The Role of Latin Square in Cipher Systems: A Matrix Approach to Model Encryption Modes of Operation

Size: px
Start display at page:

Download "The Role of Latin Square in Cipher Systems: A Matrix Approach to Model Encryption Modes of Operation"

Transcription

1 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT The Role of Lati Square i Cipher Systems: A atrix Approach to odel cryptio odes of Operatio Jieju og Computer Sciece Departmet Uiversity of Califoria, Los Ageles jkog@csuclaedu Abstract This paper studies the theoretic backgroud of cryptographic modes of operatio, i particular those modes proposed to esure message privacy A ovel algebraic model is preseted as a archetype of ecryptio desig I the ideal case, ecryptig multiple messages is treated as iductively applyig the algebraic operatio, a operatio correspodig to block-by-block processig, o Lati Squares over a sequece of fiite groups {, 2, 3,, } We further show that a Lati Square cipher is a ewly discovered hard-core fuctio for ay strog oe-way legth-preservig fuctio Based o the discovery, we propose a thesis that ecryptio modes of operatio should implemet cryptographically strog pseudoradom geerators i the ideal case, so that the radom oracle model ca be used to justify the practice of replacig Lati Square ciphers with good implemetatios (eg, AS) Fially we preset a cryptaalysis of NIST s stadard modes of operatio based o this work The algebraic model shows that, eve whe a ideally strog oe-way fuctio is used, oe of NIST s stadard modes of operatio (OFB, CFB, CTR, CBC) ca produce cryptographically strog pseudoradom esembles based o the ideal oe-way fuctio the distictio of this work is to use formal method (rather tha empirical attacks) to illustrate the desig flaws i the stadard modes of operatio As umerous security protocols are usig the flawed modes of operatio, we argue that these atioal stadards should be repaired, ad efficiet repairs (double ecryptio) ca be easily achieved I INTRODUCTION A fudametal problem i cryptography is usig a sigle secret key to process multiple messages i a cipher system with fiite domai ad rage Assumig a reasoable key lifetime, applicatios like data ecryptio, cryptographically strog hashig, timestamped multiple data sigig demad a cipher system to maitai its security stregth eve whe the same secret key is used may times I the real world, cryptographic modes of operatio have bee widely used i practice to esure privacy ad itegrity by reapplyig the same secret key multiple times This paper focuses o privacy orieted modes of operatio (eg, CBC, CFB, OFB modes, but ot CBC-AC, OCB modes etc) ad preset a algebraic aalysis of commo modes of operatio i use Though some literatures [5][1] have addressed the same problem by both empirical ad theoretic aalysis, oe of them has followed the same algebraic approach used i this work I our algebraic otatios, realizig a ideal radom oracle is equivalet to implemetig a good oe-way fuctio over the fiite group The we defie a ovel operatio omial costructio that iductively chages the base fiite group to a sequece of fiite groups {, 2, 3,, } The operatio is a welldefied algebraic operatio o square matrices, ad the iductio is redered o Lati Squares, which are specific kid of square matrices correspodig to the cocept of perfect system (or a collectio of trapdoor permutatios with uiformly distributed key) [20] By the algebraic model, usig the ideal Lati Square radom oracles to ecrypt multiple blocks of data is equivalet to performig a sequece of omial costructios over the sequece of fiite groups We show that Lati Squares with ivariace properties ca be used to costruct a cryptographically strog pseudoradom geerator (CSPRG) The costructio itself, though studied uder ideal coditios i this paper, ca be applied uder radom oracle model[2] to justify ecryptio modes of operatio desig i the real world The applicatios of this algebraic model is demostrated by related cryptaalysis agaist atioal stadard modes widely used i the real world ve whe a ideally strog oe-way fuctio is used, oe of NIST s stadard

2 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT modes of operatio (OFB, CFB, CTR, CBC) ca produce cryptographically strog pseudoradom esembles based o the ideal oe-way fuctio As umerous security protocols are usig the flawed modes of operatio, we argue that these atioal stadards should be repaired, ad we show at least two efficiet repairs ca be easily achieved The remaiig of the paper is orgaized as follows: Sectio II explais the otatios used i this paper, i particular the algebraic ecryptio model, perfect system, ad Lati Square ciphers The Sectio III itroduces a ew operatio omial costructio ad aalyzes its algebraic properties Based o the ew otios, Sectio IV defies the cocept of pseudoperfect system I Sectio V ad VI we show how to costruct cryptographically strog pseudoradom geerators from Lati Square ciphers I Sectio VII we discuss the desig flaws of NIST s stadard modes of operatio ad the potetial repairs Ad fially Sectio VIII cocludes the paper A Commo otatios II NOTATIONS Let S q deote a fiite set of size q A fuctio f : S q S q maps a elemet i S q to aother elemet Let F q be the set of all q q fuctios mappig S q ito S q Let P q F q be the set of q! such fuctios that are permutatios Let U deote selectig a elemet from a set followig uiform distributio, for example, x U S q We operate o specific fiite sets kow as strigs S 2 = Z 2 deotes the set of all 2 biary strigs of legth, ad Z + 2 deotes biary strigs of ay legth (the symbol + deotes iteger additio elsewhere, ad the symbol or deotes iteger multiplicatio except i the otio of multiplicative group Z ) Similarly, let r be ay positive iteger greater tha 1 S r = Z r deotes the set of all r r-ary strigs of legth (ie, r is the radix), ad Z + r deotes r-ary strigs of ay legth A algebraic represetatio of Z r is, ie, the set {0, 1,, r 1} as we ca treat r as radix ad strigs as umbers i positio system Hece the strig compariso operator is defied as the iteger compariso operator i r-ary positio system 1 A (edomorphic) ecryptio/ecipher fuctio is deoted as T : S q S q S q That is, by usig a key k S q, a plaitext m S q is ecrypted ito ciphertext e = T (k, m) S q Due to Curry s work [6], for ay fuctio f defied o a tuple type D 1 D 2 ad with retur type R, f : (D 1 D 2 ) R there is a high-order fuctio F defied o the first domai that returs a fuctio defied o the secod domai ad with retur type R: F : D 1 (D 2 R) The secod fuctio F is called the curried versio of the first fuctio f, ad f is called the ucurried versio of F 2 Later we will write the fuctio retured by F as f D1 We obtai the curried result of the ecipher T Ituitively, the first argumet (ie, the key) is writte as a subscript, T k I this otatio, T k : S q S q may be thought of as a set of q fuctios idexed by key ad is a subset of F q Similarly, if we defie its couterpart fuctio T (m, k) = T (k, m) ad obtai the curried result of the couterpart T m : S q S q, the result is a set of q fuctios idexed by plaitext The matrix represetatio of a ecryptio fuctio T : S q S q S q is a square matrix 3 L T over S q : k = k 1 k 2 k q m = m 1 m 2 m q e = e k1,m 1 e k1,m 2 e k1,mq e k2,m 1 e k2,m 2 e k2,mq e kq,m1 e kq,m2 e kq,mq 1 Aother algebraic represetatio of (a 1 a 1a 0) Z r is a polyomial f(r) = a 1 r a 1 r + a 0 where a i is from the commutative rig Z r is a special polyomial rig [x] with x = r 2 I this paper we itroduce Curry s work to avoid usig the cumbersome otatio of collectio of fuctios, which is actually a fuctio ucurried o the collectio idex 3 Later i the paper we will use a cipher system T ad the correspodig square matrix L T as syoyms

