PARASITIC COMPUTING: PROBLEMS AND ETHICAL

Size: px
Start display at page:

Download "PARASITIC COMPUTING: PROBLEMS AND ETHICAL"

Transcription

1 ISSN International Journal of Advance Research, IJOAR.org Volume 1, Issue 11, November 2013, Online: ISSN PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION Abstract Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program.the paper takes a look at the ethical issues of parasitic computing and suggest a look into the current operation of the internet TCP/IP. Keyword: parasitic computing, internet, TCP/IP

2 ISSN Introduction Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program. In this model, which we call `parasitic computing ; one machine forces target computers to solve a piece of a complex computational problem merely by them in standard communication. Consequently, the target computers are unaware that they have performed computation for the benefit of a commanding node. As experimental evidence of the principle of parasitic computing, we harness the power of several web servers across the globe, whichunknown to them-work together to solve an NP complete problem. Unlike `cracking' (breaking into a computer) or computer viruses, however, parasitic computing does not compromise the security of the targeted servers, and accesses only those parts of the servers that have been made explicitly available for Internet communication. Like the S e a r c h f o r E x t r a t e r r e s t r i a l I n t e l l i g e n c e SETI@home project Philips(1999), parasitic computing decomposes a complex problem into computations that can be evaluated independently and solved by computers connected to the Internet; unlike the SETI project, however, i T h e d i s t r i b u t e d c o m p u t i n g u t i l i z e d i n S E T I i n v o l v e s v o l u n t e e r s f r o m a r o u n d t h e w o r l d w h o a l l o w t h e i r l o c a l c o m p u t e r s t o b e u s e d f o r o n g o i n g a n a l y s i s o f v a s t a m o u n t s o f d a t a o b t a i n e d f r o m a r a d i o t e l e s c o p e c o n s t a n t l y s c a n n i n g t h e h e a v e n s. S E T I a l l o w s a n y o n e w i t h a co m p u t e r a n d I n t e r n e t c o n n e c t i o n t o d o w n l o a d s o f t w a r e t h a t w i l l r e a d a n d a n a l y z e s m a l l p o r t i o n s o f t h e a c c u m u l a t e d d a t a. I n e f f e c t, S E T I h a s c r e a t e d a s u p e r c o m p u t e r f r o m m i l l i o n s o f i n d i v i d u a l c o m p u t e r s w o r k i n g i n c o n c e r t. i t does so without the knowledge of the participating servers.(robert et al,2003) This is a type of distributed computing technique known as parasitic computing invented by computer scientists of the University of Notre Dame and questions its practice ethically. In August 2001, four researchers at the University of Notre Dame Albert László Barabási, Vincent W. Freeh, Hawoong Jeong and Jay B. Brockman invented a very sophisticated computing technique known as parasitic computing based upon this behavior of TCP/IP (Barabási, Freeh, Jeong, & Brockman, 2001). A reliable communication over internet via TCP/IP is a complex process and requires a significant amount of computation to validate the integrity of the datagram being sent and received between two nodes. The integrity of a data segment is maintained by validating the result of certain operations on the bytes of 16 bit Checksum field in its TCP packet. Figure below displays a TCP pseudo header with 16 bit checksum field starting at bit offset 224.

3 ISSN TCP checksum function C h e c k s u m i s t h a t p a r t o f T C P l a y e r o p e r a t i o n t h a t i s r e s p o n s i b l e f o r i n s u r i n g i n t e g r i t y o f p a c k e t d a t a b e i n g s e n t o v e r t h e I n t e r n e t. B e f o r e a p a c k e t i s r e l e a s e d t o t h e I P l a y e r ( s e e F i g. 1 ) o f t h e s e n d i n g c o m p u t e r, T C P d i v i d e s t h e p a c k e t i n f o r m a t i o n i n t o a s e r i e s o f b i t w o r d s a n d t h e n c r e a t e s a o n e s c o m p l e m e n t b i n a r y s u m o f t h e s e w o r d s. T h e r e s u l t i n g s o - c a l l e d c h e c k s u m v a l u e i s a u n i q u e r e p r e s e n t a t i o n o f t h e t o t a l i t y o f i n f o r m a t i o n i n t h a t p a c k e t. T h e b i t - w i s e b i n a r y c o m p l e m e n t o f t h i s c h e c k s u m i s t h e n s t o r e d i n t h e T C P h e a d e r b e f o r e t h e p a c k e t i s s e n t. W h e n t h e p a c k e t a r r i v e s a t t h e r e c e i v i n g c o m p u t e r, t h e T C P l a y e r t h e r e p e r f o r m s i t s o w n b i n a r y s u m o f a l l t h e i n f o r m a t i o n i n t h e p a c k e t i n c l u d i n g t h e c h e c k s u m c o m p l e m e n t. I f t h e p a c k e t w a s r e c e i v e d w i t h o u t c o r r u p t i o n, t h e r e s u l t a n t s u m s h o u l d b e a b i t v a l u e w i t h a l l b i t s e q u a l t o 1 s i n c e t h e original c h e c k s u m ( i. e., t h e t o t a l a r r i v e d a t b y t h e s e n d i n g c o m p u t e r ) a n d i t s e x a c t c o m p l e m e n t w o u l d b e a d d e d t o g e t h e r f o r m i n g a u n i t a r y v a l u e ( B a r a b a s i, e t a l., ). I f t h i s o c c u r s, t h e p a c k e t i s r e t a i n e d a s g o o d a n d i s p a s s e d t o t h e a p p l i c a t i o n l a y e r f o r a c t i o n ; i f n o t, t h e p a c k e t i s d r o p p e d a n d T C P w a i t s f o r a p r e - a r r a n g e d r e t r a n s m i s s i o n o f t h e p a c k e t b y t h e s e n d i n g c o m p u t e r. F r e e h ( ) i n d i c a t e s, t h e T C P c h e c k s u m f u n c t i o n p e r f o r m e d b y t h e r e c e i v i n g c o m p u t e r i s, i n e s s e n c e, a f u n d a m e n t a l a d d - a n d - c o m p a r e p r o c e d u r e, w h i c h f o r m s t h e b a s i s f o r a n y o t h e r B o o l e a n o r a r i t h m e t i c o p e r a t i o n. A s a c o n s e q u e n c e, T C P c a n b e e x p l o i t e d t o p e r f o r m c o m p u t a t i o n s w i t h o u t i n v a d i n g ( i. e., h a c k i n g o r c r a c k i n g i n t o ) t h o s e s y s t e m s i n d u c e d t o p a r t i c i p a t e ( B a r a b a s i, e t. a l, ;

