Quantum Key Search with Side Channel Advice

Size: px
Start display at page:

Download "Quantum Key Search with Side Channel Advice"

Transcription

1 Quantum Key Search with Side Channel Advice D Martin 1, A Montanaro 1, E Oswald 1 and D Shepherd 2 1 University of Bristol 2 National Cyber Security Centre 18 th August 2017 Quantum Key Search with Side Channel Advice Slide 1 of 12

2 Classical Cryptography A x y O k Quantum Key Search with Side Channel Advice Slide 2 of 12

3 Practical Cryptography L(k, x; r) A x y O k Quantum Key Search with Side Channel Advice Slide 3 of 12

4 Post-Quantum Cryptography A x y O k Quantum Key Search with Side Channel Advice Slide 4 of 12

5 Key Enumeration Definition: Distinguishing Vector k = (k 1,, k m ) k i {1,, n} w, n by m matrix output by side channel distinguisher w j,i Z + represents likelihood k i takes value j (smaller most likely) Score of a key is then m i=1 w k i,i Definition: Key Enumeration Given an n m weight matrix w and e Z, output the e keys with the lowest weights (breaking ties arbitrarily) Quantum Key Search with Side Channel Advice Slide 5 of 12

6 Key Enumeration Definition: Distinguishing Vector k = (k 1,, k m ) k i {1,, n} w, n by m matrix output by side channel distinguisher w j,i Z + represents likelihood k i takes value j (smaller most likely) Score of a key is then m i=1 w k i,i Definition: Key Enumeration Given an n m weight matrix w and e Z, output the e keys with the lowest weights (breaking ties arbitrarily) Quantum Key Search with Side Channel Advice Slide 5 of 12

7 Key Enumeration Example k k k w i,j k m n 1 n Figure : Score vectors for m key chunks Each subkey can take values from 1 to n, and scores w i,j are on a scale that depends on the side channel distinguisher Quantum Key Search with Side Channel Advice Slide 6 of 12

8 Key Enumeration Example k k k w i,j k m n 1 n Figure : Score vectors for m key chunks Each subkey can take values from 1 to n, and scores w i,j are on a scale that depends on the side channel distinguisher Quantum Key Search with Side Channel Advice Slide 6 of 12

9 Key Enumeration Example k k k w i,j k m n 1 n Figure : Score vectors for m key chunks Each subkey can take values from 1 to n, and scores w i,j are on a scale that depends on the side channel distinguisher Quantum Key Search with Side Channel Advice Slide 6 of 12

10 Key Enumeration Example k k k w i,j k m n 1 n Figure : Score vectors for m key chunks Each subkey can take values from 1 to n, and scores w i,j are on a scale that depends on the side channel distinguisher Quantum Key Search with Side Channel Advice Slide 6 of 12

11 Key Search Definition: Key Search Given an n m weight matrix w, a testing function T and e Z, output any k i, with i e, such that T(k i ) = 1 and k i would be output from enumeration, on input w and e If no such i exists output AES Testing Function T(x) = { 1 if AESx (m) = c 0 otherwise Quantum Key Search with Side Channel Advice Slide 7 of 12

12 Key Search Definition: Key Search Given an n m weight matrix w, a testing function T and e Z, output any k i, with i e, such that T(k i ) = 1 and k i would be output from enumeration, on input w and e If no such i exists output AES Testing Function T(x) = { 1 if AESx (m) = c 0 otherwise Quantum Key Search with Side Channel Advice Slide 7 of 12

13 A First Attempt - Grover s Algorithm Problem Definition Given N items x 1,, x N one of which is marked, return the marked item Time Complexity Classically: O(N) Grover s: O( N) Quantum Key Search with Side Channel Advice Slide 8 of 12

14 A First Attempt - Grover s Algorithm Problem Definition Given N items x 1,, x N one of which is marked, return the marked item Time Complexity Classically: O(N) Grover s: O( N) Quantum Key Search with Side Channel Advice Slide 8 of 12

15 A Second Attempt - Montanaro s Algorithm Problem Definition Given N items x 1,, x N, one of which is marked, and probabilities p 1,, p N return the marked item, where x i is the marked item with probability p i Expected Time Complexity Classically: O( N i=1 p i i) Montanaro s: O( N i=1 p i i) Algorithm Description 1 i 0 2 Select the next a i most likely x s 3 Pass them to Grover s 4 If item found return it, else increment i and repeat from 2 Quantum Key Search with Side Channel Advice Slide 9 of 12

16 A Second Attempt - Montanaro s Algorithm Problem Definition Given N items x 1,, x N, one of which is marked, and probabilities p 1,, p N return the marked item, where x i is the marked item with probability p i Expected Time Complexity Classically: O( N i=1 p i i) Montanaro s: O( N i=1 p i i) Algorithm Description 1 i 0 2 Select the next a i most likely x s 3 Pass them to Grover s 4 If item found return it, else increment i and repeat from 2 Quantum Key Search with Side Channel Advice Slide 9 of 12

17 A Second Attempt - Montanaro s Algorithm Problem Definition Given N items x 1,, x N, one of which is marked, and probabilities p 1,, p N return the marked item, where x i is the marked item with probability p i Expected Time Complexity Classically: O( N i=1 p i i) Montanaro s: O( N i=1 p i i) Algorithm Description 1 i 0 2 Select the next a i most likely x s 3 Pass them to Grover s 4 If item found return it, else increment i and repeat from 2 Quantum Key Search with Side Channel Advice Slide 9 of 12

