MODIFIED NON-OVERLAPPING TEMPLATE MATCHING TEST AND PROPOSAL ON SETTING TEMPLATE

Size: px
Start display at page:

Download "MODIFIED NON-OVERLAPPING TEMPLATE MATCHING TEST AND PROPOSAL ON SETTING TEMPLATE"

Transcription

1 J. Jpn. Soc. Comp. Statist., 27(2014), DOI: /jjscs MODIFIED NON-OVERLAPPING TEMPLATE MATCHING TEST AND PROPOSAL ON SETTING TEMPLATE Yuichi Takeda, Mituaki Huzii, Norio Watanabe and Toshinari Kamakura ABSTRACT Rukhin et al. (2010) proposed the non-overlapping template matching test as one of methods for statistical testing of randomness in cryptographic applications. This test is the very interesting, but statistical properties of this test and any methods on setting the template have not been shown. Our new contribution in this paper is to propose a modified version of this test including the setting of the template and to show how this modified test works effectively by some simulation studies. 1. Introduction The need for random and pseudorandom numbers arises in many cryptographic applications, for example, stream cipher, encryption key, seed key and so on (see Shannon (1949), Rivest et al. (1978)). Rukhin et al. (2010) proposed 16 randomness tests for a binary sequence to use in the cryptographic field; Frequency (Monobit) Test, Frequency Test within a Block, Runs Test, Test for the Longest Run of Ones in a Block, Binary Matrix Rank Test, Discrete Fourier Transform (Spectral) Test, Non-overlapping Template Matching Test, Overlapping Template Matching Test, Maurer s Universal Statistical Test, Lempel- Ziv Compression Test, Linear Complexity Test, Serial Test, Approximate Entropy Test, Cumulative Sums (Cusum) Test, Random Excursions Test and Random Excursions Variant Test. These tests attract a lot of attention and are widely used in the cryptographic field (see Szczepanskia et al. (2004), Patidar and Sud (2009)). Among them, some tests are unfamiliar in statistical fields and we consider that deep discussions about these tests from a statistical point of view would be necessary. In this paper, we take up the non-overlapping template matching test and discuss this test from a statistical point of view. The non-overlapping template matching test would be effective for finding a binary pattern (template), which appears many times. This is important in cryptography. The purpose of this test is to detect a template that is included and has too many occurrences in the sequence. Our sequence is binary and consists of 0 and 1. A template is a pattern consisting of 0 and 1 with a certain length (e.g. m bits). We take a binary sequence of length n, which we are going to test. The non-overlapping template matching test is as the following. In the first place, we take the first m bits of the sequence. If this first m bits are same as the template, we say we have the occurrence and count the occurrence to be one. Then we carry out the same procedure for the sequence starting from the (m + 1)-th bit. If the first m bits are not same as the template, we carry out the same procedure for the sequence starting from the 2nd bit. For example, the template is 101 and Center for Basic Education and Integrated Learning, Kanagawa Institute of Technology, 1030, Shimo-ogino, Atsugi, Kanagawa , Japan y-takeda@ctr.kanagawa-it.ac.jp Faculty of Science and Engineering, Chuo University, , Kasuga, Bunkyo, Tokyo , Japan Key words: Testing randomness; Non-overlapping template matching test; Cryptographic applications; Kolmogorov-Smirnov test 49

2 TAKEDA, HUZII, WATANABE and KAMAKURA the binary sequence is The first 3 bits are 010, and this pattern is not same as the template. Then the next 3 bits from the 2nd bit through the 4th bit of the sequence are 101, and this pattern is the same as the template. So we say the count of occurrence is 1. Then skip the 3rd and 4th bits in the sequence, we start at the 5th bit. So we examine from the fifth through 7th bits of the sequence and repeat the same procedure. For this sequence, we say the number of the occurrences of the template 101 is two in total. In general, this test depends on the setting of the template. However, in Rukhin et al. (2010), no method for setting the template is proposed. So, in this paper, we modify this test, propose a method for operating this test, including how we set the template, and show how the method we propose works effectively by some simulation studies. In Rukhin et al. (2010), the authors are using a χ 2 statistic, for comparing the empirical distribution of the number of occurrences of the template with theoretical probability distribution under the null hypothesis. However, this is a test about the mean. In cryptographic applications, we consider that we have to pay for frequent occurrences of the template and, this means, it would be better to use a one-sided test and pay our attention to the frequency distribution of the number of occurrences of the template. So we try to test the deviation of the frequency distribution from the probability distribution under the null hypothesis. For obtaining the probability distribution of the number of occurrences of a given template under the null hypothesis, we use the results shown in Guibas and Odlyzko (1981). In Section 2., we propose a test which is a modification of the non-overlapping template matching test in Rukhin et al. (2010), propose a method for setting the template and, in Section 3., show how our methods work effectively by simulation studies. Throughout this paper we use the following setup, notions and notations. We denote a binary sequence as {Z j }, which is a sequence of random variables taking values 0 and 1. Z j denotes a random number or, sometimes, an addition of a word component and a random number. We here discuss the situation that a word is expressed in m bits and we do not know the value of m when we receive a binary sequence. This is because, this case happens frequently in cryptographic field and, when we know the value of m, we can use other more powerful methods (e.g., examining the uniformity of appearance of each m-dimensional vector) for finding the template. Let us denote the template as B, e.g. B = when m = 7, and the length of the entire bit string under test as n. We assume B is expressed as B = b 1 b 2 b m, where b i = 0 or 1. We say B is periodic with period i if we can find an integer i(1 i m 1) such that b 1 b 2 b i b i+1 b m = b 1 b 2 b i b 1 b 2. (1) If B is not periodic, we say B is non-periodic. Let {ξ i } be a binary sequence constructed by 0 and 1, which is a message. And we send the coded binary sequence {X i }, where X i = ξ i +Z i. Here we adopt the rule: 0+0 = 1+1 = 0 and = = 1. And, if a, b, x {0, 1}, we define x = b a when a + x = b. The null hypothesis concerning {Z i } should be that {X i } cannot be decoded. However, it is very difficult to express {X i } cannot be decoded, mathematically. Let {Z i } be a sequence of mutually independent random variables and Z i takes on values 0 and 1 with probability 1/2, respectively. Then we have for any positive integer m and any x l which is 0 or 1, for 1 l m, 50

3 Modified Non-overlapping Template Matching Test P (X l = x l ; 1 l m) = = a 1=0 a 2=0 a 1=0 a 2=0 ( ) m 1 = 2 a ( ) 1=0 m 1 =. 2 a m=0 a m=0 a 2=0 P (Z l = a l, ξ l = x l a l ; 1 l m) ( m ) P (Z l = a l ) P (ξ l = x l a l ; 1 l m) l=1 a m=0 P (ξ l = x l a l ; 1 l m) This means that it is difficult to get information about the message {ξ i } from {X i }, statistically (see Shannon (1949)). So here, we take the hypothesis {Z j } is a sequence of mutually independent random variables and Z j takes 0 and 1 with probability 1/2, respectively (simply, Simplified Null Hypothesis (abbreviated to SNH)) as the null hypothesis in the following. Let P (n; k) and P per (n; k) denote the probabilities that B occurs k times within n-bit string with non-overlapping when B is non-periodic and periodic, respectively, under the SNH. (1) Case when B is non-periodic; Let t(n) denote the number of strings, which do not contain the template B, of length n and be obtained by using Theorem 1 in Guibas and Odlyzko (1981) such that Then we have t(n) = 2 n, for 0 n m 1, t(n + 1) = 2t(n) t(n + 1 m), for n m 1. P (n; 0) = t(n) 2 n. And using {P (l; 0), 1 l n}, we obtain P (n; k), k 1, by dividing the whole set of the strings, in which B occurs k times within n-bit string, into (n km + 1) disjoint sets of strings, where, in the j-th set, the first (j 1) bits do not include B, B starts at the j-th bit and, from the (j + m)-th bit through n-th bit, B is included (k 1) times with non-overlapping. Then we have for k 1 with P (0; 0) = 1. P (n; k) = 1 n km+1 2 m P (j 1; 0)P (n j m + 1; k 1) j=1 (2) Case when B is periodic; Let ip 1, ip 2,, ip L (ip 1 < ip 2 < < ip L ) be the periods of B. We assume that those are mutually different and ip l1 is not an integral multiple of ip l2 for any l 1 and l 2 such that l 1 l 2 and 1 l 1, l 2 L. The number of strings, which do not contain the template B, of length n is given as 51

