Li An-Ping. Beijing , P.R.China

Size: px
Start display at page:

Download "Li An-Ping. Beijing , P.R.China"

Transcription

1 A NEW TYPE OF CIPHER: DICING_CSB Li An-Ping Beijing , P.R.China Absrac: In his paper, we will propose a new ype of cipher named DICING_CSB, which come from our previous a synchronous sream cipher DICING. I applies a sream of subkeys and a encrypion form of block ciphers, so, i can be viewed a combinaive of sream cipher and block cipher. Hence, he new ype of cipher has fas speed like a sream cipher and no need MAC.. Keywords: sream cipher, block cipher, LFSR, projecor, finie field.

2 1. Inroducion In a synchronous sream cipher, he cipherex is generally made by biwise adding (XOR) he plainex wih a binary sequence called keysream. Clearly, in his encrypion form he plainex is easy o be falsified by oher people. As a resul, a synchronous sream cipher usually is equiped a MAC ( message auhenicaion code ) o proec he message from o be ampered. In our algorihm DICING [1], one of candidaes of estream ( The ECRYPT STREAM Ciphers Projec ), he combining funcion had mainly applied keyed-sboxes, which are ofen used in he block ciphers, we realize ha i is possible o make a combinaive of sream cipher and block cipher (CSB mode), so will be able o omi MAC in his way. In he proposal cipher, he componen u of DICING will be applied as a role of a sream of subkeys, and he encrypion means are mainly keyed-sboxes, like one ordinary block cipher. The componens are almos same o he ones in DICING, for he compleeness, which are repeaed in his paper. In he proposal cipher, we will apply he LFSR-like componens called projecor (Pr.). A projecor consiss of an elemen σ called sae from some finie field GF( 2 m ) and an updaing rule. The rule of updaing saes is ha muliplying σ wih σ = x σ k x, k is an ineger, namely, k +1. (1.1) The finie fields used in here are GF ( 2 m ), m = 128, 127, or126. In oher word, he operaion shif in LFSR now is replaced by muliplying k x in he field ( 2 m ) GF. As same as DICING, he key sizes in DICING_CSB can be 128 bis or 256 bis, and he size of iniial value may be aken as large as 256 bis, and he size of oupu is 128 bis. In his paper he finie field GF (2) is simply denoed as F, and F[ x] is he polynomial ring of unknown x over he field F. The symbols, will represen he biwise addiion XOR, biwise and, ha is he operaion & in C, and symbols >>, <<, and ~ sand for he operaions righ-shif, lef-shif, concaenae and complemen respecively. Suppose ha ζ is a binary sring, denoed by ζ [i] bi and [ i, j] bi ζ he i-h bi and he segmen from i-h bi o j-h bi respecively, and here are he similar expressions ζ [ i ], ζ [ i, j] and bye bye ζ [ i ], ζ [ i, j] measured in byes and 32-bis words respecively, and if he meaning is word word explici from he conex, he low-index bi, bye and word will be omied.

3 2. Consrucion We will use wo projecors Γ 1 and Γ 2, he firs one acs a conroller o conrol he updaing of he second one, which will be used o form a sream of subkeys, or runkeys. Denoed by α and ω he saes of Γ 1 and Γ 2 in ime respecively, which are based on he finie fields E1 and E 2, Ei = F [ x]/ pi( x), i = 1,2, p 1( x ) and p ( ) 2 x are wo primiive polynomials wih degree 127 and 128 respecively, which expressions are given in he Lis 1. The sae α saisfy he simple recurrence equaion α = = +. (2.1) 8 i 1 x αi, i 0,1,2,... The ineger of he las eigh bis of α is called he dice D, denoed by d = ( D >> 4) + 1, he saes ω will be updaed as d ω = 1 x + ω, for 0. (2.2) Besides, we use a memorizes u o assemble ω, The iniial values α0, ω0, and u0 will be specified in he laer. u = u 1 ω, for > 0, (2.3) Suppose ha K is a finie field GF ( 2 8 ), K = F [ x]/ px ( ), p (x) is an irreducible polynomial of degree eigh, which expression is given in he Lis 1. We define S-box S ( x) 0 as S x = x x K. (2.4) ( ) 5 ( 3) 127, 0 We also adop he represenaion S 0 ( ζ ) for a byes sring ζ o represen ha S-box S 0 subsiue each bye of he sring ζ. The sarup includes wo subprocesses keyseup and ivseup, where he basic maerials as he secre key and key-size will be inpu and he inernal saes will be iniialized. Besides, in he keyseup we will make a key-defined wo S-boxes S ( x) 1 and S ( x) 2 from S ( ) 0 x and a diffusion ransformaion L. The process is as following. For a sring ρ of 8 byes, we define a 8 8marix M ρ : M T J T = ρ u l. (2.5)

4 where T u = ( a i, j ) 8 8 and Tl = ( b i, j) 8 8are he upper-riangular marix and he lower-riangular marix respecively, ρ[8 i+ j] bi if i< j, ρ[8 i+ j] bi if i> j, ai, j= 1 if i = j, bi, j= 1 if i= j, 0 if i j, > 0 if i < j, and J is a key-defined permuaion marix, for he simpliciy, here ake J = 1. Suppose ha K is he secre key, le K = K[0,23] K[8,31] if K = 256, else c bye bye K = K[0,15] ( K[0,7] K[8,15]), λ = K [( i 1) 8, 8i 1], i= 1, 2, 3, and define c hree affine ransformaions on K, i c bye (2.6) Ax ( ) = M ( x), Bx ( ) = M ( x), Cx ( ) = M ( x), x K, (2.7) λ λ λ 4 and a ransformaion L on K, A B A A B B A A B A L =. (2.8) A A B A B A B A B A Denoed by v = λ [ k], i = 1,2,3, and define wo new S-boxes i i bye 0 k< 8 S ( x) = S ( x v ) v, S ( x) = C( S ( x v ) v ), x K. (2.9) Suppose ha ζ is a sring of n byes, if n= 4k we also view i as a sring of k words, and wrie L( ζ ) o represen ha L akes on he each word of ζ. Simply, we denoe Q( ζ) = L S ( ζ). (2.10) In he ivseup, he second sep of he sarup, he inernal saes will be iniialized wih he secre key and he iniial value. φ φ For a 32-byes sring ζ we define a byes permuaion φ : ζ = φζ ( ), ζ [] i = ζ[4i mod31], φ for 0 i < 31, and ζ [31] = ζ[31]. Le K = K if K = 256 else K = K ( K), denoed by K 0 = K, K = K [8 i,31] K [0,8 i 1], i = 1, 2,3, define he funcions recurrenly i bye bye 1 F( ζ) = Q( φ( ζ)), F ( ζ) = F( ζ) K, F( ζ) = F( F ( ζ)) K, i = 1, 2,3. (2.11) 0 0 i i 1 i Suppose ha IV is he iniial value of 32-byes, e is he base of naural logarihm and c he inegral par of e 57!, and ξ,0 i 3, are four 32-byes srings defined as i

