io
n
fo
r
k
n
o
wle
d
g
e
,
s
h
e
h
a
s
m
a
d
e
sig
n
i
fica
n
t
c
o
n
tri
b
u
ti
o
n
s
to
th
e
se
d
o
m
a
in
s,
e
v
id
e
n
t
th
r
o
u
g
h
h
e
r
sc
h
o
larly
p
u
b
li
c
a
ti
o
n
s
a
n
d
c
o
n
fe
re
n
c
e
p
re
se
n
tatio
n
s.
As
a
n
e
d
u
c
a
to
r,
h
e
r
i
n
flu
e
n
c
e
e
x
ten
d
s
b
e
y
o
n
d
t
h
e
c
las
sro
o
m
,
sh
a
p
in
g
th
e
m
in
d
s
o
f
f
u
tu
re
e
n
g
i
n
e
e
rs.
Dr.
M
a
n
ju
la'
s
h
o
li
stic
a
p
p
r
o
a
c
h
to
a
c
a
d
e
m
ia,
b
a
lan
c
in
g
re
se
a
rc
h
a
n
d
tea
c
h
in
g
,
u
n
d
e
rsc
o
re
s
h
e
r
c
o
m
m
it
m
e
n
t
to
a
d
v
a
n
c
in
g
t
h
e
fro
n
ti
e
rs
o
f
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
E
n
g
in
e
e
rin
g
,
lea
v
in
g
a
n
in
d
e
li
b
l
e
m
a
rk
o
n
b
o
th
h
e
r
stu
d
e
n
t
s
a
n
d
t
h
e
tec
h
n
o
l
o
g
ica
l
lan
d
sc
a
p
e
a
t
larg
e
.
Wi
t
h
a
n
imp
re
ss
iv
e
trac
k
re
c
o
rd
,
s
h
e
h
a
s
a
u
th
o
re
d
6
9
jo
u
r
n
a
ls,
p
re
se
n
ted
7
2
c
o
n
fe
re
n
c
e
p
a
p
e
rs,
h
o
l
d
s
5
p
a
ten
ts,
a
n
d
h
a
s
c
o
n
tri
b
u
ted
to
4
b
o
o
k
c
h
a
p
ters
wh
il
e
p
u
b
l
ish
i
n
g
4
b
o
o
k
s,
sh
o
wc
a
sin
g
h
e
r
p
ro
l
ifi
c
a
n
d
d
iv
e
rse
c
o
n
tr
ib
u
ti
o
n
s
t
o
th
e
a
c
a
d
e
m
ic
a
n
d
tec
h
n
o
l
o
g
ic
a
l
c
o
m
m
u
n
it
y
.
A
d
d
i
ti
o
n
a
ll
y
,
Dr.
M
a
n
ju
la
is
c
u
rre
n
tl
y
a
re
sp
e
c
ted
m
e
m
b
e
r
o
f
th
e
Ex
e
c
u
t
iv
e
C
o
u
n
c
il
a
n
d
h
a
s
se
rv
e
d
a
s
a
f
o
rm
e
r
m
e
m
b
e
r
o
f
th
e
Ac
a
d
e
m
ic
S
e
n
a
te
a
t
VTU Bela
g
a
v
i.
S
h
e
c
a
n
b
e
c
o
n
t
a
c
ted
a
t
e
m
a
il
:
sh
m
a
n
ju
la@
g
m
a
il
.
c
o
m
.
Evaluation Warning : The document was created with Spire.PDF for Python.