The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL
|
|
- Ashlie Montgomery
- 5 years ago
- Views:
Transcription
1 The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, Naok Shbayama Japan Ar Self-Defense Force, Tokyo, Japan Toshnobu Kaneko Tokyo Unversty of Scence, Tokyo, Japan Emal: new synchronous 8th-order dfferental characterstcs of HyRAL n the 8th round, and show that 12 rounds of HyRAL can be attacked by explotng the characterstcs we found wth low complextes. In Secton V we conclude our artcle. Abstract We study the synchronous 8th-order dfferental attack on the 128-bt block cpher HyRAL proposed by Hrata of Laurel Intellgent Systems n HyRAL supports 128, 192, 256 bts of secret keys. We found the new synchronous 8th-order dfferental characterstcs of HyRAL n the 8th round of data-mxng part. Explotng the characterstcs we show that 12 rounds of HyRAL can be attacked wth blocks of chosen plan text and tmes of data encrypton. We have reduced data complexty to 1/28 and reduced computatonal complexty to 1/213 compared to the conventonal attack. Index Terms cryptanalyss, attack, block cpher, HyRAL I. hgher-order II. Fg. 1 shows data-mxng functons of HyRAL for a 128-bt key (a) and for a 192-bt or 256-bt key (b). They consst of 128-bt nput/output (I/O) functons, G1, G2, F1, and F2. RK ( = 1, 2,, 9) and IK ( = 1, 2,, 6) are 128-bt sub keys. The symbol ndcates an XOR operaton. X(0) denotes a 128-bt plan text. X(24) n (a) and X(32) n (b) denote 128-bt cpher texts. Fg. 2 and Fg. 3 show G1, G2, F1, and F2 where X() = () X1 X2() X3() X4() and IK = IK0 IK1 IK2 IK3. Xj() (j = 1, 2, 3, 4) and IKj (j = 0, 1, 2, 3) are 32-bt data. The symbol denotes a concatenaton of two data. G and F ( = 1, 2) consst of 4 teraton rounds, whch conssts of XOR and f wth 32-bt I/O ( = 1, 2,, 8). Fg. 4 shows f, whch conssts of the byte-wse swap, S, P, and XOR. The symbol 0x represents that ts followng value s hexadecmal. Assumng the I/O of the swap as 32-bt vectors x and x where x = x0 x1 x2 x3, x s gven by dfferental INTRODUCTION HyRAL s a 128-bt block cpher proposed by Hrata of Laurel Intellgent Systems n 2010 [1]. It supports 128, 192, and 256 bts of secret keys. HyRAL conssts of bytewse swaps, nonlnear layers, and lnear layers. It has been reported that a data-mxng functon of HyRAL s secure aganst dfferental attacks and lnear attacks [2], [3]. It has been also reported that 12 rounds of HyRAL out of 32 rounds can be attacked wth the 16th-order dfferental characterstcs, blocks of chosen plan text and tmes of data encrypton [4]. In ths artcle, we show the new synchronous 8th-order dfferental characterstcs of HyRAL n the 8th round we found. By explotng the characterstcs we show that 12 rounds of HyRAL can be attacked wth blocks of chosen plan text and tmes of data encrypton. We have reduced data complexty to 1/28 and reduced computatonal complexty to 1/213 compared to the conventonal attack [4]. In Secton II we descrbe the data-mxng functon of HyRAL and ts components. In Secton III we generally descrbe hgher-order dfferental [5] and ts attack equaton. In Secton IV we show the x1 x0 x1 x2 x3, x2 x1 x2 x3 x0, x3 x2 x3 x0 x1, x4 x3 x0 x1 x2, x x3 x2 x1 x0, x x2 x1 x0 x3, x x1 x0 x3 x2, x8 x0 x3 x2 x (1) 6 xj (j = 0, 1, 2, 3) s an 8-bt data. S denotes the S-box wth 8-bt I/O, whch s a bjectve nonlnear functon. P s a 4 4 non-sngular matrx gven by Manuscrpt receved Aprl 15, 2013; revsed July 17, do: /joee DATA-MIXING FUNCTION OF HYRAL 142
2 The multplcatons of a matrx and a vector are performed n GF(2 8 ) defned by the characterstc polynomal z 8 + z 4 + z 3 + z + 1. f can be equvalently modfed as shown n Fg. 5 where the number n a box represents multplcaton and y j (, j = 0, 1, 2, 3) represents an 8-bt ntermedate data of f. Fgure 1. Data-mxng functon of HyRAL Fgure 3. (a) F 1 and (b) F 2. Fgure 4. f. Fgure 2. (a) G 1 and (b) G P (2) III. HIGHER-ORDER DIFFERENTIAL In ths secton, we descrbe the defnton of hgherorder dfferental and some of ts propertes related to ths artcle [5], and we descrbe an attack equaton usng these propertes. Fg. 6 shows a block dagram of an encrypton process. E 1 and E 2 represent components of an encrypton process. K 1 GF(2) p and K 2 GF(2) q represent p bts and q bts of the extended keys used n E 1 and E 2, respectvely. P = (p 1, p 2,, p n ) and P GF(2) n represent n bts of nput plan text and nput dfference, respectvely. H GF(2) m represents m bts of the output of E 1. C(P P) 143