5 ξ = F ( IV c), ξ = F ( ξ c), i= 1,2. (2.12) 0 3 i 3 i 1 In he encrypion we will employ an array of 16 byes η. The inernal saes are iniialized respecively as following η = ξ [0,15] ξ [16,31], u = ξ [0,15], α = ξ [128, 254], ω = ξ [0,15]. (2.13) bi 0 2 If ξ 2 [0,15] = 0, he saes ω0 will be re-se as ( ω, τ ) = ξ [16,31]. (2.14) Noe. For a secre key, here is a mos one IV such ha ξ 2 = 0. In he proposal cipher DICING_CSB, he sequence { u } will play a flow of subkeys. Afer iniializaion, he process eners he recurrence par of encrypion/decrypion, in which including he sub-process of updaing saes, namely, making he sream of subkeys{ u }. Denoed by { } x > 0 and { } 0 funcion is defined as y > he sequences of plainex and cipherex respecively, he encrypion y = Encryp( x ) = S ( Q( x u ) Q( η)) u. (2.15) 2 We have summarized he whole process in a skech as Fig. 1. Lis of he Primiive Polynomials used Polynomials Expression p (x) x + x + x + x + 1 p ( ) x + ( x + x + 1)( x + 1) 1 x p ( x ) x + ( x + x + x + 1)( x + 1) Lis 1

6 The Skech of Encrypion Process Iniializing This is he recurrence par Updaing saes Plainex x Encryping Cipherex y Fig.1 3. Securiy analysis The analysis for DICING_CSB as a sream cipher will be similar o he one for DICING, refer o see paper [1]. Besides, as a block cipher, he encrypion mode of DICING_CSB is no as usual ieraive one, so he radiional analyses for he block ciphers of ieraive mode will no be feasible. Alhough he proposal cipher is sronger han addiive sream ciphers in plainex-recovery aacks, 16 i would be insecure if a IV s value would be allowed o use repeaedly more han 2 imes for a secree key K, as DICING_CSB only has he diffusion range of 32 bis. So, i is suggesed ha he usage of a IV is bes one ime one value. If inend o apply a IV many imes, hen in encrypion funcion should be added a more round in order o enlarge he range of diffusion, as a cos, he encryping rae will be raised abou 2 cycles/bye. I maybe should be menioned ha we have reduced wo Pr. s from DICING for we hink ha in his encrypion form he requiremen for he period of he sequence { u } may be relaxed, in his place, he period of he sequence{ u } is no less han (17 2 1)(2 1). 4. Implemenaion In he plaform of 32-bi Windows OS and Inel Celeron 2.66G, 64-bi processor, Borland C++ 5.0, he performance of DICING_CSB is as following

7 Repor of Performance Encrypion Decrypion Sub-processes Time Sub-processes Time Keyseup 9890 cycles Keyseup cycles IVseup 2870 cycles IVseup 2920 cycles Encryping rae 10.3 cycles/bye Decryping rae 10.3 cycles/bye Lis 2 Remark: There is an alernae updaing rule for he saes 16 1 x, for 0. α and ω as following: α = + α > (2.1 ) Denoed by di = 1 + ( α + 1[ i] bye &15),0 i< 16, he saes ω are updaed as d ω i 16++ i 1 = x ω16 + i, 0 i< 16, for 0. (2.2 ) Wih he updaing rules above, he encryping/decryping rae will be as fas as 8.8 cycles / bye in he case of larger size of message. We call he rule (2.1 ) and (2.2 ) as loing. Besides, wih he processors as Penium-m, Penium 4 or AMD-64, he implemenaion will be faser abou 20~30%. 5. Conclusion The proposal cipher can be viewed as a combinaive of a sream cipher and a block cipher. I assimilaes he good qualiies of sream ciphers in he speed and block ciphers in he secure. I is able o serve as a synchronous sream cipher or a block cipher, and here will no be need o equip a MAC when i is applied as a synchronous sream cipher. While i is applied as block cipher, i will sill require a IV o iniilize he inernal saes, however, his requiremen is easy o be simply saisfied, for example, he name or he dae of files may be aken as he IV values. References [1] A.P. Li, A New Sream Cipher: DICING, now available a estream - The ECRYPT Sream Cipher Projec - Phase 2

Li An-Ping. Beijing , P.R.China

Li An-Ping. Beijing , P.R.China A New Type of Cpher: DICING_csb L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Absrac: In hs paper, we wll propose a new ype of cpher named DICING_csb, whch s derved from our prevous sream cpher DICING.