3 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT I a matrix L, let L x,y deote the elemet at row by x ad colum idexed by y I the matrix, distict keys k i S q costitute the row idices, distict plaitexts m j S q costitute the colum idices, ad every ciphertext e ki,m j = L T k i,m j = T (k i, m j ) S q Note that the base set S q of a cipher system sufficietly determies the dimesios of the correspodig square matrix Thus we do ot explicitly specify the dimesios of a square matrix as i other literatures The decryptio/decipher fuctio is deoted as T 1 with idetical domai ad rage as T For ay k, there is a k 1, such that T 1 k T 1 k = I where deotes fuctio compositio ad I is the idetity trasformatio I(x) = x The geeral model does ot require k = k 1 or T = T 1 : For public key schemes, there exists a polyomial-time algorithm that ca obtai the ecryptio/verificatio/public key k from the decryptio/sigig/private key k 1 But for sufficietly large q, there exists o polyomial-time algorithm that ca obtai the private key k 1 from the public key k (ie, it is oe-way) For symmetric key schemes, T = T 1, ad there is a polyomial-time algorithm that ca obtai k ad k 1 from each other B Perfect System ad Lati Square Shao [20] developed a mathematical theory for cryptography based o iformatio theory For radom variables,, mappig ito spaces = = = S q, respectively, the etropy differece A(, ) = H() H( ) is the amout of iformatio about which the adversary obtais A perfect system is oe i which A(, ) is zero, ie, H() = H( ) That is, if the secret key k is uiformly chose from the key space, the a adversary with ay ciphertext has o choice but to select the pre-image plaitext followig uiform distributio Shao also proved that H() = H( ) is a ecessary ad sufficiet coditio for A(, ) = 0 ore formally, we defie perfect system usig radom variables: Defiitio 1: (Perfect System): Give a pair of fuctios T : S q S q S q ad T 1 : S q S q S q, the system T, T 1 is a perfect system if the followig coditios hold: 1) Idetity trasformatio: For ay k S q, there exists k 1 S q, k 1 ca be computed i polyomial time from k For ay m S q, T 1 (k 1, (T (k, m))) = m 2) Trasitivity of uiform distributio: Let U q be a radom variables followig uiform distributio over S q The both T (U q, m) ad T (m, U q ) are radom variables followig uiform distributio over S q Similarly, both T 1 (U q, m) ad T 1 (m, U q ) are radom variables followig uiform distributio over S q 3) Uiformly distributed key: k U S q That is, the key k is truly radom A importat property of perfect system is trasitivity of uiform distributio, that is, give a arbitrary plaitext m, a perfect system will uiformly map it ito ay possible ciphertext because of the uiformly selected key The correspodece betwee Lati Square ad perfect system was also show i the same referece [20] I this paper a perfect system is treated as a special Lati Square cipher with truly radom keys I other words, a Lati Square cipher is a sub-perfect system operatig o possibly o-truly radom keys Defiitio 2: (Lati Square): A Lati Square over S q is a q q matrix L over S q whose etries are take from S q ad which has the property that each symbol from S q occurs exactly oce i each row ad exactly oce i each colum of L I formal otios, (1) L i1,j = L i2,j if ad oly if i 1 = i 2 ; (2) L i,j1 = L i,j2 if ad oly if j 1 = j 2 I additio, if the base set S q of a square matrix is a totally ordered set (eg, S r = Z r ), the the matrix s row idices ad colum idices are totally ordered If the square matrix is a Lati Square, it ca be ormalized/reduced Defiitio 3: (Normalized Lati Square): A ormalized (or reduced) Lati Square over a totally ordered set S q has both its first row ad first colum ordered by the elemet compariso operatio of the set xample 1: A ormalized Lati Square over S 2 2 = Z 2 2 is:

4 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT k = m = e = By the matrix represetatio of cipher systems, Lati Squares over S q becomes a collectio of permutatios idexed by either the key k or the plaitext m T k, the curried result of T, is the set of rows that are mappigs betwee plaitext m ad ciphertext e T m, the curried result of the couterpart T (m, k) = T (k, m), correspods to the set of colums that are mappigs betwee ciphertext e ad key k It is importat to poit out that amog q! permutatios i P q, there are oly q of them are qualified to be a row or a colum i the Lati Square They must pairwisely map distict plaitexts (or keys) ito distict ciphertexts ] It is easy to verify that the bitwise exclusive- OR operatio is a implemetatio of the Lati Square ] implemetatio of the Lati Square over Z 1 2 [ [ over S 2 1 = Z 1 2, ad the egatio of is a III NOINAL CONSTRUCTION I this sectio we defie a ew operatio o matrices ad the study its algebraic properties I the ext sectio we will show the correspodece betwee this operatio ad empirical practice Defiitio 4: (Nomial Costructio): Give a x a y a matrix A over Z a r ad a x b y b matrix B over Z b r, the omial costructio o A with B geerates a (x a x b ) (y a y b ) matrix C = A B over Z a+b r : 1) Iitializatio: C has x b y b sub-matrices of dimesio x a y a Let C(i, j ) deote the sub-matrix at i -th row ad j -th colum at the graularity of sub-matrix ach of the sub-matrix is iitialized as A I other words, C(i, j ) i,j = A i,j ad i shorthad C(i, j ) = A 2) Prefix: ach elemet of a sub-matrix is prefixed with the correspodig elemet i B I other words, each elemet i C(i, j) is prefixed with B s elemet B i,j A algebraic represetatio of the etire procedure is C(i, j ) i,j = r a B i,j + A i,j ore precisely, let x/y be the quotiet of iteger divisio ad x%y be the remaider of iteger divisio, C i,j = r a B i/xa,j/y a + A i%xa,j%y a Note that each elemet i A, B, C is a strig comprised of r-ary itegers A matrix elemet of legth is i the set Z r Z + r xample 2: Here is a example of omial costructio o a 2 2 matrix over Z 1 2 with a 2 3 matrix over Z1 2 The result is a 4 6 matrix over Z 2 2 [ ] [ ] = Theorem 5: Give a Lati Square A over Z a r ad a Lati Square B over Z b r, the omial costructio o A with B geerates a ew Lati Square C = A B over Z a+b r Proof: Ay two elemets at C s same row will be differet followig either of the two cases: (1) They are i differet sub-matrices, thus the prefix is differet because B is a Lati Square; (2) They are i the same sub-matrix, thus the iitialized part is differet because A is a Lati Square The same argumet also applies to ay two elemets at same colum Thus C is a Lati Square ach elemet of C has a r-ary itegers i its iitialized part, ad b r-ary itegers i its prefix part It is a strig of r-ary itegers i legth a + b Corollary 6: Give a ormalized Lati Square A over Z a r ad a ormalized Lati Square B over Z b r, the omial costructio o A with B geerates a ew ormalized Lati Square C = A B over Z a+b Proof: By Theorem 5, C is a Lati Square over Z a+b r r

