arxiv: v2 [cs.cr] 29 Sep 2016

Size: px
Start display at page:

Download "arxiv: v2 [cs.cr] 29 Sep 2016"

Transcription

1 Internatonal Journal of Bfurcaton and Chaos c World Scentfc Publshng Company Breakng a chaotc mage encrypton algorthm based on modulo addton and XOR operaton arxv: v [cs.cr] 9 Sep 016 Chengqng L 1 *, Yuansheng Lu 1, Leo Yu Zhang, and Mchael Z. Q. Chen 3 1 College of Informaton Engneerng, Xangtan Unversty, Xangtan , Hunan, Chna School of Mathematcs and Computatonal Scence, Xangtan Unversty, Xangtan , Hunan, Chna 3 Department of Mechancal Engneerng, The Unversty of Hong Kong, Hong Kong Ths paper re-evaluates the securty of a chaotc mage encrypton algorthm called MCKBA/ HCKBA and fnds that t can be broken effcently wth two known plan-mages and the correspondng cpher-mages. In addton, t s reported that a prevously proposed breakng on MCKBA/HCKBA can be further mproved by reducng the number of chosen plan-mages from four to two. The two attacks are both based on the propertes of solvng a composte functon nvolvng the carry bt, whch s composed of the modulo addton and the btwse OR operatons. Both rgorous theoretcal analyss and detaled expermental results are provded. Keywords: mage encrypton; chaos; chosen-plantext attack; carry bt. 1. Introducton The subtle smlartes between chaos and cryptography make chaos consdered as a specal way to desgn secure and effcent encrypton schemes [Chen et al., 4, 011]. Meanwhle, some cryptanalyss work demonstrated that some chaos-based encrypton schemes are vulnerable to varous conventonal attacks from the vewpont of modern cryptology [L et al., 4; Xao et al., 6; Solak et al., 010a,b]. In addton, some specfc securty flaws of chaos-based encrypton schemes were reported [Zhou & Au, 011; Chen et al., 01]. [Álvarez & L, 6] concluded some general approaches to evaluatng securty of chaosbased encrypton schemes. Due to the smplcty and low computaton complexty of btwse exclusve OR operaton and modulo addton, they are wdely used n tradtonal text encrypton schemes and hash functons. Possble generaton of carry bt by the modulo addton makes the two operatons are nether dentcal nor nterchangeable. Some propertes exstng n mult-round combnaton of the two basc operatons were derved to facltate dfferental attacks on some tradtonal text encrypton schemes or searchng collson of hash functons [Paul & Preneel, 5; Wang et al., 5]. Among many chaos-based encrypton schemes, the two operatons are the basc nvolved (even only) substtuton functons. In [L et al., 5], [L et al., 6], [L et al., 8], and [L et al., 9], the followng propertes about n-bt ntegers α, β, γ, x, y were found to support or enhance the proposed attacks on the correspondng encrypton schemes n turn. Correspondng author, chengqngg@gmal.com 1

2 C. L et al. If α β = n 1, then equaton (α x) = (β x) γ has unque soluton modulo n 1, where (a b) = (a + b) mod n ; Equaton (α β) (β γ) = (α β) (β γ) always exsts; If α β = γ, then α β γ; If (((x α) β) γ) x y, then y β (mod n 1 ). In 0, Yen et al. proposed a chaotc key-based algorthm (CKBA) by encryptng each pxel of a plan-mage by four possble operatons: XORng or XNORng t wth one of two predefned sub-keys. The exerted operaton s determned by a pseudo-random number sequence (PRNS) generated by teratng the logstc map [Yen & Guo, 0]. In, S. L et al. broke CKBA wth only one known/chosen-mage n [L & Zheng, ]. In 5, Socek et al. proposed an enhanced verson of CKBA (ECKBA) employng the followng four methods: 1) replacng the logstc map wth a pecewse lnear chaotc map (PWLCM); ) ncreasng the bt length of secret key to 18; 3) addng a modulo addton and an XOR operaton; 4) runnng all the basc encrypton functons multple tmes. To acheve a much better balance between encrypton load and securty of hgh level, n 7 Rao et al. proposed a modfed verson of CKBA (MCKBA) n [Rao & Gangadhar, 7] by employng a modular addton operaton lke [Socek et al., 5]. To further enhance the securty of MCKBA aganst brute-force attack, n 010 Gangadhar et al. replaced the logstc map wth a smple hyperchaos generator proposed n [Takahash et al., 4] and names the algorthm HCKBA (Hyper Chaotc-Key Based Algorthm) [Gangadhar & Rao, 010]. Snce the two schemes MCKBA and HCKBA share the same structure, [L et al., 011] analyzed them together and reported the followng ponts: Equvalent secret key of MCKBA/HCKBA can be obtaned from four pars of chosen-plantexts; Encrypton result of MCKBA/HCKBA s not senstve to changes of plan-mage; Encrypton result of MCKBA s not senstve to changes of two sub-keys. The lower bound on the number of queres (α, β) to solve unknown varable x n equaton n terms of modulo n 1 s 3 f n 4. y = (α x) (β x) (1) Ths paper re-evaluates the securty of MCKBA/HCKBA and reports the followng ponts: 1) some propertes of Eq. (1) are provded to support practcal approaches to solvng Eq. (1); ) MCKBA/HCKBA can be effcently broken wth two known-plantexts; 3) the chosen-plantext attack proposed n [L et al., 011] can be further mproved and the number of requred chosen-plantexts s only two. The rest of ths paper s organzed as follows. The mage encrypton algorthm under study s brefly ntroduced n Sec.. A known-plantext attack and an mproved chosen-plantext attack on the algorthm s presented n Sec. 3 wth expermental results. The last secton concludes ths paper.. The Chaotc Image Encrypton Algorthm Under Study The encrypton object of MCKBA s a gray-scale mage of sze M N (wdth heght), whch s scanned n the raster order and represented as a one dmensonal sequence I = I()} MN 1 =0. Then, a bnary sequence I b = I b (l)} 8MN 1 l=0 s constructed, where 7 j=0 I b(8 + j) j = I() for = 0 MN 1. Wth a pre-defned nteger parameter n, an n-bt number sequence J = J(k)} 8MN/n 1 s generated, where J(k) = n 1 j=0 I b(n k + j) j. In case (8MN) s not a multple of n, the sequence I b s padded wth some zero bts. Wthout loss of generalty, t s assumed that n can dvde (8MN) n ths paper. MCKBA operates on the ntermedate sequence J and obtans J = J (k)} 8MN/n 1, where J (k) = n 1 j=0 I b (n k + j) j. Fnally, cpher-mage I = I (k)} MN 1 s obtaned va I (k) = 7 j=0 I b (8 k + j) j. Based on the above prelmnary ntroducton, MCKBA s descrbed wth the followng four parts 1. 1 Snce the sole dfference between MCKBA and HCKBA s the generator of PRBS, only MCKBA s ntroduced here wth a concse and consstent form to llustrate the encrypton procedure.