More information

THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER

THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 0 STREAM CIPHER Mohammad Sadegh Nemai Nia 1, Ali Payandeh 1, Faculy of Informaion, Telecommunicaion and Securiy Technologies, Malek-e- Ashar Universiy

More information

Linear Cryptanalysis

Linear Cryptanalysis Linear Crypanalysis T-79.550 Crypology Lecure 5 February 6, 008 Kaisa Nyberg Linear Crypanalysis /36 SPN A Small Example Linear Crypanalysis /36 Linear Approximaion of S-boxes Linear Crypanalysis 3/36

More information

Longest Common Prefixes

Longest Common Prefixes Longes Common Prefixes The sandard ordering for srings is he lexicographical order. I is induced by an order over he alphabe. We will use he same symbols (,

More information

10. State Space Methods

10. State Space Methods . Sae Space Mehods. Inroducion Sae space modelling was briefly inroduced in chaper. Here more coverage is provided of sae space mehods before some of heir uses in conrol sysem design are covered in he

More information

EE363 homework 1 solutions

EE363 homework 1 solutions EE363 Prof. S. Boyd EE363 homework 1 soluions 1. LQR for a riple accumulaor. We consider he sysem x +1 = Ax + Bu, y = Cx, wih 1 1 A = 1 1, B =, C = [ 1 ]. 1 1 This sysem has ransfer funcion H(z) = (z 1)

More information

Cryptanalysis of RAKAPOSHI Stream Cipher

Cryptanalysis of RAKAPOSHI Stream Cipher Crypanalysis of RAKAPOSHI Sream Cipher Lin Ding, Jie Guan Zhengzhou Informaion Science and Technology Insiue, China E-mail: dinglin_cipher@63.com; guanie7@63.com Absrac. RAKAPOSHI is a hardware oriened

More information

Morning Time: 1 hour 30 minutes Additional materials (enclosed):

Morning Time: 1 hour 30 minutes Additional materials (enclosed): ADVANCED GCE 78/0 MATHEMATICS (MEI) Differenial Equaions THURSDAY JANUARY 008 Morning Time: hour 30 minues Addiional maerials (enclosed): None Addiional maerials (required): Answer Bookle (8 pages) Graph

More information

Spring Ammar Abu-Hudrouss Islamic University Gaza

Spring Ammar Abu-Hudrouss Islamic University Gaza Chaper 7 Reed-Solomon Code Spring 9 Ammar Abu-Hudrouss Islamic Universiy Gaza ١ Inroducion A Reed Solomon code is a special case of a BCH code in which he lengh of he code is one less han he size of he

More information

2.7. Some common engineering functions. Introduction. Prerequisites. Learning Outcomes

2.7. Some common engineering functions. Introduction. Prerequisites. Learning Outcomes Some common engineering funcions 2.7 Inroducion This secion provides a caalogue of some common funcions ofen used in Science and Engineering. These include polynomials, raional funcions, he modulus funcion

More information

Linear Time-invariant systems, Convolution, and Cross-correlation

Linear Time-invariant systems, Convolution, and Cross-correlation Linear Time-invarian sysems, Convoluion, and Cross-correlaion (1) Linear Time-invarian (LTI) sysem A sysem akes in an inpu funcion and reurns an oupu funcion. x() T y() Inpu Sysem Oupu y() = T[x()] An

More information

Laplace transfom: t-translation rule , Haynes Miller and Jeremy Orloff

Laplace transfom: t-translation rule , Haynes Miller and Jeremy Orloff Laplace ransfom: -ranslaion rule 8.03, Haynes Miller and Jeremy Orloff Inroducory example Consider he sysem ẋ + 3x = f(, where f is he inpu and x he response. We know is uni impulse response is 0 for

More information

An Excursion into Set Theory using a Constructivist Approach

An Excursion into Set Theory using a Constructivist Approach An Excursion ino Se Theory using a Consrucivis Approach Miderm Repor Nihil Pail under supervision of Ksenija Simic Fall 2005 Absrac Consrucive logic is an alernaive o he heory of classical logic ha draws

More information

Some Ramsey results for the n-cube

Some Ramsey results for the n-cube Some Ramsey resuls for he n-cube Ron Graham Universiy of California, San Diego Jozsef Solymosi Universiy of Briish Columbia, Vancouver, Canada Absrac In his noe we esablish a Ramsey-ype resul for cerain

More information

Cryptanalysis of Reduced NORX initially discussed at ASK 2016

Cryptanalysis of Reduced NORX initially discussed at ASK 2016 Crypanalysis of Reduced NORX iniiy discussed a ASK 2016 Nasour Bagheri (SRTTU, Iran), Tao Huang (NTU, Singaopre), Keing Jia (Tsinghua Univ., Sae Key Lab, China), Florian Mendel (TUGraz, Ausria), Yu Sasaki

More information

Chapter 2. First Order Scalar Equations

Chapter 2. First Order Scalar Equations Chaper. Firs Order Scalar Equaions We sar our sudy of differenial equaions in he same way he pioneers in his field did. We show paricular echniques o solve paricular ypes of firs order differenial equaions.

More information

MATH 2050 Assignment 9 Winter Do not need to hand in. 1. Find the determinant by reducing to triangular form for the following matrices.

MATH 2050 Assignment 9 Winter Do not need to hand in. 1. Find the determinant by reducing to triangular form for the following matrices. MATH 2050 Assignmen 9 Winer 206 Do no need o hand in Noe ha he final exam also covers maerial afer HW8, including, for insance, calculaing deerminan by row operaions, eigenvalues and eigenvecors, similariy

More information

Learning Objectives: Practice designing and simulating digital circuits including flip flops Experience state machine design procedure

Learning Objectives: Practice designing and simulating digital circuits including flip flops Experience state machine design procedure Lab 4: Synchronous Sae Machine Design Summary: Design and implemen synchronous sae machine circuis and es hem wih simulaions in Cadence Viruoso. Learning Objecives: Pracice designing and simulaing digial

More information

More Digital Logic. t p output. Low-to-high and high-to-low transitions could have different t p. V in (t)

More Digital Logic. t p output. Low-to-high and high-to-low transitions could have different t p. V in (t) EECS 4 Spring 23 Lecure 2 EECS 4 Spring 23 Lecure 2 More igial Logic Gae delay and signal propagaion Clocked circui elemens (flip-flop) Wriing a word o memory Simplifying digial circuis: Karnaugh maps

More information

CSE Computer Architecture I

CSE Computer Architecture I Single cycle Conrol Implemenaion CSE 332 Compuer Archiecure I l x I Lecure 7 - uli Cycle achines i i [ ] I I r l ichael Niemier Deparmen of Compuer Science and Engineering I ] i X.S. Hu 5- X.S. Hu 5-2

More information

Application of a Stochastic-Fuzzy Approach to Modeling Optimal Discrete Time Dynamical Systems by Using Large Scale Data Processing

