A Grey Pseudo Random Number Generator
|
|
- Mavis Murphy
- 6 years ago
- Views:
Transcription
1 A Grey Pseudo Random Numer Generator Yi-Fung Huang 1 Kun-Li Wen 2 Chu-Hsing Lin 3 Jen-Chieh Chang 4 1, 3, 4 Department of Computer Science and Information Engineering Tunghai University, Taichung, Taiwan yifung@thuedutw, chlin@thuedutw, g942817@thuedutw 2 Department of Electrical Engineering, GSRC, Chiennkuo Technology University, Changhua, Taiwan klw@ccckitedutw Astract In this paper, we apply the Grey Theory to the generation of pseudo random numers and propose a Grey Pseudo Random Numer Generator The experimental result shows that the grey pseudo random numer generator has some advantageous features The generated pseudo random numer sequences pass the FIPS PUB tests By using Chi-square test on 120,000 generated grey pseudo random numer sequences, each sequence contains 2,500 integers, we have 98% of them are acceptale through the goodness-of-fit tests Besides, the generated sequence has long period; the length of the period exceeds ytes Keywords and Phrases: Pseudo random numer generator, cryptographically secure pseudo-random sequence, Grey Theory, Grey pseudo random numer generator (GPRNG), FIPS 140-2, Chi-square test 1 Introduction Pseudo random numer sequence has very important applications in cryptography such as key generation There are some conventional methods for generating pseudo random numer sequences: Linear Feedack Shift Register (LFSR) [1~3], Linear Congruence Generator (LCG) [4~6], Nonlinear Random Numer Generator [7] For application purpose, a sequence is cryptographically secure pseudo-random sequence if it has two properties: It looks random It passes all the statistical tests of randomness that we can find (2) It is unpredictale It is not periodic with reasonale length enough for applications[8] It is not easy to design a secure and fast pseudo random numer generator [9] In this paper, we propose a Grey Pseudo Random Numer Generator (GPRNG) that can generate pseudo random numer sequence and pass the statistical tests of FIPS PUB (Federal Information Processing Standards Pulication 140-2) [10] and Chi-square test In summary, our proposed method has the following features: 171
2 The generated pseudo random numer sequences can staly pass all the tests in FIPS PUB and the passing rate could e over 999% under 120,000 data tests (2) By using Chi-square test on the 120,000 pseudo random numer sequences generated y our method, each sequence contains 2,500 integers; we have acceptance rate of 98% (3) The generated grey pseudo random numer sequence has long period; the length of the period exceeds yte (4) If there is a tiny difference etween two input data, the pseudo random numers generated will e entirely different and irrelevant We develop a software program to implement our method for the generation of sequences, called grey pseudo random numer sequences The generated grey pseudo random numer sequences are suject to the FIPS PUB random numer tests and Chi-square Test In Section 2, the mathematical ackground for the GPRNG is riefly descried The GM(1,1) grey model, ladder increase, inner product operation and mod operation are integrated and applied in the GPRNG Method for finding the length of the period of grey pseudo random numer sequence is also discussed In Section 3, we show the experimental results Finally, we give some conclusion 2 Grey Pseudo Random Numer Generator The Grey Theory is proposed in 1982[11], the word grey means in-completeness and un-determinaility It is applied to handle some of in-complete and un-determinale prolems The grey prediction [12] is a domain of the grey system, which is used for anticipating the future status of any grey condition GM(1,1) [13,14,15] is one of the mathematical models of grey prediction The GM(1,1) is a model of predicting process, which uses an accumulated generation operation (AGO) and some equations to produce an infinite grey sequences In this paper, we apply the features of GM(1,1) to design our GPRNG Based on the GM(1,1) model, y giving a finite original sequence X, called the initial sequence, we create an infinite pseudo random numer sequence Before we start it, we first define some notations: n : the length of a grey sequence (2) AGO : Accumulated Generation Operation (3) X : the i-th AGO grey sequence ( ) (4) x i ( k) : k-th element of the i-th AGO grey sequence ˆ i ( ) (5) X : i-th prediction AGO grey sequence (6) xˆ ( i ) ( k) : k-th element of the i-th prediction AGO grey sequence (7) Y : i-th modified AGO grey sequence ( ) (8) y i ( k) : k-th element of i-th modified AGO grey sequence 172
3 21 The creation of an infinite grey numer sequence Step 1 Initial grey sequence X is given y a user X = ( x, x (2), x (3),, x ( n)) x ( 0) ( k) R +, 1 k n Step2 1 st AGO grey sequence X is computed from X y using X = ( x, x (2), x (3),, x (n)) (2) k ( 1) x k = ( ) x ( h), 1 k n = 1 h Step 3 1 st prediction AGO grey sequence X ) is calculated as follows Xˆ = (xˆ, xˆ (2), xˆ (3),, xˆ (n), xˆ (n + 1)) (3) xˆ ]e a +, 0 k n a ak (k + 1) = [x, and according to GM(1,1) model, the solution of a and is a = ( B B) ( x (2), x (3), x (4),, x ( n)) A =, T 1 B T A 1 (x + x (2)) 2 1 (x (2) + x (3)) 2 B = 1 (x (n 1) + x (n)) 2 Step 4 1 st modified AGO grey sequence Y is otained from y Y = (y, y (2), y (3),, y (n)) (5) (k) = xˆ (k + 1),1 k n Step 5 When j 2, the AGO grey sequence X is as elow x (j) k (k) = = i 1 y X (j) (j) (j) (j) (j) = (x,x (2),x (3),,x (n)) (6) (j 1), 1 k n Step 6 When j 2, the prediction AGO grey sequence Xˆ is as elow xˆ Xˆ = (xˆ, xˆ (2),xˆ (3),, xˆ (n), xˆ (n + 1)) (7) ]e a +, 0 k n a ak (k + 1) = [x and according to GM(1,1) model, the solution of a and is a = ( B B) T 1 B T A ˆX (4) (8) 173
