A Grey Pseudo Random Number Generator

Size: px
Start display at page:

Download "A Grey Pseudo Random Number Generator"

Transcription

1 A Grey Pseudo Random Numer Generator Yi-Fung Huang 1 Kun-Li Wen 2 Chu-Hsing Lin 3 Jen-Chieh Chang 4 1, 3, 4 Department of Computer Science and Information Engineering Tunghai University, Taichung, Taiwan yifung@thuedutw, chlin@thuedutw, g942817@thuedutw 2 Department of Electrical Engineering, GSRC, Chiennkuo Technology University, Changhua, Taiwan klw@ccckitedutw Astract In this paper, we apply the Grey Theory to the generation of pseudo random numers and propose a Grey Pseudo Random Numer Generator The experimental result shows that the grey pseudo random numer generator has some advantageous features The generated pseudo random numer sequences pass the FIPS PUB tests By using Chi-square test on 120,000 generated grey pseudo random numer sequences, each sequence contains 2,500 integers, we have 98% of them are acceptale through the goodness-of-fit tests Besides, the generated sequence has long period; the length of the period exceeds ytes Keywords and Phrases: Pseudo random numer generator, cryptographically secure pseudo-random sequence, Grey Theory, Grey pseudo random numer generator (GPRNG), FIPS 140-2, Chi-square test 1 Introduction Pseudo random numer sequence has very important applications in cryptography such as key generation There are some conventional methods for generating pseudo random numer sequences: Linear Feedack Shift Register (LFSR) [1~3], Linear Congruence Generator (LCG) [4~6], Nonlinear Random Numer Generator [7] For application purpose, a sequence is cryptographically secure pseudo-random sequence if it has two properties: It looks random It passes all the statistical tests of randomness that we can find (2) It is unpredictale It is not periodic with reasonale length enough for applications[8] It is not easy to design a secure and fast pseudo random numer generator [9] In this paper, we propose a Grey Pseudo Random Numer Generator (GPRNG) that can generate pseudo random numer sequence and pass the statistical tests of FIPS PUB (Federal Information Processing Standards Pulication 140-2) [10] and Chi-square test In summary, our proposed method has the following features: 171

2 The generated pseudo random numer sequences can staly pass all the tests in FIPS PUB and the passing rate could e over 999% under 120,000 data tests (2) By using Chi-square test on the 120,000 pseudo random numer sequences generated y our method, each sequence contains 2,500 integers; we have acceptance rate of 98% (3) The generated grey pseudo random numer sequence has long period; the length of the period exceeds yte (4) If there is a tiny difference etween two input data, the pseudo random numers generated will e entirely different and irrelevant We develop a software program to implement our method for the generation of sequences, called grey pseudo random numer sequences The generated grey pseudo random numer sequences are suject to the FIPS PUB random numer tests and Chi-square Test In Section 2, the mathematical ackground for the GPRNG is riefly descried The GM(1,1) grey model, ladder increase, inner product operation and mod operation are integrated and applied in the GPRNG Method for finding the length of the period of grey pseudo random numer sequence is also discussed In Section 3, we show the experimental results Finally, we give some conclusion 2 Grey Pseudo Random Numer Generator The Grey Theory is proposed in 1982[11], the word grey means in-completeness and un-determinaility It is applied to handle some of in-complete and un-determinale prolems The grey prediction [12] is a domain of the grey system, which is used for anticipating the future status of any grey condition GM(1,1) [13,14,15] is one of the mathematical models of grey prediction The GM(1,1) is a model of predicting process, which uses an accumulated generation operation (AGO) and some equations to produce an infinite grey sequences In this paper, we apply the features of GM(1,1) to design our GPRNG Based on the GM(1,1) model, y giving a finite original sequence X, called the initial sequence, we create an infinite pseudo random numer sequence Before we start it, we first define some notations: n : the length of a grey sequence (2) AGO : Accumulated Generation Operation (3) X : the i-th AGO grey sequence ( ) (4) x i ( k) : k-th element of the i-th AGO grey sequence ˆ i ( ) (5) X : i-th prediction AGO grey sequence (6) xˆ ( i ) ( k) : k-th element of the i-th prediction AGO grey sequence (7) Y : i-th modified AGO grey sequence ( ) (8) y i ( k) : k-th element of i-th modified AGO grey sequence 172

3 21 The creation of an infinite grey numer sequence Step 1 Initial grey sequence X is given y a user X = ( x, x (2), x (3),, x ( n)) x ( 0) ( k) R +, 1 k n Step2 1 st AGO grey sequence X is computed from X y using X = ( x, x (2), x (3),, x (n)) (2) k ( 1) x k = ( ) x ( h), 1 k n = 1 h Step 3 1 st prediction AGO grey sequence X ) is calculated as follows Xˆ = (xˆ, xˆ (2), xˆ (3),, xˆ (n), xˆ (n + 1)) (3) xˆ ]e a +, 0 k n a ak (k + 1) = [x, and according to GM(1,1) model, the solution of a and is a = ( B B) ( x (2), x (3), x (4),, x ( n)) A =, T 1 B T A 1 (x + x (2)) 2 1 (x (2) + x (3)) 2 B = 1 (x (n 1) + x (n)) 2 Step 4 1 st modified AGO grey sequence Y is otained from y Y = (y, y (2), y (3),, y (n)) (5) (k) = xˆ (k + 1),1 k n Step 5 When j 2, the AGO grey sequence X is as elow x (j) k (k) = = i 1 y X (j) (j) (j) (j) (j) = (x,x (2),x (3),,x (n)) (6) (j 1), 1 k n Step 6 When j 2, the prediction AGO grey sequence Xˆ is as elow xˆ Xˆ = (xˆ, xˆ (2),xˆ (3),, xˆ (n), xˆ (n + 1)) (7) ]e a +, 0 k n a ak (k + 1) = [x and according to GM(1,1) model, the solution of a and is a = ( B B) T 1 B T A ˆX (4) (8) 173