3 Breakng a chaotc mage encrypton algorthm based on modulo addton and XOR operaton 3 The secret key: Two random numbers key 1, key 0,, n 1}, and the ntal condton x(0) (0, 1) of the logstc map x(k + 1) = 3.9 x(k) (1 x(k)), () where n 1 j=0 (key 1,j key,j ) = n/, key 1 = n 1 j=0 key 1,j j, key = n 1 j=0 key,j j, and denotes the exclusve OR (XOR) operaton. Intalzaton: Run Eq. () teratvely to generate a sequence x(k)} MN/(n) 1 and derve a pseudorandom bnary sequence (PRBS), b(l)} 16MN/n 1 l=0, from the 3-bt bnary representaton of elements of the sequence, namely x(k) = 3 j=1 b(3 k + j 1) j. Encrypton: For k = 0 8MN/n 1, encrypt the k-th plan-element of J va (J(k) key 1 ) key 1 f B(k) = 3; J (J(k) key 1 ) key 1 f B(k) = ; (k) = (3) (J(k) key ) key f B(k) = 1; (J(k) key ) key f B(k) = 0, where B(k) = b(k) + b(k + 1), and a b = a b = a b. Decrypton: The decrypton procedure s smlar to that of the encrypton except that Eq. (3) s replaced by (J (k) key 1 ) key 1 f B(k) = 3; (J (k) key 1 ) key 1 f B(k) = ; J(k) = (J (4) (k) key ) key f B(k) = 1; (J (k) key ) key f B(k) = 0, where a b = (a b + n ) mod n. 3. Cryptanalyss Assume that two plan-mages and the correspondng cpher-mages encrypted wth the same secret key are avalable, and let J 1 = J 1 (k)} 8MN/n 1 and J = J (k)} 8MN/n 1 denote the correspondng ntermedate sequences, respectvely. Then, one can assure that the two sequences and the correspondng encrypted results J 1 = J 1 (k)}8mn/n 1 and J = J (k)}8mn/n 1 satsfy J 1(k) J (k) (J 1 (k) key 1 ) (J (k) key 1 ) f B(k), 3}; = (5) (J 1 (k) key ) (J (k) key ) f B(k) 0, 1}. No matter what the value of B(k) s, the above equaton can be represented n the form of Eq. (1). In ths secton, we frst present some propertes of the kernel functon (1) on obtanng ts soluton and then llustrate how to obtan an equvalent secret key of MCKBA/HCKBA wth two known plan-mages and two chosen plan-mages, respectvely Some propertes of the kernel functon Property 1. Equvalent form of Eq. (1) ỹ = y α β = (α x) (β x) α β (6) can be represented as an teraton form ỹ +1 = c +1 c +1, c +1 = (x α ) (x c ) (α c ), c +1 = (x β ) (x c ) (β c ), where c 0 0, c 0 0, x = n 1 =0 x, α = n 1 =0 α, β = n 1 =0 β, ỹ = n 1 =0 ỹ (These notatons are the same herenafter.). (7)

4 4 C. L et al. Proof. Set c 0 = 0, one can calculate c +1 from c and α va c +1 = (x α ) (x c ) (α c ) (8) for = 0 n. So, c +1 denote the carry bt generated by x and α n the -th bt plane. Set c 0 = 0, one can then obtan c +1 = (x β ) (x c ) (β c ) for = 0 n. Smlarly, c +1 denote the carry bt generated by x and β n the -th bt plane. Obvously, ỹ 0 = (α 0 x 0 ) (β 0 x 0 ) α 0 β 0 0. Then, the ( + 1)-th bt plane of Eq. (6) can be represented as ỹ +1 = (α +1 c +1 x +1 ) (β +1 c +1 x +1 ) α +1 β +1 = c +1 c +1, where = 0 n. So, ỹ can be easly calculated teratvely accordng to Eq. (7) for = 0 n, whch can also be done va checkng Table 1 lstng the values of ỹ +1 under all possble dfferent values of α, β, ỹ, x, and c. Table 1. The values of ỹ +1 correspondng to the values of α, β, ỹ, x, and c. (x, c ) (α, β, ỹ ) (0, 0, 0) (0, 0, 1) (0, 1, 0) (0, 1, 1) (1, 0, 0) (1, 0, 1) (1, 1, 0) (1, 1, 1) (0, 0) (0, 1) (1, 0) (1, 1) Property. Gven (α, β, ỹ, ỹ +1 ), no nformaton about x, c and c can be obtaned (Note that c 0 and c 0 are excluded snce they are pre-defned constants.) f and only f (4α + β + ỹ ) 0, 6}. Proof. Snce only the data n the 0, 6-th column (zero-based) of Table 1 are dentcal, t s mpossble to obtan any nformaton about x, c and c from (α, β, ỹ, ỹ +1 ) f and only f (4α + β + ỹ ) 0, 6}. Property 3. Gven (α, β, ỹ, ỹ +1 ), the unknown bt x can be determned va x = α ỹ +1, f and only f (4α + β + ỹ ) 1, 7}. Proof. Only under the cases shown n the 1, 7-th column of Table 1, x can be determned by (α, β, ỹ, ỹ +1 ) wthout knowledge of c. It s easy to verfy that x = α ỹ +1 n terms of value. Property 4. Gven (α, β, ỹ, ỹ +1 ), carry bts c and c can be determned va c = β ỹ +1 and c = β ỹ +1 ỹ f and only f (4α + β + ỹ ) 3, 5}. Proof. Only under the cases shown n the 3, 5-th column of Table 1, c can be determned by (α, β, ỹ, ỹ +1 ) wthout knowledge of x. It s easy to verfy that c = β ỹ +1 n terms of value. Then, one can obtan c = β ỹ +1 ỹ snce c = c ỹ. Property 5. Gven (α, β, ỹ, ỹ +1 ), the scope of the unknown bts x, c can be narrowed va (0, 0), (1, 1)} f ỹ +1 = 0; (x, c ) (0, 1), (1, 0)} f ỹ +1 = 1, (9) f and only f (4α + β + ỹ ), 4}.