4 ISSN F r e e h, ). I n t h i s s e n s e, t h e n, p a r a s i t i c c o m p u t i n g i s a n o n - i n v a s i v e f o r m o f c o v e r t e x p l o i t a t i o n t h a t d o e s n o t p e n e t r a t e b e y o n d t h e T C P / I P l a y e r s o f t h e h o s t. T h i s d i f f e r e n t i a t e s p a r a s i t i c c o m p u t i n g f r o m t h e o t h e r m e t h o d s d e s c r i b e d a b o v e f o r cap i t a l i z i n g o n I P - r e l a t e d v u l n e r a b i l i t i e s. Fig.1 Literature review How communication over internet via TCP/IP works Consider a scenario where a user is trying to visit a website. When user informs a browser the website URL (uniform resource locator), the browser opens a transmission control protocol (TCP) connection and connects to the web server. After establishing this connection, browser issues a hyper text transmission protocol (HTTP) request via already opened TCP connection. This TCP message is then carried to the destination (web server) via internet protocol (IP). In this process of transmitting message from source (user) to destination, IP might break entire message into several pieces commonly addressed as TCP packets. These packets are then transmitted to the destination IP address via different routes. Once the destination receives all packets, a response is returned to the source via the same TCP channel. The original message is then reassembled via consecutive steps involving TCP and IP and is interpreted as HTTP request. After that, the web server sends a response (webpage HTML) back to the user (CISCO). Thus, even such a simple communication over internet requires significant amount of computation at all network stages and only cooperation and trust between all involved parties can guarantee a successful communication over internet.

5 ISSN In parasitic computing, this trust based relationship of machines connected to the network is exploited to make other machines perform a certain mathematical operations on certain data without an authorization. Albert László, Vincent, Hawoong and Jay used a parasitic computer to solve the well known NP complete satisfiability problem, by engaging various web servers physically located in North America, Europe, and Asia, each of which unknowingly participated in the experiment Babarasi etal,2001. Like SETI@home project, parasitic computing decomposes a problem into several small problems which are mutually exclusive and can be solved independently via machines connected to the network. Parasitic computing can be a very effective technique when it comes to solve NP Complete problems such as Circuit SAT, 3 SAT, etc. These problems are currently considered as some of world s most complex and time consuming problems. These problems generally have a set of solutions which itself is a subset of a set of possible solutions. This behaviour can be described as the following: S {s1,s2,s3...sn}, n>0 Although any possible solution to such problems can be verified quickly, there is no known efficient way to identify a solution in the first place. In fact, the most notable characteristic for such problem is that there is no fast solution. The time required to solve such problem is exponentially proportional to the size of the problem. So, as the size of the problem grows, the time required to find all solutions of the problem grows exponentially. In fact, time required to solve a moderately large NP Complete problem can easily reach billions if nottrillions of years using any kind of modern computing technology we have available today. For this reason, even just determining whether there is a fast solution to such problems or not is one of the principal unsolved problems of computer science. Methodology Two computers communicating over the Internet, under disguise of a standard communications session. The first computer is attempting to solve a large and extremely difficult 3-SAT problem; it has decomposed the original 3-SAT problem in a considerable number of smaller problems. Each of these smaller problems is then encoded as a relation between a checksum and a packet such that whether the checksum is accurate or not is also the answer to that smaller problem. The packet/checksum is then sent to another computer. This computer will, as part of receiving the packet and deciding whether it is valid and wellformed, create a checksum of the packet and see whether it is identical to the provided checksum. If the checksum is invalid, it will then request a new packet from the original computer. The original computer now knows the answer to that smaller problem based on the second computer's response, and can transmit a fresh packet embodying a different subproblem. Eventually, all the sub-problems will be answered and the final answer easily calculated.

6 ISSN F i g u r e 1. L a y e r s o f t h e T C P / I P p r o t o c o l. A d a p t e d f r o m Fig 2.How parasitic computing works

7 ISSN Figure 3. Figure 2 describes how parasitic computing works. As described in figure 3.1, the parasitic computer starts the process by transmitting specially generated messages to number of targeted web servers consisting of arithmetic and logic unit (ALU) and a network interface (NIF). The packet carrying one of possible solutions to the problem is inserted into the IP level bypassing the parasitic node s TCP. This can be seen in figure 3.2. The parasitic computer generates a message in such a way that if the solution is not valid, it will fail the TCP checksum on the destination machine and the packet will be dropped. But in the case when the solution is correct, it will be propagated to the HTTP layer via TCP. Since it is a behavior of a web server to respond to any requests coming to an HTTP layer regardless of whether it understands the request or not, the web server will send a response back to the parasitic computer that it has received an HTTP request Mujal(2010). Thus the parasitic computer sends out a message for each possible solution as described in figure 3.1 with black arrow, it only receives responses back from the server when the possible solution is a one of the actual solutions of the problem. This is displayed with a red arrow in the figure 3.1

