Cryptanalysis of Substitution-Permutation Networks Using Key-Dependent Degeneracy *
|
|
- Brett Neal
- 5 years ago
- Views:
Transcription
1 Cryptnlysis of Substitution-Permuttion Networks Using Key-Dependent Degenercy * Howrd M. Heys Electricl Engineering, Fculty of Engineering nd Applied Science Memoril University of Newfoundlnd St. John s, Newfoundlnd, Cnd A1B 3X5 Stfford E.Tvres Deprtment of Electricl nd Computer Engineering Queen s University Kingston, Ontrio, Cnd K7L 3N6 * This reserch ws supported by the Nturl Sciences nd Engineering Reserch Council of Cnd nd the Telecommunictions Reserch Institute of Ontrio nd ws completed during the first uthor s doctorl studies t Queen s University.
2 Cryptnlysis of Substitution-Permuttion Networks Using Key-Dependent Degenercy Keywords Cryptnlysis, Substitution-Permuttion Network, S-box Abstrct This pper presents novel cryptnlysis of Substitution- Permuttion Networks using chosen plintext pproch. The ttck is bsed on the highly probble occurrence of key-dependent degenercies within the network nd is pplicble regrdless of the method of S-box keying. It is shown tht lrge number of rounds re required before network is resistnt to the ttck. Experimentl results hve found 64-bit networks to be cryptnlyzble for s mny s 8 to 12 rounds depending on the S-box properties. I. Introduction The concept of Substitution-Permuttion Networks (SPNs) for use in block cryptosystem design origintes from the confusion nd diffusion principles introduced by Shnnon [1]. The SPN rchitecture considered in this pper ws first suggested by Feistel [2] nd consists of rounds of non-liner substitutions (S-boxes) connected by bit permuttions. Such cryptosystem structure, referred 1
3 to s LUCIFER 1 by Feistel, is simple, efficient implementtion of Shnnon s concepts. A generl N-bit SPN is composed of R rounds of n 2 n S-boxes. We shll denote the cryptosystem plintext input s P = P 1 :::P N nd the ciphertext output s C = C 1 :::C N. S-boxes in the network re defined s mpping S rs : X rs! Y rs where X rs = X (rs) 1 :::X (rs) n nd Y rs = Y (rs) 1 :::Y (rs) n. The vlue of s identifies the number of the S-box within round r, 1 r R, nd 1 s N=n. A simple exmple of n SPN is illustrted in Figure 1 with N = 16, R = 4, nd n = 4. We shll consider S-boxes tht re keyed using one of the following methods 2 : 1. selection keying: the key bits my be used to select which S-box mpping from set of mppings will be used for prticulr S-box, nd 2. XOR msk keying: the key bits my be exclusive-ored with the network bits prior to entering n S-box. Recent cryptnlysis techniques hve hd notble effect on the perceived security of SPN cryptosystems. For exmple, in [6] nd [7], Bihm nd Shmir introduce powerful chosen plintext cryptnlysis technique referred to s differentil cryptnlysis. Utilizing highly probbly occurrences of differentil sequences, 1 Another vrint of LUCIFER [3] more closely resembles the network structure of DES [4]. 2 Note tht method 2 my ctully be considered s specil cse of method 1. We distinguish between the two methods for clrity. Using method 2 only is wy of ensuring tht mpping for prticulr S-box is selected from the sme cryptogrphic equivlence clss [5]. 2
4 probbilities cn be ssigned to possible key vlues with the most probble key being selected s correct. As well, in [8], Mtsui introduces the known plintext ttck of liner cryptnlysis which mkes use of the likely stisfction of liner equtions involving the plintext, ciphertext, nd key bits. The pplicbility of differentil nd liner cryptnlysis to SPNs is thoroughly discussed in [9]. The cryptnlysis presented in this pper is n efficient technique for determining the network key bits. It uses divide-nd-conquer pproch by exmining the ciphertexts corresponding to number of chosen plintexts nd counting the number of times prticulr sub-key is consistent with key-dependent degenercy in the observed ciphertext. Depending on the number of rounds in the network, the correct sub-key is consistent with significntly higher probbility thn the incorrect sub-keys. II. Terminology The following terminology is fundmentl to the understnding of the cryptnlysis. Degenerte Function: An m-input boolen function, f(x), X = X 1 :::X m, is degenerte function in input X i if chnging X i only does not chnge the function output for ll possible inputs X 2 f0; 1g m. Degenerte Mpping: A m 2 n mpping is degenerte mpping in input X i if chnging X i only does not chnge the mpping output for ll possible inputs 3
5 X 2 f0; 1g m. Trget S-box: A trget S-box is the S-box under exmintion within the network. The cryptnlysis trgets one S-box t time in order to find the key bits ssocited with tht S-box. Trget Sub-Key: The key bits ssocited with the trget S-box re referred to s the trget sub-key. Ciphertext Sub-Block: A ciphertext sub-block is block of n ciphertext bits which re ssocited with prticulr S-box in the lst round of the network. These my or my not be contiguous in the output block depending on whether there is finl permuttion fter the lst round of S-boxes. There re N=n sub-blocks in ciphertext block. Sub-Block Mpping: A sub-block mpping is generted by considering mpping from the n output bits of the trget S-box to n n-bit ciphertext sub-block. A prtil sub-block mpping of dimension m 2 n is mpping from subset of m output bits of the trget S-box to n n-bit ciphertext sub-block. III. Key-Dependent Degenercy The cryptnlysis exploits the highly probble occurrence of degenercy in subblock mppings. In generl, if n n 2 n mpping is rndomly selected, there is non-zero probbility tht it is degenerte. It will be shown tht subblock mppings within the network often hve much higher probbility of 4
6 being degenerte thn tht of rndomly selected mpping. In such cses, by mintining count of the occurrence of such degenercies for ech possible trget sub-key, the correct sub-key cn be derived with high probbility. We refer to the consistent occurrence of degenercy for the correct trget sub-key s keydependent degenercy. Key-dependent degenercy is very high in networks with smll number of rounds nd decreses s the number of S-box rounds is incresed. In the most difficult cryptnlysis scenrio, ech S-box in the network hs number of ssocited key bits tht re independent of the other key bits in the network. The cryptnlysis begins by selecting trget S-box in the first round of the network. An pproprite number of chosen plintexts re selected so tht the trget sub-key my be determined with resonble sttisticl confidence. Subsequently, the remining first round S-boxes re trgeted nd the ssocited key bits determined. Once the first round key is known, the pproprite prtil encryption cn be used in trgeting the second round of S-boxes with chosen inputs. The ttck my proceed by stripping off rounds of S-boxes s their key bits re determined. As the unknown portion of the network decreses in size, the number of required chosen plintexts to discover the trget sub-key decreses significntly. Consider the trget S-box to be in the first round. In generl, n SPN my be represented by the first round S-boxes, the lst round S-boxes, nd n inner network, s in Figure 2. The input nd output to the inner network re denoted by 5
