Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithms

Size: px
Start display at page:

Download "Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithms"

Transcription

1 Finding Near-Opimum essage Scheduling Seings for SHA-256 Varians Using Geneic Algorihms CHU-HSING LIN, CHEN-YU LEE 2, KRISHNA. KAVI 3, DENG-JYI CHEN 2, YI-SHIUNG YEH 2 Deparmen of Compuer Science Tunghai Universiy Taichung 407, Taiwan 2 Deparmen of Compuer Science Naional Chiao-Tung Universiy 00 Ta-Hsueh Road, HsinChu, 30050, Taiwan 3 Deparmen of Compuer Science and Engineering Universiy of Norh Texas One-way hash funcions play an imporan role in modern crypography. ausiewicz e al. proved ha he message scheduling is essenial for he securiy of SHA-256 by showing ha i is possible o find collisions wih complexiy 2 64 hash operaions for a varian wihou i. In his aricle, we firs proposed he conjecure ha message scheduling of SHA algorihm has higher securiy complexiy (or finess value in Geneic algorihm) if each message word (W ) involves more message blocks ( i ) in each round. We found some evidence suppors he conjecure. Consider he securiy of SHA-0 and SHA-. Since Chabaud and Joux shown ha SHA- is more secure han SHA-0. Furher, Wang found collisions in full SHA-0 and SHA- hash operaions wih complexiies less han 2 39 and 2 69, respecively. We found i is consisen from he viewpoin of message blocks (erms) involved in each message word. I clearly shown ha he number of erms involved in SHA- is more han ha in SHA-0, aking W 27 as an example, 4 and 6, respecively. Based on he conjecure we proposed a new view of complexiy for SHA-256-XOR funcions, a varian of SHA-256, by couning he erms involved in each equaion, insead of analyzing he probabiliy of finding collisions wihin SHA-256-XOR hash funcion. Our experimens shown ha he parameer se in each equaion of message schedule is crucial o securiy finess. We applied geneic algorihms o find he near-opimal message schedule parameer ses ha enhance he complexiy 4 imes for SHA- and.5 imes for SHA-256-XOR, respecively, when compared o original SHA- and SHA-256-XOR funcions. The analysis would be ineresing for designers on he securiy of modular-addiion-free hash funcion which is good for hardware implemenaion wih lower gae coun. And he found message schedule parameer ses would be a good reference for furher improvemen of SHA funcions. Keywords: geneic algorihms, crypography, secure hash algorihm. INTRODUCTION Crypographic hash funcions play an imporan role in modern crypography. They are widely used in a variey of applicaions such as password proecion, secure proocols, and digial signaures. The hash funcion uses a sring of arbirary lengh as is inpu, and creaes a fixed-lengh sring as is oupu. A hash value is ofen called a daa fingerprin or message diges.

2 Definiion [] (Collision-free hash funcion) A collision-free hash funcion H uses a message of arbirary lengh as is inpu, and produces a fixed-lengh message diges when i saisfies he following condiions: The descripion of H() is publicly known and i is easy o implemen Pre-image resisan: Given message diges y, i is difficul o find a message such ha H() = y. Second pre-image resisan: Given and is image H(), i is difficul o find anoher such ha H() = H( ). (Srong) Collision Resisance: I is difficul o find wo disinc messages and such ha H() = H( ). The Secure Hash Algorihm (SHA) is a series of crypographic hash funcions published by he US Naional Insiue of Sandards and Technology (NIST). NIST proposed he SHA-0 as a Federal Informaion Processing Sandard Publicaion (FIPS PUB) 80 in 993 [2]. In 995, NIST announced a revised version, he SHA-, in FIPS PUB 80- [3] as a sandard o replace he SHA-0. In 200, he NIST published SHA-2 as FIPS PUB 80-2 [4], which consised of four algorihms: SHA-, SHA-256, SHA-384, and SHA-52. Table liss he characerisics of he five SHA-2 algorihms. Algorihm essage Size (bis) Table. SHA algorihms Block Size (bis) Word Size (bis) essage Diges Size (bis) Securiy SHA- < SHA-224 < SHA-256 < SHA-384 < SHA-52 < The erm securiy in his able means ha a birhday aack [] [Remark ] on a message diges of size n produces a collision wih a facor of approximaely 2 n/2. Recen sudies have proposed exensions based on SHA. For example, RAR- SHA-256 [7] [Remark ] is composed of he SHA-256 compression funcion, and is faser han SHA-256 when implemened in parallel. SHACAL and SHACAL-2 [8][9] are block ciphers ha are based on SHA- and SHA-256, respecively, and which were submied o he New European Schemes for Signaures, Inegriy, and Encrypion projec in Yoshida and Biryukov replaced all arihmeic addiions wih XOR operaions in SHA-256, naming i SHA-256-XOR, and found ha SHA-2-XOR has a pseudo-collision resisance weakness up o 34 rounds [0]. A birhday aack [] [2] is a ype of crypographic aack based on he birhday problem in probabiliy heory. Given a funcion f, he aack aemps o find wo differen inpus x, x 2 such ha f(x ) = f(x 2 ). Such a pair (x, x 2 ) is called a collision inpu. The birhday aack on a message diges of size n produces a collision afer rying

3 .2 SHA-92, SHA-224, SHA-256, SHA-384, SHA-448, and SHA-52 are approximaely 2 80, 2 96, 2 2, 2 28, 2 92, 2 224, and 2 256, respecively, and are lised in Table. any researchers have ried o develop a crypanalyic mehod wih a lower complexiy han he birhday aack. In 998, Chabaud and Joux announced a mehod for finding he SHA-0 collisions [9]. They reduced his complexiy o 2 6 using a differenial crypanalysis echnique, bu hey could no successfully apply i o SHA-. This resul implied ha SHA- is more secure han SHA-0. In early 2005, Rijmen and Oswald applied he same mehod o find collisions in SHA- [3]. They examined message scheduling in SHA-0 and SHA-, and proved ha he complexiy associaed wih finding collisions in a reduced version of SHA- (wih 53 rounds insead of 80 rounds) was less han Wang, Yin, and Yu found collisions wih a complexiy of 2 69 in he full 80-sep SHA- [4]. In 200, Grechnikov announced he pracical collision aack on he 73-sep SHA- based on an auomaed approach [26]. NIST announced ha SHA- will be used unil 200, a which ime i will be replaced by SHA-2. Since 2004, several auhors have repored on collisions for SHA-256. Gilber and Handschuh repored a 9-round local collision wih a complexiy of 2 66 using differenial pah analysis [5]. endel e al. laer reduced his complexiy o 2 39 [6]. Nikolić and Biryukov realized 2-sep collisions for SHA-256 using a nonlinear differenial pah analysis wih a complexiy of 2 9 [7]. In 2008, Sanadhya and Sarkar found a local collision wih 24-sep SHA-256 and SHA-52 wih and calls, respecively [8], and his was he firs ime ha a colliding message pair for 24-sep SHA-52 was provided. In 2009, Indeseege e al. found collisions on he 24-sep SHA-256 and SHA-52 wih calls and 2 53 calls, respecively, and a local collision on 3-sep SHA-256 wih 2 32 [24]. Also in 2009, Aoki e al. presened full preimage aacks on up o 43-sep SHA-256 and SHA-52 wih he ime complexiies of and compression funcion operaions for full preimages, respecively [25]. Since 20, endel e al. have presened a collision on 27-sep SHA-256 and a semi-free-sar collision on 32-sep SHA-256 wih pracical complexiy [27]. Biryukov e al. presened a second-order differenial collision for he SHA-256 compression funcion on 47 ou of 64 seps, which have pracical complexiy based on a recangle/boomerang approach [28]. Almos all of he currenly known crypanalyses of SHA have aemped o find collisions on a differenial pah. However, he design of each componen such as algorihms for message scheduling and hash loop body and he funcion parameers, affecs he possibiliy ha a pah for collisions (using differenial pah crypanalysis) will be found. A fairly large body of lieraure exiss regarding mehods of improving hash algorihms. However, here is a surprising lack of informaion regarding he design and selecion of funcion parameers. This paper addresses his deficiency. The purpose of he research presened in his aricle is o examine he relaionship beween he securiy of a hash funcion and is funcion parameers. In his regard, wo issues ha need o be resolved are (a) how o assess he securiy finess of a given se of funcion parameers, and (b) how o find he opimal funcion parameer se. Specifically, his paper proposes a novel view of complexiy (hence securiy finess) of SHA-2-XOR funcions proposed in [0], by couning he erms involved in each equa- n / 2 2 n 2 inpu values. Under he birhday aack, he securiy of SHA-,

