Attack on cascaded convolutional transducers cryptosystem

Size: px
Start display at page:

Download "Attack on cascaded convolutional transducers cryptosystem"

Transcription

1 INTERNATINA JRNA of MATHEMATICS AND CMPTERS IN SIMATIN Attack on cascaded convolutonal transducers cryptosystem M. A. rumechha S. F. Mohebpoor Abstract Recently the dea of desgn of dynamc symmetrc cryptosystems s proposed. The man dea s proposed by Trnca n two separate papers whch are publshed n IEEE and eprnt. Securty of proposed cphers s compared to Randal algorthm called AES. Accordng to ths scheme the cpher system characterstc vares respect to secret key and nput plantext. Namely for each certan secret key and plantex a dfferent codng s provded and cphertext s created. By changng the secret key or plantex other codng system s consdered. But unfortunately ths cpher s not safer than whatever s clamed. In ths paper we present two attacks on the proposed scheme. The frst one s a partal key recovery whch for a (kkm) - cascaded convolutonal transducers s determned a fragment of cphertext wthout calculatng master key wth complexty (k ). Also the attack needs about k 6 plantext-cphertext pars to solve a lnear euaton system. The other attack s a weak key on ths system that attacker can recover longer fragment of plantexts wth complexty ( k ). Keywords Convoluton Codes Cryptanalyss Symmetrc Cryptosystem Seuental and parallel cascaded convolutonal encrypton. W I. INTRDCTIN orldwde symmetrc encrypton standards such as DES (Data Encrypton Standard)AES (Advanced Encrypton Standard) and EES (Escrowed Encrypton Standard) have been and some of them stll are extensvely used to solve the problem of communcaton over an nsecure channel but wth today s advanced technologes they seem to not be as secure as one would lke. Symmetrc encrypton cphers play an mportant role n practcal cryptography. They are categored as Stream Cphers and Block Cphers accordng to ther applcatons. In a stream cpher the output keystream s btwse XRed to the plantext stream n order to obtan the cphertext stream. They are utled for encryptng long streams of data over fast communcaton applcatons such as SM. Block cphers are other fundamental prmtves n cryptography. A block cpher can encrypt fxed length strngs such that cphertext s mxed n a nonlnear manner by secret key and plantext. Applcatons n general reure encrypton of long and arbtrary length strngs. A mode of operaton of a block cpher Manuscrpt receved February 5 7; revsed verson June 7. Mohammad Al rumehchha s wth Zaem Electronc Ind. R&D Departmen No. Nlo St. Bral St. Vanak S. Tehran Iran phone: ; fax: ; e-mal: orumehch@ {aem.co.r or yahoo.com}. S. Fahmeh Mohebbpoor s wth Zaem Electronc Ind. R&D Departmen No. Nlo St. Bral St. Vanak S. Tehran Iran phone: ; fax: ; (e-mal: {aem.co.r }). s used to extend the doman of applcablty from fxed length strngs to long and varable length strngs. But symmetrc cryptosystems such as trple DES AES and others have been all desgned as statc cphers n the sense that ther structure do not change at all durng encrypton/decrypton. Recently a dynamc symmetrc cryptosystem [] s proposed that whose structure s based on nvertble convoluton codes. The scheme s consdered to two versons. The frst one uses lnear combnatons of convoluton codes and the other one explots more complcated and nonlnear combnatons. These symmetrc encrypton technues have at least four advantages over tradtonal schemes based on Festel cphers. Frs the secret key of a cascaded convolutonal cryptosystem s usually much easer to generate. Second the encrypton and decrypton procedures are much smpler and conseuentally much faster. Thrd the desred securty level can be obtaned by ust settng approprate values for the parameters of the convolutonal cryptosystem. Fnally they are much more parallelable than symmetrc encrypton standards based on Festel cphers. However there are some weaknesses whch breach the clamed securty. In ths paper a partal attack whch recovers the part of plantext wthout determnng secret key s nvestgated. Ths attack s applcable on both versons. For smplcty we focus attack for veson and then expand to veson. Also we show that there are weak keys whch can obtan partally useful nformaton from plantext block. The paper s organed as follows. In secton we provde a bref descrpton of the convolutonal codes and globally nvertble convolutonal transducer. And then a new partal attack and one weak key for ths system s descrbed (secton 3). II. SEQENTIA AND PARAE CASCADED CNVTINA ENCRYPTIN PRCEDRE FR PAPER SBMISSIN In [] were proposed a class of convolutonal transducers called cascaded convolutonal transducers wth local propagaton. An overvew of the cascaded convolutonal transducers s provded below. A. Convolutonal codes: a short survey Convolutonal codes are appled n applcatons that reure good performance wth low mplementaton cost. Convolutonal codes map nformaton to code bts seuentally by convolvng a seuence of nformaton bts wth generator seuences. A convolutonal encoder encodes K nformaton bts to N>K code bts at one tme step. Encodng s very Issue Volume 7 57