Application of a Stochastic-Fuzzy Approach to Modeling Optimal Discrete Time Dynamical Systems by Using Large Scale Data Processing Applicaion of a Sochasic-Fuzzy Approach o Modeling Opimal Discree Time Dynamical Sysems by Using Large Scale Daa Processing AA WALASZE-BABISZEWSA Deparmen of Compuer Engineering Opole Universiy of Technology

More information

Comments on Window-Constrained Scheduling

Comments on Window-Constrained Scheduling Commens on Window-Consrained Scheduling Richard Wes Member, IEEE and Yuing Zhang Absrac This shor repor clarifies he behavior of DWCS wih respec o Theorem 3 in our previously published paper [1], and describes

More information

Inventory Analysis and Management. Multi-Period Stochastic Models: Optimality of (s, S) Policy for K-Convex Objective Functions

Inventory Analysis and Management. Multi-Period Stochastic Models: Optimality of (s, S) Policy for K-Convex Objective Functions Muli-Period Sochasic Models: Opimali of (s, S) Polic for -Convex Objecive Funcions Consider a seing similar o he N-sage newsvendor problem excep ha now here is a fixed re-ordering cos (> 0) for each (re-)order.

More information

15. Vector Valued Functions

15. Vector Valued Functions 1. Vecor Valued Funcions Up o his poin, we have presened vecors wih consan componens, for example, 1, and,,4. However, we can allow he componens of a vecor o be funcions of a common variable. For example,

More information

Algebraic Attacks on Summation Generators

Algebraic Attacks on Summation Generators Algebraic Aacks on Summaion Generaors Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, and Dukjae Moon Naional Securiy Research Insiue 161 Gajeong-dong, Yuseong-gu, Daejeon, 305-350, Korea {dlee,jaeheon,jinhong,jwhan,djmoon}@eri.re.kr

More information

Lecture Notes 2. The Hilbert Space Approach to Time Series

Lecture Notes 2. The Hilbert Space Approach to Time Series Time Series Seven N. Durlauf Universiy of Wisconsin. Basic ideas Lecure Noes. The Hilber Space Approach o Time Series The Hilber space framework provides a very powerful language for discussing he relaionship

More information

EECE 301 Signals & Systems Prof. Mark Fowler

EECE 301 Signals & Systems Prof. Mark Fowler EECE 3 Signals & Sysems Prof. Mark Fowler Noe Se #2 Wha are Coninuous-Time Signals??? Reading Assignmen: Secion. of Kamen and Heck /22 Course Flow Diagram The arrows here show concepual flow beween ideas.

More information

23.2. Representing Periodic Functions by Fourier Series. Introduction. Prerequisites. Learning Outcomes

23.2. Representing Periodic Functions by Fourier Series. Introduction. Prerequisites. Learning Outcomes Represening Periodic Funcions by Fourier Series 3. Inroducion In his Secion we show how a periodic funcion can be expressed as a series of sines and cosines. We begin by obaining some sandard inegrals

More information

The average rate of change between two points on a function is d t

The average rate of change between two points on a function is d t SM Dae: Secion: Objecive: The average rae of change beween wo poins on a funcion is d. For example, if he funcion ( ) represens he disance in miles ha a car has raveled afer hours, hen finding he slope

More information

3.1.3 INTRODUCTION TO DYNAMIC OPTIMIZATION: DISCRETE TIME PROBLEMS. A. The Hamiltonian and First-Order Conditions in a Finite Time Horizon

3.1.3 INTRODUCTION TO DYNAMIC OPTIMIZATION: DISCRETE TIME PROBLEMS. A. The Hamiltonian and First-Order Conditions in a Finite Time Horizon 3..3 INRODUCION O DYNAMIC OPIMIZAION: DISCREE IME PROBLEMS A. he Hamilonian and Firs-Order Condiions in a Finie ime Horizon Define a new funcion, he Hamilonian funcion, H. H he change in he oal value of

More information

Section 7.4 Modeling Changing Amplitude and Midline

Section 7.4 Modeling Changing Amplitude and Midline 488 Chaper 7 Secion 7.4 Modeling Changing Ampliude and Midline While sinusoidal funcions can model a variey of behaviors, i is ofen necessary o combine sinusoidal funcions wih linear and exponenial curves

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Noes for EE7C Spring 018: Convex Opimizaion and Approximaion Insrucor: Moriz Hard Email: hard+ee7c@berkeley.edu Graduae Insrucor: Max Simchowiz Email: msimchow+ee7c@berkeley.edu Ocober 15, 018 3

More information

Let us start with a two dimensional case. We consider a vector ( x,

Let us start with a two dimensional case. We consider a vector ( x, Roaion marices We consider now roaion marices in wo and hree dimensions. We sar wih wo dimensions since wo dimensions are easier han hree o undersand, and one dimension is a lile oo simple. However, our

More information

4.6 One Dimensional Kinematics and Integration

4.6 One Dimensional Kinematics and Integration 4.6 One Dimensional Kinemaics and Inegraion When he acceleraion a( of an objec is a non-consan funcion of ime, we would like o deermine he ime dependence of he posiion funcion x( and he x -componen of

More information

RC, RL and RLC circuits

RC, RL and RLC circuits Name Dae Time o Complee h m Parner Course/ Secion / Grade RC, RL and RLC circuis Inroducion In his experimen we will invesigae he behavior of circuis conaining combinaions of resisors, capaciors, and inducors.

More information

Chapter #1 EEE8013 EEE3001. Linear Controller Design and State Space Analysis

Chapter #1 EEE8013 EEE3001. Linear Controller Design and State Space Analysis Chaper EEE83 EEE3 Chaper # EEE83 EEE3 Linear Conroller Design and Sae Space Analysis Ordinary Differenial Equaions.... Inroducion.... Firs Order ODEs... 3. Second Order ODEs... 7 3. General Maerial...