4 ion, insead of analyzing he probabiliy of finding collisions wihin an SHA-256-XOR hash funcion. Our experimens have shown ha he parameer se in each equaion of a message schedule plays an imporan role in securiy finess, bu i is very hard o find he opimum parameer values. We apply geneic algorihms o find he opimal message schedule parameer ses ha enhance he complexiy 4 imes for SHA- and.5 imes for SHA-256-XOR, when compared o original SHA- and SHA-256-XOR funcions. The analysis resuls would be ineresing for designers who are ineresed in he securiy of modular addiion free hash funcions, which are good for hardware implemenaion wih lower gae couns. oreover, he found message schedule parameer ses would be a good reference for furher improvemen of SHA funcions. The remainder of his paper is organized as follows. Secion 2 briefly inroduces SHA-, SHA-256, and geneic algorihms. Secion 3 proposes our securiy evaluaion crierion for SHA message scheduling, and finds he bes parameer ses for SHA- using a brue force approach. Secion 4 applies i o find he nearly opimal se for SHA-256-XOR and describes he experimenal resuls. Secion 5 discusses he resuls and concludes he paper. Table 2 liss he nomenclaure used hroughou he paper. Table 2. Legends Symbol Definiion essage wih arbirary lengh as he inpu of a hash funcion. W The h message word. m The number of oupu words. n The lengh of one word. l The lengh of he inpu message, l =. ROTL {i} () Lef-roaion operaion for i bis. r The value of m n, r = m n. H() The hash funcion H() wih inpu. {, A, B, C, D} The parameer se of W equaion in message scheduling. SHR {i} () Righ-shif operaion for i bis. (i) essage block i wih a size of 52 bis. (i) j The j h word of he i h message block. n j n j indicaes message word j doing n-biwise roaion 2. RELATED WORKS 2. Overview of SHA- and SHA-256 Algorihms SHA- [4] akes a message wih a lengh of l bis, where 0 l < 2 64, as he inpu, and oupus a 60-bi hash value. The hash funcion parses he padded message ino 52-bi blocks. Each block passes an 80-round compression funcion and oupus a 60-bi hash value. SHA- processing involves he following 3 seps:

5 Sep : Padding message: pad he inpu message making i a muliple of 52 bis. Sep 2: Parsing he padded message: parse he padded message ino N 52-bi blocks, (), (2),, (N). Each block (i) is divided ino sixeen 32-bi words, 0 (i), (i),, 5 (i). Sep 3: essage scheduling for each message block (i). The message words, {W }: ROTL i,0 5 W W W W, () where ROTL {i} indicaes lef roaion operaion by i bis. essage expansions are performed for 80 rounds. Algorihm defines hese seps in deail. Table 3 summarizes he Boolean funcion f ha appeared in he SHA- sep funcion. Algorihm SHA- sep funcion : FOR = o 80 2: e = d 3: d = c 4: c = ROTL 30 (b ) 5: b = a 6: a = ROTL 5 (a ) + f (b, c, d ) + e + K + W 7: End FOR Table 3. Boolean funcion used in SHA- Round Boolean funcion f (x, y, z) 0 20 (x y) (x z) 2 40 x y z 4 60 (x y) (x z) (y z) 6 80 x y z SHA-256 akes a message wih a lengh of l bis, where 0 l < 2 64, as he inpu, and oupus a 256-bi hash value. The hash funcion parses he padded message ino 52-bi blocks. Each block passes a 64-round compression funcion and oupus a 256-bi hash value. The SHA-256 conains seps ha are similar o SHA-, excep ha i ses differen iniial values and consans, and uses differen funcions. The following is a descripion of he message block processing sep. Sep 3: essage scheduling for each message block (i).

6 The message words, {W }: 0 i, , x ROTL x ROTL x SHR x x ROTL x ROTL x SHR x (3) where SHR {i} indicaes righ shif operaion by i bis. essage expansions are performed for 64 rounds. Algorihm 2 defines hese seps in deail. Table 4 summarizes he Boolean funcion f used in each round. (2) Algorihm 2 SHA-256 sep funcion : FOR = o 64 2: T = h + f (e ) + f 3 (e,f,g ) + K + W 3: T 2 = f 2 (a ) + f 4 (a,b,c ) 4: h = g 5: g = f 6: f = e 7: e = d + T 8: d = c 9: d = c 0: c = b : b = a 2: a = T + T 2 3: End FOR Table 4. Boolean funcion used in SHA-256 Boolean funcion f f (x) = ROTL (2) (x) ROTL (3) (x) ROTL (22) (x) f 2 (x) = ROTL (6) (x) ROTL () (x) ROTL (25) (x) f 3 (x) = (x y) (x z) f 4 (x) = (x y) (x z) (y z) 2.2 Geneic Algorihm The geneic algorihm is he mos popular ype of evoluionary algorihm ha use echniques inspired by evoluionary biology. As saed by John H. Holland in 975, The geneic algorihm has a wide scope of applicaions, including economics, engineering, machine learning, genome biology, game heory, neural neworks, eceera [23]. A geneic algorihm provides a highly efficien mehod for ensuring convergence

7 o near-opimal or opimal soluions. Figure shows he seps of he geneic algorihm, which are described as follows: () Iniializaion of populaion. (2) Choice of a finess funcion and evaluaion of he finess value of each individual in he populaion. (3) Selecion of beer ranked par o be reproduced. (4) Breeding new generaion s populaion by crossover and muaion. (5) Replacemen of he wors ranked par of he populaion wih he new generaion s populaion. (6) Repeaing his generaional process unil he erminaion condiion has been reached. Fig.. Flowchar of geneic algorihm The Geneic Algorihm Uiliy Library (GAUL) developed by AI Foundry [22] is a flexible programming library designed o aid in he developmen of applicaions ha use geneic or evoluionary algorihms. I provides daa srucures and funcions for handling and manipulaing he daa required for serial and parallel evoluionary algorihms. GAUL is an open-source programming library, which was released under he GNU General Public License. I is designed o assis in he developmen of code ha requires evoluionary algorihms. 3. SHA ESSAGE SCHEDULING EVALUATION CRITERION This secion proposes an evaluaion crierion of SHA message scheduling. The number of erms involved in he message schedule is reaed as an evaluaion crierion of SHA message scheduling. This sudy uses SHA-0 and SHA- as examples o show ha SHA- is more secure han SHA-0 by comparing heir message scheduling equa-

8 ions. 3. Local Collision A local collision appearing on all he SHA families is a collision wihin inermediae seps of he hash funcion [4]. The saring poin for hash funcion collision aacks is a local collision. Local collisions are found using linear approximaions of Boolean funcions ha are used in various rounds in message scheduling (and oher condiions as defined in [4]). The firs observaion is ha SHA-0 has a 6-sep local collision ha can sar a any sep i. The differenial pah is a sequence of grouped local collisions wih possible overlaps [20]. Wang [4] ried o find a se of saring seps for each local collision o consruc such a pah. The disurbance vecor is applied o saisfy he recursion defined by he message expansion. Once a local collision is found, an aemp is made o consider he message expansion and oher non-linear designs o find a collision for he full hash funcion. For SHA-0, 3 vecors are found successfully for hree condiions in [4]. However, i is more complicaed o find a good disurbance vecor due o he large search space on SHA-, and he probabiliy of n inerleaved local collision complexiies increases exponenially wih n for SHA-256 [6]. endel provides an approach for collision searches as follows [6]: () Idenify local collisions in each round of ransformaion. (2) Search for disurbance vecors ha need o saisfy some addiional properies. (3) Build he difference vecor by inerleaving he local collisions. (4) The complexiy of he collision search is relaed o he characerisic wihin hese inerleaved local collisions. (5) Adjusing message bis for he chosen characerisic reduces he compuaional cos for he collision search. The issue ha arises is how o reduce he number of local collisions in an expansion process. Our sudy applies a geneic approach o find he opimal parameer se of he SHA family message expansion funcion based on he evaluaion crierion wih he lowes number of local collisions. 3.2 Local Collision in SHA-0 and SHA- In [9], i is poined ou ha SHA- is safer han SHA-0 because of a single biwise roaion in SHA- ha affecs he local collisions exising in SHA-0. Table 5 shows he SHA-0 and SHA- equaions. Table 5. SHA-0, SHA-, and SHA-256-XOR equaions Algorihm SHA-0 i Equaion,0 5 W ,6 79