2 smple ust use the fnte state. machne to produce the codewords We use the trells dagram of the code and apply Vterb algorthm Hard decson decodng or soft decson decodng could be used. Performance wth soft decson decodng s better. These desgns are based on -cascaded dynamc convolutonal transducers and are comprsed n the followng defnton. A key step n understandng convolutonal codes s to dstngush between the convolutonal encoder the convolutonal encodng operaton and the convolutonal code. Rgorous defntons of all these concepts are provded below. We denote by B the set of arrays wth bnary components. If u B then the number of components of u s denoted by u.e. u. Also we denote by u[ ] the -th row of u and by u[ ] the -th column of u. Note that u[ ] B and u[ ] B. If u s a row vector (or a column vector) then we wll denote by u[] the -th element of u and by u : the subvector [u[]... u[]]. If u... u h are bnary vectors then we denote by vect(u... u h ) the vector consstng of the components of u... u h n the same order. For example vect([ ][ ]) [ ]. Defnton.. et n k and m be nonero natural numbers. An (nkm) convolutonal transducer s a functon t : B B gven by () Where k n INTERNATINA JRNA of MATHEMATICS AND CMPTERS IN SIMATIN t ( u) u t u m t m assocated wth t. For a more detaled ntroducton to convolutonal codes we refer the reader to [3]. et us take an example. Example et t and t be ( ) convolutonal transducers wth t t t and t t t The correspondng convolutonal encoders are represented graphcally n Fg. (a) and (b) respectvely. It s easy to see that only t s globally nvertble. For example assume that M M M M and the two output bts beng decrypted are and respectvely. m m m s an element of B (pn+ mn) Bk n for all { m} and the arthmetc n () s carred out over the bnary feld F(). The entres blank are assumed to be flled n wth eros. Defnton.. et t : B k B n be an (nkm) convolutonal transducer. The (n km) convolutonal code nduced by t s the mage t ( B k ) of t. Defnton.3. et t : B B k n be an (n km) convolutonal transducer. An (n km) convolutonal encoder s a realaton by lnear seuental crcuts of the sem-nfnte generator matrx t Fg. (a) A globally nvertble ( ) convolutonal encoder (b) A ( ) convolutonal encoder that s not globally nvertble. ven that the frst output bt depends on M and the frst nput b we conclude that the frst nput bt was a. Then gven that we already know the frst nput b we fnd that the second nput bt was a. Thus we conclude that t s globally nvertble snce at each step we can decode unuely the current block of k output bts. The convolutonal transducer t s not globally nvertble snce each of the two output bts depends on both nput bts. Therefore the current block of k output bts cannot be unuely decoded nto the correspondng nput block. et u [ ] be an nput vector. More precsely we have p blocks of se k each. ne can verfy that t(u) u t k [ ]. We can encrypt u by p v [ ].e. the frst k p bts of t(u). ven that t s globally nvertble we can unuely decrypt v nto u. Issue Volume 7 58

3 Example et a t : Β Β be a ( ) convolutonal transducer wth [ ] [ ] and [ ]. Thus the number of nput bts s k the number of output bts s n and the number of memory regsters s km. The assocated convolutonal encoder can be represented graphcally as n Fg. Note that the two output bts at each step are seraled usng a multplexer. et us now descrbe the encodng mechansm. et b be the current nput bt beng encoded and let b and b be the current bts stored n the memory regsters M and M respectvely. The frst output bt s b [ ] + b [] + b[] b [] + bt [] Whereas the second output bt s b [ ] + bt [] + b[] b [] + b [] After both output bts have been obtaned b s shfted nto the memory regster M and b s shfted nto the memory regster M. et us assume that the nput vector u has length k p. The actual nput vector s u followed by km eros. Thus the total length of the output vector s pn + mn. For example let us take u [ ] as an nput vector. Then one can verfy that the output vector s t(u) u [ ] Where INTERNATINA JRNA of MATHEMATICS AND CMPTERS IN SIMATIN ( u) uh t u Fg. A ( ) convolutonal encoder.. As usual the mssng entres n are assumed to be eros. Note that the se of the output vector t(u) s pn + mn 8 +. Defnton.. A (kkm) convolutonal cryptosystem s a globally nvertble (kkm) convolutonal transducer f each output block of k bts can be unuely nto correspondng block of k nput bts. et us explan how we encrypt an nput vector usng a globally nvertble (k km) convolutonal transducer. Remark Snce we always need for encrypton only the frst u bts of t(u) we can change the standard defnton of an (n km) convolutonal transducer by replacng euaton () wth t () where H u s the restrcton of u to the frst u columns. Thus f t s a (k km) convolutonal cryptosystem then we always encrypt u by t(u). B. Dynamc convolutonal cryptosystem In the prevous subsecton we have descrbed some symmetrc encrypton schemes based on globally nvertble (k km) (-cascaded) convolutonal transducers.the dea n [] s based on lnear cascaded dynamc convolutonal and s comprsed n the followng defnton. Defnton. 5. et k and m be nonero natural numbers. A (k k m) lnear -cascaded convolutonal transducer wth propagaton s an ( +) -tuple ( S S S ) where t s a functon gven by t(u) uh (v )H (v)...h (v- ) for all u Β where v u v v-h (v- ) for all {... } H (w) s the restrcton of ( ) t m m p p m+ p m Descrpton of Algorthm Input: vector u as plantext. utput: vector v as cphertext. Prvate key: the sets S { t () {... m}} { () {... {... }. lenght plant ext u. set p k m. v u 3. For to do 3.. H (v- ) s Constructed by the restrcton of matrx (3) to the frst columns 3.. v v-h (v- ) end do;. v v. Fg. 3Descrpton of algorthm }} Issue Volume 7 59

