On Cryptographic Properties of Random Boolean Functions

Size: px
Start display at page:

Download "On Cryptographic Properties of Random Boolean Functions"

Transcription

1 O Cryptographic Properties of Radom Boolea Fuctios Daiel Olejár Departmet of Computer Sciece Comeius Uiversity Marti Stae Departmet of Computer Sciece Comeius Uiversity Abstract: Boolea fuctios used i cryptographic applicatios have to satisfy various cryptographic criteria. Although the choice of the criteria depeds o the cryptosystem i which they are used, there are some properties (balacedess, oliearity, high algebraic degree, correlatio immuity, propagatio criteria) which a cryptographically strog Boolea fuctio ought to have. We study the above metioed properties i the set of all Boolea fuctios (all balaced Boolea fuctios) ad prove that almost every Boolea fuctio (almost every balaced Boolea fuctio) satisfies all above metioed criteria o levels very close to optimal ad therefore ca be cosidered to be cryptographically strog. 1 Itroductio The robustess of a cryptosystem substatially depeds o its uderlyig elemets. Sice Boolea fuctios are frequetly used i various cryptosystems, it would be iterestig to determie the properties which cryptographically strog Boolea fuctios should to have ad to fid methods how to costruct them. Nevertheless, oe of these problems ca be solved i geeral. Boolea fuctios meetig all possible cryptographic requiremets do ot exist. The cryptographic research has therefore cocetrated o Boolea fuctios satisfyig criteria formulated by the desigers ad cryptaalysts of real-world cryptosystems [see Seberry 93a, 93b]. The most importat cryptographic properties of Boolea fuctios are balacedess, oliearity, satisfyig propagatio criteria, especially SAC (Strict Avalache Criterio), the absece of liear structures, high algebraic degree, correlatio immuity, etc. Boolea fuctios satisfyig some of these criteria are cosidered to be cryptographically strog. Formally: let P = (p 1,..., p m ) be a set of properties of Boolea fuctios expressed as realvalued parameters; let Λ = (λ 1,..., λ m ) deote the set of required levels of the properties P. The Boolea fuctio f is said to be cryptographically strog o the level Λ with respect to the properties P, if p i (f) λ i, i = 1,..., m; otherwise, f is cryptographically wea o the level Λ with respect to P. The choice of properties P ad settig the level Λ depeds o the cryptosystem itself, o its iteded use ad o the state-of-art of cryptaalysis. By the proper choice of P ad Λ the desiger ca shield his cryptosystem agaist ow cryptaalytic attacs based o the uderlyig Boolea fuctios, but he caot guaratee the

2 robustess of the cryptosystem either agaist uow cryptaalytic attacs or attacs usig some other wea poits of the cryptosystem. We study Boolea fuctios with respect to the above metioed criteria. The cryptographically strog Boolea fuctio i this paper meas that it satisfies the criteria at levels asymptotically equal to optimal. There is o geeral method ow (except for the full search) of how to costruct Boolea fuctios satisfyig a arbitrarily chose subset of cryptographic criteria. Sice the full search is limited to Boolea fuctios with at most five variables ad real world applicatios require Boolea fuctios with more variables, it is of iterest be iterestig to ow how cryptographic properties are distributed i the set of all -ary Boolea fuctios. Mitchell [see Mitchell 90] studied Boolea fuctios satisfyig various cryptographic criteria such as balacedess, oliearity, odegeeracy, correlatio immuity ad symmetry. He eumerated or estimated the cardiality of classes of Boolea fuctios satisfyig various combiatios of the above metioed criteria. O the other had he cosidered the cryptographic criteria as qualitative properties ad did ot distiguish, e.g. betwee strog ad wea oliearity. Moreover, he cocetrated his attetio to criteria that are combiatoricaly tractable, although their cryptographic value is at least questioable (symmetry) or to weaer criteria that follow from stroger oes (odegeeracy SAC). We adopt a differet approach we chose the most importat cryptographic properties of Boolea fuctios, cosider them as quatitative parameters ad estimate how may Boolea fuctios satisfy the particular criterio o some level or of some order. We prove that almost every Boolea fuctio satisfies the set of the most importat cryptographic criteria at the suboptimal but asymptotically optimal level. Therefore, if some Boolea fuctios at least suboptimal i the most importat cryptographic criteria are eeded, they ca be geerated at radom. 2 Prelimiaries A -ary Boolea fuctio is a mappig f : {0, 1} {0, 1}. The set (class) of all -ary Boolea fuctios will be deoted by the symbol P 2. We shall cosider oly -ary Boolea fuctios i this paper ad therefore the otio Boolea fuctio stads for -ary Boolea fuctio (if ot otherwise stated). Let M be a class of -ary Boolea fuctios, the symbol M deotes the cardiality of M. Let P be a property of Boolea fuctios ad let P(M ) deote the subclass of Boolea fuctios, P(M ) M, satisfyig P. We say that Boolea fuctio from M has property P almost surely, if lim P(M ) / M = 1. A -ary Boolea fuctio f will be described by its truth table: f(x 1,..., x ) = (f(0,..., 0), f(0,..., 0, 1),..., f(1,..., 1)). The truth table of a -ary Boolea fuctio f is a biary vector of legth 2 ad will be deoted by tt(f). Let α = (a 1,..., a m ), β = (b 1,..., b m ) be two biary vectors of legth m. The symbol α β deotes the bitwise XOR-operatio of α, β ad the symbol α, β deotes the ier product of the vectors α ad β, i.e. α, β = a 1 b 1 a 2 b 2... a m b m.

3 The Hammig weight of a biary vector α, deoted wt(α), is the umber of oes i α. The Hammig weight of a Boolea fuctio f, wt(tt(f)), will be deoted by wt(f). Let f be a -ary Boolea fuctio. The f is a balaced Boolea fuctio if wt(f) = 2 1. The set of all balaced Boolea fuctios from P2 will be deoted by Bal. The Hammig distace of vectors α, β, deoted d(α, β) = wt(α β), is the umber of bits i which α ad β differ. Let f, g be two -ary Boolea fuctios. The symbol d(f, g) deotes the Hammig distace of fuctios f, g; d(f, g) = d(tt(f), tt(g)). Let f(x 1,..., x ) be a - ary Boolea fuctio. The algebraic ormal form (ANF) of f is give by the followig represetatio of f for each x 1,..., x {0, 1}: f(x 1,..., x ) = a 0 a 1 x 1 a 2 x 2 a 3 x 2 x 1... a 2 1x... x 1, (1) where a i {0, 1}, i = 0, 1,..., 2 1, is a costat. The Boolea fuctio f(x 1,..., x ) is said to be affie if its ANF cotais oly liear terms: f(x 1,..., x ) = a 0 a 1 x 1 a 2 x 2 a 4 x 3... a 2 1x, where a j {0, 1}, j = 0, 1, 2, 4,..., 2 1. A ANF will be represeted by the vector of its coefficiets (a 0, a 1,..., a 2 1) the ANF-vector. A affie Boolea fuctio is said to be liear, if the absolute term a 0 i its ANF is equal to 0. Let f(x 1,..., x ) be a -ary Boolea fuctio. The algebraic degree of f is deg(f) = max{wt(j) a j = 1}, j where the parameter j is represeted i biary ad rages over all idices of ANF f; j = 0,..., 2 1. The algebraic degree of the Boolea fuctio f correspods to the maximal legth (umber of variables) of a cojuctio i its ANF. We will use the followig geometrical model of P2. The Boolea hypercube, B 2, is a labelled graph cotaiig 2 2 vertices v 0,..., v Each vertex of B 2 is labelled by a biary vector of legth 2. Two vertices u, v of B 2 are adjacet, if the correspodig vectors α, β differ i oe bit: d(α, β) = 1. As ca be easily see, B 2 represets P2 ; every fuctio from P2 correspods to a (uique) vertex i B 2 ad two Boolea fuctios differig i oe compoet i their truth tables, correspod to adjacet vertices i B 2. Therefore, the vertices of B 2 will be cosidered i the followig as -ary Boolea fuctios. Let B 2 be a hypercube ad let α be a vertex of B 2. The subgraph S(2, α, r) of B 2 iduced by the set of vertices {β d(α, β) r} is traditioally called the sphere of B 2 with cetre α ad diameter r. Sice we are ot iterested i coectivity ad ay similar problems, we do ot distiguish betwee the graph S(2, α, r) ad its vertex set. Boolea fuctios with various (cryptographic) properties form subgraphs of the Boolea hypercube. To estimate the size of these subgraphs, we eed a precise estimate o the umber of vertices of the sphere with diameter r. The followig asymptotic estimate of biomial coefficiet was proved by Kuth et al. [see Graham, Kuth, Patashi 94].