9 SHA- SHA-256-X OR i,0 5 ROTL ,6 79 i 0 W 2 7 W 6 The following are examples ha compare he erms involved in W 27 in boh SHA-0 and SHA-, and ha in W 20 in SHA-256-XOR where j n (or W j n ) indicaes ha he message block j (or inermediae message word W j ) undergoes an n-biwise lef roaion. Each message word W is obained by recursively compuing oher words wih lower indices and being replaced by message blocks unil 5. Figure 2 represens he number of erms involved in full SHA-0, SHA-, and SHA-256-XOR. [SHA-0] W 27 = W 24 W 9 W 3 W = (W 2 W 6 W 0 W 8 ) W 9 W 3 W = = erms are involved. [SHA-] W 27 = W 24 W 9 W 3 W = 2 2 (W 2 W 6 W 2 0 W 2 8 ) W 9 W 3 W = = erms are involved. [SHA-256-XOR] W 20 = 0 (W 8 ) W 3 (W 5 ) W 4 = 7 8 W 8 W 7 W 3 W 7 5 W 9 5 W 4 = 4 (W 4 W 25 4 W 7 9 W 24 W 26 W 7 6 W W 9 W W 5 W 0 W W 3 W 3 W 2 ) (W 4 W 4 W 9 W W W W 4 W 9 W W 5 W 0 W W 3 9 W 3 W 2 ) W 5 W 3 W 4 = 2 W 4 W 32 4 W 4 9 W 3 W W 4 0 W W 4 W W W W 0 W W 3 W 3 W 2 W 4 W W 9 W W W 0 W 4 W 4 W 9 W W W W 3 W 3 W 2 W W 5 W 4

10 = erms are involved. Fig. 2. Comparison of he number of erms involved in each W in message scheduling for SHA-0, SHA- and SHA Lee s Conjecure ausiewicz e al. proved ha he funcions ( and ) or he message expansion are essenial for he securiy of SHA-256 by showing ha i is possible o find collisions wih a complexiy of 2 64 hash operaions for a varian wihou hem [29]. We proposed ha message scheduling of he SHA algorihm has higher securiy complexiy (or finess) if each message word (W ) involves more message blocks ( i ) in each round. Chabaud and Joux showed ha SHA- is more secure han SHA-0 [9]. Furhermore, Wang found collisions in full SHA-0 and SHA- hash operaions wih complexiies less han 2 39 [20] and 2 69 [4], respecively. Consider he analyses of he erms involved in each message block. Figure 2 clearly shows ha he number of erms involved in SHA- is more han ha in SHA-0, aking W 27 as an example (4 > 6). Therefore, SHA- has a higher securiy complexiy (hence securiy finess) han SHA-0. In his paper, we use he erm securiy finess o evaluae he securiy of each possible W in message scheduling. 3.4 The Bes Seing of essage Scheduling Equaion in SHA-

11 The message scheduling equaion in SHA- can be generalized as ROTL i,0 5 W W W W,6 A B C D 79 (4) The bes four variables are produced by he brue force (or exhausive) approach, and he values found are {A, B, C, D} = {, 2,, 6}. The bes complexiy occurs in round 60 when 22 erms are involved. The modified equaion is ROTL i,0 5 W W W W, (5) and called opsha- [2]. Figure 3 compares he number of erms involved in SHA- and opsha-. Fig. 3. Comparison of he number of erms involved in each W in message scheduling for SHA- and SHA--OPT 4. IPROVING SHA-256-XOR VIA GENETIC ALGORITHS 4. Specialized GA for SHA-256-XOR To find opimum parameers, he message scheduling equaion in SHA-256-XOR can be generalized as i,0 5 0 A B C D 63 W W W W,6 (6)

12 7 8 3 and 0 x ROTL x ROTL x SHR x x ROTL x ROTL x SHR x (3) Consider wo operaions, ROTL and SHR. A biwise roaion operaion, ROTL, is a circular shif operaion ha is a permuaion of he enries in a uple where he las elemen becomes he firs elemen and all of he oher elemens are shifed. The shif operaion, SHR n (x), which ses 0 as he firs elemen, does no influence he experimenal resuls because SHR n (x) and ROTR n (x) produce differen resuls. Based on his assumpion, he generalized form is modified o x ROTL x ROTL x 7 9 x ROTL x ROTL x (7) In he previous secion, he opimal values are calculaed using he brue force approach in opsha-. To find he opimum parameers using he brue force approach for SHA-256-XOR, we would need o es 2 64 possible combinaions of {A, B, C, D} for each round (6 63), and o perform up o operaions in he whole experimen. We applied geneic algorihm operaors of recombinaion and perurbaion o reduce he number of infeasible soluions needed o find he near opimal variable se {A, B, C, D}. The design of he GA involves some main componens: geneic represenaion, populaion iniializaion, finess funcion, selecion scheme, crossover, and muaion. Each componen is described as follows, and he parameers used wih GAUL are lised in Table 6: Geneic represenaion: The genes represen he inpu variables, A, B, C, D,, of he generalized SHA-256-XOR, and each chromosome represens a possible soluion. In he simulaion, he lengh of each chromosome is 5. Populaion iniializaion: Each chromosome presens a poenial soluion for he problem in geneic algorihms. The iniial populaion is randomly generaed and he size is se o 500. Finess Funcion: The finess funcion couns he number of erms in he equaion for W. Afer he process of selecion, crossover, and muaion, he opimal chromosome indicaes he maximum number of erms involved in he equaions. F() = # of differen erms involved in W equaion (8) Selecion Scheme: Selecion is a geneic operaor ha chooses a chromosome from he curren generaion s populaion for inclusion in he nex generaion s populaion. We adop he binary ournamen selecion based on he finess value in he simulaion. Crossover and uaion: Crossover enables geneic algorihms o exrac he bes genes from differen individuals, and o produce poenially superior children. The muaion operaion randomly modifies he gene o preven he

13 falling of all soluions ino a local opimum, and exends he search space. In he simulaion, we adop he one-poin crossover wih a raio 0.9, and a single-poin muaion wih a raio 0.. Table 6. Geneic algorihm parameers. Parameer Value Library GAUL Populaion size 500 Number of chromosomes Lengh of each chromosome 5 Evoluionary mode GA_SCHEE_DARWIN Eliism mode GA_ELITIS_PARENTS_SU RVIVE Crossover raio 0.9 uaion raio 0. Finess funcion # of erms involved in W equaion 4.2 Experimen resuls Table 7 liss 0 generaions of he simulaion resuls for {A, B, C, D}. The simulaion requires heavy compuaional imes for each. Appendix A liss more of our experimenal resuls. We have no generaed opimum parameers for addiional rounds because of he compuaional requiremens. However, we believe ha we have demonsraed he basis of our conribuion, which is a possible approach for he selecion of opimal message scheduling parameers and he analysis of he securiy finess. The values for he 5 variables converge afer 42 generaions. I appears ha he approximae opimal values are {A, B, C, D} = {4,,, 6}. Thus, he bes equaion for W of SHA-256-XOR, named opsha-256-xor, should be i, W W W W,6 (9) Figure 4 compares SHA-256-XOR wih opsha-256-xor by showing clearly ha opsha-256-xor is indeed more secure han SHA-256. Table 7. The las 0 generaions of he simulaion Generaion A B C D Finess

14 Fig. 4. Comparison of he number of erms involved in each W in message scheduling for SHA-256-XOR and opsha-256-xor Wih regards o he performance, Figure 5 compares he running ime for each W (6 30) in brue force and geneic algorihms. We have no ye been able o complee he simulaion for every W. The laer iems in he experimen will consume addiional ime because he equaion is a recursive funcion.

15 Fig. 5. Comparison of he running ime in W beween geneic algorihm and brue force 5. CONCLUSIONS Since is inroducion in 993, he secure hash funcion family has become an imporan sandard in crypography. This paper proposes a novel view of complexiy (and hence securiy finess) by couning he number of erms involved in each equaion, insead of analyzing he probabiliy of finding collisions wihin hash funcions. This sudy idenified he near opimal versions, opsha- and opsha-256-xor, using brue force and geneic approaches of SHA- and SHA-256-XOR, respecively, and he laer was found o be more compuaionally efficien. This analysis would be ineresing for designers ineresing in he securiy of modular addiion free hash funcions, which are good for hardware implemenaion wih lower gae couns. Furhermore, he obained message schedule parameer ses will be a good reference for furher improvemen of SHA funcions. Finally, we again review he equaions of SHA-256-XOR (Table 8). In our fuure sudies, we aim o combine hese new variables {E, F, G, H} wih {A, B, C, D} o enhance he algorihm using geneic algorihms. Furhermore, his approach can be applied o oher SHA-2-XOR family members o deermine he relaionship beween he erms involved and he complexiy (or securiy finess). Table 8. Generalized SHA-256-XOR wih more variables Algorihm Equaion Generalized SHA-256-XOR wih more varia- i,0 5 0 A B C D,6 63