4 INTERNATINA JRNA of MATHEMATICS AND CMPTERS IN SIMATIN Fg. A ( ) -cascaded convolutonal encoder wth propagaton: (a) the ntal structure of the cascaded encoder and (b) the structure after encodng the frst block [ ]. to the frst columns vect(w[... ]) r () ( f ( r )) for all r {... m + p -} f(s ) (sk + :(s+ )k[] sk+ :(s+ )k[k]) mod and S () {... m}} { () {... }} { m s the set of state matrces correspondng to the -th transducer of the cascade. As usual all the operatons are performed over the bnary feld F(). And also t ( ) t () B and are nvertble. The entres left k k blank n t ( ) are assumed to be flled n wth eros. Defnton.6. A (kkm) lnear -cascaded convolutonal cryptosystem wth propagaton s a globally nvertble (kkm) -cascaded convolutonal transducer wth propagaton wth encrypton functon t n whch the sets S S are kept prvate. The man loop of ths cryptosystem descrbed n Fg.3. Example3 et t : Β a Β be a ( ) - k n cascaded convolutonal transducer where t t t t t t ( ) ( ) ( ) ( ) ( ) ( ) t t t t t t () () () () () () Issue Volume 7 6 et u [] be an nput vector then p v u and t H t ( ) t where [] therefore () ( f ( )) () ( f ( ) + ) ( f ( )) () and () t () H ( ) () v uh t ( v ) [] and t H t ( ) Where [ ] () ( f ( )) () ( f ( ) + ) ( f ( )) () and t () t () H t ( ) () Thus encrypt u by t u) uh ( v ) H ( v ) [ ] ( t. The ntal structure of the correspondng cascaded convolutonal encoder can be represented graphcallyas n Fg. (a). By examnng the matrces ( ) one can remark that t b the cascaded encoder s globally nvertble whatever ts structure would be at the current step. More precsely the structure of the frst encoder n the cascade changes after

5 encodng the frst nput block snce the number of s n the frst nput block s odd. Regardng the second encoder n the cascade ts structure changes after encodng the frst nput block snce the number of s n the frst nput block s even. Thus we encrypt u by t(u) and gven that t s globally nvertble we can unuely decrypt t(u)nto u. And also In [] proposed a new class of dynamc convolutonal cryptosystems called automata-based dynamc convolutonal cryptosystems. Defnton.7. et km be nonero natural numbers. A (kkm) automata-based dynamc convolutonal transducer (abbrevated ADCT) wth states s a ( + )-tuple ( f S... S ) where t( u) uh ( u) for all u Β f : {... } B k {... } s the transton functon H (u) s the restrcton of ( ) t m m p p m+ p m to the frst columns vect( u[ 3 ] mk t g ( ) INTERNATINA JRNA of MATHEMATICS AND CMPTERS IN SIMATIN f ( : k ) f g( ) f ( g( ) ) ( ) k+ f s the tuple of matrces correspondng to the -th state. {... m + p } et t be a globally nvertble (k km) -cascaded convolutonal transducer wth propagaton. Suppose that we have k processors denoted p p... p k and consder a bnary vector u B. The processors work as follows. Frs each processor copes (concurrently) the nput vector u and the matrces t ( b) from the global memory nto ts local memory. Second for all l {... } each processor p computes the columns l l H u)[ ] H ( u)[ + ( p ) ] ( k Defnton.8. A (kkm) automata-based dynamc convolutonal cryptosystem (abbrevated ADCC)wth states s a globally nvertble (k km) ADCT wth states n whch the transton functon f and the tuples S... S are kept prvate. Remark Snce the transton functon of an ADCC reures k memory locatons we should defne t n such a way that the amount of memory reured s sgnfcantly reduced. For a ( ) ADCC wth ten states the transton functon reures 56 memory locatonswhch s unacceptable. ne possblty would be to transform f nto a perodc functon. For a (k km) ADCC ths can be done by defnng f by f( u ) f( u ) f and only f nt(u ) mod P nt(u ) mod P where nt(u) k u[] u[k] and P {... k }. It can be easly seen that the perod s P. Thus the number of memory locatons reured by the transton functon s reduced to P. Cascaded convolutonal transducers wth propagaton are hghly parallelable. More precsely n [] descrbed a parallel algorthm for cascaded convolutonal cryptosystems wth propagaton usng the shared-memory model of computaton under the asynchronous mode of operaton. Fg. 5Asynchronous parallel cascaded convolutonal encrypton wth propagaton Asynchronous parallel cascaded convolutonal encrypton wth propagaton. Then computes the products l l uh ( u)[ ] uh ( u)[ + ( p ) k] and fnally stores the correspondng output bts nto the shared locaton v. The shared varable Var ensures tha at any tme each processor ether works on the current vector-matrx product or stays dle. In other words we do not allow the processors to work on dfferent vector-matrx products. In lne each processor p copes (concurrently) the current output vector v nto ts local memory snce at the next teraton v becomes the new nput vector. (startng at lne 6) s fnshed the product les n the shared locaton v. A complete descrpton of the parallel encrypton algorthm (for processor p ) s provded n Fg.5. The parallel decrypton algorthm s esentally the same seuence of operatons but n reverse order. When the man loop nes 658 and are executed concurrently whereas the other lnes are executed ndependently by each processor. et us denote by W the maxmum amount of tme Issue Volume 7 6

