Quantum Key Search with Side Channel Advice
|
|
- Luke O’Brien’
- 5 years ago
- Views:
Transcription
1 Quantum Key Search with Side Channel Advice D Martin 1, A Montanaro 1, E Oswald 1 and D Shepherd 2 1 University of Bristol 2 National Cyber Security Centre 18 th August 2017 Quantum Key Search with Side Channel Advice Slide 1 of 12
2 Classical Cryptography A x y O k Quantum Key Search with Side Channel Advice Slide 2 of 12
3 Practical Cryptography L(k, x; r) A x y O k Quantum Key Search with Side Channel Advice Slide 3 of 12
4 Post-Quantum Cryptography A x y O k Quantum Key Search with Side Channel Advice Slide 4 of 12
5 Key Enumeration Definition: Distinguishing Vector k = (k 1,, k m ) k i {1,, n} w, n by m matrix output by side channel distinguisher w j,i Z + represents likelihood k i takes value j (smaller most likely) Score of a key is then m i=1 w k i,i Definition: Key Enumeration Given an n m weight matrix w and e Z, output the e keys with the lowest weights (breaking ties arbitrarily) Quantum Key Search with Side Channel Advice Slide 5 of 12
6 Key Enumeration Definition: Distinguishing Vector k = (k 1,, k m ) k i {1,, n} w, n by m matrix output by side channel distinguisher w j,i Z + represents likelihood k i takes value j (smaller most likely) Score of a key is then m i=1 w k i,i Definition: Key Enumeration Given an n m weight matrix w and e Z, output the e keys with the lowest weights (breaking ties arbitrarily) Quantum Key Search with Side Channel Advice Slide 5 of 12
7 Key Enumeration Example k k k w i,j k m n 1 n Figure : Score vectors for m key chunks Each subkey can take values from 1 to n, and scores w i,j are on a scale that depends on the side channel distinguisher Quantum Key Search with Side Channel Advice Slide 6 of 12
8 Key Enumeration Example k k k w i,j k m n 1 n Figure : Score vectors for m key chunks Each subkey can take values from 1 to n, and scores w i,j are on a scale that depends on the side channel distinguisher Quantum Key Search with Side Channel Advice Slide 6 of 12
9 Key Enumeration Example k k k w i,j k m n 1 n Figure : Score vectors for m key chunks Each subkey can take values from 1 to n, and scores w i,j are on a scale that depends on the side channel distinguisher Quantum Key Search with Side Channel Advice Slide 6 of 12
10 Key Enumeration Example k k k w i,j k m n 1 n Figure : Score vectors for m key chunks Each subkey can take values from 1 to n, and scores w i,j are on a scale that depends on the side channel distinguisher Quantum Key Search with Side Channel Advice Slide 6 of 12
11 Key Search Definition: Key Search Given an n m weight matrix w, a testing function T and e Z, output any k i, with i e, such that T(k i ) = 1 and k i would be output from enumeration, on input w and e If no such i exists output AES Testing Function T(x) = { 1 if AESx (m) = c 0 otherwise Quantum Key Search with Side Channel Advice Slide 7 of 12
12 Key Search Definition: Key Search Given an n m weight matrix w, a testing function T and e Z, output any k i, with i e, such that T(k i ) = 1 and k i would be output from enumeration, on input w and e If no such i exists output AES Testing Function T(x) = { 1 if AESx (m) = c 0 otherwise Quantum Key Search with Side Channel Advice Slide 7 of 12
13 A First Attempt - Grover s Algorithm Problem Definition Given N items x 1,, x N one of which is marked, return the marked item Time Complexity Classically: O(N) Grover s: O( N) Quantum Key Search with Side Channel Advice Slide 8 of 12
14 A First Attempt - Grover s Algorithm Problem Definition Given N items x 1,, x N one of which is marked, return the marked item Time Complexity Classically: O(N) Grover s: O( N) Quantum Key Search with Side Channel Advice Slide 8 of 12
15 A Second Attempt - Montanaro s Algorithm Problem Definition Given N items x 1,, x N, one of which is marked, and probabilities p 1,, p N return the marked item, where x i is the marked item with probability p i Expected Time Complexity Classically: O( N i=1 p i i) Montanaro s: O( N i=1 p i i) Algorithm Description 1 i 0 2 Select the next a i most likely x s 3 Pass them to Grover s 4 If item found return it, else increment i and repeat from 2 Quantum Key Search with Side Channel Advice Slide 9 of 12