16 bles E F 3 0 x ROTL x ROTL x SHR x G H 0 x ROTL x ROTL x SHR x REFERENCES. S. Bakhiari, R. Safavi-Naini, and J. Pieprzyk, Crypographic Hash Funcions: A Survey, Technical Repor 95-09, Universiy of Wollongong, July Secure hash sandard, FIPS PUB 80, Secure hash sandard, FIPS PUB 80-, Secure hash sandard, FIPS PUB 80-2, Secure hash sandard, FIPS PUB 80-2, Daa encrypion sandard (DES), FIPS PUB 46-3, P. Pal, P. Sarkar, PARSHA-256 A New Parallelizable Hash Funcion and a ulihreaded Implemenaion, in Proceedings of Fas Sofware Encrypion 2003 (FSE 2003), LNCS 2887, 2003, pp H. Handschuh and D. Naccache, SHACAL, NESSIE, J. Lu, J. Kim, N. Keller, and O. Dunkelman, Relaed-Key Recangle Aack on 42-Round SHACAL-2, in Proceedings of 9h Informaion Securiy Conference (ISC 2006), LNCS 476, 2006, pp H. Yoshida, A. Biryukov, Analysis of a SHA-256 Varian, in Proceedings of 2h Annual Workshop on Seleced Areas in Crypography (SAC 2005), LNCS 3897, 2005, pp D. R. Sinson, Crypography Theory and Pracice, 3 rd ed., CRC Press, B. Schneier, Applied Crypography, 4 h ed., John Wiley & Sons, Inc., V. Rijmen, E. Oswald, Updae on SHA-, in Proceedings of RSA 2005, LNCS 3376, 2005, pp X. Wang, H. Yu and Y. L. Yin, Finding Collision in he Full SHA-, in Proceedings of Crypo 05, LNCS 362, 2005, pp H. Gilber, H. Handschuh, Securiy Analysis of SHA-256 and Sisers, in Proceedings of 6h Informaion Securiy Conference (SAC 2003), LNCS 3006, 2003, pp F. endel, N. Pramsaller, C. Rechberger, V. Rijmen, Analysis of Sep-Reduced SHA-256, in Proceedings of 3h annual Fas Sofware Encrypion workshop (FSE 2006), LNCS 4047, 2006, pp I. Nikolić, A. Biryukov, Collisions for Sep-Reduced SHA-256, in Proceedings of 5 h annual Fas Sofware Encrypion workshop (FSE 2008), LNCS 5086, pp S. K. Sanadhya, P. Sarkar, "New Collision Aacks agains Up o 24-Sep SHA-2," in Proceedings of INDOCRYPT 2008, LNCS 5365, 2008, pp F. Chabaud, A. Joux, Differenial Collisions in SHA-0, in Proceedings of Crypo 98, 998, pp X. Wang, H. Yu and Y. L. Yin, Efficien Collision Search Aacks on SHA-0, in Proceedings of Crypo 05, LNCS 362, 2005, pp Y. S. Yeh, T. Y. Huang, I T. Chen, and S. C. Chou, Analyze SHA- in message

17 schedule, Journal of Discree ahemaical Sciences & Crypography, vol. 0, no., pp. -7, S. Adcock, Geneic Algorihm Uiliy Library, Available: hp://gaul.sourceforge.ne 23. J. H. Holland, Adapaion in Naural and Arificial Sysem, The Universiy of ichigan Press, S. Indeseege, F. endel, B. Preneel, and C. Rechberger, Collisions and Oher Non-random Properies for Sep-Reduced SHA-256, in Proceedings of Seleced Areas in Crypography (SAC 2008), LNCS 538, Springer-Verlag, pp , K. Aoki, J. Guo, K. ausiewicz, Y. Sasaki, and L. Wang, Preimages for Sep-Reduced SHA-2, In Proceedings of ASIACRYPT 2009, pp , E. A. Grechnikov, Collisions for 72-sep and 73-sep SHA-: Improvemens in he ehod of Characerisics, Crypology eprin Archive, Repor 200/43, Florian endel, Tomislav Nad, and arin Schläffer, "Finding SHA-2 Characerisics: Searching hrough a inefield of Conradicions," In proceedings of ASIACRYPT 20, LNCS 7073, pp , Alex Biryukov, ario Lamberger, Florian endel, and Ivica Nikolić, "Second-Order Differenial Collisions for Reduced SHA-256," In proceedings of ASIACRYPT 20, LNCS 7073, pp , Krysian ausiewicz, Josef Pieprzyk, Norber Pramsaller, Chrisian Rechberger, Vincen Rijmen, Analysis of simplified varians of SHA-256, In proceedings of Wesern European Workshop on Research in Crypology (WEWoRC 2005), LNI, P-74, pp , APPENDIX A. SHA-256-OPT TABLE The following able shows all resuls ha are generaed using geneic algorihms. We calculae opimal parameers {, A, B, C, D} for fify generaions using GAUL. The ax field is he number of erms involved in W by using {A, B, C, D} as SHA-256 s parameers in equaion. W W W W W,6 63 (A.) Table 9. All 50 generaions of he simulaion. Generaion A B C D Finess

18

19

Random Walk with Anti-Correlated Steps

Random Walk with Anti-Correlated Steps Random Walk wih Ani-Correlaed Seps John Noga Dirk Wagner 2 Absrac We conjecure he expeced value of random walks wih ani-correlaed seps o be exacly. We suppor his conjecure wih 2 plausibiliy argumens and

More information

THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER

THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 0 STREAM CIPHER Mohammad Sadegh Nemai Nia 1, Ali Payandeh 1, Faculy of Informaion, Telecommunicaion and Securiy Technologies, Malek-e- Ashar Universiy

More information

Simulation-Solving Dynamic Models ABE 5646 Week 2, Spring 2010

Simulation-Solving Dynamic Models ABE 5646 Week 2, Spring 2010 Simulaion-Solving Dynamic Models ABE 5646 Week 2, Spring 2010 Week Descripion Reading Maerial 2 Compuer Simulaion of Dynamic Models Finie Difference, coninuous saes, discree ime Simple Mehods Euler Trapezoid

More information

Vehicle Arrival Models : Headway

Vehicle Arrival Models : Headway Chaper 12 Vehicle Arrival Models : Headway 12.1 Inroducion Modelling arrival of vehicle a secion of road is an imporan sep in raffic flow modelling. I has imporan applicaion in raffic flow simulaion where

More information

Algebraic Attacks on Summation Generators

Algebraic Attacks on Summation Generators Algebraic Aacks on Summaion Generaors Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, and Dukjae Moon Naional Securiy Research Insiue 161 Gajeong-dong, Yuseong-gu, Daejeon, 305-350, Korea {dlee,jaeheon,jinhong,jwhan,djmoon}@eri.re.kr

More information

Single-Pass-Based Heuristic Algorithms for Group Flexible Flow-shop Scheduling Problems

Single-Pass-Based Heuristic Algorithms for Group Flexible Flow-shop Scheduling Problems Single-Pass-Based Heurisic Algorihms for Group Flexible Flow-shop Scheduling Problems PEI-YING HUANG, TZUNG-PEI HONG 2 and CHENG-YAN KAO, 3 Deparmen of Compuer Science and Informaion Engineering Naional

More information

Applying Genetic Algorithms for Inventory Lot-Sizing Problem with Supplier Selection under Storage Capacity Constraints

Applying Genetic Algorithms for Inventory Lot-Sizing Problem with Supplier Selection under Storage Capacity Constraints IJCSI Inernaional Journal of Compuer Science Issues, Vol 9, Issue 1, No 1, January 2012 wwwijcsiorg 18 Applying Geneic Algorihms for Invenory Lo-Sizing Problem wih Supplier Selecion under Sorage Capaciy

More information

MODULE - 9 LECTURE NOTES 2 GENETIC ALGORITHMS

MODULE - 9 LECTURE NOTES 2 GENETIC ALGORITHMS 1 MODULE - 9 LECTURE NOTES 2 GENETIC ALGORITHMS INTRODUCTION Mos real world opimizaion problems involve complexiies like discree, coninuous or mixed variables, muliple conflicing objecives, non-lineariy,

More information

Particle Swarm Optimization Combining Diversification and Intensification for Nonlinear Integer Programming Problems

Particle Swarm Optimization Combining Diversification and Intensification for Nonlinear Integer Programming Problems Paricle Swarm Opimizaion Combining Diversificaion and Inensificaion for Nonlinear Ineger Programming Problems Takeshi Masui, Masaoshi Sakawa, Kosuke Kao and Koichi Masumoo Hiroshima Universiy 1-4-1, Kagamiyama,

More information

Modal identification of structures from roving input data by means of maximum likelihood estimation of the state space model

Modal identification of structures from roving input data by means of maximum likelihood estimation of the state space model Modal idenificaion of srucures from roving inpu daa by means of maximum likelihood esimaion of he sae space model J. Cara, J. Juan, E. Alarcón Absrac The usual way o perform a forced vibraion es is o fix