5 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT The first row of C is ordered because: (1) the most sigificat b r-ary itegers of the row elemets are ordered because B is a ormalized Lati Square; (2) the least sigificat a r-ary itegers of the row elemets are ordered because A is a ormalized Lati Square The same argumet also applies to the first colum Thus C is a ormalized Lati Square Give certai iductio bases, omial costructio ca be used to costruct algebraic structures Defiitio 7: (Biary 1-power Nomial Lati Squares): For all x 1, a biary 1-power omial Lati Square L (x) 2,1 is over the set Zx 2 ad costructed by mathematical iductio i exactly x rouds: ] ] or The geerator L (1) 2,1 is either of the two Lati Squares over Z1 2, ie, [ L (x+1) 2,1 is costructed as the omial costructio o L (x) 2,1 with L(1) 2,1 That is, L (x+1) 2,1 = L (x) 2,1 L(1) 2,1 I particular, the ormalized biary 1-power omial Lati Square L N(x) 2,1 is uiquely costructed from the ormalized oe [ Ay L N(x) 2,1 is ormalized by costructio accordig to Corollary 6 For example, The simplest costructio is ] L N(2) 2,1 = [ Later i this paper we will show the relatio betwee stream ciphers ad L N(x) 2,1 It is easy to verify that forms a Abelia semigroup o biary 1-power omial Lati Squares Theorem 8: L 2,1, forms a ifiite Abelia semigroup o omial Lati Squares L 2,1 = i=1 L(i) 2,1 Proof: Give ay biary 1-power omial Lati Square A = L (a) 2,1, ad ay biary 1-power omial Lati Square B = L (b) 2,1 Their omial costructio Y = A B is i the set Y = L (1) (1) ( 2,1 L(1) 2,1 L2,1 L(1) 2,1 = L a+ b ) 2,1 L 2,1 } {{ } a } {{ } b A B = L (a+b) 2,1 = L (b+a) 2,1 = B A, so is commutative For ay biary 1-power omial Lati Square C = L (c) 2,1, (A B) C = A (B C) = L(a+b+c) 2,1 Thus is associative ore geerally, if the geerator L (1) 2,1 of the semigroup L 2,1 is substituted with a arbitrary Lati Square L (1) r, over Z r, we have followig defiitios ad theorems Defiitio 9: (r-ary -power Nomial Lati Squares): A r-ary -power omial Lati Square L r, (x) is over the set Z x r ad costructed by mathematical iductio i exactly x rouds: The geerator L (1) r, is a arbitrary Lati Square over Z r L (x+1) r, is costructed as the omial costructio o L (x) r, with L (1) r, That is, L r, (x+1) = L r, L (x) (1) r, Theorem 10: L r,, forms a ifiite semigroup o Lati Squares L r, = i=1 L(i) r, Proof: The proof is idetical to the proof of Theorem 8, except ay occurrece of 2, 1 is replaced by r, (which meas the term bit is replaced by r-ary iteger ad bit-legth is ot always 1) Ituitively, the closure law of semigroup esures that all members of this semigroup share system-level property with its geerator Ad the associativity law of semigroup esures the order of operatios is trivial These laws are useful i costructig the pseudoperfect systems described below A Costructio of Pseudoperfect System IV PSUDOPRFCT SYST We employ radom oracle model [2] ad assume the existece of a ideal implemetatio of Lati Square The radom oracle is amed as Lati Square Oracle ad will be replaced by actual implemetatios followig the radom oracle model

6 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT Defiitio 11: (Lati Square Oracle): A r-ary -power Lati Square Oracle () is a radom oracle that implemets L (1) r,, ie, a arbitrary Lati Square over Z r By the radom oracle model we assume such a L T = L (1) r, is realizable Now we show that the empirical method of processig data block-by-block actually correspods to omial costructio Defiitio 12: (Little-edia System): Let B 0, B 1,, B x 1 deote a sequece of x blocks of bits (ie, strigs from Z + 2 ), ad b i(0), b i(1),, b i( 1) deote the bits of block B i A little-edia system stores the blocks from left to right accordig to the order of block idex, with the leftmost B 0 as the least sigificat block ad rightmost B x 1 as the most sigificat block Withi each block, the storage is implemetatio-defied, with b i( 1) as the most sigificat bit ad b i(0) as the least sigificat bit If we replace each bit with r-ary iteger, we obtai a little-edia system over Z + r Such storage protocol is eeded i computer systems to store multiple blocks of data ad a block is ormally called a byte For example, a hexadecimal bit sequece of multiple bytes 0x is stored as i little-edia systems 4 Defiitio 13: (Pseudoperfect System): Let x be a polyomial A r-ary -power omial system of polyomial degree is a cipher system that uses r-ary -power to produce x log r-ary ciphertext from x log r-ary plaitext ad x log r-ary key The ecryptio is accomplished i exactly x rouds: For all 1 i x, the ciphertext block B i is produced by the L T from the plaitext block B i ad the key block B i A r-ary -power pseudoperfect system of polyomial degree is a omial system of the same metrics, ad the x log r-ary key is geerated from a log r-ary truly radom key by a pseudoradom geerator (PRG) If the PRG is cryptographically strog (ie, CSPRG, so o Turig-complete algorithm ca differetiate the pseudoradom result from truly radom itegers with o-egligible probability), the the system is called r-ary -power cryptographically strog pseudoperfect system of polyomial degree Figure 1 depicts a r-ary -power pseudoperfect system Note that it is ot allowed to chage the implemetatio of durig the etire process, that is, the same is used to process all blocks We prove that the omial system, the costructio depicted iside the solid lie i Figure 1, is a Lati Square Theorem 14: A r-ary -power omial system of degree x costitutes a Lati Square cipher over Z x r Proof: We prove the theorem by iductio: (1) If x = 1, L T is a perfect system, the theorem is true by assumptio; (2) Suppose the theorem is true whe x = l, we deote the correspodig perfect system ad as T ad L T, respectively For x = l + 1, the procedure adds a ew most sigificat bits to the plaitext, key, ad ciphertext, respectively Let B l deote the ew block i the plaitext, B l deote the ew block i the key, ad B l deote the ew block i the ciphertext Without loss of geerality, the procedure is divided ito two steps: We use the L T to produce B l from B l ad B l I little-edia systems, this step produces the most sigificat bits of the ciphertext from the most sigificat bits of the key ad the plaitext This is equivalet to idetifyig a sub-lati-square from the r r choices that i tur were created i the prefixig step of omial costructio We use the L T to process the remaiig least-sigificat l blocks as usual I other words, o chage is made i processig the least sigificat l bits of ciphertext from the key ad the plaitext This is equivalet to applyig the Lati Square created i the iitializatio step of omial costructio Accordig to Theorem 10, the closure law of L r,, esures the result is exactly the Lati Square L r, (x) Like a perfect system, a pseudoperfect system is also a Lati Square cipher The differece betwee them is how the iput key is chose: (1) For a perfect system, the x log r-ary key is truly radom; (2) For a pseudoperfect system, the iput key is ot truly radom But if the PRG geerates a cryptographically strog pseudoradom esemble, the the x log r-ary key is a pseudoradom sequece that caot be differetiated from truly radom sequece 4 The storage model is for the ease of presetatio oly If we use big-edia systems (ie, blocks are stored i reversed order), the the prefix operatio i Defiitio 4 should be chaged to postfix operatio, ad the compariso operator should be re-defied