8 ISSN Ethical considerations Worms, Viruses, and Trojan Horses Exploitation of computing resources has taken many forms over the years, some more malicious than others. Perhaps the most notorious examples are those involving what is called malware, short for malicious software, designed to damage or disrupt a system (Wiggins, 2001). Malware often takes the form of worms, viruses or Trojan horses, problems that have become all too common in recent years and do not need to be explored further here. IP-related Vulnerabilities W i t h t h e a d v e n t o f n e t w o r k i n g, a n d t h e a t t e n d a n t i n c r e a s e i n e m a i l u s a g e, m a n y o t h e r m e t h o d s b e c a m e a v a i l a b l e f o r g a i n i n g u n a u t h o r i z e d a c c e s s t o c o m p u t i n g r e s o u r c e s. W h i l e e m a i l s t i l l m a y b e t h e m o s t c o m m o n m e t h o d u s e d t o a c h i e v e t h e s p r e a d o f m a l w a r e ( W i g g i n s, ), c e r t a i n f o r m s o f c o v e r t e x p l o i t a t i o n a s s o c i a t e d w i t h v u l n e r a b i l i t i e s i n t h e T C P / I P p r o t o c o l h a v e b e e n k n o w n f o r s o m e t i m e. I P s p o o f i n g, d e n i a l s o f s e r v i c e, a n d c o v e r t c h a n n e l s. E a c h r e p r e s e n t s e x p l o i t a t i o n o f t h e t r u s t r e l a t i o n s h i p s B a r a b a s i e t a l. ( ) d e s c r i b e a s b e i n g i n h e r e n t i n t h e T C P / I P p r o t o c o l. IP spoofing, a s d e s c r i b e d b y V e l a s c o i s a m e t h o d w h e r e b y a p r o s p e c t i v e i n t r u d e r i m p e r s o n a t e s a t r u s t e d m e m b e r o f a n e t w o r k b y d i s c o v e r i n g i t s I P a d d r e s s a n d t h e n c o n s t r u c t i n g n e t w o r k p a c k e t s t h a t a p p e a r t o h a v e o r i g i n a t e d f r o m t h i s s o u r c e. i n t r u d e r s h a v e u s e d t h i s t e c h n i q u e t o e s t a b l i s h c o m m u n i c a t i o n s w i t h r e m o t e c o m p u t e r s, t h e r e b y p o t e n t i a l l y s p o o f i n g t h e m i n t o f u r t h e r v u l n e r a b i l i t i e s a n d / o r u n a u t h o r i z e d a c c e s s. Denials of DoS) i n v o l v e m a l i c i o u s a t t e m p t s t o d e g r a d e o r d i s r u p t t h e a c c e s s o f n e t w o r k

9 ISSN m e m b e r s t o a p a r t i c u l a r h o s t b y c o n s u m i n g t h e T C P / I P r e s o u r c e s o f t h e h o s t o r t h e b a n d w i d t h o f t h e n e t w o r k i t s e l f. D e n i a l o f s e r v i c e u s u a l l y e x p l o i t T C P / I P t r u s t a n d a l s o n o r m a l l y i n v o l v e s o m e e f f o r t t o c o n c e a l t h e i d e n t i t y o f t h e p e r p e t r a t o r. B y t h e i r o w n a d m i s s i o n, B a r a b a s i e t a l. ( ) w e r e a w a r e o f t h e e t h i c a l i s s u e s i n v o l v e d i n t h e i r d e m o n s t r a t i o n o f p a r a s i t i c c o m p u t i n g. O n t h e p r o j e c t w e b s i t e t h e y s t a t e : " P a r a s i t i c c o m p u t i n g r a i s e s i m p o r t a n t q u e s t i o n s a b o u t t h e o w n e r s h i p o f t h e r e s o u r c e s c o n n e c t e d t o t h e I n t e r n e t a n d c h a l l e n g e s c u r r e n t c o m p u t i n g p a r a d i g m s R o b e r t ( ) Since most of the computers connected to the network will be using TCP/IP, the resources available to the parasitic computer are virtually unlimited and almost all of the computer can be exploited. Furthermore, there is a very high possibility that servers can allocate their valuable CPU cycles to do the processing commanded by the parasitic node thus degrading overall performance of the applications running on the server and access efforts of the normal application user similar to that in the Denial of Service attack (DoS). Ganti & Xiao, 2008). In order for this technique to be widely accepted, potential users need to answer some important ethical questions. the speed at which this technique is capable of solving NP Complete problems is thrilling! But what about the possibility of a DoS (unintentional or intentional) attack as discussed above? Another ethical questions like what if terrorists gain their expertise on this technique? But the final question I would like to ask is: just like we patch security holes in our applications, is this possibly a time to rethink a better and more secured protocol for communication over the internet? Shouldn t the security of underlying internet protocols used by billions of users worldwide have equal priority for its updates and patches if not higher than any of normal applications? U n d e r t h e r u b r i c o f I n t e r n e t E t h i c s a r e b a s i c a l l y v a r i a n t s o f o l d e r e t h i c a l i s s u e s ( e. g., 1. T h e f t 2. C o p y r i g h t i n f r i n g e m e n t 3. I n v a s i o n o f p r i v a c y ) d i s g u i s e d i n m o d e r n - d a y ( i. e., e l e c t r o n i c o r d i g i t a l ) c l o t h i n g ( R o b e r t, ) T h e e t h i c a l g r a y a r e a h e r e a r i s e s f r o m t h e f a c t t h a t t h e s p e c i f i c h o s t r e s o u r c e s t a r g e t e d b y t h e p a r a s i t e a l r e a d y w e r e p a r t o f t h e p u b l i c d o m a i n b y v i r t u e o f b e i n g a t t a c h e d t o t h e I n t e r n e t. M o r e o v e r, t h e s e r e s o u r c e s