More information

Longest Common Prefixes

Longest Common Prefixes Longes Common Prefixes The sandard ordering for srings is he lexicographical order. I is induced by an order over he alphabe. We will use he same symbols (,

More information

Particle Swarm Optimization

Particle Swarm Optimization Paricle Swarm Opimizaion Speaker: Jeng-Shyang Pan Deparmen of Elecronic Engineering, Kaohsiung Universiy of Applied Science, Taiwan Email: jspan@cc.kuas.edu.w 7/26/2004 ppso 1 Wha is he Paricle Swarm Opimizaion

More information

Cryptanalysis of RAKAPOSHI Stream Cipher

Cryptanalysis of RAKAPOSHI Stream Cipher Crypanalysis of RAKAPOSHI Sream Cipher Lin Ding, Jie Guan Zhengzhou Informaion Science and Technology Insiue, China E-mail: dinglin_cipher@63.com; guanie7@63.com Absrac. RAKAPOSHI is a hardware oriened

More information

STATE-SPACE MODELLING. A mass balance across the tank gives:

STATE-SPACE MODELLING. A mass balance across the tank gives: B. Lennox and N.F. Thornhill, 9, Sae Space Modelling, IChemE Process Managemen and Conrol Subjec Group Newsleer STE-SPACE MODELLING Inroducion: Over he pas decade or so here has been an ever increasing

More information

CHAPTER 10 VALIDATION OF TEST WITH ARTIFICAL NEURAL NETWORK

CHAPTER 10 VALIDATION OF TEST WITH ARTIFICAL NEURAL NETWORK 175 CHAPTER 10 VALIDATION OF TEST WITH ARTIFICAL NEURAL NETWORK 10.1 INTRODUCTION Amongs he research work performed, he bes resuls of experimenal work are validaed wih Arificial Neural Nework. From he

More information

Section 3.5 Nonhomogeneous Equations; Method of Undetermined Coefficients

Section 3.5 Nonhomogeneous Equations; Method of Undetermined Coefficients Secion 3.5 Nonhomogeneous Equaions; Mehod of Undeermined Coefficiens Key Terms/Ideas: Linear Differenial operaor Nonlinear operaor Second order homogeneous DE Second order nonhomogeneous DE Soluion o homogeneous

More information

An introduction to the theory of SDDP algorithm

An introduction to the theory of SDDP algorithm An inroducion o he heory of SDDP algorihm V. Leclère (ENPC) Augus 1, 2014 V. Leclère Inroducion o SDDP Augus 1, 2014 1 / 21 Inroducion Large scale sochasic problem are hard o solve. Two ways of aacking

More information

20. Applications of the Genetic-Drift Model

20. Applications of the Genetic-Drift Model 0. Applicaions of he Geneic-Drif Model 1) Deermining he probabiliy of forming any paricular combinaion of genoypes in he nex generaion: Example: If he parenal allele frequencies are p 0 = 0.35 and q 0

More information

Robust estimation based on the first- and third-moment restrictions of the power transformation model

Robust estimation based on the first- and third-moment restrictions of the power transformation model h Inernaional Congress on Modelling and Simulaion, Adelaide, Ausralia, 6 December 3 www.mssanz.org.au/modsim3 Robus esimaion based on he firs- and hird-momen resricions of he power ransformaion Nawaa,

More information

Li An-Ping. Beijing , P.R.China

Li An-Ping. Beijing , P.R.China A NEW TYPE OF CIPHER: DICING_CSB Li An-Ping Beijing 100085, P.R.China apli0001@sina.com Absrac: In his paper, we will propose a new ype of cipher named DICING_CSB, which come from our previous a synchronous

More information

Class Meeting # 10: Introduction to the Wave Equation

Class Meeting # 10: Introduction to the Wave Equation MATH 8.5 COURSE NOTES - CLASS MEETING # 0 8.5 Inroducion o PDEs, Fall 0 Professor: Jared Speck Class Meeing # 0: Inroducion o he Wave Equaion. Wha is he wave equaion? The sandard wave equaion for a funcion

More information

Air Traffic Forecast Empirical Research Based on the MCMC Method

Air Traffic Forecast Empirical Research Based on the MCMC Method Compuer and Informaion Science; Vol. 5, No. 5; 0 ISSN 93-8989 E-ISSN 93-8997 Published by Canadian Cener of Science and Educaion Air Traffic Forecas Empirical Research Based on he MCMC Mehod Jian-bo Wang,

More information

A Framework for Efficient Document Ranking Using Order and Non Order Based Fitness Function

A Framework for Efficient Document Ranking Using Order and Non Order Based Fitness Function A Framework for Efficien Documen Ranking Using Order and Non Order Based Finess Funcion Hazra Imran, Adii Sharan Absrac One cenral problem of informaion rerieval is o deermine he relevance of documens

More information

Chapter 2. First Order Scalar Equations

Chapter 2. First Order Scalar Equations Chaper. Firs Order Scalar Equaions We sar our sudy of differenial equaions in he same way he pioneers in his field did. We show paricular echniques o solve paricular ypes of firs order differenial equaions.

More information

Some Basic Information about M-S-D Systems

Some Basic Information about M-S-D Systems Some Basic Informaion abou M-S-D Sysems 1 Inroducion We wan o give some summary of he facs concerning unforced (homogeneous) and forced (non-homogeneous) models for linear oscillaors governed by second-order,

More information

Learning Objectives: Practice designing and simulating digital circuits including flip flops Experience state machine design procedure

Learning Objectives: Practice designing and simulating digital circuits including flip flops Experience state machine design procedure Lab 4: Synchronous Sae Machine Design Summary: Design and implemen synchronous sae machine circuis and es hem wih simulaions in Cadence Viruoso. Learning Objecives: Pracice designing and simulaing digial

More information

Application of a Stochastic-Fuzzy Approach to Modeling Optimal Discrete Time Dynamical Systems by Using Large Scale Data Processing

Application of a Stochastic-Fuzzy Approach to Modeling Optimal Discrete Time Dynamical Systems by Using Large Scale Data Processing Applicaion of a Sochasic-Fuzzy Approach o Modeling Opimal Discree Time Dynamical Sysems by Using Large Scale Daa Processing AA WALASZE-BABISZEWSA Deparmen of Compuer Engineering Opole Universiy of Technology

More information

Applying Genetic Algorithms for Inventory Lot-Sizing Problem with Supplier Selection under Storage Space

Applying Genetic Algorithms for Inventory Lot-Sizing Problem with Supplier Selection under Storage Space Inernaional Journal of Indusrial and Manufacuring Engineering Applying Geneic Algorihms for Invenory Lo-Sizing Problem wih Supplier Selecion under Sorage Space Vichai Rungreunganaun and Chirawa Woarawichai

More information

Christos Papadimitriou & Luca Trevisan November 22, 2016

Christos Papadimitriou & Luca Trevisan November 22, 2016 U.C. Bereley CS170: Algorihms Handou LN-11-22 Chrisos Papadimiriou & Luca Trevisan November 22, 2016 Sreaming algorihms In his lecure and he nex one we sudy memory-efficien algorihms ha process a sream

More information

Georey E. Hinton. University oftoronto. Technical Report CRG-TR February 22, Abstract

Georey E. Hinton. University oftoronto.   Technical Report CRG-TR February 22, Abstract Parameer Esimaion for Linear Dynamical Sysems Zoubin Ghahramani Georey E. Hinon Deparmen of Compuer Science Universiy oftorono 6 King's College Road Torono, Canada M5S A4 Email: zoubin@cs.orono.edu Technical

More information

Orientation. Connections between network coding and stochastic network theory. Outline. Bruce Hajek. Multicast with lost packets

Orientation. Connections between network coding and stochastic network theory. Outline. Bruce Hajek. Multicast with lost packets Connecions beween nework coding and sochasic nework heory Bruce Hajek Orienaion On Thursday, Ralf Koeer discussed nework coding: coding wihin he nework Absrac: Randomly generaed coded informaion blocks

More information

10. State Space Methods

10. State Space Methods . Sae Space Mehods. Inroducion Sae space modelling was briefly inroduced in chaper. Here more coverage is provided of sae space mehods before some of heir uses in conrol sysem design are covered in he

More information

Ensamble methods: Boosting

Ensamble methods: Boosting Lecure 21 Ensamble mehods: Boosing Milos Hauskrech milos@cs.pi.edu 5329 Senno Square Schedule Final exam: April 18: 1:00-2:15pm, in-class Term projecs April 23 & April 25: a 1:00-2:30pm in CS seminar room