7 U = U 1 :::U N nd V = V 1 :::V N, respectively. The ttck to determine the trget sub-key consists of number of trils, ech tril entiling 2 n chosen plintexts. The plintexts in tril re selected such tht the network inputs which re not inputs to the trget S-box re rbitrrily fixed nd the n inputs to the trget S-box re cycled through ll 2 n possibilities. In this scenrio, the output of the trget S- box forms n n-bit input into N boolen functions corresponding to ech output of the inner network. The n-input boolen function, f i, corresponding to output V i, is rbitrrily determined by the N 0 n fixed inputs of U (coming from the outputs of the non-trget S-boxes). For inner networks with smll enough number of rounds, f i hs significnt probbility of being degenerte in one or more bits. If function f i hs high probbility of being degenerte in prticulr input, U j, then there is high probbility tht ll n inputs to lst round S-box re degenerte in U j s well. When this occurs, the input to the lst round S-box is degenerte mpping from the trget S-box output nd the corresponding subblock mpping from the trget S-box output to the ciphertext sub-block will be degenerte. However, since the trget sub-key is unknown, the outputs of the trget S-box nd, hence, the n inputs to the sub-block mpping re not known. Therefore, there is set of K t possible mppings for ech sub-block where K t represents the number of possible trget sub-key vlues. One of these mppings corresponds to the correct sub-key nd is the ctul sub-block mpping. Ech tril, consisting of 2 n chosen plintexts, my be considered conceptully s 6
8 illustrted in Figure 3. Assume tht the trget sub-key consists of one bit used to select between S-boxes S 0 nd S 00. The output of the trget S-box is mpped to ciphertext sub-block, Z, through S b : Y! Z. There re two possible vlues for S, b denoted S b0 nd S b00, corresponding to S 0 nd S 00 respectively. The ctul mpping of S b corresponding to the correct sub-key is selected rbitrrily for ech tril ccording to the fixed network inputs. The correct sub-key my be deduced by executing severl trils nd counting the number of times S b0 nd S b00 re degenerte. We expect (nd experimentl results confirm) tht the correct subkey will typiclly exhibit mpping degenercies most often. The number of trils (nd hence chosen plintexts) required to determine the sub-key should be enough to llow the degenercy counts to clerly distinguish the correct trget sub-key. Exmple: The trget S-box is selected by key bit to be either S 0 or S 00. The results of one tril re listed in Tble 1: the outputs of one sub-block corresponding to the trget S-box inputs (the remining network inputs hving been rbitrrily fixed) re given long with the possible trget S-box outputs corresponding to S 0 nd S 00. From this informtion, Tble 2 is compiled to conveniently disply sub-block mpping possibilities S b0 nd S b00. It is obvious tht S b0 is degenerte mpping in input Y 3 nd tht S b00 is not degenerte. IV. Enhncement of the Attck Using Prtil Mppings The success of the cryptnlysis cn often be enhnced by considering the 7
9 trget S-box input X 1 X 2 X 3 X 4 S output Y 1 Y 2 Y 3 Y 4 S output Y 1 Y 2 Y 3 Y 4 sub-block output Z 1 Z 2 Z 3 Z Tble 1. Key-Dependent Degenercy Exmple degenercy of prtil outputs of the trget S-box. For exmple, network with S-boxes which displys significnt key-dependent degenercy in the sub-block mpping of the trget S-box output to ciphertext sub-block will lso disply these degenercy trits when considering or sub-block prtil mpping. A prtil mpping is mpping from group of 2 or 3 trget S-box outputs to the ciphertext sub-block. The sme set of chosen plintexts used to 8
10 trget S-box output Y 1 Y 2 Y 3 Y 4 sub-block output for S Z 1 Z 2 Z 3 Z 4 sub-block output for S Z 1 Z 2 Z 3 Z Tble 2. Sub-block Mppings Corresponding to Sub-keys exmine the full sub-block mpping is lso esily nlyzed for degenercies in the prtil mppings. When considering prtil mppings from tril of 16 chosen plintexts, the bits tht re not included s prt of the mpping under exmintion must be fixed. Hence, for ny 3 bits of the trget S-box output, there re two 324 mppings to be exmined: one corresponding to the fourth bit equl to 0 nd one corresponding to 9
11 trget S-box input X 1 X 2 X 3 X 4 S output Y 1 Y 2 Y 3 Y 4 sub-block output Z 1 Z 2 Z 3 Z Tble 3. Prtil Mpping Exmple the fourth bit equl to 1. Since there re four 3 bit groups, over ll 16 trget S-box inputs we hve totl of eight sub-block mppings to consider. Similrly, ech 2 bit combintion of outputs genertes four mppings, corresponding to the four possible vlues of the 3rd nd 4th bits. With six wys of selecting the two outputs to consider from the trget S-box, there re totl of mppings. In generl, for n m-bit prtil output, there re 0 1 n 2 n0m possible m m 2 n mppings to be exmined for degenercy from tril of 2 n plintexts. Exmple: Consider the exmple of Tble 1. A portion of the tble is reproduced in Tble 3 in order to illustrte cse where, if the first 2 inputs to the subblock mpping for S 0 re fixed t Y 1 Y 2 = 10, the sub-block mpping Y 3 Y 4! Z 1 :::Z 4 is degenerte in Y 3. Often, the correct sub-key cn be esily distinguished with fewer plintextciphertext pirs by nlyzing prtil mppings rther thn the full sub-block mpping. Although rndomly selected mppings with fewer inputs hve higher 10
12 probbility of being degenerte, in mny cses the key-dependent degenercy is significnt enough to llow identifiction of the correct key. V. Effectiveness of the Algorithm In generl, it is hrd to derive explicitly the complexity or the probbility of success of the ttck. The effectiveness of the cryptnlysis depends lrgely on the properties of the S-boxes nd the permuttions used. In nlyzing the ttck, it is of interest to determine (1) the likelihood tht different trget sub-keys cnnot be distinguished nd (2) the likelihood of the inner network being degenerte with probbility significntly greter thn is expected for rndomly selected mpping. If we cnnot distinguish between the correct sub-key nd ll incorrect sub-keys or if degenercy occurs with the sme frequency s expected in rndom mpping, then the cryptnlysis will be unsuccessful. Distinguishing Between Keys It is quite possible tht prticulr tril will disply degenercies for the subblock mppings of different sub-keys, one of which my or my not be the correct sub-key. The success of the ttck relies on the correct sub-key displying degenercy more often thn incorrect sub-keys. Assuming tht the probbility of degenercy is lrge nd suitble number of chosen plintexts is vilble, only under exceptionl circumstnces will it be impossible to distinguish between the correct key nd n incorrect key. The reltionship between S-box mppings which 11
13 will llow this to occur nd the subsequent likelihood of rndomly selected S- boxes being indistinguishble is given in the following theorem nd corollry. Theorem 1: Two n 2 n bijective S-boxes, S 0 nd S 00, will be indistinguishble if, nd only if, ech boolen function of S 0 is identicl to boolen function or the complement of boolen function of S 00. Proof (Sketch): Let two functions of S 0 nd S 00 be defined to be similr if they re identicl or one is the complement of the other. occur for the sme input chnges. Chnges in the output of similr functions Assume tht S 0 nd S 00 re relted s stted in the theorem. Then, for ny subset of the function of S 00, ll functions in the subset re similr to output function of S 00 nd since degenercies re detected bsed on chnges in the cipertext sub-block, ny degenercies which re observed cn be ssocited with both S-boxes nd the S-boxes cnnot be distinguished. Consider the cse now where one of the boolen functions of S 0, f i, is not similr to function from S 00. Then in the scenrio where S 0 is used for the cipher nd the sub-block mpping is degenerte in ll inputs other thn the input corresponding to f i, there is no degenercy of S 00 tht is equivlent to this degenercy of S 0 nd the S-boxes cn be distinguished. Hence, in order for S-boxes to be indistinguishble, they must be of the formt suggested by the theorem. 3 12