10 ISSN w e r e n o t i n s t i g a t e d t o d o a n y t h i n g m a l i c i o u s o r e v e n o u t o f t h e o r d i n a r y. H o w e v e r, t h e u s e s t o w h i c h t h e h o s t r e s o u r c e s w e r e p u t b y t h e p a r a s i t e c l e a r l y w e r e n o t s a n c t i o n e d i n a n y e x p l i c i t w a y b y t h e h o s t o w n e r s. In a white paper published by the Computer Ethics Institute, Barquin (1992) presented what he called the Ten Commandments of Computer Ethics, which amounts to a list of moral imperatives to guide ethical behavior related to the use of computing and information technology resources. These guidelines have become fairly well known and have been endorsed by other professional societies (e.g., Computer Professionals for Social Responsibility, 2001). Barquin s commandments overlap with similar strictures contained in a statement published by the Association for Computing Machinery entitled the ACM Code of Ethics and Professional Conduct (Association for Computing Machinery, 1992). For purposes of the present discussion, certain of Barquin s commandments appear directly relevant to the ethics of parasitic computing. Thou shalt not use a computer to harm others or interfere with their computer work These imperatives, abstracted from Commandments 1 and 2, clearly position as unethical any form of malware or other type of covert exploitation of computer resources with harmful purpose or consequences. Benign forms of exploitation without mal-intent, like the Barabasi et al. (2001) demonstration of parasitic computing, would seem under this mandate to be an instance of no harm, no foul. One difficulty here, however, lies with the assessment of harm. Directly harmful effects to a user as a result of someone else s covert exploitation are one thing, but indirect consequences may be quite another. Conclusion We can t deny patch security holes in our applications, is this possibly a time to rethink a better of transmitting information and more secured protocol for communication over the internet. References 1.Parasitic Computing by Munjal Patel,January 30, Barabási, A. L., Freeh, V. W., Jeong, H., & Brockman, J. B. (2001, August 30). Parasitic computing. letters to nature, 412, pp Phillips, D. T. (1999, May 23). ET, phone SETI@home! Retrieved January 20, 2010, from NASA: 4. Parasitic Computing Seminar by:kunal Goswami 05IT6006

11 ISSN Ganti, R. K., & Xiao, L. (2008). Detection of Parasitic Computing. Indiana: University of Notre Dame. 6. R o b e r t N. B a r g e r a n d C h a r l e s R. C r o w e l l, T H E E T H I C S O F P A R A S I T I C C O M P U T I N G : F A I R U S E O R A B U S E O F T C P / I P O V E R T H E I N T E R N E T? C o m p u t e r A p p l i c a t i o n s P r o g r a m U n i v e r s i t y o f N o t r e D a m e, N o t r e D a m e, I N S E T h o m e. ( ). R e t r i e v e d S e p t e m b e r 9, , o n t h e W o r l d W i d e W e b : h t t p : / / s e t i a t h o m e. s s l. b e r k e l e y. e d u / 8. S t e v e n s, W. R. ( ). TCP/IP Illustrated, Volume 1. R e a d i n g, M A : A d d i s o n - W e s l e y. 9. W i g g i n s, G. ( ). L i v i n g w i t h m a l w a r e. S a n s I n s t i t u t e F r e e h, V. W. ( ). A n a t o m y o f a P a r a s i t i c C o m p u t e r. Dr. Dobb's Journal, J a n u a r y, A s s o c i a t i o n f o r C o m p u t i n g M a c h i n e r y. ( ). A C M C o d e o f E t h i c s a n d P r o f e s s i o n a l C o n d u c t 1 2. B a r q u i n, R. C. ( ). I n p u r s u i t o f a t e n c o m m a n d m e n t s f o r c o m p u t e r e t h i c s. C o m p u t e r E t h i c s I n s t i t u t e

Broadband Internet Access Disclosure

Broadband Internet Access Disclosure Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided

More information

Dynamic Silicon Firewall

Dynamic Silicon Firewall Dynamic Silicon Firewall A Thesis Submitted to the College of Graduate Studies and Research in Partial Fulfillment of the Requirements for the degree of Master of Science in the Department of Electrical

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information

Distributed systems Lecture 4: Clock synchronisation; logical clocks. Dr Robert N. M. Watson

Distributed systems Lecture 4: Clock synchronisation; logical clocks. Dr Robert N. M. Watson Distributed systems Lecture 4: Clock synchronisation; logical clocks Dr Robert N. M. Watson 1 Last time Started to look at time in distributed systems Coordinating actions between processes Physical clocks

More information

Overlay Transport Virtualization (OTV) Unicast-Mode Transport Infrastructure Deployment

Overlay Transport Virtualization (OTV) Unicast-Mode Transport Infrastructure Deployment Overlay Transport Virtualization (OTV) Unicast-Mode Transport Infrastructure Deployment July 24, 2012 ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, "DESIGNS")

More information

Homework 4 for Modular Arithmetic: The RSA Cipher

Homework 4 for Modular Arithmetic: The RSA Cipher Homework 4 for Modular Arithmetic: The RSA Cipher Gregory V. Bard April 25, 2018 This is a practice workbook for the RSA cipher. It is not suitable for learning the RSA cipher from scratch. However, there

More information

(Updated February 17, 2006) Laszlo B. Kish.

(Updated February 17, 2006) Laszlo B. Kish. Response to Bollinger's "On the Impossibility of Keeping Out Eavesdroppers Using Only Classical Physics" and to Some Other Comments at Bruce Schneier's Blog Sites (Updated February 17, 2006) Laszlo B.

More information

Telecommunication Services Engineering (TSE) Lab. Chapter IX Presence Applications and Services.

Telecommunication Services Engineering (TSE) Lab. Chapter IX Presence Applications and Services. Chapter IX Presence Applications and Services http://users.encs.concordia.ca/~glitho/ Outline 1. Basics 2. Interoperability 3. Presence service in clouds Basics 1 - IETF abstract model 2 - An example of

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

Secret sharing schemes

Secret sharing schemes Secret sharing schemes Martin Stanek Department of Computer Science Comenius University stanek@dcs.fmph.uniba.sk Cryptology 1 (2017/18) Content Introduction Shamir s secret sharing scheme perfect secret

More information

Networked Control Systems

Networked Control Systems Networked Control Systems Simulation & Analysis J.J.C. van Schendel DCT 2008.119 Traineeship report March till June 2008 Coaches: Supervisor TU/e: Prof. Dr. D. Nesic, University of Melbourne Dr. M. Tabbara,

More information

Outline. EECS Components and Design Techniques for Digital Systems. Lec 18 Error Coding. In the real world. Our beautiful digital world.