4 TAKEDA, HUZII, WATANABE and KAMAKURA t(n) = 2 n, for 0 n m 1, t(n + 1) = 2t(n) [(m 1)/ip 1 ] τ=1 ( t(n + 1 τip1 ) 2t(n τip 1 ) ) L ( t(n + 1 ipl ) 2t(n ip l ) ) t(n + 1 m), l=2 for n m 1, by using Theorem 1 in Guibas and Odlyzko (1981). And we have P per (n; 0) = t(n) 2 n. Also we can obtain the number t B (j) of strings of length j, which have only single appearance of B at the end of the j-bit string, by using Theorem 1 in Guibas and Odlyzko (1981). t B (j) is given as t B (j) = 0, for 0 j m 1, t B (m) = 1, t B (j) = 2t B (j 1) [(m 1)/ip 1 ] τ=1 ( ) t B (j τip 1 ) 2t B (j τip 1 1) L ( ) t B (j ip l ) 2t B (j ip l 1) t B (j m), l=2 Now we put Then we have P per (n; 0) = t(n) 2 n, P per (n; 1) = P per (n; k) = P B (j; 1) = t B(j) 2 j. n P B (j; 1)P per (n j; 0), j=m n (k 1)m j=m P B (j; 1)P per (n j; k 1), for j m + 1. for 2 k [n/m], P per (n; k) = 0, for k > [n/m]. 52

5 Modified Non-overlapping Template Matching Test And the probability distribution function is k P (n; u) when B is non-periodic, F 0 u=0 (k) = k P per (n; u) when B is periodic, under SNH. u=0 2. Modification of non-overlapping template matching test In the non-overlapping template matching test, we consider the null hypothesis to be the SNH. It is very difficult to show the alternative hypothesis. In Rukhin et al. (2010), the authors explain that the purpose of this test is to detect generators that produce too many occurrences of a given non-periodic (aperiodic) pattern. Here we take that the alternative hypothesis is a template of certain length appears too many times. We give a mathematical expression of this alternative hypothesis later. In this paper, we treat not only non-periodic templates but also periodic templates. The most difficult problem in this test is how to set the template. Rukhin et al. (2010) does not mention this problem much. If we have a pre-specified template B of length m, we have to use this template, examine the number of occurrences of the template within an n-bit string, and repeat this examination N times. In this case, we know the length of the template. Then we can use another simpler test for finding extraordinary many occurrences of the template. Suppose we have a binary string of length nn. Then we divide the binary string into [nn/m] segments of length m. We assume B appears τ B times among [nn/m] segments. Then we construct the test statistic t N = τ B [nn/m] 2 ( m ). [nn/m] m 2 m When N tends to, we can see the distribution of t N tends to the standard Normal distribution N(0, 1) under the SNH. Let α be the level of significance. We consider the case when N is sufficiently large. We obtain a sample value d of the statistic t N and its p-value P (t N d). If p -value α, we reject the SNH. We consider that our main target of the non-overlapping template matching test is to deal with the case when both the template and its length m are unknown. In the following, we mainly discuss this case. In this case, we have to choose the length m and the template. We formulate our task in the following way. Experiment A. Let B be a template and n be the length of the entire bit string under test. We examine the number of times that B occurs in this string with non-overlapping. We repeat, independently, this operation N times and obtain the frequency distribution of the numbers of occurrences in the n-bit string. When we do not know the length m and the template B, we have to try the test for all possible m s and B s. However, usually this is too much and too complicated. Here, we propose another method, in which we try to shorten the necessary steps for examining all possible m s and B s. We take a small positive integer m, e.g. m = 3, and try the test 53

6 TAKEDA, HUZII, WATANABE and KAMAKURA for each of all 2 m binary patterns of length m. For example, when m = 3, we try the test for all possible 2 3 (= 8) binary patterns, i.e., B = 000, 001, 010, 011, 100, 101, 110, 111. By taking one by one from all 2 m binary patterns for the template B, we carry out the non-overlapping template matching test for the binary sequence being under test of the length n. We summarize our proposed test in the following way. Short-bit non-overlapping test (Short-Bit-N O-T est) Let α be the level of significance. We set a short length m, which is supposed to be m < m. By considering each of 2 m binary patterns to be the template B, we carry out Experiment A, evaluate the value of Kolmogorov-Smirnov test statistic (onesided) and obtain p-value. If we have p value < α, we reject the SNH for the pattern. We carry out this procedure for these patterns. Let k be the number of occurrences of B with non-overlapping in the binary sequence of the length n, where 0 k [n/m ]. Among the N repetitions, we assume k appears τ k times. Now we discuss the following two cases. Case (C - 1). We have to find the existence of a template, which has extraordinary many occurrences, of certain length in the string, but we do not need to specify the template. In this case, we have to test the null hypothesis SNH against the alternative hypothesis the number of times that a template of certain length occurs in the string is greater than one which is expected under the null hypothesis. More precisely, let F 0 (k) be the probability distribution function of the number k, which is a nonnegative integer, of times that a template of certain length occurs under the null hypothesis, and F A (k) be one of the string we are going to test. Then our alternative hypothesis is that F A (k) F 0 (k) and < holds for, at least, one k. The template, with which we should carry out Experiment A and Short-Bit-NO-T est, is each of the set of 2 m binary patterns of length m. If the SNH is rejected for, at least, one pattern (template), we reject the SNH for the string. Our test procedure is as the following. For each pattern B of the set, we put and F 0 (k) = F N (k) = k u=0 τ u N k P (n; u) or F 0 (k) = u=0 k P per (n; u), where P (n; u) or P per (n; u) is the probability that B occurs u times within the n-bit string with non-overlapping when B is non-periodic or periodic, respectively. By using F N (k) and F 0 (k), we apply the Kolmogorov-Smirnov test (one-sided) for testing the null hypothesis SN H. This means the following. We are concerned with cryptographic applications and interested in extraordinary many occurrences of a word. So we use a one-sided test. We construct the test statistic (see Conover (1972)) ( ( ) ) D N = max max F 0 (k) F N (k), 0. k Let d > 0 be a sample value of D N and put K = [n/m ]. Then if the p-value, i.e., P ( D N d ) is less than the level of significance α, we reject the SNH. For j, 1 j N, u=0 54