14 Corollry 1: The probbility of two rndomly selected n 2 n bijective mppings being indistinguishble is given by 2 n n! 2 n! : (1) Proof: The number of possible mppings for S 00 tht re indistinguishble from S 0 is simply given by the number of wys of selecting, for ll n functions of S 0, either the function or its complement nd permuting the n functions within the mpping. This is divided by the number of possible bijective mppings to give (1) bove.3 From Corollry 1, it is pprent tht, if n S-box is keyed by selecting between two rndomly selected mppings nd ssuming sufficient number of chosen plintexts to llow distinguishing, it is very unlikely tht the two S-boxes will be indistinguishble nd it will only occur for the constrictive reltionship of Theorem 1. For exmple, if n = 4, the probbility of two rndomly selected S-boxes being indistinguishble is 1: Degenercy in Rndom Mppings Success of the cryptnlysis requires tht the probbility of degenercy for the full nd prtil sub-block mppings is significntly different thn the degenercy of rndom mpping so tht the correct sub-key is obvious for the number of chosen plintexts vilble. It is of interest therefore to determine the probbility of rndomly selected m 2 n mpping being degenerte. As the number of rounds in 13
15 the network increse, the probbility of degenercy pproches this vlue nd it becomes infesible to distinguish the correct sub-key from wrong sub-keys. Theorem 2: The probbility of rndomly selected m 2 n mpping being degenerte in one or more inputs is given by: X P deg = m m (01) k+1 k k=1 1 P nk (2) where P nk represents the probbility of the mpping being degenerte in k prticulr inputs nd is given by: Y P nk = k (1=2) n12m0i : (3) i=1 Proof: To see how (2) is derived, consider first the probbility of rndom m-input boolen function, f(x 1 ; :::; X m ), being degenerte. Since ech output of the function is independently selected to be either 0 or 1 with probbility of 1/2, the probbility tht chnge in only input X i not cusing chnge in the output over ll X 2 f0; 1g m is given by P 11 = (1=2) 2m01. This is derived by considering 2 m01 pirs of outputs in the truth tble, ech pir corresponding to vlues of X differing in only Xi. The probbility of the function being degenerte in two inputs, Xi nd Xj, is given by the probbility of being degenerte in Xi multiplied by the probbility 14
16 mpping size probbility of degenercy 2x E-03 3x E-05 4x E-10 Tble 4. Probbility of Degenercy for Rndom Mppings of being degenerte in Xj given degenercy in Xi. Given tht the function is degenerte in Xi, since there is no chnge in the output when only Xi chnges, we need only consider hlf the function output vlues (for exmple, when Xi = 0). Hence, if the function is to be degenerte in Xj given tht it is lredy degenerte in Xi, there re only 2 m01 =2 cses for which chnge in only input Xj must not chnge the output. Therefore, the probbility of the function being degenerte in two prticulr input bits is given by P12 = (1=2) 2m01 1 (1=2) 2m02. The remining cses for degenercy in more thn two inputs cn be derived similrly nd in generl Y P1k = k (1=2) 2m0i : i=1 Considering now the rndom m 2 n mpping, since ll output functions of the mpping re independent, the probbility of ll n outputs being degenerte in k prticulr inputs is given by (3). Using the principle of inclusion-exclusion from set theory [10] nd noting the symmetric nture of the degenercy, the probbility of the m2n mpping being degenerte in one or more inputs is simply given by (2). 3 15
17 stge r stge r stge r stge r stge r stge r stge r stge r Tble 5. Permuttion Used in 64x64 SPN Experiments The probbility of degenercy for different size mppings is given in Tble 4. VI. Experimentl Results This section highlights some of the results of the cryptnlysis pplied to different SPNs. We nlyzed network comprised of S-boxes nd permuttion, listed in Tble 5, selected from the clss of permuttions suggested by Ayoub [11]. Two types of networks were nlyzed: one using S-boxes rbitrrily selected from the rows of the Dt Encryption Stndrd (DES) S-boxes [4] nd one using rndomly selected bijective, non-degenerte S-boxes. A set of 16 S- boxes ws selected for ech network nd used in ll rounds. XOR msk keying ws used for ech round with the key bits rndomly selected. Experimentl results were compiled for nd sub-block mppings. A lrge number of trils ws executed for ech network nd the probbility of degenercy, P deg, ws determined s function of the number of rounds for SPNs 16
18 4 x 4 Sub-block Mpping 2 x 4 Sub-block Mpping DES Rndom DES Rndom Round Boxes S-boxes S-boxes S-boxes x x < 6.25 x x x < 6.25 x x x x < 6.25 x x x x < 6.25 x x < 6.25 x x < 6.25 x x < 6.25 x x 10-3 Tble 6. Experimentl Degenercy Probbilities with DES S-boxes nd rndom S-boxes. In Figure 4 the mesured degenercy probbilities for the full nd the prtil mppings of vrious size networks re compred to the vlues expected for rndom mpping from Tble 4. As well, the experimentl vlues re tbulted in Tble 6. The generl trend of convergence towrds the rndom mpping vlues is evident in both network types. However, it is lso cler tht the network utilizing DES S-boxes pproches the desired symptote much more quickly thn the rndomly selected S-boxes. Intuitively, this is likely due to the strong diffusion properties of the DES S-boxes. In prticulr, the property tht, for single input bit chnge, t lest two output 17
19 bits chnge is very useful in diffusing chnges through the network nd thereby minimizing degenercies. This property is unlikely to occur in rndomly selected S-boxes nd, therefore, it is not surprising tht the frequency of key-dependent degenercy is higher in networks where the S-boxes re simply rndomly selected. Consider the number of chosen plintexts required to determine first round trget sub-key using the full n 2 n sub-block mpping. We cn expect the number of sub-block mppings which must be nlyzed before observing degenercy to be given by 1=P deg. In cses where degenercy occurs with much higher probbility thn expected for rndom mppings, it will typiclly tke only few occurrences of degenercy to estblish the correct key. Considering tht nlyzing sub-block mpping requires 2 n chosen plintexts nd tht there re N=n subblocks to be exmined for every ciphertext block, we cn determine the number of plintexts required to revel first round trget sub-key to be on the order of the nerest multiple of N=n bove 8 2 n = 2 P deg 1 (N=n) 39. (Rounding up to the multiple of N=n is necessry since we cnnot consider only prt of ciphertext block.) For exmple, bsed on n nlysis of the full sub-block mppings nd the experimentlly determined P deg, 6 round network with DES S-boxes requires on the order of 784 plintexts nd n 8 round network with rndom S-boxes requires on the order of 384 plintexts. Networks with DES S-boxes composed of 5 or less rounds nd networks with rndom S-boxes composed of 6 or less rounds only require on the order of 16 chosen plintexts to determine 18