6 spent by each processor to read (concurrently) the vector u (lne and also lne for v) by W the amount of tme spent by each processor to read the matrces ( b) from the global memory (lnes 35)by W3 the maxmum amount of tme spent by each processor to execute (concurrently) the lnes 9 at the current teraton and by T se the runtme of the seuental algorthm. Then the parallel runnng tme s at most W +W + (T se /k +W3 +W) snce each processor spends at most W tme to execute lne at most W tme to execute the lnes 5 and at each of the teratons startng at lne 6 each processor spends exactly T se /k tme to execute the lnes 7 3 at most W3 tme to execute the lnes through 9 and at most W tme to execute lne. Ths encrypton technue has at least four advantages over tradtonal schemes based on Festel cphers. Frs the secret key of a convolutonal cryptosystem s usually much easer to generate (ust generate the matrces ( b) such that the cascaded encoder s globally nvertble whatever ts structure would be at the current step). Second the encrypton and decrypton procedures are much smpler and conseuentally much faster. Thrd the desred securty level can be obtaned by ust settng approprate values for the parameters of the convolutonal cryptosystem. Fnally they are much more parallelable than symmetrc encrypton standards based on Festel cphers. C. Clamed Securty and performance The securty level can be obtaned by ust settng approprate values for (m + ) + 3 parameters: k m and (m + ) elements of sets S (... ). As clamed n [] the hghest level of securty s obtaned when all the parameters are kept secre snce ths ncreases the complexty of any cryptanalytc attack. If the nput vector has length p k and f d(p k ) denotes the number of dvsors of p k that are less than or eual to k then the maxmum number of decodng attempts s d ( pk ) m l INTERNATINA JRNA of MATHEMATICS AND CMPTERS IN SIMATIN [ l( + ) + snce the maxmum number of trals for k s d(p k ) and we have (m+ ) bnary matrces of se k each. Note that for each of l( ) the + maxmum trals for fxed values of and l there are two decodng attempts: one attempt for the case n whch the number of s n the frst nput block s even and another attempt for the case n whch the number of s n the frst nput block s odd. In fac n [] the measure of safety consdered s huge secret key entropy. We show that ths measure s only a necessary condton not a suffcent condton. Regardng the performance n [] have made several comparsons between a globally nvertble (6 6 ) - cascaded convolutonal transducer t wth propagaton and the well-known AES Encrypton Benchmark. It s shown that the Issue Volume 7 6 ] proposed cpher s much faster than a certan AES mplementaton. Also due to beng more complex t s consdered that ths dynamc cryptosystem s secure aganst standard cryptanalytc attacks such as lnear and dfferental cryptanalyss. Although these standard attacks may be nfeasble but there are attacks whch are able breach the proposed securty. III. CRYPTANAYSIS F SCHEME The dea desgn of cpher s attractve but unfortunately cpher s not as safe as s clamed. The clamed securty s comparable to a homogeneous strong block cpher. A dynamc convolutonal cryptosystem s consderd Broken as soon as attacker fnds the bts of the matrces... t m... t... t m. Breakng the cpher completely s a very dffcult task However fndng partal nformaton about the cpher s easy the dea of such an attack descrbed n detal n followng. In [] s clamed that securty of desgn s based prvacy of the sets S S. But n ths secton t s shown that one can easly obtan the frst sub-block plantext wthout any nformaton from the sets S S. Also f these sets are chosen mproper then one recovers more sub-block plantexts. A. Partal attack In ths scheme the frst output sub-block cphertext s constructed only by multplyng the frst nput sub-block plantext (denoteu ) and matrx A t ( ) t () t (). Therefore wth changng the other nput sub-blocks and fxng the frst nput sub-block the frst cpher sub-block remans fxed. And also the contents of matrxes ( ) () () are always fxed and hence A s fxed for all of arbtrary plantext. The number of contents of matrx A s K hence one can determne all of contents A. By usng about K output bts belong to the frst output sub-blocks and wrte a lnear system and solve t. Therefore for each cphertext one can calculate the frst subblock of plantext wthout recoverng master key. Addtonally f plantext s chosen such that the frst subblock be eual to ero and other sub-blocks of plantext be random then always the frst sub-block wll be ero and s dstngushable wth probablty from a random seuence. we can descrbed smlar to ths attack for a (kkm) automaton-based dynamc convlutonal cryptosystem. Example et t : Β a Β be a ( ) - k n cascaded convolutonal transducer where