More information

EXPLICIT TIME INTEGRATORS FOR NONLINEAR DYNAMICS DERIVED FROM THE MIDPOINT RULE

EXPLICIT TIME INTEGRATORS FOR NONLINEAR DYNAMICS DERIVED FROM THE MIDPOINT RULE Version April 30, 2004.Submied o CTU Repors. EXPLICIT TIME INTEGRATORS FOR NONLINEAR DYNAMICS DERIVED FROM THE MIDPOINT RULE Per Krysl Universiy of California, San Diego La Jolla, California 92093-0085,

More information

Diebold, Chapter 7. Francis X. Diebold, Elements of Forecasting, 4th Edition (Mason, Ohio: Cengage Learning, 2006). Chapter 7. Characterizing Cycles

Diebold, Chapter 7. Francis X. Diebold, Elements of Forecasting, 4th Edition (Mason, Ohio: Cengage Learning, 2006). Chapter 7. Characterizing Cycles Diebold, Chaper 7 Francis X. Diebold, Elemens of Forecasing, 4h Ediion (Mason, Ohio: Cengage Learning, 006). Chaper 7. Characerizing Cycles Afer compleing his reading you should be able o: Define covariance

More information

Section 4.4 Logarithmic Properties

Section 4.4 Logarithmic Properties Secion. Logarihmic Properies 59 Secion. Logarihmic Properies In he previous secion, we derived wo imporan properies of arihms, which allowed us o solve some asic eponenial and arihmic equaions. Properies

More information

Analytical Solutions of an Economic Model by the Homotopy Analysis Method

Analytical Solutions of an Economic Model by the Homotopy Analysis Method Applied Mahemaical Sciences, Vol., 26, no. 5, 2483-249 HIKARI Ld, www.m-hikari.com hp://dx.doi.org/.2988/ams.26.6688 Analyical Soluions of an Economic Model by he Homoopy Analysis Mehod Jorge Duare ISEL-Engineering

More information

Technical Report Doc ID: TR March-2013 (Last revision: 23-February-2016) On formulating quadratic functions in optimization models.

Technical Report Doc ID: TR March-2013 (Last revision: 23-February-2016) On formulating quadratic functions in optimization models. Technical Repor Doc ID: TR--203 06-March-203 (Las revision: 23-Februar-206) On formulaing quadraic funcions in opimizaion models. Auhor: Erling D. Andersen Convex quadraic consrains quie frequenl appear

More information

Section 4.4 Logarithmic Properties

Section 4.4 Logarithmic Properties Secion. Logarihmic Properies 5 Secion. Logarihmic Properies In he previous secion, we derived wo imporan properies of arihms, which allowed us o solve some asic eponenial and arihmic equaions. Properies

More information

Chapter 2. Models, Censoring, and Likelihood for Failure-Time Data

Chapter 2. Models, Censoring, and Likelihood for Failure-Time Data Chaper 2 Models, Censoring, and Likelihood for Failure-Time Daa William Q. Meeker and Luis A. Escobar Iowa Sae Universiy and Louisiana Sae Universiy Copyrigh 1998-2008 W. Q. Meeker and L. A. Escobar. Based

More information

Task-based Configuration Optimization of Modular and Reconfigurable Robots using a Multi-solution Inverse Kinematics Solver

Task-based Configuration Optimization of Modular and Reconfigurable Robots using a Multi-solution Inverse Kinematics Solver CARV 2007 Task-based Configuraion Opimizaion of Modular and Reconfigurable Robos using a Muli-soluion Inverse Kinemaics Solver S. Tabandeh 1, C. Clark 2, W. Melek 3 Absrac: Modular and Reconfigurable Robos

More information

Shiva Akhtarian MSc Student, Department of Computer Engineering and Information Technology, Payame Noor University, Iran

Shiva Akhtarian MSc Student, Department of Computer Engineering and Information Technology, Payame Noor University, Iran Curren Trends in Technology and Science ISSN : 79-055 8hSASTech 04 Symposium on Advances in Science & Technology-Commission-IV Mashhad, Iran A New for Sofware Reliabiliy Evaluaion Based on NHPP wih Imperfec

More information

Spring Ammar Abu-Hudrouss Islamic University Gaza

Spring Ammar Abu-Hudrouss Islamic University Gaza Chaper 7 Reed-Solomon Code Spring 9 Ammar Abu-Hudrouss Islamic Universiy Gaza ١ Inroducion A Reed Solomon code is a special case of a BCH code in which he lengh of he code is one less han he size of he

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION SUPPLEMENTARY INFORMATION DOI: 0.038/NCLIMATE893 Temporal resoluion and DICE * Supplemenal Informaion Alex L. Maren and Sephen C. Newbold Naional Cener for Environmenal Economics, US Environmenal Proecion

More information

LAB 5: Computer Simulation of RLC Circuit Response using PSpice

LAB 5: Computer Simulation of RLC Circuit Response using PSpice --3LabManualLab5.doc LAB 5: ompuer imulaion of RL ircui Response using Ppice PURPOE To use a compuer simulaion program (Ppice) o invesigae he response of an RL series circui o: (a) a sinusoidal exciaion.

More information

Chapter 8 The Complete Response of RL and RC Circuits

Chapter 8 The Complete Response of RL and RC Circuits Chaper 8 The Complee Response of RL and RC Circuis Seoul Naional Universiy Deparmen of Elecrical and Compuer Engineering Wha is Firs Order Circuis? Circuis ha conain only one inducor or only one capacior

More information

More Digital Logic. t p output. Low-to-high and high-to-low transitions could have different t p. V in (t)

More Digital Logic. t p output. Low-to-high and high-to-low transitions could have different t p. V in (t) EECS 4 Spring 23 Lecure 2 EECS 4 Spring 23 Lecure 2 More igial Logic Gae delay and signal propagaion Clocked circui elemens (flip-flop) Wriing a word o memory Simplifying digial circuis: Karnaugh maps

More information

Ensamble methods: Bagging and Boosting

Ensamble methods: Bagging and Boosting Lecure 21 Ensamble mehods: Bagging and Boosing Milos Hauskrech milos@cs.pi.edu 5329 Senno Square Ensemble mehods Mixure of expers Muliple base models (classifiers, regressors), each covers a differen par

More information

Online Appendix to Solution Methods for Models with Rare Disasters

Online Appendix to Solution Methods for Models with Rare Disasters Online Appendix o Soluion Mehods for Models wih Rare Disasers Jesús Fernández-Villaverde and Oren Levinal In his Online Appendix, we presen he Euler condiions of he model, we develop he pricing Calvo block,

More information

3.1.3 INTRODUCTION TO DYNAMIC OPTIMIZATION: DISCRETE TIME PROBLEMS. A. The Hamiltonian and First-Order Conditions in a Finite Time Horizon

3.1.3 INTRODUCTION TO DYNAMIC OPTIMIZATION: DISCRETE TIME PROBLEMS. A. The Hamiltonian and First-Order Conditions in a Finite Time Horizon 3..3 INRODUCION O DYNAMIC OPIMIZAION: DISCREE IME PROBLEMS A. he Hamilonian and Firs-Order Condiions in a Finie ime Horizon Define a new funcion, he Hamilonian funcion, H. H he change in he oal value of

More information

Rapid Termination Evaluation for Recursive Subdivision of Bezier Curves

Rapid Termination Evaluation for Recursive Subdivision of Bezier Curves Rapid Terminaion Evaluaion for Recursive Subdivision of Bezier Curves Thomas F. Hain School of Compuer and Informaion Sciences, Universiy of Souh Alabama, Mobile, AL, U.S.A. Absrac Bézier curve flaening

More information

A DELAY-DEPENDENT STABILITY CRITERIA FOR T-S FUZZY SYSTEM WITH TIME-DELAYS

A DELAY-DEPENDENT STABILITY CRITERIA FOR T-S FUZZY SYSTEM WITH TIME-DELAYS A DELAY-DEPENDENT STABILITY CRITERIA FOR T-S FUZZY SYSTEM WITH TIME-DELAYS Xinping Guan ;1 Fenglei Li Cailian Chen Insiue of Elecrical Engineering, Yanshan Universiy, Qinhuangdao, 066004, China. Deparmen

More information

Logic in computer science

Logic in computer science Logic in compuer science Logic plays an imporan role in compuer science Logic is ofen called he calculus of compuer science Logic plays a similar role in compuer science o ha played by calculus in he physical

More information

Chapter 3 Boundary Value Problem

Chapter 3 Boundary Value Problem Chaper 3 Boundary Value Problem A boundary value problem (BVP) is a problem, ypically an ODE or a PDE, which has values assigned on he physical boundary of he domain in which he problem is specified. Le

More information

RC, RL and RLC circuits

RC, RL and RLC circuits Name Dae Time o Complee h m Parner Course/ Secion / Grade RC, RL and RLC circuis Inroducion In his experimen we will invesigae he behavior of circuis conaining combinaions of resisors, capaciors, and inducors.