4 ( i 1) ( i 1) ( i 1) ( i 1) T = ( y (2), y (3), y (4),, y ( n, A )) 1 (x + x (2)) 2 1 (x (2) + x (3)) 2 B = 1 (x (n 1) + x (n)) 2 Note that, if a equal to 0, otained from equation (4) or (8), then we have to set a to e 05 and if xˆ ( i ) ( k) is less than 0 for some k, otained from equation (3) or (7), then we set xˆ ( i ) ( k ( ) ) to e xˆ i ( k) Step 7 When i 2, the modified AGO grey sequence Y is as follows Y y ( k) = xˆ ( k + 1), 1 k n = ( y, y (2), y (3),, y ( n)) (9) As finishing the Step 7, we can increase the variale-i y 1, and then go ack to Step 5, keep on producing the next grey sequence; therefore, we have an infinite grey sequence In Section 22, we let Ψ = Ψ, Ψ, Ψ,, Ψ,) e the pseudo random numer sequence ( m generated y the GPRNG Parameter q is used for assigning the length of pseudo random numer sequence Now let us give some symols used in the following algorithm: Ψ = Ψ, Ψ, Ψ,, Ψ,) ( m : pseudo random numer sequence (2) q : a parameter used for assigning the length of pseudo random numer sequence (3) Max(Sequence) : the maximum element of a given sequence 22 The algorithm of grey pseudo random numer generator Step 1 Setting the initial value of count variale i = 1, from equation to equation (5), we have X Y = n k= 1 ψ x 1 X Y mod 256 = (10) (k) y Step 2 For i = i + 1, from equation (6) to equation (9), we have Step 3 For Y If ( Max( Y EndIf ψ t X Y mod 256 (k) = (11) X Y = (y =, y n k = 1 x (2), y ) ) > 256, then (k) y (k) (3), L, y (n)) Ψ ( X Y ) mod 256 (12) 0 = y k) = ( y ( k) + ψ k) mod 26, 1 k n (13) ( 0 174

5 + Step 4 If t < q,q Z, then ack to the Step 2 Else go to the Step 5 Step 5 End of procedure Although the sequence Ψ = Ψ, Ψ, Ψ,, Ψ,) is finite, the user can assign the value of ( q q, when q, the system will approach to an infinite pseudo random numer sequence We note that the grey sequence increased y AGO, make Y like a ladder, the data ecome larger and larger To avoid this situation to e out of control, we need some kind of adjust to keep the value of grey sequence under reasonale range In Step (3) of the Section 22, we take a equation to adjust every sequence elements in Y, in case of the element of Y is larger than 256 We use the inner product and some mathematical methods in Step and (2), to turn our grey sequence with real numers into an integer a pseudo random numer Eventually, we will get an infinite pseudo random numer sequence if we run the pseudo random numer generation algorithm y setting q to e 3 Experimental results For testing and verifying the features of the proposed GPRNG, we develop a program toolox in this paper The main menu is a multiple pages Microsoft window screen, as shown in Fig 1 We may input 5 to 10 real numers to each field appeared in the main menu Fig 1 Main menu of the grey pseudo random numer generator The input real numers are the initial grey sequence for activating the GPRNG The histogram as displayed on the first page of the screen is the result of the generated grey pseudo random numers under Chi-square statistical test The values of the grey pseudo 175

6 random numers generated y GPRNG ranged from 0 to 255 Therefore, we define 8 numers as one unit There would e 32 units ranged from 0 to 31, as displayed along the X-axis in the histogram The repeat times, called counts, of occurrence for each unit would e plotted against the Y-axis For each experiment we conducted, there would e 2,500 grey pseudo random numers generated The mean value of occurrence of each unit is times The result of the goodness-of-fit tests is indicated on the top of the histogram The FIPS PUB contains the following four methods in testing the randomness: 1 Monoit Test, 2 Poker Test, 3 Runs Test, and 4 Long Run Test The FIPS PUB page (as shown in Fig 2) is the results for the four kinds of testing as mentioned aove As we know, the grey pseudo random numers are generated sequentially, if there are two different reseeds Y and Y (j) such that Y = Y (j), j is the smallest integer that greater than i, then the period is equal to ( j i ) After the massive computation for different seeds input, the lengths of periods are different ut always greater than ytes 4 Conclusions In this paper, we propose a pseudo random numer generator y applying the Grey Theory From the experiments, we can see that the GM(1,1) produces a certain degree of variation etween the pseudo random numers generated Ladder increase and inner product operation intensify the variation of the uncertainty And the mod operation will pull the pseudo random numer ack to our desired range (0-255) Different input to the algorithm would generate different grey pseudo random numer sequences and determine the quality of the sequence of pseudo random numers generated After massive data is randomly input into the grey sequence (aout 120,000 entries of data), and the output of grey pseudo random numer sequence is compiled into statistical form, we have the following result: The passing rate under FIPS PUB tests is as high as 999%; (2) The acceptance rate of the Chi-Square Test is higher than 98%; (3) Under the massive computation y different seed inputs, it shows that the length of period for the generated grey pseudo random numer sequence exceeds ytes, (4) Due to the AGO operation on each new reseed, the output of grey pseudo random numer is very sensitive to the input seed After the several statistical tests, we can claim that GPRNG has very high quality However, the arithmetic calculations of the algorithm are somewhat complicated How to simplify the arithmetic calculations ut not loss the variance and entropy of the GPRNS is an interesting topic for further research 176

7 Fig 2 The results of FIPS PUB tests Reference [1] S Palit, B K Roy, Cryptanalysis of LFSR-Encrypted Codes with Unknown Comining Function, International Conference on the Theory and Application of Cryptology and Information Security, 1999, pp [2] K Ichino, K Watanae, M Arai, S Fukumoto and K Iwasaki, A Seed Selection Procedure for LFSR-ased Random Pattern Generators, Design Automation Conference 2003, Proceedings of the ASP-DAC 2003, Asia and South Pacific, Jan 2003, pp [3] C H Chen, Synthesis of Configurale Linear Feedack Shifter Registers for Detecting Random-pattern-resistant Faults, Proceedings of the 14 th international symposium on Systems synthesis, International Symposium on Systems Synthesis, 2001, pp [4] J Boyar Plumstead, Inferring a Sequence Generated y a Linear Congruence, Proceedings of 23 rd IEEE Symposium on the Foundations of Computer Science, 1982, pp [5] J Boyar, Inferring Sequence Produced y a Linear Congruential Generator Missing Lower-Order Bits, Journal of Cryptology, vol 1, no 3, pp , 1989 [6] A Pfeiffer, Overview of the LCG Application Area Software Projects, Nuclear Science Symposium Conference Record, 2004 IEEE, Oct 2004, pp