4 Lemma 1. Let 0 < ε < 1/6 be a costat, let 2 ( 1)(1/2+ε) be a positive iteger. The ( ) 2 +1/2 ( ) 2 1 = 22 /2 1 π 2 e O(2 (3ε 1/2) ). (2) The cardiality of S(2, α, r) will be expressed by meas of the biomial coefficiet ( ) 2 2. Its value ca be obtaied (as a special case for = 0) from (2) but a more 1 precise boud directly follows from Stirlig s formula. Lemma 2. Let be a positive iteger. The it holds ( ) ( = 1 O(2 ) ). (3) π Estimatig the size of spheres i the Boolea hypercube I this sectio we estimate the cardiality of the sphere S(2, α, r) ad fid two importat values of r. Further results of this paper are immediate applicatios of the bouds costructed i this sectio. Let for simplicity s(, r) = S(2, α, r), where α is a arbitrary vertex of B 2. Theorem 3. Let r 1 = 2 1 c 1 2 /2 ; r 2 = 2 1 c 1 lg 2 /2, where c 1 = (1 + ε 0 )(1/2) l 2 ad ε 0 > 0 is a arbitrary costat. The we have s(, r 1 ) = 2 2 O(2 ε 0 ) (4) ad s(, r 2 ) = O(2 2 / 1+ε0 ) (5) Proof. We divide the sum ( ) 2 0 r 1 ito two sums Σ 1, Σ 2 ad estimate them separately. Let m 0 = 2 2 /2, the ( ) 2 ( ) 2 = + 0 r 1 Sice the sequece ( m m 0 < r 1 ( 2 ). (6) ) is uimodal, the first sum, Σ 1, ca be bouded by the product of its last (largest) term ad the upper boud of the umber of its terms. ( 2 ) (( ) ) 2 Σ 1 < = 2 2 O m 0 e 8 = o(2 2 ), (7)

5 sice 2 e < To estimate the secod sum (Σ 2) of (6), we chage the order of summatio ad the use (2) to estimate the summad: ( 2 ) Σ 2 = 2 1 j c 1 2 /2 j<2 2 /2 = 22 +1/2 π 2 ( 1 + O(2 (3ε 1/2) ) ) e j 2 /2 1. c 1 2 /2 j<2 2 /2 Now we trasform the summatio rage by settig = j c 1 2 /2 ad the cocetrate our effort o costructig a upper boud o the sum which appears i (8) ad will be deoted by Σ 3 : +1/2 ( ) Σ 2 = O(2 (3ε 1/2) ) π 2 0 <(2 c 1 ) 2 /2 exp [ (c1 2 /2 + ) 2 ] 2 1 (8) [ ] [ ] Σ 3 = e 2c2 1 2c1 2 exp exp 0 <(2 c 1 ) 2 / /2 [ ] < e 2c2 1 2 exp 0 <(2 c 1 ) 2 1. (9) 2 /2 The sum (deoted by Σ 4 ) i (9) ca be bouded by the itegral (2 c1) 2 /2 Σ 4 < 1 + e x2 /2 1 dx, 0 which ca be expressed by the distributio fuctio of ormal distributio. Let u 2 /2 = x 2 /2 1, the Ad Σ 4 < /2 1 2π (2 c1) 2 0 e u2 /2 du = O(2 /2 ). (10) Σ 2 = 2 2 O(2 ε 0 ), (11) where ε 0 is a positive costat. Taig ito accout (11) ad (7) we obtai (4). To prove (5), it is sufficiet to estimate the value Σ 5 = s(, r 2 ) s(, r 1 ) : ( 2 ) Σ 5 = 2 1 c 1 lg 2 /2 <c 1 2 /2 = 2 2 /2 O( c 1 lg 2 /2 <c 1 2 /2 e 2 /2 1 ). (12)

6 We ca proceed i the same way as i the previous case. Let Σ 6 deote the last sum i (12). Followig the steps (9) ad (10) we obtai Σ 6 = e 2c2 1 lg O(2 /2 ) = e (1+ε 0) l 2 lg O(2 /2 ) = (1+ε 0) O(2 /2 ). Therefore ad Σ 5 = 2 2 O( (1+ε 0) ), s(, r 2 ) = 2 2 O(2 ε0 ) O( (1+ε0) ) = 2 2 O( (1+ε0) ). We shall pay special attetio to balaced Boolea fuctios because of their sigificace i cryptographic desig. To describe the cryptographic properties of a average -ary balaced Boolea fuctio, we eed to estimate the umber of balaced vectors (vertices) i S(2, α, r), with the cetre α Bal (where Bal deotes the set of all balaced Boolea fuctios of variables). To simplify the otatio, let s b (, r) deote the value i questio. Let α be the vector (truth table) of a balaced -ary Boolea fuctio. Without loss of geerality we ca assume that α = (1, 1,... 1, 0, 0,..., 0). There are o balaced eighbourig vectors, or balaced vectors lyig at odd distace from the vector-vertex α i B 2. Therefore we cout the umber of balaced vectors/vertices lyig at distace 2. Such a vector ca be obtaied from α by replacig bits from the first half of α by zeroes ad (to save the balacedess of the costructed vector) replacig zeroes from the secod half of α by oes. Therefore the umber of vertices correspodig to balaced Boolea fuctios lyig at distace 2r or smaller from α is r ( ) s b (, 2r) =. =0 Aalogously as i the previous case, we estimate the value s b (, r) ad fid two importat values of the parameter r. Theorem 4. Let r 3 = 2 1 c 3 2 /2+1 ad r 4 = 2 1 c 4 2 /2+1 lg, where c 3 = (1 + ε 0 )(l 2)/8, c 4 = (1 + ε 0 )/(8 lg e) ad ε 0 is a arbitrary positive costat. The s b (, r 3 ) = 2 2 3/2 O(2 ε 0 ) (13) s b (, r 4 ) = 2 2 /2 O(1/ 1+ε 0 ) (14) Proof. The proof of Theorem 4 is similar to the proof of Theorem 3 ad therefore omitted. Remar. I the rest of this paper the symbols c 1, c 3, c 4 ; r 1, r 2, r 3, r 4 deote costats ad values of parameter r derived i Theorems 3 ad 4.