7 Modified Non-overlapping Template Matching Test we put c j = 1 j/n d when we have k, 0 k K, such that j/n + d = F 0 (k) and c j = 1 F 0 (k) when we have k such that F 0 (k 1) < j/n + d < F 0 (k). And we construct the sequence {b k, k 0} by k 1 ( k b k = 1 c j) k j j b j, for k 1, (2) j=0 with b 0 = 1. Then, by using the result in Conover (1972), we have the following. Theorem 2..1 (Conover). It holds P (D N d) = [N(1 d)] j=0 ( N j ) c N j j b j. In cryptographic applications, n and N are supposed to be large and, e.g., n is usually assumed to be of the order 10 3 to 10 7 (see Rukhin et al. (2010), page 2-2). For applying Theorem 2.1, we have certain difficulty in computation when N is large, especially in simulation study. Also we may use the asymptotic distribution shown in Theorem in Wood and Altavela (1978) or an approximation by a normal distribution for the statistic D N when N is sufficiently large. But we need a simpler form for evaluating the p-value, because we have to evaluate the p-value many times for carrying out the methods we propose, especially, in simulation studies with large n and N. For example, when we use an approximation by a normal distribution, we need the values {P (n; u)} or {P per (n; u)} under the null hypothesis, which can be obtained recursively with u and n, have a difficulty for obtaining in practical use and are lacking for a fine prospect. So we use the following theorem. Theorem It holds, for d > 0, lim P ( ND N d) exp( 2d 2 ). N This result can be obtained in the way shown in Gibbons and Chakraborti (2011), Section 4.4. For any pattern B, we obtain the sample value d of the statistic ND N for the sample and evaluate its p-value P ( ND N d). Here we sometimes use the notation P ( ND N d; B) for P ( ND N d) to clarify that ND N is evaluated under the template B. In the following, we consider the case when N is sufficiently large. And, by taking account of Theorem 2..2, we use exp ( 2d 2) instead of the p-value P ( ND N d; B). Although the result in Theorem 2..2 is an inequality, using exp ( 2d 2) is safer. The function exp ( 2d 2) is a monotone decreasing function of d, d > 0. Therefore we pay our attention to the value of d for a pattern B when we discuss comparisons among exp ( 2d 2). Case (C-2). We need to specify the template which appears extraordinary many times. Now we prepare some notions. Let two patterns be B 1 and B 2, whose lengths in bits are m 1 and m 2, respectively. We say a pattern B, whose length is m, is constructed by combining B 1 and B 2 if (a) max(m 1, m 2 ) + 1 m m 1 + m 2 and (b) the first m 1 bits of B are same as B 1 and the last m 2 bits are same as B 2, or, the first m 2 bits of B are same as B 2 and the last m 1 bits are same as B 1. We express the set of all patterns, which are constructed by combining B 1 and B 2, by B 1 B 2. And let B 1 = {B (t) 1 ; 1 t T 1 } and 55

8 TAKEDA, HUZII, WATANABE and KAMAKURA B 2 = {B 2 (u) ; 1 u T 2 } be two sets of patterns, where T 1 and T 2 are positive integers. Then we mean B 1 B 2 = {B 1 (t) B 2 (u) ; 1 t T 1, 1 u T 2 }. Now our procedure (Specifying Template Procedure ( simply, Specify-T emp-p roc ), which we propose for specifying the template, is as follows. Let α be the level of significance. We consider the case when N is sufficiently large and use exp ( 2(d (t) ) 2) instead of the p-value P ( ND N d(t) ; B (t) ) as in Case (C-1). First step. We carry out the Short-Bit-NO-T est. If we do not have any m -bit pattern B, with which the SNH is rejected, we accept the null hypothesis SNH. If we have m -bit patterns, with which the SNH is rejected, we proceed to the Second step. Let B 1 = {B 1 (t) ; 1 t T 1 } be the set of patterns, for which the SNH is rejected in the first step. For any B 1 (t), we obtain the sample value d 1 (t) of ND N. Then we have d 1 (t) > log α/2. In general, our procedure is as the following. κ-th step (κ 2). Let B (κ 1) = {B (κ 1) (t) ; 1 t T κ 1 }, where T κ 1 is a positive integer, be the set of patterns, with which the SNH is rejected in the (κ 1)-th step. We obtain the sample value d (κ 1) (t) of ND N for each pattern B(κ 1) (t). And, for the κ-th step, we carry out the Short-Bit-NO-T est for patterns, whose length m satisfies 2 κ 2 m + 1 m 2 κ 1 m, belonging to the set B (κ 1) B (κ 1). By this test, if we do not have any pattern, with which the SNH is rejected, we conclude that the template, which we are trying to specify, is included in the subset, which consists of patterns whose d (κ 1) (t) s attain max d (κ 1) (t), 1 t T κ 1 of B (κ 1). If we have patterns, with which the SNH is rejected, we carry out the following. Let B κ = {B κ (t) ; 1 t T κ } be the set of patterns, with which the SNH is rejected in the κ-th step. We obtain the sample value d κ (t) of ND N for each pattern B κ (t). If max d (κ 1) (t) > max d κ (t) 1 t T κ 1 1 t T κ holds, we conclude that the template, which we are seeking, is included in the subset B (κ 1), which is the set of patterns whose d (κ 1) (t) s attain max d (κ 1) (t), 1 t T κ 1 of B (κ 1). Otherwise we proceed to the (κ + 1)-th step. We continue this process until κ 0 -th step, where κ 0 is the pre-assigned value. If we still have the set of patterns B κ0, for which SNH is rejected, and have to proceed to the (κ 0 + 1)-th step, we conclude that the template, which we are seeking, is included in the subset B κ0, which is the set of patterns whose d κ0 (t) s take max d κ0 (t), 1 t T κ 0 of B κ0, where T κ 0 is a positive integer. For example, let m = 3, T 1 = 3 and the patterns B 1 (1) = 001, B 1 (2) = 010, B 1 (3) = 101 be rejected at the first step. The length m of the pattern in the second step is m The patterns for testing the SNH in the second step are 56

9 Modified Non-overlapping Template Matching Test , , 0010, , 01001, , 00101, , , 01010, , 0101, , 1010, , The reason why we use a p-value is as the following. Let B = be the template, which we should specify, and 00101, , be the patterns, with which the SNH is rejected in the second step. If SNH is accepted for each of the patterns {00101, , } {00101, , } in the 3-rd step, we can conclude that the set {00101, , } includes the pattern we are seeking and this result is successful. However, sometimes the pattern , which includes B from the first to 6-th bits, will be rejected with high possibility in the 3-rd step. This means, with high possibility, that we finally obtain some patterns whose successive 6 bits are B and cannot obtain the exact template. However, in this case, we suppose that the empirical distribution of occurrences of the pattern will be closer to F 0 (k) than one of the pattern Therefore we introduced the use of the p-value for specifying the exact template. We cannot have many references which discussed the non-overlapping template matching test from a statistical point of view. So it is very difficult to make comparisons with other methods from a statistical point of view. For examples, Ryabko et al. (2004) and Ryabko and Monarev (2005) propose some tests for finding words. However, their purposes are different from ours and their alternative hypothesis is that the sequence is generated by a stationary and ergodic source. So it is very difficult to compare our method with their methods from the viewpoint of hypothesis testing. The non-overlapping template matching test proposed in Rukhin et al. (2010) includes a very interesting idea, but it seems to be vague from a statistical point of view, e.g., lacking a proposal for choosing the template. The purpose of this paper is to propose a statistical method which overcomes these and has a kind of effectiveness from a statistical point of view. For example, each statistical method used in our proposed method might be replaced by another one, which is more efficient from a statistical point of view. Such an issue is our future task. 3. Simulation studies As it is very difficult to show the good properties of our proposal given in Section 2. generally and mathematically, we show goodness of our proposal by simulation studies. And also, as is stated in Section 2, it is very hard to compare our method with other methods from statistical point of view. So we here only show how our method works effectively by simulation studies. We generate original binary sequences (simply, original sequences), each of which is supposed to satisfy SNH and has length nn in bits. We modify each of these sequences and construct modified binary sequences to use in our simulation studies in the following way. Let B be a template and m be its length in bits. We divide every original sequence of length nn by m and obtain [nn/ m] segments. Among these segments, we choose randomly Γ segments and replace each of these Γ segments by B. Thus we can have a modified binary sequence (simply, modif ied sequence) of length nn. In our simulation studies, by using these modified sequences and assuming we have no information on m and B, we examine how we can reject the null hypothesis SNH in Case (C - 1) and specify B in Case (C - 2) in Section 2., by using Short-Bit-NO-T est and Specify-T emp-p roc, respectively. We take N to be sufficiently large and use exp ( 2(d (t) ) 2) instead of the p-value P ( ND N d(t) ; B (t) ). (1) Simulation studies for Case (C - 1). 57