20 the trget sub-key. In prctice, using prtil mppings often requires fewer chosen plintexts, prticulrly when P deg becomes smll. Figure 5 illustrtes typicl key counts for n 6 round DES network nd n 8 round rndom S-box network bsed on 224 prtil mpping key-dependent degenercy. In both cses, it is pprent tht, with 160 chosen plintexts, the correct trget sub-key is clerly distinguishble. If the probbility of degenercy pproches the probbilities listed in Tble 4, it might tke mny times more thn one degenercy occurrence to clerly distinguish the correct key. For exmple, nlyzing prtil mppings, it ws found tht the correct trget sub-key ws determined in 7 of 8 experiments, ech experiment using 1.6 million chosen plintexts, for the 8 round network using DES S-boxes. Similrly, it tkes on the order of 1.6 million chosen plintexts to distinguish the correct trget sub-key for the 12 round network with rndom S-boxes. VII. Applicbility of the Attck Thwrting the Attck There re number of wys to minimize the impct of the ttck. The rpid diffusion or vlnche of bit chnges is effective in decresing the probbility of degenercies occurring. There re severl techniques tht cn be used to improve the diffusion in n SPN. These include: (1) using lrger S-boxes 19
21 (2) using S-boxes with good diffusion, nd (3) using diffusive liner trnsformtion (LT) s the interconnection between rounds of S-boxes. The effect on the degenercy probbility s function of the number of rounds in the network is illustrted in Figure 6. Experimentl results re presented for rndomly selected nd S-boxes, s well s for S-boxes with good diffusion nd diffusive liner trnsformtion (LT). Note, in prticulr, the drmtic effect of the diffusive liner trnsformtion. S-boxes which hve good diffusion re cpble of tking smll input chnges nd converting these to lrger number of output chnges. The S-boxes used in Figure 6 gurntee tht one bit input chnge will result in n output chnge of t lest two bits. A diffusive liner trnsformtion cn be generted by hving ech input to round of S-boxes be determined by the sum of number of output bits from the previous round output. For exmple, the liner trnsformtion used in Figure 6 is derived by dding prity bit to ech bit fter pplying the permuttion of Tble 5 where the prity bit consists of the XOR sum of ll bits. It should lso be noted tht compring the degenercy probbilities of the networks bsed on nd S-boxes is somewht misleding since the expected degenercy probbilities for rndom nd mppings re different 0 7: nd 1: ; respectively 1. However, for networks with 20
22 smll number of rounds, both rndom degenercy probbilities re much smller thn the experimentl probbilities nd, hence, my be considered to be negligible. In this cse, it is cler tht the degenercy probbilities for the SPN using S-boxes re much smller nd therefore more chosen plintexts re required to successfully cryptnlyze by exploiting key-dependent degenercy. Appliction of Attck to DES In n ttempt to determine the effectiveness of the ttck on the Dt Encryption Stndrd, we rn extensive simultions of the ttck on DES. It ws found tht no degenercy could be detected beyond 4 or 5 rounds, suggesting tht DES is very resistnt to this form of cryptnlysis. Other cryptnlysis techniques, such s differentil or liner cryptnlysis, hve been much more successful ginst DES. This result is not surprising in light of the good diffusion chrcteristics of DES. For exmple, DES S-boxes hve good diffusion of bit chnges (since one bit input chnge must result in t lest two bit output chnge) nd the effects of bit chnges re spred to lrge number of S-boxes in the next round due to the expnsion opertion nd the symmetric S-boxes. Comprison to Differentil Cryptnlysis Cryptnlysis of SPNs using key-dependent degenercies tkes dvntge of the 21
23 weknesses in the dynmic properties of ciphers. These weknesses cn lso be typiclly exploited by differentil cryptnlysis. It is difficult to directly compre the effectiveness of the two ttcks since the exct complexity of both ttcks is difficult to determine. Differentil cryptnlysis, for exmple, requires knowledge of highly probble chrcteristic in order to estimte the complexity of the ttck. We hve found, however, tht cryptnlysis using key-dependent degenercy cn be successful on networks of mny rounds nd the pproch is very systemtic nd involves no detiled nlysis of the SPN before execution. Conversely, while it is likely tht differentil cryptnlysis could be successful on SPNs of mny rounds, performing the ttck requires creful nlysis of the difference distributions of the S-boxes in order to determine the most probble chrcteristics tht my be used in executing the ttck. This is not necessrily simple process nd it is conceivble tht it could mke differentil cryptnlysis much more difficult to implement. VIII. Conclusion We hve presented novel cryptnlysis of n importnt clss of privte key block cryptosystems referred to s Substitution-Permuttion Networks. The ttck exploits the likely occurrence of key-dependent degenercy within the network to determine trget sub-keys ssocited with individul S-boxes. Experimentl 22
24 results indicte tht the cryptnlysis is very effective on networks up to lrge number of rounds. As well, it is noted tht strong S-box diffusion, s in the DES S-boxes, hs significnt effect on minimizing the success of the ttck s the number of rounds in the network is incresed. 23
25 References 1. C.E. Shnnon, Communiction theory of secrecy systems, Bell System Technicl Journl, vol. 28, pp , H. Feistel, Cryptogrphy nd computer privcy, Scientific Americn, vol. 228, no.5, pp , A. Sorkin, Lucifer: A cryptogrphic lgorithm, Cryptologi, vol. 8, no. 1, pp , Ntionl Bureu of Stndrds, Dt Encryption Stndrd (DES), Federl Informtion Processing Stndrd Publiction 46, M. Sivbln, S.E. Tvres, nd L. E. Pepprd, On the design of SP networks from n informtion theoretic point of view, Advnces in Cryptology: Proceedings of CRYPTO 92, Springer-Verlg, Berlin, pp , E. Bihm nd A. Shmir, Differentil cryptnlysis of DES-like cryptosystems, Journl of Cryptology, vol. 4, no. 1, pp. 3 72, E. Bihm nd A. Shmir, Differentil cryptnlysis of Snefru, Khfre, REDOC-II, LOKI, nd Lucifer, Advnces in Cryptology: Proceedings of CRYPTO 91, Springer-Verlg, Berlin, pp , M. Mtsui, Liner cryptnlysis method for DES cipher, Advnces in Cryptology: Proceedings of EUROCRYPT 93, Springer-Verlg, Berlin, pp ,
26 9. H. M. Heys nd S. E. Tvres, Substitution-Permuttion Networks Resistnt to Differentil nd Liner Cryptnlysis, to pper in Journl of Cryptology, L. J. O Connor, The Inclusion-Exclusion Principle nd Its Applictions to Cryptogrphy Cryptologi, vol. 17, no. 1, pp , F. Ayoub, The design of complete encryption networks using cryptogrphiclly equivlent permuttions, Computers nd Security, vol. 2, pp ,
27 input P... P 1 16 S 11 S 12 S 13 S 14 S 21 S 22 S 23 S 24 S 31 S 32 S 33 S 34 S 41 S 42 S 43 S 44 C... C 1 16 output Figure 1. SPN with N = 16, R = 4, nd n = 4 X 1 X n S / S Trget S-box Y 1 Y n S Sub-block Mpping Z 1 Z n Figure 2. SPN Model Used in Attck 26
28 X 1 X n S / S Trget S-box Y 1 Y n S Sub-block Mpping Z 1 Z n Figure 3. Sub-block Mpping Model X 1 X n S / S Trget S-box Y 1 Y n S Sub-block Mpping Z 1 Z n Figure 4. Experimentl Degenercy Probbilities 27
29 Count 6 Round SPN with DES S-boxes 2x4 Mpping, 160 Chosen Plintexts Key = A A B C D E F Trget Sub-Key Count Round SPN with Rndom S-boxes 2x4 Mpping, 160 Chosen Plintexts Key = A A B C D E F Trget Sub-Key Figure 5. Typicl Key Counts 28