7 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT seed key r ary itegers r ary itegers PRG keystream x r ary itegers plaitext x r ary itegers r ary itegers r ary itegers r ary itegers r ary itegers ( x is a polyomial) r ary itegers r ary itegers = Z xz (,) Z x r x r x r x x x ciphertext x r ary itegers r ary itegers Nomial System Pseudoperfect System r ary itegers r ary itegers Fig 1 Costructio of Pseudoperfect System by ay Turig-complete algorithm i polyomial time Cryptographically strog pseudoperfect system is the ideal case of ecryptio modes of operatio This algebraic view of modes of operatio is more geeral tha the classic otio of oe-time pad (OTP) I a pseudoperfect system, L T is a Lati Square over Z r for ay r ad ay The geerator L (1) 2,1 (implemeted by bitwise exclusive-or ) used i OTP is merely a special case I OTP, r = 2 ad = 1 Give the cipher T ad a kow-plaitext m, T m must be oe-way to prevet the adversary from discoverig the key However, there is o practical way to implemet a oe-way L (1) 2,1, which is vulerable to exhaustive search I pseudoperfect system, r ad ca be sufficietly but reasoably large We will show below that a large r-ary -power oe-way ca be realized ad ca be replaced by some good implemetatios of oeway fuctio For example, for DLP-based implemetatios, r is a large strog prime ad = 1; for RSA ad Rabi fuctio, r is the product of two large primes ad = 1; for AS, r = 2 ad = 128 Breakig the oe-way property of these implemetatios equals to solvig some computatioally hard problems V RLATION BTWN LASO AND ON WAY FUNCTION I this sectio we will firstly propose a slightly modified probabilistic polyomial time model based o wellstudied cocepts i foudatios of cryptography The we will propose useful cocepts eeded to costruct cryptographically strog pseudoperfect systems: (1) The compositio of ay Lati Square cipher ad ay oe way fuctio is yet aother oe way fuctio; (2) Some Lati Square ciphers are oe-way fuctios that ca be used to realize pseudoradom geerator

8 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT A Geeralized probabilistic computatio model ad Oe-way Fuctio (OWF) I our algebraic otatios, realizig a ideal radom oracle is equivalet to implemetig a good oe-way fuctio over the fiite group Z r (ie, ) The cocept of oe-way fuctio is defied o polyomial relatio betwee the iput legth ad output legth Here we follow the commo defiitio [11]: Defiitio 15: (Oe-way Fuctio): A fuctio f : Z + 2 Z+ 2 is a (strog) oe-way fuctio if the followig two coditios hold: 1) asy to compute: There exists a determiistic polyomial-time algorithm A such that o iput x it outputs f(x), ie, A(x) = f(x) 2) Hard to ivert: For every probabilistic polyomial-time algorithm A, every positive polyomial P ( ), ad all sufficietly large, Pr[A (f(u ), 1 ) f 1 (f(u ))] < 1 P () where U deotes a radom variable uiformly distributed over Z 2, ad the auxiliary iput 1 gives the legth of the desired output i uary otatio I particular, ca be replaced by = if f is bijective, ad the auxiliary iput 1 is redudat if the oe-way fuctio is edomorphic f : Z 2 Z 2 The existece of oe-way fuctios is ot prove Yet a umber of cojectured oe-way fuctios are routiely used i commerce ad idustry, such as Discrete Logarithm [8], RSA fuctio [18], Rabi fuctio [16], Feistel structures [10], ad Substitutio-Permutatio Networks ost existig cryptaalysis o their oe-way property is based o biary system If we replace 2 with arbitrary radix r, the we switch the study of oe-way property from Z + 2 to Z+ r This ca be simply justified by chagig the alphabet used i the correspodig probabilistic Turig achies we ca replace the biary alphabet set Z 2 = {0, 1} with the r-ary alphabet set = {0, 1,, r 1}, ad the ew probabilistic Turig achie tosses a r-face dice rather tha a 2-face coi The biary probabilistic Turig achie is a special case of this more geeral computatio model with r = 2 Defiitio 16: (r-ary Bouded-Probability Time, BPP): Let (x) be the radom variable deotig the output of a r-ary probabilistic machie Let Pr[(x) = y] = {d Zt(x) r : d (x) = y} r t(x) where d is a r-face dice throw, t (x) is the umber of dice throws made by o iput x, ad d (x) deotes the output of o iput x whe d is the outcome of its dice throws We say that L is recogized by the r-ary probabilistic polyomial-time Turig achie if for every x L it holds that Pr[ accepts x] P () for every polyomial P ( ) for every x L it holds that Pr[ accepts x] P () for every polyomial P ( ) BPP is the class of laguages that ca be recogized by a r-ary probabilistic polyomial time Turig achie It is clear that the complexity classes of P, NP, PSPAC, NPSPAC are uchaged by choosig differet alphabets i Turig achies oreover, the followig theorem justifies the coclusio that the probabilistic computatio model BPP is also uchaged by radix coversio Theorem 17: Let radom variable X deote the distributio of 1 log r 1 -ary strig x = x 1, x 2,, x 1 If x i U 1, the X ca be reduced i polyomial time to a correspodece Y i r 2 -ary system such that the distributio Y for r 2 -ary strig y = y 1, y 2,, y 2 satisfies y i U 2 Proof: Firstly, we ca treat X s sample space as r1 1 pigeo holes The combiatios of x i s fill the holes oce, hece X is a uiform distributio o Z 1 r 1 For ay x U X, i a little-edia system we have x = x 1 r x 2 r1 1 + x 1, the we chage the represetatio to be y = y 2 r y 2 r2 1 + y 1 To obtai a truly radom variable Y, we ca apply the paddig argumet ad pad some truly radom bits to x The paddig is equivalet to turig the umber of pigeo holes from r1 1 to r2 2 The the radix coversio procedure ca be accomplished i polyomial time by repetitively producig the remaider ad quotiet of x/r 2