More information

EXPLICIT TIME INTEGRATORS FOR NONLINEAR DYNAMICS DERIVED FROM THE MIDPOINT RULE

EXPLICIT TIME INTEGRATORS FOR NONLINEAR DYNAMICS DERIVED FROM THE MIDPOINT RULE Version April 30, 2004.Submied o CTU Repors. EXPLICIT TIME INTEGRATORS FOR NONLINEAR DYNAMICS DERIVED FROM THE MIDPOINT RULE Per Krysl Universiy of California, San Diego La Jolla, California 92093-0085,

More information

Modal identification of structures from roving input data by means of maximum likelihood estimation of the state space model

Modal identification of structures from roving input data by means of maximum likelihood estimation of the state space model Modal idenificaion of srucures from roving inpu daa by means of maximum likelihood esimaion of he sae space model J. Cara, J. Juan, E. Alarcón Absrac The usual way o perform a forced vibraion es is o fix

More information

Class Meeting # 10: Introduction to the Wave Equation

Class Meeting # 10: Introduction to the Wave Equation MATH 8.5 COURSE NOTES - CLASS MEETING # 0 8.5 Inroducion o PDEs, Fall 0 Professor: Jared Speck Class Meeing # 0: Inroducion o he Wave Equaion. Wha is he wave equaion? The sandard wave equaion for a funcion

More information

Logic in computer science

Logic in computer science Logic in compuer science Logic plays an imporan role in compuer science Logic is ofen called he calculus of compuer science Logic plays a similar role in compuer science o ha played by calculus in he physical

More information

Reading from Young & Freedman: For this topic, read sections 25.4 & 25.5, the introduction to chapter 26 and sections 26.1 to 26.2 & 26.4.

Reading from Young & Freedman: For this topic, read sections 25.4 & 25.5, the introduction to chapter 26 and sections 26.1 to 26.2 & 26.4. PHY1 Elecriciy Topic 7 (Lecures 1 & 11) Elecric Circuis n his opic, we will cover: 1) Elecromoive Force (EMF) ) Series and parallel resisor combinaions 3) Kirchhoff s rules for circuis 4) Time dependence

More information

Notes 04 largely plagiarized by %khc

Notes 04 largely plagiarized by %khc Noes 04 largely plagiarized by %khc Convoluion Recap Some ricks: x() () =x() x() (, 0 )=x(, 0 ) R ț x() u() = x( )d x() () =ẋ() This hen ells us ha an inegraor has impulse response h() =u(), and ha a differeniaor

More information

di Bernardo, M. (1995). A purely adaptive controller to synchronize and control chaotic systems.

di Bernardo, M. (1995). A purely adaptive controller to synchronize and control chaotic systems. di ernardo, M. (995). A purely adapive conroller o synchronize and conrol chaoic sysems. hps://doi.org/.6/375-96(96)8-x Early version, also known as pre-prin Link o published version (if available):.6/375-96(96)8-x

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This documen is downloaded from DR-NTU, Nanyang Technological Universiy Library, Singapore. Tile Auhor(s) Ciaion A Pracical Faul Aack on ARX-Like Ciphers wih a Case Sudy on ChaCha20 Kumar, S. V. Dilip;

More information

SOLUTIONS TO ECE 3084

SOLUTIONS TO ECE 3084 SOLUTIONS TO ECE 384 PROBLEM 2.. For each sysem below, specify wheher or no i is: (i) memoryless; (ii) causal; (iii) inverible; (iv) linear; (v) ime invarian; Explain your reasoning. If he propery is no

More information

Generalized Chebyshev polynomials

Generalized Chebyshev polynomials Generalized Chebyshev polynomials Clemene Cesarano Faculy of Engineering, Inernaional Telemaic Universiy UNINETTUNO Corso Viorio Emanuele II, 39 86 Roma, Ialy email: c.cesarano@unineunouniversiy.ne ABSTRACT

More information

Appendix 14.1 The optimal control problem and its solution using

Appendix 14.1 The optimal control problem and its solution using 1 Appendix 14.1 he opimal conrol problem and is soluion using he maximum principle NOE: Many occurrences of f, x, u, and in his file (in equaions or as whole words in ex) are purposefully in bold in order

More information

Constant Acceleration

Constant Acceleration Objecive Consan Acceleraion To deermine he acceleraion of objecs moving along a sraigh line wih consan acceleraion. Inroducion The posiion y of a paricle moving along a sraigh line wih a consan acceleraion

More information

Solutions - Midterm Exam

Solutions - Midterm Exam DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING, THE UNIVERITY OF NEW MEXICO ECE-34: ignals and ysems ummer 203 PROBLEM (5 PT) Given he following LTI sysem: oluions - Miderm Exam a) kech he impulse response

More information

Bernoulli numbers. Francesco Chiatti, Matteo Pintonello. December 5, 2016

Bernoulli numbers. Francesco Chiatti, Matteo Pintonello. December 5, 2016 UNIVERSITÁ DEGLI STUDI DI PADOVA, DIPARTIMENTO DI MATEMATICA TULLIO LEVI-CIVITA Bernoulli numbers Francesco Chiai, Maeo Pinonello December 5, 206 During las lessons we have proved he Las Ferma Theorem

More information

CHAPTER 12 DIRECT CURRENT CIRCUITS

CHAPTER 12 DIRECT CURRENT CIRCUITS CHAPTER 12 DIRECT CURRENT CIUITS DIRECT CURRENT CIUITS 257 12.1 RESISTORS IN SERIES AND IN PARALLEL When wo resisors are conneced ogeher as shown in Figure 12.1 we said ha hey are conneced in series. As

More information

EECE 301 Signals & Systems Prof. Mark Fowler

EECE 301 Signals & Systems Prof. Mark Fowler EECE 3 Signals & Sysems Prof. Mark Fowler Noe Se # Wha are Coninuous-Time Signals??? /6 Coninuous-Time Signal Coninuous Time (C-T) Signal: A C-T signal is defined on he coninuum of ime values. Tha is:

More information

Vehicle Arrival Models : Headway

Vehicle Arrival Models : Headway Chaper 12 Vehicle Arrival Models : Headway 12.1 Inroducion Modelling arrival of vehicle a secion of road is an imporan sep in raffic flow modelling. I has imporan applicaion in raffic flow simulaion where

More information

6.003 Homework #13 Solutions

6.003 Homework #13 Solutions 6.003 Homework #3 Soluions Problems. Transformaion Consider he following ransformaion from x() o y(): x() w () w () w 3 () + y() p() cos() where p() = δ( k). Deermine an expression for y() when x() = sin(/)/().