30 References [1] C. E. Shnnon, Communiction theory of secrecy systems, Bell System Technicl Journl, vol. 28, pp , [2] H. Feistel, Cryptogrphy nd computer privcy, Scientific Americn, vol. 228, no. 5, pp , [3] A. Sorkin, Lucifer: A cryptogrphic lgorithm, Cryptologi, vol. 8, no. 1, pp , [4] Ntionl_Bureu_of_Stndrds, Dt Encryption Stndrd (DES), Federl Informtion Processing Stndrd Publiction 46, [5] M. Sivbln, S. E. Tvres, nd L. E. Pepprd, On the design of SP networks from n informtion theoretic point of view, Advnces in Cryptology: Proceedings of CRYPTO 92, Springer-Verlg, Berlin, pp ,
New data structures to reduce data size and search time
New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute
More information1 Online Learning and Regret Minimization
2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in
More informationRecitation 3: More Applications of the Derivative
Mth 1c TA: Pdric Brtlett Recittion 3: More Applictions of the Derivtive Week 3 Cltech 2012 1 Rndom Question Question 1 A grph consists of the following: A set V of vertices. A set E of edges where ech
More informationMath 1B, lecture 4: Error bounds for numerical methods
Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the
More informationThe Regulated and Riemann Integrals
Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue
More informationThe steps of the hypothesis test
ttisticl Methods I (EXT 7005) Pge 78 Mosquito species Time of dy A B C Mid morning 0.0088 5.4900 5.5000 Mid Afternoon.3400 0.0300 0.8700 Dusk 0.600 5.400 3.000 The Chi squre test sttistic is the sum of
More informationp-adic Egyptian Fractions
p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction
More informationMath 8 Winter 2015 Applications of Integration
Mth 8 Winter 205 Applictions of Integrtion Here re few importnt pplictions of integrtion. The pplictions you my see on n exm in this course include only the Net Chnge Theorem (which is relly just the Fundmentl
More informationCS667 Lecture 6: Monte Carlo Integration 02/10/05
CS667 Lecture 6: Monte Crlo Integrtion 02/10/05 Venkt Krishnrj Lecturer: Steve Mrschner 1 Ide The min ide of Monte Crlo Integrtion is tht we cn estimte the vlue of n integrl by looking t lrge number of
More informationDuality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.
Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we
More informationAPPROXIMATE INTEGRATION
APPROXIMATE INTEGRATION. Introduction We hve seen tht there re functions whose nti-derivtives cnnot be expressed in closed form. For these resons ny definite integrl involving these integrnds cnnot be
More informationState space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies
Stte spce systems nlysis (continued) Stbility A. Definitions A system is sid to be Asymptoticlly Stble (AS) when it stisfies ut () = 0, t > 0 lim xt () 0. t A system is AS if nd only if the impulse response
More informationNew Expansion and Infinite Series
Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University
More informationHow to simulate Turing machines by invertible one-dimensional cellular automata
How to simulte Turing mchines by invertible one-dimensionl cellulr utomt Jen-Christophe Dubcq Déprtement de Mthémtiques et d Informtique, École Normle Supérieure de Lyon, 46, llée d Itlie, 69364 Lyon Cedex
More informationNumerical integration
2 Numericl integrtion This is pge i Printer: Opque this 2. Introduction Numericl integrtion is problem tht is prt of mny problems in the economics nd econometrics literture. The orgniztion of this chpter
More informationChapter 4 Contravariance, Covariance, and Spacetime Diagrams
Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz
More informationRiemann is the Mann! (But Lebesgue may besgue to differ.)
Riemnn is the Mnn! (But Lebesgue my besgue to differ.) Leo Livshits My 2, 2008 1 For finite intervls in R We hve seen in clss tht every continuous function f : [, b] R hs the property tht for every ɛ >
More informationThe First Fundamental Theorem of Calculus. If f(x) is continuous on [a, b] and F (x) is any antiderivative. f(x) dx = F (b) F (a).
The Fundmentl Theorems of Clculus Mth 4, Section 0, Spring 009 We now know enough bout definite integrls to give precise formultions of the Fundmentl Theorems of Clculus. We will lso look t some bsic emples
More informationMapping the delta function and other Radon measures
Mpping the delt function nd other Rdon mesures Notes for Mth583A, Fll 2008 November 25, 2008 Rdon mesures Consider continuous function f on the rel line with sclr vlues. It is sid to hve bounded support
More informationTests for the Ratio of Two Poisson Rates
Chpter 437 Tests for the Rtio of Two Poisson Rtes Introduction The Poisson probbility lw gives the probbility distribution of the number of events occurring in specified intervl of time or spce. The Poisson
More informationNon-Linear & Logistic Regression
Non-Liner & Logistic Regression If the sttistics re boring, then you've got the wrong numbers. Edwrd R. Tufte (Sttistics Professor, Yle University) Regression Anlyses When do we use these? PART 1: find
More informationIntuitionistic Fuzzy Lattices and Intuitionistic Fuzzy Boolean Algebras
Intuitionistic Fuzzy Lttices nd Intuitionistic Fuzzy oolen Algebrs.K. Tripthy #1, M.K. Stpthy *2 nd P.K.Choudhury ##3 # School of Computing Science nd Engineering VIT University Vellore-632014, TN, Indi
More informationChapter 0. What is the Lebesgue integral about?
Chpter 0. Wht is the Lebesgue integrl bout? The pln is to hve tutoril sheet ech week, most often on Fridy, (to be done during the clss) where you will try to get used to the ides introduced in the previous
More informationAn approximation to the arithmetic-geometric mean. G.J.O. Jameson, Math. Gazette 98 (2014), 85 95
An pproximtion to the rithmetic-geometric men G.J.O. Jmeson, Mth. Gzette 98 (4), 85 95 Given positive numbers > b, consider the itertion given by =, b = b nd n+ = ( n + b n ), b n+ = ( n b n ) /. At ech
More informationAdvanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004
Advnced Clculus: MATH 410 Notes on Integrls nd Integrbility Professor Dvid Levermore 17 October 2004 1. Definite Integrls In this section we revisit the definite integrl tht you were introduced to when
More informationADVANCEMENT OF THE CLOSELY COUPLED PROBES POTENTIAL DROP TECHNIQUE FOR NDE OF SURFACE CRACKS
ADVANCEMENT OF THE CLOSELY COUPLED PROBES POTENTIAL DROP TECHNIQUE FOR NDE OF SURFACE CRACKS F. Tkeo 1 nd M. Sk 1 Hchinohe Ntionl College of Technology, Hchinohe, Jpn; Tohoku University, Sendi, Jpn Abstrct:
More informationSUMMER KNOWHOW STUDY AND LEARNING CENTRE
SUMMER KNOWHOW STUDY AND LEARNING CENTRE Indices & Logrithms 2 Contents Indices.2 Frctionl Indices.4 Logrithms 6 Exponentil equtions. Simplifying Surds 13 Opertions on Surds..16 Scientific Nottion..18
More information7.2 The Definite Integral
7.2 The Definite Integrl the definite integrl In the previous section, it ws found tht if function f is continuous nd nonnegtive, then the re under the grph of f on [, b] is given by F (b) F (), where
More informationBernoulli Numbers Jeff Morton
Bernoulli Numbers Jeff Morton. We re interested in the opertor e t k d k t k, which is to sy k tk. Applying this to some function f E to get e t f d k k tk d k f f + d k k tk dk f, we note tht since f
More informationNUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by.