More information

2. Nonlinear Conservation Law Equations

2. Nonlinear Conservation Law Equations . Nonlinear Conservaion Law Equaions One of he clear lessons learned over recen years in sudying nonlinear parial differenial equaions is ha i is generally no wise o ry o aack a general class of nonlinear

More information

) were both constant and we brought them from under the integral.

) were both constant and we brought them from under the integral. YIELD-PER-RECRUIT (coninued The yield-per-recrui model applies o a cohor, bu we saw in he Age Disribuions lecure ha he properies of a cohor do no apply in general o a collecion of cohors, which is wha

More information

Retrieval Models. Boolean and Vector Space Retrieval Models. Common Preprocessing Steps. Boolean Model. Boolean Retrieval Model

Retrieval Models. Boolean and Vector Space Retrieval Models. Common Preprocessing Steps. Boolean Model. Boolean Retrieval Model 1 Boolean and Vecor Space Rerieval Models Many slides in his secion are adaped from Prof. Joydeep Ghosh (UT ECE) who in urn adaped hem from Prof. Dik Lee (Univ. of Science and Tech, Hong Kong) Rerieval

More information

A New Perturbative Approach in Nonlinear Singularity Analysis

A New Perturbative Approach in Nonlinear Singularity Analysis Journal of Mahemaics and Saisics 7 (: 49-54, ISSN 549-644 Science Publicaions A New Perurbaive Approach in Nonlinear Singulariy Analysis Ta-Leung Yee Deparmen of Mahemaics and Informaion Technology, The

More information

An Invariance for (2+1)-Extension of Burgers Equation and Formulae to Obtain Solutions of KP Equation

An Invariance for (2+1)-Extension of Burgers Equation and Formulae to Obtain Solutions of KP Equation Commun Theor Phys Beijing, China 43 2005 pp 591 596 c Inernaional Academic Publishers Vol 43, No 4, April 15, 2005 An Invariance for 2+1-Eension of Burgers Equaion Formulae o Obain Soluions of KP Equaion

More information

Linear Response Theory: The connection between QFT and experiments

Linear Response Theory: The connection between QFT and experiments Phys540.nb 39 3 Linear Response Theory: The connecion beween QFT and experimens 3.1. Basic conceps and ideas Q: How do we measure he conduciviy of a meal? A: we firs inroduce a weak elecric field E, and

More information

Cryptanalysis of Reduced NORX initially discussed at ASK 2016

Cryptanalysis of Reduced NORX initially discussed at ASK 2016 Crypanalysis of Reduced NORX iniiy discussed a ASK 2016 Nasour Bagheri (SRTTU, Iran), Tao Huang (NTU, Singaopre), Keing Jia (Tsinghua Univ., Sae Key Lab, China), Florian Mendel (TUGraz, Ausria), Yu Sasaki

More information

The field of mathematics has made tremendous impact on the study of

The field of mathematics has made tremendous impact on the study of A Populaion Firing Rae Model of Reverberaory Aciviy in Neuronal Neworks Zofia Koscielniak Carnegie Mellon Universiy Menor: Dr. G. Bard Ermenrou Universiy of Pisburgh Inroducion: The field of mahemaics

More information

Stability and Bifurcation in a Neural Network Model with Two Delays

Stability and Bifurcation in a Neural Network Model with Two Delays Inernaional Mahemaical Forum, Vol. 6, 11, no. 35, 175-1731 Sabiliy and Bifurcaion in a Neural Nework Model wih Two Delays GuangPing Hu and XiaoLing Li School of Mahemaics and Physics, Nanjing Universiy

More information

Single and Double Pendulum Models

Single and Double Pendulum Models Single and Double Pendulum Models Mah 596 Projec Summary Spring 2016 Jarod Har 1 Overview Differen ypes of pendulums are used o model many phenomena in various disciplines. In paricular, single and double

More information

4.1 Other Interpretations of Ridge Regression

4.1 Other Interpretations of Ridge Regression CHAPTER 4 FURTHER RIDGE THEORY 4. Oher Inerpreaions of Ridge Regression In his secion we will presen hree inerpreaions for he use of ridge regression. The firs one is analogous o Hoerl and Kennard reasoning

More information

STUDY ON VELOCITY CLAMPING IN PSO USING CEC`13 BENCHMARK

STUDY ON VELOCITY CLAMPING IN PSO USING CEC`13 BENCHMARK STUDY ON VELOCITY CLAMPING IN PSO USING CEC`13 BENCHMARK Michal Pluhacek, Roman Senkerik, Adam Vikorin and Tomas Kadavy Tomas Baa Universiy in Zlin, Faculy of Applied Informaics Nam T.G. Masaryka 5555,

More information

( ) = Q 0. ( ) R = R dq. ( t) = I t

( ) = Q 0. ( ) R = R dq. ( t) = I t ircuis onceps The addiion of a simple capacior o a circui of resisors allows wo relaed phenomena o occur The observaion ha he ime-dependence of a complex waveform is alered by he circui is referred o as

More information

2.7. Some common engineering functions. Introduction. Prerequisites. Learning Outcomes

2.7. Some common engineering functions. Introduction. Prerequisites. Learning Outcomes Some common engineering funcions 2.7 Inroducion This secion provides a caalogue of some common funcions ofen used in Science and Engineering. These include polynomials, raional funcions, he modulus funcion

More information

The Potential Effectiveness of the Detection of Pulsed Signals in the Non-Uniform Sampling

The Potential Effectiveness of the Detection of Pulsed Signals in the Non-Uniform Sampling The Poenial Effeciveness of he Deecion of Pulsed Signals in he Non-Uniform Sampling Arhur Smirnov, Sanislav Vorobiev and Ajih Abraham 3, 4 Deparmen of Compuer Science, Universiy of Illinois a Chicago,

More information

Removing Useless Productions of a Context Free Grammar through Petri Net

Removing Useless Productions of a Context Free Grammar through Petri Net Journal of Compuer Science 3 (7): 494-498, 2007 ISSN 1549-3636 2007 Science Publicaions Removing Useless Producions of a Conex Free Grammar hrough Peri Ne Mansoor Al-A'ali and Ali A Khan Deparmen of Compuer

More information

Final Spring 2007

Final Spring 2007 .615 Final Spring 7 Overview The purpose of he final exam is o calculae he MHD β limi in a high-bea oroidal okamak agains he dangerous n = 1 exernal ballooning-kink mode. Effecively, his corresponds o

More information

Two Coupled Oscillators / Normal Modes

Two Coupled Oscillators / Normal Modes Lecure 3 Phys 3750 Two Coupled Oscillaors / Normal Modes Overview and Moivaion: Today we ake a small, bu significan, sep owards wave moion. We will no ye observe waves, bu his sep is imporan in is own

More information

Multi-component Levi Hierarchy and Its Multi-component Integrable Coupling System

Multi-component Levi Hierarchy and Its Multi-component Integrable Coupling System Commun. Theor. Phys. (Beijing, China) 44 (2005) pp. 990 996 c Inernaional Academic Publishers Vol. 44, No. 6, December 5, 2005 uli-componen Levi Hierarchy and Is uli-componen Inegrable Coupling Sysem XIA

More information

Notes on Kalman Filtering

Notes on Kalman Filtering Noes on Kalman Filering Brian Borchers and Rick Aser November 7, Inroducion Daa Assimilaion is he problem of merging model predicions wih acual measuremens of a sysem o produce an opimal esimae of he curren

More information

Basilio Bona ROBOTICA 03CFIOR 1

Basilio Bona ROBOTICA 03CFIOR 1 Indusrial Robos Kinemaics 1 Kinemaics and kinemaic funcions Kinemaics deals wih he sudy of four funcions (called kinemaic funcions or KFs) ha mahemaically ransform join variables ino caresian variables

More information

Pade and Laguerre Approximations Applied. to the Active Queue Management Model. of Internet Protocol

Pade and Laguerre Approximations Applied. to the Active Queue Management Model. of Internet Protocol Applied Mahemaical Sciences, Vol. 7, 013, no. 16, 663-673 HIKARI Ld, www.m-hikari.com hp://dx.doi.org/10.1988/ams.013.39499 Pade and Laguerre Approximaions Applied o he Acive Queue Managemen Model of Inerne

More information

Content-Based Shape Retrieval Using Different Shape Descriptors: A Comparative Study Dengsheng Zhang and Guojun Lu

Content-Based Shape Retrieval Using Different Shape Descriptors: A Comparative Study Dengsheng Zhang and Guojun Lu Conen-Based Shape Rerieval Using Differen Shape Descripors: A Comparaive Sudy Dengsheng Zhang and Guojun Lu Gippsland School of Compuing and Informaion Technology Monash Universiy Churchill, Vicoria 3842