10 TAKEDA, HUZII, WATANABE and KAMAKURA In our simulation studies, we set m = 3, n = 10 3, N = 10 3, α = 0.05 and B is one of all 2 3 binary patterns in the Short-Bit-NO-T est. We carried out our study for several cases of ( m, B, Γ.ratio), where Γ.ratio = Γ/[nN/ m]. For each case, we repeated our simulation study 10 4 times. The results are shown in Table 1, in which power means the ratio of rejection, i.e., power = times of rejection Table 1: P ower for Case (C-1) m B power Γ.ratio For the original sequences, we have power = , ( ) which corresponds to P B C(0.05, B )/SNH, where C(α, B ) is the critical region such ( ) that P C(α, B )/SNH = α for a template B. From Table 1, we can see that, when Γ.ratio is low, power is not high, however, when Γ.ratio 0.01, we have power 0.9. Therefore, we can say the method we proposed is effective for Γ.ratio 0.01 as far as our simulation studies are concerned. n = 10 3 may be much too large for the sample size for examining the effectiveness of a statistical method, but in cryptographic applications, situations with huge sample sizes are usually discussed. In fact, Rukhin et al. (2010) mentions, in page 2-2, that the size is of the order 10 3 to So, taking account of applications in the cryptographic field, we set n = 10 3 in our simulation studies. (2) Simulation studies for Case (C - 2). m, n, N, α, B and times of repeating the simulation study are the same as in Case (C - 1). We set κ 0 = 9. For each simulation study, we say that we have success when we can finally find the set of patterns, which includes B. And success.ratio means success.ratio = times of success

11 Modified Non-overlapping Template Matching Test The results are shown in Table 2. In this table, 1, 2 and 3 mean that success.ratio is 1.00 when Γ.ratio = 0.02, success.ratios are 0.30, 0.58 and 0.76 when Γ.ratio = 0.11, 0.13 and 0.15,respectively, and success.ratio = 1.00 when Γ.ratio = 0.02, respectively. We can see that success.ratio depends on B. As far as our simulation studies are concerned, in many cases, we have success.ratio 0.9 when Γ.ratio However, when B = , success.ratio still remains 0.19 for Γ.ratio = Anyway, as far as our simulation studies are concerned, the Short-Bit-N O-T est and Specif y-t emp-p roc, which we proposed, show satisfactory results for many cases. Table 2: Success.Ratio for Case (C-2) m B success.ratio Γ.ratio C(α, B ) s, where B belongs to the set of all 2 m patterns of length m, are generally not mutually disjoint with respect to B. Although this fact may affect the success.ratio and the width of the set S(B) of patterns we finally obtained, it is very difficult to show this effect generally. So we showed goodness of our proposal by simulation studies in Table 2. For example, for the case of B = 0001, Γ.ratio = 0.09 and success.ratio = 0.90 in Table 2, S(B) includes the pattern 0001 (true template) for 8,962 times in our simulation studies. The number of elements of S(B) is 1 (only true template) for 8,377 times and is 2 (the patterns are 0001 and 1000) for 585 times. In this case the number of elements of S(B) is not large. Also we have to show why the success.ratio is going up slowly as Γ.ratio increases for the string, in which B = is embedded, in Table 2. We would like to leave the above problems for our future tasks. Acknowledgments The authors thank Professor Andrew L. Rukhin of the National Institute of Standards and Technology, United States Department of Commerce, for helpful discussions and pointing out an important reference. They also thank the referees and the editor for helpful comments and suggestions, which were very useful for improving the paper. This work was supported by The Research on Security and Reliability in Electronic Society, Chuo University 21st Century COE Program. 59

12 TAKEDA, HUZII, WATANABE and KAMAKURA REFERENCES Conover, W.J. (1972). A Kolmogorov goodness-of-fit test for discontinuous distributions. Journal of the American Statistical Association, 67, Darling, D.A. (1957). The Kolmogorov-Smirnov, Cramer-von Mises tests. The Annals of Mathematical Statistics, 28, Gibbons, J. D. and Chakraborti, S. (2011). Nonparametric statistical inference. Fifth edition. Statistics: Textbooks and Monographs. Chapman and Hall/CRC. Guibas, L. J. and Odlyzko, A. M. (1981). String overlaps, pattern matching, and nontransitive games. Journal of Combinatorial Theory, Series A, 30, Patidar, V. and Sud, K.K. (2009). A novel pseudo random bit generator based on chaotic standard map and its testing, Electronic Journal of Theoretical Physics, 6, Pettitt, A.N. and Stephens, M.A. (1977). The Kolmogorov-Smirnov goodness-of-fit statistic with discrete and grouped data. Technometrics, 19, Rivest, R.L., Shamir, A. and Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21, Ryabko, B.Ya., Stognienko, V.S. and Shokin, Yu.I. (2004). A new test for randomness and its application to some cryptographic problems. Journal of Statistical Planning and Inference, 123, Ryabko, B.Ya. and Monarev, V.A. (2005). Using information theory approach to randomness testing. Journal of Statistical Planning and Inference, 133, Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J. and Vo, S. (2010). A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication Revision 1a, The National Institute of Standards and Technology, U.S.A. Schmid, P. (1958). On the Kolmogorov and Smirnov limit theorems for discontinuous distribution functions. Annals of Mathematical Statistics, 29, Shannon, C.E. (1949). Communication theory of secrecy systems. Bell System Technical Journal, 28, Szczepanskia, J., Wajnryba, E., Amigob, J.M., Sanchez-Vivesc, M. and M. Slaterd. (2004). Biometric random number generators. Computers & Security, 23, Wood, C.L. and Altavela, M.M. (1978). Large-sample results for Kolmogorov-Smirnov statistics for discrete distributions. Biometrika, 65, (Received: November 28, 2013, Accepted: August 30, 2014) 60

CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS

CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS 24 CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS 3.1 INTRODUCTION Pseudo Random Number Generators (PRNGs) are widely used in many applications, such as numerical analysis, probabilistic

More information

Construction of Pseudorandom Binary Sequences Using Chaotic Maps

Construction of Pseudorandom Binary Sequences Using Chaotic Maps Applied Mathematical Sciences, Vol. 9, 2015, no. 78, 3847-3853 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2015.52149 Construction of Pseudorandom Binary Sequences Using Chaotic Maps Dimo

More information

Self-shrinking Bit Generation Algorithm Based on Feedback with Carry Shift Register

Self-shrinking Bit Generation Algorithm Based on Feedback with Carry Shift Register Advanced Studies in Theoretical Physics Vol. 8, 2014, no. 24, 1057-1061 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/astp.2014.49132 Self-shrinking Bit Generation Algorithm Based on Feedback

More information

Signature Attractor Based Pseudorandom Generation Algorithm

Signature Attractor Based Pseudorandom Generation Algorithm Advanced Studies in Theoretical Physics Vol. 9, 2015, no. 6, 287-293 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/astp.2015.517 Signature Attractor Based Pseudorandom Generation Algorithm Krasimir

More information

Using Information Theory Approach to Randomness Testing

Using Information Theory Approach to Randomness Testing Using Information Theory Approach to Randomness Testing B. Ya. Ryabko and V.A. Monarev Abstract We address the problem of detecting deviations of binary sequence from randomness,which is very important

More information

NEW RESULTS CONCERNING THE POWER OF NIST RANDOMNESS TESTS

NEW RESULTS CONCERNING THE POWER OF NIST RANDOMNESS TESTS THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 18, Special Issue 2017, pp 381-388 NEW RESULTS CONCERNING THE POWER OF NIST RANDOMNESS TESTS Carmina GEORGESCU,

More information

An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice

An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice PRAMANA c Indian Academy of Sciences Vol. 85, No. 4 journal of October 215 physics pp. 617 627 An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice RENFU

More information

A novel pseudo-random number generator based on discrete chaotic iterations

A novel pseudo-random number generator based on discrete chaotic iterations A novel pseudo-random number generator based on discrete chaotic iterations Qianxue Wang, Christophe Guyeux and Jacques M. Bahi University of Franche-Comte Computer Science Laboratory LIFC, Belfort, France

More information

On ZK-Crypt, Book Stack, and Statistical Tests

On ZK-Crypt, Book Stack, and Statistical Tests On ZK-Crypt, Book Stack, and Statistical Tests S. Doroshenko A. Fionov A. Lubkin V. Monarev B. Ryabko Abstract The algorithms submitted to the ECRYPT Stream Cipher Project (estream) were tested using the

More information

NEW ALTERNATE RING-COUPLED MAP FOR MULTI-RANDOM NUMBER GENERATION

NEW ALTERNATE RING-COUPLED MAP FOR MULTI-RANDOM NUMBER GENERATION Accepted for publication in: Journal of Nonlinear Systems and Applications, April 2013 NEW ALTERNATE RING-COUPLED MAP FOR MULTI-RANDOM NUMBER GENERATION Andrea Espinel, Ina Taralova and René Lozi Abstract.