NUMERICAL INTEGRATION 1 Introduction The inverse process to differentition in clculus is integrtion. Mthemticlly, integrtion is represented by f(x) dx which stnds for the integrl of the function f(x) with
More information4.4 Areas, Integrals and Antiderivatives
. res, integrls nd ntiderivtives 333. Ares, Integrls nd Antiderivtives This section explores properties of functions defined s res nd exmines some connections mong res, integrls nd ntiderivtives. In order
More informationReview of Calculus, cont d
Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some
More informationECO 317 Economics of Uncertainty Fall Term 2007 Notes for lectures 4. Stochastic Dominance
Generl structure ECO 37 Economics of Uncertinty Fll Term 007 Notes for lectures 4. Stochstic Dominnce Here we suppose tht the consequences re welth mounts denoted by W, which cn tke on ny vlue between
More informationW. We shall do so one by one, starting with I 1, and we shall do it greedily, trying
Vitli covers 1 Definition. A Vitli cover of set E R is set V of closed intervls with positive length so tht, for every δ > 0 nd every x E, there is some I V with λ(i ) < δ nd x I. 2 Lemm (Vitli covering)
More information5.7 Improper Integrals
458 pplictions of definite integrls 5.7 Improper Integrls In Section 5.4, we computed the work required to lift pylod of mss m from the surfce of moon of mss nd rdius R to height H bove the surfce of the
More informationReversals of Signal-Posterior Monotonicity for Any Bounded Prior
Reversls of Signl-Posterior Monotonicity for Any Bounded Prior Christopher P. Chmbers Pul J. Hely Abstrct Pul Milgrom (The Bell Journl of Economics, 12(2): 380 391) showed tht if the strict monotone likelihood
More information8 Laplace s Method and Local Limit Theorems
8 Lplce s Method nd Locl Limit Theorems 8. Fourier Anlysis in Higher DImensions Most of the theorems of Fourier nlysis tht we hve proved hve nturl generliztions to higher dimensions, nd these cn be proved
More informationProperties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives
Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn
More informationBy Ken Standfield, Director Research & Development, KNOWCORP
1 THE NORMAL DISTRIBUTION METHOD ARTICLE NO.: 10080 By Ken Stndfield, Director Reserch & Development, KNOWCORP http://www.knowcorp.com Emil: ks@knowcorp.com INTRODUCTION The following methods hve been
More informationAcceptance Sampling by Attributes
Introduction Acceptnce Smpling by Attributes Acceptnce smpling is concerned with inspection nd decision mking regrding products. Three spects of smpling re importnt: o Involves rndom smpling of n entire
More information1B40 Practical Skills
B40 Prcticl Skills Comining uncertinties from severl quntities error propgtion We usully encounter situtions where the result of n experiment is given in terms of two (or more) quntities. We then need
More informationMath 31S. Rumbos Fall Solutions to Assignment #16
Mth 31S. Rumbos Fll 2016 1 Solutions to Assignment #16 1. Logistic Growth 1. Suppose tht the growth of certin niml popultion is governed by the differentil eqution 1000 dn N dt = 100 N, (1) where N(t)
More informationTheoretical foundations of Gaussian quadrature
Theoreticl foundtions of Gussin qudrture 1 Inner product vector spce Definition 1. A vector spce (or liner spce) is set V = {u, v, w,...} in which the following two opertions re defined: (A) Addition of
More informationChapter 14. Matrix Representations of Linear Transformations
Chpter 4 Mtrix Representtions of Liner Trnsformtions When considering the Het Stte Evolution, we found tht we could describe this process using multipliction by mtrix. This ws nice becuse computers cn
More informationLecture 20: Numerical Integration III
cs4: introduction to numericl nlysis /8/0 Lecture 0: Numericl Integrtion III Instructor: Professor Amos Ron Scribes: Mrk Cowlishw, Yunpeng Li, Nthnel Fillmore For the lst few lectures we hve discussed
More information12 TRANSFORMING BIVARIATE DENSITY FUNCTIONS
1 TRANSFORMING BIVARIATE DENSITY FUNCTIONS Hving seen how to trnsform the probbility density functions ssocited with single rndom vrible, the next logicl step is to see how to trnsform bivrite probbility
More informationP 3 (x) = f(0) + f (0)x + f (0) 2. x 2 + f (0) . In the problem set, you are asked to show, in general, the n th order term is a n = f (n) (0)
1 Tylor polynomils In Section 3.5, we discussed how to pproximte function f(x) round point in terms of its first derivtive f (x) evluted t, tht is using the liner pproximtion f() + f ()(x ). We clled this
More informationPhysics 116C Solution of inhomogeneous ordinary differential equations using Green s functions
Physics 6C Solution of inhomogeneous ordinry differentil equtions using Green s functions Peter Young November 5, 29 Homogeneous Equtions We hve studied, especilly in long HW problem, second order liner
More informationLecture 7 notes Nodal Analysis
Lecture 7 notes Nodl Anlysis Generl Network Anlysis In mny cses you hve multiple unknowns in circuit, sy the voltges cross multiple resistors. Network nlysis is systemtic wy to generte multiple equtions
More informationCMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature
CMDA 4604: Intermedite Topics in Mthemticl Modeling Lecture 19: Interpoltion nd Qudrture In this lecture we mke brief diversion into the res of interpoltion nd qudrture. Given function f C[, b], we sy
More informationLinks Between Differential and Linear Cryptanalysis
Links Between Differentil nd Liner Cryptnlysis Florent Chbud * Florent.Chbud@ens.fr Serge Vudeny Serge.Vndeny@ens.fr Lbortoire d'informtique de I'ENS ** 45, rue d'ulm 75230 Pris Cedex 05 FRANCE Abstrct.