8 [7] E L Key, An Analysis of the Structure and Complexity of Nonlinear Binary Sequence Generators, IEEE Trans Information Theory, vol IT-22, no 6, Nov 1976, pp [8] B Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2 nd Edition, John Wiley & Sons, Inc, 1996 [9] P Hellekalek, Good Random Numer Generator Are (not so) Easy to Find, Mathematics and Computers in Simulation, vol 46, June 1998, pp [10] Federal Information Processing Standards Pulication 140-1, Security Requirements for Cryptographic Modules, Cryptographic, Computer Security, National Institute of Standards and Technology (NIST), [11] K L Wen, Grey Systems: Modeling And Prediction,Yang s Scientific Research Institute, AZ, USA, Octoer, 2004 [12] H K Chianq, C H Tseng, Integral Variale Structure Controller with Grey Prediction for Synchronous Reluctance Motor Drive, IEE Proceedings, Electric Power Applications, vol 151, issue 3, pp , May 2004 [13] K L Wen, Study of GM(1,N) with Data Square Matrix, Journal of Grey System, vol 13, no 1, pp41-48, 2001 [14] H K Chiou, G H Tzeng and C K Cheng, Grey Prediction GM(1,1) Model for Forecasting Demand of Planned Spare Parts in Navy of Taiwan, MCDM 2004, Whistler, B C Canada August 6-11, 2004 [15] C C Tong, J W Dai, T C Chang and K L Wen, A New Algorithm in Throughput Prediction of ALOHA protocol y using GM(1,1) Model, System, Man, and Cyernetics, 2001 IEEE International Conference, vol 4, pp ,

Cryptanalysis on An ElGamal-Like Cryptosystem for Encrypting Large Messages

Cryptanalysis on An ElGamal-Like Cryptosystem for Encrypting Large Messages Cryptanalysis on An ElGamal-Like Cryptosystem for Encrypting Large Messages MEI-NA WANG Institute for Information Industry Networks and Multimedia Institute TAIWAN, R.O.C. myrawang@iii.org.tw SUNG-MING

More information

Pseudo-Random Number Generators

Pseudo-Random Number Generators Unit 41 April 18, 2011 1 Pseudo-Random Number Generators Recall the one-time pad: k = k 1, k 2, k 3... a random bit-string p = p 1, p 2, p 3,... plaintext bits E(p) = p k. We desire long sequences of numbers

More information

CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS

CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS 24 CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS 3.1 INTRODUCTION Pseudo Random Number Generators (PRNGs) are widely used in many applications, such as numerical analysis, probabilistic

More information

Stream Ciphers. Çetin Kaya Koç Winter / 20

Stream Ciphers. Çetin Kaya Koç   Winter / 20 Çetin Kaya Koç http://koclab.cs.ucsb.edu Winter 2016 1 / 20 Linear Congruential Generators A linear congruential generator produces a sequence of integers x i for i = 1,2,... starting with the given initial

More information

IEOR SEMINAR SERIES Cryptanalysis: Fast Correlation Attacks on LFSR-based Stream Ciphers

IEOR SEMINAR SERIES Cryptanalysis: Fast Correlation Attacks on LFSR-based Stream Ciphers IEOR SEMINAR SERIES Cryptanalysis: Fast Correlation Attacks on LFSR-based Stream Ciphers presented by Goutam Sen Research Scholar IITB Monash Research Academy. 1 Agenda: Introduction to Stream Ciphers

More information

A New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm

A New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm A New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm Min-Shiang Hwang Cheng-Chi Lee Shiang-Feng Tzeng Department of Management Information System National Chung Hsing University

More information

Section 8.5. z(t) = be ix(t). (8.5.1) Figure A pendulum. ż = ibẋe ix (8.5.2) (8.5.3) = ( bẋ 2 cos(x) bẍ sin(x)) + i( bẋ 2 sin(x) + bẍ cos(x)).

Section 8.5. z(t) = be ix(t). (8.5.1) Figure A pendulum. ż = ibẋe ix (8.5.2) (8.5.3) = ( bẋ 2 cos(x) bẍ sin(x)) + i( bẋ 2 sin(x) + bẍ cos(x)). Difference Equations to Differential Equations Section 8.5 Applications: Pendulums Mass-Spring Systems In this section we will investigate two applications of our work in Section 8.4. First, we will consider

More information

On the Big Gap Between p and q in DSA

On the Big Gap Between p and q in DSA On the Big Gap Between p and in DSA Zhengjun Cao Department of Mathematics, Shanghai University, Shanghai, China, 200444. caozhj@shu.edu.cn Abstract We introduce a message attack against DSA and show that

More information

A NEW RANDOM NUMBER GENERATOR USING FIBONACCI SERIES

A NEW RANDOM NUMBER GENERATOR USING FIBONACCI SERIES International J. of Math. Sci. & Engg. Appls. (IJMSEA) ISSN 0973-9424, Vol. 11 No. I (April, 2017), pp. 185-193 A NEW RANDOM NUMBER GENERATOR USING FIBONACCI SERIES KOTTA NAGALAKSHMI RACHANA 1 AND SOUBHIK

More information

How does the computer generate observations from various distributions specified after input analysis?

How does the computer generate observations from various distributions specified after input analysis? 1 How does the computer generate observations from various distributions specified after input analysis? There are two main components to the generation of observations from probability distributions.