4 ( i 1) ( i 1) ( i 1) ( i 1) T = ( y (2), y (3), y (4),, y ( n, A )) 1 (x + x (2)) 2 1 (x (2) + x (3)) 2 B = 1 (x (n 1) + x (n)) 2 Note that, if a equal to 0, otained from equation (4) or (8), then we have to set a to e 05 and if xˆ ( i ) ( k) is less than 0 for some k, otained from equation (3) or (7), then we set xˆ ( i ) ( k ( ) ) to e xˆ i ( k) Step 7 When i 2, the modified AGO grey sequence Y is as follows Y y ( k) = xˆ ( k + 1), 1 k n = ( y, y (2), y (3),, y ( n)) (9) As finishing the Step 7, we can increase the variale-i y 1, and then go ack to Step 5, keep on producing the next grey sequence; therefore, we have an infinite grey sequence In Section 22, we let Ψ = Ψ, Ψ, Ψ,, Ψ,) e the pseudo random numer sequence ( m generated y the GPRNG Parameter q is used for assigning the length of pseudo random numer sequence Now let us give some symols used in the following algorithm: Ψ = Ψ, Ψ, Ψ,, Ψ,) ( m : pseudo random numer sequence (2) q : a parameter used for assigning the length of pseudo random numer sequence (3) Max(Sequence) : the maximum element of a given sequence 22 The algorithm of grey pseudo random numer generator Step 1 Setting the initial value of count variale i = 1, from equation to equation (5), we have X Y = n k= 1 ψ x 1 X Y mod 256 = (10) (k) y Step 2 For i = i + 1, from equation (6) to equation (9), we have Step 3 For Y If ( Max( Y EndIf ψ t X Y mod 256 (k) = (11) X Y = (y =, y n k = 1 x (2), y ) ) > 256, then (k) y (k) (3), L, y (n)) Ψ ( X Y ) mod 256 (12) 0 = y k) = ( y ( k) + ψ k) mod 26, 1 k n (13) ( 0 174
5 + Step 4 If t < q,q Z, then ack to the Step 2 Else go to the Step 5 Step 5 End of procedure Although the sequence Ψ = Ψ, Ψ, Ψ,, Ψ,) is finite, the user can assign the value of ( q q, when q, the system will approach to an infinite pseudo random numer sequence We note that the grey sequence increased y AGO, make Y like a ladder, the data ecome larger and larger To avoid this situation to e out of control, we need some kind of adjust to keep the value of grey sequence under reasonale range In Step (3) of the Section 22, we take a equation to adjust every sequence elements in Y, in case of the element of Y is larger than 256 We use the inner product and some mathematical methods in Step and (2), to turn our grey sequence with real numers into an integer a pseudo random numer Eventually, we will get an infinite pseudo random numer sequence if we run the pseudo random numer generation algorithm y setting q to e 3 Experimental results For testing and verifying the features of the proposed GPRNG, we develop a program toolox in this paper The main menu is a multiple pages Microsoft window screen, as shown in Fig 1 We may input 5 to 10 real numers to each field appeared in the main menu Fig 1 Main menu of the grey pseudo random numer generator The input real numers are the initial grey sequence for activating the GPRNG The histogram as displayed on the first page of the screen is the result of the generated grey pseudo random numers under Chi-square statistical test The values of the grey pseudo 175
6 random numers generated y GPRNG ranged from 0 to 255 Therefore, we define 8 numers as one unit There would e 32 units ranged from 0 to 31, as displayed along the X-axis in the histogram The repeat times, called counts, of occurrence for each unit would e plotted against the Y-axis For each experiment we conducted, there would e 2,500 grey pseudo random numers generated The mean value of occurrence of each unit is times The result of the goodness-of-fit tests is indicated on the top of the histogram The FIPS PUB contains the following four methods in testing the randomness: 1 Monoit Test, 2 Poker Test, 3 Runs Test, and 4 Long Run Test The FIPS PUB page (as shown in Fig 2) is the results for the four kinds of testing as mentioned aove As we know, the grey pseudo random numers are generated sequentially, if there are two different reseeds Y and Y (j) such that Y = Y (j), j is the smallest integer that greater than i, then the period is equal to ( j i ) After the massive computation for different seeds input, the lengths of periods are different ut always greater than ytes 4 Conclusions In this paper, we propose a pseudo random numer generator y applying the Grey Theory From the experiments, we can see that the GM(1,1) produces a certain degree of variation etween the pseudo random numers generated Ladder increase and inner product operation intensify the variation of the uncertainty And the mod operation will pull the pseudo random numer ack to our desired range (0-255) Different input to the algorithm would generate different grey pseudo random numer sequences and determine the quality of the sequence of pseudo random numers generated After massive data is randomly input