16 A Second Attempt - Montanaro s Algorithm Problem Definition Given N items x 1,, x N, one of which is marked, and probabilities p 1,, p N return the marked item, where x i is the marked item with probability p i Expected Time Complexity Classically: O( N i=1 p i i) Montanaro s: O( N i=1 p i i) Algorithm Description 1 i 0 2 Select the next a i most likely x s 3 Pass them to Grover s 4 If item found return it, else increment i and repeat from 2 Quantum Key Search with Side Channel Advice Slide 9 of 12
17 A Second Attempt - Montanaro s Algorithm Problem Definition Given N items x 1,, x N, one of which is marked, and probabilities p 1,, p N return the marked item, where x i is the marked item with probability p i Expected Time Complexity Classically: O( N i=1 p i i) Montanaro s: O( N i=1 p i i) Algorithm Description 1 i 0 2 Select the next a i most likely x s 3 Pass them to Grover s 4 If item found return it, else increment i and repeat from 2 Quantum Key Search with Side Channel Advice Slide 9 of 12
18 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12
19 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12
20 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12
21 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12
22 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12
23 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12
24 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12
25 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12
26 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12
27 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12
28 Putting it all together High Level Algorithm 1 i 0 2 Choose weight W such that it contains approximately a i keys 3 Construct described graph with weight W 4 Construct testing function T which on input r, it looks up key r using the graph and passes it to T 5 Use Grover s with T 6 If item found return it, else increment i and repeat from 2 Discussion 1 If e keys are tested, time has a e improvement over classically 2 Does require a QRAM - however, it is fairly small (size independent of e) Take Away Points 1 Adding Quantum to Side Channels gives a square root speed up 2 Adding Side Channels to Quantum makes efficient key search possible Quantum Key Search with Side Channel Advice Slide 11 of 12
29 Putting it all together High Level Algorithm 1 i 0 2 Choose weight W such that it contains approximately a i keys 3 Construct described graph with weight W 4 Construct testing function T which on input r, it looks up key r using the graph and passes it to T 5 Use Grover s with T 6 If item found return it, else increment i and repeat from 2 Discussion 1 If e keys are tested, time has a e improvement over classically 2 Does require a QRAM - however, it is fairly small (size independent of e) Take Away Points 1 Adding Quantum to Side Channels gives a square root speed up 2 Adding Side Channels to Quantum makes efficient key search possible Quantum Key Search with Side Channel Advice Slide 11 of 12
30 Putting it all together High Level Algorithm 1 i 0 2 Choose weight W such that it contains approximately a i keys 3 Construct described graph with weight W 4 Construct testing function T which on input r, it looks up key r using the graph and passes it to T 5 Use Grover s with T 6 If item found return it, else increment i and repeat from 2 Discussion 1 If e keys are tested, time has a e improvement over classically 2 Does require a QRAM - however, it is fairly small (size independent of e) Take Away Points 1 Adding Quantum to Side Channels gives a square root speed up 2 Adding Side Channels to Quantum makes efficient key search possible Quantum Key Search with Side Channel Advice Slide 11 of 12
31 Questions? Full version available at eprintiacrorg/2017/171 Quantum Key Search with Side Channel Advice Slide 12 of 12
Quantum Key Search with Side Channel Advice
Quantum Key Search with Side Channel Advice Daniel P. Martin 1, Ashley Montanaro 2, Elisabeth Oswald 3, and Dan Shepherd 4 1 School of Mathematics, University of Bristol, Bristol, BS8 1TW, UK, and the
More informationThe quantum threat to cryptography
The quantum threat to cryptography Ashley Montanaro School of Mathematics, University of Bristol 20 October 2016 Quantum computers University of Bristol IBM UCSB / Google University of Oxford Experimental
More informationICS141: Discrete Mathematics for Computer Science I
ICS4: Discrete Mathematics for Computer Science I Dept. Information & Computer Sci., Jan Stelovsky based on slides by Dr. Baek and Dr. Still Originals by Dr. M. P. Frank and Dr. J.L. Gross Provided by
More informationProof of Theorem 1. Tao Lei CSAIL,MIT. Here we give the proofs of Theorem 1 and other necessary lemmas or corollaries.