More information

Cube Test Analysis of the Statistical Behavior of CubeHash and Skein

Cube Test Analysis of the Statistical Behavior of CubeHash and Skein Cube Test Analysis of the Statistical Behavior of CubeHash and Skein Alan Kaminsky May, 0 Abstract This work analyzes the statistical properties of the SHA- candidate cryptographic hash algorithms CubeHash

More information

A new simple technique for improving the random properties of chaos-based cryptosystems

A new simple technique for improving the random properties of chaos-based cryptosystems AIP ADVANCES 8, 035004 (2018) A new simple technique for improving the random properties of chaos-based cryptosystems M. Garcia-Bosque, a A. Pérez-Resa, a C. Sánchez-Azqueta, a and S. Celma a Group of

More information

Application of Homogeneity Tests: Problems and Solution

Application of Homogeneity Tests: Problems and Solution Application of Homogeneity Tests: Problems and Solution Boris Yu. Lemeshko (B), Irina V. Veretelnikova, Stanislav B. Lemeshko, and Alena Yu. Novikova Novosibirsk State Technical University, Novosibirsk,

More information

A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith

A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith Abstract Generating random numbers are mainly used to create secret keys or random

More information

COMPOSITIONS OF LINEAR FUNCTIONS AND APPLICATIONS TO HASHING

COMPOSITIONS OF LINEAR FUNCTIONS AND APPLICATIONS TO HASHING COMPOSITIONS OF LINEAR FUNCTIONS AND APPLICATIONS TO HASHING VLADIMIR SHPILRAIN AND BIANCA SOSNOVSKI ABSTRACT. Cayley hash functions are based on a simple idea of using a pair of (semi)group elements,

More information

ON SMALL SAMPLE PROPERTIES OF PERMUTATION TESTS: INDEPENDENCE BETWEEN TWO SAMPLES

ON SMALL SAMPLE PROPERTIES OF PERMUTATION TESTS: INDEPENDENCE BETWEEN TWO SAMPLES ON SMALL SAMPLE PROPERTIES OF PERMUTATION TESTS: INDEPENDENCE BETWEEN TWO SAMPLES Hisashi Tanizaki Graduate School of Economics, Kobe University, Kobe 657-8501, Japan e-mail: tanizaki@kobe-u.ac.jp Abstract:

More information

Correction of Overlapping Template Matching Test Included in NIST Randomness Test Suite

Correction of Overlapping Template Matching Test Included in NIST Randomness Test Suite 1788 PAPER Special Section on Information Theory and It Application Correction of Overlapping Template Matching Tet Included in NIST Randomne Tet Suite Kenji HAMANO a), Member and Tohinobu KANEKO b), Fellow

More information

Solutions for week 1, Cryptography Course - TDA 352/DIT 250

Solutions for week 1, Cryptography Course - TDA 352/DIT 250 Solutions for week, Cryptography Course - TDA 352/DIT 250 In this weekly exercise sheet: you will use some historical ciphers, the OTP, the definition of semantic security and some combinatorial problems.

More information

Investigation of goodness-of-fit test statistic distributions by random censored samples

Investigation of goodness-of-fit test statistic distributions by random censored samples d samples Investigation of goodness-of-fit test statistic distributions by random censored samples Novosibirsk State Technical University November 22, 2010 d samples Outline 1 Nonparametric goodness-of-fit

More information

DNA Secret Writing With Laplace Transform

DNA Secret Writing With Laplace Transform International Journal of Computer Applications (975 8887) Volume 5 No.5, July 22 DNA Secret Writing With Laplace Transform Sukalyan Som Department of Computer Science Barrackpore Rastraguru Surendranath

More information

On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results

On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results Yongge Wang Dept. SIS, UNC Charlotte Charlotte, NC 83, USA Email: yongge.wang@uncc.edu Abstract Random numbers have

More information

B. Encryption using quasigroup

B. Encryption using quasigroup Sequence Randomization Using Quasigroups and Number Theoretic s Vaignana Spoorthy Ella Department of Computer Science Oklahoma State University Stillwater, Oklahoma, USA spoorthyella@okstateedu Abstract

More information

A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing

A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing Informatica 33 (29) 441 452 441 A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing Vinod Patidar and K. K. Sud Department of Basic Sciences, School of Engineering,

More information

THE RSA ENCRYPTION SCHEME

THE RSA ENCRYPTION SCHEME THE RSA ENCRYPTION SCHEME Contents 1. The RSA Encryption Scheme 2 1.1. Advantages over traditional coding methods 3 1.2. Proof of the decoding procedure 4 1.3. Security of the RSA Scheme 4 1.4. Finding

More information

Exact goodness-of-fit tests for censored data

Exact goodness-of-fit tests for censored data Exact goodness-of-fit tests for censored data Aurea Grané Statistics Department. Universidad Carlos III de Madrid. Abstract The statistic introduced in Fortiana and Grané (23, Journal of the Royal Statistical

More information

Testing Goodness-of-Fit for Exponential Distribution Based on Cumulative Residual Entropy

Testing Goodness-of-Fit for Exponential Distribution Based on Cumulative Residual Entropy This article was downloaded by: [Ferdowsi University] On: 16 April 212, At: 4:53 Publisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: 172954 Registered office: Mortimer

More information

A Comparison of Methods for Redundancy Reduction in Recurrence Time Coding

A Comparison of Methods for Redundancy Reduction in Recurrence Time Coding 1 1 A Comparison of Methods for Redundancy Reduction in Recurrence Time Coding Hidetoshi Yokoo, Member, IEEE Abstract Recurrence time of a symbol in a string is defined as the number of symbols that have

More information

A NEW RANDOM NUMBER GENERATOR USING FIBONACCI SERIES

A NEW RANDOM NUMBER GENERATOR USING FIBONACCI SERIES International J. of Math. Sci. & Engg. Appls. (IJMSEA) ISSN 0973-9424, Vol. 11 No. I (April, 2017), pp. 185-193 A NEW RANDOM NUMBER GENERATOR USING FIBONACCI SERIES KOTTA NAGALAKSHMI RACHANA 1 AND SOUBHIK

More information

THE CUBIC PUBLIC-KEY TRANSFORMATION*

THE CUBIC PUBLIC-KEY TRANSFORMATION* CIRCUITS SYSTEMS SIGNAL PROCESSING c Birkhäuser Boston (2007) VOL. 26, NO. 3, 2007, PP. 353 359 DOI: 10.1007/s00034-006-0309-x THE CUBIC PUBLIC-KEY TRANSFORMATION* Subhash Kak 1 Abstract. This note proposes

More information

Research Article A Novel True Random Number Generator Based on Mouse Movement and a One-Dimensional Chaotic Map

Research Article A Novel True Random Number Generator Based on Mouse Movement and a One-Dimensional Chaotic Map Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 22, Article ID 9382, 9 pages doi:.55/22/9382 Research Article A Novel True Random Number Generator Based on Mouse Movement and

More information

CPSC 531: Random Numbers. Jonathan Hudson Department of Computer Science University of Calgary

CPSC 531: Random Numbers. Jonathan Hudson Department of Computer Science University of Calgary CPSC 531: Random Numbers Jonathan Hudson Department of Computer Science University of Calgary http://www.ucalgary.ca/~hudsonj/531f17 Introduction In simulations, we generate random values for variables