9 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT Fially, if y i, y i U 2 ad w is the value ot i the distributio, the there are 0 j< r 2,j i 2 = r2 2 1 empty pigeo holes caused by w, hece Y is ot a uiform distributio over Z 2 r 2 This cotradictio proves y i, y i U 2 A r 1 -ary probabilistic Turig achie ca be viewed as havig two iput tapes: (1) a real r 1 -ary iput x of t (x) legth x ad (2) a uiformly chose d Zr 1 playig the role of a possible outcome for a sequece of dice throws The we ca always covert the iput tape x to its r 2 -ary equivalece with legth x log r2 r 1 ad covert the sequece o dice-throw tape to its r 2 -ary equivalece of legth t (x) log r2 r 1 Polyomial costrait o iput legth is uchaged as P (t (x) log r2 r 1 ) is always a polyomial if P (t (x)) is a polyomial of x I particular, we ca always covert a r-ary radom iput ito the correspodig biary represetatio, the ru biary probabilistic Turig achies to process the iput, ad if ecessary covert the biary result back to the r-ary represetatio Therefore, from this poit o we will discuss oe-way fuctios ad pseudoradom geerators i r-ary systems, where a sigle r-ary iteger plays the role of a biary bit B Compositio of OWF ad The followig theorem shows the relatio betwee oe-way fuctios ad Lati Square ciphers Theorem 18: Fuctio compositios of a bijective edomorphic oe-way fuctio f : Z r Z r ad a {T, T 1 } over Z r are oe-way fuctios That is, {f T k, T k f, f T m, T m f} ad {f T 1 k, T 1 1 k f, f T 1 1 e, Te 1 f} are sets of oe-way fuctios from Z r to Z r Proof: As ay key assigmet always returs permutatio from a Lati Square cipher, we eed to prove permutatios over Z r do ot chage the oe-way property For f T k, the proof is divided ito three steps: 1) As a permutatio o U is also a uiform distributio, V = T k (U ) is a radom variable uiformly distributed over Z r Thus by oe-way fuctio s defiitio, for every probabilistic polyomial-time algorithm A, every positive polyomial P ( ), ad all sufficietly large Pr[A (f(v )) = f 1 (f(v ))] < 1 P () 2) Based o step 1, we eed to prove for all sufficietly large T 1 k 1 (f 1 (f(v ))) = T 1 thus Pr[A (f(v )) = T 1 k 1 (f 1 (f(v )))] < 1 P () k (V ) Let radom variable W deote A (f(v )), the by Lati Square s property, 1 x Z r, Pr[V = x] = Pr[T 1 k (V ) = x] = 1 1 2, Pr[W = V ] = x,y = x,y Pr[W = x] Pr[V = y] χ(x = y) Pr[W = x] Pr[T 1 k 1 (V ) = y] χ(x = y) = Pr[W = T 1 k 1 (V )] < 1 P () 3) Substitute the otatios V ad W by their origis Pr[A (f T k (U )) = (f T k ) 1 (f T k (U ))] < 1 P () The proof for T k f is similar: 1) A T k is a polyomial-time algorithm Thus by oe-way fuctio s defiitio, for every such a probabilistic polyomial-time algorithm A T k, every positive polyomial P ( ), ad all sufficietly large Pr[A (T k (f(u ))) = f 1 (f(u ))] < 1 P () 2) Based o step 1, Pr[A (T k (f(u ))) = f 1 (f(u ))] = Pr[A (T k (f(u ))) = f 1 (T 1 k 1 (T k (f(u ))))] < 1 P ()

10 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT ) Therefore, Pr[A (T k f(u )) = (T k f) 1 (T k f(u ))] < 1 P () The cases for f T m, T m f as well as for the symmetric cases i T 1 {f T 1 k, T 1 1 proved similarly k f, f T 1 1 e, Te 1 f} ca be Theorem 18 meas that fuctio compositio o a does ot chage the oe-way property of ay strog oeway fuctio This stable property implies that fuctio compositio ca be itegrated with omial costructio to realize a stable structure That is, if a also implemets oe-way fuctio, the (1) Shamir [19] proved that the values retured by compositios of such oe-way fuctios are ideed upredictable; (2) ore formally, Yao [21, p88] defied stable oe-way fuctio with ivariace properties ad also showed that ay stable oe-way fuctio f ca be used to costruct a cryptographically strog pseudoradom umber geerator Defiitio 19: (Oe-way Lati Square Oracle): For a Lati Square Oracle OWL that produces ciphertext e = OWL(m, k) from plaitext m ad key k, it is a oe-way Lati Square Oracle () if its curried result OWL m is a oe-way fuctio I other words, it is hard to obtai key k from a pair of kow plaitext ad ciphertext (m, e) Due to erckhoffs desiderata, the key possesses all secrecy i the system, thus cryptaalysts have o chace to gai iformatio of m by obtaiig L T k from the key As a result, for the couterpart fuctio LT (k, m) = L T (m, k), the curried result L T k is assumed to be safe But for the curried result LT m, it should be a oe-way fuctio Here we use a commoly used oe-way fuctio based o DLP to demostrate the existece of upo the existece of OWF Defiitio 20: Let p be a strog prime i the form of 2 p + 1 where p is a large prime Let g be a geerator of the multiplicative group Z p The oe-way fuctio expoetiatio modulo p f : Z p Z p is defied as f(x) = g x mod p Let g be a geerator of the multiplicative group Z p By the fuctio m g k mod p used i l Gamal ecryptio 5 [9], the is comprised of permutatios costructed from differet plaitexts ad differet keys raised to the geerator (usig Z 5 as a example): m = k = e = 1 g 1 2 g 1 3 g 1 4 g 1 1 g 2 2 g 2 3 g 2 4 g 2 1 g 3 2 g 3 3 g 3 4 g lemets at the same colum are distict due to the differet powers raised to the geerator Ay collisio cotradicts the assumptio that g is a geerator lemets at the same row are distict because of the differet plaitexts Ay collisio cotradicts the uiqueess of multiplicative iverse Thus the result is a Lati Square (The last row is always the plaitext itself as g p 1 1 mod p) I additio, key is ot revealed give a kow plaitext-ciphertext pair due to the oe-way property of DLP Not all oe-way fuctios ca realize a ay Feistel structures ad S-P Networks used i commercial software are ot collisio-free If differet keys map same plaitext ito same ciphertext, the the cipher is obviously ot a Lati Square RSA fuctio ad Rabi fuctio operate over multiplicative group Z p q where p ad q are large primes The square matrices correspodig to such ecryptios are also ot Lati Square (due to collisios at the rows ad colums correspodig to p or q s multiples) However, for these two oe-way fuctios, the imperfectess is measurable so that we ca predict how bad it is whe omial costructio is applied o such o-lati square matrices They are good eough approximatio of whe the measured imperfectess is egligible for sufficietly large C Double oe-way Lati Square Oracle (D) I Defiitio 19, the curried result k is ot ecessarily a oe-way fuctio due to erchhoffs desiderata If we igore erchhoffs desiderata ad improve the desig so that k is also a oe-way fuctio, 5 If we defie ecryptio as (m + 1) g k+1 mod p, the schemes based o Z p ca be used to ecrypt messages from Z p 1