7 t t t t t t ( ) ( ) ( ) ( ) ( ) ( ) t t t t t t ( ) ( ) ( ) ( ) ( ) ( ) In ths example the matrces A t () t () the contents of matrxes A t () t () are always A s fxed for all of arbtrary plantext. The fxed and hence number of contents of matrx A s hence one can determne all of contents A. By usng about K output bts belong to the frst output sub-blocks and wrte a lnear system and solve t. Therefore for each cphertext one can calculate the frst sub-block of plantext wthout recoverng master key e. for any plantext the frst of sub block of cpher text obtan of multply frst th A. sub block plantext and matrx Example5 et a (66) - cascaded convolutonal transducer that proposed n []. For an nput vector of length 6 can determne the frst 6 bts of nput block wth 8 output bts belong to the frst output sub-blocks and wrte a lnear system and solve t. Addtonally f plantext s chosen such that the frst sub-block be eual to ero and other subblocks of plantext be random then always the frst sub-block wll be ero and s dstngushable wth probablty from a random seuence. B. Weak key In ths system If matrces ( ) () () n the sets S S be eual means that A ( t ()) and so we can obtan matrx A and. Regardng to the hammng weght of v v v INTERNATINA JRNA of MATHEMATICS AND CMPTERS IN SIMATIN u are ether even or odd we can parse all possble frst sub-blocks u to classes. et whch for ths matrx only second column s unknown. Hence by usng about K output bts belong to the second output subblock attacker can wrte a lnear system and solve so A can be determned. Therefore wth determnng u we can deduce the second sub-block. If ths weak pont contnues for system attacker can decrypt longer fragments of cphertexts. Ths attack s descrbed n the followng example. Example6 et t : Β a Β be a ( ) - k n cascaded convolutonal transducer t t t t t t ( ) ( ) ( ) ( ) ( ) ( ) t t t t t t ( ) ( ) ( ) ( ) ( ) ( ) In ths example the matrces () () are dentcal. Hence A ( ()) and so we can obtan matrx and (). Regardng that the hammng weght of u v sub-block A are ether even or odd we can parse all possble frst u to classes. () () et A whch for ths matrx only second column s unknown. Hence by usng about K output bts belong to the second output sub-block attacker can wrte a lnear system and solve so can determne A and then the second sub-block plantexts are recovered too. Example7 et a (66) - cascaded convolutonal transducer that proposed n []. For an nput vector of length 6 f the key be weak as mentoned before then for any output block we can calculate the frst 3 bts of nput block and also f the key s not week then can determne the frst 6 bts of nput block. IV. CNCSIN In ths paper we nvestgated two attacks on the proposed desgn. The frst attack s a partal key recovery whch for a (kkm) -cascade was determned a fragment of cphertext wthout calculatng master key wth complexty (k ). In addton a weak key on ths system was found that one could recover longer fragment of plantexts wth complexty ( k ). Issue Volume 7 63

8 INTERNATINA JRNA of MATHEMATICS AND CMPTERS IN SIMATIN REFERENCES [] D. Trnca Seuental and Parallel Cascaded Convolutonal Encrypton wth ocal Propagaton: Toward Future Drectons n Symmetrc Cryptography the 3 rd Internatonal Conference on Informaton Technology: SA 6 pp IEEE Computer Socety Press. [] D. Trnca Effcent FPA Implementatons and Cryptanalyss of Automata-based Dynamc Convolutonal Cryptosystems Avalable: http;// [3] A. Dholaka.: Introducton to Convolutonal Codes wth Applcatons. Kluwer (99). [] Ph. Pret : Convolutonal Codes: An Algebrac Approach. MIT Press Cambrdge MA SA(988). Issue Volume 7 6

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

The stream cipher MICKEY

The stream cipher MICKEY The stream cpher MICKEY-128 2.0 Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net 30 th June 2006 Abstract: We

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Turing Machines (intro)

Turing Machines (intro) CHAPTER 3 The Church-Turng Thess Contents Turng Machnes defntons, examples, Turng-recognzable and Turng-decdable languages Varants of Turng Machne Multtape Turng machnes, non-determnstc Turng Machnes,

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Differential Cryptanalysis of Nimbus

Differential Cryptanalysis of Nimbus Dfferental Cryptanalyss of Nmbus Vladmr Furman Computer Scence Department, Technon - Israel Insttute of Technology, Hafa 32000, Israel. vfurman@cs.technon.ac.l. Abstract. Nmbus s a block cpher submtted

More information

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction Attacks on RSA The Rabn Cryptosystem Semantc Securty of RSA Cryptology, Tuesday, February 27th, 2007 Nls Andersen Square Roots modulo n Complexty Theoretc Reducton Factorng Algorthms Pollard s p 1 Pollard

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

1 GSW Iterative Techniques for y = Ax

1 GSW Iterative Techniques for y = Ax 1 for y = A I m gong to cheat here. here are a lot of teratve technques that can be used to solve the general case of a set of smultaneous equatons (wrtten n the matr form as y = A), but ths chapter sn

More information

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled

More information

Low Complexity Soft-Input Soft-Output Hamming Decoder

Low Complexity Soft-Input Soft-Output Hamming Decoder Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

ELASTIC WAVE PROPAGATION IN A CONTINUOUS MEDIUM

ELASTIC WAVE PROPAGATION IN A CONTINUOUS MEDIUM ELASTIC WAVE PROPAGATION IN A CONTINUOUS MEDIUM An elastc wave s a deformaton of the body that travels throughout the body n all drectons. We can examne the deformaton over a perod of tme by fxng our look