7 4 Balacedess of Boolea fuctios Balacedess is oe of the most importat cryptographic properties of Boolea fuctios. Bijective S-boxes are created from balaced Boolea fuctios ad the equiprobability of characters of the output alphabet is the basic coditio of a cryptographically strog cryptosystem. ( ) As ca be easily see, Bal = 2 2. Lemma 2 states that the umber of 1 balaced Boolea fuctios i P2 is egligible. O the other had, almost every Boolea fuctio is almost balaced. Theorem 5. Let f be a -ary Boolea fuctio, φ() be a arbitrary fuctio such that φ() as ad let p (0, 1). The almost surely. p 2 2 /2 φ() < wt(f) < p /2 φ(), (15) Proof. The fuctio wt ca be cosidered as a radom variable o P2. Let 0 2, the Pr(wt(f) = ) = p (1 p) 2. The radom variable wt has biomial distributio with parameters 2, p. Let p = 1/2. The iequalities (15) follow from Chebyshev s iequality. 5 Noliearity of radom Boolea fuctios Affie ad liear Boolea fuctios play a peculiar role i cryptography. They are cryptographically wea to be directly used for costructio of cryptosystems, sice liear cryptosystem ca be easily broe by solvig the system of liear equatios. O the other had, affie Boolea fuctios are used i various costructios of cryptographically very strog Boolea fuctios. The (o)liearity of Boolea fuctios is a qualitative property; to express the measure of oliearity, we shall use the followig defiitio [see Pieprzy, Fielstei 88]. For ay Boolea fuctio f, defie N f = mi{d(f, l)}, l where l is a arbitrary affie Boolea fuctio. Obviously, the oliearity of a affie Boolea fuctio is zero; the maximal value of the parameter N f is [see Seberry, Zhag, Zheg 93a] N f /2 1. (16) The oliearity of balaced Boolea fuctios is below the maximal value (16). The followig bouds ca be foud i [Seberry, Zhag, Zeg 93a]: { 2 N f , eve , odd where x deotes the maximum eve iteger less tha or equal to x. We prove lower bouds o the oliearity of almost all -ary (balaced) Boolea fuctios.

8 Theorem Let f be a -ary Boolea fuctio ad let g be a -ary balaced Boolea fuctio. The N f 2 1 c 1 2 /2, (17) almost surely. N g 2 1 c 3 2 /2+1, (18) Proof. Let r r 1 [see remar below Theorem 4]. If the spheres with cetres i affie fuctios were disjoit, they would cotai 2 +1 s(, r 1 ) = 2 2 O(2 ε0 ) vertices. Aalogously, 2 +1 disjoit spheres with diameter r r 3 cotai at least 2 +1 s b (, r 3 ) = 2 2 /2 O(2 ε 0 ) balaced Boolea fuctios. This is egligible with respect to the umber of all -ary balaced Boolea fuctios. 6 Correlatio immuity Boolea fuctios are sometimes used as oliear filters of cryptosystems cosistig of some liear feedbac shift registers (LFSRs). If the filterig fuctio leas some iformatio o oe of its iput bits (the output of a LFSR), a successful cryptaalytic attac ca be mouted based o this weaess. To avoid the correlatio attac the filterig fuctio has to be correlatio immue, [see Siegethaler 84, Seberry, Zhag, Zheg 93b]. Defiitio 7. A -ary Boolea fuctio f is correlatio immue of order, deoted CI, if ad oly if the fuctio f(x) x, α is balaced for every α {0, 1}, 1 wt(α). I other words, f is CI iff the Hammig distace betwee f ad ay ocostat affie fuctio l depedig o less tha or equal to variables, is exactly 2 1. Therefore correlatio immuity is a qualitative property. We itroduce aother measure of correlatio immuity couted correlatio characteristic CCC. Defiitio 8. Let f be a -ary Boolea fuctio. The couted correlatio characteristic of order of the Boolea fuctio f is CCC (f) = mi {wt(g α,a )}, α;1 wt(α) a {0,1} where for fixed α {0, 1} ad a {0, 1}, g α,a is the Boolea fuctio defied by g α,a (x) = f(x) x, α a for each x {0, 1}. As ca be easily see, if CCC (f) = 2 1 the the fuctio f satisfies CI (ad vice versa). We estimate the typical value of CCC. This is almost the same problem as was studied before (the oliearity of a average Boolea fuctio) sice we have to estimate the umber of Boolea fuctios lyig i spheres with cetres i some (chose) affie fuctios. Therefore the oliearity of a radom Boolea fuctio f provides a lower boud o the couted correlatio characteristic of f, too. Thus we have from Theorem 6.

9 Theorem 9. The couted correlatio characteristic of order of a -ary Boolea fuctio f satisfies the followig iequality almost surely CCC (f) 2 1 d 2 /2, (19) where 1, ad d is a positive costat depedig o. Remar. Though the strict correlatio immuity is a rather restrictive property, almost all Boolea fuctios are almost correlatio immue. The order of CCC does ot ifluece the value of CCC substatially. Let us estimate CCC 1 of a radom Boolea fuctio. Taig ito accout the fact that there are 2 affie Boolea fuctios depedig o 1 variable ad usig the upper bouds (5) ad (13) we have almost surely ad for balaced fuctios CCC c 1 lg 2 /2 ; CCC c 4 lg 2 /2+1 ; where c 1, c 4 are costats defied i Theorems 3 ad 4. 7 Propagatio characteristics Boolea fuctios used i cryptographic applicatios have to be very sesitive to small chages of their iputs. That meas, if the iput value of a Boolea fuctio f is chaged, its output value would chage with probability 1/2, too. More precisely, we have the followig defiitio. Defiitio 10. A -ary Boolea fuctio f satisfies the propagatio criterio of order (P C ), if wt(f(x) f(x α)) = 2 1, (20) for each α {0, 1}, 1 wt(α). The case = 1 is of special importace ad is referred to as the Strict Avalache Criterio (SAC) ad was itroduced by Webster ad Tavares [see Webster, Tavares 86]. The eumeratio of the set of (-ary) Boolea fuctios satisfyig P C is a very hard combiatorial problem. Tavares [see Tavares 96] preseted the followig asymptotic boud (costructed by Daiel Biss i 1996) o Pragocrypt 96 SAC() 22 2 /2+ π /2. That meas, the average Boolea fuctio does ot satisfy SAC. O the other had, if we replace the strict coditio of balacedess i (20) by ear-balacedess, we obtai a large set of Boolea fuctios which are still strog eough for cryptographic applicatios.

10 Defiitio 11. Let f be a -ary Boolea fuctio. The couted propagatio characteristic of order of the Boolea fuctio f is CP C (f) = mi {wt(g α)}, (21) α;1 wt(α) where for fixed α {0, 1}, g α is the Boolea fuctio defied by g α (x) = f(x) f(x α) for each x {0, 1}. As ca be easily see, if f meets P C, the CP C (f) = 2 1. Now we cocetrate o the CP C 1 ad costruct a upper boud o the umber of all -ary Boolea fuctios with CP C 1 r. Sice CP C, = 1,...,, is always eve, we cosider oly eve values of r. Let G,r,α (respectively, G, r,α ) deote the set of all -ary Boolea fuctios g satisfyig wt(g α ) = r (respectively, wt(g α ) r), where for fixed α {0, 1}, g α is the Boolea fuctio defied by g α (x) = g(x) g(x α) for each x {0, 1}. Let G, r,m = G, r,α ad G,r,m = G,r,α. α; 1 wt(α) m α; wt(α)=m We estimate G,2,1. Let g G,2,1. There exists a vector β {0, 1} (wt(β) = 1), such that wt(g(x) g(x β)) = 2 (ad for a arbitrary vector γ {0, 1} (wt(γ) = 1): wt(g(x) g(x γ)) 2). Without loss of geerality we assume that β = (1, 0,..., 0). Let (g 0, g 1,..., g 2 1) be the truth table of g. Sice g G,2,β, there exists a -set I of idices; I = {i 1,..., i } where i j {0,..., 2 1 1} for j = 1,..., such that { gi if i I g i = ; g i+2 1 else. ( ) The idex set I ca be chose i 2 1 ways ad there are how to choose the values of g i, i = 0,..., Therefore ( ) 2 1 G,2,β = ways If CP C 1 (g) = 2, the obviously g γ; wt(γ)=1 G,2,γ, ad therefore the umber of g s satisfyig CP C 1 (g) = 2 does ot exceed times G,2,β. Now we ca estimate the value of CP C 1 of a radom Boolea fuctio. Theorem 12. Let f be a -ary Boolea fuctio. The almost surely. CP C 1 (f) (+1)/2 c 1 lg( 1)