into the grey sequence (aout 120,000 entries of data), and the output of grey pseudo random numer sequence is compiled into statistical form, we have the following result: The passing rate under FIPS PUB tests is as high as 999%; (2) The acceptance rate of the Chi-Square Test is higher than 98%; (3) Under the massive computation y different seed inputs, it shows that the length of period for the generated grey pseudo random numer sequence exceeds ytes, (4) Due to the AGO operation on each new reseed, the output of grey pseudo random numer is very sensitive to the input seed After the several statistical tests, we can claim that GPRNG has very high quality However, the arithmetic calculations of the algorithm are somewhat complicated How to simplify the arithmetic calculations ut not loss the variance and entropy of the GPRNS is an interesting topic for further research 176
7 Fig 2 The results of FIPS PUB tests Reference [1] S Palit, B K Roy, Cryptanalysis of LFSR-Encrypted Codes with Unknown Comining Function, International Conference on the Theory and Application of Cryptology and Information Security, 1999, pp [2] K Ichino, K Watanae, M Arai, S Fukumoto and K Iwasaki, A Seed Selection Procedure for LFSR-ased Random Pattern Generators, Design Automation Conference 2003, Proceedings of the ASP-DAC 2003, Asia and South Pacific, Jan 2003, pp [3] C H Chen, Synthesis of Configurale Linear Feedack Shifter Registers for Detecting Random-pattern-resistant Faults, Proceedings of the 14 th international symposium on Systems synthesis, International Symposium on Systems Synthesis, 2001, pp [4] J Boyar Plumstead, Inferring a Sequence Generated y a Linear Congruence, Proceedings of 23 rd IEEE Symposium on the Foundations of Computer Science, 1982, pp [5] J Boyar, Inferring Sequence Produced y a Linear Congruential Generator Missing Lower-Order Bits, Journal of Cryptology, vol 1, no 3, pp , 1989 [6] A Pfeiffer, Overview of the LCG Application Area Software Projects, Nuclear Science Symposium Conference Record, 2004 IEEE, Oct 2004, pp
8 [7] E L Key, An Analysis of the Structure and Complexity of Nonlinear Binary Sequence Generators, IEEE Trans Information Theory, vol IT-22, no 6, Nov 1976, pp [8] B Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2 nd Edition, John Wiley & Sons, Inc, 1996 [9] P Hellekalek, Good Random Numer Generator Are (not so) Easy to Find, Mathematics and Computers in Simulation, vol 46, June 1998, pp [10] Federal Information Processing Standards Pulication 140-1, Security Requirements for Cryptographic Modules, Cryptographic, Computer Security, National Institute of Standards and Technology (NIST), [11] K L Wen, Grey Systems: Modeling And Prediction,Yang s Scientific Research Institute, AZ, USA, Octoer, 2004 [12] H K Chianq, C H Tseng, Integral Variale Structure Controller with Grey Prediction for Synchronous Reluctance Motor Drive, IEE Proceedings, Electric Power Applications, vol 151, issue 3, pp , May 2004 [13] K L Wen, Study of GM(1,N) with Data Square Matrix, Journal of Grey System, vol 13, no 1, pp41-48, 2001 [14] H K Chiou, G H Tzeng and C K Cheng, Grey Prediction GM(1,1) Model for Forecasting Demand of Planned Spare Parts in Navy of Taiwan, MCDM 2004, Whistler, B C Canada August 6-11, 2004 [15] C C Tong, J W Dai, T C Chang and K L Wen, A New Algorithm in Throughput Prediction of ALOHA protocol y using GM(1,1) Model, System, Man, and Cyernetics, 2001 IEEE International Conference, vol 4, pp ,
Cryptanalysis on An ElGamal-Like Cryptosystem for Encrypting Large Messages
Cryptanalysis on An ElGamal-Like Cryptosystem for Encrypting Large Messages MEI-NA WANG Institute for Information Industry Networks and Multimedia Institute TAIWAN, R.O.C. myrawang@iii.org.tw SUNG-MING
More informationPseudo-Random Number Generators
Unit 41 April 18, 2011 1 Pseudo-Random Number Generators Recall the one-time pad: k = k 1, k 2, k 3... a random bit-string p = p 1, p 2, p 3,... plaintext bits E(p) = p k. We desire long sequences of numbers
More informationCHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS
24 CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS 3.1 INTRODUCTION Pseudo Random Number Generators (PRNGs) are widely used in many applications, such as numerical analysis, probabilistic
More informationStream Ciphers. Çetin Kaya Koç Winter / 20
Çetin Kaya Koç http://koclab.cs.ucsb.edu Winter 2016 1 / 20 Linear Congruential Generators A linear congruential generator produces a sequence of integers x i for i = 1,2,... starting with the given initial
More informationIEOR SEMINAR SERIES Cryptanalysis: Fast Correlation Attacks on LFSR-based Stream Ciphers
IEOR SEMINAR SERIES Cryptanalysis: Fast Correlation Attacks on LFSR-based Stream Ciphers presented by Goutam Sen Research Scholar IITB Monash Research Academy. 1 Agenda: Introduction to Stream Ciphers
More informationA New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm
A New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm Min-Shiang Hwang Cheng-Chi Lee Shiang-Feng Tzeng Department of Management Information System National Chung Hsing University
More informationSection 8.5. z(t) = be ix(t). (8.5.1) Figure A pendulum. ż = ibẋe ix (8.5.2) (8.5.3) = ( bẋ 2 cos(x) bẍ sin(x)) + i( bẋ 2 sin(x) + bẍ cos(x)).