More information

Ensemble Confidence Estimates Posterior Probability

Ensemble Confidence Estimates Posterior Probability Ensemble Esimaes Poserior Probabiliy Michael Muhlbaier, Aposolos Topalis, and Robi Polikar Rowan Universiy, Elecrical and Compuer Engineering, Mullica Hill Rd., Glassboro, NJ 88, USA {muhlba6, opali5}@sudens.rowan.edu

More information

Structural Break Detection in Time Series Models

Structural Break Detection in Time Series Models Srucural Break Deecion in Time Series Models Richard A. Davis Thomas Lee Gabriel Rodriguez-Yam Colorado Sae Universiy (hp://www.sa.colosae.edu/~rdavis/lecures) This research suppored in par by an IBM faculy

More information

CHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING

CHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING ISPRS Commission VII Mid-erm Symposium "Remoe Sensing: From Pixels o Processes", Enschede, he Neherlands, 8-11 May 2006 CHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING Sharaf Alkheder,

More information

0.1 MAXIMUM LIKELIHOOD ESTIMATION EXPLAINED

0.1 MAXIMUM LIKELIHOOD ESTIMATION EXPLAINED 0.1 MAXIMUM LIKELIHOOD ESTIMATIO EXPLAIED Maximum likelihood esimaion is a bes-fi saisical mehod for he esimaion of he values of he parameers of a sysem, based on a se of observaions of a random variable

More information

Analyze patterns and relationships. 3. Generate two numerical patterns using AC

Analyze patterns and relationships. 3. Generate two numerical patterns using AC envision ah 2.0 5h Grade ah Curriculum Quarer 1 Quarer 2 Quarer 3 Quarer 4 andards: =ajor =upporing =Addiional Firs 30 Day 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 andards: Operaions and Algebraic Thinking

More information

Variational Iteration Method for Solving System of Fractional Order Ordinary Differential Equations

Variational Iteration Method for Solving System of Fractional Order Ordinary Differential Equations IOSR Journal of Mahemaics (IOSR-JM) e-issn: 2278-5728, p-issn: 2319-765X. Volume 1, Issue 6 Ver. II (Nov - Dec. 214), PP 48-54 Variaional Ieraion Mehod for Solving Sysem of Fracional Order Ordinary Differenial

More information

ERROR LOCATING CODES AND EXTENDED HAMMING CODE. Pankaj Kumar Das. 1. Introduction and preliminaries

ERROR LOCATING CODES AND EXTENDED HAMMING CODE. Pankaj Kumar Das. 1. Introduction and preliminaries MATEMATIČKI VESNIK MATEMATIQKI VESNIK 70, 1 (2018), 89 94 March 2018 research paper originalni nauqni rad ERROR LOCATING CODES AND EXTENDED HAMMING CODE Pankaj Kumar Das Absrac. Error-locaing codes, firs

More information

23.5. Half-Range Series. Introduction. Prerequisites. Learning Outcomes

23.5. Half-Range Series. Introduction. Prerequisites. Learning Outcomes Half-Range Series 2.5 Inroducion In his Secion we address he following problem: Can we find a Fourier series expansion of a funcion defined over a finie inerval? Of course we recognise ha such a funcion

More information

Lecture 2-1 Kinematics in One Dimension Displacement, Velocity and Acceleration Everything in the world is moving. Nothing stays still.

Lecture 2-1 Kinematics in One Dimension Displacement, Velocity and Acceleration Everything in the world is moving. Nothing stays still. Lecure - Kinemaics in One Dimension Displacemen, Velociy and Acceleraion Everyhing in he world is moving. Nohing says sill. Moion occurs a all scales of he universe, saring from he moion of elecrons in

More information

Sliding Mode Controller for Unstable Systems

Sliding Mode Controller for Unstable Systems S. SIVARAMAKRISHNAN e al., Sliding Mode Conroller for Unsable Sysems, Chem. Biochem. Eng. Q. 22 (1) 41 47 (28) 41 Sliding Mode Conroller for Unsable Sysems S. Sivaramakrishnan, A. K. Tangirala, and M.

More information

3.1 More on model selection

3.1 More on model selection 3. More on Model selecion 3. Comparing models AIC, BIC, Adjused R squared. 3. Over Fiing problem. 3.3 Sample spliing. 3. More on model selecion crieria Ofen afer model fiing you are lef wih a handful of

More information

Navneet Saini, Mayank Goyal, Vishal Bansal (2013); Term Project AML310; Indian Institute of Technology Delhi

Navneet Saini, Mayank Goyal, Vishal Bansal (2013); Term Project AML310; Indian Institute of Technology Delhi Creep in Viscoelasic Subsances Numerical mehods o calculae he coefficiens of he Prony equaion using creep es daa and Herediary Inegrals Mehod Navnee Saini, Mayank Goyal, Vishal Bansal (23); Term Projec

More information

ADDITIONAL PROBLEMS (a) Find the Fourier transform of the half-cosine pulse shown in Fig. 2.40(a). Additional Problems 91

ADDITIONAL PROBLEMS (a) Find the Fourier transform of the half-cosine pulse shown in Fig. 2.40(a). Additional Problems 91 ddiional Problems 9 n inverse relaionship exiss beween he ime-domain and freuency-domain descripions of a signal. Whenever an operaion is performed on he waveform of a signal in he ime domain, a corresponding

More information

12: AUTOREGRESSIVE AND MOVING AVERAGE PROCESSES IN DISCRETE TIME. Σ j =

12: AUTOREGRESSIVE AND MOVING AVERAGE PROCESSES IN DISCRETE TIME. Σ j = 1: AUTOREGRESSIVE AND MOVING AVERAGE PROCESSES IN DISCRETE TIME Moving Averages Recall ha a whie noise process is a series { } = having variance σ. The whie noise process has specral densiy f (λ) = of

More information

The expectation value of the field operator.

The expectation value of the field operator. The expecaion value of he field operaor. Dan Solomon Universiy of Illinois Chicago, IL dsolom@uic.edu June, 04 Absrac. Much of he mahemaical developmen of quanum field heory has been in suppor of deermining

More information

Improved Approximate Solutions for Nonlinear Evolutions Equations in Mathematical Physics Using the Reduced Differential Transform Method

Improved Approximate Solutions for Nonlinear Evolutions Equations in Mathematical Physics Using the Reduced Differential Transform Method Journal of Applied Mahemaics & Bioinformaics, vol., no., 01, 1-14 ISSN: 179-660 (prin), 179-699 (online) Scienpress Ld, 01 Improved Approimae Soluions for Nonlinear Evoluions Equaions in Mahemaical Physics

More information

Physics 235 Chapter 2. Chapter 2 Newtonian Mechanics Single Particle

Physics 235 Chapter 2. Chapter 2 Newtonian Mechanics Single Particle Chaper 2 Newonian Mechanics Single Paricle In his Chaper we will review wha Newon s laws of mechanics ell us abou he moion of a single paricle. Newon s laws are only valid in suiable reference frames,

More information

KINEMATICS IN ONE DIMENSION

KINEMATICS IN ONE DIMENSION KINEMATICS IN ONE DIMENSION PREVIEW Kinemaics is he sudy of how hings move how far (disance and displacemen), how fas (speed and velociy), and how fas ha how fas changes (acceleraion). We say ha an objec

More information

Lab 10: RC, RL, and RLC Circuits

Lab 10: RC, RL, and RLC Circuits Lab 10: RC, RL, and RLC Circuis In his experimen, we will invesigae he behavior of circuis conaining combinaions of resisors, capaciors, and inducors. We will sudy he way volages and currens change in

More information

Matlab and Python programming: how to get started

Matlab and Python programming: how to get started Malab and Pyhon programming: how o ge sared Equipping readers he skills o wrie programs o explore complex sysems and discover ineresing paerns from big daa is one of he main goals of his book. In his chaper,

More information

Anonymity in Shared Symmetric Key Primitives

Anonymity in Shared Symmetric Key Primitives Anonymiy in Shared Symmeric Key Primiives Gregory M. Zaverucha and Douglas R. Sinson David R. Cherion School of Compuer Science Universiy of Waerloo Waerloo ON, N2L 3G1, Canada {gzaveruc, dsinson}@uwaerloo.ca

More information

ACE 562 Fall Lecture 4: Simple Linear Regression Model: Specification and Estimation. by Professor Scott H. Irwin

ACE 562 Fall Lecture 4: Simple Linear Regression Model: Specification and Estimation. by Professor Scott H. Irwin ACE 56 Fall 005 Lecure 4: Simple Linear Regression Model: Specificaion and Esimaion by Professor Sco H. Irwin Required Reading: Griffihs, Hill and Judge. "Simple Regression: Economic and Saisical Model

More information