More information

A comparison study of the nonparametric tests based on the empirical distributions

A comparison study of the nonparametric tests based on the empirical distributions 통계연구 (2015), 제 20 권제 3 호, 1-12 A comparison study of the nonparametric tests based on the empirical distributions Hyo-Il Park 1) Abstract In this study, we propose a nonparametric test based on the empirical

More information

Minimal basis for connected Markov chain over 3 3 K contingency tables with fixed two-dimensional marginals. Satoshi AOKI and Akimichi TAKEMURA

Minimal basis for connected Markov chain over 3 3 K contingency tables with fixed two-dimensional marginals. Satoshi AOKI and Akimichi TAKEMURA Minimal basis for connected Markov chain over 3 3 K contingency tables with fixed two-dimensional marginals Satoshi AOKI and Akimichi TAKEMURA Graduate School of Information Science and Technology University

More information

USING POLY-DRAGON CRYPTOSYSTEM IN A PSEUDORANDOM NUMBER GENERATOR MSTg. 1. Introduction

USING POLY-DRAGON CRYPTOSYSTEM IN A PSEUDORANDOM NUMBER GENERATOR MSTg. 1. Introduction t m Mathematical Publications DOI: 10.2478/tmmp-2014-0030 Tatra Mt. Math. Publ. 61 (2014), 105 116 USING POLY-DRAGON CRYPTOSYSTEM IN A PSEUDORANDOM NUMBER GENERATOR MSTg Viliam Hromada Milan Vojvoda ABSTRACT.

More information

CHAPTER-1 INTRODUCTION

CHAPTER-1 INTRODUCTION CHAPTER-1 1.1 Need for Security INTRODUCTION The present era of data explosion involves the necessity of high efficiency in terms of data capacity and data security [1]. As the data collection and processing

More information

1 Ex. 1 Verify that the function H(p 1,..., p n ) = k p k log 2 p k satisfies all 8 axioms on H.

1 Ex. 1 Verify that the function H(p 1,..., p n ) = k p k log 2 p k satisfies all 8 axioms on H. Problem sheet Ex. Verify that the function H(p,..., p n ) = k p k log p k satisfies all 8 axioms on H. Ex. (Not to be handed in). looking at the notes). List as many of the 8 axioms as you can, (without

More information

MARKOV CHAINS A finite state Markov chain is a sequence of discrete cv s from a finite alphabet where is a pmf on and for

MARKOV CHAINS A finite state Markov chain is a sequence of discrete cv s from a finite alphabet where is a pmf on and for MARKOV CHAINS A finite state Markov chain is a sequence S 0,S 1,... of discrete cv s from a finite alphabet S where q 0 (s) is a pmf on S 0 and for n 1, Q(s s ) = Pr(S n =s S n 1 =s ) = Pr(S n =s S n 1

More information

Exact goodness-of-fit tests for censored data

Exact goodness-of-fit tests for censored data Ann Inst Stat Math ) 64:87 3 DOI.7/s463--356-y Exact goodness-of-fit tests for censored data Aurea Grané Received: February / Revised: 5 November / Published online: 7 April The Institute of Statistical

More information

Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1

Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1 Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1 Kwangsu Lee A Thesis for the Degree of Master of Science Division of Computer Science, Department

More information

Asymmetric Encryption

Asymmetric Encryption -3 s s Encryption Comp Sci 3600 Outline -3 s s 1-3 2 3 4 5 s s Outline -3 s s 1-3 2 3 4 5 s s Function Using Bitwise XOR -3 s s Key Properties for -3 s s The most important property of a hash function

More information

arxiv: v1 [cs.cr] 18 Jul 2009

arxiv: v1 [cs.cr] 18 Jul 2009 Breaking a Chaotic Cryptographic Scheme Based on Composition Maps Chengqing Li 1, David Arroyo 2, and Kwok-Tung Lo 1 1 Department of Electronic and Information Engineering, The Hong Kong Polytechnic University,

More information

Analysis of FIPS Test and Chaos-Based Pseudorandom Number Generator

Analysis of FIPS Test and Chaos-Based Pseudorandom Number Generator Chaotic Modeling and Simulation (CMSIM) : 73 80, 013 Analysis of FIPS 140- Test and Chaos-Based Pseudorandom Number Generator Lequan Min, Tianyu Chen, and Hongyan Zang Mathematics and Physics School, University

More information

Testing the Reliability of Statistical Tests for Pseudorandom Number Generators

Testing the Reliability of Statistical Tests for Pseudorandom Number Generators Testing the Reliability of Statistical Tests for Pseudorandom Number Generators Hiroshi Haramoto (Ehime Univ.) joint work with Makoto Matsumoto (Hiroshima Univ.) July, 3rd, 2018 This work is supported

More information

Pattern correlation matrices and their properties

Pattern correlation matrices and their properties Linear Algebra and its Applications 327 (2001) 105 114 www.elsevier.com/locate/laa Pattern correlation matrices and their properties Andrew L. Rukhin Department of Mathematics and Statistics, University

More information

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University Number Theory, Public Key Cryptography, RSA Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr The Euler Phi Function For a positive integer n, if 0

More information

Lecture 2: Perfect Secrecy and its Limitations

Lecture 2: Perfect Secrecy and its Limitations CS 4501-6501 Topics in Cryptography 26 Jan 2018 Lecture 2: Perfect Secrecy and its Limitations Lecturer: Mohammad Mahmoody Scribe: Mohammad Mahmoody 1 Introduction Last time, we informally defined encryption

More information

On Universal Types. Gadiel Seroussi Hewlett-Packard Laboratories Palo Alto, California, USA. University of Minnesota, September 14, 2004

On Universal Types. Gadiel Seroussi Hewlett-Packard Laboratories Palo Alto, California, USA. University of Minnesota, September 14, 2004 On Universal Types Gadiel Seroussi Hewlett-Packard Laboratories Palo Alto, California, USA University of Minnesota, September 14, 2004 Types for Parametric Probability Distributions A = finite alphabet,

More information

Random Number Generation. CS1538: Introduction to simulations

Random Number Generation. CS1538: Introduction to simulations Random Number Generation CS1538: Introduction to simulations Random Numbers Stochastic simulations require random data True random data cannot come from an algorithm We must obtain it from some process

More information

Information Theory and Coding Techniques: Chapter 1.1. What is Information Theory? Why you should take this course?

Information Theory and Coding Techniques: Chapter 1.1. What is Information Theory? Why you should take this course? Information Theory and Coding Techniques: Chapter 1.1 What is Information Theory? Why you should take this course? 1 What is Information Theory? Information Theory answers two fundamental questions in

More information

Computer Science A Cryptography and Data Security. Claude Crépeau

Computer Science A Cryptography and Data Security. Claude Crépeau Computer Science 308-547A Cryptography and Data Security Claude Crépeau These notes are, largely, transcriptions by Anton Stiglic of class notes from the former course Cryptography and Data Security (308-647A)

More information

On Lempel-Ziv Complexity of Sequences

On Lempel-Ziv Complexity of Sequences On Lempel-Ziv Complexity of Sequences Ali Doğanaksoy 1,2,4 and Faruk Göloğlu 2,3 1 Department of Mathematics, Middle East Technical University Ankara, Turkey aldoks@metu.edu.tr 2 Institute of Applied Mathematics,

More information

Benes and Butterfly schemes revisited

Benes and Butterfly schemes revisited Benes and Butterfly schemes revisited Jacques Patarin, Audrey Montreuil Université de Versailles 45 avenue des Etats-Unis 78035 Versailles Cedex - France Abstract In [1], W. Aiello and R. Venkatesan have

More information

Pseudorandom number generators based on random covers for finite groups

Pseudorandom number generators based on random covers for finite groups Pseudorandom number generators based on random covers for finite groups Pascal Marquardt Pavol Svaba Tran van Trung Institut für Experimentelle Mathematik Universität Duisburg-Essen Ellernstrasse 29 45326