Difference Equations to Differential Equations Section 8.5 Applications: Pendulums Mass-Spring Systems In this section we will investigate two applications of our work in Section 8.4. First, we will consider
More informationOn the Big Gap Between p and q in DSA
On the Big Gap Between p and in DSA Zhengjun Cao Department of Mathematics, Shanghai University, Shanghai, China, 200444. caozhj@shu.edu.cn Abstract We introduce a message attack against DSA and show that
More informationA NEW RANDOM NUMBER GENERATOR USING FIBONACCI SERIES
International J. of Math. Sci. & Engg. Appls. (IJMSEA) ISSN 0973-9424, Vol. 11 No. I (April, 2017), pp. 185-193 A NEW RANDOM NUMBER GENERATOR USING FIBONACCI SERIES KOTTA NAGALAKSHMI RACHANA 1 AND SOUBHIK
More informationHow does the computer generate observations from various distributions specified after input analysis?
1 How does the computer generate observations from various distributions specified after input analysis? There are two main components to the generation of observations from probability distributions.
More informationChair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics
Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle Network Security Chapter 2 Basics 2.4 Random Number Generation for Cryptographic Protocols Motivation It is
More information#A50 INTEGERS 14 (2014) ON RATS SEQUENCES IN GENERAL BASES
#A50 INTEGERS 14 (014) ON RATS SEQUENCES IN GENERAL BASES Johann Thiel Dept. of Mathematics, New York City College of Technology, Brooklyn, New York jthiel@citytech.cuny.edu Received: 6/11/13, Revised:
More informationA Fast Digital Chaotic Generator for Secure Communication
A Fast Digital Chaotic Generator for Secure Communication Shih-Liang Chen TingTing Hwang Shu-Ming Chang Wen-Wei Lin Abstract In this paper, we propose a digitalized chaotic map, Variational Logistic Map
More informationFinQuiz Notes
Reading 9 A time series is any series of data that varies over time e.g. the quarterly sales for a company during the past five years or daily returns of a security. When assumptions of the regression
More informationCryptanalysis of a computer cryptography scheme based on a filter bank
NOTICE: This is the author s version of a work that was accepted by Chaos, Solitons & Fractals in August 2007. Changes resulting from the publishing process, such as peer review, editing, corrections,
More informationImproved Cascaded Stream Ciphers Using Feedback
Improved Cascaded Stream Ciphers Using Feedback Lu Xiao 1, Stafford Tavares 1, Amr Youssef 2, and Guang Gong 3 1 Department of Electrical and Computer Engineering, Queen s University, {xiaolu, tavares}@ee.queensu.ca
More informationInvestigation of a Ball Screw Feed Drive System Based on Dynamic Modeling for Motion Control
Investigation of a Ball Screw Feed Drive System Based on Dynamic Modeling for Motion Control Yi-Cheng Huang *, Xiang-Yuan Chen Department of Mechatronics Engineering, National Changhua University of Education,
More informationNew Constructions of Sonar Sequences
INTERNATIONAL JOURNAL OF BASIC & APPLIED SCIENCES IJBAS-IJENS VOL.:14 NO.:01 12 New Constructions of Sonar Sequences Diego F. Ruiz 1, Carlos A. Trujillo 1, and Yadira Caicedo 2 1 Department of Mathematics,
More informationWeak key analysis for chaotic cipher based on randomness properties
. RESEARCH PAPER. SCIENCE CHINA Information Sciences May 01 Vol. 55 No. 5: 116 1171 doi: 10.1007/s1143-011-4401-x Weak key analysis for chaotic cipher based on randomness properties YIN RuMing, WANG Jian,
More informationCryptanalysis of a Multistage Encryption System
Cryptanalysis of a Multistage Encryption System Chengqing Li, Xinxiao Li, Shujun Li and Guanrong Chen Department of Mathematics, Zhejiang University, Hangzhou, Zhejiang 310027, China Software Engineering
More informationAsymmetric Encryption
-3 s s Encryption Comp Sci 3600 Outline -3 s s 1-3 2 3 4 5 s s Outline -3 s s 1-3 2 3 4 5 s s Function Using Bitwise XOR -3 s s Key Properties for -3 s s The most important property of a hash function
More informationHow does the computer generate observations from various distributions specified after input analysis?
1 How does the computer generate observations from various distributions specified after input analysis? There are two main components to the generation of observations from probability distributions.