Outline. EECS Components and Design Techniques for Digital Systems. Lec 18 Error Coding. In the real world. Our beautiful digital world. Outline EECS 150 - Components and esign Techniques for igital Systems Lec 18 Error Coding Errors and error models Parity and Hamming Codes (SECE) Errors in Communications LFSRs Cyclic Redundancy Check

More information

A Technique for Importing Shapefile to Mobile Device in a Distributed System Environment.

A Technique for Importing Shapefile to Mobile Device in a Distributed System Environment. A Technique for Importing Shapefile to Mobile Device in a Distributed System Environment. 1 Manish Srivastava, 2 Atul Verma, 3 Kanika Gupta 1 Academy of Business Engineering and Sciences,Ghaziabad, 201001,India

More information

Introduction to Cryptography Lecture 13

Introduction to Cryptography Lecture 13 Introduction to Cryptography Lecture 13 Benny Pinkas June 5, 2011 Introduction to Cryptography, Benny Pinkas page 1 Electronic cash June 5, 2011 Introduction to Cryptography, Benny Pinkas page 2 Simple

More information

R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H.

R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. 5 S O F T W A R E E N G I N E E R I N G B Y S O M M E R V I L L E S E

More information

Dan Boneh. Introduction. Course Overview

Dan Boneh. Introduction. Course Overview Online Cryptography Course Introduction Course Overview Welcome Course objectives: Learn how crypto primitives work Learn how to use them correctly and reason about security My recommendations: Take notes

More information

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks G. Mohan, M. Ashish, and K. Akash Department of Electrical and Computer Engineering National University

More information

17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9.

17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9. ( c ) E p s t e i n, C a r t e r, B o l l i n g e r, A u r i s p a C h a p t e r 17: I n f o r m a t i o n S c i e n c e P a g e 1 CHAPTER 17: Information Science 17.1 Binary Codes Normal numbers we use

More information

Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies

Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies Jun Dai, Xiaoyan Sun, and Peng Liu College of Information Sciences and Technology Pennsylvania State University,

More information

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015 L7. Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang, 5 March 2015 1 Outline The basic foundation: multiplicative group modulo prime The basic Diffie-Hellman (DH) protocol The discrete logarithm

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

IEEE C /058r3

IEEE C /058r3 Project Title IEEE 802.16 Broadband Wireless Access Working Group MAC support and the general structure of the Coexistence Protocol messages Date Submitted 2006-07-13 Source(s)

More information

Distributed Systems Principles and Paradigms. Chapter 06: Synchronization

Distributed Systems Principles and Paradigms. Chapter 06: Synchronization Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 06: Synchronization Version: November 16, 2009 2 / 39 Contents Chapter

More information

These are special traffic patterns that create more stress on a switch

These are special traffic patterns that create more stress on a switch Myths about Microbursts What are Microbursts? Microbursts are traffic patterns where traffic arrives in small bursts. While almost all network traffic is bursty to some extent, storage traffic usually

More information

T H R EAT S A R E H I D I N G I N E N C RY P T E D T R A F F I C O N YO U R N E T W O R K

T H R EAT S A R E H I D I N G I N E N C RY P T E D T R A F F I C O N YO U R N E T W O R K 1 T H R EAT S A R E H I D I N G I N E N C RY P T E D T R A F F I C O N YO U R N E T W O R K Manoj Sharma Technical Director Symantec Corp Mark Sanders Lead Security Architect Venafi T H R E A T S A R E

More information

T H R EAT S A R E H I D I N G I N E N C RY P T E D T R A F F I C O N YO U R N E T WO R K

T H R EAT S A R E H I D I N G I N E N C RY P T E D T R A F F I C O N YO U R N E T WO R K 1 T H R EAT S A R E H I D I N G I N E N C RY P T E D T R A F F I C O N YO U R N E T WO R K Manoj Sharma Technical Director Symantec Corp Mark Sanders Lead Security Architect Venafi T H R E A T S A R E

More information

Notes 10: Public-key cryptography

Notes 10: Public-key cryptography MTH6115 Cryptography Notes 10: Public-key cryptography In this section we look at two other schemes that have been proposed for publickey ciphers. The first is interesting because it was the earliest such

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

2.6 Complexity Theory for Map-Reduce. Star Joins 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51

2.6 Complexity Theory for Map-Reduce. Star Joins 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51 Star Joins A common structure for data mining of commercial data is the star join. For example, a chain store like Walmart keeps a fact table whose tuples each

More information

EP2200 Course Project 2017 Project II - Mobile Computation Offloading

EP2200 Course Project 2017 Project II - Mobile Computation Offloading EP2200 Course Project 2017 Project II - Mobile Computation Offloading 1 Introduction Queuing theory provides us a very useful mathematic tool that can be used to analytically evaluate the performance of

More information

Universal Semantic Communication

Universal Semantic Communication Universal Semantic Communication Madhu Sudan MIT CSAIL Joint work with Brendan Juba (MIT). An fantasy setting (SETI) Alice 010010101010001111001000 No common language! Is meaningful communication possible?

More information

Economic and Social Council 2 July 2015

Economic and Social Council 2 July 2015 ADVANCE UNEDITED VERSION UNITED NATIONS E/C.20/2015/11/Add.1 Economic and Social Council 2 July 2015 Committee of Experts on Global Geospatial Information Management Fifth session New York, 5-7 August

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension

Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension CS 294 Secure Computation February 16 and 18, 2016 Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension Instructor: Sanjam Garg Scribe: Alex Irpan 1 Overview Garbled circuits

More information

Time in Distributed Systems: Clocks and Ordering of Events

Time in Distributed Systems: Clocks and Ordering of Events Time in Distributed Systems: Clocks and Ordering of Events Clocks in Distributed Systems Needed to Order two or more events happening at same or different nodes (Ex: Consistent ordering of updates at different

More information

Coordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1.

Coordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1. Coordination Failures and Consensus If the solution to availability and scalability is to decentralize and replicate functions and data, how do we coordinate the nodes? data consistency update propagation

More information

Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks

Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks 1 Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks Michael Albert michael.albert@cs.otago.ac.nz 2 This week Arithmetic Knapsack cryptosystems Attacks on knapsacks Some

More information

Computer Networks ( Classroom Practice Booklet Solutions)

Computer Networks ( Classroom Practice Booklet Solutions) Computer Networks ( Classroom Practice Booklet Solutions). Concept Of Layering 0. Ans: (b) Sol: Data Link Layer is responsible for decoding bit stream into frames. 0. Ans: (c) Sol: Network Layer has the

More information

The Liar Game. Mark Wildon

The Liar Game. Mark Wildon The Liar Game Mark Wildon Guessing Games Ask a friend to thinks of a number between 0 and 15. How many NO/YES questions do you need to ask to find out the secret number? Guessing Games Ask a friend to

More information

An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits

An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits Peter Jacko YEQT III November 20, 2009 Basque Center for Applied Mathematics (BCAM), Bilbao, Spain Example: Congestion

More information

Lecture 1: Introduction to Public key cryptography

Lecture 1: Introduction to Public key cryptography Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means

More information

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech + Quantum Entanglement and Cryptography Deepthi Gopal, Caltech + Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts

More information

2018/1 The integration of statistical and geospatial information. The Regional Committee of UN-GGIM: Americas:

2018/1 The integration of statistical and geospatial information. The Regional Committee of UN-GGIM: Americas: The following are the conclusions and recommendations of the Regional Committee of the United Nations on Global Geospatial Information Management for the Americas, during its Fifth Session, Thursday 8

More information

Private and Verifiable Interdomain Routing Decisions. Proofs of Correctness

Private and Verifiable Interdomain Routing Decisions. Proofs of Correctness Technical Report MS-CIS-12-10 Private and Verifiable Interdomain Routing Decisions Proofs of Correctness Mingchen Zhao University of Pennsylvania Andreas Haeberlen University of Pennsylvania Wenchao Zhou

More information

- Why aren t there more quantum algorithms? - Quantum Programming Languages. By : Amanda Cieslak and Ahmana Tarin

- Why aren t there more quantum algorithms? - Quantum Programming Languages. By : Amanda Cieslak and Ahmana Tarin - Why aren t there more quantum algorithms? - Quantum Programming Languages By : Amanda Cieslak and Ahmana Tarin Why aren t there more quantum algorithms? there are only a few problems for which quantum

More information

Elliptic Curves and an Application in Cryptography

Elliptic Curves and an Application in Cryptography Parabola Volume 54, Issue 1 (2018) Elliptic Curves and an Application in Cryptography Jeremy Muskat 1 Abstract Communication is no longer private, but rather a publicly broadcast signal for the entire

More information

Slides for Chapter 14: Time and Global States

Slides for Chapter 14: Time and Global States Slides for Chapter 14: Time and Global States From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, Addison-Wesley 2012 Overview of Chapter Introduction Clocks,

More information

Multimedia Systems WS 2010/2011

Multimedia Systems WS 2010/2011 Multimedia Systems WS 2010/2011 15.11.2010 M. Rahamatullah Khondoker (Room # 36/410 ) University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY http://www.icsy.de

More information

Introduction to ArcGIS Server Development

Introduction to ArcGIS Server Development Introduction to ArcGIS Server Development Kevin Deege,, Rob Burke, Kelly Hutchins, and Sathya Prasad ESRI Developer Summit 2008 1 Schedule Introduction to ArcGIS Server Rob and Kevin Questions Break 2:15

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

Redesde Computadores(RCOMP)

Redesde Computadores(RCOMP) Redesde Computadores(RCOMP) Theoretical-Practical (TP) Lesson 12 2016/2017 Exam style practical exercise. (IPv4 networks dimensioning; static routeing tables design; CISCO IOS Access Control Lists) Instituto

More information

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling On Centralized Smooth Scheduling Ami Litman January 25, 2005 Abstract Shiri Moran-Schein This paper studies evenly distributed sets of natural numbers and their applications to scheduling in a centralized

More information

Socket Programming. Daniel Zappala. CS 360 Internet Programming Brigham Young University

Socket Programming. Daniel Zappala. CS 360 Internet Programming Brigham Young University Socket Programming Daniel Zappala CS 360 Internet Programming Brigham Young University Sockets, Addresses, Ports Clients and Servers 3/33 clients request a service from a server using a protocol need an

More information

MATH 3283W L A TEX project template

MATH 3283W L A TEX project template MATH 3283W L A TEX project template Your Name Spring 208 Section Title The odds are that you won t need sections in your writing project, but this template includes a few section headers, so that you can

More information

Distributed Systems Fundamentals

Distributed Systems Fundamentals February 17, 2000 ECS 251 Winter 2000 Page 1 Distributed Systems Fundamentals 1. Distributed system? a. What is it? b. Why use it? 2. System Architectures a. minicomputer mode b. workstation model c. processor

More information

An object-oriented design process. Weather system description. Layered architecture. Process stages. System context and models of use

An object-oriented design process. Weather system description. Layered architecture. Process stages. System context and models of use An object-oriented design process Process stages Structured design processes involve developing a number of different system models. They require a lot of effort for development and maintenance of these

More information

Number Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers

Number Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers Number Theory: Applications Number Theory Applications Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Results from Number Theory have many applications

More information

Password Cracking: The Effect of Bias on the Average Guesswork of Hash Functions

Password Cracking: The Effect of Bias on the Average Guesswork of Hash Functions Password Cracking: The Effect of Bias on the Average Guesswork of Hash Functions Yair Yona, and Suhas Diggavi, Fellow, IEEE Abstract arxiv:608.0232v4 [cs.cr] Jan 207 In this work we analyze the average

More information

( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1

( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1 ( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r 2 0 1 6 C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1 CHAPTER 17: Information Science In this chapter, we learn how data can