11 Proof. Let r = (+1)/2 c 1 lg( 1). We prove that G, r,1 = o(2 2 ). Sice G, r,1 = G, r,γ, γ; wt(γ)=1 we have from the remar precedig Theorem 12 that: G, r,1 = γ; wt(γ)=1 G, r,γ r/2 ( 2 1 To estimate the sum, we use (5) (Theorem 3): ( ) G, r,1 = O = O(2 2 / ε0 ) = o(2 2 ). ( 1) 1+ε0 ). The theorem follows. Remar. If we eed to fid the lower boud of CP C q (for q {1,..., }) of a average Boolea fuctio, we have to fid a maximal r such that ( ) ( ) i is o(2 2 ). 0 i q 0 r/2 Remar. The method used i costructio of the lower boud i CP C 1 i Theorem 12 is ot applicable to the costructio of a boud o CP C 1 for balaced Boolea fuctios. Therefore the problem of fidig better lower bouds o CP C 1 for balaced Boolea fuctios remais still ope. 8 The algebraic degree The algebraic degree is oe of the oliearity measures of Boolea fuctio. The Boolea fuctios with small algebraic degree (liear, quadratic) are i geeral cosidered to be less suitable for cryptographic applicatios tha those with higher degree, although there are large classes of cryptographically strog Boolea fuctios with small algebraic degree (e.g. quadratic bet fuctios). We prove that almost every (balaced) Boolea fuctio has maximal or almost maximal algebraic degree. Boolea fuctios will be represeted by their ANF-vectors. Let tt(f) be the truth table of a Boolea fuctio f, the the correspodig ANF-vector ANF (f) is tt(f) A, where A is a biary matrix of order 2 2 defied recursively: ( ) A 1 A A 0 = (1); A = A 1 where 0 1 deotes the zero matrix of order Now we ca estimate the algebraic degree of radom Boolea fuctios.

12 Theorem Let f be a radom -ary Boolea fuctio. The deg(f) 1 almost surely. 2. Let g be a radom -ary balaced Boolea fuctio. The deg(g) = 1 almost surely. Proof. There are = o(2 2 ) Boolea fuctios with algebraic degree less tha 1. Sice = o( Bal ) [see Lemma 2], the algebraic degree of almost every -ary balaced Boolea fuctio is at least 1. Let g be a balaced -ary Boolea fuctio. The last colum i A cotais oly oes ad therefore the last elemet of its ANF-vector is equal to 0: a 2 1 = 0. Cosequetly, deg(g). The theorem follows. 9 Coclusios We have show that almost every -ary (balaced) Boolea fuctio has such cryptographically strog properties as high oliearity, high algebraic degree, correlatio immuity ad almost optimal propagatio characteristics. Sice the umber of Boolea fuctios ot satisfyig a particular criterio (o a sufficietly high level) is o(2 2 ), we ca say that a average -ary Boolea fuctio is (for a large eough ) cryptographically strog. Theorem 14. Let f be a -ary Boolea fuctio, let g be a -ary balaced Boolea fuctio ad φ() as. The the fuctios f, g have the followig properties almost surely /2 φ() wt(f) /2 φ(), N f 2 1 c 1 2 /2 ; N g 2 1 c 3 2 /2+1 ; CCC (f) 2 1 d 2 /2 ; CCC (g) 2 1 d 2 /2 ; CCC 1 (f) 2 1 c 1 2 /2 lg ; CCC 1 (g) 2 1 c 4 2 /2+1 lg ; CP C 1 (f) (+1)/2 c 1 lg( 1); deg(f) 1; deg(g) = Acowledgemet We would lie to tha the aoymous referees whose commets helped i improvig the presetatio of this paper.

13 11 Refereces [Graham, Kuth, Patashi 94] Graham R.L., Kuth D.E., Patashi O.: Cocrete Mathematics: A Foudatio for Computer Sciece ; Addiso-Wesley, Secod Editio, (1994). [Mitchell 90] Mitchell Ch.: Eumeratig Boolea fuctios of Cryptographic Sigificace ; Joural of Cryptology, Vol. 2, No. 3, (1990), [Pieprzy, Fielstei 88] Pieprzy J., Fielstei G.: Towards effective oliear cryptosystem desig ; IEE Proceedigs (Part E), (1988), 135: [Siegethaler 84] Siegethaler T.: Correlatio-immuity of oliear combiig fuctios for cryptographic applicatios ; IEEE Trasactios o Iformatio Theory, IT-30, (1984), 5: [Seberry, Zhag, Zheg 93a] Seberry J., Zhag X.-M., Zheg Y.: Noliearity ad Propagatio Characteristics of Balaced Boolea Fuctios ; Techical Report o. 4, Computer Security Research Cetre, Uiversity of Wollogog, Australia, (1993). [Seberry, Zhag, Zheg 93b] Seberry J., Zhag X.-M., Zheg Y.: O Costructios ad Noliearity of Correlatio Immue Fuctios ; Advaces i Cryptology EUROCRYPT 93, Spriger-Verlag, (1993), [Tavares 96] Tavares S.E.: persoal commuicatio. [Webster, Tavares 86] Webster A.F., Tavares S.E.: O the desig of S-boxes ; I Advaces i Cryptology: Crypto 85 Proceedigs, Spriger-Verlag, LNCS vol. 219, (1986),

Disjoint Systems. Abstract

Disjoint Systems. Abstract Disjoit Systems Noga Alo ad Bey Sudaov Departmet of Mathematics Raymod ad Beverly Sacler Faculty of Exact Scieces Tel Aviv Uiversity, Tel Aviv, Israel Abstract A disjoit system of type (,,, ) is a collectio

More information

Large holes in quasi-random graphs

Large holes in quasi-random graphs Large holes i quasi-radom graphs Joaa Polcy Departmet of Discrete Mathematics Adam Mickiewicz Uiversity Pozań, Polad joaska@amuedupl Submitted: Nov 23, 2006; Accepted: Apr 10, 2008; Published: Apr 18,

More information

A Note on Matrix Rigidity

A Note on Matrix Rigidity A Note o Matrix Rigidity Joel Friedma Departmet of Computer Sciece Priceto Uiversity Priceto, NJ 08544 Jue 25, 1990 Revised October 25, 1991 Abstract I this paper we give a explicit costructio of matrices

More information

A Block Cipher Using Linear Congruences

A Block Cipher Using Linear Congruences Joural of Computer Sciece 3 (7): 556-560, 2007 ISSN 1549-3636 2007 Sciece Publicatios A Block Cipher Usig Liear Cogrueces 1 V.U.K. Sastry ad 2 V. Jaaki 1 Academic Affairs, Sreeidhi Istitute of Sciece &