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

Week 5: Neural Networks

Week 5: Neural Networks Week 5: Neural Networks Instructor: Sergey Levne Neural Networks Summary In the prevous lecture, we saw how we can construct neural networks by extendng logstc regresson. Neural networks consst of multple

More information

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

Entropy of Markov Information Sources and Capacity of Discrete Input Constrained Channels (from Immink, Coding Techniques for Digital Recorders)

Entropy of Markov Information Sources and Capacity of Discrete Input Constrained Channels (from Immink, Coding Techniques for Digital Recorders) Entropy of Marov Informaton Sources and Capacty of Dscrete Input Constraned Channels (from Immn, Codng Technques for Dgtal Recorders). Entropy of Marov Chans We have already ntroduced the noton of entropy

More information

Chapter 8 SCALAR QUANTIZATION

Chapter 8 SCALAR QUANTIZATION Outlne Chapter 8 SCALAR QUANTIZATION Yeuan-Kuen Lee [ CU, CSIE ] 8.1 Overvew 8. Introducton 8.4 Unform Quantzer 8.5 Adaptve Quantzaton 8.6 Nonunform Quantzaton 8.7 Entropy-Coded Quantzaton Ch 8 Scalar

More information

Research on State Collisions of Authenticated Cipher ACORN

Research on State Collisions of Authenticated Cipher ACORN 4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Research on State Collsons of Authentcated Cpher ACORN Pe Zhanga*, Je Guanb, Junzh Lc and Tarong Shd Informaton

More information

S Advanced Digital Communication (4 cr) Targets today

S Advanced Digital Communication (4 cr) Targets today S.72-3320 Advanced Dtal Communcaton (4 cr) Convolutonal Codes Tarets today Why to apply convolutonal codn? Defnn convolutonal codes Practcal encodn crcuts Defnn qualty of convolutonal codes Decodn prncples

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:

More information

C/CS/Phy191 Problem Set 3 Solutions Out: Oct 1, 2008., where ( 00. ), so the overall state of the system is ) ( ( ( ( 00 ± 11 ), Φ ± = 1

C/CS/Phy191 Problem Set 3 Solutions Out: Oct 1, 2008., where ( 00. ), so the overall state of the system is ) ( ( ( ( 00 ± 11 ), Φ ± = 1 C/CS/Phy9 Problem Set 3 Solutons Out: Oct, 8 Suppose you have two qubts n some arbtrary entangled state ψ You apply the teleportaton protocol to each of the qubts separately What s the resultng state obtaned

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for

More information

Department of Mathematics, Shantou University, Shantou, Guangdong, , China.

Department of Mathematics, Shantou University, Shantou, Guangdong, , China. 205 Internatonal Conference on Computer Scence and Communcaton Engneerng (CSCE 205) ISN: 978--60595-249-9 A Novel Color Image Encrypton Scheme ased on Permutaton-substtuton Archtecture Ru-Song Ye,a, Mng

More information

MODELING TRAFFIC LIGHTS IN INTERSECTION USING PETRI NETS

MODELING TRAFFIC LIGHTS IN INTERSECTION USING PETRI NETS The 3 rd Internatonal Conference on Mathematcs and Statstcs (ICoMS-3) Insttut Pertanan Bogor, Indonesa, 5-6 August 28 MODELING TRAFFIC LIGHTS IN INTERSECTION USING PETRI NETS 1 Deky Adzkya and 2 Subono

More information

Report on Image warping

Report on Image warping Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

A Comparison between Weight Spectrum of Different Convolutional Code Types

A Comparison between Weight Spectrum of Different Convolutional Code Types A Comparson between Weght Spectrum of fferent Convolutonal Code Types Baltă Hora, Kovac Mara Abstract: In ths paper we present the non-recursve systematc, recursve systematc and non-recursve non-systematc

More information

9 Characteristic classes

9 Characteristic classes THEODORE VORONOV DIFFERENTIAL GEOMETRY. Sprng 2009 [under constructon] 9 Characterstc classes 9.1 The frst Chern class of a lne bundle Consder a complex vector bundle E B of rank p. We shall construct

More information

CHAPTER III Neural Networks as Associative Memory

CHAPTER III Neural Networks as Associative Memory CHAPTER III Neural Networs as Assocatve Memory Introducton One of the prmary functons of the bran s assocatve memory. We assocate the faces wth names, letters wth sounds, or we can recognze the people

More information

Lecture 5, October 8. DES System (Modification)

Lecture 5, October 8. DES System (Modification) Lecture 5, October 8. 10/10/01 Gene Tsudk, ICS 268 Fall 2001 1 Encrypton Process 64 Bt Plantext Intal Permutaton 32 Bt L0 32 Bt R0 + F(R0,K1) DES System (Modfcaton) Festel Network Buldng Block Key Schedule

More information

Lecture 10 Support Vector Machines II

Lecture 10 Support Vector Machines II Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.65/15.070J Fall 013 Lecture 1 10/1/013 Martngale Concentraton Inequaltes and Applcatons Content. 1. Exponental concentraton for martngales wth bounded ncrements.