5 Breakng a chaotc mage encrypton algorthm based on modulo addton and XOR operaton 5 Proof. Referrng to the cases shown n the, 4-th column of Table 1, the scope of (x, c ) can be narrowed accordng to value of ỹ +1. It s easy to obtan Eq. (9) from Table 1. Therefore, the f part of the property s proven. Note that the number of possble values of (4α + β + ỹ ) s only eght, and the suffcent and necessary condtons on obtanng dfferent nformaton on x and c under other sx cases have been presented. Therefore, the only f part of the property s also proven. Property 6. If (α 1 β 1 ) = 1 and ỹ = 1, one has c = α 1, where 1,,, n }. Proof. When (α 1, β 1 ) = (1, 0) and ỹ = 1, one can get c = 1 from Eq. (7) no matter the value of x 1. Smlarly, one has c = 0 when (α 1, β 1 ) = (0, 1) and ỹ = 1. So, the property s proven. Property 7. Gven α, β, ỹ, some bts among the (n 1) least sgnfcant bts of x n Eq. (6) can be determned from the least sgnfcant bt to the most sgnfcant one. Proof. The concrete approaches to solvng Eq. (1) and determnng the carry bts can be dvded nto the followng two classes of operatons. Obtanng nformaton on x 0 and c 1 : Accordng to how much nformaton on x 0 and c 1 can be obtaned, (α 0, β 0, ỹ 0 ) s further classfed as the followng two cases. (a) (4α 0 + β 0 + ỹ 0 ) 0, 6}: Referrng to Property, x 0 can not be determned n ths case, but one can obtan c 1 = 0 f α 0 = 0. (b) (4α 0 + β 0 + ỹ 0 ), 4}: As c 0 = 0, one can obtan 0 f ỹ 1 = 0; x 0 = (10) 1 f ỹ 1 = 1, from Eq. (9). Then, one can further obtan 0 f ỹ 1 = 0; c 1 = 1 f α 0 = 1 and ỹ 1 = 1; 0 f α 0 = 0 and ỹ 1 = 1. Obtanng nformaton on x, c and c +1 for = 1 n : Accordng to how much nformaton on x, c and c +1 can be obtaned by checkng (α, β, ỹ ) and the obtaned nformaton on c for = 1 n n order, (α, β, ỹ ) s categorzed as the followng four cases. (a) (4α + β + ỹ ) 0, 6}: Referrng to Property, no nformaton on x can be determned n ths case. The value of c +1 can be determned by Eq. (8) f (b) (4α + β + ỹ ) 1, 7}: One has c + α } 0, } s known. (11) x = α ỹ +1 (1) from Property 3. If c has been determned, one can obtan c +1. Even c s stll unknown, one can confrm c +1 by Eq. (8) f (α + x ) = 0 or (α + x ) = s known. (c) (4α + β + ỹ ), 4}: If c has been determned, based on Property 5 one can obtan 1 ỹ +1 f c = 1; x = (13) ỹ +1 f c = 0, and further confrm the value of c +1. (d) (4α + β + ỹ ) 3, 5}: Referrng to Property 4, one can obtan c = β ỹ +1. As confrmaton of c s equvalent to that of c, the latter s not mentoned.

6 6 C. L et al. 3.. Known-plantext attack Known-plantext attack s one of the classc attack models where the attacker (or cryptanalyst) can access both some plantexts and the correspondng encrypton results encrypted wth the same secret key. In [Gangadhar & Rao, 010, Sec. 3.], the orgnal authors clamed that HCKBA has strong vulnerablty aganst known-plantext attack. However, we found MCKBA/HCKBA s very weak aganst the attack, whch s supported by the propertes of Eq. (1) shown n the prevous subsecton. Under the scenaro of known-plantext attack, breakng MCKBA/HCKBA s to determne some nformaton of ts equvalent secret key, key1, key and B(k)} 8MN/n 1, by solvng Eq. (5) and utlzng some propertes of MCKBA/HCKBA. From Property 7, one can see that some bts of key1 and key can be obtaned from Eq. (5) for any k 0,, 8MN/n 1}, where the other unknown bts are just set as zero. Let key(k) denote the obtaned soluton of Eq. (5) and s(k, ) represent key(k) s confrmed defntely or not,.e. set s(k, ) = 1 f key(k) s confrmed by Eq. (10), Eq. (1), or Eq. (13); otherwse set s(k, ) = 0, where key(k) = n 1 =0 key(k), and k = 0 8MN/n 1. Then, one may reconstruct set key1, key} from key(k)} 8MN/n 1 and s(k, )} 8MN/n 1,n,=0 by dentfyng and combnng the known bts belongng to the same number, whch s descrbed by the followng steps. Step 1): Set K = key(0), key(1),, key(8mn/n 1)}. Delete some elements of K to assure that every par of elements of K has at least one dfferent confrmed bt. Step ): Search for the frst two elements n K whose number of confrmed bts are most but the confrmed bts of the two elements are not all the same. Let Seed(0) and Seed(1) denote the two seed elements and delete them from K. Step 3): Check each element of K n turn and do the followng two operatons f t has one confrmed bt whch s dfferent from that of Seed(): 1) update Seed(1 ) by combnng all the confrmed bts of the element nto that of Seed(1 ); ) delete the element from K, where 0, 1}. Step 4): Repeat Step 3) teratvely tll the numbers of confrmed bts of Seed(0) and Seed(1) are not ncreased n the whole step. Step 5): Termnate the whole search operaton when all bts of Seed(0) and Seed(1) are confrmed bts; otherwse repeat Step ) through Step 4) tll the cardnalty of K s less than. Let us study the probablty on obtanng x and c wth one par of α, β and ỹ under assumpton that α, β and x dstrbutes over 0,, n 1} unformly. Frst, one has P rob(c 0 = 1) = 0 and P rob(c = 1) = 3 4 P rob(c 1 = 1) P rob(c 1 = 0) for = 1 n 1. Solve the above teraton functon, one can obtan P rob(c = 1) = Obvously, one has P rob(ỹ 0 = 0) = 1. Observe Table 1, one can see that the value of ỹ s determned by the values of ỹ 1, c 1, x 1, α 1 and β 1 for = 1 n 1. Consderng all possble cases, one has ( ( 1 P rob(ỹ = 0)=P rob(ỹ 1 = 0) P rob(c 1 = 0) ) ( ( 1 +P rob(ỹ 1 = 1) P rob(c 1 = 0) = 3 4 P rob(ỹ 1 = 0) + 1 P rob(ỹ 1 = 1) for = 1 n 1. Solve the teraton functon, one can obtan ( 1 + P rob(c 1 = 1) ) + P rob(c 1 = 1) + 1 )) 1 1 ( )) P rob(ỹ = 0) = (14) From the proof of Property 7, one can frst calculate P rob[c 0 ] = 1, P rob[c 1 ] = P rob((4α 0 + β 0 + ỹ 0 )