Proof of Theorem 1 Tao Lei CSAIL,MIT Here we give the proofs of Theorem 1 and other necessary lemmas or corollaries. Lemma 1 (Reachability) Any two trees y, y are reachable to each other. Specifically,
More informationHamiltonian paths in tournaments A generalization of sorting DM19 notes fall 2006
Hamiltonian paths in tournaments A generalization of sorting DM9 notes fall 2006 Jørgen Bang-Jensen Imada, SDU 30. august 2006 Introduction and motivation Tournaments which we will define mathematically
More informationTHE RANK METHOD AND APPLICATIONS TO POST- QUANTUM CRYPTOGRAPHY
THE RANK METHOD AND APPLICATIONS TO POST- QUANTUM CRYPTOGRAPHY Mark Zhandry - Stanford University Joint work with Dan Boneh Classical Cryptography Post-Quantum Cryptography All communication stays classical
More informationCS 188: Artificial Intelligence Spring 2009
CS 188: Artificial Intelligence Spring 2009 Lecture 21: Hidden Markov Models 4/7/2009 John DeNero UC Berkeley Slides adapted from Dan Klein Announcements Written 3 deadline extended! Posted last Friday
More informationPseudo-Random Number Generators
Unit 41 April 18, 2011 1 Pseudo-Random Number Generators Recall the one-time pad: k = k 1, k 2, k 3... a random bit-string p = p 1, p 2, p 3,... plaintext bits E(p) = p k. We desire long sequences of numbers
More informationSection 1.6. Functions
Section 1.6 Functions Definitions Relation, Domain, Range, and Function The table describes a relationship between the variables x and y. This relationship is also described graphically. x y 3 2 4 1 5
More informationQuantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018
Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018 What drives a company s digital strategy in 2020 and beyond? Quantum Computing it s the end of the world
More informationComputing With Tensors: Potential Applications of Physics-Motivated Mathematics to Computer Science
Computing With Tensors: Potential Applications of Physics-Motivated Mathematics to Computer Science Martine Ceberio and Vladik Kreinovich Department of Computer Science University of Texas at El Paso El
More informationQuantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017
Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M. Mosca New paradigm brings new possibilities Designing
More informationRanking from Pairwise Comparisons
Ranking from Pairwise Comparisons Sewoong Oh Department of ISE University of Illinois at Urbana-Champaign Joint work with Sahand Negahban(MIT) and Devavrat Shah(MIT) / 9 Rank Aggregation Data Algorithm
More informationSummative Assessment #2 for Outer Space and Cyber Space
Summative Assessment #2 for Outer Space and Cyber Space Table of Contents Item Page Our Planets Aren t Average, Summative Assessment #2 Instructions page 2 Our Planets Aren t Average, Summative Assessment
More informationCox regression: Estimation
Cox regression: Estimation Patrick Breheny October 27 Patrick Breheny Survival Data Analysis (BIOS 7210) 1/19 Introduction The Cox Partial Likelihood In our last lecture, we introduced the Cox partial
More informationCS145: Probability & Computing Lecture 24: Algorithms
CS145: Probability & Computing Lecture 24: Algorithms Instructor: Eli Upfal Brown University Computer Science Figure credits: Bertsekas & Tsitsiklis, Introduction to Probability, 2008 Pitman, Probability,
More informationAPTAS for Bin Packing
APTAS for Bin Packing Bin Packing has an asymptotic PTAS (APTAS) [de la Vega and Leuker, 1980] For every fixed ε > 0 algorithm outputs a solution of size (1+ε)OPT + 1 in time polynomial in n APTAS for
More informationA Stochastic Model for Differential Side Channel Cryptanalysis
A Stochastic Model for Differential Side Channel Cryptanalysis Werner Schindler 1, Kerstin Lemke 2, Christof Paar 2 1 Bundesamt für Sicherheit in der Informationstechnik (BSI) 53175 Bonn, Germany 2 Horst
More information7.1 Basis for Boltzmann machine. 7. Boltzmann machines
7. Boltzmann machines this section we will become acquainted with classical Boltzmann machines which can be seen obsolete being rarely applied in neurocomputing. It is interesting, after all, because is
More informationNil. When a calculator is used, the answer should be given to an appropriate degree of accuracy.
6677/01 Edexcel GCE Mechanics Unit M1 Mock paper Advanced Subsidiary / Advanced Time: 1 hour 30 minutes Materials required for the examination Answer Book (AB04) Graph Paper (GP02) Mathematical Formulae
More informationEverything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL
Everything is Quantum Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Contents Whats the problem? Surveillance Problem / Weak Crypto
More informationMachine Learning. Neural Networks. (slides from Domingos, Pardo, others)
Machine Learning Neural Networks (slides from Domingos, Pardo, others) Human Brain Neurons Input-Output Transformation Input Spikes Output Spike Spike (= a brief pulse) (Excitatory Post-Synaptic Potential)
More informationJeffrey D. Ullman Stanford University
Jeffrey D. Ullman Stanford University 3 We are given a set of training examples, consisting of input-output pairs (x,y), where: 1. x is an item of the type we want to evaluate. 2. y is the value of some
More informationHidden Markov Models and Gaussian Mixture Models
Hidden Markov Models and Gaussian Mixture Models Hiroshi Shimodaira and Steve Renals Automatic Speech Recognition ASR Lectures 4&5 25&29 January 2018 ASR Lectures 4&5 Hidden Markov Models and Gaussian
More informationSlide 7.1. Theme 7. Correlation
Slide 7.1 Theme 7 Correlation Slide 7.2 Overview Researchers are often interested in exploring whether or not two variables are associated This lecture will consider Scatter plots Pearson correlation coefficient
More informationThe Structure of Quantum Computation from Physical Principles
The Structure of Quantum Computation from Physical Principles John H. Selby & Ciarán M. Lee arxiv: 1510.04699, 1604.03118 The structure of quantum computation... The structure of quantum computation...