More information

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 +

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + 62. Power series Defiitio 16. (Power series) Give a sequece {c }, the series c x = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + is called a power series i the variable x. The umbers c are called the coefficiets of

More information

Some Explicit Formulae of NAF and its Left-to-Right. Analogue Based on Booth Encoding

Some Explicit Formulae of NAF and its Left-to-Right. Analogue Based on Booth Encoding Vol.7, No.6 (01, pp.69-74 http://dx.doi.org/10.1457/ijsia.01.7.6.7 Some Explicit Formulae of NAF ad its Left-to-Right Aalogue Based o Booth Ecodig Dog-Guk Ha, Okyeo Yi, ad Tsuyoshi Takagi Kookmi Uiversity,

More information

Counting Well-Formed Parenthesizations Easily

Counting Well-Formed Parenthesizations Easily Coutig Well-Formed Parethesizatios Easily Pekka Kilpeläie Uiversity of Easter Filad School of Computig, Kuopio August 20, 2014 Abstract It is well kow that there is a oe-to-oe correspodece betwee ordered

More information

4 The Sperner property.

4 The Sperner property. 4 The Sperer property. I this sectio we cosider a surprisig applicatio of certai adjacecy matrices to some problems i extremal set theory. A importat role will also be played by fiite groups. I geeral,

More information

On Random Line Segments in the Unit Square

On Random Line Segments in the Unit Square O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,

More information

The Growth of Functions. Theoretical Supplement

The Growth of Functions. Theoretical Supplement The Growth of Fuctios Theoretical Supplemet The Triagle Iequality The triagle iequality is a algebraic tool that is ofte useful i maipulatig absolute values of fuctios. The triagle iequality says that

More information

Convergence of random variables. (telegram style notes) P.J.C. Spreij

Convergence of random variables. (telegram style notes) P.J.C. Spreij Covergece of radom variables (telegram style otes).j.c. Spreij this versio: September 6, 2005 Itroductio As we kow, radom variables are by defiitio measurable fuctios o some uderlyig measurable space

More information

A New Bound between Higher Order Nonlinearity and Algebraic Immunity

A New Bound between Higher Order Nonlinearity and Algebraic Immunity Available olie at wwwsciecedirectcom Procedia Egieerig 9 (01) 788 79 01 Iteratioal Workshop o Iformatio ad Electroics Egieerig (IWIEE) A New Boud betwee Higher Order Noliearity ad Algebraic Immuity Xueyig

More information

On the Linear Complexity of Feedback Registers

On the Linear Complexity of Feedback Registers O the Liear Complexity of Feedback Registers A. H. Cha M. Goresky A. Klapper Northeaster Uiversity Abstract I this paper, we study sequeces geerated by arbitrary feedback registers (ot ecessarily feedback

More information

Machine Learning Theory Tübingen University, WS 2016/2017 Lecture 11

Machine Learning Theory Tübingen University, WS 2016/2017 Lecture 11 Machie Learig Theory Tübige Uiversity, WS 06/07 Lecture Tolstikhi Ilya Abstract We will itroduce the otio of reproducig kerels ad associated Reproducig Kerel Hilbert Spaces (RKHS). We will cosider couple

More information

Volume 3, Number 2, 2017 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 3, Number 2, 2017 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 3, Number, 07 Pages 50-58 Jorda Joural of Electrical Egieerig ISSN (Prit: 409-9600, ISSN (Olie: 409-969 Liftig Based S-Box for Scalable Bloc Cipher Desig Based o Filter Bas Saleh S. Saraireh

More information

MAT1026 Calculus II Basic Convergence Tests for Series

MAT1026 Calculus II Basic Convergence Tests for Series MAT026 Calculus II Basic Covergece Tests for Series Egi MERMUT 202.03.08 Dokuz Eylül Uiversity Faculty of Sciece Departmet of Mathematics İzmir/TURKEY Cotets Mootoe Covergece Theorem 2 2 Series of Real

More information

Beurling Integers: Part 2

Beurling Integers: Part 2 Beurlig Itegers: Part 2 Isomorphisms Devi Platt July 11, 2015 1 Prime Factorizatio Sequeces I the last article we itroduced the Beurlig geeralized itegers, which ca be represeted as a sequece of real umbers

More information

Lecture 14: Graph Entropy

Lecture 14: Graph Entropy 15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number

More information

The multiplicative structure of finite field and a construction of LRC

The multiplicative structure of finite field and a construction of LRC IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio

More information

Pairs of disjoint q-element subsets far from each other

Pairs of disjoint q-element subsets far from each other Pairs of disjoit q-elemet subsets far from each other Hikoe Eomoto Departmet of Mathematics, Keio Uiversity 3-14-1 Hiyoshi, Kohoku-Ku, Yokohama, 223 Japa, eomoto@math.keio.ac.jp Gyula O.H. Katoa Alfréd

More information

Week 5-6: The Binomial Coefficients

Week 5-6: The Binomial Coefficients Wee 5-6: The Biomial Coefficiets March 6, 2018 1 Pascal Formula Theorem 11 (Pascal s Formula For itegers ad such that 1, ( ( ( 1 1 + 1 The umbers ( 2 ( 1 2 ( 2 are triagle umbers, that is, The petago umbers

More information

Weakly Connected Closed Geodetic Numbers of Graphs

Weakly Connected Closed Geodetic Numbers of Graphs Iteratioal Joural of Mathematical Aalysis Vol 10, 016, o 6, 57-70 HIKARI Ltd, wwwm-hikaricom http://dxdoiorg/101988/ijma01651193 Weakly Coected Closed Geodetic Numbers of Graphs Rachel M Pataga 1, Imelda

More information

Section 5.1 The Basics of Counting

Section 5.1 The Basics of Counting 1 Sectio 5.1 The Basics of Coutig Combiatorics, the study of arragemets of objects, is a importat part of discrete mathematics. I this chapter, we will lear basic techiques of coutig which has a lot of

More information

CS284A: Representations and Algorithms in Molecular Biology

CS284A: Representations and Algorithms in Molecular Biology CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by

More information

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence Chapter 3 Strog covergece As poited out i the Chapter 2, there are multiple ways to defie the otio of covergece of a sequece of radom variables. That chapter defied covergece i probability, covergece i

More information

Statistical Properties of the Square Map Modulo a Power of Two

Statistical Properties of the Square Map Modulo a Power of Two Statistical Properties of the Square Map Modulo a Power of Two S. M. Dehavi, A. Mahmoodi Rishakai, M. R. Mirzee Shamsabad 3, Hamidreza Maimai, Eiollah Pasha Kharazmi Uiversity, Faculty of Mathematical

More information

ROTATION-EQUIVALENCE CLASSES OF BINARY VECTORS. 1. Introduction

ROTATION-EQUIVALENCE CLASSES OF BINARY VECTORS. 1. Introduction t m Mathematical Publicatios DOI: 10.1515/tmmp-2016-0033 Tatra Mt. Math. Publ. 67 (2016, 93 98 ROTATION-EQUIVALENCE CLASSES OF BINARY VECTORS Otokar Grošek Viliam Hromada ABSTRACT. I this paper we study

More information

Lecture 3 The Lebesgue Integral

Lecture 3 The Lebesgue Integral Lecture 3: The Lebesgue Itegral 1 of 14 Course: Theory of Probability I Term: Fall 2013 Istructor: Gorda Zitkovic Lecture 3 The Lebesgue Itegral The costructio of the itegral Uless expressly specified