More information

AP Chemistry--Chapter 12: Chemical Kinetics

AP Chemistry--Chapter 12: Chemical Kinetics AP Chemisry--Chaper 12: Chemical Kineics I. Reacion Raes A. The area of chemisry ha deals wih reacion raes, or how fas a reacion occurs, is called chemical kineics. B. The rae of reacion depends on he

More information

ODEs II, Lecture 1: Homogeneous Linear Systems - I. Mike Raugh 1. March 8, 2004

ODEs II, Lecture 1: Homogeneous Linear Systems - I. Mike Raugh 1. March 8, 2004 ODEs II, Lecure : Homogeneous Linear Sysems - I Mike Raugh March 8, 4 Inroducion. In he firs lecure we discussed a sysem of linear ODEs for modeling he excreion of lead from he human body, saw how o ransform

More information

Wavelet Methods for Time Series Analysis. What is a Wavelet? Part I: Introduction to Wavelets and Wavelet Transforms. sines & cosines are big waves

Wavelet Methods for Time Series Analysis. What is a Wavelet? Part I: Introduction to Wavelets and Wavelet Transforms. sines & cosines are big waves Wavele Mehods for Time Series Analysis Par I: Inroducion o Waveles and Wavele Transforms waveles are analysis ools for ime series and images as a subjec, waveles are relaively new (983 o presen) a synhesis

More information

Appendix to Online l 1 -Dictionary Learning with Application to Novel Document Detection

Appendix to Online l 1 -Dictionary Learning with Application to Novel Document Detection Appendix o Online l -Dicionary Learning wih Applicaion o Novel Documen Deecion Shiva Prasad Kasiviswanahan Huahua Wang Arindam Banerjee Prem Melville A Background abou ADMM In his secion, we give a brief

More information

EE650R: Reliability Physics of Nanoelectronic Devices Lecture 9:

EE650R: Reliability Physics of Nanoelectronic Devices Lecture 9: EE65R: Reliabiliy Physics of anoelecronic Devices Lecure 9: Feaures of Time-Dependen BTI Degradaion Dae: Sep. 9, 6 Classnoe Lufe Siddique Review Animesh Daa 9. Background/Review: BTI is observed when he

More information

d 1 = c 1 b 2 - b 1 c 2 d 2 = c 1 b 3 - b 1 c 3

d 1 = c 1 b 2 - b 1 c 2 d 2 = c 1 b 3 - b 1 c 3 and d = c b - b c c d = c b - b c c This process is coninued unil he nh row has been compleed. The complee array of coefficiens is riangular. Noe ha in developing he array an enire row may be divided or

More information

Lab 10: RC, RL, and RLC Circuits

Lab 10: RC, RL, and RLC Circuits Lab 10: RC, RL, and RLC Circuis In his experimen, we will invesigae he behavior of circuis conaining combinaions of resisors, capaciors, and inducors. We will sudy he way volages and currens change in

More information

Chapter 7: Solving Trig Equations

Chapter 7: Solving Trig Equations Haberman MTH Secion I: The Trigonomeric Funcions Chaper 7: Solving Trig Equaions Le s sar by solving a couple of equaions ha involve he sine funcion EXAMPLE a: Solve he equaion sin( ) The inverse funcions

More information

A Shooting Method for A Node Generation Algorithm

A Shooting Method for A Node Generation Algorithm A Shooing Mehod for A Node Generaion Algorihm Hiroaki Nishikawa W.M.Keck Foundaion Laboraory for Compuaional Fluid Dynamics Deparmen of Aerospace Engineering, Universiy of Michigan, Ann Arbor, Michigan

More information

Challenge Problems. DIS 203 and 210. March 6, (e 2) k. k(k + 2). k=1. f(x) = k(k + 2) = 1 x k

Challenge Problems. DIS 203 and 210. March 6, (e 2) k. k(k + 2). k=1. f(x) = k(k + 2) = 1 x k Challenge Problems DIS 03 and 0 March 6, 05 Choose one of he following problems, and work on i in your group. Your goal is o convince me ha your answer is correc. Even if your answer isn compleely correc,

More information

Anonymity in Shared Symmetric Key Primitives

Anonymity in Shared Symmetric Key Primitives Anonymiy in Shared Symmeric Key Primiives Gregory M. Zaverucha and Douglas R. Sinson David R. Cherion School of Compuer Science Universiy of Waerloo Waerloo ON, N2L 3G1, Canada {gzaveruc, dsinson}@uwaerloo.ca

More information

Speech and Language Processing

Speech and Language Processing Speech and Language rocessing Lecure 4 Variaional inference and sampling Informaion and Communicaions Engineering Course Takahiro Shinozaki 08//5 Lecure lan (Shinozaki s par) I gives he firs 6 lecures

More information

Probabilistic Robotics

Probabilistic Robotics Probabilisic Roboics Bayes Filer Implemenaions Gaussian filers Bayes Filer Reminder Predicion bel p u bel d Correcion bel η p z bel Gaussians : ~ π e p N p - Univariae / / : ~ μ μ μ e p Ν p d π Mulivariae

More information

Module 4: Time Response of discrete time systems Lecture Note 2

Module 4: Time Response of discrete time systems Lecture Note 2 Module 4: Time Response of discree ime sysems Lecure Noe 2 1 Prooype second order sysem The sudy of a second order sysem is imporan because many higher order sysem can be approimaed by a second order model

More information

Kinematics Vocabulary. Kinematics and One Dimensional Motion. Position. Coordinate System in One Dimension. Kinema means movement 8.