More informationOutline for today. Information Retrieval. Cosine similarity between query and document. tf-idf weighting
Outline for today Information Retrieval Efficient Scoring and Ranking Recap on ranked retrieval Jörg Tiedemann jorg.tiedemann@lingfil.uu.se Department of Linguistics and Philology Uppsala University Efficient
More informationThe quantum threat to cryptography
The quantum threat to cryptography Michele Mosca 8 May 2016 Vienna, Austria Cryptography in the context of quantum computers E. Lucero, D. Mariantoni, and M. Mariantoni Harald Ritsch Y. Colombe/NIST How
More informationManaging the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016
Managing the quantum risk to cybersecurity Global Risk Institute Michele Mosca 11 April 2016 Cyber technologies are becoming increasingly pervasive. Cybersecurity is a growing and fundamental part of safety
More informationHidden Markov Models. Hal Daumé III. Computer Science University of Maryland CS 421: Introduction to Artificial Intelligence 19 Apr 2012
Hidden Markov Models Hal Daumé III Computer Science University of Maryland me@hal3.name CS 421: Introduction to Artificial Intelligence 19 Apr 2012 Many slides courtesy of Dan Klein, Stuart Russell, or
More informationIntroduction to Side Channel Analysis. Elisabeth Oswald University of Bristol
Introduction to Side Channel Analysis Elisabeth Oswald University of Bristol Outline Part 1: SCA overview & leakage Part 2: SCA attacks & exploiting leakage and very briefly Part 3: Countermeasures Part
More informationSection 6-1 Overview. Definition. Definition. Using Area to Find Probability. Area and Probability
Chapter focus is on: Continuous random variables Normal distributions Figure 6-1 Section 6-1 Overview ( -1 e 2 x-µ σ ) 2 f(x) = σ 2 π Formula 6-1 Slide 1 Section 6-2 The Standard Normal Distribution Key
More informationMind the gap Solving optimization problems with a quantum computer
Mind the gap Solving optimization problems with a quantum computer A.P. Young http://physics.ucsc.edu/~peter Work supported by Talk at the London Centre for Nanotechnology, October 17, 2012 Collaborators:
More informationIntroduction The Search Algorithm Grovers Algorithm References. Grovers Algorithm. Quantum Parallelism. Joseph Spring.
Quantum Parallelism Applications Outline 1 2 One or Two Points 3 4 Quantum Parallelism We have discussed the concept of quantum parallelism and now consider a range of applications. These will include:
More information7 Cryptanalysis. 7.1 Structural Attacks CA642: CRYPTOGRAPHY AND NUMBER THEORY 1
CA642: CRYPTOGRAPHY AND NUMBER THEORY 1 7 Cryptanalysis Cryptanalysis Attacks such as exhaustive key-search do not exploit any properties of the encryption algorithm or implementation. Structural attacks
More informationEntanglement and Quantum Key Distribution at ESA
Entanglement and Quantum Key Distribution at ESA Eric Wille, TEC-MMO E.Murphy, TEC-MME ESA UNCLASSIFIED - For Official Use Entanglement and QKD Motivation Fundamental Research - Limitations of Quantum
More informationLab 12: Structured Prediction
December 4, 2014 Lecture plan structured perceptron application: confused messages application: dependency parsing structured SVM Class review: from modelization to classification What does learning mean?
More informationMcEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks
McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks Hang Dinh Indiana Uniersity South Bend joint work with Cristopher Moore Uniersity of New Mexico Alexander Russell Uniersity
More information6677 Edexcel GCE Mechanics M1 (New Syllabus) Advanced/Advanced Subsidiary Friday 12 January 2001 Afternoon Time: 1 hour 30 minutes
Paper Reference(s) 6677 Edexcel GCE Mechanics M1 (New Syllabus) Advanced/Advanced Subsidiary Friday 12 January 2001 Afternoon Time: 1 hour 30 minutes Materials required for examination Answer Book (AB16)
More informationMa/CS 6b Class 20: Spectral Graph Theory
Ma/CS 6b Class 20: Spectral Graph Theory By Adam Sheffer Eigenvalues and Eigenvectors A an n n matrix of real numbers. The eigenvalues of A are the numbers λ such that Ax = λx for some nonzero vector x
More informationMEASURING THE SPREAD OF DATA: 6F
CONTINUING WITH DESCRIPTIVE STATS 6E,6F,6G,6H,6I MEASURING THE SPREAD OF DATA: 6F othink about this example: Suppose you are at a high school football game and you sample 40 people from the student section
More informationEvolutionary Tree Analysis. Overview
CSI/BINF 5330 Evolutionary Tree Analysis Young-Rae Cho Associate Professor Department of Computer Science Baylor University Overview Backgrounds Distance-Based Evolutionary Tree Reconstruction Character-Based
More informationCox s proportional hazards/regression model - model assessment
Cox s proportional hazards/regression model - model assessment Rasmus Waagepetersen September 27, 2017 Topics: Plots based on estimated cumulative hazards Cox-Snell residuals: overall check of fit Martingale
More informationQALGO workshop, Riga. 1 / 26. Quantum algorithms for linear algebra.
QALGO workshop, Riga. 1 / 26 Quantum algorithms for linear algebra., Center for Quantum Technologies and Nanyang Technological University, Singapore. September 22, 2015 QALGO workshop, Riga. 2 / 26 Overview
More informationAnalysis of the USGS Coastal Gradient Real-time Gaging Network
Analysis of the USGS Coastal Gradient Real-time Gaging Network Paul Conrads, USGS, SC Water Science Center Kenneth Odom, USGS, CO Water Science Center Greater Everglades Ecosystem Restoration Conference
More informationEnumerate all possible assignments and take the An algorithm is a well-defined computational
EMIS 8374 [Algorithm Design and Analysis] 1 EMIS 8374 [Algorithm Design and Analysis] 2 Designing and Evaluating Algorithms A (Bad) Algorithm for the Assignment Problem Enumerate all possible assignments
More informationMasking and Dual-rail Logic Don't Add Up
Masking and Dual-rail Logic Don't Add Up Patrick Schaumont schaum@vt.edu Secure Embedded Systems Group ECE Department Kris Tiri kris.tiri@intel.com Digital Enterprise Group Intel Corporation Our Contributions
More informationTowards Easy Key Enumeration
Towards Easy Key Enumeration Changhai Ou, Degang Sun, Zhu Wang, and Xinping Zhou 1 Institute of Information Engineering, Chinese Academy of Sciences 2 School of Cyber Security, University of Chinese Academy
More informationModels of Computation, Recall Register Machines. A register machine (sometimes abbreviated to RM) is specified by:
Models of Computation, 2010 1 Definition Recall Register Machines A register machine (sometimes abbreviated M) is specified by: Slide 1 finitely many registers R 0, R 1,..., R n, each capable of storing
More informationSpectral Method and Regularized MLE Are Both Optimal for Top-K Ranking
Spectral Method and Regularized MLE Are Both Optimal for Top-K Ranking Yuxin Chen Electrical Engineering, Princeton University Joint work with Jianqing Fan, Cong Ma and Kaizheng Wang Ranking A fundamental
More informationLecture 3. 1 Polynomial-time algorithms for the maximum flow problem
ORIE 633 Network Flows August 30, 2007 Lecturer: David P. Williamson Lecture 3 Scribe: Gema Plaza-Martínez 1 Polynomial-time algorithms for the maximum flow problem 1.1 Introduction Let s turn now to considering
More informationCombinatorial algorithms
Combinatorial algorithms computing subset rank and unrank, Gray codes, k-element subset rank and unrank, computing permutation rank and unrank Jiří Vyskočil, Radek Mařík 2012 Combinatorial Generation definition:
More informationGeneral Least Squares Fitting
Chapter 1 General Least Squares Fitting 1.1 Introduction Previously you have done curve fitting in two dimensions. Now you will learn how to extend that to multiple dimensions. 1.1.1 Non-linear Linearizable
More informationCentre No. Candidate No. Paper Reference(s) 6665 Edexcel GCE Core Mathematics C3 Advanced Level Mock Paper