11 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT the we obtai double oe-way Lati Square Oracle (D) Defiitio 21: (Double oe-way Lati Square Oracle): For a Lati Square Oracle OWL that produces ciphertext e = OWL(m, k) from plaitext m ad key k, it is a double oe-way Lati Square Oracle (D) if its curried results OWL m ad OWL k are oe-way fuctios I other words, it is hard to obtai key k from a pair of kow plaitext ad ciphertext (m, e), or to obtai plaitext m from a pair of kow key ad ciphertext (k, e) I a D, kowig the cipher key caot decrypt the ciphertext ito plaitext Thus D caot be directly used i symmetric key ecryptio schemes It ca be directly applied i other scearios Oe example is from zero-kowledge protocols [4] For istace, g m+k mod p is a good cadidate for costructig a D For a strog prime p ad geerator g selected i multiplicative group Z p, g m g k = g m+k mod p forms a Lati Square It is hard to obtai k from ay kow pair (m, e), or to obtai m from ay kow pair (k, e) Thus the costructed Lati Square is a D if DLP realizes a good oe-way fuctio Aother example is the oe-way fuctio (g x ) y = g x y mod p used i Diffie-Hellma key exchage protocol For a strog prime p ad geerator g selected i multiplicative group Z p, if the plaitext is ot p 1, that is, m (Z p {p 1}), the g = (g m mod p) is yet aother geerator of Z p Thus g m k mod p forms a Lati Square over the set (Z p {p 1}) The Lati Square ca be used to do key exchage over the set Z p 2 cryptio modes of operatio is also a potetial applicatio for D I stream cipher modes of operatio, pseudoradom keystream is eeded i ecryptio ad decryptio I Sectio VII we will show that flawed NIST s modes of operatio ca be fixed by substitutig with D This repair is ecessary due to the fact that Feistel Structures ad S-P Networks are ot good implemetatio of D Give a kow pair (k, e), it is always easy to obtai the correspodig plaitext m D Depictio of,, ad D Later i this paper we will use the followig depictios to deote,, ad D i modes of operatio desig, where they are cosidered ideal radom oracles that ca be replaced by good eough implemetatios like Feistel structures ad S-P etworks x x D x Fig 2 Depictio of,, ad D over Z r VI PSUDORANDO GNRATOR This sectio discusses how to implemet the pseudoradom geerator (PRG) depicted i Figure 1 ore specifically, we discuss how to realize cryptographically strog pseudoradom geerator (CSPRG) o top of Lati Square ciphers A as hard-core fuctio For a oe way fuctio f, it is ujustified that f(x) will ot leak ay iformatio about ay bit i x However, some specific bits i x or i some efficiet fuctio h(x) may remai hidde, eve if f(x) ad h are give Such a bit/fuctio is cosidered a hard-core for f, ad ca be used to costruct pseudoradom geerators For example, i a biary system, suppose f is a oe-way fuctio ad H is a set of boolea fuctios such that for h H, h(x) is upredictable give f(x), h Ituitively, by the followig procedure we ca produce a radom sequece

12 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT h(x 0 ), h(x 1 ),, h(x m ) that is upredictable i polyomial time (1) Choose a radom h, a radom x 0 ad output h(x 0 ); (2) Update x i+1 = f(x i ) ad output h(x i ) ad repeat this step for i = 0, 1,, m; (3) Publish h For a sigle bit, the hard-core b is called hard-core predicate, which is discovered by Blum ad icali [3] Such b(x) caot be efficietly predicted give oly f(x), thus ca be used to costruct pseudoradom bit geerators I particular, if predicate b(x, r) is defied as the ier product mod 2 of the biary vector x ad r, the the predicate b is a hard-core of ay oe-way fuctio f Defiitio 22: (Hard-core predicate): A polyomial-time-computable predicate B : Z 2 Z 2 Z 2 is called a hard-core of a oe-way fuctio f : Z 2 Z 2 if for every probabilistic polyomial-time algorithm A, every positive polyomial P ( ), ad all sufficietly large s, Pr[A (f(x ), R ) = B(R, f(x ))] < P () where X ad R are two idepedet ad uiformly chose radom variables over Z 2 Goldreich ad Levi [12] proved that B is a hard-core predicate of ay oe-way fuctio if B is defied as ier product mod 2 Hard-core fuctios are similarly defied ad discovered Here we applied a restrictio of edomorphism (ie, f is legth-preservig o fiite iteger groups), sice our cryptaalysis o ecryptio modes of operatio is performed o edomorphic oe-way fuctios Defiitio 23: (Hard-core fuctio): Let f : Z 2 Z 2 be a edomorphic oe-way fuctio Let H : Z 2 Z 2 Zm 2 be a polyomial-time-computable fuctio, where m ad each curried h H is also a polyomial-time-computable fuctio h : Z 2 Zm 2 A ε()-oracle for H is a probabilistic polyomial-time algorithm A such that Pr[A (f(x ), R ) = H(R, f(x ))] 2 m + ε() where X, R are two idepedet ad uiform distributios over Z 2 H is called a hard-core fuctio for f if o ε()-oracle exists for o-egligible ε() Whe m = 1, the hard-core fuctio is called hard-core predicate I our cryptaalysis o ecryptio modes of operatio desig, we are iterested i the case whe m = Theorem 24: A T over Z r is a hard-core fuctio of ay oe-way edomorphic fuctio f : Z r Z r Proof: At first we ca always do radix coversio ad covert a T over Z r to aother equivalet T over Z 2 This ca be doe by extedig the correspodig Lati Square to wide, where = log 2 2 r A T over Z 2 is a sampleable collectio of fuctios We eed to prove the case 2 Pr[A (f(x ), R ) = T (R, f(x ))] < P ( ) for every probabilistic polyomial-time algorithm A, every positive polyomial P ( ), ad all sufficietly large s Because the key follows the uiform distributio R, the costitutes a perfect system Thus T (R, f(x )) also follows uiform distributio due to perfect system s secod property (Defiitio 1) The output of T (R, f(x )) ca oly be predicted with 1 2 < P ( ) probability The polyomial relatio o legth is ot affected if we chage to be by goig back to the r-ary system xample 3: Näslud[13] shows that all bits i a x + b mod p is hard whe p is a prime ad a, b Z p ore formally, let oe way fuctio f be legth-preservig ad = x = f(x) be the security parameter of f, let P k deote the set of primes of legth /k (k < ) The set of fuctios H k 2 = {h(x) = a x + b mod p p U P k, a U Z p, b U Z p } is a hard-core fuctio for ay oe-way fuctio Here the fuctio h U H k 2 For each specific p P k, h(x) = a x + b mod p costitutes the followig Lati Square (the mod p part is omitted i the matrix for ease of presetatio):

13 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT a = 0 1 p 1 b = 0 1 p 1 h(x) = 0 x (p 1) x 1 x + 1 (p 1) x + 1 p 1 x + (p 1) (p 1) x + (p 1) (1) It is clear that elemets per colum are distict Whe x mod p 0, x has a uique multiplicative iverse, thus elemets per row are also distict A straight-forward view of Näslud s result is to treat the iput sequece {x i } as a huge umber with hybrid radixes Let a sequece of uiformly selected p 1, p 2,, p m U P k deote the sequece of primes applied o the iput α = x 1, x 2,, x m (ie, p i is used i h for x i, ad truly radom p i is padded if m < m) I Näslud s work α U Z m 2 Usig a method similar to Theorem 17, we firstly covert the represetatio of x to hybrid radixes: i a little-edia system we treat the iput x as the iteger α = x m 2 (m 1) + + x x 1, the we chage the radixes x is represeted as α = x 1 m pm m + + x 2 p1 2 + x 1 This procedure ca be accomplished i polyomial time by paddig some truly radom bits to α ad by repetitively producig the remaider ad quotiet of α/p i for all 1 i m Now we have x i UZ pi, thus h(x i ) UZ pi due to perfect system s property (ie, i Lati Square (1), whe h( ) is always a Lati Square over Z pi ad a, b U Z pi, the result h( ) U Z pi ) I other words, the output is a sequece of truly radom p i -ary itegers However, Näslud s process is slightly differet from the above oe Istead of splittig the etire iput ito flexible blocks i the form of p i -ary itegers, the process is applied o fixed -bit blocks That is, each x i is a -bit iteger Nevertheless, this chage does ot ivalidate the hard-core coclusio Case I: For ay x i mod p i 0 (ie, x i has a multiplicative iverse i Z pi ), othig chages (ote mod p i is omitted i Lati Square (1) for ease of presetatio) Case II: Otherwise (ie, x i mod p i = 0), it is easy to verify that the probability of selectig such x i is oly k 2 < 2, where = x is the security parameter of the oe-way fuctio f This is also a egligible quatity for sufficietly large s We ca use the above aalysis to prove Näslud s Theorem i terms of perfect system Theorem 25: (Näslud s Theorem): For a (strog) oe-way fuctio f, every bit geerated from H2 k is hard Proof: Näslud has already prove this theorem i [13] The sketch previously described i Case I ad II will obtai the same result I the proof we oly use the fact that the set H2 k always returs Lati Square i Case I, ad the probability that H2 k fails to retur Lati Square is egligible (Case II) For Case I, o matter what x i is, as log as x i mod p i 0, we always have a perfect system costituted by a Lati Square ad its uiformly distributed iputs a, b U Z pi ach output h(x i ) is a truly radom p i -ary iteger Thus for every probabilistic polyomial-time algorithm A, every positive polyomial P ( ), ad all sufficietly large > log 2 p i, Pr[A (f(x ), R ) = h(r, f(x ))] < P ( ) For Case II, i the worst case, let s assume that a polyomial time algorithm A ca always differetiate truly radom p i -ary itegers from the oes retured by h(x) This evet happes with probability < 2 for the uiform distributio X Combiig these two quatities, we have Pr[A (f(x ), R ) = h(r, f(x ))] < P ( ) + 2 = P ( ) Due to L Hospital s rule, the quatity 2 is less tha 1 P () for ay polyomial P ( ) ad all sufficietly large The we ca fid a polyomial P 1 such that P ( ) + 1 P ( ) = 1 P ( )