7 Breakng a chaotc mage encrypton algorthm based on modulo addton and XOR operaton 7 0, 6}) 1 + P rob((4α 0 + β 0 + ỹ 0 ), 4}) 1 = = 3 4 and P rob[c ]=P rob((4α + β ) 0, 6})P rob(ỹ 1 = 0)P rob[c 1 ]P rob(condton (11) holds) +P rob((4α + β ) 0, 6})P rob(ỹ 1 = 1) (P rob[c 1 ] + (1 P rob[c 1 ])P rob((α + x ) 0, })) +P rob((4α + β ), 4})P rob(ỹ 1 = 0)P rob[c 1 ] + P rob((4α + β ), 4})P rob(ỹ 1 = 1) = 1 P rob(ỹ 1 = 0)P rob[c 1 ] ( P rob(ỹ 1 = 1) P rob[c 1 ] + (1 P rob[c 1 ]) 1 ) + 1 P rob(ỹ 1 = 0)P rob[c 1 ] + 1 P rob(ỹ 1 = 1) ( 1 =P rob[c 1 ] P rob(ỹ 1 = 0) ( 7 =P rob[c 1 ] ) P rob(ỹ 1 = 1) ) (15) for = n 1, where P rob[a] denotes the probablty that the bt a can be confrmed. Fnally, one has P rob[x 0 ] = 1 and P rob[x ]= 1 P rob(ỹ = 1) + 1 P rob(ỹ = 0)P rob[c ] (16) for = 1 n. Incorporate Eq. (14) and Eq. (15) nto Eq. (16), one can obtan that P rob[x 0 ] = 1, P rob[x 1 ] = 0.406, P rob[x ] = , and P rob[x ] 0.37 for 3. Now, one can assure that key1 and key can not be confrmed defntely wth a probablty smaller than or equal to (1 0.37) n 0 = 0.63 n 0 and 0.63 (8MN/n n 0) respectvely, where n 0 s cardnalty of the set k B(k), 3}, k = 0 8MN/n 1}. Note that confrmaton of the bts of x n Eq. (1) s determned by α, β, and the used unknown varable x, and no any bt can be confrmed under some cases (See the examples shown n Table ). In addton, as for plantext chose from natural mages, α follows Gaussan dstrbuton. But, we can stll beleve that the set key1, key} can be reconstructed n a hgh probablty snce the values of n 0 and 8MN/n n 0 are both very large n general. Table. The number of confrmed bts of x n Eq. (1) under some sets of (α, β, ỹ) when n = 8, where ỹ s determned by (α, β, x) va Eq. (1). x (α, β) (0, 1) (17, 54) (31, 10) (44, 93) (51, 95) (73, 79) (87, 1) (15, 16) Referrng to Proposton 1 and Eq. (3), one can obtan the scope of B(k), 1, 3} f (J 1 B(k) = (k) J 1(k)) mod = 0; 0, } otherwse, for k = 0 8MN/n 1. Proposton 1. Assume that a and x are both n-bt ntegers and n Z +, ((a x) x) has the same party as a and ((a x) x) has opposte party as a. (17)

8 8 C. L et al. Proof. Exstence of four equatons ((1 + x 0 ) mod ) x 0 1, ((0 + x 0 ) mod ) x 0 0, ((1 + x 0 ) mod ) x 0 0, ((0 + x 0 ) mod ) x 0 1, s ndependent of x 0, so the proposton s proved. Proposton. Assume that a and x are both n-bt ntegers, n Z +, one has the followng two equatons (a x) x = (a x n 1 ) (x n 1 ), (a x) x = (a x n 1 ) (x n 1 ). Proof. See the proof of Proposton 1 n [L et al., 011]. Accordng to the pre-defned condton key1 key, there are only two possble combnatons of key1 and key. Let (key1, key ) denote the searched verson of (key1, key). Proposton llustrates that the unknown most sgnfcant bt of key1 = n 1 j=0 key1 j j and key = n 1 j=0 key1 j j has no nfluence on decrypton of MCKBA/HCKBA. Then, one can further obtan the approxmate value of B(k), B (k), and the n 1 least sgnfcant bts of key1 and key by the followng two dfferent ways: W1) For k = 0 8MN/n 1, one has 3 f F (key1, J 1(k), J 1 (k)) = 0, F (key, J 1(k), J 1 (k)) 0 or F (key1, J (k), J (k)) = 0, F (key, J (k), J (k)) 0; f G(key1, J 1(k), J 1 (k)) = 0, G(key, J 1(k), J 1 (k)) 0 B or G(key1 (k) =, J (k), J (k)) = 0, G(key, J (k), J (k)) 0; 1 f F (key1, J 1(k), J 1 (k)) 0, F (key, J 1(k), J 1 (k)) = 0 or F (key1, J (k), J (k)) 0, F (key, J (k), J (k)) = 0; 0 f G(key1, J 1(k), J 1 (k)), G(key, J 1(k), J 1 (k)) = 0 or G(key1, J (k), J (k)) 0, G(key, J (k), J (k)) = 0, where F (x, α, y) = y ((α x) x), G(x, α, y) = y ((α x) x). Note that Eq. (17) makes only two condtons n Eq. (18) need beng verfed. Obvously, one can assure that n j=0 key 1,j j = n j=0 key 1,j j, n j=0 key,j j = n j=0 key,j j. W) When there exsts 0,, n } satsfyng that s(k, ) = 1, one can obtan B (k) = (18), 3} 0, 1} f key(k) key ; f key(k) key1, (19) for k = 0 8MN/n 1. Then, the value of B(k) can be obtaned by settng B (k) = B (k) B(k) for k = 0 8MN/n 1. Fnally, one can conclude that (key1, key ) = ( n =0 key1, n =0 key ), and B (k)} 8MN/n 1 can work together as equvalent secret key of MCKBA/HCKBA due to that (key1, key, B(k)) = (a, b, c) and (key1, key, B(k)) = (b, a, (c + ) mod 4) are equvalent for Eq. (4). Now, let s study the success probablty of the above two methods. The success of the method W1) depends on exstence of one of the eght condton n Eq. (18). As F (x, α, y) = 0 f and only f G(x, α, y ( n 1)) = 0, only one of the two functons need beng studed. Obvously, F (x, 0, y) y, F (x, n 1, y) y n 1 (0).