More information

The Rand and block distances of pairs of set partitions

The Rand and block distances of pairs of set partitions The Rad ad block distaces of pairs of set partitios Frak Ruskey 1 ad Jeifer Woodcock 1 Dept. of Computer Sciece, Uiversity of Victoria, CANADA Abstract. The Rad distaces of two set partitios is the umber

More information

Assignment 5: Solutions

Assignment 5: Solutions McGill Uiversity Departmet of Mathematics ad Statistics MATH 54 Aalysis, Fall 05 Assigmet 5: Solutios. Let y be a ubouded sequece of positive umbers satisfyig y + > y for all N. Let x be aother sequece

More information

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled 1 Lecture : Area Area ad distace traveled Approximatig area by rectagles Summatio The area uder a parabola 1.1 Area ad distace Suppose we have the followig iformatio about the velocity of a particle, how

More information

Infinite Sequences and Series

Infinite Sequences and Series Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet

More information

6.867 Machine learning, lecture 7 (Jaakkola) 1

6.867 Machine learning, lecture 7 (Jaakkola) 1 6.867 Machie learig, lecture 7 (Jaakkola) 1 Lecture topics: Kerel form of liear regressio Kerels, examples, costructio, properties Liear regressio ad kerels Cosider a slightly simpler model where we omit

More information

LONG SNAKES IN POWERS OF THE COMPLETE GRAPH WITH AN ODD NUMBER OF VERTICES

LONG SNAKES IN POWERS OF THE COMPLETE GRAPH WITH AN ODD NUMBER OF VERTICES J Lodo Math Soc (2 50, (1994, 465 476 LONG SNAKES IN POWERS OF THE COMPLETE GRAPH WITH AN ODD NUMBER OF VERTICES Jerzy Wojciechowski Abstract I [5] Abbott ad Katchalski ask if there exists a costat c >

More information

Harmonic Number Identities Via Euler s Transform

Harmonic Number Identities Via Euler s Transform 1 2 3 47 6 23 11 Joural of Iteger Sequeces, Vol. 12 2009), Article 09.6.1 Harmoic Number Idetities Via Euler s Trasform Khristo N. Boyadzhiev Departmet of Mathematics Ohio Norther Uiversity Ada, Ohio 45810

More information

Lecture Notes for Analysis Class

Lecture Notes for Analysis Class Lecture Notes for Aalysis Class Topological Spaces A topology for a set X is a collectio T of subsets of X such that: (a) X ad the empty set are i T (b) Uios of elemets of T are i T (c) Fiite itersectios

More information

Largest families without an r-fork

Largest families without an r-fork Largest families without a r-for Aalisa De Bois Uiversity of Salero Salero, Italy debois@math.it Gyula O.H. Katoa Réyi Istitute Budapest, Hugary ohatoa@reyi.hu Itroductio Let [] = {,,..., } be a fiite

More information

Math 113 Exam 3 Practice

Math 113 Exam 3 Practice Math Exam Practice Exam will cover.-.9. This sheet has three sectios. The first sectio will remid you about techiques ad formulas that you should kow. The secod gives a umber of practice questios for you

More information

Math 2784 (or 2794W) University of Connecticut

Math 2784 (or 2794W) University of Connecticut ORDERS OF GROWTH PAT SMITH Math 2784 (or 2794W) Uiversity of Coecticut Date: Mar. 2, 22. ORDERS OF GROWTH. Itroductio Gaiig a ituitive feel for the relative growth of fuctios is importat if you really

More information

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution EEL5: Discrete-Time Sigals ad Systems. Itroductio I this set of otes, we begi our mathematical treatmet of discrete-time s. As show i Figure, a discrete-time operates or trasforms some iput sequece x [

More information

Fortgeschrittene Datenstrukturen Vorlesung 11

Fortgeschrittene Datenstrukturen Vorlesung 11 Fortgeschrittee Datestruture Vorlesug 11 Schriftführer: Marti Weider 19.01.2012 1 Succict Data Structures (ctd.) 1.1 Select-Queries A slightly differet approach, compared to ra, is used for select. B represets

More information

Application to Random Graphs

Application to Random Graphs A Applicatio to Radom Graphs Brachig processes have a umber of iterestig ad importat applicatios. We shall cosider oe of the most famous of them, the Erdős-Réyi radom graph theory. 1 Defiitio A.1. Let

More information

6.3 Testing Series With Positive Terms

6.3 Testing Series With Positive Terms 6.3. TESTING SERIES WITH POSITIVE TERMS 307 6.3 Testig Series With Positive Terms 6.3. Review of what is kow up to ow I theory, testig a series a i for covergece amouts to fidig the i= sequece of partial

More information

A statistical method to determine sample size to estimate characteristic value of soil parameters

A statistical method to determine sample size to estimate characteristic value of soil parameters A statistical method to determie sample size to estimate characteristic value of soil parameters Y. Hojo, B. Setiawa 2 ad M. Suzuki 3 Abstract Sample size is a importat factor to be cosidered i determiig

More information

Sequences and Series of Functions

Sequences and Series of Functions Chapter 6 Sequeces ad Series of Fuctios 6.1. Covergece of a Sequece of Fuctios Poitwise Covergece. Defiitio 6.1. Let, for each N, fuctio f : A R be defied. If, for each x A, the sequece (f (x)) coverges

More information

TEACHER CERTIFICATION STUDY GUIDE

TEACHER CERTIFICATION STUDY GUIDE COMPETENCY 1. ALGEBRA SKILL 1.1 1.1a. ALGEBRAIC STRUCTURES Kow why the real ad complex umbers are each a field, ad that particular rigs are ot fields (e.g., itegers, polyomial rigs, matrix rigs) Algebra

More information

Balancing cyclic R-ary Gray codes

Balancing cyclic R-ary Gray codes Balacig cyclic R-ary Gray codes Mary Flahive Departmet of Mathematics Orego State Uiversity, Corvallis, OR 97331, USA flahive@math.oregostate.edu Bella Bose School of Electrical Egieerig ad Computer Sciece

More information

The Random Walk For Dummies

The Random Walk For Dummies The Radom Walk For Dummies Richard A Mote Abstract We look at the priciples goverig the oe-dimesioal discrete radom walk First we review five basic cocepts of probability theory The we cosider the Beroulli

More information

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3 MATH 337 Sequeces Dr. Neal, WKU Let X be a metric space with distace fuctio d. We shall defie the geeral cocept of sequece ad limit i a metric space, the apply the results i particular to some special

More information

Singular Continuous Measures by Michael Pejic 5/14/10

Singular Continuous Measures by Michael Pejic 5/14/10 Sigular Cotiuous Measures by Michael Peic 5/4/0 Prelimiaries Give a set X, a σ-algebra o X is a collectio of subsets of X that cotais X ad ad is closed uder complemetatio ad coutable uios hece, coutable

More information

Lecture 7: Properties of Random Samples

Lecture 7: Properties of Random Samples Lecture 7: Properties of Radom Samples 1 Cotiued From Last Class Theorem 1.1. Let X 1, X,...X be a radom sample from a populatio with mea µ ad variace σ

More information

Optimally Sparse SVMs

Optimally Sparse SVMs A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but

More information

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary Recursive Algorithm for Geeratig Partitios of a Iteger Sug-Hyuk Cha Computer Sciece Departmet, Pace Uiversity 1 Pace Plaza, New York, NY 10038 USA scha@pace.edu Abstract. This article first reviews the

More information

Math 155 (Lecture 3)