More informationStudent Activity 3: Single Factor ANOVA
MATH 40 Student Activity 3: Single Fctor ANOVA Some Bsic Concepts In designed experiment, two or more tretments, or combintions of tretments, is pplied to experimentl units The number of tretments, whether
More informationMath 61CM - Solutions to homework 9
Mth 61CM - Solutions to homework 9 Cédric De Groote November 30 th, 2018 Problem 1: Recll tht the left limit of function f t point c is defined s follows: lim f(x) = l x c if for ny > 0 there exists δ
More informationEuler, Ioachimescu and the trapezium rule. G.J.O. Jameson (Math. Gazette 96 (2012), )
Euler, Iochimescu nd the trpezium rule G.J.O. Jmeson (Mth. Gzette 96 (0), 36 4) The following results were estblished in recent Gzette rticle [, Theorems, 3, 4]. Given > 0 nd 0 < s
More informationMarkscheme May 2016 Mathematics Standard level Paper 1
M6/5/MATME/SP/ENG/TZ/XX/M Mrkscheme My 06 Mthemtics Stndrd level Pper 7 pges M6/5/MATME/SP/ENG/TZ/XX/M This mrkscheme is the property of the Interntionl Bcclurete nd must not be reproduced or distributed
More informationContinuous Random Variables
STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 217 Néhémy Lim Continuous Rndom Vribles Nottion. The indictor function of set S is rel-vlued function defined by : { 1 if x S 1 S (x) if x S Suppose tht
More informationFig. 1. Open-Loop and Closed-Loop Systems with Plant Variations
ME 3600 Control ystems Chrcteristics of Open-Loop nd Closed-Loop ystems Importnt Control ystem Chrcteristics o ensitivity of system response to prmetric vritions cn be reduced o rnsient nd stedy-stte responses
More informationGeneralized Fano and non-fano networks
Generlized Fno nd non-fno networks Nildri Ds nd Brijesh Kumr Ri Deprtment of Electronics nd Electricl Engineering Indin Institute of Technology Guwhti, Guwhti, Assm, Indi Emil: {d.nildri, bkri}@iitg.ernet.in
More informationAQA Further Pure 1. Complex Numbers. Section 1: Introduction to Complex Numbers. The number system
Complex Numbers Section 1: Introduction to Complex Numbers Notes nd Exmples These notes contin subsections on The number system Adding nd subtrcting complex numbers Multiplying complex numbers Complex
More informationSection 14.3 Arc Length and Curvature
Section 4.3 Arc Length nd Curvture Clculus on Curves in Spce In this section, we ly the foundtions for describing the movement of n object in spce.. Vector Function Bsics In Clc, formul for rc length in
More informationTHE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.
THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem
More informationImproper Integrals. Type I Improper Integrals How do we evaluate an integral such as
Improper Integrls Two different types of integrls cn qulify s improper. The first type of improper integrl (which we will refer to s Type I) involves evluting n integrl over n infinite region. In the grph
More informationOn the Uncertainty of Sensors Based on Magnetic Effects. E. Hristoforou, E. Kayafas, A. Ktena, DM Kepaptsoglou
On the Uncertinty of Sensors Bsed on Mgnetic Effects E. ristoforou, E. Kyfs, A. Kten, DM Kepptsoglou Ntionl Technicl University of Athens, Zogrfou Cmpus, Athens 1578, Greece Tel: +3177178, Fx: +3177119,
More informationI1 = I2 I1 = I2 + I3 I1 + I2 = I3 + I4 I 3
2 The Prllel Circuit Electric Circuits: Figure 2- elow show ttery nd multiple resistors rrnged in prllel. Ech resistor receives portion of the current from the ttery sed on its resistnce. The split is
More informationMatrix Solution to Linear Equations and Markov Chains
Trding Systems nd Methods, Fifth Edition By Perry J. Kufmn Copyright 2005, 2013 by Perry J. Kufmn APPENDIX 2 Mtrix Solution to Liner Equtions nd Mrkov Chins DIRECT SOLUTION AND CONVERGENCE METHOD Before
More informationMath& 152 Section Integration by Parts
Mth& 5 Section 7. - Integrtion by Prts Integrtion by prts is rule tht trnsforms the integrl of the product of two functions into other (idelly simpler) integrls. Recll from Clculus I tht given two differentible
More informationMath 520 Final Exam Topic Outline Sections 1 3 (Xiao/Dumas/Liaw) Spring 2008
Mth 520 Finl Exm Topic Outline Sections 1 3 (Xio/Dums/Liw) Spring 2008 The finl exm will be held on Tuesdy, My 13, 2-5pm in 117 McMilln Wht will be covered The finl exm will cover the mteril from ll of
More informationA REVIEW OF CALCULUS CONCEPTS FOR JDEP 384H. Thomas Shores Department of Mathematics University of Nebraska Spring 2007
A REVIEW OF CALCULUS CONCEPTS FOR JDEP 384H Thoms Shores Deprtment of Mthemtics University of Nebrsk Spring 2007 Contents Rtes of Chnge nd Derivtives 1 Dierentils 4 Are nd Integrls 5 Multivrite Clculus
More informationSongklanakarin Journal of Science and Technology SJST R1 Thongchan. A Modified Hyperbolic Secant Distribution
A Modified Hyperbolic Secnt Distribution Journl: Songklnkrin Journl of Science nd Technology Mnuscript ID SJST-0-0.R Mnuscript Type: Originl Article Dte Submitted by the Author: 0-Mr-0 Complete List of
More informationDriving Cycle Construction of City Road for Hybrid Bus Based on Markov Process Deng Pan1, a, Fengchun Sun1,b*, Hongwen He1, c, Jiankun Peng1, d
Interntionl Industril Informtics nd Computer Engineering Conference (IIICEC 15) Driving Cycle Construction of City Rod for Hybrid Bus Bsed on Mrkov Process Deng Pn1,, Fengchun Sun1,b*, Hongwen He1, c,
More informationJim Lambers MAT 169 Fall Semester Lecture 4 Notes
Jim Lmbers MAT 169 Fll Semester 2009-10 Lecture 4 Notes These notes correspond to Section 8.2 in the text. Series Wht is Series? An infinte series, usully referred to simply s series, is n sum of ll of
More informationJin-Fu Li. Department of Electrical Engineering National Central University Jhongli, Taiwan
Trnsprent BIST for RAMs Jin-Fu Li Advnced d Relible Systems (ARES) Lb. Deprtment of Electricl Engineering Ntionl Centrl University Jhongli, Tiwn Outline Introduction Concept of Trnsprent Test Trnsprent
More informationCzechoslovak Mathematical Journal, 55 (130) (2005), , Abbotsford. 1. Introduction
Czechoslovk Mthemticl Journl, 55 (130) (2005), 933 940 ESTIMATES OF THE REMAINDER IN TAYLOR S THEOREM USING THE HENSTOCK-KURZWEIL INTEGRAL, Abbotsford (Received Jnury 22, 2003) Abstrct. When rel-vlued
More informationCS 188 Introduction to Artificial Intelligence Fall 2018 Note 7
CS 188 Introduction to Artificil Intelligence Fll 2018 Note 7 These lecture notes re hevily bsed on notes originlly written by Nikhil Shrm. Decision Networks In the third note, we lerned bout gme trees
More informationBases for Vector Spaces
Bses for Vector Spces 2-26-25 A set is independent if, roughly speking, there is no redundncy in the set: You cn t uild ny vector in the set s liner comintion of the others A set spns if you cn uild everything
More informationUnit 1 Exponentials and Logarithms
HARTFIELD PRECALCULUS UNIT 1 NOTES PAGE 1 Unit 1 Eponentils nd Logrithms (2) Eponentil Functions (3) The number e (4) Logrithms (5) Specil Logrithms (7) Chnge of Bse Formul (8) Logrithmic Functions (10)
More informationCredibility Hypothesis Testing of Fuzzy Triangular Distributions
666663 Journl of Uncertin Systems Vol.9, No., pp.6-74, 5 Online t: www.jus.org.uk Credibility Hypothesis Testing of Fuzzy Tringulr Distributions S. Smpth, B. Rmy Received April 3; Revised 4 April 4 Abstrct
More informationChapter 5 : Continuous Random Variables
STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 216 Néhémy Lim Chpter 5 : Continuous Rndom Vribles Nottions. N {, 1, 2,...}, set of nturl numbers (i.e. ll nonnegtive integers); N {1, 2,...}, set of ll
More informationDISCRETE MATHEMATICS HOMEWORK 3 SOLUTIONS
DISCRETE MATHEMATICS 21228 HOMEWORK 3 SOLUTIONS JC Due in clss Wednesdy September 17. You my collborte but must write up your solutions by yourself. Lte homework will not be ccepted. Homework must either
More informationLecture 3 ( ) (translated and slightly adapted from lecture notes by Martin Klazar)
Lecture 3 (5.3.2018) (trnslted nd slightly dpted from lecture notes by Mrtin Klzr) Riemnn integrl Now we define precisely the concept of the re, in prticulr, the re of figure U(, b, f) under the grph of
More informationA Direct Transformation of a Matrix Spectrum
dvnces in Liner lgebr & Mtri heory 05 5 09-8 Published Online September 05 in SciRes. http://www.scirp.org/journl/lmt http://d.doi.org/0.46/lmt.05.50 Direct rnsformtion of Mtri Spectrum lbert Iskhkov Sergey
More informationA Modified ADM for Solving Systems of Linear Fredholm Integral Equations of the Second Kind
Applied Mthemticl Sciences, Vol. 6, 2012, no. 26, 1267-1273 A Modified ADM for Solving Systems of Liner Fredholm Integrl Equtions of the Second Kind A. R. Vhidi nd T. Dmercheli Deprtment of Mthemtics,
More informationVyacheslav Telnin. Search for New Numbers.