18 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12

19 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12

20 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12

21 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12

22 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12

23 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12

24 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12

25 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12

26 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12

27 The Third (and Final) Attempt - Utilising Our Key Rank Algorithm (AC:MOOS15) w = S Cumulative Weight Subkey # 2 A Quantum Key Search with Side Channel Advice Slide 10 of 12

28 Putting it all together High Level Algorithm 1 i 0 2 Choose weight W such that it contains approximately a i keys 3 Construct described graph with weight W 4 Construct testing function T which on input r, it looks up key r using the graph and passes it to T 5 Use Grover s with T 6 If item found return it, else increment i and repeat from 2 Discussion 1 If e keys are tested, time has a e improvement over classically 2 Does require a QRAM - however, it is fairly small (size independent of e) Take Away Points 1 Adding Quantum to Side Channels gives a square root speed up 2 Adding Side Channels to Quantum makes efficient key search possible Quantum Key Search with Side Channel Advice Slide 11 of 12

29 Putting it all together High Level Algorithm 1 i 0 2 Choose weight W such that it contains approximately a i keys 3 Construct described graph with weight W 4 Construct testing function T which on input r, it looks up key r using the graph and passes it to T 5 Use Grover s with T 6 If item found return it, else increment i and repeat from 2 Discussion 1 If e keys are tested, time has a e improvement over classically 2 Does require a QRAM - however, it is fairly small (size independent of e) Take Away Points 1 Adding Quantum to Side Channels gives a square root speed up 2 Adding Side Channels to Quantum makes efficient key search possible Quantum Key Search with Side Channel Advice Slide 11 of 12

30 Putting it all together High Level Algorithm 1 i 0 2 Choose weight W such that it contains approximately a i keys 3 Construct described graph with weight W 4 Construct testing function T which on input r, it looks up key r using the graph and passes it to T 5 Use Grover s with T 6 If item found return it, else increment i and repeat from 2 Discussion 1 If e keys are tested, time has a e improvement over classically 2 Does require a QRAM - however, it is fairly small (size independent of e) Take Away Points 1 Adding Quantum to Side Channels gives a square root speed up 2 Adding Side Channels to Quantum makes efficient key search possible Quantum Key Search with Side Channel Advice Slide 11 of 12

31 Questions? Full version available at eprintiacrorg/2017/171 Quantum Key Search with Side Channel Advice Slide 12 of 12

Quantum Key Search with Side Channel Advice

Quantum Key Search with Side Channel Advice Quantum Key Search with Side Channel Advice Daniel P. Martin 1, Ashley Montanaro 2, Elisabeth Oswald 3, and Dan Shepherd 4 1 School of Mathematics, University of Bristol, Bristol, BS8 1TW, UK, and the

More information

The quantum threat to cryptography

The quantum threat to cryptography The quantum threat to cryptography Ashley Montanaro School of Mathematics, University of Bristol 20 October 2016 Quantum computers University of Bristol IBM UCSB / Google University of Oxford Experimental

More information

ICS141: Discrete Mathematics for Computer Science I

ICS141: Discrete Mathematics for Computer Science I ICS4: Discrete Mathematics for Computer Science I Dept. Information & Computer Sci., Jan Stelovsky based on slides by Dr. Baek and Dr. Still Originals by Dr. M. P. Frank and Dr. J.L. Gross Provided by

More information

Proof of Theorem 1. Tao Lei CSAIL,MIT. Here we give the proofs of Theorem 1 and other necessary lemmas or corollaries.

Proof of Theorem 1. Tao Lei CSAIL,MIT. Here we give the proofs of Theorem 1 and other necessary lemmas or corollaries. Proof of Theorem 1 Tao Lei CSAIL,MIT Here we give the proofs of Theorem 1 and other necessary lemmas or corollaries. Lemma 1 (Reachability) Any two trees y, y are reachable to each other. Specifically,

More information

Hamiltonian paths in tournaments A generalization of sorting DM19 notes fall 2006

Hamiltonian paths in tournaments A generalization of sorting DM19 notes fall 2006 Hamiltonian paths in tournaments A generalization of sorting DM9 notes fall 2006 Jørgen Bang-Jensen Imada, SDU 30. august 2006 Introduction and motivation Tournaments which we will define mathematically

More information

THE RANK METHOD AND APPLICATIONS TO POST- QUANTUM CRYPTOGRAPHY

THE RANK METHOD AND APPLICATIONS TO POST- QUANTUM CRYPTOGRAPHY THE RANK METHOD AND APPLICATIONS TO POST- QUANTUM CRYPTOGRAPHY Mark Zhandry - Stanford University Joint work with Dan Boneh Classical Cryptography Post-Quantum Cryptography All communication stays classical

More information

CS 188: Artificial Intelligence Spring 2009

CS 188: Artificial Intelligence Spring 2009 CS 188: Artificial Intelligence Spring 2009 Lecture 21: Hidden Markov Models 4/7/2009 John DeNero UC Berkeley Slides adapted from Dan Klein Announcements Written 3 deadline extended! Posted last Friday

More information

Pseudo-Random Number Generators

Pseudo-Random Number Generators Unit 41 April 18, 2011 1 Pseudo-Random Number Generators Recall the one-time pad: k = k 1, k 2, k 3... a random bit-string p = p 1, p 2, p 3,... plaintext bits E(p) = p k. We desire long sequences of numbers