3 GF(2) represents bts of the output cpher text correspondng to (P P). We assume V order subspace of () and ( j ) E2 1 (C ( P); K2 ) 0 as an th- (7) Fgure 5. Equvalent f. Fgure 7. The synchronous 8th-order dfferental path of HyRAL. Equatons (6) and (7) are always correct f K2 s correct, whle they are stochastcally correct f K2 s ncorrect. Ths s why attacker can estmate K2 and check the correctness of K2 by (6) or (7). The ncorrect K2 can be elmnated by solvng some sets of the equaton (6) or (7) whose plan texts P are dfferent from each other. Actually, we have to solve at least q/m dfferent sets of (6) or (7). Such attack usng (6) or (7) s called a hgherorder dfferental attack. Equaton (6) or (7) s called an attack equaton. Fgure 6. Block dagram of an encrypton process. GF(2)n consstng of lnear ndependent vectors n GF(2)n ( n), and call t an nput dfferental. The thorder dfferental of E1(P; K1) wth respect to V() s defned by ()E1(P; K1) as follows ( ) E1 ( P; K1 ) P V E1 ( P P; K1 ) (3) ( ) denotes summaton of XOR. If the algebrac degree of E1(P; K1) wth respect to P s N ( n), the (N+1)thorder dfferental of E1(P; K1) becomes zero regardless of P and K1 as follow ( N 1) E1 ( P; K1 ) 0 IV. (4) In ths secton, we descrbe the new synchronous 8thorder dfferental characterstcs of HyRAL we found, and descrbe the attack equaton explotng the characterstcs. At the end we estmate the number of chosen plan texts and the number of encrypton operatons requred to dentfy the sub keys. Fg. 7 shows the new synchronous 8th-order dfferental path of HyRAL where f7 n the 8th round s equvalently modfed. Note that RK = RK0 RK1 RK2 RK3 where RKj (j = 0, 1, 2, 3) s a 32-bt sub key. P-1 s the nverse matrx of P. C s the constant addton correspondng to Fg. 4. We put the 8th-order dfferental nto the upper 8 bts of X3(0) shown as A n Fg. 7. Namely, all 28 knds of data from 0x00 to 0xff are put nto the upper 8 bts of X3(0). At ths tme the same Moreover, f the Boolean polynomal of E1(P; K1) does not nclude the jth-order term as j pt (1 t n), the 1 jth-order dfferental of E1(P; K1) correspondng to j pt becomes zero regardless of P and K1 as follow 1 ( j ) E1 ( P; K1 ) 0 (5) Snce E1(P; K1) = E2-1(C(P); K2), whch s the nverse functon of E2, (4) and (5) can be rewrtten as ( N 1) E2 1 (C ( P); K 2 ) P V ( N 1) E2 1 (C ( P P); K 2 ) 0 THE SYNCHRONOUS 8TH-ORDER DIFFERENTIAL CHARACTERISTICS OF HYRAL AND ITS ATTACK EQUATION (6) 144
4 dfference as the upper 8 bts of X (0) 3 s put nto the upper (0) 8 bts of X 4 shown as S n Fg. 7, whch we call synchronous. The remanng 14 bytes shown as C n Fg. 7 are set to take arbtrary constants. In ths case, we found that the 8th-order dfferentals of 32-bt A and 32- bt B n the 8th round take the same value regardless of a plan text and the sub keys n the prevous rounds. By explotng the characterstcs we can derve the followng attack equaton as A B 8 8 (3) (8) (3) (8) X V X V (9) B 2 (10) B 2 B (8) A S( f ( X RK ) ( X ) ( IK ) ) (9) B P X C 1 (11) 1 8 ( 2 ) B (10) X f ( f ( X RK ) X IK ) X (11) (9) (11) (12) (12) X f ( f ( X RK ) X IK ) X (12) (10) (12) (12) (12) X f ( f ( X RK ) X IK ) X (13) (11) (12) (12) (12) X ( X X ) X X X X (14) (12) (0) (0) (12) (12) (12) (12) RK RK RK, IK IK RK RK (15) IK IK RK, IK IK RK (16) IK IK RK (17) A 8 and B 8 denote the upper frst bytes of A and B n Fg. 7, respectvely. ( x) B denotes the upper th byte of data x. C denotes the constant addton n Fg. 7. X (12) (X (0) X (0) ) denotes the cpher text correspondng to the nput plan text X (0) X (0). We can dentfy total 232-bt sub B2 keys, RK 30, (IK ), RK 13 42, IK 21, RK 41, IK 22, RK 40, and IK 23 by solvng these attack equatons by an exhaustve search. Because (8) s 8 sets (bts) of system of Boolean