Paper Reference (complete below) Centre No. Surname Initial(s) 6 6 6 5 / 0 1 Candidate No. Signature Paper Reference(s) 6665 Edexcel GCE Core Mathematics C3 Advanced Level Mock Paper Time: 1 hour 30 minutes
More informationRecap. Probability, stochastic processes, Markov chains. ELEC-C7210 Modeling and analysis of communication networks
Recap Probability, stochastic processes, Markov chains ELEC-C7210 Modeling and analysis of communication networks 1 Recap: Probability theory important distributions Discrete distributions Geometric distribution
More informationOn Post-Quantum Cryptography
On Post-Quantum Cryptography Ehsan Ebrahimi Quantum Cryptography Group University of Tartu, Estonia 15 March 2018 Information Security and Cryptography Group Seminar Post-Quantum Cryptography Users intend
More informationSearch and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012
Search and Lookahead Bernhard Nebel, Julien Hué, and Stefan Wölfl Albert-Ludwigs-Universität Freiburg June 4/6, 2012 Search and Lookahead Enforcing consistency is one way of solving constraint networks:
More information1500 AMD Opteron processor (2.2 GHz with 2 GB RAM)
NICT 2019 2019 2 7 1 RSA RSA 2 3 (1) exp $ 64/9 + *(1) (ln 0) 1/2 (ln ln 0) 3/2 (2) 2009 12 768 (232 ) 1500 AMD Opteron processor (2.2 GHz with 2 GB RAM) 4 (3) 18 2 (1) (2) (3) 5 CRYPTREC 1. 2. 3. 1024,
More information(ii) Write down the lowest integer which satisfies this inequality.
Mr McGrath s special questions Paper A Higher. 1. Work out the value of x. Give your answer correct to 3 significant figures. 2 (a) Write 2 3 2 4 as a single power of 2. (b) 280 = 2 n 5 7 Find the value
More informationPAPER 1H GCSE/A1H GCSE MATHEMATICS. Practice Set A Non-Calculator Time allowed: 1 hour 30 minutes
Surname Other Names Candidate Signature Centre Number Candidate Number Examiner Comments Total Marks PAPER 1H GCSE MATHEMATICS CM Practice Set A Non-Calculator Time allowed: 1 hour 30 minutes Instructions
More information4301/2H. General Certificate of Secondary Education November MATHEMATICS (SPECIFICATION A) 4301/2H Higher Tier Paper 2 Calculator
Surname Other Names For Examiner s Use Centre Number Candidate Number Candidate Signature General Certificate of Secondary Education November 2008 MATHEMATICS (SPECIFICATION A) 4301/2H Higher Tier Paper
More informationOn the Complexity of the Hybrid Approach on HFEv-
On the Complexity of the Hybrid Approach on HFEv- Albrecht Petzoldt National Institute of Standards and Technology, Gaithersburg, Maryland, USA albrecht.petzoldt@gmail.com Abstract. The HFEv- signature
More informationEfficient Distributed Quantum Computing
Efficient Distributed Quantum Computing Steve Brierley Heilbronn Institute, Dept. Mathematics, University of Bristol October 2013 Work with Robert Beals, Oliver Gray, Aram Harrow, Samuel Kutin, Noah Linden,
More informationMath 120 Introduction to Statistics Mr. Toner s Lecture Notes 3.1 Measures of Central Tendency
Math 1 Introduction to Statistics Mr. Toner s Lecture Notes 3.1 Measures of Central Tendency The word average: is very ambiguous and can actually refer to the mean, median, mode or midrange. Notation:
More informationNominal Data. Parametric Statistics. Nonparametric Statistics. Parametric vs Nonparametric Tests. Greg C Elvers
Nominal Data Greg C Elvers 1 Parametric Statistics The inferential statistics that we have discussed, such as t and ANOVA, are parametric statistics A parametric statistic is a statistic that makes certain
More informationPHYS 3220 Tutorials S. Goldhaber, S. Pollock, and the Physics Education Group University of Colorado, Boulder
Energy and the Art of Sketching Wave Functions 1 I: Sketching wave functions A. Review: The figure to the right shows an infinite square well potential (V = 0 from L/2 to L/2 and is infinite everywhere
More informationAnnouncements. CS 188: Artificial Intelligence Fall VPI Example. VPI Properties. Reasoning over Time. Markov Models. Lecture 19: HMMs 11/4/2008
CS 88: Artificial Intelligence Fall 28 Lecture 9: HMMs /4/28 Announcements Midterm solutions up, submit regrade requests within a week Midterm course evaluation up on web, please fill out! Dan Klein UC
More information2011 Pearson Education, Inc
Statistics for Business and Economics Chapter 2 Methods for Describing Sets of Data Summary of Central Tendency Measures Measure Formula Description Mean x i / n Balance Point Median ( n +1) Middle Value
More informationNumber Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers
Number Theory: Applications Number Theory Applications Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Results from Number Theory have many applications
More informationCambridge International Examinations Cambridge International General Certificate of Secondary Education
Cambridge International Examinations Cambridge International General Certificate of Secondary Education CANDIDATE NAME CENTRE NUMBER CANDIDATE NUMBER * 9 8 6 4 0 7 5 2 4 9 * MATHEMATICS 0580/22 Paper 2
More informationMa/CS 6b Class 20: Spectral Graph Theory
Ma/CS 6b Class 20: Spectral Graph Theory By Adam Sheffer Recall: Parity of a Permutation S n the set of permutations of 1,2,, n. A permutation σ S n is even if it can be written as a composition of an
More informationBounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery
Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery Xin Ye, Thomas Eisenbarth and William Martin Worcester Polytechnic Institute, Worcester, MA 01609,
More informationDiploma Part 2. Quantitative Methods. Examiners Suggested Answers
Diploma Part 2 Quantitative Methods Examiners Suggested Answers Q1 (a) A frequency distribution is a table or graph (i.e. a histogram) that shows the total number of measurements that fall in each of a
More informationOctober 24. Linear Momentum: - It is a vector which may require breaking it into components
October 24 Linear Momentum: - It is a vector which may require breaking it into components Newton s First Law: A body continues with Constant Linear Momentum unless it is acted upon by a Net External Force.
More information2 = -30 or 20 Hence an output of 2000 will maximize profit.
QUANTITATIVE TOOLS IN BUSINESS NOV. SOLUTION (a) (i) Marginal Cost MC = Q Q + Total Cost TC = ʃ Mc = ʃ (Q Q + ) = Q Q + Q + C Where C is the constant of integration (ie C is fixed cost in GHS ) When Q
More informationInformation in Radio Waves
Summative Assessment: Natural Sources of Radio Performance expectation: Develop and use a model of two objects interacting through electric or magnetic fields to illustrate the forces between objects and
More informationØ Set of mutually exclusive categories. Ø Classify or categorize subject. Ø No meaningful order to categorization.
Statistical Tools in Evaluation HPS 41 Dr. Joe G. Schmalfeldt Types of Scores Continuous Scores scores with a potentially infinite number of values. Discrete Scores scores limited to a specific number
More informationEA = I 3 = E = i=1, i k
MTH5 Spring 7 HW Assignment : Sec.., # (a) and (c), 5,, 8; Sec.., #, 5; Sec.., #7 (a), 8; Sec.., # (a), 5 The due date for this assignment is //7. Sec.., # (a) and (c). Use the proof of Theorem. to obtain
More informationNotes. Number Theory: Applications. Notes. Number Theory: Applications. Notes. Hash Functions I
Number Theory: Applications Slides by Christopher M. Bourke Instructor: Berthe Y. Choueiry Fall 2007 Computer Science & Engineering 235 Introduction to Discrete Mathematics Sections 3.4 3.7 of Rosen cse235@cse.unl.edu
More informationThe Quantum Threat to Cybersecurity (for CxOs)
The Quantum Threat to Cybersecurity (for CxOs) Michele Mosca 5 th ETSI-IQC Workshop on Quantum-Safe Cryptography 13 September 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M.
More informationPoly-Logarithmic Side Channel Rank Estimation via Exponential Sampling
Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling Liron David 1, Avishai Wool 2 School of Electrical Engineering, Tel Aviv University, Ramat Aviv 69978, Israel 1 lirondavid@gmail.com,
More informationPublic-key Cryptography and elliptic curves
Public-key Cryptography and elliptic curves Dan Nichols nichols@math.umass.edu University of Massachusetts Oct. 14, 2015 Cryptography basics Cryptography is the study of secure communications. Here are
More informationQCRYPT Saturation Attack on Continuous-Variable Quantum Key Distribution System. Hao Qin*, Rupesh Kumar, and Romain Alléaume
QCRYPT 2013 August 04,2013 IQC, University of Waterloo Canada Saturation Attack on Continuous-Variable Quantum Key Distribution System Hao Qin*, Rupesh Kumar, and Romain Alléaume Quantum Information Team
More informationCryptography Lecture 3. Pseudorandom generators LFSRs
Cryptography Lecture 3 Pseudorandom generators LFSRs Remember One Time Pad is ideal With OTP you need the same transmission capacity via an already secure channel for the key as you can then secure via
More informationQuantum Algorithms via Linear Algebra
Schedule and Presentation of Topics, April 28, 2017 Meyerhenke, Glantz, Looz, Tzovas 1 Meyerhenke, Glantz, Looz, Tzovas: Institute for Theoretical Computer www.kit.edu Science How hot is quantum computing?