Math 155 (Lecture 3) Math 55 (Lecture 3) September 8, I this lecture, we ll cosider the aswer to oe of the most basic coutig problems i combiatorics Questio How may ways are there to choose a -elemet subset of the set {,,,

More information

sin(n) + 2 cos(2n) n 3/2 3 sin(n) 2cos(2n) n 3/2 a n =

sin(n) + 2 cos(2n) n 3/2 3 sin(n) 2cos(2n) n 3/2 a n = 60. Ratio ad root tests 60.1. Absolutely coverget series. Defiitio 13. (Absolute covergece) A series a is called absolutely coverget if the series of absolute values a is coverget. The absolute covergece

More information

An Introduction to Randomized Algorithms

An Introduction to Randomized Algorithms A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis

More information

Lecture 16: Monotone Formula Lower Bounds via Graph Entropy. 2 Monotone Formula Lower Bounds via Graph Entropy

Lecture 16: Monotone Formula Lower Bounds via Graph Entropy. 2 Monotone Formula Lower Bounds via Graph Entropy 15-859: Iformatio Theory ad Applicatios i TCS CMU: Sprig 2013 Lecture 16: Mootoe Formula Lower Bouds via Graph Etropy March 26, 2013 Lecturer: Mahdi Cheraghchi Scribe: Shashak Sigh 1 Recap Graph Etropy:

More information

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function.

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function. MATH 532 Measurable Fuctios Dr. Neal, WKU Throughout, let ( X, F, µ) be a measure space ad let (!, F, P ) deote the special case of a probability space. We shall ow begi to study real-valued fuctios defied

More information

REGULARIZATION OF CERTAIN DIVERGENT SERIES OF POLYNOMIALS

REGULARIZATION OF CERTAIN DIVERGENT SERIES OF POLYNOMIALS REGULARIZATION OF CERTAIN DIVERGENT SERIES OF POLYNOMIALS LIVIU I. NICOLAESCU ABSTRACT. We ivestigate the geeralized covergece ad sums of series of the form P at P (x, where P R[x], a R,, ad T : R[x] R[x]

More information

Injections, Surjections, and the Pigeonhole Principle

Injections, Surjections, and the Pigeonhole Principle Ijectios, Surjectios, ad the Pigeohole Priciple 1 (10 poits Here we will come up with a sloppy boud o the umber of parethesisestigs (a (5 poits Describe a ijectio from the set of possible ways to est pairs

More information

A symmetrical Eulerian identity

A symmetrical Eulerian identity Joural of Combiatorics Volume 17, Number 1, 29 38, 2010 A symmetrical Euleria idetity Fa Chug, Ro Graham ad Do Kuth We give three proofs for the followig symmetrical idetity ivolvig biomial coefficiets

More information

# fixed points of g. Tree to string. Repeatedly select the leaf with the smallest label, write down the label of its neighbour and remove the leaf.

# fixed points of g. Tree to string. Repeatedly select the leaf with the smallest label, write down the label of its neighbour and remove the leaf. Combiatorics Graph Theory Coutig labelled ad ulabelled graphs There are 2 ( 2) labelled graphs of order. The ulabelled graphs of order correspod to orbits of the actio of S o the set of labelled graphs.

More information

Commutativity in Permutation Groups

Commutativity in Permutation Groups Commutativity i Permutatio Groups Richard Wito, PhD Abstract I the group Sym(S) of permutatios o a oempty set S, fixed poits ad trasiet poits are defied Prelimiary results o fixed ad trasiet poits are

More information

Sequences of Definite Integrals, Factorials and Double Factorials

Sequences of Definite Integrals, Factorials and Double Factorials 47 6 Joural of Iteger Sequeces, Vol. 8 (5), Article 5.4.6 Sequeces of Defiite Itegrals, Factorials ad Double Factorials Thierry Daa-Picard Departmet of Applied Mathematics Jerusalem College of Techology

More information

Resolution Proofs of Generalized Pigeonhole Principles

Resolution Proofs of Generalized Pigeonhole Principles Resolutio Proofs of Geeralized Pigeohole Priciples Samuel R. Buss Departmet of Mathematics Uiversity of Califoria, Berkeley Győrgy Turá Departmet of Mathematics, Statistics, ad Computer Sciece Uiversity

More information

Analytic Continuation

Analytic Continuation Aalytic Cotiuatio The stadard example of this is give by Example Let h (z) = 1 + z + z 2 + z 3 +... kow to coverge oly for z < 1. I fact h (z) = 1/ (1 z) for such z. Yet H (z) = 1/ (1 z) is defied for

More information

Let us give one more example of MLE. Example 3. The uniform distribution U[0, θ] on the interval [0, θ] has p.d.f.

Let us give one more example of MLE. Example 3. The uniform distribution U[0, θ] on the interval [0, θ] has p.d.f. Lecture 5 Let us give oe more example of MLE. Example 3. The uiform distributio U[0, ] o the iterval [0, ] has p.d.f. { 1 f(x =, 0 x, 0, otherwise The likelihood fuctio ϕ( = f(x i = 1 I(X 1,..., X [0,

More information

The Local Harmonious Chromatic Problem

The Local Harmonious Chromatic Problem The 7th Workshop o Combiatorial Mathematics ad Computatio Theory The Local Harmoious Chromatic Problem Yue Li Wag 1,, Tsog Wuu Li ad Li Yua Wag 1 Departmet of Iformatio Maagemet, Natioal Taiwa Uiversity

More information

ACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory

ACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory 1. Graph Theory Prove that there exist o simple plaar triagulatio T ad two distict adjacet vertices x, y V (T ) such that x ad y are the oly vertices of T of odd degree. Do ot use the Four-Color Theorem.

More information

Measure and Measurable Functions

Measure and Measurable Functions 3 Measure ad Measurable Fuctios 3.1 Measure o a Arbitrary σ-algebra Recall from Chapter 2 that the set M of all Lebesgue measurable sets has the followig properties: R M, E M implies E c M, E M for N implies

More information

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014.

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014. Product measures, Toelli s ad Fubii s theorems For use i MAT3400/4400, autum 2014 Nadia S. Larse Versio of 13 October 2014. 1. Costructio of the product measure The purpose of these otes is to preset the

More information

4.1 Sigma Notation and Riemann Sums

4.1 Sigma Notation and Riemann Sums 0 the itegral. Sigma Notatio ad Riema Sums Oe strategy for calculatig the area of a regio is to cut the regio ito simple shapes, calculate the area of each simple shape, ad the add these smaller areas

More information

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame Iformatio Theory Tutorial Commuicatio over Chaels with memory Chi Zhag Departmet of Electrical Egieerig Uiversity of Notre Dame Abstract A geeral capacity formula C = sup I(; Y ), which is correct for

More information

Statistics 511 Additional Materials

Statistics 511 Additional Materials Cofidece Itervals o mu Statistics 511 Additioal Materials This topic officially moves us from probability to statistics. We begi to discuss makig ifereces about the populatio. Oe way to differetiate probability

More information

Zeros of Polynomials

Zeros of Polynomials Math 160 www.timetodare.com 4.5 4.6 Zeros of Polyomials I these sectios we will study polyomials algebraically. Most of our work will be cocered with fidig the solutios of polyomial equatios of ay degree

More information

Problem Set 2 Solutions

Problem Set 2 Solutions CS271 Radomess & Computatio, Sprig 2018 Problem Set 2 Solutios Poit totals are i the margi; the maximum total umber of poits was 52. 1. Probabilistic method for domiatig sets 6pts Pick a radom subset S