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle Network Security Chapter 2 Basics 2.4 Random Number Generation for Cryptographic Protocols Motivation It is

More information

#A50 INTEGERS 14 (2014) ON RATS SEQUENCES IN GENERAL BASES

#A50 INTEGERS 14 (2014) ON RATS SEQUENCES IN GENERAL BASES #A50 INTEGERS 14 (014) ON RATS SEQUENCES IN GENERAL BASES Johann Thiel Dept. of Mathematics, New York City College of Technology, Brooklyn, New York jthiel@citytech.cuny.edu Received: 6/11/13, Revised:

More information

A Fast Digital Chaotic Generator for Secure Communication

A Fast Digital Chaotic Generator for Secure Communication A Fast Digital Chaotic Generator for Secure Communication Shih-Liang Chen TingTing Hwang Shu-Ming Chang Wen-Wei Lin Abstract In this paper, we propose a digitalized chaotic map, Variational Logistic Map

More information

FinQuiz Notes

FinQuiz Notes Reading 9 A time series is any series of data that varies over time e.g. the quarterly sales for a company during the past five years or daily returns of a security. When assumptions of the regression

More information

Cryptanalysis of a computer cryptography scheme based on a filter bank

Cryptanalysis of a computer cryptography scheme based on a filter bank NOTICE: This is the author s version of a work that was accepted by Chaos, Solitons & Fractals in August 2007. Changes resulting from the publishing process, such as peer review, editing, corrections,

More information

Improved Cascaded Stream Ciphers Using Feedback

Improved Cascaded Stream Ciphers Using Feedback Improved Cascaded Stream Ciphers Using Feedback Lu Xiao 1, Stafford Tavares 1, Amr Youssef 2, and Guang Gong 3 1 Department of Electrical and Computer Engineering, Queen s University, {xiaolu, tavares}@ee.queensu.ca

More information

Investigation of a Ball Screw Feed Drive System Based on Dynamic Modeling for Motion Control

Investigation of a Ball Screw Feed Drive System Based on Dynamic Modeling for Motion Control Investigation of a Ball Screw Feed Drive System Based on Dynamic Modeling for Motion Control Yi-Cheng Huang *, Xiang-Yuan Chen Department of Mechatronics Engineering, National Changhua University of Education,

More information

New Constructions of Sonar Sequences

New Constructions of Sonar Sequences INTERNATIONAL JOURNAL OF BASIC & APPLIED SCIENCES IJBAS-IJENS VOL.:14 NO.:01 12 New Constructions of Sonar Sequences Diego F. Ruiz 1, Carlos A. Trujillo 1, and Yadira Caicedo 2 1 Department of Mathematics,

More information

Weak key analysis for chaotic cipher based on randomness properties

Weak key analysis for chaotic cipher based on randomness properties . RESEARCH PAPER. SCIENCE CHINA Information Sciences May 01 Vol. 55 No. 5: 116 1171 doi: 10.1007/s1143-011-4401-x Weak key analysis for chaotic cipher based on randomness properties YIN RuMing, WANG Jian,

More information

Cryptanalysis of a Multistage Encryption System

Cryptanalysis of a Multistage Encryption System Cryptanalysis of a Multistage Encryption System Chengqing Li, Xinxiao Li, Shujun Li and Guanrong Chen Department of Mathematics, Zhejiang University, Hangzhou, Zhejiang 310027, China Software Engineering

More information

Asymmetric Encryption

Asymmetric Encryption -3 s s Encryption Comp Sci 3600 Outline -3 s s 1-3 2 3 4 5 s s Outline -3 s s 1-3 2 3 4 5 s s Function Using Bitwise XOR -3 s s Key Properties for -3 s s The most important property of a hash function

More information

How does the computer generate observations from various distributions specified after input analysis?

How does the computer generate observations from various distributions specified after input analysis? 1 How does the computer generate observations from various distributions specified after input analysis? There are two main components to the generation of observations from probability distributions.

More information

Linear Feedback Shift Registers

Linear Feedback Shift Registers Linear Feedback Shift Registers Pseudo-Random Sequences A pseudo-random sequence is a periodic sequence of numbers with a very long period. Golomb's Principles G1: The # of zeros and ones should be as

More information

A Knapsack Cryptosystem Based on The Discrete Logarithm Problem

A Knapsack Cryptosystem Based on The Discrete Logarithm Problem A Knapsack Cryptosystem Based on The Discrete Logarithm Problem By K.H. Rahouma Electrical Technology Department Technical College in Riyadh Riyadh, Kingdom of Saudi Arabia E-mail: kamel_rahouma@yahoo.com

More information

Digitized Chaos for Pseudo-Random Number Generation in Cryptography

Digitized Chaos for Pseudo-Random Number Generation in Cryptography Digitized Chaos for Pseudo-Random Numer Generation in Cryptography Tommaso Addao, Ada Fort, Santina Rocchi, Valerio Vignoli Department of Information Engineering University of Siena, 53 Italy e-mail: addao@dii.unisi.it)

More information

Spatial Short-Term Load Forecasting using Grey Dynamic Model Specific in Tropical Area

Spatial Short-Term Load Forecasting using Grey Dynamic Model Specific in Tropical Area E5-0 International Conference on Electrical Engineering and Informatics 7-9 July 0, Bandung, Indonesia Spatial Short-Term Load Forecasting using Grey Dynamic Model Specific in Tropical Area Yusra Sari

More information

Analysis of FIPS Test and Chaos-Based Pseudorandom Number Generator

Analysis of FIPS Test and Chaos-Based Pseudorandom Number Generator Chaotic Modeling and Simulation (CMSIM) : 73 80, 013 Analysis of FIPS 140- Test and Chaos-Based Pseudorandom Number Generator Lequan Min, Tianyu Chen, and Hongyan Zang Mathematics and Physics School, University

More information

Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis

Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis Weak eys of the Full MISTY1 Block Cipher for Related-ey Cryptanalysis Jiqiang Lu 1, Wun-She Yap 1,2, and Yongzhuang Wei 3,4 1 Institute for Infocomm Research, Agency for Science, Technology and Research

More information

Design of Cryptographically Strong Generator By Transforming Linearly Generated Sequences