Kinematics Vocabulary. Kinematics and One Dimensional Motion. Position. Coordinate System in One Dimension. Kinema means movement 8. Kinemaics Vocabulary Kinemaics and One Dimensional Moion 8.1 WD1 Kinema means movemen Mahemaical descripion of moion Posiion Time Inerval Displacemen Velociy; absolue value: speed Acceleraion Averages

More information

Math 334 Fall 2011 Homework 11 Solutions

Math 334 Fall 2011 Homework 11 Solutions Dec. 2, 2 Mah 334 Fall 2 Homework Soluions Basic Problem. Transform he following iniial value problem ino an iniial value problem for a sysem: u + p()u + q() u g(), u() u, u () v. () Soluion. Le v u. Then

More information

Traversal of a subtree is slow, which affects prefix and range queries.

Traversal of a subtree is slow, which affects prefix and range queries. Compac Tries Tries suffer from a large number nodes, Ω( R ) in he wors case. The space requiremen is large, since each node needs much more space han a single symbol. Traversal of a subree is slow, which

More information

2. Nonlinear Conservation Law Equations

2. Nonlinear Conservation Law Equations . Nonlinear Conservaion Law Equaions One of he clear lessons learned over recen years in sudying nonlinear parial differenial equaions is ha i is generally no wise o ry o aack a general class of nonlinear

More information

( ) ( ) ( ) ( u) ( u) = are shown in Figure =, it is reasonable to speculate that. = cos u ) and the inside function ( ( t) du

( ) ( ) ( ) ( u) ( u) = are shown in Figure =, it is reasonable to speculate that. = cos u ) and the inside function ( ( t) du Porlan Communiy College MTH 51 Lab Manual The Chain Rule Aciviy 38 The funcions f ( = sin ( an k( sin( 3 38.1. Since f ( cos( k ( = cos( 3. Bu his woul imply ha k ( f ( = are shown in Figure =, i is reasonable

More information

State-Space Models. Initialization, Estimation and Smoothing of the Kalman Filter

State-Space Models. Initialization, Estimation and Smoothing of the Kalman Filter Sae-Space Models Iniializaion, Esimaion and Smoohing of he Kalman Filer Iniializaion of he Kalman Filer The Kalman filer shows how o updae pas predicors and he corresponding predicion error variances when

More information

Pade and Laguerre Approximations Applied. to the Active Queue Management Model. of Internet Protocol

Pade and Laguerre Approximations Applied. to the Active Queue Management Model. of Internet Protocol Applied Mahemaical Sciences, Vol. 7, 013, no. 16, 663-673 HIKARI Ld, www.m-hikari.com hp://dx.doi.org/10.1988/ams.013.39499 Pade and Laguerre Approximaions Applied o he Acive Queue Managemen Model of Inerne

More information

Learning Enhancement Team

Learning Enhancement Team Learning Enhancemen Team Model answers: Exponenial Funcions Exponenial Funcions sudy guide 1 i) The base rae of growh b is equal o 3 You can see his by noicing ha 1b 36 in his sysem, dividing boh sides

More information

0.1 MAXIMUM LIKELIHOOD ESTIMATION EXPLAINED

0.1 MAXIMUM LIKELIHOOD ESTIMATION EXPLAINED 0.1 MAXIMUM LIKELIHOOD ESTIMATIO EXPLAIED Maximum likelihood esimaion is a bes-fi saisical mehod for he esimaion of he values of he parameers of a sysem, based on a se of observaions of a random variable

More information

An introduction to the theory of SDDP algorithm

An introduction to the theory of SDDP algorithm An inroducion o he heory of SDDP algorihm V. Leclère (ENPC) Augus 1, 2014 V. Leclère Inroducion o SDDP Augus 1, 2014 1 / 21 Inroducion Large scale sochasic problem are hard o solve. Two ways of aacking

More information

Physical Limitations of Logic Gates Week 10a

Physical Limitations of Logic Gates Week 10a Physical Limiaions of Logic Gaes Week 10a In a compuer we ll have circuis of logic gaes o perform specific funcions Compuer Daapah: Boolean algebraic funcions using binary variables Symbolic represenaion

More information

Lecture 4 Notes (Little s Theorem)

Lecture 4 Notes (Little s Theorem) Lecure 4 Noes (Lile s Theorem) This lecure concerns one of he mos imporan (and simples) heorems in Queuing Theory, Lile s Theorem. More informaion can be found in he course book, Bersekas & Gallagher,

More information

Economics 8105 Macroeconomic Theory Recitation 6

Economics 8105 Macroeconomic Theory Recitation 6 Economics 8105 Macroeconomic Theory Reciaion 6 Conor Ryan Ocober 11h, 2016 Ouline: Opimal Taxaion wih Governmen Invesmen 1 Governmen Expendiure in Producion In hese noes we will examine a model in which

More information

Lectures 29 and 30 BIQUADRATICS AND STATE SPACE OP AMP REALIZATIONS. I. Introduction

Lectures 29 and 30 BIQUADRATICS AND STATE SPACE OP AMP REALIZATIONS. I. Introduction EE-202/445, 3/18/18 9-1 R. A. DeCarlo Lecures 29 and 30 BIQUADRATICS AND STATE SPACE OP AMP REALIZATIONS I. Inroducion 1. The biquadraic ransfer funcion has boh a 2nd order numeraor and a 2nd order denominaor:

More information

THE GENERALIZED PASCAL MATRIX VIA THE GENERALIZED FIBONACCI MATRIX AND THE GENERALIZED PELL MATRIX

THE GENERALIZED PASCAL MATRIX VIA THE GENERALIZED FIBONACCI MATRIX AND THE GENERALIZED PELL MATRIX J Korean Mah Soc 45 008, No, pp 479 49 THE GENERALIZED PASCAL MATRIX VIA THE GENERALIZED FIBONACCI MATRIX AND THE GENERALIZED PELL MATRIX Gwang-yeon Lee and Seong-Hoon Cho Reprined from he Journal of he

More information

Chapter 8 The Complete Response of RL and RC Circuits

Chapter 8 The Complete Response of RL and RC Circuits Chaper 8 The Complee Response of RL and RC Circuis Seoul Naional Universiy Deparmen of Elecrical and Compuer Engineering Wha is Firs Order Circuis? Circuis ha conain only one inducor or only one capacior

More information

Section 3.5 Nonhomogeneous Equations; Method of Undetermined Coefficients

Section 3.5 Nonhomogeneous Equations; Method of Undetermined Coefficients Secion 3.5 Nonhomogeneous Equaions; Mehod of Undeermined Coefficiens Key Terms/Ideas: Linear Differenial operaor Nonlinear operaor Second order homogeneous DE Second order nonhomogeneous DE Soluion o homogeneous

More information

1. Consider a pure-exchange economy with stochastic endowments. The state of the economy

1. Consider a pure-exchange economy with stochastic endowments. The state of the economy Answer 4 of he following 5 quesions. 1. Consider a pure-exchange economy wih sochasic endowmens. The sae of he economy in period, 0,1,..., is he hisory of evens s ( s0, s1,..., s ). The iniial sae is given.