More information

Section 1.6. Functions

Section 1.6. Functions Section 1.6 Functions Definitions Relation, Domain, Range, and Function The table describes a relationship between the variables x and y. This relationship is also described graphically. x y 3 2 4 1 5

More information

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018 Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018 What drives a company s digital strategy in 2020 and beyond? Quantum Computing it s the end of the world

More information

Computing With Tensors: Potential Applications of Physics-Motivated Mathematics to Computer Science

Computing With Tensors: Potential Applications of Physics-Motivated Mathematics to Computer Science Computing With Tensors: Potential Applications of Physics-Motivated Mathematics to Computer Science Martine Ceberio and Vladik Kreinovich Department of Computer Science University of Texas at El Paso El

More information

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017 Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M. Mosca New paradigm brings new possibilities Designing

More information

Ranking from Pairwise Comparisons

Ranking from Pairwise Comparisons Ranking from Pairwise Comparisons Sewoong Oh Department of ISE University of Illinois at Urbana-Champaign Joint work with Sahand Negahban(MIT) and Devavrat Shah(MIT) / 9 Rank Aggregation Data Algorithm

More information

Summative Assessment #2 for Outer Space and Cyber Space

Summative Assessment #2 for Outer Space and Cyber Space Summative Assessment #2 for Outer Space and Cyber Space Table of Contents Item Page Our Planets Aren t Average, Summative Assessment #2 Instructions page 2 Our Planets Aren t Average, Summative Assessment

More information

Cox regression: Estimation

Cox regression: Estimation Cox regression: Estimation Patrick Breheny October 27 Patrick Breheny Survival Data Analysis (BIOS 7210) 1/19 Introduction The Cox Partial Likelihood In our last lecture, we introduced the Cox partial

More information

CS145: Probability & Computing Lecture 24: Algorithms

CS145: Probability & Computing Lecture 24: Algorithms CS145: Probability & Computing Lecture 24: Algorithms Instructor: Eli Upfal Brown University Computer Science Figure credits: Bertsekas & Tsitsiklis, Introduction to Probability, 2008 Pitman, Probability,

More information

APTAS for Bin Packing

APTAS for Bin Packing APTAS for Bin Packing Bin Packing has an asymptotic PTAS (APTAS) [de la Vega and Leuker, 1980] For every fixed ε > 0 algorithm outputs a solution of size (1+ε)OPT + 1 in time polynomial in n APTAS for

More information

A Stochastic Model for Differential Side Channel Cryptanalysis

A Stochastic Model for Differential Side Channel Cryptanalysis A Stochastic Model for Differential Side Channel Cryptanalysis Werner Schindler 1, Kerstin Lemke 2, Christof Paar 2 1 Bundesamt für Sicherheit in der Informationstechnik (BSI) 53175 Bonn, Germany 2 Horst

More information

7.1 Basis for Boltzmann machine. 7. Boltzmann machines

7.1 Basis for Boltzmann machine. 7. Boltzmann machines 7. Boltzmann machines this section we will become acquainted with classical Boltzmann machines which can be seen obsolete being rarely applied in neurocomputing. It is interesting, after all, because is

More information

Nil. When a calculator is used, the answer should be given to an appropriate degree of accuracy.

Nil. When a calculator is used, the answer should be given to an appropriate degree of accuracy. 6677/01 Edexcel GCE Mechanics Unit M1 Mock paper Advanced Subsidiary / Advanced Time: 1 hour 30 minutes Materials required for the examination Answer Book (AB04) Graph Paper (GP02) Mathematical Formulae

More information

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Everything is Quantum Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Contents Whats the problem? Surveillance Problem / Weak Crypto

More information

Machine Learning. Neural Networks. (slides from Domingos, Pardo, others)

Machine Learning. Neural Networks. (slides from Domingos, Pardo, others) Machine Learning Neural Networks (slides from Domingos, Pardo, others) Human Brain Neurons Input-Output Transformation Input Spikes Output Spike Spike (= a brief pulse) (Excitatory Post-Synaptic Potential)

More information

Jeffrey D. Ullman Stanford University

Jeffrey D. Ullman Stanford University Jeffrey D. Ullman Stanford University 3 We are given a set of training examples, consisting of input-output pairs (x,y), where: 1. x is an item of the type we want to evaluate. 2. y is the value of some

More information

Hidden Markov Models and Gaussian Mixture Models

Hidden Markov Models and Gaussian Mixture Models Hidden Markov Models and Gaussian Mixture Models Hiroshi Shimodaira and Steve Renals Automatic Speech Recognition ASR Lectures 4&5 25&29 January 2018 ASR Lectures 4&5 Hidden Markov Models and Gaussian

More information

Slide 7.1. Theme 7. Correlation

Slide 7.1. Theme 7. Correlation Slide 7.1 Theme 7 Correlation Slide 7.2 Overview Researchers are often interested in exploring whether or not two variables are associated This lecture will consider Scatter plots Pearson correlation coefficient

More information

The Structure of Quantum Computation from Physical Principles

The Structure of Quantum Computation from Physical Principles The Structure of Quantum Computation from Physical Principles John H. Selby & Ciarán M. Lee arxiv: 1510.04699, 1604.03118 The structure of quantum computation... The structure of quantum computation...