Design of Cryptographically Strong Generator By Transforming Linearly Generated Sequences Design of Cryptographically Strong Generator By Transforming Linearly Generated Sequences Matthew N. Anyanwu Department of Computer Science The University of Memphis Memphis, TN 38152, U.S.A. manyanwu

More information

Comments on A Time Delay Controller for Systems with Uncertain Dynamics

Comments on A Time Delay Controller for Systems with Uncertain Dynamics Comments on A Time Delay Controller for Systems with Uncertain Dynamics Qing-Chang Zhong Dept. of Electrical & Electronic Engineering Imperial College of Science, Technology, and Medicine Exhiition Rd.,

More information

B. Encryption using quasigroup

B. Encryption using quasigroup Sequence Randomization Using Quasigroups and Number Theoretic s Vaignana Spoorthy Ella Department of Computer Science Oklahoma State University Stillwater, Oklahoma, USA spoorthyella@okstateedu Abstract

More information

Design of S-Box using Combination of Chaotic Functions

Design of S-Box using Combination of Chaotic Functions 129 Design of S-Box using Combination of Chaotic Functions Tanu Wadhera 1, Gurmeet Kaur 2 1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, India 2 Department of Electronics

More information

Pseudo-Random Generators

Pseudo-Random Generators Pseudo-Random Generators Topics Why do we need random numbers? Truly random and Pseudo-random numbers. Definition of pseudo-random-generator What do we expect from pseudorandomness? Testing for pseudo-randomness.

More information

A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith

A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith Abstract Generating random numbers are mainly used to create secret keys or random

More information

arxiv: v1 [cs.cr] 18 Jul 2009

arxiv: v1 [cs.cr] 18 Jul 2009 Breaking a Chaotic Cryptographic Scheme Based on Composition Maps Chengqing Li 1, David Arroyo 2, and Kwok-Tung Lo 1 1 Department of Electronic and Information Engineering, The Hong Kong Polytechnic University,

More information

Topics. Pseudo-Random Generators. Pseudo-Random Numbers. Truly Random Numbers

Topics. Pseudo-Random Generators. Pseudo-Random Numbers. Truly Random Numbers Topics Pseudo-Random Generators Why do we need random numbers? Truly random and Pseudo-random numbers. Definition of pseudo-random-generator What do we expect from pseudorandomness? Testing for pseudo-randomness.

More information

Polynomial Degree and Finite Differences

Polynomial Degree and Finite Differences CONDENSED LESSON 7.1 Polynomial Degree and Finite Differences In this lesson, you Learn the terminology associated with polynomials Use the finite differences method to determine the degree of a polynomial

More information

Mathematical Ideas Modelling data, power variation, straightening data with logarithms, residual plots

Mathematical Ideas Modelling data, power variation, straightening data with logarithms, residual plots Kepler s Law Level Upper secondary Mathematical Ideas Modelling data, power variation, straightening data with logarithms, residual plots Description and Rationale Many traditional mathematics prolems

More information

Estimating a Finite Population Mean under Random Non-Response in Two Stage Cluster Sampling with Replacement

Estimating a Finite Population Mean under Random Non-Response in Two Stage Cluster Sampling with Replacement Open Journal of Statistics, 07, 7, 834-848 http://www.scirp.org/journal/ojs ISS Online: 6-798 ISS Print: 6-78X Estimating a Finite Population ean under Random on-response in Two Stage Cluster Sampling

More information

A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations

A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. X, MONTH 2007 1 A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations James A. Muir Abstract We present a simple algorithm

More information

1. Define the following terms (1 point each): alternative hypothesis

1. Define the following terms (1 point each): alternative hypothesis 1 1. Define the following terms (1 point each): alternative hypothesis One of three hypotheses indicating that the parameter is not zero; one states the parameter is not equal to zero, one states the parameter

More information

-Cryptosystem: A Chaos Based Public Key Cryptosystem

-Cryptosystem: A Chaos Based Public Key Cryptosystem International Journal of Cryptology Research 1(2): 149-163 (2009) -Cryptosystem: A Chaos Based Public Key Cryptosystem 1 M.R.K. Ariffin and 2 N.A. Abu 1 Al-Kindi Cryptography Research Laboratory, Laboratory

More information

Modifying Shor s algorithm to compute short discrete logarithms

Modifying Shor s algorithm to compute short discrete logarithms Modifying Shor s algorithm to compute short discrete logarithms Martin Ekerå Decemer 7, 06 Astract We revisit Shor s algorithm for computing discrete logarithms in F p on a quantum computer and modify

More information

SOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies

SOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies SOBER Cryptanalysis Daniel Bleichenbacher and Sarvar Patel {bleichen,sarvar}@lucent.com Bell Laboratories Lucent Technologies Abstract. SOBER is a new stream cipher that has recently been developed by

More information

DEPARTMENT OF ECONOMICS

DEPARTMENT OF ECONOMICS ISSN 089-64 ISBN 978 0 7340 405 THE UNIVERSITY OF MELBOURNE DEPARTMENT OF ECONOMICS RESEARCH PAPER NUMBER 06 January 009 Notes on the Construction of Geometric Representations of Confidence Intervals of

More information

GENERALIZED ARYABHATA REMAINDER THEOREM

GENERALIZED ARYABHATA REMAINDER THEOREM International Journal of Innovative Computing, Information and Control ICIC International c 2010 ISSN 1349-4198 Volume 6, Number 4, April 2010 pp. 1865 1871 GENERALIZED ARYABHATA REMAINDER THEOREM Chin-Chen

More information

Stream ciphers I. Thomas Johansson. May 16, Dept. of EIT, Lund University, P.O. Box 118, Lund, Sweden

Stream ciphers I. Thomas Johansson. May 16, Dept. of EIT, Lund University, P.O. Box 118, Lund, Sweden Dept. of EIT, Lund University, P.O. Box 118, 221 00 Lund, Sweden thomas@eit.lth.se May 16, 2011 Outline: Introduction to stream ciphers Distinguishers Basic constructions of distinguishers Various types

More information

Pseudo-automata for generalized regular expressions

Pseudo-automata for generalized regular expressions Pseudo-automata for generalized regular expressions B. F. Melnikov A. A. Melnikova Astract In this paper we introduce a new formalism which is intended for representing a special extensions of finite automata.