Vycheslv Telnin Serch for New Numbers. 1 CHAPTER I 2 I.1 Introduction. In 1984, in the first issue for tht yer of the Science nd Life mgzine, I red the rticle "Non-Stndrd Anlysis" by V. Uspensky, in which
More informationMath 131. Numerical Integration Larson Section 4.6
Mth. Numericl Integrtion Lrson Section. This section looks t couple of methods for pproimting definite integrls numericlly. The gol is to get good pproimtion of the definite integrl in problems where n
More informationMATH34032: Green s Functions, Integral Equations and the Calculus of Variations 1
MATH34032: Green s Functions, Integrl Equtions nd the Clculus of Vritions 1 Section 1 Function spces nd opertors Here we gives some brief detils nd definitions, prticulrly relting to opertors. For further
More informationReview of Gaussian Quadrature method
Review of Gussin Qudrture method Nsser M. Asi Spring 006 compiled on Sundy Decemer 1, 017 t 09:1 PM 1 The prolem To find numericl vlue for the integrl of rel vlued function of rel vrile over specific rnge
More informationJournal of Inequalities in Pure and Applied Mathematics
Journl of Inequlities in Pure nd Applied Mthemtics MOMENTS INEQUALITIES OF A RANDOM VARIABLE DEFINED OVER A FINITE INTERVAL PRANESH KUMAR Deprtment of Mthemtics & Computer Science University of Northern
More informationf(x) dx, If one of these two conditions is not met, we call the integral improper. Our usual definition for the value for the definite integral
Improper Integrls Every time tht we hve evluted definite integrl such s f(x) dx, we hve mde two implicit ssumptions bout the integrl:. The intervl [, b] is finite, nd. f(x) is continuous on [, b]. If one
More informationFrobenius numbers of generalized Fibonacci semigroups
Frobenius numbers of generlized Fiboncci semigroups Gretchen L. Mtthews 1 Deprtment of Mthemticl Sciences, Clemson University, Clemson, SC 29634-0975, USA gmtthe@clemson.edu Received:, Accepted:, Published:
More informationLecture 3. In this lecture, we will discuss algorithms for solving systems of linear equations.
Lecture 3 3 Solving liner equtions In this lecture we will discuss lgorithms for solving systems of liner equtions Multiplictive identity Let us restrict ourselves to considering squre mtrices since one
More information1.9 C 2 inner variations
46 CHAPTER 1. INDIRECT METHODS 1.9 C 2 inner vritions So fr, we hve restricted ttention to liner vritions. These re vritions of the form vx; ǫ = ux + ǫφx where φ is in some liner perturbtion clss P, for
More informationMonte Carlo method in solving numerical integration and differential equation
Monte Crlo method in solving numericl integrtion nd differentil eqution Ye Jin Chemistry Deprtment Duke University yj66@duke.edu Abstrct: Monte Crlo method is commonly used in rel physics problem. The
More informationHow can we approximate the area of a region in the plane? What is an interpretation of the area under the graph of a velocity function?
Mth 125 Summry Here re some thoughts I ws hving while considering wht to put on the first midterm. The core of your studying should be the ssigned homework problems: mke sure you relly understnd those
More informationTHE DISCRETE LOGARITHM PROBLEM IN NON-REPRESENTABLE RINGS
THE DISCRETE LOGARITHM PROBLEM IN NON-REPRESENTABLE RINGS MATAN BANIN AND BOAZ TSABAN Abstrct. Bergmn s Ring E p, prmeterized by prime number p, is ring with p 5 elements tht cnnot be embedded in ring
More informationODE: Existence and Uniqueness of a Solution
Mth 22 Fll 213 Jerry Kzdn ODE: Existence nd Uniqueness of Solution The Fundmentl Theorem of Clculus tells us how to solve the ordinry differentil eqution (ODE) du = f(t) dt with initil condition u() =
More informationCOMPUTER SCIENCE TRIPOS
CST.2011.2.1 COMPUTER SCIENCE TRIPOS Prt IA Tuesdy 7 June 2011 1.30 to 4.30 COMPUTER SCIENCE Pper 2 Answer one question from ech of Sections A, B nd C, nd two questions from Section D. Submit the nswers
More information20 MATHEMATICS POLYNOMIALS
0 MATHEMATICS POLYNOMIALS.1 Introduction In Clss IX, you hve studied polynomils in one vrible nd their degrees. Recll tht if p(x) is polynomil in x, the highest power of x in p(x) is clled the degree of
More informationGoals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite
Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite
More informationExtended nonlocal games from quantum-classical games
Extended nonlocl gmes from quntum-clssicl gmes Theory Seminr incent Russo niversity of Wterloo October 17, 2016 Outline Extended nonlocl gmes nd quntum-clssicl gmes Entngled vlues nd the dimension of entnglement
More informationCHM Physical Chemistry I Chapter 1 - Supplementary Material
CHM 3410 - Physicl Chemistry I Chpter 1 - Supplementry Mteril For review of some bsic concepts in mth, see Atkins "Mthemticl Bckground 1 (pp 59-6), nd "Mthemticl Bckground " (pp 109-111). 1. Derivtion
More information