More information

CUSUM(t) D data. Supplementary Figure 1: Examples of changes in linear trend and CUSUM. (a) The existence of

CUSUM(t) D data. Supplementary Figure 1: Examples of changes in linear trend and CUSUM. (a) The existence of Supplementary Figures a b a(t) a(t) c t d t d(t) d(t) t t e f CUSUM(t) D data t CUSUM(t) D data t Supplementary Figure 1: Examples of changes in linear trend and CUSUM. (a) The existence of an abrupt jump

More information

A fast modular multiplication algorithm for calculating the product AB modulo N

A fast modular multiplication algorithm for calculating the product AB modulo N Information Processing Letters 72 (1999) 77 81 A fast modular multiplication algorithm for calculating the product AB modulo N Chien-Yuan Chen a,, Chin-Chen Chang b,1 a Department of Information Engineering,

More information

Fourier Series Approximation for the Generalized Baumgartner Statistic

Fourier Series Approximation for the Generalized Baumgartner Statistic Communications of the Korean Statistical Society 2012, Vol. 19, No. 3, 451 457 DOI: http://dx.doi.org/10.5351/ckss.2012.19.3.451 Fourier Series Approximation for the Generalized Baumgartner Statistic Hyung-ae

More information

Weak key analysis for chaotic cipher based on randomness properties

Weak key analysis for chaotic cipher based on randomness properties . RESEARCH PAPER. SCIENCE CHINA Information Sciences May 01 Vol. 55 No. 5: 116 1171 doi: 10.1007/s1143-011-4401-x Weak key analysis for chaotic cipher based on randomness properties YIN RuMing, WANG Jian,

More information

Modified Kolmogorov-Smirnov Test of Goodness of Fit. Catalonia-BarcelonaTECH, Spain

Modified Kolmogorov-Smirnov Test of Goodness of Fit. Catalonia-BarcelonaTECH, Spain 152/304 CoDaWork 2017 Abbadia San Salvatore (IT) Modified Kolmogorov-Smirnov Test of Goodness of Fit G.S. Monti 1, G. Mateu-Figueras 2, M. I. Ortego 3, V. Pawlowsky-Glahn 2 and J. J. Egozcue 3 1 Department

More information

Math 412: Number Theory Lecture 13 Applications of

Math 412: Number Theory Lecture 13 Applications of Math 412: Number Theory Lecture 13 Applications of Gexin Yu gyu@wm.edu College of William and Mary Partition of integers A partition λ of the positive integer n is a non increasing sequence of positive

More information

Chaitin Ω Numbers and Halting Problems

Chaitin Ω Numbers and Halting Problems Chaitin Ω Numbers and Halting Problems Kohtaro Tadaki Research and Development Initiative, Chuo University CREST, JST 1 13 27 Kasuga, Bunkyo-ku, Tokyo 112-8551, Japan E-mail: tadaki@kc.chuo-u.ac.jp Abstract.

More information

PERFECTLY secure key agreement has been studied recently

PERFECTLY secure key agreement has been studied recently IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 2, MARCH 1999 499 Unconditionally Secure Key Agreement the Intrinsic Conditional Information Ueli M. Maurer, Senior Member, IEEE, Stefan Wolf Abstract

More information

CS4800: Algorithms & Data Jonathan Ullman

CS4800: Algorithms & Data Jonathan Ullman CS4800: Algorithms & Data Jonathan Ullman Lecture 22: Greedy Algorithms: Huffman Codes Data Compression and Entropy Apr 5, 2018 Data Compression How do we store strings of text compactly? A (binary) code

More information

Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery

Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery Julio Hernandez-Castro, David F. Barrero Abstract Randomness tests are a key tool to assess the

More information

Cryptography. pieces from work by Gordon Royle

Cryptography. pieces from work by Gordon Royle Cryptography pieces from work by Gordon Royle The set-up Cryptography is the mathematics of devising secure communication systems, whereas cryptanalysis is the mathematics of breaking such systems. We

More information

Karaliopoulou Margarita 1. Introduction

Karaliopoulou Margarita 1. Introduction ESAIM: Probability and Statistics URL: http://www.emath.fr/ps/ Will be set by the publisher ON THE NUMBER OF WORD OCCURRENCES IN A SEMI-MARKOV SEQUENCE OF LETTERS Karaliopoulou Margarita 1 Abstract. Let

More information

18.310A Final exam practice questions

18.310A Final exam practice questions 18.310A Final exam practice questions This is a collection of practice questions, gathered randomly from previous exams and quizzes. They may not be representative of what will be on the final. In particular,

More information

Uniform Random Binary Floating Point Number Generation

Uniform Random Binary Floating Point Number Generation Uniform Random Binary Floating Point Number Generation Prof. Dr. Thomas Morgenstern, Phone: ++49.3943-659-337, Fax: ++49.3943-659-399, tmorgenstern@hs-harz.de, Hochschule Harz, Friedrichstr. 57-59, 38855

More information

A New Class of Product-sum Type Public Key Cryptosystem, K(V)ΣΠPKC, Constructed Based on Maximum Length Code

A New Class of Product-sum Type Public Key Cryptosystem, K(V)ΣΠPKC, Constructed Based on Maximum Length Code A New Class of Product-sum Type Public Key Cryptosystem, K(V)ΣΠPKC, Constructed Based on Maximum Length Code Masao KASAHARA Abstract The author recently proposed a new class of knapsack type PKC referred

More information

Weak key-iv Pairs in the A5/1 Stream Cipher

Weak key-iv Pairs in the A5/1 Stream Cipher Weak -IV Pairs in the A5/1 Stream Cipher Ali Alhamdan Harry Bartlett Ed Dawson Leonie Simpson Kenneth Koon-Ho Wong Institute for Future Environments Science and Engineering Faculty Queensland University

More information

SOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies

SOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies SOBER Cryptanalysis Daniel Bleichenbacher and Sarvar Patel {bleichen,sarvar}@lucent.com Bell Laboratories Lucent Technologies Abstract. SOBER is a new stream cipher that has recently been developed by

More information

Kolmogorov-Loveland Randomness and Stochasticity

Kolmogorov-Loveland Randomness and Stochasticity Kolmogorov-Loveland Randomness and Stochasticity Wolfgang Merkle 1 Joseph Miller 2 André Nies 3 Jan Reimann 1 Frank Stephan 4 1 Institut für Informatik, Universität Heidelberg 2 Department of Mathematics,

More information

Lecture 1: September 25, A quick reminder about random variables and convexity

Lecture 1: September 25, A quick reminder about random variables and convexity Information and Coding Theory Autumn 207 Lecturer: Madhur Tulsiani Lecture : September 25, 207 Administrivia This course will cover some basic concepts in information and coding theory, and their applications

More information

On bounded redundancy of universal codes

On bounded redundancy of universal codes On bounded redundancy of universal codes Łukasz Dębowski Institute of omputer Science, Polish Academy of Sciences ul. Jana Kazimierza 5, 01-248 Warszawa, Poland Abstract onsider stationary ergodic measures

More information

Cryptanalysis on An ElGamal-Like Cryptosystem for Encrypting Large Messages

Cryptanalysis on An ElGamal-Like Cryptosystem for Encrypting Large Messages Cryptanalysis on An ElGamal-Like Cryptosystem for Encrypting Large Messages MEI-NA WANG Institute for Information Industry Networks and Multimedia Institute TAIWAN, R.O.C. myrawang@iii.org.tw SUNG-MING

More information

A new class of scalable parallel pseudorandom number generators based on Pohlig-Hellman exponentiation ciphers

A new class of scalable parallel pseudorandom number generators based on Pohlig-Hellman exponentiation ciphers University of Colorado Boulder From the SelectedWorks of Paul Beale 2014 A new class of scalable parallel pseudorandom number generators based on Pohlig-Hellman exponentiation ciphers Paul Beale, University