More information

ON FLATNESS OF NONLINEAR IMPLICIT SYSTEMS

ON FLATNESS OF NONLINEAR IMPLICIT SYSTEMS ON FLATNESS OF NONLINEAR IMPLICIT SYSTEMS Paulo Sergio Pereira da Silva, Simone Batista Escola Politécnica da USP Av. Luciano Gualerto trav. 03, 158 05508-900 Cidade Universitária São Paulo SP BRAZIL Escola

More information

A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations

A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations James A. Muir School of Computer Science Carleton University, Ottawa, Canada http://www.scs.carleton.ca/ jamuir 23 October

More information

PREDICTING MASKED LINEAR PSEUDORANDOM NUMBER GENERATORS OVER FINITE FIELDS

PREDICTING MASKED LINEAR PSEUDORANDOM NUMBER GENERATORS OVER FINITE FIELDS PREDICTING MASKED LINEAR PSEUDORANDOM NUMBER GENERATORS OVER FINITE FIELDS JAIME GUTIERREZ, ÁLVAR IBEAS, DOMINGO GÓMEZ-PEREZ, AND IGOR E. SHPARLINSKI Abstract. We study the security of the linear generator

More information

Solving Systems of Linear Equations Symbolically

Solving Systems of Linear Equations Symbolically " Solving Systems of Linear Equations Symolically Every day of the year, thousands of airline flights crisscross the United States to connect large and small cities. Each flight follows a plan filed with

More information

Pseudo-Random Generators

Pseudo-Random Generators Pseudo-Random Generators Why do we need random numbers? Simulation Sampling Numerical analysis Computer programming (e.g. randomized algorithm) Elementary and critical element in many cryptographic protocols

More information

Random number generators

Random number generators s generators Comp Sci 1570 Introduction to Outline s 1 2 s generator s The of a sequence of s or symbols that cannot be reasonably predicted better than by a random chance, usually through a random- generator

More information

Design Parameter Sensitivity Analysis of High-Speed Motorized Spindle Systems Considering High-Speed Effects

Design Parameter Sensitivity Analysis of High-Speed Motorized Spindle Systems Considering High-Speed Effects Proceedings of the 2007 IEEE International Conference on Mechatronics and Automation August 5-8, 2007, Harin, China Design Parameter Sensitivity Analysis of High-Speed Motorized Spindle Systems Considering

More information

Periodicity and Distribution Properties of Combined FCSR Sequences

Periodicity and Distribution Properties of Combined FCSR Sequences Periodicity and Distribution Properties of Combined FCSR Sequences Mark Goresky 1, and Andrew Klapper, 1 Institute for Advanced Study, Princeton NJ www.math.ias.edu/~goresky Dept. of Computer Science,

More information

Chaos and Dynamical Systems

Chaos and Dynamical Systems Chaos and Dynamical Systems y Megan Richards Astract: In this paper, we will discuss the notion of chaos. We will start y introducing certain mathematical concepts needed in the understanding of chaos,

More information

Wednesday, February 21. Today we will begin Course Notes Chapter 5 (Number Theory).

Wednesday, February 21. Today we will begin Course Notes Chapter 5 (Number Theory). Wednesday, February 21 Today we will begin Course Notes Chapter 5 (Number Theory). 1 Return to Chapter 5 In discussing Methods of Proof (Chapter 3, Section 2) we introduced the divisibility relation from

More information

Compactness vs Collusion Resistance in Functional Encryption

Compactness vs Collusion Resistance in Functional Encryption Compactness vs Collusion Resistance in Functional Encryption Baiyu Li Daniele Micciancio April 10, 2017 Astract We present two general constructions that can e used to comine any two functional encryption

More information

Chapter 2 Canonical Correlation Analysis

Chapter 2 Canonical Correlation Analysis Chapter 2 Canonical Correlation Analysis Canonical correlation analysis CCA, which is a multivariate analysis method, tries to quantify the amount of linear relationships etween two sets of random variales,

More information

Depth versus Breadth in Convolutional Polar Codes

Depth versus Breadth in Convolutional Polar Codes Depth versus Breadth in Convolutional Polar Codes Maxime Tremlay, Benjamin Bourassa and David Poulin,2 Département de physique & Institut quantique, Université de Sherrooke, Sherrooke, Quéec, Canada JK

More information

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Muxiang Zhang 1 and Agnes Chan 2 1 GTE Laboratories Inc., 40 Sylvan Road LA0MS59, Waltham, MA 02451 mzhang@gte.com 2 College of Computer

More information

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences A Fúster-Sabater P Caballero-Gil 2 Institute of Applied Physics, CSIC Serrano 44, 286 Madrid, Spain Email: amparo@ieccsices

More information

Design of Cryptographically Strong Generator By Transforming Linearly Generated Sequences

Design of Cryptographically Strong Generator By Transforming Linearly Generated Sequences Design of Cryptographically Strong Generator By Transforming Linearly Generated Sequences Matthew N. Anyanwu Department of Computer Science The University of Memphis Memphis, TN 38152, U.S.A. Lih-Yuan

More information

Generalized Correlation Analysis of Vectorial Boolean Functions

Generalized Correlation Analysis of Vectorial Boolean Functions Generalized Correlation Analysis of Vectorial Boolean Functions Claude Carlet 1, Khoongming Khoo 2, Chu-Wee Lim 2, and Chuan-Wen Loe 2 1 University of Paris 8 (MAATICAH) also with INRIA, Projet CODES,

More information

LINEAR FEEDBACK SHIFT REGISTER BASED UNIQUE RANDOM NUMBER GENERATOR

LINEAR FEEDBACK SHIFT REGISTER BASED UNIQUE RANDOM NUMBER GENERATOR LINEAR FEEDBACK SHIFT REGISTER BASED UNIQUE RANDOM NUMBER GENERATOR HARSH KUMAR VERMA 1 & RAVINDRA KUMAR SINGH 2 1,2 Department of Computer Science and Engineering, Dr. B. R. Ambedkar National Institute