More information

Outline for today. Information Retrieval. Cosine similarity between query and document. tf-idf weighting

Outline for today. Information Retrieval. Cosine similarity between query and document. tf-idf weighting Outline for today Information Retrieval Efficient Scoring and Ranking Recap on ranked retrieval Jörg Tiedemann jorg.tiedemann@lingfil.uu.se Department of Linguistics and Philology Uppsala University Efficient

More information

The quantum threat to cryptography

The quantum threat to cryptography The quantum threat to cryptography Michele Mosca 8 May 2016 Vienna, Austria Cryptography in the context of quantum computers E. Lucero, D. Mariantoni, and M. Mariantoni Harald Ritsch Y. Colombe/NIST How

More information

Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016

Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016 Managing the quantum risk to cybersecurity Global Risk Institute Michele Mosca 11 April 2016 Cyber technologies are becoming increasingly pervasive. Cybersecurity is a growing and fundamental part of safety

More information

Hidden Markov Models. Hal Daumé III. Computer Science University of Maryland CS 421: Introduction to Artificial Intelligence 19 Apr 2012

Hidden Markov Models. Hal Daumé III. Computer Science University of Maryland CS 421: Introduction to Artificial Intelligence 19 Apr 2012 Hidden Markov Models Hal Daumé III Computer Science University of Maryland me@hal3.name CS 421: Introduction to Artificial Intelligence 19 Apr 2012 Many slides courtesy of Dan Klein, Stuart Russell, or

More information

Introduction to Side Channel Analysis. Elisabeth Oswald University of Bristol

Introduction to Side Channel Analysis. Elisabeth Oswald University of Bristol Introduction to Side Channel Analysis Elisabeth Oswald University of Bristol Outline Part 1: SCA overview & leakage Part 2: SCA attacks & exploiting leakage and very briefly Part 3: Countermeasures Part

More information

Section 6-1 Overview. Definition. Definition. Using Area to Find Probability. Area and Probability

Section 6-1 Overview. Definition. Definition. Using Area to Find Probability. Area and Probability Chapter focus is on: Continuous random variables Normal distributions Figure 6-1 Section 6-1 Overview ( -1 e 2 x-µ σ ) 2 f(x) = σ 2 π Formula 6-1 Slide 1 Section 6-2 The Standard Normal Distribution Key

More information

Mind the gap Solving optimization problems with a quantum computer

Mind the gap Solving optimization problems with a quantum computer Mind the gap Solving optimization problems with a quantum computer A.P. Young http://physics.ucsc.edu/~peter Work supported by Talk at the London Centre for Nanotechnology, October 17, 2012 Collaborators:

More information

Introduction The Search Algorithm Grovers Algorithm References. Grovers Algorithm. Quantum Parallelism. Joseph Spring.

Introduction The Search Algorithm Grovers Algorithm References. Grovers Algorithm. Quantum Parallelism. Joseph Spring. Quantum Parallelism Applications Outline 1 2 One or Two Points 3 4 Quantum Parallelism We have discussed the concept of quantum parallelism and now consider a range of applications. These will include:

More information

7 Cryptanalysis. 7.1 Structural Attacks CA642: CRYPTOGRAPHY AND NUMBER THEORY 1

7 Cryptanalysis. 7.1 Structural Attacks CA642: CRYPTOGRAPHY AND NUMBER THEORY 1 CA642: CRYPTOGRAPHY AND NUMBER THEORY 1 7 Cryptanalysis Cryptanalysis Attacks such as exhaustive key-search do not exploit any properties of the encryption algorithm or implementation. Structural attacks

More information

Entanglement and Quantum Key Distribution at ESA

Entanglement and Quantum Key Distribution at ESA Entanglement and Quantum Key Distribution at ESA Eric Wille, TEC-MMO E.Murphy, TEC-MME ESA UNCLASSIFIED - For Official Use Entanglement and QKD Motivation Fundamental Research - Limitations of Quantum

More information

Lab 12: Structured Prediction

Lab 12: Structured Prediction December 4, 2014 Lecture plan structured perceptron application: confused messages application: dependency parsing structured SVM Class review: from modelization to classification What does learning mean?

More information

McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks

McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks Hang Dinh Indiana Uniersity South Bend joint work with Cristopher Moore Uniersity of New Mexico Alexander Russell Uniersity

More information

6677 Edexcel GCE Mechanics M1 (New Syllabus) Advanced/Advanced Subsidiary Friday 12 January 2001 Afternoon Time: 1 hour 30 minutes

6677 Edexcel GCE Mechanics M1 (New Syllabus) Advanced/Advanced Subsidiary Friday 12 January 2001 Afternoon Time: 1 hour 30 minutes Paper Reference(s) 6677 Edexcel GCE Mechanics M1 (New Syllabus) Advanced/Advanced Subsidiary Friday 12 January 2001 Afternoon Time: 1 hour 30 minutes Materials required for examination Answer Book (AB16)

More information

Ma/CS 6b Class 20: Spectral Graph Theory

Ma/CS 6b Class 20: Spectral Graph Theory Ma/CS 6b Class 20: Spectral Graph Theory By Adam Sheffer Eigenvalues and Eigenvectors A an n n matrix of real numbers. The eigenvalues of A are the numbers λ such that Ax = λx for some nonzero vector x

More information

MEASURING THE SPREAD OF DATA: 6F

MEASURING THE SPREAD OF DATA: 6F CONTINUING WITH DESCRIPTIVE STATS 6E,6F,6G,6H,6I MEASURING THE SPREAD OF DATA: 6F othink about this example: Suppose you are at a high school football game and you sample 40 people from the student section

More information

Evolutionary Tree Analysis. Overview

Evolutionary Tree Analysis. Overview CSI/BINF 5330 Evolutionary Tree Analysis Young-Rae Cho Associate Professor Department of Computer Science Baylor University Overview Backgrounds Distance-Based Evolutionary Tree Reconstruction Character-Based

More information

Cox s proportional hazards/regression model - model assessment

Cox s proportional hazards/regression model - model assessment Cox s proportional hazards/regression model - model assessment Rasmus Waagepetersen September 27, 2017 Topics: Plots based on estimated cumulative hazards Cox-Snell residuals: overall check of fit Martingale

More information

QALGO workshop, Riga. 1 / 26. Quantum algorithms for linear algebra.