More informationConstruction X for quantum error-correcting codes
Simon Fraser University Burnaby, BC, Canada joint work with Vijaykumar Singh International Workshop on Coding and Cryptography WCC 2013 Bergen, Norway 15 April 2013 Overview Construction X is known from
More informationCPSC 91 Computer Security Fall Computer Security. Assignment #2
CPSC 91 Computer Security Assignment #2 Note that for many of the problems, there are many possible solutions. I only describe one possible solution for each problem here, but we could examine other possible
More informationSECTION 5.1: Polynomials
1 SECTION 5.1: Polynomials Functions Definitions: Function, Independent Variable, Dependent Variable, Domain, and Range A function is a rule that assigns to each input value x exactly output value y =
More informationCS1820 Notes. hgupta1, kjline, smechery. April 3-April 5. output: plausible Ancestral Recombination Graph (ARG)
CS1820 Notes hgupta1, kjline, smechery April 3-April 5 April 3 Notes 1 Minichiello-Durbin Algorithm input: set of sequences output: plausible Ancestral Recombination Graph (ARG) note: the optimal ARG is
More informationUNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certifi cate of Secondary Education
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certifi cate of Secondary Education *8971791642* MATHEMATICS 0580/22 Paper 2 (Extended) October/November 2013 Candidates answer
More informationQuantum Differential and Linear Cryptanalysis
Quantum Differential and Linear Cryptanalysis Marc Kaplan 1,2 Gaëtan Leurent 3 Anthony Leverrier 3 María Naya-Plasencia 3 1 LTCI, Télécom ParisTech 2 School of Informatics, University of Edinburgh 3 Inria
More informationSide Channel Analysis and Protection for McEliece Implementations
Side Channel Analysis and Protection for McEliece Implementations Thomas Eisenbarth Joint work with Cong Chen, Ingo von Maurich and Rainer Steinwandt 9/27/2016 NATO Workshop- Tel Aviv University Overview
More informationGENERALIZED NONLINEARITY OF S-BOXES. Sugata Gangopadhyay
Volume X, No. 0X, 0xx, X XX doi:0.3934/amc.xx.xx.xx GENERALIZED NONLINEARITY OF -BOXE ugata Gangopadhyay Department of Computer cience and Engineering, Indian Institute of Technology Roorkee, Roorkee 47667,
More informationCode-based Cryptography
a Hands-On Introduction Daniel Loebenberger Ηράκλειο, September 27, 2018 Post-Quantum Cryptography Various flavours: Lattice-based cryptography Hash-based cryptography Code-based
More informationMath 410 Linear Algebra Summer Session American River College
Course Information Instructor: Kristin Lui Email: luik@arc.losrios.edu Office Hours: By appointment Location: Liberal Arts 163 ARC Main Campus Meet Times: Tuesday/Thursday 6:30 pm 9:40 pm Dates: June 16,
More informationMulti-Map Orbit Hopping Chaotic Stream Cipher
Multi-Map Orbit Hopping Chaotic Stream Cipher Xiaowen Zhang 1, Li Shu 2, Ke Tang 1 Abstract In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum
More informationImpossible Boomerang Attack for Block Cipher Structures
Impossible Boomerang Attack for Block Cipher Structures Jiali Choy and Huihui Yap DSO National Laboratories 20 Science Park Drive, Singapore 118230 Email: cjiali, yhuihui@dso.org.sg Abstract. Impossible
More informationPractical Analysis of Key Recovery Attack against Search-LWE Problem
Practical Analysis of Key Recovery Attack against Search-LWE Problem The 11 th International Workshop on Security, Sep. 13 th 2016 Momonari Kudo, Junpei Yamaguchi, Yang Guo and Masaya Yasuda 1 Graduate
More informationEvery binary word is, almost, a shuffle of twin subsequences a theorem of Axenovich, Person and Puzynina
Every binary word is, almost, a shuffle of twin subsequences a theorem of Axenovich, Person and Puzynina Martin Klazar August 17, 2015 A twin in a word u = a 1 a 2... a n is a pair (u 1, u 2 ) of disjoint
More informationPAPER 1H GCSE/A1H GCSE MATHEMATICS. Practice Set A Non-Calculator Time allowed: 1 hour 30 minutes
Surname Other Names Candidate Signature Centre Number Candidate Number Examiner Comments Total Marks PAPER 1H GCSE MATHEMATICS CM Practice Set A Non-Calculator Time allowed: 1 hour 30 minutes Instructions
More information