More information

On Quasigroup Pseudo Random Sequence Generators

On Quasigroup Pseudo Random Sequence Generators On Quasigroup Pseudo Random Sequence Generators V. Dimitrova, J. Markovski Institute of Informatics, Faculty of Natural Sciences and Mathematics Ss Cyril and Methodius University, 1 Skopje, FYRO Macedonia

More information

Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm

Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Gwo-Ruey Yu Department of Electrical Engineering I-Shou University aohsiung County 840, Taiwan gwoyu@isu.edu.tw

More information

Zeroing the baseball indicator and the chirality of triples

Zeroing the baseball indicator and the chirality of triples 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 7 (2004), Article 04.1.7 Zeroing the aseall indicator and the chirality of triples Christopher S. Simons and Marcus Wright Department of Mathematics

More information

SUFFIX TREE. SYNONYMS Compact suffix trie

SUFFIX TREE. SYNONYMS Compact suffix trie SUFFIX TREE Maxime Crochemore King s College London and Université Paris-Est, http://www.dcs.kcl.ac.uk/staff/mac/ Thierry Lecroq Université de Rouen, http://monge.univ-mlv.fr/~lecroq SYNONYMS Compact suffix

More information

Chaotic Based Secure Hash Algorithm

Chaotic Based Secure Hash Algorithm Chaotic Based Secure Hash Algorithm Mazen Tawfik Mohammed 1, Alaa Eldin Rohiem 2, Ali El-moghazy 3 and A. Z. Ghalwash 4 1,2 Military technical College, Cairo, Egypt 3 Higher Technological Institute, Cairo,

More information

Haar Spectrum of Bent Boolean Functions

Haar Spectrum of Bent Boolean Functions Malaysian Journal of Mathematical Sciences 1(S) February: 9 21 (216) Special Issue: The 3 rd International Conference on Mathematical Applications in Engineering 21 (ICMAE 1) MALAYSIAN JOURNAL OF MATHEMATICAL

More information

David A. Pape Department of Engineering and Technology Central Michigan University Mt Pleasant, Michigan

David A. Pape Department of Engineering and Technology Central Michigan University Mt Pleasant, Michigan Session: ENG 03-091 Deflection Solutions for Edge Stiffened Plates David A. Pape Department of Engineering and Technology Central Michigan University Mt Pleasant, Michigan david.pape@cmich.edu Angela J.

More information

1Number ONLINE PAGE PROOFS. systems: real and complex. 1.1 Kick off with CAS

1Number ONLINE PAGE PROOFS. systems: real and complex. 1.1 Kick off with CAS 1Numer systems: real and complex 1.1 Kick off with CAS 1. Review of set notation 1.3 Properties of surds 1. The set of complex numers 1.5 Multiplication and division of complex numers 1.6 Representing

More information

Self-shrinking Bit Generation Algorithm Based on Feedback with Carry Shift Register

Self-shrinking Bit Generation Algorithm Based on Feedback with Carry Shift Register Advanced Studies in Theoretical Physics Vol. 8, 2014, no. 24, 1057-1061 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/astp.2014.49132 Self-shrinking Bit Generation Algorithm Based on Feedback

More information

An Algorithm for Inversion in GF(2 m ) Suitable for Implementation Using a Polynomial Multiply Instruction on GF(2)

An Algorithm for Inversion in GF(2 m ) Suitable for Implementation Using a Polynomial Multiply Instruction on GF(2) An Algorithm for Inversion in GF2 m Suitable for Implementation Using a Polynomial Multiply Instruction on GF2 Katsuki Kobayashi, Naofumi Takagi, and Kazuyoshi Takagi Department of Information Engineering,

More information

CHAPTER 5. Linear Operators, Span, Linear Independence, Basis Sets, and Dimension

CHAPTER 5. Linear Operators, Span, Linear Independence, Basis Sets, and Dimension A SERIES OF CLASS NOTES TO INTRODUCE LINEAR AND NONLINEAR PROBLEMS TO ENGINEERS, SCIENTISTS, AND APPLIED MATHEMATICIANS LINEAR CLASS NOTES: A COLLECTION OF HANDOUTS FOR REVIEW AND PREVIEW OF LINEAR THEORY

More information

Module 9: Further Numbers and Equations. Numbers and Indices. The aim of this lesson is to enable you to: work with rational and irrational numbers

Module 9: Further Numbers and Equations. Numbers and Indices. The aim of this lesson is to enable you to: work with rational and irrational numbers Module 9: Further Numers and Equations Lesson Aims The aim of this lesson is to enale you to: wor with rational and irrational numers wor with surds to rationalise the denominator when calculating interest,

More information

Upper Bounds for Stern s Diatomic Sequence and Related Sequences

Upper Bounds for Stern s Diatomic Sequence and Related Sequences Upper Bounds for Stern s Diatomic Sequence and Related Sequences Colin Defant Department of Mathematics University of Florida, U.S.A. cdefant@ufl.edu Sumitted: Jun 18, 01; Accepted: Oct, 016; Pulished:

More information

Robot Position from Wheel Odometry

Robot Position from Wheel Odometry Root Position from Wheel Odometry Christopher Marshall 26 Fe 2008 Astract This document develops equations of motion for root position as a function of the distance traveled y each wheel as a function

More information

Enough Entropy? Justify It!