equatons, t s satsfed wth probablty 2-8 even f the estmated sub keys are false. There are canddates of sub keys snce ts total bt sze s 232. Therefore we need to solve 30 (= (232/8)+1) sets of (8) wth dfferent X (0) n order to dentfy the true sub key where the probablty that a false sub key survves s 2-8 (= (2-8 ) ). Because we have to compute the 8th-order dfferental to prepare one set of (8), the number of chosen plan texts to prepare 30 dfferent sets of (8) s gven by D as follows: D (18) Next we study the number of tmes of data encryptons requred to solve 30 dfferent sets of (8). If we solve the frst set of (8) for all canddates of sub keys, the number of canddates s reduced to (= ). And then we solve the second set of (8) for the remanng canddates, ts number s reduced to (= ). By solvng 30 dfferent sets of (8), the last remanng key wll be the true key. 2 8 tmes of S-box operaton at f 7 n the 8th round s carred out to check the correctness of one canddate sub key. Because 12 rounds of data-mxng part nclude 80 S-boxes, the total number of operatons n (8) tmes 1/80 corresponds to the total number (T) of tmes of the data encryptons requred for ths attack as follows: T (19) 80 0 V. CONCLUSIONS We have nvestgated the new synchronous 8th-order dfferental attack on 12 rounds of HyRAL as part of securty evaluaton. We found the new synchronous 8thorder dfferental characterstcs at the 8th round of HyRAL. We equvalently modfed f 7 at the 8th round and derved the attack equatons. As a result, we showed that 12 rounds of HyRAL can be attacked wth blocks of chosen plan text and tmes of the data encrypton by explotng the new synchronous 8th-order dfferental characterstcs we found. However fullrounds of HyRAL s secure aganst our attack because the number of rounds s actually 32. REFERENCES [1] K. Hrata, The 128bt block cpher HyRAL (Hybrd Randomzaton Algorthm): Common key block cpher, n Proc. Internatonal Symposum on Intellgence Informaton Processng and Trusted Computng, IEEE Computer Socety Washngton, DC, USA, 2010, pp [2] Y. Takag, Y. Igarash, and T. Kaneko, Securty evaluaton of HyRAL aganst dfferental attack, n Proc. Symposum on Cryptography and Informaton Securty, no. 1D1-2, [3] Y. Igarash, Y. Takag, and T. Kaneko, Securty evaluaton of HyRAL aganst lnear cryptanalyss, n Proc. Symposum on Cryptography and Informaton Securty, no. 1D1-3, [4] Y. Igarash et al., The 16th-order dfferental attack on 12 rounds of HyRAL wth a 256-bt key, n Proc. RISP Internatonal Workshop on Nonlnear Crcuts, Communcatons and Sgnal Processng, 2013, pp [5] X. La, Hgher order dervatves and dfferental cryptanalyss, n Communcatons and Cryptography, Sprnger US, vol. 276, pp , Yasutaka Igarash receved the B.E., M.E., and Ph.D. degrees n nformaton and computer scences from Satama Unversty, Japan, n 2000, 2002, and He was a research fellow of the Japan Socety for the Promoton of Scence from 2004 to From 2006 to 2011, he was a research assocate of the Tokyo Unversty of Scence. Snce 2011, he has been an assstant professor of Kagoshma Unversty. Hs research s nvolved wth optcal CDMA communcaton systems and the cryptanalyss of symmetrc-key cryptography. Dr. Igarash s a member of IEICE and RISP. Naok Shbayama receved the B.E. degree from Department of Appled physcs, Unversty of Myazak, Japan, n 2004, the M.E. degree from Department of Electrcal Engneerng, Tokyo Unversty of Scence, Japan, n In 2004, he joned Japan Ar Self- Defense Force, Mnstry of Defense. Hs current research feld s cryptography, especally regardng to the cryptanalyss for symmetrc cphers. 145