QALGO workshop, Riga. 1 / 26. Quantum algorithms for linear algebra. QALGO workshop, Riga. 1 / 26 Quantum algorithms for linear algebra., Center for Quantum Technologies and Nanyang Technological University, Singapore. September 22, 2015 QALGO workshop, Riga. 2 / 26 Overview

More information

Analysis of the USGS Coastal Gradient Real-time Gaging Network

Analysis of the USGS Coastal Gradient Real-time Gaging Network Analysis of the USGS Coastal Gradient Real-time Gaging Network Paul Conrads, USGS, SC Water Science Center Kenneth Odom, USGS, CO Water Science Center Greater Everglades Ecosystem Restoration Conference

More information

Enumerate all possible assignments and take the An algorithm is a well-defined computational

Enumerate all possible assignments and take the An algorithm is a well-defined computational EMIS 8374 [Algorithm Design and Analysis] 1 EMIS 8374 [Algorithm Design and Analysis] 2 Designing and Evaluating Algorithms A (Bad) Algorithm for the Assignment Problem Enumerate all possible assignments

More information

Masking and Dual-rail Logic Don't Add Up

Masking and Dual-rail Logic Don't Add Up Masking and Dual-rail Logic Don't Add Up Patrick Schaumont schaum@vt.edu Secure Embedded Systems Group ECE Department Kris Tiri kris.tiri@intel.com Digital Enterprise Group Intel Corporation Our Contributions

More information

Towards Easy Key Enumeration

Towards Easy Key Enumeration Towards Easy Key Enumeration Changhai Ou, Degang Sun, Zhu Wang, and Xinping Zhou 1 Institute of Information Engineering, Chinese Academy of Sciences 2 School of Cyber Security, University of Chinese Academy

More information

Models of Computation, Recall Register Machines. A register machine (sometimes abbreviated to RM) is specified by:

Models of Computation, Recall Register Machines. A register machine (sometimes abbreviated to RM) is specified by: Models of Computation, 2010 1 Definition Recall Register Machines A register machine (sometimes abbreviated M) is specified by: Slide 1 finitely many registers R 0, R 1,..., R n, each capable of storing

More information

Spectral Method and Regularized MLE Are Both Optimal for Top-K Ranking

Spectral Method and Regularized MLE Are Both Optimal for Top-K Ranking Spectral Method and Regularized MLE Are Both Optimal for Top-K Ranking Yuxin Chen Electrical Engineering, Princeton University Joint work with Jianqing Fan, Cong Ma and Kaizheng Wang Ranking A fundamental

More information

Lecture 3. 1 Polynomial-time algorithms for the maximum flow problem

Lecture 3. 1 Polynomial-time algorithms for the maximum flow problem ORIE 633 Network Flows August 30, 2007 Lecturer: David P. Williamson Lecture 3 Scribe: Gema Plaza-Martínez 1 Polynomial-time algorithms for the maximum flow problem 1.1 Introduction Let s turn now to considering

More information

Combinatorial algorithms

Combinatorial algorithms Combinatorial algorithms computing subset rank and unrank, Gray codes, k-element subset rank and unrank, computing permutation rank and unrank Jiří Vyskočil, Radek Mařík 2012 Combinatorial Generation definition:

More information

General Least Squares Fitting

General Least Squares Fitting Chapter 1 General Least Squares Fitting 1.1 Introduction Previously you have done curve fitting in two dimensions. Now you will learn how to extend that to multiple dimensions. 1.1.1 Non-linear Linearizable

More information

Centre No. Candidate No. Paper Reference(s) 6665 Edexcel GCE Core Mathematics C3 Advanced Level Mock Paper

Centre No. Candidate No. Paper Reference(s) 6665 Edexcel GCE Core Mathematics C3 Advanced Level Mock Paper Paper Reference (complete below) Centre No. Surname Initial(s) 6 6 6 5 / 0 1 Candidate No. Signature Paper Reference(s) 6665 Edexcel GCE Core Mathematics C3 Advanced Level Mock Paper Time: 1 hour 30 minutes

More information

Recap. Probability, stochastic processes, Markov chains. ELEC-C7210 Modeling and analysis of communication networks

Recap. Probability, stochastic processes, Markov chains. ELEC-C7210 Modeling and analysis of communication networks Recap Probability, stochastic processes, Markov chains ELEC-C7210 Modeling and analysis of communication networks 1 Recap: Probability theory important distributions Discrete distributions Geometric distribution

More information

On Post-Quantum Cryptography

On Post-Quantum Cryptography On Post-Quantum Cryptography Ehsan Ebrahimi Quantum Cryptography Group University of Tartu, Estonia 15 March 2018 Information Security and Cryptography Group Seminar Post-Quantum Cryptography Users intend