14 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT Theorem 26: (Geeralized Näslud s Theorem): Näslud s Theorem is true if we use aother collectio of Lati Squares to replace the collectio of Lati Squares correspodig to a x + b mod p (ie, collectio of Lati Square (1) actualized o argumet x) Proof: The proof is based o the previous oe sice we do t care about other mathematical properties of a x + b mod p as log as it costitutes a collectio of Lati Squares The theorem geeralizes Näslud s result For example, there is o eed to add the coditio p U P k, a prime costat p P k will ot affect the validity of the theorem I additio, either a, or b, but ot both, ca be a fixed costat U Z p B Cryptographically strog pseudoradom geerator Cryptographically strog pseudoradom geerators ca be costructed upo hard-cores of a oe-way fuctio f The followig costructio is based o Blum-icali pseudoradom geerator [3], except that the hard-core predicate is substituted with a hard-core fuctio Defiitio 27: (Blum-icali pseudoradom geerator): Let f be a edormorphic oe-way fuctio f : Z 2 Z 2 Z 2 Let b : Z 2 Z 2 Zm 2 be a polyomial-time-computable hard-core fuctio of f, ad let P ( ) be a arbitrary polyomial satisfyig P () > Give a truly radom iputs s, x, y U Z 2, the pseudoradom geerator def G is defied as G(s) = σ 1 σ 1 σ P (), where s 0 =s, ad for every 1 i P () it holds that σ i = b(x, s i 1 ) ad s i = f(y, s i 1 ) That is, the algorithm G proceeds as follows: 1) Uiformly choose s 0 U Z 2 2) For i = 1 to P () do σ i b(x, s i 1 ) ad s i f(y, s i 1 ), where x, y U Z 2 3) Output σ 1 σ 1 σ P () G is a cryptographically strog pseudoradom geerator The essetial structure of Blum-icali pseudoradom geerator is depicted i Figure 3 I this paper we cojecture that a valid ecryptio mode of operatio desig must be a cryptographically strog pseudoradom geerator (CSPRG), ad i particular such CSPRG ca be reduced to Blum-icali pseudoradom geerator G s 0 f s 1 f s 2 f f s p() b σ 1 b σ 2 b b σ p() Fig 3 Blum-icali pseudoradom geerator (A biary cryptographically strog pseudoradom geerator) Propositio 28: (Desig thesis of ecryptio modes of operatio): A ecryptio mode of operatio desig should be prove to be equivalet to Blum-icali pseudoradom geerator C Cryptographically strog pseudoperfect system By the help of ideal oracles like,, ad D, we ca costruct cryptographically strog pseudoperfect systems that are equivalet to Blum-icali pseudoradom geerators Figure 4 ad 5 show two equivalet cryptographically strog pseudoperfect systems with key, plaitext, ciphertext depicted i details (they are equivalet due to the symmetric ature of D) I the costructio D is used i places of oe-way fuctio f, ad is used i places of hard-core fuctio b I both figures, y, s, x is istatiated o radom seed key k, radom seed vector v, ad radom plaitext m, respectively

15 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT ( x is a polyomial) seed key repetitio r ary itegers U r, seed vector r ary itegers U r, D x D x D x plaitext U r, U r, U r ary itegers r, = x x x x x x x ciphertext x r ary itegers 1 2 x Fig 4 Usig ad D to implemet Blum-icali pseudoradom geerator (A r -ary cryptographically strog pseudoperfect system) ( x is a polyomial) seed vector r ary itegers U r, seed key repetitio r ary itegers U r, D x D x D x plaitext U r, U r, U r ary itegers r, = x x x x x x x ciphertext x r ary itegers 1 2 x Fig 5 A equivalece of Figure 4 If D is uavailable, for istace, whe Feistel structures ad S-P etworks are used as oe-way fuctios, must be used to costruct cryptographically strog pseudoperfect systems Figure 6 shows the based cryptographically strog pseudoperfect systems Figure 7 ad 8 demostrate two possible mistakes i the costructio: 1) The oly differece betwee Figure 6 ad Figure 7 is the switch betwee ad ports at the top-level As is ot a symmetric structure, the oe depicted i Figure 7 is ot a cryptographically strog pseudoradom geerator sice we caot fid a oe-way fuctio compositio chai at all 2) The oly differece betwee Figure 6 ad Figure 8 is that at bottom-level is replaced by ivertible Thus the keystream fed ito ext fuctio compositio could be revealed by a kow-plaitext attack The the cryptaalyst ca reveal the seed key upo the kowledge (ie, deduce from ad The D-based system i Figure 5 is ot vulerable to this attack)

16 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT ( x is a polyomial) seed vector r ary itegers U r, seed key repetitio r ary itegers U r, x x x plaitext r ary itegers = x x x x U r, x U r, x U r, x ciphertext x r ary itegers 1 2 x Fig 6 Usig to implemet Blum-icali pseudoradom geerator (A r -ary cryptographically strog pseudoperfect system) ( x is a polyomial) seed key repetitio r ary itegers U r, seed vector r ary itegers U r, x x x plaitext r ary itegers = x x x x U r, x U r, x U r, x ciphertext x r ary itegers 1 2 x Fig 7 Not a valid equivalece of Figure 6 A NIST s stadard modes of operatio VII APPLYING TH PSUDOPRFCT SYST ODL IN PRACTIC The pseudoperfect system model proposed i this work ca be used to aalyze stadard ecryptio modes of operatio (OFB,CFB,CTR,CBC) [14], [15] published by Natioal Istitute of Stadards ad Techology (NIST) We will proceed accordig to the followig order: Output-Feedback mode (OFB), Cipher-Feedback mode (CFB), Couter mode (CTR), ad Cipher-Block-Chaiig mode (CBC) Cipher FeedBack (CFB) mode, Output Feedback (OFB) mode, ad Couter (CTR) mode are stream ciphers based o stadard block ciphers A stream cipher is i geeral a pseudoperfect system followig the diagrams depicted i Figure 4 ad Figure 5 The implemetatio of the ivertible is the bitwise exclusive-or operatio Note that a cryptographically strog stream cipher is ot operatig o L N(1) 2,1 Istead, it operates o LN(1) 2, where is the output legth of the oe-way fuctio it employs The legth is determied by cryptographic parameters used