More information

Math 333 Problem Set #2 Solution 14 February 2003

Math 333 Problem Set #2 Solution 14 February 2003 Mah 333 Problem Se #2 Soluion 14 February 2003 A1. Solve he iniial value problem dy dx = x2 + e 3x ; 2y 4 y(0) = 1. Soluion: This is separable; we wrie 2y 4 dy = x 2 + e x dx and inegrae o ge The iniial

More information

Some Basic Information about M-S-D Systems

Some Basic Information about M-S-D Systems Some Basic Informaion abou M-S-D Sysems 1 Inroducion We wan o give some summary of he facs concerning unforced (homogeneous) and forced (non-homogeneous) models for linear oscillaors governed by second-order,

More information

Simulation-Solving Dynamic Models ABE 5646 Week 2, Spring 2010

Simulation-Solving Dynamic Models ABE 5646 Week 2, Spring 2010 Simulaion-Solving Dynamic Models ABE 5646 Week 2, Spring 2010 Week Descripion Reading Maerial 2 Compuer Simulaion of Dynamic Models Finie Difference, coninuous saes, discree ime Simple Mehods Euler Trapezoid

More information

Chapter 3 Boundary Value Problem

Chapter 3 Boundary Value Problem Chaper 3 Boundary Value Problem A boundary value problem (BVP) is a problem, ypically an ODE or a PDE, which has values assigned on he physical boundary of he domain in which he problem is specified. Le

More information

Random Walk with Anti-Correlated Steps

Random Walk with Anti-Correlated Steps Random Walk wih Ani-Correlaed Seps John Noga Dirk Wagner 2 Absrac We conjecure he expeced value of random walks wih ani-correlaed seps o be exacly. We suppor his conjecure wih 2 plausibiliy argumens and

More information

Then. 1 The eigenvalues of A are inside R = n i=1 R i. 2 Union of any k circles not intersecting the other (n k)

Then. 1 The eigenvalues of A are inside R = n i=1 R i. 2 Union of any k circles not intersecting the other (n k) Ger sgorin Circle Chaper 9 Approimaing Eigenvalues Per-Olof Persson persson@berkeley.edu Deparmen of Mahemaics Universiy of California, Berkeley Mah 128B Numerical Analysis (Ger sgorin Circle) Le A be

More information

STATE-SPACE MODELLING. A mass balance across the tank gives:

STATE-SPACE MODELLING. A mass balance across the tank gives: B. Lennox and N.F. Thornhill, 9, Sae Space Modelling, IChemE Process Managemen and Conrol Subjec Group Newsleer STE-SPACE MODELLING Inroducion: Over he pas decade or so here has been an ever increasing

More information

Solutions to Assignment 1

Solutions to Assignment 1 MA 2326 Differenial Equaions Insrucor: Peronela Radu Friday, February 8, 203 Soluions o Assignmen. Find he general soluions of he following ODEs: (a) 2 x = an x Soluion: I is a separable equaion as we

More information

ADDITIONAL PROBLEMS (a) Find the Fourier transform of the half-cosine pulse shown in Fig. 2.40(a). Additional Problems 91

ADDITIONAL PROBLEMS (a) Find the Fourier transform of the half-cosine pulse shown in Fig. 2.40(a). Additional Problems 91 ddiional Problems 9 n inverse relaionship exiss beween he ime-domain and freuency-domain descripions of a signal. Whenever an operaion is performed on he waveform of a signal in he ime domain, a corresponding

More information

Hamilton- J acobi Equation: Weak S olution We continue the study of the Hamilton-Jacobi equation:

Hamilton- J acobi Equation: Weak S olution We continue the study of the Hamilton-Jacobi equation: M ah 5 7 Fall 9 L ecure O c. 4, 9 ) Hamilon- J acobi Equaion: Weak S oluion We coninue he sudy of he Hamilon-Jacobi equaion: We have shown ha u + H D u) = R n, ) ; u = g R n { = }. ). In general we canno

More information

Introduction to Mobile Robotics

Introduction to Mobile Robotics Inroducion o Mobile Roboics Bayes Filer Kalman Filer Wolfram Burgard Cyrill Sachniss Giorgio Grisei Maren Bennewiz Chrisian Plagemann Bayes Filer Reminder Predicion bel p u bel d Correcion bel η p z bel

More information

MATH 128A, SUMMER 2009, FINAL EXAM SOLUTION

MATH 128A, SUMMER 2009, FINAL EXAM SOLUTION MATH 28A, SUMME 2009, FINAL EXAM SOLUTION BENJAMIN JOHNSON () (8 poins) [Lagrange Inerpolaion] (a) (4 poins) Le f be a funcion defined a some real numbers x 0,..., x n. Give a defining equaion for he Lagrange

More information

Finish reading Chapter 2 of Spivak, rereading earlier sections as necessary. handout and fill in some missing details!

Finish reading Chapter 2 of Spivak, rereading earlier sections as necessary. handout and fill in some missing details! MAT 257, Handou 6: Ocober 7-2, 20. I. Assignmen. Finish reading Chaper 2 of Spiva, rereading earlier secions as necessary. handou and fill in some missing deails! II. Higher derivaives. Also, read his

More information

CHAPTER 6: FIRST-ORDER CIRCUITS

CHAPTER 6: FIRST-ORDER CIRCUITS EEE5: CI CUI T THEOY CHAPTE 6: FIST-ODE CICUITS 6. Inroducion This chaper considers L and C circuis. Applying he Kirshoff s law o C and L circuis produces differenial equaions. The differenial equaions

More information