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distributed Systems Principles and Paradigms Chapter 6 (version April 7, 28) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.2. Tel: (2)

More information

Lecture 19: Interactive Proofs and the PCP Theorem

Lecture 19: Interactive Proofs and the PCP Theorem Lecture 19: Interactive Proofs and the PCP Theorem Valentine Kabanets November 29, 2016 1 Interactive Proofs In this model, we have an all-powerful Prover (with unlimited computational prover) and a polytime

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 19 November 8, 2017 CPSC 467, Lecture 19 1/37 Zero Knowledge Interactive Proofs (ZKIP) ZKIP for graph isomorphism Feige-Fiat-Shamir

More information

Fundamentals of Modern Cryptography

Fundamentals of Modern Cryptography Fundamentals of Modern Cryptography BRUCE MOMJIAN This presentation explains the fundamentals of modern cryptographic methods. Creative Commons Attribution License http://momjian.us/presentations Last

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.2: Error Detection & Correction Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

COMP9334: Capacity Planning of Computer Systems and Networks

COMP9334: Capacity Planning of Computer Systems and Networks COMP9334: Capacity Planning of Computer Systems and Networks Week 2: Operational analysis Lecturer: Prof. Sanjay Jha NETWORKS RESEARCH GROUP, CSE, UNSW Operational analysis Operational: Collect performance

More information

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Introduction Main Results Simulation Conclusions Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi joint work with H. Inaltekin, W. Shin, H. V. Poor, and

More information

An Entropy-Based Approach to Detecting Covert Timing Channels

An Entropy-Based Approach to Detecting Covert Timing Channels 1 An Entropy-Based Approach to Detecting Covert Timing Channels Steven Gianvecchio and Haining Wang Abstract The detection of covert timing channels is of increasing interest in light of recent exploits

More information

CHAPTER 3 RESEARCH METHODOLOGY

CHAPTER 3 RESEARCH METHODOLOGY CHAPTER 3 RESEARCH METHODOLOGY 3.1 INTRODUCTION The research methodology plays an important role in implementing the research and validating the results. Therefore, this research methodology is derived

More information

AN INTRODUCTION TO THE UNDERLYING COMPUTATIONAL PROBLEM OF THE ELGAMAL CRYPTOSYSTEM

AN INTRODUCTION TO THE UNDERLYING COMPUTATIONAL PROBLEM OF THE ELGAMAL CRYPTOSYSTEM AN INTRODUCTION TO THE UNDERLYING COMPUTATIONAL PROBLEM OF THE ELGAMAL CRYPTOSYSTEM VORA,VRUSHANK APPRENTICE PROGRAM Abstract. This paper will analyze the strengths and weaknesses of the underlying computational

More information

Agreement. Today. l Coordination and agreement in group communication. l Consensus

Agreement. Today. l Coordination and agreement in group communication. l Consensus Agreement Today l Coordination and agreement in group communication l Consensus Events and process states " A distributed system a collection P of N singlethreaded processes w/o shared memory Each process

More information

Distributed Systems. Time, Clocks, and Ordering of Events

Distributed Systems. Time, Clocks, and Ordering of Events Distributed Systems Time, Clocks, and Ordering of Events Björn Franke University of Edinburgh 2016/2017 Today Last lecture: Basic Algorithms Today: Time, clocks, NTP Ref: CDK Causality, ordering, logical

More information

Classical Verification of Quantum Computations

Classical Verification of Quantum Computations Classical Verification of Quantum Computations Urmila Mahadev UC Berkeley September 12, 2018 Classical versus Quantum Computers Can a classical computer verify a quantum computation? Classical output (decision

More information

Lectures 1&2: Introduction to Secure Computation, Yao s and GMW Protocols

Lectures 1&2: Introduction to Secure Computation, Yao s and GMW Protocols CS 294 Secure Computation January 19, 2016 Lectures 1&2: Introduction to Secure Computation, Yao s and GMW Protocols Instructor: Sanjam Garg Scribe: Pratyush Mishra 1 Introduction Secure multiparty computation

More information

Proving Ultimate Limitations on Computers. Stephen Cook Presented at Classroom Adventures in Mathematics: Summer Institute August 17, 2011

Proving Ultimate Limitations on Computers. Stephen Cook Presented at Classroom Adventures in Mathematics: Summer Institute August 17, 2011 Proving Ultimate Limitations on Computers Stephen Cook Presented at Classroom Adventures in Mathematics: Summer Institute August 17, 2011 1 Computational Complexity This is a branch of mathematics that

More information

A Prototype of a Web Mapping System Architecture for the Arctic Region

A Prototype of a Web Mapping System Architecture for the Arctic Region A Prototype of a Web Mapping System Architecture for the Arctic Region Han-Fang Tsai 1, Chih-Yuan Huang 2, and Steve Liang 3 GeoSensorWeb Laboratory, Department of Geomatics Engineering, University of

More information

An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks

An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks Igor M. Moraes, Daniel de O. Cunha, Marco D. D. Bicudo, Rafael P. Laufer, and Otto Carlos M. B.

More information

Quantum technology popular science description

Quantum technology popular science description Quantum technology popular science description 1 Quantum physics, from theory to ongoing revolution In the early 1900s observations were made that were not consistent with traditional, classical physics.