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

Quantum and Classical Information Theory with Disentropy

Quantum and Classical Information Theory with Disentropy Quantum and Classcal Informaton Theory wth Dsentropy R V Ramos rubensramos@ufcbr Lab of Quantum Informaton Technology, Department of Telenformatc Engneerng Federal Unversty of Ceara - DETI/UFC, CP 6007

More information

arxiv: v2 [cs.cr] 29 Sep 2016

arxiv: v2 [cs.cr] 29 Sep 2016 Internatonal Journal of Bfurcaton and Chaos c World Scentfc Publshng Company Breakng a chaotc mage encrypton algorthm based on modulo addton and XOR operaton arxv:107.6536v [cs.cr] 9 Sep 016 Chengqng L

More information

On an Extension of Stochastic Approximation EM Algorithm for Incomplete Data Problems. Vahid Tadayon 1

On an Extension of Stochastic Approximation EM Algorithm for Incomplete Data Problems. Vahid Tadayon 1 On an Extenson of Stochastc Approxmaton EM Algorthm for Incomplete Data Problems Vahd Tadayon Abstract: The Stochastc Approxmaton EM (SAEM algorthm, a varant stochastc approxmaton of EM, s a versatle tool

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

The Quadratic Trigonometric Bézier Curve with Single Shape Parameter

The Quadratic Trigonometric Bézier Curve with Single Shape Parameter J. Basc. Appl. Sc. Res., (3541-546, 01 01, TextRoad Publcaton ISSN 090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com The Quadratc Trgonometrc Bézer Curve wth Sngle Shape Parameter Uzma

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Message modification, neutral bits and boomerangs

Message modification, neutral bits and boomerangs Message modfcaton, neutral bts and boomerangs From whch round should we start countng n SHA? Antone Joux DGA and Unversty of Versalles St-Quentn-en-Yvelnes France Jont work wth Thomas Peyrn 1 Dfferental

More information

Appendix B. The Finite Difference Scheme

Appendix B. The Finite Difference Scheme 140 APPENDIXES Appendx B. The Fnte Dfference Scheme In ths appendx we present numercal technques whch are used to approxmate solutons of system 3.1 3.3. A comprehensve treatment of theoretcal and mplementaton

More information

DC-Free Turbo Coding Scheme Using MAP/SOVA Algorithms

DC-Free Turbo Coding Scheme Using MAP/SOVA Algorithms Proceedngs of the 5th WSEAS Internatonal Conference on Telecommuncatons and Informatcs, Istanbul, Turkey, May 27-29, 26 (pp192-197 DC-Free Turbo Codng Scheme Usng MAP/SOVA Algorthms Prof. Dr. M. Amr Mokhtar

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

SL n (F ) Equals its Own Derived Group

SL n (F ) Equals its Own Derived Group Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu

More information

Convexity preserving interpolation by splines of arbitrary degree

Convexity preserving interpolation by splines of arbitrary degree Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete

More information

Markov Chain Monte Carlo Lecture 6

Markov Chain Monte Carlo Lecture 6 where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways

More information

Outline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique

Outline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique Outlne and Readng Dynamc Programmng The General Technque ( 5.3.2) -1 Knapsac Problem ( 5.3.3) Matrx Chan-Product ( 5.3.1) Dynamc Programmng verson 1.4 1 Dynamc Programmng verson 1.4 2 Dynamc Programmng

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

Lecture Space-Bounded Derandomization

Lecture Space-Bounded Derandomization Notes on Complexty Theory Last updated: October, 2008 Jonathan Katz Lecture Space-Bounded Derandomzaton 1 Space-Bounded Derandomzaton We now dscuss derandomzaton of space-bounded algorthms. Here non-trval

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016 U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and

More information

χ x B E (c) Figure 2.1.1: (a) a material particle in a body, (b) a place in space, (c) a configuration of the body

χ x B E (c) Figure 2.1.1: (a) a material particle in a body, (b) a place in space, (c) a configuration of the body Secton.. Moton.. The Materal Body and Moton hyscal materals n the real world are modeled usng an abstract mathematcal entty called a body. Ths body conssts of an nfnte number of materal partcles. Shown

More information

MDS Array Codes for Correcting a Single Criss-Cross Error

MDS Array Codes for Correcting a Single Criss-Cross Error 1068 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 3, MAY 2000 MDS Array Codes for Correctng a Sngle Crss-Cross Error Maro Blaum, Fellow, IEEE, and Jehoshua Bruck, Senor Member, IEEE Abstract We

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

% & 5.3 PRACTICAL APPLICATIONS. Given system, (49) , determine the Boolean Function, , in such a way that we always have expression: " Y1 = Y2

% & 5.3 PRACTICAL APPLICATIONS. Given system, (49) , determine the Boolean Function, , in such a way that we always have expression:  Y1 = Y2 5.3 PRACTICAL APPLICATIONS st EXAMPLE: Gven system, (49) & K K Y XvX 3 ( 2 & X ), determne the Boolean Functon, Y2 X2 & X 3 v X " X3 (X2,X)", n such a way that we always have expresson: " Y Y2 " (50).