9 Breakng a chaotc mage encrypton algorthm based on modulo addton and XOR operaton 9 So, B(k) can not be confrmed by Eq. (18) when J 1 (k) 0, n 1 } and J (k) 0, n 1 } exst at the same tme. It s very hard to derve the probablty for other cases theoretcally. Instead, we calculate the probablty that F (x 1, α, y) = F (x, α, y) = 0 va smulaton, where n 1 (x 1,j x,j ) = n/, (1) j=0 x 1 = n 1 j=0 x 1,j j, x = n 1 j=0 x,j j. Assume key1, key dstrbutes unformly, the dstrbuton of probablty F (key1, α, y) = F (key, α, y) = 0 under dfferent values of α and some values of n s shown n Fg n = α n = α n = α Fg. 1. (1). The probablty F (x 1, α, y) = F (x, α, y) = 0 under dfferent value of α, where x 1, x satsfy the constrant condton The success of the method W) can be analyzed as follows. Assume key1, key dstrbutes unformly, one can get the probablty that at least one bt (exclude the most sgnfcant bt) of key(k) satsfy s(k, ) = 1 and one condton of Eq. (19) s n 1 ( ) ( ) n 1 P rob[eq. (19) holds]=1 (P rob[x ]) (1 P rob[x ]) n 1 1 =0 n 1 ( ) ( n =0 ( ) 1 n 1 n 1 ( n 1 =1 =0 ( ) 3 n 1 =1. 4 ) ( 1 1 ) ( 1 ) ) n 1 ( ) 1 From the above analyss, one can see that B(k), k = 0 8MN/n 1, can be determned wth a probablty larger than 1 ( 3 n 1 4) when α, β and x n Eq. (1) dstrbutes unformly. Although pxels of natural mages follow Gaussan dstrbuton, and J 1 (k) and J (k) n Eq. (5) do not dstrbute unformly, we stll can beleve that the success probablty of ths method s very hgh snce only one bt satsfyng the condtons n Eq. (19) s needed, especally when n s relatvely large. To verfy the real performance of the above analyss, a number of experments are carred out on some plan-mages of sze wth the method W1) when n = 3. When x 0 = / 3, key 1 = , and key = Two known plan-mages Peppers and Baboon, and the correspondng cpher-mages are adopted. Equvalent key key1, key and B (k)} 8MN/n 1 s used to decrypt another cpher-mage shown n Fg. a) and the recovered result s shown n Fg. b), whch s

10 10 C. L et al. dentcal wth the orgnal verson. From the experment, we found that only a lttle pxels (no more than ten pxels for plan-mage of sze 51 51) are not recovered correctly when n 8. Ths agree wth our expectaton as the probablty that none of condton of Eq. (18) and condton (0) are satsfed become larger when n s smaller. a) b) Fg.. The decrypton result of another cpher-mage encrypted wth the same secret key: a) cpher-mage; b) decrypted plan-mage Chosen-plantext attack Chosen-plantext attack s an enhanced verson of known-plantext attack, where the plantext can be chosen arbtrarly to obtan the nformaton about the secret key n a more effcent way. In ths subsecton, the chosen-plantext attack on MCKBA/HCKBA s brefly ntroduced due to the followng two ponts: 1) the known-plantext attack on MCKBA/HCKBA works well n a relatvely hgh probablty and the chosen-plantext verson can mprove ts performance a lttle; ) the underlyng theorem supportng the attack proposed n [L et al., 011, Theorem 1] s not rght and corrected n Proposton 3. Proposton 3. Assume that α, β, x are all n-bt ntegers, then a lower bound on the number of queres (α, β) to solve Eq. (1) n terms of modulo n 1 for any x s 1 f n = ; f n >. Proof. When n =, one can obtan x 0 = ỹ 1 by choosng (α 0, β 0 ) = (1, 0). When n >, ỹ 1 may be equal to zero or one no matter what (α 0, β 0 ) s, whch means that t s mpossble to satsfy the condton of Property 3 for any x. So, we have to resort to another query (α, β ). Let α, β, y, ỹ and c denote the counterparts of α, β, y, ỹ, and c correspondng to (α, β ). Gven a set of (α +k, β +k ) and (α +k, β +k ), one can obtan (c +k+1, ỹ +k+1 ) and (c +k+1, ỹ +k+1 ) from (c +k, ỹ +k ) and (c +k, ỹ +k ), respectvely, where, k are non-negatve ntegers. Let arrows of plan head and V-back head denote x +k = 0 and x +k = 1, respectvely, Fg. 3 llustrates the mappng relatonshp between (c +k, ỹ +k, c +k, ỹ +k ) and (c +k+1, ỹ +k+1, c +k+1, ỹ +k+1 ) for a gven (α +k, β +k, α +k, β +k ), where k = 0, 1. Snce (c 0, ỹ 0, c 0, ỹ 0 ) (0, 0, 0, 0), the dashed arrows n Fg. 3 descrbe operatons of Eq. (6) n the two least sgnfcant bt planes correspondng to two sets of (α, β). Note that the data n the thrd column s exactly the same as the frst one. Therefore, Fg. 3 demonstrates operatons of Eq. (6) under all dfferent bt levels f the varable goes through t, where t = 0 n/ and + k n 1. Referrng to Fg. 3, t can be easly verfed that 1 y, y } s always satsfed, whch means that x can be derved from Table 1. Under scenaro of chosen-plantext attack, one may make the plantext satsfy that at least one par of elements n (J 1 (k), J (k)) B(k) 0, 1}} whose -th bt plane satsfy the condton of Property 3.

11 Breakng a chaotc mage encrypton algorthm based on modulo addton and XOR operaton 11 αβ 01 α α β = + 1β + 1 = 10 α 1β c y% c y% x = 0 x = 1 c c y % y% x + = x + = c c 01 y % + + y% a) Fg. 3. Relatonshp between (c +k, ỹ +k, c +k, ỹ +k ) and (c +k+1, ỹ +k+1, c +k+1, ỹ +k+1 ) for a gven (α +k, β +k, α +k, β +k ), where k = 0, 1. The same case exsts for (J 1 (k), J (k)) B(k), 3}}. The expected chosen-plantext can be obtaned n a hgh probablty by assgnng (J 1 (k), J (k)) wth one of the two sets of number gven n Corollary 3.1 randomly. Compared wth the known-plantext attack, the chosen-plantext attack has the followng two superor performances: 1) the set key1, key} can be reconstructed wth much less complexty and much hgher degree of accuracy; ) the bts of key(k) can be confrmed wth a lttle hgher probablty. Corollary 3.1. The (n 1) least sgnfcant bts of x n Eq. (1) can be determned easly by settng (α, β) wth the followng two sets of numbers ( n/ 1 ) ( n/ 1 ) } () 4 j mod n, (10) 4 j mod n, j=0 j=0 ( n/ 1 ) ( n/ 1 ) } (10) 4 j mod n, (01) 4 j mod n, j=0 and checkng the correspondng ỹ = y α β. Proof. The proof s straghtforward and therefore omtted. j=0 4. Concluson In ths paper, the securty of the mage encrypton algorthm MCKBA/HCKBA has been restuded n detal. Based on some propertes of a composte functon composed of the modulo addton and the XOR operaton, a known-plantext attack and an mproved chosen-plantext attack were provded to determne an equvalent secret key of MCKBA/HCKBA. The cryptanalyss provded n ths paper sheds some lght on breakng other encrypton schemes based on multple combnaton of the modulo addton and XOR operatons. Acknowledgement Ths research was supported by the Natonal Natural Scence Foundaton of Chna (No ), Scentfc Research Fund of Hunan Provncal Educaton Department (No. 11B14), and Research Fund of Xangtan Unversty (No. 011XZX16).