More information

Enabling ENVI. ArcGIS for Server

Enabling ENVI. ArcGIS for Server Enabling ENVI throughh ArcGIS for Server 1 Imagery: A Unique and Valuable Source of Data Imagery is not just a base map, but a layer of rich information that can address problems faced by GIS users. >

More information

FlowSpec. Frédéric Gabut-Deloraine. FRnOG - 2 décembre 2011 NEO TELECOMS

FlowSpec. Frédéric Gabut-Deloraine. FRnOG - 2 décembre 2011 NEO TELECOMS FlowSpec Frédéric Gabut-Deloraine NEO TELECOMS FRnOG - 2 décembre 2011 Introduction Dissemination of Flow Specification Rules D(D)oS filtering Regular use Easy to disseminate Agenda Background Forwarding

More information

Congestion Control. Topics

Congestion Control. Topics Congestion Control Topics Congestion control what & why? Current congestion control algorithms TCP and UDP Ideal congestion control Resource allocation Distributed algorithms Relation current algorithms

More information

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Total points: 40 Homework 1 - Solutions Out: 10/4, Due: 10/11 Solutions 1. Two-dimensional parity Given below is a series of 7 7-bit items of data, with an additional bit each

More information

Terms and Conditions of Participation. for the Goethe-Institut's "Advent Calendar 2018" lottery at and Instagram

Terms and Conditions of Participation. for the Goethe-Institut's Advent Calendar 2018 lottery at   and Instagram Terms and Conditions of Participation for the Goethe-Institut's "Advent Calendar 2018" lottery at www.goethe.de and Instagram 01.12.2018 until 24.12.2018 1. Contest 1.1 The Goethe Institut conducts the

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

CS 3411 Systems Programming

CS 3411 Systems Programming CS 3411 Systems Programming Department of Computer Science Michigan Technological University Sockets Today's Topics New Way of Communicating Between Processes Sockets Standard" Unix Processes/IPC IPC stands

More information

MASTER THESIS. Development and Testing of Index Policies in Internet Routers

MASTER THESIS. Development and Testing of Index Policies in Internet Routers Universidad del País Vasco / Euskal Herriko Unibertsitatea MASTER THESIS Development and Testing of Index Policies in Internet Routers Author: Josu Doncel Advisor: Peter Jacko Urtzi Ayesta Leioa, September

More information

Universal Semantic Communication

Universal Semantic Communication Universal Semantic Communication Madhu Sudan MIT CSAIL Joint work with Brendan Juba (MIT CSAIL). An fantasy setting (SETI) Alice 010010101010001111001000 No common language! Is meaningful communication

More information

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min JetMax: Scalable Max-Min Min Congestion Control for High- Speed Heterogeneous Networks Yueping Zhang Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer Science

More information

IE418 Integer Programming

IE418 Integer Programming IE418: Integer Programming Department of Industrial and Systems Engineering Lehigh University 2nd February 2005 Boring Stuff Extra Linux Class: 8AM 11AM, Wednesday February 9. Room??? Accounts and Passwords

More information

P vs. NP. Data Structures and Algorithms CSE AU 1

P vs. NP. Data Structures and Algorithms CSE AU 1 P vs. NP Data Structures and Algorithms CSE 373-18AU 1 Goals for today Define P, NP, and NP-complete Explain the P vs. NP problem -why it s the biggest open problem in CS. -And what to do when a problem

More information

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Ethernet Frame Format 7 b y te s 1 b y te 2 o r 6 b y te s 2 o r 6 b y te s 2 b y te s 4-1 5 0 0 b y te s 4 b y te s P r e a m b le S ta r t F r

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

Secure Control Against Replay Attacks

Secure Control Against Replay Attacks Secure Control Against Replay Attacks Bruno Sinopoli, Yilin Mo Department of Electrical and Computer Engineering, Carnegie Mellon Trust Autumn 2009 Conference Bruno Sinopoli (Carnegie Mellon) Secure Control

More information

GIS for Crime Analysis. Building Better Analysis Capabilities with the ArcGIS Platform

GIS for Crime Analysis. Building Better Analysis Capabilities with the ArcGIS Platform GIS for Crime Analysis Building Better Analysis Capabilities with the ArcGIS Platform Crime Analysis The Current State One of the foundations of criminological theory is that three things are needed for

More information

Everglades Country Club. FREE Wi-Fi Access

Everglades Country Club. FREE Wi-Fi Access Everglades Country Club FREE Wi-Fi Access TERMS AND CONDITIONS Welcome to Everglades Country Club (ABN 86 000 196 501) (Everglades Country Club) Free Internet Hotspot (Hotspot). This Hotspot is provided

More information

SCIENCE OF TSUNAMI HAZARDS

SCIENCE OF TSUNAMI HAZARDS SCIENCE OF TSUNAMI HAZARDS ISSN 8755-6839 Journal of Tsunami Society International Volume 32 Number 1 2013 THE FRENCH TSUNAMI WARNING CENTER FOR THE MEDITERRANEAN AND NORTHEAST ATLANTIC: CENALT P. Roudil,

More information

Attacks on RSA & Using Asymmetric Crypto

Attacks on RSA & Using Asymmetric Crypto Attacks on RSA & Using Asymmetric Crypto Luke Anderson luke@lukeanderson.com.au 7 th April 2017 University Of Sydney Overview 1. Crypto-Bulletin 2. Breaking RSA 2.1 Chinese Remainder Theorem 2.2 Common

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 3 January 22, 2013 CPSC 467b, Lecture 3 1/35 Perfect secrecy Caesar cipher Loss of perfection Classical ciphers One-time pad Affine

More information

Expand the Quantum Cipher-text Space by Using a Superposition Key

Expand the Quantum Cipher-text Space by Using a Superposition Key International Journal of Computer Networks and Communications Security VOL. 3, NO. 7, JULY 2015, 283 290 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Expand the

More information

Counting. 1 Sum Rule. Example 1. Lecture Notes #1 Sept 24, Chris Piech CS 109

Counting. 1 Sum Rule. Example 1. Lecture Notes #1 Sept 24, Chris Piech CS 109 1 Chris Piech CS 109 Counting Lecture Notes #1 Sept 24, 2018 Based on a handout by Mehran Sahami with examples by Peter Norvig Although you may have thought you had a pretty good grasp on the notion of

More information

arxiv: v1 [cs.dc] 26 Nov 2018

arxiv: v1 [cs.dc] 26 Nov 2018 The SNOW Theorem Revisited Kishori M Konwar, Wyatt Lloyd, Haonan Lu, Nancy Lynch November 27, 2018 arxiv:1811.10577v1 [cs.dc] 26 Nov 2018 Abstract In highly-scalable storage systems for Web services, data

More information