More informationLinear Feedback Shift Registers
Linear Feedback Shift Registers Pseudo-Random Sequences A pseudo-random sequence is a periodic sequence of numbers with a very long period. Golomb's Principles G1: The # of zeros and ones should be as
More informationA Knapsack Cryptosystem Based on The Discrete Logarithm Problem
A Knapsack Cryptosystem Based on The Discrete Logarithm Problem By K.H. Rahouma Electrical Technology Department Technical College in Riyadh Riyadh, Kingdom of Saudi Arabia E-mail: kamel_rahouma@yahoo.com
More informationDigitized Chaos for Pseudo-Random Number Generation in Cryptography
Digitized Chaos for Pseudo-Random Numer Generation in Cryptography Tommaso Addao, Ada Fort, Santina Rocchi, Valerio Vignoli Department of Information Engineering University of Siena, 53 Italy e-mail: addao@dii.unisi.it)
More informationSpatial Short-Term Load Forecasting using Grey Dynamic Model Specific in Tropical Area
E5-0 International Conference on Electrical Engineering and Informatics 7-9 July 0, Bandung, Indonesia Spatial Short-Term Load Forecasting using Grey Dynamic Model Specific in Tropical Area Yusra Sari
More informationAnalysis of FIPS Test and Chaos-Based Pseudorandom Number Generator
Chaotic Modeling and Simulation (CMSIM) : 73 80, 013 Analysis of FIPS 140- Test and Chaos-Based Pseudorandom Number Generator Lequan Min, Tianyu Chen, and Hongyan Zang Mathematics and Physics School, University
More informationWeak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis
Weak eys of the Full MISTY1 Block Cipher for Related-ey Cryptanalysis Jiqiang Lu 1, Wun-She Yap 1,2, and Yongzhuang Wei 3,4 1 Institute for Infocomm Research, Agency for Science, Technology and Research
More informationDesign of Cryptographically Strong Generator By Transforming Linearly Generated Sequences
Design of Cryptographically Strong Generator By Transforming Linearly Generated Sequences Matthew N. Anyanwu Department of Computer Science The University of Memphis Memphis, TN 38152, U.S.A. manyanwu
More informationComments on A Time Delay Controller for Systems with Uncertain Dynamics
Comments on A Time Delay Controller for Systems with Uncertain Dynamics Qing-Chang Zhong Dept. of Electrical & Electronic Engineering Imperial College of Science, Technology, and Medicine Exhiition Rd.,
More informationB. Encryption using quasigroup
Sequence Randomization Using Quasigroups and Number Theoretic s Vaignana Spoorthy Ella Department of Computer Science Oklahoma State University Stillwater, Oklahoma, USA spoorthyella@okstateedu Abstract
More informationDesign of S-Box using Combination of Chaotic Functions
129 Design of S-Box using Combination of Chaotic Functions Tanu Wadhera 1, Gurmeet Kaur 2 1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, India 2 Department of Electronics
More informationPseudo-Random Generators
Pseudo-Random Generators Topics Why do we need random numbers? Truly random and Pseudo-random numbers. Definition of pseudo-random-generator What do we expect from pseudorandomness? Testing for pseudo-randomness.
More informationA Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith
A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith Abstract Generating random numbers are mainly used to create secret keys or random
More informationarxiv: v1 [cs.cr] 18 Jul 2009
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps Chengqing Li 1, David Arroyo 2, and Kwok-Tung Lo 1 1 Department of Electronic and Information Engineering, The Hong Kong Polytechnic University,
More informationTopics. Pseudo-Random Generators. Pseudo-Random Numbers. Truly Random Numbers
Topics Pseudo-Random Generators Why do we need random numbers? Truly random and Pseudo-random numbers. Definition of pseudo-random-generator What do we expect from pseudorandomness? Testing for pseudo-randomness.
More informationPolynomial Degree and Finite Differences
CONDENSED LESSON 7.1 Polynomial Degree and Finite Differences In this lesson, you Learn the terminology associated with polynomials Use the finite differences method to determine the degree of a polynomial
More informationMathematical Ideas Modelling data, power variation, straightening data with logarithms, residual plots
Kepler s Law Level Upper secondary Mathematical Ideas Modelling data, power variation, straightening data with logarithms, residual plots Description and Rationale Many traditional mathematics prolems
More informationEstimating a Finite Population Mean under Random Non-Response in Two Stage Cluster Sampling with Replacement
Open Journal of Statistics, 07, 7, 834-848 http://www.scirp.org/journal/ojs ISS Online: 6-798 ISS Print: 6-78X Estimating a Finite Population ean under Random on-response in Two Stage Cluster Sampling
More informationA Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. X, MONTH 2007 1 A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations James A. Muir Abstract We present a simple algorithm
More information1. Define the following terms (1 point each): alternative hypothesis
1 1. Define the following terms (1 point each): alternative hypothesis One of three hypotheses indicating that the parameter is not zero; one states the parameter is not equal to zero, one states the parameter
More information-Cryptosystem: A Chaos Based Public Key Cryptosystem
International Journal of Cryptology Research 1(2): 149-163 (2009) -Cryptosystem: A Chaos Based Public Key Cryptosystem 1 M.R.K. Ariffin and 2 N.A. Abu 1 Al-Kindi Cryptography Research Laboratory, Laboratory
More informationModifying Shor s algorithm to compute short discrete logarithms
Modifying Shor s algorithm to compute short discrete logarithms Martin Ekerå Decemer 7, 06 Astract We revisit Shor s algorithm for computing discrete logarithms in F p on a quantum computer and modify
More informationSOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies
SOBER Cryptanalysis Daniel Bleichenbacher and Sarvar Patel {bleichen,sarvar}@lucent.com Bell Laboratories Lucent Technologies Abstract. SOBER is a new stream cipher that has recently been developed by
More informationDEPARTMENT OF ECONOMICS
ISSN 089-64 ISBN 978 0 7340 405 THE UNIVERSITY OF MELBOURNE DEPARTMENT OF ECONOMICS RESEARCH PAPER NUMBER 06 January 009 Notes on the Construction of Geometric Representations of Confidence Intervals of
More informationGENERALIZED ARYABHATA REMAINDER THEOREM
International Journal of Innovative Computing, Information and Control ICIC International c 2010 ISSN 1349-4198 Volume 6, Number 4, April 2010 pp. 1865 1871 GENERALIZED ARYABHATA REMAINDER THEOREM Chin-Chen
More informationStream ciphers I. Thomas Johansson. May 16, Dept. of EIT, Lund University, P.O. Box 118, Lund, Sweden
Dept. of EIT, Lund University, P.O. Box 118, 221 00 Lund, Sweden thomas@eit.lth.se May 16, 2011 Outline: Introduction to stream ciphers Distinguishers Basic constructions of distinguishers Various types
More informationPseudo-automata for generalized regular expressions
Pseudo-automata for generalized regular expressions B. F. Melnikov A. A. Melnikova Astract In this paper we introduce a new formalism which is intended for representing a special extensions of finite automata.