12 1 REFERENCES References Álvarez, G. & L, S. [6] Some basc cryptographc requrements for chaos-based cryptosystems, Internatonal Journal of Bfurcaton and Chaos 16, Chen, F., Wong, K.-W., Lao, X. & Xang, T. [01] Perod dstrbuton of generalzed dscrete arnold cat map for N=pe, IEEE Transactons on Informaton Theory 58, Chen, G., Mao, Y. & Chu, C. K. [4] A symmetrc mage encrypton scheme based on 3D chaotc cat maps, Chaos, Soltons & Fractals 1, Chen, J., Zhou, J. & Wong, K.-W. [011] A modfed chaos-based jont compresson and encrypton scheme, IEEE Transactons on Crcuts and Systems II 58, Gangadhar, C. & Rao, K. D. [010] Hyperchaos based mage encrypton, Internatonal Journal of Bfurcaton and Chaos 19, L, C., Chen, M. Z. Q. & Lo, K.-T. [011] Breakng an mage encrypton algorthm based on chaos, Internatonal Journal of Bfurcaton and Chaos 1, L, C., L, S., Asm, M., Nunez, J., Alvarez, G. & Chen, G. [9] On the securty defects of an mage encrypton scheme, Image and Vson Computng 7, L, C., L, S. & Lou, D.-C. [6] On the securty of the Yen-Guo s domno sgnal encrypton algorthm (DSEA), Journal of Systems and Software 79, L, C., L, S., Zhang, D. & Chen, G. [5] Chosen-plantext cryptanalyss of a clpped-neural-networkbased chaotc cpher, Lecture Notes n Computer Scence 3497, L, S., Chen, G. & Mou, X. [4] On the securty of the Y-Tan-Sew chaotc cpher, IEEE Transactons on Crcuts and Systems II: Express Brefs 51, L, S., L, C., Chen, G. & Lo, K.-T. [8] Cryptanalyss of the RCES/RSES mage encrypton scheme, Journal of Systems and Software 81, L, S. & Zheng, X. [] Cryptanalyss of a chaotc mage encrypton method, Proceedngs of IEEE Internatonal Symposum on Crcuts and Systems, pp Paul, S. & Preneel, B. [5] Near optmal algorthms for solvng dfferental equatons of addton wth batch queres, Lecture Notes n Computer Scence 3797, Rao, K. & Gangadhar, C. [7] Modfed chaotc key-based algorthm for mage encrypton and ts VLSI realzaton, Proceedngs of the 7 15th Internatonal Conference on Dgtal Sgnal Processng, pp Socek, D., L, S., Maglveras, S. S. & Furht, B. [5] Enhanced 1-D chaotc key-based algorthm for mage encrypton, Proceedngs of the Frst IEEE/CreateNet Internatonal Conference on Securty and Prvacy for Emergng Areas n Communcaton Networks (SecureComm 5), pp Solak, E., Cokal, C., Yldz, O. T. & Bykoglu, T. [010a] Cryptanalyss of Frdrch s chaotc mage encrypton, Internatonal Journal of Bfurcaton and Chaos 0, Solak, E., Rhouma, R. & Belghth, S. [010b] Cryptanalyss of a mult-chaotc systems based mage cryptosystem, Optcs Communcatons 83, Takahash, Y., Nakano, H. & Sato, T. [4] A smple hyperchaos generator based on mpulsve swtchng, IEEE Transactons on Crcuts and Systems II-Express Brefs 51, Wang, X., La, X., Feng, D., Chen, H. & Yu, X. [5] Cryptanalyss of the hash functons MD4 and RIPEMD, Lecture Notes n Computer Scence 3494, Xao, D., Lao, X. & Wong, K.-W. [6] Improvng the securty of a dynamc look-up table based chaotc cryptosystem, IEEE Transactons on Crcuts and Systems II: Express Brefs 53, Yen, J.-C. & Guo, J.-I. [0] A new chaotc key-based desgn for mage encrypton and decrypton, Proceedngs of IEEE Internatonal Symposum on Crcuts and Systems, pp Zhou, J. & Au, O. C. [011] On the securty of chaotc convolutonal coder, IEEE Transactons on Crcuts and Systems I-Regular Papers 58,

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

Hiding data in images by simple LSB substitution

Hiding data in images by simple LSB substitution Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Department of Mathematics, Shantou University, Shantou, Guangdong, , China.

Department of Mathematics, Shantou University, Shantou, Guangdong, , China. 205 Internatonal Conference on Computer Scence and Communcaton Engneerng (CSCE 205) ISN: 978--60595-249-9 A Novel Color Image Encrypton Scheme ased on Permutaton-substtuton Archtecture Ru-Song Ye,a, Mng

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1]

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1] DYNAMIC SHORTEST PATH SEARCH AND SYNCHRONIZED TASK SWITCHING Jay Wagenpfel, Adran Trachte 2 Outlne Shortest Communcaton Path Searchng Bellmann Ford algorthm Algorthm for dynamc case Modfcatons to our algorthm

More information

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Differential Cryptanalysis of Nimbus

Differential Cryptanalysis of Nimbus Dfferental Cryptanalyss of Nmbus Vladmr Furman Computer Scence Department, Technon - Israel Insttute of Technology, Hafa 32000, Israel. vfurman@cs.technon.ac.l. Abstract. Nmbus s a block cpher submtted

More information

Image Encryption Using Chaotic Signal and Max Heap Tree

Image Encryption Using Chaotic Signal and Max Heap Tree Image Encrypton Usng Chaotc Sgnal and Max Heap Tree Farborz Mahmoud 1, Rasul Enayatfar 2, and Mohsen Mrzashaer 1 1 Electrcal and Computer Engneerng Department, Islamc Azad Unversty, Qazvn Branch, Iran

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

General theory of fuzzy connectedness segmentations: reconciliation of two tracks of FC theory

General theory of fuzzy connectedness segmentations: reconciliation of two tracks of FC theory General theory of fuzzy connectedness segmentatons: reconclaton of two tracks of FC theory Krzysztof Chrs Ceselsk Department of Mathematcs, West Vrgna Unversty and MIPG, Department of Radology, Unversty