More information

Random Walks on Digraphs

Random Walks on Digraphs Random Walks on Dgraphs J. J. P. Veerman October 23, 27 Introducton Let V = {, n} be a vertex set and S a non-negatve row-stochastc matrx (.e. rows sum to ). V and S defne a dgraph G = G(V, S) and a drected

More information

Dynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence)

Dynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence) /24/27 Prevew Fbonacc Sequence Longest Common Subsequence Dynamc programmng s a method for solvng complex problems by breakng them down nto smpler sub-problems. It s applcable to problems exhbtng the propertes

More information

ALGORITHM FOR THE CALCULATION OF THE TWO VARIABLES CUBIC SPLINE FUNCTION

ALGORITHM FOR THE CALCULATION OF THE TWO VARIABLES CUBIC SPLINE FUNCTION ANALELE ŞTIINŢIFICE ALE UNIVERSITĂŢII AL.I. CUZA DIN IAŞI (S.N.) MATEMATICĂ, Tomul LIX, 013, f.1 DOI: 10.478/v10157-01-00-y ALGORITHM FOR THE CALCULATION OF THE TWO VARIABLES CUBIC SPLINE FUNCTION BY ION

More information

Clock-Gating and Its Application to Low Power Design of Sequential Circuits

Clock-Gating and Its Application to Low Power Design of Sequential Circuits Clock-Gatng and Its Applcaton to Low Power Desgn of Sequental Crcuts ng WU Department of Electrcal Engneerng-Systems, Unversty of Southern Calforna Los Angeles, CA 989, USA, Phone: (23)74-448 Massoud PEDRAM

More information

Impossible differential attacks on 4-round DES-like ciphers

Impossible differential attacks on 4-round DES-like ciphers INENAIONA JOUNA OF COMPUES AND COMMUNICAIONS Volume 9, 2015 Impossble dfferental attacks on 4-round DES-lke cphers Pavol Zajac Abstract Data Encrypton Standard was a man publc encrypton standard for more

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1]

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1] DYNAMIC SHORTEST PATH SEARCH AND SYNCHRONIZED TASK SWITCHING Jay Wagenpfel, Adran Trachte 2 Outlne Shortest Communcaton Path Searchng Bellmann Ford algorthm Algorthm for dynamc case Modfcatons to our algorthm

More information

On a CCA2-secure variant of McEliece in the standard model

On a CCA2-secure variant of McEliece in the standard model On a CCA2-secure varant of McElece n the standard model Edoardo Perschett Department of Mathematcs, Unversty of Auckland, New Zealand. e.perschett@math.auckland.ac.nz Abstract. We consder publc-key encrypton

More information

Neuro-Adaptive Design - I:

Neuro-Adaptive Design - I: Lecture 36 Neuro-Adaptve Desgn - I: A Robustfyng ool for Dynamc Inverson Desgn Dr. Radhakant Padh Asst. Professor Dept. of Aerospace Engneerng Indan Insttute of Scence - Bangalore Motvaton Perfect system

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

= = = (a) Use the MATLAB command rref to solve the system. (b) Let A be the coefficient matrix and B be the right-hand side of the system.

= = = (a) Use the MATLAB command rref to solve the system. (b) Let A be the coefficient matrix and B be the right-hand side of the system. Chapter Matlab Exercses Chapter Matlab Exercses. Consder the lnear system of Example n Secton.. x x x y z y y z (a) Use the MATLAB command rref to solve the system. (b) Let A be the coeffcent matrx and

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

EGR 544 Communication Theory

EGR 544 Communication Theory EGR 544 Communcaton Theory. Informaton Sources Z. Alyazcoglu Electrcal and Computer Engneerng Department Cal Poly Pomona Introducton Informaton Source x n Informaton sources Analog sources Dscrete sources

More information

Complete subgraphs in multipartite graphs

Complete subgraphs in multipartite graphs Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G

More information

A New Refinement of Jacobi Method for Solution of Linear System Equations AX=b

A New Refinement of Jacobi Method for Solution of Linear System Equations AX=b Int J Contemp Math Scences, Vol 3, 28, no 17, 819-827 A New Refnement of Jacob Method for Soluton of Lnear System Equatons AX=b F Naem Dafchah Department of Mathematcs, Faculty of Scences Unversty of Gulan,

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

Basic Regular Expressions. Introduction. Introduction to Computability. Theory. Motivation. Lecture4: Regular Expressions

Basic Regular Expressions. Introduction. Introduction to Computability. Theory. Motivation. Lecture4: Regular Expressions Introducton to Computablty Theory Lecture: egular Expressons Prof Amos Israel Motvaton If one wants to descrbe a regular language, La, she can use the a DFA, Dor an NFA N, such L ( D = La that that Ths

More information

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00 CHALMERS GÖTEBORGS UNIVERSITET CRYPTOGRAPHY TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00 No extra materal s allowed durng the exam except for pens and a smple calculator (not smartphones).

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

An Introduction to Morita Theory

An Introduction to Morita Theory An Introducton to Morta Theory Matt Booth October 2015 Nov. 2017: made a few revsons. Thanks to Nng Shan for catchng a typo. My man reference for these notes was Chapter II of Bass s book Algebrac K-Theory

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information