More information

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012 Search and Lookahead Bernhard Nebel, Julien Hué, and Stefan Wölfl Albert-Ludwigs-Universität Freiburg June 4/6, 2012 Search and Lookahead Enforcing consistency is one way of solving constraint networks:

More information

1500 AMD Opteron processor (2.2 GHz with 2 GB RAM)

1500 AMD Opteron processor (2.2 GHz with 2 GB RAM) NICT 2019 2019 2 7 1 RSA RSA 2 3 (1) exp $ 64/9 + *(1) (ln 0) 1/2 (ln ln 0) 3/2 (2) 2009 12 768 (232 ) 1500 AMD Opteron processor (2.2 GHz with 2 GB RAM) 4 (3) 18 2 (1) (2) (3) 5 CRYPTREC 1. 2. 3. 1024,

More information

(ii) Write down the lowest integer which satisfies this inequality.

(ii) Write down the lowest integer which satisfies this inequality. Mr McGrath s special questions Paper A Higher. 1. Work out the value of x. Give your answer correct to 3 significant figures. 2 (a) Write 2 3 2 4 as a single power of 2. (b) 280 = 2 n 5 7 Find the value

More information

PAPER 1H GCSE/A1H GCSE MATHEMATICS. Practice Set A Non-Calculator Time allowed: 1 hour 30 minutes

PAPER 1H GCSE/A1H GCSE MATHEMATICS. Practice Set A Non-Calculator Time allowed: 1 hour 30 minutes Surname Other Names Candidate Signature Centre Number Candidate Number Examiner Comments Total Marks PAPER 1H GCSE MATHEMATICS CM Practice Set A Non-Calculator Time allowed: 1 hour 30 minutes Instructions

More information

4301/2H. General Certificate of Secondary Education November MATHEMATICS (SPECIFICATION A) 4301/2H Higher Tier Paper 2 Calculator

4301/2H. General Certificate of Secondary Education November MATHEMATICS (SPECIFICATION A) 4301/2H Higher Tier Paper 2 Calculator Surname Other Names For Examiner s Use Centre Number Candidate Number Candidate Signature General Certificate of Secondary Education November 2008 MATHEMATICS (SPECIFICATION A) 4301/2H Higher Tier Paper

More information

On the Complexity of the Hybrid Approach on HFEv-

On the Complexity of the Hybrid Approach on HFEv- On the Complexity of the Hybrid Approach on HFEv- Albrecht Petzoldt National Institute of Standards and Technology, Gaithersburg, Maryland, USA albrecht.petzoldt@gmail.com Abstract. The HFEv- signature

More information

Efficient Distributed Quantum Computing

Efficient Distributed Quantum Computing Efficient Distributed Quantum Computing Steve Brierley Heilbronn Institute, Dept. Mathematics, University of Bristol October 2013 Work with Robert Beals, Oliver Gray, Aram Harrow, Samuel Kutin, Noah Linden,

More information

Math 120 Introduction to Statistics Mr. Toner s Lecture Notes 3.1 Measures of Central Tendency

Math 120 Introduction to Statistics Mr. Toner s Lecture Notes 3.1 Measures of Central Tendency Math 1 Introduction to Statistics Mr. Toner s Lecture Notes 3.1 Measures of Central Tendency The word average: is very ambiguous and can actually refer to the mean, median, mode or midrange. Notation:

More information

Nominal Data. Parametric Statistics. Nonparametric Statistics. Parametric vs Nonparametric Tests. Greg C Elvers

Nominal Data. Parametric Statistics. Nonparametric Statistics. Parametric vs Nonparametric Tests. Greg C Elvers Nominal Data Greg C Elvers 1 Parametric Statistics The inferential statistics that we have discussed, such as t and ANOVA, are parametric statistics A parametric statistic is a statistic that makes certain

More information

PHYS 3220 Tutorials S. Goldhaber, S. Pollock, and the Physics Education Group University of Colorado, Boulder

PHYS 3220 Tutorials S. Goldhaber, S. Pollock, and the Physics Education Group University of Colorado, Boulder Energy and the Art of Sketching Wave Functions 1 I: Sketching wave functions A. Review: The figure to the right shows an infinite square well potential (V = 0 from L/2 to L/2 and is infinite everywhere

More information

Announcements. CS 188: Artificial Intelligence Fall VPI Example. VPI Properties. Reasoning over Time. Markov Models. Lecture 19: HMMs 11/4/2008

Announcements. CS 188: Artificial Intelligence Fall VPI Example. VPI Properties. Reasoning over Time. Markov Models. Lecture 19: HMMs 11/4/2008 CS 88: Artificial Intelligence Fall 28 Lecture 9: HMMs /4/28 Announcements Midterm solutions up, submit regrade requests within a week Midterm course evaluation up on web, please fill out! Dan Klein UC

More information

2011 Pearson Education, Inc

2011 Pearson Education, Inc Statistics for Business and Economics Chapter 2 Methods for Describing Sets of Data Summary of Central Tendency Measures Measure Formula Description Mean x i / n Balance Point Median ( n +1) Middle Value

More information

Number Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers

Number Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers Number Theory: Applications Number Theory Applications Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Results from Number Theory have many applications

More information

Cambridge International Examinations Cambridge International General Certificate of Secondary Education