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

Recover plaintext attack to block ciphers

Recover plaintext attack to block ciphers Recover plantext attac to bloc cphers L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Abstract In ths paper, we wll present an estmaton for the upper-bound of the amount of 16-bytes plantexts for Englsh

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

High resolution entropy stable scheme for shallow water equations

High resolution entropy stable scheme for shallow water equations Internatonal Symposum on Computers & Informatcs (ISCI 05) Hgh resoluton entropy stable scheme for shallow water equatons Xaohan Cheng,a, Yufeng Ne,b, Department of Appled Mathematcs, Northwestern Polytechncal

More information

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator Latest Trends on Crcuts, Systems and Sgnals Scroll Generaton wth Inductorless Chua s Crcut and Wen Brdge Oscllator Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * Abstract An nductorless Chua

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits Watcharn Jantanate, Peter A. Chayasena, Sarawut Sutorn Odd/Even Scroll Generaton wth Inductorless Chua s and Wen Brdge Oscllator Crcuts Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * School

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

Improved Integral Cryptanalysis of FOX Block Cipher 1

Improved Integral Cryptanalysis of FOX Block Cipher 1 Improved Integral Cryptanalyss of FOX Block Cpher 1 Wu Wenlng, Zhang Wentao, and Feng Dengguo State Key Laboratory of Informaton Securty, Insttute of Software, Chnese Academy of Scences, Bejng 100080,

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems

An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems I. J. Computer Network and Informaton Securty 5 5 5-33 Publshed Onlne Aprl 5 n MECS (http://www.mecs-press.org/) DOI:.585/jcns.5.5.4 An Image Encrypton Scheme Based on Hybrd Orbt of Hyper-chaotc Systems

More information

Message modification, neutral bits and boomerangs

Message modification, neutral bits and boomerangs Message modfcaton, neutral bts and boomerangs From whch round should we start countng n SHA? Antone Joux DGA and Unversty of Versalles St-Quentn-en-Yvelnes France Jont work wth Thomas Peyrn 1 Dfferental

More information

Provable Security Signatures

Provable Security Signatures Provable Securty Sgnatures UCL - Louvan-la-Neuve Wednesday, July 10th, 2002 LIENS-CNRS Ecole normale supéreure Summary Introducton Sgnature FD PSS Forkng Lemma Generc Model Concluson Provable Securty -

More information

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:

More information

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction Attacks on RSA The Rabn Cryptosystem Semantc Securty of RSA Cryptology, Tuesday, February 27th, 2007 Nls Andersen Square Roots modulo n Complexty Theoretc Reducton Factorng Algorthms Pollard s p 1 Pollard

More information

Microwave Diversity Imaging Compression Using Bioinspired

Microwave Diversity Imaging Compression Using Bioinspired Mcrowave Dversty Imagng Compresson Usng Bonspred Neural Networks Youwe Yuan 1, Yong L 1, Wele Xu 1, Janghong Yu * 1 School of Computer Scence and Technology, Hangzhou Danz Unversty, Hangzhou, Zhejang,

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

An Interactive Optimisation Tool for Allocation Problems

An Interactive Optimisation Tool for Allocation Problems An Interactve Optmsaton ool for Allocaton Problems Fredr Bonäs, Joam Westerlund and apo Westerlund Process Desgn Laboratory, Faculty of echnology, Åbo Aadem Unversty, uru 20500, Fnland hs paper presents

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

DETERMINATION OF TEMPERATURE DISTRIBUTION FOR ANNULAR FINS WITH TEMPERATURE DEPENDENT THERMAL CONDUCTIVITY BY HPM

DETERMINATION OF TEMPERATURE DISTRIBUTION FOR ANNULAR FINS WITH TEMPERATURE DEPENDENT THERMAL CONDUCTIVITY BY HPM Ganj, Z. Z., et al.: Determnaton of Temperature Dstrbuton for S111 DETERMINATION OF TEMPERATURE DISTRIBUTION FOR ANNULAR FINS WITH TEMPERATURE DEPENDENT THERMAL CONDUCTIVITY BY HPM by Davood Domr GANJI

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Markov Chain Monte Carlo Lecture 6

Markov Chain Monte Carlo Lecture 6 where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways

More information

arxiv:cs.cv/ Jun 2000

arxiv:cs.cv/ Jun 2000 Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São

More information

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

A Particle Filter Algorithm based on Mixing of Prior probability density and UKF as Generate Importance Function

A Particle Filter Algorithm based on Mixing of Prior probability density and UKF as Generate Importance Function Advanced Scence and Technology Letters, pp.83-87 http://dx.do.org/10.14257/astl.2014.53.20 A Partcle Flter Algorthm based on Mxng of Pror probablty densty and UKF as Generate Importance Functon Lu Lu 1,1,

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

FUZZY GOAL PROGRAMMING VS ORDINARY FUZZY PROGRAMMING APPROACH FOR MULTI OBJECTIVE PROGRAMMING PROBLEM

FUZZY GOAL PROGRAMMING VS ORDINARY FUZZY PROGRAMMING APPROACH FOR MULTI OBJECTIVE PROGRAMMING PROBLEM Internatonal Conference on Ceramcs, Bkaner, Inda Internatonal Journal of Modern Physcs: Conference Seres Vol. 22 (2013) 757 761 World Scentfc Publshng Company DOI: 10.1142/S2010194513010982 FUZZY GOAL

More information

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA 4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected

More information

Research Article Green s Theorem for Sign Data

Research Article Green s Theorem for Sign Data Internatonal Scholarly Research Network ISRN Appled Mathematcs Volume 2012, Artcle ID 539359, 10 pages do:10.5402/2012/539359 Research Artcle Green s Theorem for Sgn Data Lous M. Houston The Unversty of

More information

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Introduction to Algorithms

Introduction to Algorithms Introducton to Algorthms 6.046J/8.40J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) Our focus: effcency of

More information

The Expectation-Maximization Algorithm

The Expectation-Maximization Algorithm The Expectaton-Maxmaton Algorthm Charles Elan elan@cs.ucsd.edu November 16, 2007 Ths chapter explans the EM algorthm at multple levels of generalty. Secton 1 gves the standard hgh-level verson of the algorthm.