More informationON FLATNESS OF NONLINEAR IMPLICIT SYSTEMS
ON FLATNESS OF NONLINEAR IMPLICIT SYSTEMS Paulo Sergio Pereira da Silva, Simone Batista Escola Politécnica da USP Av. Luciano Gualerto trav. 03, 158 05508-900 Cidade Universitária São Paulo SP BRAZIL Escola
More informationA Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations
A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations James A. Muir School of Computer Science Carleton University, Ottawa, Canada http://www.scs.carleton.ca/ jamuir 23 October
More informationPREDICTING MASKED LINEAR PSEUDORANDOM NUMBER GENERATORS OVER FINITE FIELDS
PREDICTING MASKED LINEAR PSEUDORANDOM NUMBER GENERATORS OVER FINITE FIELDS JAIME GUTIERREZ, ÁLVAR IBEAS, DOMINGO GÓMEZ-PEREZ, AND IGOR E. SHPARLINSKI Abstract. We study the security of the linear generator
More informationSolving Systems of Linear Equations Symbolically
" Solving Systems of Linear Equations Symolically Every day of the year, thousands of airline flights crisscross the United States to connect large and small cities. Each flight follows a plan filed with
More informationPseudo-Random Generators
Pseudo-Random Generators Why do we need random numbers? Simulation Sampling Numerical analysis Computer programming (e.g. randomized algorithm) Elementary and critical element in many cryptographic protocols
More informationRandom number generators
s generators Comp Sci 1570 Introduction to Outline s 1 2 s generator s The of a sequence of s or symbols that cannot be reasonably predicted better than by a random chance, usually through a random- generator
More informationDesign Parameter Sensitivity Analysis of High-Speed Motorized Spindle Systems Considering High-Speed Effects
Proceedings of the 2007 IEEE International Conference on Mechatronics and Automation August 5-8, 2007, Harin, China Design Parameter Sensitivity Analysis of High-Speed Motorized Spindle Systems Considering
More informationPeriodicity and Distribution Properties of Combined FCSR Sequences
Periodicity and Distribution Properties of Combined FCSR Sequences Mark Goresky 1, and Andrew Klapper, 1 Institute for Advanced Study, Princeton NJ www.math.ias.edu/~goresky Dept. of Computer Science,
More informationChaos and Dynamical Systems
Chaos and Dynamical Systems y Megan Richards Astract: In this paper, we will discuss the notion of chaos. We will start y introducing certain mathematical concepts needed in the understanding of chaos,
More informationWednesday, February 21. Today we will begin Course Notes Chapter 5 (Number Theory).
Wednesday, February 21 Today we will begin Course Notes Chapter 5 (Number Theory). 1 Return to Chapter 5 In discussing Methods of Proof (Chapter 3, Section 2) we introduced the divisibility relation from
More informationCompactness vs Collusion Resistance in Functional Encryption
Compactness vs Collusion Resistance in Functional Encryption Baiyu Li Daniele Micciancio April 10, 2017 Astract We present two general constructions that can e used to comine any two functional encryption
More informationChapter 2 Canonical Correlation Analysis
Chapter 2 Canonical Correlation Analysis Canonical correlation analysis CCA, which is a multivariate analysis method, tries to quantify the amount of linear relationships etween two sets of random variales,
More informationDepth versus Breadth in Convolutional Polar Codes
Depth versus Breadth in Convolutional Polar Codes Maxime Tremlay, Benjamin Bourassa and David Poulin,2 Département de physique & Institut quantique, Université de Sherrooke, Sherrooke, Quéec, Canada JK
More informationMaximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Muxiang Zhang 1 and Agnes Chan 2 1 GTE Laboratories Inc., 40 Sylvan Road LA0MS59, Waltham, MA 02451 mzhang@gte.com 2 College of Computer
More informationLinear Cellular Automata as Discrete Models for Generating Cryptographic Sequences
Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences A Fúster-Sabater P Caballero-Gil 2 Institute of Applied Physics, CSIC Serrano 44, 286 Madrid, Spain Email: amparo@ieccsices
More informationDesign of Cryptographically Strong Generator By Transforming Linearly Generated Sequences
Design of Cryptographically Strong Generator By Transforming Linearly Generated Sequences Matthew N. Anyanwu Department of Computer Science The University of Memphis Memphis, TN 38152, U.S.A. Lih-Yuan
More informationGeneralized Correlation Analysis of Vectorial Boolean Functions