5 Toshnobu Kaneko receved the B.E., M.E., and Ph.D. degrees all n Electrcal Engneerng from the Unversty of Tokyo, n 1971, 1973, and 1976, respectvely. In 1976, he joned the faculty of Scence and Technology, Tokyo Unversty of Scence, and snce then, as a faculty member, he has been engaged n educaton and research n the felds of codng theory and nformaton securty. Currently, he s a Professor of Department of Electrcal Engneerng of the unversty. Prof. Kaneko s a member of CRYPTREC and served as a charman of Symmetrc-Key Cryptography subcommttee n Prof. Kaneko s a member of IEICE, IEEJ, IPSJ, and IEEE. Sej Fukushma receved the B.S., M.S., and Ph.D. degrees n electrcal engneerng from Kyushu Unversty n 1984, 1986, and 1993, respectvely. He s currently a Professor at the Dept. of Electrcal and Electroncs Engneerng, Kagoshma Unversty. Hs research nterests nclude photoncs/rado hybrd communcaton systems and ther related devces. Prof. Fukushma s a member of IEICE, IEEE/Photonc Socety, Japan Socety of Appled Physcs, Japanese Lqud Crystal Socety, and Optcal Socety of Amerca. Tomohro Hachno receved the B.S., M.S., and Dr. Eng. degrees n electrcal engneerng from Kyushu Insttute of Technology n 1991, 1993, and 1996, respectvely. He s currently an Assocate Professor at the Dept. of Electrcal and Electroncs Engneerng, Kagoshma Unversty. Hs research nterests nclude nonlnear control and dentfcaton, sgnal processng, and evolutonary computaton. Dr. Hachno s a member of IEEJ, SICE, and ISCIE. 146
A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition
(IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer
More informationLOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin
Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence
More informationImproved Integral Cryptanalysis of FOX Block Cipher 1
Improved Integral Cryptanalyss of FOX Block Cpher 1 Wu Wenlng, Zhang Wentao, and Feng Dengguo State Key Laboratory of Informaton Securty, Insttute of Software, Chnese Academy of Scences, Bejng 100080,
More informationTransfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system
Transfer Functons Convenent representaton of a lnear, dynamc model. A transfer functon (TF) relates one nput and one output: x t X s y t system Y s The followng termnology s used: x y nput output forcng
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationCryptanalysis of pairing-free certificateless authenticated key agreement protocol
Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen
More informationHongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)
ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of
More informationCOEFFICIENT DIAGRAM: A NOVEL TOOL IN POLYNOMIAL CONTROLLER DESIGN
Int. J. Chem. Sc.: (4), 04, 645654 ISSN 097768X www.sadgurupublcatons.com COEFFICIENT DIAGRAM: A NOVEL TOOL IN POLYNOMIAL CONTROLLER DESIGN R. GOVINDARASU a, R. PARTHIBAN a and P. K. BHABA b* a Department
More information8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars
More informationThe Improved 96th-Order Differential Attack on 11 Rounds of the Block Cipher CLEFIA
he Improved 96th-Order Differential Attack on 11 Rounds of the Block Cipher CLEFIA Yasutaka Igarashi, Seiji Fukushima, and omohiro Hachino Kagoshima University, Kagoshima, Japan Email: {igarashi, fukushima,
More informationCOMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
More informationAn efficient algorithm for multivariate Maclaurin Newton transformation
Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,
More informationThe Study of Teaching-learning-based Optimization Algorithm
Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute
More informationA FORMULA FOR COMPUTING INTEGER POWERS FOR ONE TYPE OF TRIDIAGONAL MATRIX
Hacettepe Journal of Mathematcs and Statstcs Volume 393 0 35 33 FORMUL FOR COMPUTING INTEGER POWERS FOR ONE TYPE OF TRIDIGONL MTRIX H Kıyak I Gürses F Yılmaz and D Bozkurt Receved :08 :009 : ccepted 5
More informationDifferential Cryptanalysis of Nimbus
Dfferental Cryptanalyss of Nmbus Vladmr Furman Computer Scence Department, Technon - Israel Insttute of Technology, Hafa 32000, Israel. vfurman@cs.technon.ac.l. Abstract. Nmbus s a block cpher submtted
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationPulse Coded Modulation
Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal
More informationA Hybrid Variational Iteration Method for Blasius Equation
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method
More informationLow Complexity Soft-Input Soft-Output Hamming Decoder
Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg
More informationSolving Fractional Nonlinear Fredholm Integro-differential Equations via Hybrid of Rationalized Haar Functions
ISSN 746-7659 England UK Journal of Informaton and Computng Scence Vol. 9 No. 3 4 pp. 69-8 Solvng Fractonal Nonlnear Fredholm Integro-dfferental Equatons va Hybrd of Ratonalzed Haar Functons Yadollah Ordokhan
More informationDesign and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm
Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:
More informationResearch Article Green s Theorem for Sign Data
Internatonal Scholarly Research Network ISRN Appled Mathematcs Volume 2012, Artcle ID 539359, 10 pages do:10.5402/2012/539359 Research Artcle Green s Theorem for Sgn Data Lous M. Houston The Unversty of
More informationLectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More informationThe lower and upper bounds on Perron root of nonnegative irreducible matrices
Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College
More informationAn Improved multiple fractal algorithm
Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton
More informationThe Jacobsthal and Jacobsthal-Lucas Numbers via Square Roots of Matrices
Internatonal Mathematcal Forum, Vol 11, 2016, no 11, 513-520 HIKARI Ltd, wwwm-hkarcom http://dxdoorg/1012988/mf20166442 The Jacobsthal and Jacobsthal-Lucas Numbers va Square Roots of Matrces Saadet Arslan
More informationScroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator
Latest Trends on Crcuts, Systems and Sgnals Scroll Generaton wth Inductorless Chua s Crcut and Wen Brdge Oscllator Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * Abstract An nductorless Chua
More informationn α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0
MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector
More informationComments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards
Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com
More informationFundamental loop-current method using virtual voltage sources technique for special cases
Fundamental loop-current method usng vrtual voltage sources technque for specal cases George E. Chatzaraks, 1 Marna D. Tortorel 1 and Anastasos D. Tzolas 1 Electrcal and Electroncs Engneerng Departments,
More informationThe internal structure of natural numbers and one method for the definition of large prime numbers
The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract
More informationEcon107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)
I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes
More informationOn the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros
Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong
More informationWeek 5: Neural Networks
Week 5: Neural Networks Instructor: Sergey Levne Neural Networks Summary In the prevous lecture, we saw how we can construct neural networks by extendng logstc regresson. Neural networks consst of multple
More informationResearch on Modified Root-MUSIC Algorithm of DOA Estimation Based on Covariance Matrix Reconstruction
Sensors & ransducers, Vol. 78, Issue 9, September 04, pp. 4-8 Sensors & ransducers 04 by IFSA Publshng, S. L. http://www.sensorsportal.com Research on Modfed Root-MUSIC Algorthm of DOA Estmaton Based on
More information5 The Rational Canonical Form
5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces
More informationResearch on State Collisions of Authenticated Cipher ACORN
4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Research on State Collsons of Authentcated Cpher ACORN Pe Zhanga*, Je Guanb, Junzh Lc and Tarong Shd Informaton
More informationA Fast Computer Aided Design Method for Filters
2017 Asa-Pacfc Engneerng and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Fast Computer Aded Desgn Method for Flters Gang L ABSTRACT *Ths paper presents a fast computer aded desgn method
More informationA New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane
A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,
More informationStructure and Drive Paul A. Jensen Copyright July 20, 2003
Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.