Cambridge International Examinations Cambridge International General Certificate of Secondary Education Cambridge International Examinations Cambridge International General Certificate of Secondary Education CANDIDATE NAME CENTRE NUMBER CANDIDATE NUMBER * 9 8 6 4 0 7 5 2 4 9 * MATHEMATICS 0580/22 Paper 2

More information

Ma/CS 6b Class 20: Spectral Graph Theory

Ma/CS 6b Class 20: Spectral Graph Theory Ma/CS 6b Class 20: Spectral Graph Theory By Adam Sheffer Recall: Parity of a Permutation S n the set of permutations of 1,2,, n. A permutation σ S n is even if it can be written as a composition of an

More information

Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery

Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery Xin Ye, Thomas Eisenbarth and William Martin Worcester Polytechnic Institute, Worcester, MA 01609,

More information

Diploma Part 2. Quantitative Methods. Examiners Suggested Answers

Diploma Part 2. Quantitative Methods. Examiners Suggested Answers Diploma Part 2 Quantitative Methods Examiners Suggested Answers Q1 (a) A frequency distribution is a table or graph (i.e. a histogram) that shows the total number of measurements that fall in each of a

More information

October 24. Linear Momentum: - It is a vector which may require breaking it into components

October 24. Linear Momentum: - It is a vector which may require breaking it into components October 24 Linear Momentum: - It is a vector which may require breaking it into components Newton s First Law: A body continues with Constant Linear Momentum unless it is acted upon by a Net External Force.

More information

2 = -30 or 20 Hence an output of 2000 will maximize profit.

2 = -30 or 20 Hence an output of 2000 will maximize profit. QUANTITATIVE TOOLS IN BUSINESS NOV. SOLUTION (a) (i) Marginal Cost MC = Q Q + Total Cost TC = ʃ Mc = ʃ (Q Q + ) = Q Q + Q + C Where C is the constant of integration (ie C is fixed cost in GHS ) When Q

More information

Information in Radio Waves

Information in Radio Waves Summative Assessment: Natural Sources of Radio Performance expectation: Develop and use a model of two objects interacting through electric or magnetic fields to illustrate the forces between objects and

More information

Ø Set of mutually exclusive categories. Ø Classify or categorize subject. Ø No meaningful order to categorization.

Ø Set of mutually exclusive categories. Ø Classify or categorize subject. Ø No meaningful order to categorization. Statistical Tools in Evaluation HPS 41 Dr. Joe G. Schmalfeldt Types of Scores Continuous Scores scores with a potentially infinite number of values. Discrete Scores scores limited to a specific number

More information

EA = I 3 = E = i=1, i k

EA = I 3 = E = i=1, i k MTH5 Spring 7 HW Assignment : Sec.., # (a) and (c), 5,, 8; Sec.., #, 5; Sec.., #7 (a), 8; Sec.., # (a), 5 The due date for this assignment is //7. Sec.., # (a) and (c). Use the proof of Theorem. to obtain

More information

Notes. Number Theory: Applications. Notes. Number Theory: Applications. Notes. Hash Functions I

Notes. Number Theory: Applications. Notes. Number Theory: Applications. Notes. Hash Functions I Number Theory: Applications Slides by Christopher M. Bourke Instructor: Berthe Y. Choueiry Fall 2007 Computer Science & Engineering 235 Introduction to Discrete Mathematics Sections 3.4 3.7 of Rosen cse235@cse.unl.edu

More information

The Quantum Threat to Cybersecurity (for CxOs)

The Quantum Threat to Cybersecurity (for CxOs) The Quantum Threat to Cybersecurity (for CxOs) Michele Mosca 5 th ETSI-IQC Workshop on Quantum-Safe Cryptography 13 September 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M.

More information

Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling

Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling Liron David 1, Avishai Wool 2 School of Electrical Engineering, Tel Aviv University, Ramat Aviv 69978, Israel 1 lirondavid@gmail.com,

More information

Public-key Cryptography and elliptic curves

Public-key Cryptography and elliptic curves Public-key Cryptography and elliptic curves Dan Nichols nichols@math.umass.edu University of Massachusetts Oct. 14, 2015 Cryptography basics Cryptography is the study of secure communications. Here are

More information

QCRYPT Saturation Attack on Continuous-Variable Quantum Key Distribution System. Hao Qin*, Rupesh Kumar, and Romain Alléaume

QCRYPT Saturation Attack on Continuous-Variable Quantum Key Distribution System. Hao Qin*, Rupesh Kumar, and Romain Alléaume QCRYPT 2013 August 04,2013 IQC, University of Waterloo Canada Saturation Attack on Continuous-Variable Quantum Key Distribution System Hao Qin*, Rupesh Kumar, and Romain Alléaume Quantum Information Team

More information

Cryptography Lecture 3. Pseudorandom generators LFSRs

Cryptography Lecture 3. Pseudorandom generators LFSRs Cryptography Lecture 3 Pseudorandom generators LFSRs Remember One Time Pad is ideal With OTP you need the same transmission capacity via an already secure channel for the key as you can then secure via

More information

Quantum Algorithms via Linear Algebra

Quantum Algorithms via Linear Algebra Schedule and Presentation of Topics, April 28, 2017 Meyerhenke, Glantz, Looz, Tzovas 1 Meyerhenke, Glantz, Looz, Tzovas: Institute for Theoretical Computer www.kit.edu Science How hot is quantum computing?