Generalized Correlation Analysis of Vectorial Boolean Functions Claude Carlet 1, Khoongming Khoo 2, Chu-Wee Lim 2, and Chuan-Wen Loe 2 1 University of Paris 8 (MAATICAH) also with INRIA, Projet CODES,
More informationLINEAR FEEDBACK SHIFT REGISTER BASED UNIQUE RANDOM NUMBER GENERATOR
LINEAR FEEDBACK SHIFT REGISTER BASED UNIQUE RANDOM NUMBER GENERATOR HARSH KUMAR VERMA 1 & RAVINDRA KUMAR SINGH 2 1,2 Department of Computer Science and Engineering, Dr. B. R. Ambedkar National Institute
More informationOn Quasigroup Pseudo Random Sequence Generators
On Quasigroup Pseudo Random Sequence Generators V. Dimitrova, J. Markovski Institute of Informatics, Faculty of Natural Sciences and Mathematics Ss Cyril and Methodius University, 1 Skopje, FYRO Macedonia
More informationSecure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm
Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Gwo-Ruey Yu Department of Electrical Engineering I-Shou University aohsiung County 840, Taiwan gwoyu@isu.edu.tw
More informationZeroing the baseball indicator and the chirality of triples
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 7 (2004), Article 04.1.7 Zeroing the aseall indicator and the chirality of triples Christopher S. Simons and Marcus Wright Department of Mathematics
More informationSUFFIX TREE. SYNONYMS Compact suffix trie
SUFFIX TREE Maxime Crochemore King s College London and Université Paris-Est, http://www.dcs.kcl.ac.uk/staff/mac/ Thierry Lecroq Université de Rouen, http://monge.univ-mlv.fr/~lecroq SYNONYMS Compact suffix
More informationChaotic Based Secure Hash Algorithm
Chaotic Based Secure Hash Algorithm Mazen Tawfik Mohammed 1, Alaa Eldin Rohiem 2, Ali El-moghazy 3 and A. Z. Ghalwash 4 1,2 Military technical College, Cairo, Egypt 3 Higher Technological Institute, Cairo,
More informationHaar Spectrum of Bent Boolean Functions
Malaysian Journal of Mathematical Sciences 1(S) February: 9 21 (216) Special Issue: The 3 rd International Conference on Mathematical Applications in Engineering 21 (ICMAE 1) MALAYSIAN JOURNAL OF MATHEMATICAL
More informationDavid A. Pape Department of Engineering and Technology Central Michigan University Mt Pleasant, Michigan
Session: ENG 03-091 Deflection Solutions for Edge Stiffened Plates David A. Pape Department of Engineering and Technology Central Michigan University Mt Pleasant, Michigan david.pape@cmich.edu Angela J.
More information1Number ONLINE PAGE PROOFS. systems: real and complex. 1.1 Kick off with CAS
1Numer systems: real and complex 1.1 Kick off with CAS 1. Review of set notation 1.3 Properties of surds 1. The set of complex numers 1.5 Multiplication and division of complex numers 1.6 Representing
More informationSelf-shrinking Bit Generation Algorithm Based on Feedback with Carry Shift Register
Advanced Studies in Theoretical Physics Vol. 8, 2014, no. 24, 1057-1061 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/astp.2014.49132 Self-shrinking Bit Generation Algorithm Based on Feedback
More informationAn Algorithm for Inversion in GF(2 m ) Suitable for Implementation Using a Polynomial Multiply Instruction on GF(2)
An Algorithm for Inversion in GF2 m Suitable for Implementation Using a Polynomial Multiply Instruction on GF2 Katsuki Kobayashi, Naofumi Takagi, and Kazuyoshi Takagi Department of Information Engineering,
More informationCHAPTER 5. Linear Operators, Span, Linear Independence, Basis Sets, and Dimension
A SERIES OF CLASS NOTES TO INTRODUCE LINEAR AND NONLINEAR PROBLEMS TO ENGINEERS, SCIENTISTS, AND APPLIED MATHEMATICIANS LINEAR CLASS NOTES: A COLLECTION OF HANDOUTS FOR REVIEW AND PREVIEW OF LINEAR THEORY
More informationModule 9: Further Numbers and Equations. Numbers and Indices. The aim of this lesson is to enable you to: work with rational and irrational numbers
Module 9: Further Numers and Equations Lesson Aims The aim of this lesson is to enale you to: wor with rational and irrational numers wor with surds to rationalise the denominator when calculating interest,
More informationUpper Bounds for Stern s Diatomic Sequence and Related Sequences
Upper Bounds for Stern s Diatomic Sequence and Related Sequences Colin Defant Department of Mathematics University of Florida, U.S.A. cdefant@ufl.edu Sumitted: Jun 18, 01; Accepted: Oct, 016; Pulished:
More informationRobot Position from Wheel Odometry
Root Position from Wheel Odometry Christopher Marshall 26 Fe 2008 Astract This document develops equations of motion for root position as a function of the distance traveled y each wheel as a function
More informationEnough Entropy? Justify It!