More informationA new Approach for Solving Linear Ordinary Differential Equations
, ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More informationDecision Diagrams Derivatives
Decson Dagrams Dervatves Logc Crcuts Desgn Semnars WS2010/2011, Lecture 3 Ing. Petr Fšer, Ph.D. Department of Dgtal Desgn Faculty of Informaton Technology Czech Techncal Unversty n Prague Evropský socální
More informationAmusing Properties of Odd Numbers Derived From Valuated Binary Tree
IOSR Journal of Mathematcs (IOSR-JM) e-iss: 78-578, p-iss: 19-765X. Volume 1, Issue 6 Ver. V (ov. - Dec.016), PP 5-57 www.osrjournals.org Amusng Propertes of Odd umbers Derved From Valuated Bnary Tree
More informationApplication of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations
Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work
More informationHigh-Speed Decoding of the Binary Golay Code
Hgh-Speed Decodng of the Bnary Golay Code H. P. Lee *1, C. H. Chang 1, S. I. Chu 2 1 Department of Computer Scence and Informaton Engneerng, Fortune Insttute of Technology, Kaohsung 83160, Tawan *hpl@fotech.edu.tw
More informationOn the Multicriteria Integer Network Flow Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of
More informationCalculation of time complexity (3%)
Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add
More informationHiding data in images by simple LSB substitution
Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty
More informationCryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm
www.ijcsi.org 110 Cryptanalyss of a Publc-key Cryptosystem Usng Lattce Bass Reducton Algorthm Roohallah Rastagh 1, Hamd R. Dall Oskoue 2 1,2 Department of Electrcal Engneerng, Aeronautcal Unversty of Snce
More informationSpeeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence
More informationPop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing
Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,
More informationInternational Journal of Mathematical Archive-3(3), 2012, Page: Available online through ISSN
Internatonal Journal of Mathematcal Archve-3(3), 2012, Page: 1136-1140 Avalable onlne through www.ma.nfo ISSN 2229 5046 ARITHMETIC OPERATIONS OF FOCAL ELEMENTS AND THEIR CORRESPONDING BASIC PROBABILITY
More informationIntroduction. - The Second Lyapunov Method. - The First Lyapunov Method
Stablty Analyss A. Khak Sedgh Control Systems Group Faculty of Electrcal and Computer Engneerng K. N. Toos Unversty of Technology February 2009 1 Introducton Stablty s the most promnent characterstc of
More informationApplied Mathematics Letters
Appled Matheatcs Letters 2 (2) 46 5 Contents lsts avalable at ScenceDrect Appled Matheatcs Letters journal hoepage: wwwelseverco/locate/al Calculaton of coeffcents of a cardnal B-splne Gradr V Mlovanovć
More informationDecoding of the Triple-Error-Correcting Binary Quadratic Residue Codes
Automatc Control and Informaton Scences, 04, Vol., No., 7- Avalable onlne at http://pubs.scepub.com/acs/// Scence and Educaton Publshng DOI:0.69/acs--- Decodng of the rple-error-correctng Bnary Quadratc
More informationGeneral theory of fuzzy connectedness segmentations: reconciliation of two tracks of FC theory
General theory of fuzzy connectedness segmentatons: reconclaton of two tracks of FC theory Krzysztof Chrs Ceselsk Department of Mathematcs, West Vrgna Unversty and MIPG, Department of Radology, Unversty
More informationLecture Notes on Linear Regression
Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume
More informationStudy on Active Micro-vibration Isolation System with Linear Motor Actuator. Gong-yu PAN, Wen-yan GU and Dong LI
2017 2nd Internatonal Conference on Electrcal and Electroncs: echnques and Applcatons (EEA 2017) ISBN: 978-1-60595-416-5 Study on Actve Mcro-vbraton Isolaton System wth Lnear Motor Actuator Gong-yu PAN,
More informationLecture 5 Decoding Binary BCH Codes
Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture
More informationAppendix B: Resampling Algorithms
407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles
More informationEEE 241: Linear Systems
EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they
More informationPower law and dimension of the maximum value for belief distribution with the max Deng entropy
Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng
More informationA property of the elementary symmetric functions
Calcolo manuscrpt No. (wll be nserted by the edtor) A property of the elementary symmetrc functons A. Esnberg, G. Fedele Dp. Elettronca Informatca e Sstemstca, Unverstà degl Stud della Calabra, 87036,
More informationNumerical Heat and Mass Transfer
Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and
More informationMin Cut, Fast Cut, Polynomial Identities
Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.