More information

An Algebraic Framework for Cipher Embeddings

An Algebraic Framework for Cipher Embeddings An Algebraic Framework for Cipher Embeddings C. Cid 1, S. Murphy 1, and M.J.B. Robshaw 2 1 Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, U.K. 2 France Télécom

More information

An introduction to basic information theory. Hampus Wessman

An introduction to basic information theory. Hampus Wessman An introduction to basic information theory Hampus Wessman Abstract We give a short and simple introduction to basic information theory, by stripping away all the non-essentials. Theoretical bounds on

More information

Sources of randomness

Sources of randomness Random Number Generator Chapter 7 In simulations, we generate random values for variables with a specified distribution Ex., model service times using the exponential distribution Generation of random

More information

A Knapsack Cryptosystem Secure Against Attacks Using Basis Reduction and Integer Programming

A Knapsack Cryptosystem Secure Against Attacks Using Basis Reduction and Integer Programming A Knapsack Cryptosystem Secure Against Attacks Using Basis Reduction and Integer Programming Bala Krishnamoorthy William Webb Nathan Moyer Washington State University ISMP 2006 August 2, 2006 Public Key

More information

Image and Multidimensional Signal Processing

Image and Multidimensional Signal Processing Image and Multidimensional Signal Processing Professor William Hoff Dept of Electrical Engineering &Computer Science http://inside.mines.edu/~whoff/ Image Compression 2 Image Compression Goal: Reduce amount

More information

Smart Hill Climbing Finds Better Boolean Functions

Smart Hill Climbing Finds Better Boolean Functions Smart Hill Climbing Finds Better Boolean Functions William Millan, Andrew Clark and Ed Dawson Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane, Queensland,

More information

Topic Contents. Factoring Methods. Unit 3: Factoring Methods. Finding the square root of a number

Topic Contents. Factoring Methods. Unit 3: Factoring Methods. Finding the square root of a number Topic Contents Factoring Methods Unit 3 The smallest divisor of an integer The GCD of two numbers Generating prime numbers Computing prime factors of an integer Generating pseudo random numbers Raising

More information

A novel parallel hash function based on 3D chaotic map

A novel parallel hash function based on 3D chaotic map Akhavan et al. EURASIP Journal on Advances in Signal Processing 2013, 2013:126 RESEARCH A novel parallel hash function based on 3D chaotic map Amir Akhavan 1*, Azman Samsudin 1 and Afshin Akhshani 2 Open

More information

Multiprime Blum-Blum-Shub pseudorandom number generator

Multiprime Blum-Blum-Shub pseudorandom number generator Calhoun: The NPS Institutional Archive DSpace Repository Theses and Dissertations 1. Thesis and Dissertation Collection, all items 2016-09 Multiprime Blum-Blum-Shub pseudorandom number generator Shrestha,

More information

RSA ENCRYPTION USING THREE MERSENNE PRIMES

RSA ENCRYPTION USING THREE MERSENNE PRIMES Int. J. Chem. Sci.: 14(4), 2016, 2273-2278 ISSN 0972-768X www.sadgurupublications.com RSA ENCRYPTION USING THREE MERSENNE PRIMES Ch. J. L. PADMAJA a*, V. S. BHAGAVAN a and B. SRINIVAS b a Department of

More information

A Fast Chaos-Based Pseudo-Random Bit Generator Using Binary64 Floating-Point Arithmetic

A Fast Chaos-Based Pseudo-Random Bit Generator Using Binary64 Floating-Point Arithmetic A Fast Chaos-Based Pseudo-Random Bit Generator Using Binary64 Floating-Point Arithmetic Michael François, David Defour, Christophe Negre To cite this version: Michael François, David Defour, Christophe

More information

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 23 (rev. 1) Professor M. J. Fischer November 29, 2005 1 Oblivious Transfer Lecture Notes 23 In the locked

More information

6.02 Fall 2011 Lecture #9

6.02 Fall 2011 Lecture #9 6.02 Fall 2011 Lecture #9 Claude E. Shannon Mutual information Channel capacity Transmission at rates up to channel capacity, and with asymptotically zero error 6.02 Fall 2011 Lecture 9, Slide #1 First

More information

Multi-Map Orbit Hopping Chaotic Stream Cipher

Multi-Map Orbit Hopping Chaotic Stream Cipher Multi-Map Orbit Hopping Chaotic Stream Cipher Xiaowen Zhang 1, Li Shu 2, Ke Tang 1 Abstract In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum

More information

arxiv: v1 [stat.me] 2 Mar 2015

arxiv: v1 [stat.me] 2 Mar 2015 Statistics Surveys Vol. 0 (2006) 1 8 ISSN: 1935-7516 Two samples test for discrete power-law distributions arxiv:1503.00643v1 [stat.me] 2 Mar 2015 Contents Alessandro Bessi IUSS Institute for Advanced

More information

Hashes and Message Digests Alex X. Liu & Haipeng Dai

Hashes and Message Digests Alex X. Liu & Haipeng Dai Hashes and Message Digests Alex X. Liu & Haipeng Dai haipengdai@nju.edu.cn 313 CS Building Department of Computer Science and Technology Nanjing University Integrity vs. Secrecy Integrity: attacker cannot

More information

Multi-valued Arbiters for Quality Enhancement of PUF Responses on FPGA Implementation

Multi-valued Arbiters for Quality Enhancement of PUF Responses on FPGA Implementation Multi-valued Arbiters for Quality Enhancement of PUF Responses on FPGA Implementation Siarhei S. Zalivaka 1, Alexander V. Puchkov 2, Vladimir P. Klybik 2, Alexander A. Ivaniuk 2, Chip-Hong Chang 1 1 School

More information

Pseudo-Random Generators

Pseudo-Random Generators Pseudo-Random Generators Why do we need random numbers? Simulation Sampling Numerical analysis Computer programming (e.g. randomized algorithm) Elementary and critical element in many cryptographic protocols

More information

Pseudo-Random Generators

Pseudo-Random Generators Pseudo-Random Generators Topics Why do we need random numbers? Truly random and Pseudo-random numbers. Definition of pseudo-random-generator What do we expect from pseudorandomness? Testing for pseudo-randomness.

More information

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance. 9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance

More information

The BB84 cryptologic protocol

The BB84 cryptologic protocol The cryptologic protocol of quantum key distribution Dimitri Petritis Institut de recherche mathématique de Rennes Université de Rennes 1 et CNRS (UMR 6625) Vernam s ciphering Principles of coding and

More information

Topics. Probability Theory. Perfect Secrecy. Information Theory

Topics. Probability Theory. Perfect Secrecy. Information Theory Topics Probability Theory Perfect Secrecy Information Theory Some Terms (P,C,K,E,D) Computational Security Computational effort required to break cryptosystem Provable Security Relative to another, difficult

More information

Topics. Pseudo-Random Generators. Pseudo-Random Numbers. Truly Random Numbers

Topics. Pseudo-Random Generators. Pseudo-Random Numbers. Truly Random Numbers Topics Pseudo-Random Generators Why do we need random numbers? Truly random and Pseudo-random numbers. Definition of pseudo-random-generator What do we expect from pseudorandomness? Testing for pseudo-randomness.

More information

SIGNAL COMPRESSION Lecture 7. Variable to Fix Encoding

SIGNAL COMPRESSION Lecture 7. Variable to Fix Encoding SIGNAL COMPRESSION Lecture 7 Variable to Fix Encoding 1. Tunstall codes 2. Petry codes 3. Generalized Tunstall codes for Markov sources (a presentation of the paper by I. Tabus, G. Korodi, J. Rissanen.

More information

SIGNAL COMPRESSION Lecture Shannon-Fano-Elias Codes and Arithmetic Coding

SIGNAL COMPRESSION Lecture Shannon-Fano-Elias Codes and Arithmetic Coding SIGNAL COMPRESSION Lecture 3 4.9.2007 Shannon-Fano-Elias Codes and Arithmetic Coding 1 Shannon-Fano-Elias Coding We discuss how to encode the symbols {a 1, a 2,..., a m }, knowing their probabilities,

More information