More information

Roger Apéry's proof that zeta(3) is irrational

Roger Apéry's proof that zeta(3) is irrational Cliff Bott cliffbott@hotmail.com 11 October 2011 Roger Apéry's proof that zeta(3) is irratioal Roger Apéry developed a method for searchig for cotiued fractio represetatios of umbers that have a form such

More information

Lecture 11: Pseudorandom functions

Lecture 11: Pseudorandom functions COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt

More information

An analog of the arithmetic triangle obtained by replacing the products by the least common multiples

An analog of the arithmetic triangle obtained by replacing the products by the least common multiples arxiv:10021383v2 [mathnt] 9 Feb 2010 A aalog of the arithmetic triagle obtaied by replacig the products by the least commo multiples Bair FARHI bairfarhi@gmailcom MSC: 11A05 Keywords: Al-Karaji s triagle;

More information

Algorithm of Superposition of Boolean Functions Given with Truth Vectors

Algorithm of Superposition of Boolean Functions Given with Truth Vectors IJCSI Iteratioal Joural of Computer Sciece Issues, Vol 9, Issue 4, No, July ISSN (Olie: 694-84 wwwijcsiorg 9 Algorithm of Superpositio of Boolea Fuctios Give with Truth Vectors Aatoly Plotikov, Aleader

More information

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee

More information

Seed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers

Seed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers IOSR Joural of Mathematics (IOSR-JM) e-issn: 78-578, p-issn: 319-75X. Volume 1, Issue 5 Ver. VIII (Sep. - Oct.01), PP 01-07 www.iosrjourals.org Seed ad Sieve of Odd Composite Numbers with Applicatios i

More information

Lesson 10: Limits and Continuity

Lesson 10: Limits and Continuity www.scimsacademy.com Lesso 10: Limits ad Cotiuity SCIMS Academy 1 Limit of a fuctio The cocept of limit of a fuctio is cetral to all other cocepts i calculus (like cotiuity, derivative, defiite itegrals

More information

Bertrand s Postulate

Bertrand s Postulate Bertrad s Postulate Lola Thompso Ross Program July 3, 2009 Lola Thompso (Ross Program Bertrad s Postulate July 3, 2009 1 / 33 Bertrad s Postulate I ve said it oce ad I ll say it agai: There s always a

More information

CALCULATION OF FIBONACCI VECTORS

CALCULATION OF FIBONACCI VECTORS CALCULATION OF FIBONACCI VECTORS Stuart D. Aderso Departmet of Physics, Ithaca College 953 Daby Road, Ithaca NY 14850, USA email: saderso@ithaca.edu ad Dai Novak Departmet of Mathematics, Ithaca College

More information

CHAPTER I: Vector Spaces

CHAPTER I: Vector Spaces CHAPTER I: Vector Spaces Sectio 1: Itroductio ad Examples This first chapter is largely a review of topics you probably saw i your liear algebra course. So why cover it? (1) Not everyoe remembers everythig

More information

CSE 1400 Applied Discrete Mathematics Number Theory and Proofs

CSE 1400 Applied Discrete Mathematics Number Theory and Proofs CSE 1400 Applied Discrete Mathematics Number Theory ad Proofs Departmet of Computer Scieces College of Egieerig Florida Tech Sprig 01 Problems for Number Theory Backgroud Number theory is the brach of

More information

1 of 7 7/16/2009 6:06 AM Virtual Laboratories > 6. Radom Samples > 1 2 3 4 5 6 7 6. Order Statistics Defiitios Suppose agai that we have a basic radom experimet, ad that X is a real-valued radom variable

More information

Polynomial identity testing and global minimum cut

Polynomial identity testing and global minimum cut CHAPTER 6 Polyomial idetity testig ad global miimum cut I this lecture we will cosider two further problems that ca be solved usig probabilistic algorithms. I the first half, we will cosider the problem

More information

Chapter 7 COMBINATIONS AND PERMUTATIONS. where we have the specific formula for the binomial coefficients:

Chapter 7 COMBINATIONS AND PERMUTATIONS. where we have the specific formula for the binomial coefficients: Chapter 7 COMBINATIONS AND PERMUTATIONS We have see i the previous chapter that (a + b) ca be writte as 0 a % a & b%þ% a & b %þ% b where we have the specific formula for the biomial coefficiets: '!!(&)!

More information

Chimica Inorganica 3

Chimica Inorganica 3 himica Iorgaica Irreducible Represetatios ad haracter Tables Rather tha usig geometrical operatios, it is ofte much more coveiet to employ a ew set of group elemets which are matrices ad to make the rule

More information

Complex Analysis Spring 2001 Homework I Solution

Complex Analysis Spring 2001 Homework I Solution Complex Aalysis Sprig 2001 Homework I Solutio 1. Coway, Chapter 1, sectio 3, problem 3. Describe the set of poits satisfyig the equatio z a z + a = 2c, where c > 0 ad a R. To begi, we see from the triagle

More information

Math 113 Exam 3 Practice

Math 113 Exam 3 Practice Math Exam Practice Exam 4 will cover.-., 0. ad 0.. Note that eve though. was tested i exam, questios from that sectios may also be o this exam. For practice problems o., refer to the last review. This

More information

Math 216A Notes, Week 5

Math 216A Notes, Week 5 Math 6A Notes, Week 5 Scribe: Ayastassia Sebolt Disclaimer: These otes are ot early as polished (ad quite possibly ot early as correct) as a published paper. Please use them at your ow risk.. Thresholds

More information

Introduction to Extreme Value Theory Laurens de Haan, ISM Japan, Erasmus University Rotterdam, NL University of Lisbon, PT

Introduction to Extreme Value Theory Laurens de Haan, ISM Japan, Erasmus University Rotterdam, NL University of Lisbon, PT Itroductio to Extreme Value Theory Laures de Haa, ISM Japa, 202 Itroductio to Extreme Value Theory Laures de Haa Erasmus Uiversity Rotterdam, NL Uiversity of Lisbo, PT Itroductio to Extreme Value Theory

More information

Chapter 6 Infinite Series

Chapter 6 Infinite Series Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat

More information

ABOUT CHAOS AND SENSITIVITY IN TOPOLOGICAL DYNAMICS

ABOUT CHAOS AND SENSITIVITY IN TOPOLOGICAL DYNAMICS ABOUT CHAOS AND SENSITIVITY IN TOPOLOGICAL DYNAMICS EDUARD KONTOROVICH Abstract. I this work we uify ad geeralize some results about chaos ad sesitivity. Date: March 1, 005. 1 1. Symbolic Dyamics Defiitio

More information

Basics of Probability Theory (for Theory of Computation courses)

Basics of Probability Theory (for Theory of Computation courses) Basics of Probability Theory (for Theory of Computatio courses) Oded Goldreich Departmet of Computer Sciece Weizma Istitute of Sciece Rehovot, Israel. oded.goldreich@weizma.ac.il November 24, 2008 Preface.

More information

University of Twente The Netherlands

University of Twente The Netherlands Faculty of Mathematical Scieces t Uiversity of Twete The Netherlads P.O. Box 7 7500 AE Eschede The Netherlads Phoe: +3-53-4893400 Fax: +3-53-48934 Email: memo@math.utwete.l www.math.utwete.l/publicatios

More information

ON POINTWISE BINOMIAL APPROXIMATION

ON POINTWISE BINOMIAL APPROXIMATION Iteratioal Joural of Pure ad Applied Mathematics Volume 71 No. 1 2011, 57-66 ON POINTWISE BINOMIAL APPROXIMATION BY w-functions K. Teerapabolar 1, P. Wogkasem 2 Departmet of Mathematics Faculty of Sciece

More information