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

Parametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010

Parametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010 Parametrc fractonal mputaton for mssng data analyss Jae Kwang Km Survey Workng Group Semnar March 29, 2010 1 Outlne Introducton Proposed method Fractonal mputaton Approxmaton Varance estmaton Multple mputaton

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

Time-Varying Systems and Computations Lecture 6

Time-Varying Systems and Computations Lecture 6 Tme-Varyng Systems and Computatons Lecture 6 Klaus Depold 14. Januar 2014 The Kalman Flter The Kalman estmaton flter attempts to estmate the actual state of an unknown dscrete dynamcal system, gven nosy

More information

(1 ) (1 ) 0 (1 ) (1 ) 0

(1 ) (1 ) 0 (1 ) (1 ) 0 Appendx A Appendx A contans proofs for resubmsson "Contractng Informaton Securty n the Presence of Double oral Hazard" Proof of Lemma 1: Assume that, to the contrary, BS efforts are achevable under a blateral

More information

Mathematical Preparations

Mathematical Preparations 1 Introducton Mathematcal Preparatons The theory of relatvty was developed to explan experments whch studed the propagaton of electromagnetc radaton n movng coordnate systems. Wthn expermental error the

More information

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree IOSR Journal of Mathematcs (IOSR-JM) e-iss: 78-578, p-iss: 19-765X. Volume 1, Issue 6 Ver. V (ov. - Dec.016), PP 5-57 www.osrjournals.org Amusng Propertes of Odd umbers Derved From Valuated Bnary Tree

More information

Inexact Newton Methods for Inverse Eigenvalue Problems

Inexact Newton Methods for Inverse Eigenvalue Problems Inexact Newton Methods for Inverse Egenvalue Problems Zheng-jan Ba Abstract In ths paper, we survey some of the latest development n usng nexact Newton-lke methods for solvng nverse egenvalue problems.

More information

On an Extension of Stochastic Approximation EM Algorithm for Incomplete Data Problems. Vahid Tadayon 1

On an Extension of Stochastic Approximation EM Algorithm for Incomplete Data Problems. Vahid Tadayon 1 On an Extenson of Stochastc Approxmaton EM Algorthm for Incomplete Data Problems Vahd Tadayon Abstract: The Stochastc Approxmaton EM (SAEM algorthm, a varant stochastc approxmaton of EM, s a versatle tool

More information

Report on Image warping

Report on Image warping Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

A New Evolutionary Computation Based Approach for Learning Bayesian Network

A New Evolutionary Computation Based Approach for Learning Bayesian Network Avalable onlne at www.scencedrect.com Proceda Engneerng 15 (2011) 4026 4030 Advanced n Control Engneerng and Informaton Scence A New Evolutonary Computaton Based Approach for Learnng Bayesan Network Yungang

More information

An efficient algorithm for multivariate Maclaurin Newton transformation

An efficient algorithm for multivariate Maclaurin Newton transformation Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,

More information

Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm

Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm www.ijcsi.org 110 Cryptanalyss of a Publc-key Cryptosystem Usng Lattce Bass Reducton Algorthm Roohallah Rastagh 1, Hamd R. Dall Oskoue 2 1,2 Department of Electrcal Engneerng, Aeronautcal Unversty of Snce

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

A Local Variational Problem of Second Order for a Class of Optimal Control Problems with Nonsmooth Objective Function

A Local Variational Problem of Second Order for a Class of Optimal Control Problems with Nonsmooth Objective Function A Local Varatonal Problem of Second Order for a Class of Optmal Control Problems wth Nonsmooth Objectve Functon Alexander P. Afanasev Insttute for Informaton Transmsson Problems, Russan Academy of Scences,

More information

Operating conditions of a mine fan under conditions of variable resistance

Operating conditions of a mine fan under conditions of variable resistance Paper No. 11 ISMS 216 Operatng condtons of a mne fan under condtons of varable resstance Zhang Ynghua a, Chen L a, b, Huang Zhan a, *, Gao Yukun a a State Key Laboratory of Hgh-Effcent Mnng and Safety

More information

Additional Codes using Finite Difference Method. 1 HJB Equation for Consumption-Saving Problem Without Uncertainty

Additional Codes using Finite Difference Method. 1 HJB Equation for Consumption-Saving Problem Without Uncertainty Addtonal Codes usng Fnte Dfference Method Benamn Moll 1 HJB Equaton for Consumpton-Savng Problem Wthout Uncertanty Before consderng the case wth stochastc ncome n http://www.prnceton.edu/~moll/ HACTproect/HACT_Numercal_Appendx.pdf,

More information

On a direct solver for linear least squares problems

On a direct solver for linear least squares problems ISSN 2066-6594 Ann. Acad. Rom. Sc. Ser. Math. Appl. Vol. 8, No. 2/2016 On a drect solver for lnear least squares problems Constantn Popa Abstract The Null Space (NS) algorthm s a drect solver for lnear

More information

Lai-Massey Scheme and Quasi-Feistel Networks (Extended Abstract)

Lai-Massey Scheme and Quasi-Feistel Networks (Extended Abstract) La-Massey Scheme and Quas-Festel Networks (Extended Abstract Aaram Yun, Je Hong Park 2, and Jooyoung Lee 2 Unversty of Mnnesota - Twn Ctes aaramyun@gmalcom 2 ETRI Network & Communcaton Securty Dvson, Korea

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

Cryptanalysis of Threshold Proxy Signature Schemes 1)

Cryptanalysis of Threshold Proxy Signature Schemes 1) MM Research Preprnts, 226 233 MMRC, AMSS, Academa Snca No. 23, December 24 Cryptanalyss of Threshold Proxy Sgnature Schemes 1) Zuo-Wen Tan and Zhuo-Jun Lu Key Laboratory of Mathematcs Mechanzaton Insttute

More information

Chapter 11: Simple Linear Regression and Correlation

Chapter 11: Simple Linear Regression and Correlation Chapter 11: Smple Lnear Regresson and Correlaton 11-1 Emprcal Models 11-2 Smple Lnear Regresson 11-3 Propertes of the Least Squares Estmators 11-4 Hypothess Test n Smple Lnear Regresson 11-4.1 Use of t-tests

More information

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.

More information

Lecture Space-Bounded Derandomization

Lecture Space-Bounded Derandomization Notes on Complexty Theory Last updated: October, 2008 Jonathan Katz Lecture Space-Bounded Derandomzaton 1 Space-Bounded Derandomzaton We now dscuss derandomzaton of space-bounded algorthms. Here non-trval

More information

The Quadratic Trigonometric Bézier Curve with Single Shape Parameter

The Quadratic Trigonometric Bézier Curve with Single Shape Parameter J. Basc. Appl. Sc. Res., (3541-546, 01 01, TextRoad Publcaton ISSN 090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com The Quadratc Trgonometrc Bézer Curve wth Sngle Shape Parameter Uzma

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Computing Correlated Equilibria in Multi-Player Games

Computing Correlated Equilibria in Multi-Player Games Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,

More information