Enough Entropy? Justify It! Yi Mao, Ph.D., CISSP CST Lab Manager atsec information security corp. Email: yi@atsec.com Agenda Before IG 7.14 and IG 7.15 IG 7.14 Entropy Caveats IG 7.15 Entropy Assessment
More informationEntropy Evaluation for Oscillator-based True Random Number Generators
Entropy Evaluation for Oscillator-based True Random Number Generators Yuan Ma DCS Center Institute of Information Engineering Chinese Academy of Sciences Outline RNG Modeling method Experiment Entropy
More informationA Block Cipher using an Iterative Method involving a Permutation
Journal of Discrete Mathematical Sciences & Cryptography Vol. 18 (015), No. 3, pp. 75 9 DOI : 10.1080/097059.014.96853 A Block Cipher using an Iterative Method involving a Permutation Lakshmi Bhavani Madhuri
More informationNew Minimal Weight Representations for Left-to-Right Window Methods
New Minimal Weight Representations for Left-to-Right Window Methods James A. Muir 1 and Douglas R. Stinson 2 1 Department of Combinatorics and Optimization 2 School of Computer Science University of Waterloo
More informationSmart Hill Climbing Finds Better Boolean Functions
Smart Hill Climbing Finds Better Boolean Functions William Millan, Andrew Clark and Ed Dawson Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane, Queensland,
More informationTest Pattern Generator for Built-in Self-Test using Spectral Methods
Test Pattern Generator for Built-in Self-Test using Spectral Methods Alok S. Doshi and Anand S. Mudlapur Auburn University 2 Dept. of Electrical and Computer Engineering, Auburn, AL, USA doshias,anand@auburn.edu
More informationImplementation of Digital Chaotic Signal Generator Based on Reconfigurable LFSRs for Multiple Access Communications
Australian Journal of Basic and Applied Sciences, 4(7): 1691-1698, 2010 ISSN 1991-8178 Implementation of Digital Chaotic Signal Generator Based on Reconfigurable LFSRs for Multiple Access Communications
More informationAn Efficient Heuristic Algorithm for Linear Decomposition of Index Generation Functions
An Efficient Heuristic Algorithm for Linear Decomposition of Index Generation Functions Shinobu Nagayama Tsutomu Sasao Jon T. Butler Dept. of Computer and Network Eng., Hiroshima City University, Hiroshima,
More informationA fast modular multiplication algorithm for calculating the product AB modulo N
Information Processing Letters 72 (1999) 77 81 A fast modular multiplication algorithm for calculating the product AB modulo N Chien-Yuan Chen a,, Chin-Chen Chang b,1 a Department of Information Engineering,
More informationUniform and Exponential Random Floating Point Number Generation
Uniform and Exponential Random Floating Point Number Generation Thomas Morgenstern Hochschule Harz, Friedrichstr. 57-59, D-38855 Wernigerode tmorgenstern@hs-harz.de Summary. Pseudo random number generators
More informationROUNDOFF ERRORS; BACKWARD STABILITY
SECTION.5 ROUNDOFF ERRORS; BACKWARD STABILITY ROUNDOFF ERROR -- error due to the finite representation (usually in floatingpoint form) of real (and complex) numers in digital computers. FLOATING-POINT
More informationCPSC 531: Random Numbers. Jonathan Hudson Department of Computer Science University of Calgary
CPSC 531: Random Numbers Jonathan Hudson Department of Computer Science University of Calgary http://www.ucalgary.ca/~hudsonj/531f17 Introduction In simulations, we generate random values for variables
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 16 October 30, 2017 CPSC 467, Lecture 16 1/52 Properties of Hash Functions Hash functions do not always look random Relations among
More informationBlind Collective Signature Protocol
Computer Science Journal of Moldova, vol.19, no.1(55), 2011 Blind Collective Signature Protocol Nikolay A. Moldovyan Abstract Using the digital signature (DS) scheme specified by Belarusian DS standard
More informationBinary GH Sequences for Multiparty Communication. Krishnamurthy Kirthi
Binary GH Sequences for Multiparty Communication Krishnamurthy Kirthi Abstract This paper investigates cross correlation properties of sequences derived from GH sequences modulo p, where p is a prime number
More informationMinimizing a convex separable exponential function subject to linear equality constraint and bounded variables
Minimizing a convex separale exponential function suect to linear equality constraint and ounded variales Stefan M. Stefanov Department of Mathematics Neofit Rilski South-Western University 2700 Blagoevgrad
More informationSpacecraft Math. Stephen Leake
Spacecraft Math Stephen Leake 27 Septemer 2008 2 Chapter 1 Introduction This document presents a thorough summary of vector, quaternion, and matrix math used in spacecraft applications, in oth flight and
More informationThe WHILE Hierarchy of Program Schemes is Infinite
The WHILE Hierarchy of Program Schemes is Infinite Can Adam Alayrak and Thomas Noll RWTH Aachen Ahornstr. 55, 52056 Aachen, Germany alayrak@informatik.rwth-aachen.de and noll@informatik.rwth-aachen.de
More informationParallel Cube Tester Analysis of the CubeHash One-Way Hash Function
Parallel Cube Tester Analysis of the CubeHash One-Way Hash Function Alan Kaminsky Department of Computer Science B. Thomas Golisano College of Computing and Information Sciences Rochester Institute of
More informationFraction-Integer Method (FIM) for Calculating Multiplicative Inverse
Fraction-Integer Method (FIM) for Calculating Multiplicative Inverse Sattar J Aboud Department o f Computers Science, Philadelphia University Jordan Amman E-mail: sattar_aboud@yahoo.com ABSTRACT Multiplicative
More information