Enough Entropy? Justify It! Enough Entropy? Justify It! Yi Mao, Ph.D., CISSP CST Lab Manager atsec information security corp. Email: yi@atsec.com Agenda Before IG 7.14 and IG 7.15 IG 7.14 Entropy Caveats IG 7.15 Entropy Assessment

More information

Entropy Evaluation for Oscillator-based True Random Number Generators

Entropy Evaluation for Oscillator-based True Random Number Generators Entropy Evaluation for Oscillator-based True Random Number Generators Yuan Ma DCS Center Institute of Information Engineering Chinese Academy of Sciences Outline RNG Modeling method Experiment Entropy

More information

A Block Cipher using an Iterative Method involving a Permutation

A Block Cipher using an Iterative Method involving a Permutation Journal of Discrete Mathematical Sciences & Cryptography Vol. 18 (015), No. 3, pp. 75 9 DOI : 10.1080/097059.014.96853 A Block Cipher using an Iterative Method involving a Permutation Lakshmi Bhavani Madhuri

More information

New Minimal Weight Representations for Left-to-Right Window Methods

New Minimal Weight Representations for Left-to-Right Window Methods New Minimal Weight Representations for Left-to-Right Window Methods James A. Muir 1 and Douglas R. Stinson 2 1 Department of Combinatorics and Optimization 2 School of Computer Science University of Waterloo

More information

Smart Hill Climbing Finds Better Boolean Functions

Smart Hill Climbing Finds Better Boolean Functions Smart Hill Climbing Finds Better Boolean Functions William Millan, Andrew Clark and Ed Dawson Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane, Queensland,

More information

Test Pattern Generator for Built-in Self-Test using Spectral Methods

Test Pattern Generator for Built-in Self-Test using Spectral Methods Test Pattern Generator for Built-in Self-Test using Spectral Methods Alok S. Doshi and Anand S. Mudlapur Auburn University 2 Dept. of Electrical and Computer Engineering, Auburn, AL, USA doshias,anand@auburn.edu

More information

Implementation of Digital Chaotic Signal Generator Based on Reconfigurable LFSRs for Multiple Access Communications

Implementation of Digital Chaotic Signal Generator Based on Reconfigurable LFSRs for Multiple Access Communications Australian Journal of Basic and Applied Sciences, 4(7): 1691-1698, 2010 ISSN 1991-8178 Implementation of Digital Chaotic Signal Generator Based on Reconfigurable LFSRs for Multiple Access Communications

More information

An Efficient Heuristic Algorithm for Linear Decomposition of Index Generation Functions

An Efficient Heuristic Algorithm for Linear Decomposition of Index Generation Functions An Efficient Heuristic Algorithm for Linear Decomposition of Index Generation Functions Shinobu Nagayama Tsutomu Sasao Jon T. Butler Dept. of Computer and Network Eng., Hiroshima City University, Hiroshima,

More information

A fast modular multiplication algorithm for calculating the product AB modulo N

A fast modular multiplication algorithm for calculating the product AB modulo N Information Processing Letters 72 (1999) 77 81 A fast modular multiplication algorithm for calculating the product AB modulo N Chien-Yuan Chen a,, Chin-Chen Chang b,1 a Department of Information Engineering,

More information

Uniform and Exponential Random Floating Point Number Generation

Uniform and Exponential Random Floating Point Number Generation Uniform and Exponential Random Floating Point Number Generation Thomas Morgenstern Hochschule Harz, Friedrichstr. 57-59, D-38855 Wernigerode tmorgenstern@hs-harz.de Summary. Pseudo random number generators

More information

ROUNDOFF ERRORS; BACKWARD STABILITY

ROUNDOFF ERRORS; BACKWARD STABILITY SECTION.5 ROUNDOFF ERRORS; BACKWARD STABILITY ROUNDOFF ERROR -- error due to the finite representation (usually in floatingpoint form) of real (and complex) numers in digital computers. FLOATING-POINT

More information

CPSC 531: Random Numbers. Jonathan Hudson Department of Computer Science University of Calgary

CPSC 531: Random Numbers. Jonathan Hudson Department of Computer Science University of Calgary CPSC 531: Random Numbers Jonathan Hudson Department of Computer Science University of Calgary http://www.ucalgary.ca/~hudsonj/531f17 Introduction In simulations, we generate random values for variables

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 16 October 30, 2017 CPSC 467, Lecture 16 1/52 Properties of Hash Functions Hash functions do not always look random Relations among

More information

Blind Collective Signature Protocol

Blind Collective Signature Protocol Computer Science Journal of Moldova, vol.19, no.1(55), 2011 Blind Collective Signature Protocol Nikolay A. Moldovyan Abstract Using the digital signature (DS) scheme specified by Belarusian DS standard

More information

Binary GH Sequences for Multiparty Communication. Krishnamurthy Kirthi

Binary GH Sequences for Multiparty Communication. Krishnamurthy Kirthi Binary GH Sequences for Multiparty Communication Krishnamurthy Kirthi Abstract This paper investigates cross correlation properties of sequences derived from GH sequences modulo p, where p is a prime number

More information

Minimizing a convex separable exponential function subject to linear equality constraint and bounded variables

Minimizing a convex separable exponential function subject to linear equality constraint and bounded variables Minimizing a convex separale exponential function suect to linear equality constraint and ounded variales Stefan M. Stefanov Department of Mathematics Neofit Rilski South-Western University 2700 Blagoevgrad

More information

Spacecraft Math. Stephen Leake

Spacecraft Math. Stephen Leake Spacecraft Math Stephen Leake 27 Septemer 2008 2 Chapter 1 Introduction This document presents a thorough summary of vector, quaternion, and matrix math used in spacecraft applications, in oth flight and

More information

The WHILE Hierarchy of Program Schemes is Infinite

The WHILE Hierarchy of Program Schemes is Infinite The WHILE Hierarchy of Program Schemes is Infinite Can Adam Alayrak and Thomas Noll RWTH Aachen Ahornstr. 55, 52056 Aachen, Germany alayrak@informatik.rwth-aachen.de and noll@informatik.rwth-aachen.de

More information

Parallel Cube Tester Analysis of the CubeHash One-Way Hash Function

Parallel Cube Tester Analysis of the CubeHash One-Way Hash Function Parallel Cube Tester Analysis of the CubeHash One-Way Hash Function Alan Kaminsky Department of Computer Science B. Thomas Golisano College of Computing and Information Sciences Rochester Institute of

More information

Fraction-Integer Method (FIM) for Calculating Multiplicative Inverse

Fraction-Integer Method (FIM) for Calculating Multiplicative Inverse Fraction-Integer Method (FIM) for Calculating Multiplicative Inverse Sattar J Aboud Department o f Computers Science, Philadelphia University Jordan Amman E-mail: sattar_aboud@yahoo.com ABSTRACT Multiplicative

More information