More informationMAE140 - Linear Circuits - Fall 10 Midterm, October 28
M140 - Lnear rcuts - Fall 10 Mdterm, October 28 nstructons () Ths exam s open book. You may use whatever wrtten materals you choose, ncludng your class notes and textbook. You may use a hand calculator
More informationLINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity
LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have
More informationBinomial transforms of the modified k-fibonacci-like sequence
Internatonal Journal of Mathematcs and Computer Scence, 14(2019, no. 1, 47 59 M CS Bnomal transforms of the modfed k-fbonacc-lke sequence Youngwoo Kwon Department of mathematcs Korea Unversty Seoul, Republc
More informationLecture 13 APPROXIMATION OF SECOMD ORDER DERIVATIVES
COMPUTATIONAL FLUID DYNAMICS: FDM: Appromaton of Second Order Dervatves Lecture APPROXIMATION OF SECOMD ORDER DERIVATIVES. APPROXIMATION OF SECOND ORDER DERIVATIVES Second order dervatves appear n dffusve
More informationA PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS
HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,
More informationThe Geometry of Logit and Probit
The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.
More informationInteractive Bi-Level Multi-Objective Integer. Non-linear Programming Problem
Appled Mathematcal Scences Vol 5 0 no 65 3 33 Interactve B-Level Mult-Objectve Integer Non-lnear Programmng Problem O E Emam Department of Informaton Systems aculty of Computer Scence and nformaton Helwan
More informationChapter 11: Simple Linear Regression and Correlation
Chapter 11: Smple Lnear Regresson and Correlaton 11-1 Emprcal Models 11-2 Smple Lnear Regresson 11-3 Propertes of the Least Squares Estmators 11-4 Hypothess Test n Smple Lnear Regresson 11-4.1 Use of t-tests
More informationPerforming Modulation Scheme of Chaos Shift Keying with Hyperchaotic Chen System
6 th Internatonal Advanced echnologes Symposum (IAS 11), 16-18 May 011, Elazığ, urkey Performng Modulaton Scheme of Chaos Shft Keyng wth Hyperchaotc Chen System H. Oğraş 1, M. ürk 1 Unversty of Batman,
More informationLecture 3: Shannon s Theorem
CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts
More informationConvexity preserving interpolation by splines of arbitrary degree
Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete
More informationDifferentiating Gaussian Processes
Dfferentatng Gaussan Processes Andrew McHutchon Aprl 17, 013 1 Frst Order Dervatve of the Posteror Mean The posteror mean of a GP s gven by, f = x, X KX, X 1 y x, X α 1 Only the x, X term depends on the
More informationOdd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits
Watcharn Jantanate, Peter A. Chayasena, Sarawut Sutorn Odd/Even Scroll Generaton wth Inductorless Chua s and Wen Brdge Oscllator Crcuts Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * School
More informationThe Exact Formulation of the Inverse of the Tridiagonal Matrix for Solving the 1D Poisson Equation with the Finite Difference Method
Journal of Electromagnetc Analyss and Applcatons, 04, 6, 0-08 Publshed Onlne September 04 n ScRes. http://www.scrp.org/journal/jemaa http://dx.do.org/0.46/jemaa.04.6000 The Exact Formulaton of the Inverse
More informationProjective change between two Special (α, β)- Finsler Metrics
Internatonal Journal of Trend n Research and Development, Volume 2(6), ISSN 2394-9333 www.jtrd.com Projectve change between two Specal (, β)- Fnsler Metrcs Gayathr.K 1 and Narasmhamurthy.S.K 2 1 Assstant
More informationA linear imaging system with white additive Gaussian noise on the observed data is modeled as follows:
Supplementary Note Mathematcal bacground A lnear magng system wth whte addtve Gaussan nose on the observed data s modeled as follows: X = R ϕ V + G, () where X R are the expermental, two-dmensonal proecton
More informationThe Key-Dependent Attack on Block Ciphers
The Key-Dependent Attack on Block Cphers Xaoru Sun and Xueja La Department of Computer Scence Shangha Jao Tong Unversty Shangha, 200240, Chna sunsrus@sjtu.edu.cn, la-xj@cs.sjtu.edu.cn Abstract. In ths
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013
ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run
More informationFormulas for the Determinant
page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use
More informationOne-sided finite-difference approximations suitable for use with Richardson extrapolation
Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,
More informationFor now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.
Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson
More informationNUMERICAL DIFFERENTIATION
NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the
More informationMaximum Likelihood Estimation of Binary Dependent Variables Models: Probit and Logit. 1. General Formulation of Binary Dependent Variables Models
ECO 452 -- OE 4: Probt and Logt Models ECO 452 -- OE 4 Maxmum Lkelhood Estmaton of Bnary Dependent Varables Models: Probt and Logt hs note demonstrates how to formulate bnary dependent varables models
More informationWavelet chaotic neural networks and their application to continuous function optimization
Vol., No.3, 04-09 (009) do:0.436/ns.009.307 Natural Scence Wavelet chaotc neural networks and ther applcaton to contnuous functon optmzaton Ja-Ha Zhang, Yao-Qun Xu College of Electrcal and Automatc Engneerng,
More informationReport on Image warping
Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.
More informationCube Attack on Reduced-Round Quavium
3rd Internatonal onference on Mechatroncs and Industral Informatcs (IMII 05 ube Attac on Reduced-Round Quavum Shyong Zhang, a *, Gonglang hen,b and Janhua L,c School of Informaton Securty Engneerng, Shangha
More informationErrors for Linear Systems
Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch
More informationMultigradient for Neural Networks for Equalizers 1
Multgradent for Neural Netorks for Equalzers 1 Chulhee ee, Jnook Go and Heeyoung Km Department of Electrcal and Electronc Engneerng Yonse Unversty 134 Shnchon-Dong, Seodaemun-Ku, Seoul 1-749, Korea ABSTRACT
More informationRepresentations of Elementary Functions Using Binary Moment Diagrams
Representatons of Elementary Functons Usng Bnary Moment Dagrams Tsutomu Sasao Department of Computer Scence and Electroncs, Kyushu Insttute of Technology Izua 82-852, Japan Shnobu Nagayama Department of
More informationOn the Correlation between Boolean Functions of Sequences of Random Variables
On the Correlaton between Boolean Functons of Sequences of Random Varables Farhad Shran Chaharsoogh Electrcal Engneerng and Computer Scence Unversty of Mchgan Ann Arbor, Mchgan, 48105 Emal: fshran@umch.edu
More informationNote 10. Modeling and Simulation of Dynamic Systems
Lecture Notes of ME 475: Introducton to Mechatroncs Note 0 Modelng and Smulaton of Dynamc Systems Department of Mechancal Engneerng, Unversty Of Saskatchewan, 57 Campus Drve, Saskatoon, SK S7N 5A9, Canada
More informationCryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-bit Block and n-bit Key
Cryptanalyss of Some Double-Block-Length Hash Modes of Block Cphers wth n-bt Block and n-bt Key Deukjo Hong and Daesung Kwon Abstract In ths paper, we make attacks on DBL (Double-Block-Length) hash modes
More informationTHE SUMMATION NOTATION Ʃ
Sngle Subscrpt otaton THE SUMMATIO OTATIO Ʃ Most of the calculatons we perform n statstcs are repettve operatons on lsts of numbers. For example, we compute the sum of a set of numbers, or the sum of the
More informationCounterexamples to the Connectivity Conjecture of the Mixed Cells
Dscrete Comput Geom 2:55 52 998 Dscrete & Computatonal Geometry 998 Sprnger-Verlag New York Inc. Counterexamples to the Connectvty Conjecture of the Mxed Cells T. Y. L and X. Wang 2 Department of Mathematcs
More information