More information

Construction X for quantum error-correcting codes

Construction X for quantum error-correcting codes Simon Fraser University Burnaby, BC, Canada joint work with Vijaykumar Singh International Workshop on Coding and Cryptography WCC 2013 Bergen, Norway 15 April 2013 Overview Construction X is known from

More information

CPSC 91 Computer Security Fall Computer Security. Assignment #2

CPSC 91 Computer Security Fall Computer Security. Assignment #2 CPSC 91 Computer Security Assignment #2 Note that for many of the problems, there are many possible solutions. I only describe one possible solution for each problem here, but we could examine other possible

More information

SECTION 5.1: Polynomials

SECTION 5.1: Polynomials 1 SECTION 5.1: Polynomials Functions Definitions: Function, Independent Variable, Dependent Variable, Domain, and Range A function is a rule that assigns to each input value x exactly output value y =

More information

CS1820 Notes. hgupta1, kjline, smechery. April 3-April 5. output: plausible Ancestral Recombination Graph (ARG)

CS1820 Notes. hgupta1, kjline, smechery. April 3-April 5. output: plausible Ancestral Recombination Graph (ARG) CS1820 Notes hgupta1, kjline, smechery April 3-April 5 April 3 Notes 1 Minichiello-Durbin Algorithm input: set of sequences output: plausible Ancestral Recombination Graph (ARG) note: the optimal ARG is

More information

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certifi cate of Secondary Education

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certifi cate of Secondary Education UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certifi cate of Secondary Education *8971791642* MATHEMATICS 0580/22 Paper 2 (Extended) October/November 2013 Candidates answer

More information

Quantum Differential and Linear Cryptanalysis

Quantum Differential and Linear Cryptanalysis Quantum Differential and Linear Cryptanalysis Marc Kaplan 1,2 Gaëtan Leurent 3 Anthony Leverrier 3 María Naya-Plasencia 3 1 LTCI, Télécom ParisTech 2 School of Informatics, University of Edinburgh 3 Inria

More information

Side Channel Analysis and Protection for McEliece Implementations

Side Channel Analysis and Protection for McEliece Implementations Side Channel Analysis and Protection for McEliece Implementations Thomas Eisenbarth Joint work with Cong Chen, Ingo von Maurich and Rainer Steinwandt 9/27/2016 NATO Workshop- Tel Aviv University Overview

More information

GENERALIZED NONLINEARITY OF S-BOXES. Sugata Gangopadhyay

GENERALIZED NONLINEARITY OF S-BOXES. Sugata Gangopadhyay Volume X, No. 0X, 0xx, X XX doi:0.3934/amc.xx.xx.xx GENERALIZED NONLINEARITY OF -BOXE ugata Gangopadhyay Department of Computer cience and Engineering, Indian Institute of Technology Roorkee, Roorkee 47667,

More information

Code-based Cryptography

Code-based Cryptography a Hands-On Introduction Daniel Loebenberger Ηράκλειο, September 27, 2018 Post-Quantum Cryptography Various flavours: Lattice-based cryptography Hash-based cryptography Code-based

More information

Math 410 Linear Algebra Summer Session American River College

Math 410 Linear Algebra Summer Session American River College Course Information Instructor: Kristin Lui Email: luik@arc.losrios.edu Office Hours: By appointment Location: Liberal Arts 163 ARC Main Campus Meet Times: Tuesday/Thursday 6:30 pm 9:40 pm Dates: June 16,

More information

Multi-Map Orbit Hopping Chaotic Stream Cipher

Multi-Map Orbit Hopping Chaotic Stream Cipher Multi-Map Orbit Hopping Chaotic Stream Cipher Xiaowen Zhang 1, Li Shu 2, Ke Tang 1 Abstract In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum

More information

Impossible Boomerang Attack for Block Cipher Structures

Impossible Boomerang Attack for Block Cipher Structures Impossible Boomerang Attack for Block Cipher Structures Jiali Choy and Huihui Yap DSO National Laboratories 20 Science Park Drive, Singapore 118230 Email: cjiali, yhuihui@dso.org.sg Abstract. Impossible

More information

Practical Analysis of Key Recovery Attack against Search-LWE Problem

Practical Analysis of Key Recovery Attack against Search-LWE Problem Practical Analysis of Key Recovery Attack against Search-LWE Problem The 11 th International Workshop on Security, Sep. 13 th 2016 Momonari Kudo, Junpei Yamaguchi, Yang Guo and Masaya Yasuda 1 Graduate

More information

Every binary word is, almost, a shuffle of twin subsequences a theorem of Axenovich, Person and Puzynina

Every binary word is, almost, a shuffle of twin subsequences a theorem of Axenovich, Person and Puzynina Every binary word is, almost, a shuffle of twin subsequences a theorem of Axenovich, Person and Puzynina Martin Klazar August 17, 2015 A twin in a word u = a 1 a 2... a n is a pair (u 1, u 2 ) of disjoint

More information

PAPER 1H GCSE/A1H GCSE MATHEMATICS. Practice Set A Non-Calculator Time allowed: 1 hour 30 minutes

PAPER 1H GCSE/A1H GCSE MATHEMATICS. Practice Set A Non-Calculator Time allowed: 1 hour 30 minutes Surname Other Names Candidate Signature Centre Number Candidate Number Examiner Comments Total Marks PAPER 1H GCSE MATHEMATICS CM Practice Set A Non-Calculator Time allowed: 1 hour 30 minutes Instructions

More information