17 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT ( x is a polyomial) seed vector r ary itegers U r, seed key repetitio r ary itegers U r, x x x plaitext r ary itegers = x x x x U r, x U r, x U r, x ciphertext x r ary itegers 1 2 x Fig 8 Pseudoperfect system ot robust agaist kow-plaitext attack ( x is a polyomial) seed key r ary itegers seed vector V V r ary itegers x Z r x keystream x r ary itegers plaitext x r ary itegers = (,) x x x x 1 2 x 1 2 x x x x x ciphertext x r ary itegers 1 2 x 1 x Fig 9 Pseudoperfect system correspodig to CFB mode (r = 2, ot a valid 2 -ary cryptographically strog pseudoperfect system) i a real implemetatio, such as the block size i block cipher based stream ciphers, or the register legth i shift register based stream ciphers Ufortuately, Feistel structures ad S-P etworks implemet rather tha D Whe DS ad AS are used, OFB mode correspods to the system depicted i Figure 7 It implemets a pseudoperfect system, but ot a cryptographically strog pseudoperfect system For CFB mode, it correspods to the system depicted i Figure 9 Agai we caot fid a oe-way fuctio compositio chai eeded i CSPRG CFB mode is ot a cryptographically strog pseudoperfect system CTR mode correspods to the system depicted i Figure 9, where r = 2, is the block cipher s block size, the top-level is costituted by the Lati Square cipher e = (k + m + 1) mod 2 over the set Z 2, the bottom-level is L N(1) 2,, ad the mid-level is DS or AS Agai we caot fid a oe-way fuctio compositio chai eeded by Blum-icali pseudoradom geerator CTR mode is ot a cryptographically strog pseudoperfect system

18 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT ( x is a polyomial) seed key r ary itegers seed couter V V x x x couter plaitext stream x r ary itegers 1 2 x Z r x Z r x Z r x plaitext 1 x r ary itegers = x (,) x x x x 2 x x x ciphertext x r ary itegers 1 2 x Fig 10 Pseudoperfect system correspodig to CTR mode (Not a valid r -ary cryptographically strog pseudoperfect system) m = k = e = CBC mode correspods to the system depicted i Figure 11 Like the previous stream cipher modes, it is ot a cryptographically strog pseudoperfect system due to lack of oe-way fuctio compositio chai ( x is a polyomial) seed key r ary itegers seed vector V r ary itegers plaitext 1 x r ary itegers x 2 x x x plaitext stream x r ary itegers = x (, ) x x x 1 x 2 x x x ciphertext x r ary itegers 1 2 x 1 x Fig 11 Pseudoperfect system correspodig to CBC mode (Not a r -ary cryptographically strog pseudoradom geerator) I a utshell, oe of the NIST s stadard modes of operatio is a cryptographically strog pseudoradom geerator or a cryptographically strog pseudoperfect system They should be replaced by efficiet desigs that are cryptographically strog pseudoperfect systems

19 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT B xemplary repairs fficiet repairs for the stadard modes of operatio are available Figure 6 is a valid desig Let s deote it by key-ecryptio-trasform (T) Compared to CB mode, T ecrypts the seed key before a AS ecryptio ( x is a polyomial) seed key repetitio r ary itegers U r, U r, U r, seed vector repititio r ary itegers U r, x U r, x U r, x plaitext r ary itegers U r, x U r, x U r, x = x x x x x x x ciphertext x r ary itegers 1 2 x Fig 12 Pseudoperfect system correspodig to AONT Figure 12 shows Rivest s All-Or-Nothig-Trasform (AONT) [17][7] Ituitively, AONT ecrypts the plaitext twice It is aother valid desig: (1) The top-level costitutes a oe-way fuctio compositio chai eeded by Blum-icali CSPRG; (2) Give a shared seed key ad seed vector V, the decryptor ca always recover the at bottom-level ad at top-level, the recover the plaitext at the mid-level; (3) The double ecryptios at top ad bottom levels protect the the ad used at the mid-level This avoids the chose-plaitext discussed i Figure 8; (4) fed ito the bottom-level is already a cryptographically strog pseudoradom esemble k is a permutatio that wo t affect the pseudoradomess of this esemble VIII CONCLUSION This work presets a algebraic model for privacy-orieted cryptographic modes of operatio The proposed model extesively explore various roles of Lati Square cipher i formal cryptaalysis We show the relatio betwee Lati Square ciphers ad followig issues: (a) block-by-block ecryptio modes of operatio desig, (2) compositio with oe-way fuctio, (3) hard-core fuctio of oe-way fuctio, ad fially (4) how to costruct cryptographically strog pseudoradom geerators from Lati Square based radom oracles As a result, Lati Square ciphers with ivariace properties ca be used to costruct a cryptographically strog pseudoradom geerator (CSPRG), ad thus a cryptographically strog pseudoperfect system that are treated as the ideal case of ecryptio modes of operatio desig Whe the radom oracles i the ideal case is replaced by good implemetatios like AS, the security of real world modes of operatio desig ca be aalyzed ad challeged We fid desig flaws i NIST s stadard modes of operatio ad show that efficiet repairs are easily achievable

20 UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT RFRNCS [1] Bellare, A Desai, Jokipii, ad P Rogaway A Cocrete Security Treatmet of Symmetric cryptio: Aalysis of the DS odes of Operatio I Symposium o Foudatios of Computer Sciece (FOCS), pages , 1997 [2] Bellare ad P Rogaway Radom Oracles are Practical: a Paradigm for Desigig fficiet Protocols I 1st AC coferece o Computer ad Commuicatios Security (CCS), pages 62 73, 1993 [3] Blum ad S icali How to Geerate Cryptographically Strog Sequeces of Pseudo-Radom Bits Society for Idustrial ad Applied athematics (SIA) Joural o Computig, 13(4): , 1984 [4] D Chaum ad T Pederse Wallet Database with Observers I CRYPTO, pages , 1993 [5] D Coppersmith, D Johso, ad S atyas Triple DS Cipher Block Chaiig with Output Feedback askig IB Research ad Developmet Joural, 40(2): , 1996 [6] H B Curry ad R Feys Combiatory Logic North-Hollad, 1958 [7] A Desai The Security of All-or-Nothig cryptio: Protectig agaist xhaustive ey Search I Bellare, editor, CRYPTO 00, Lecture Notes i Computer Sciece, pages , 2000 [8] W Diffie ad Hellma New Directios i Cryptography I Trasactios o Iformatio Theory, 22(6): , 1976 [9] T l-gamal A Public-key Cryptosystem ad a Sigature Scheme Based o Discrete Logarithms I Advaces i Cryptology UROCRYPT, pages 10 18, 1984 [10] H Feistel Cryptography ad Computer Privacy Scietific America, 228(5):15 23, 1973 [11] O Goldreich Foudatios of Cryptography: Basic Tools Cambridge Uiversity Press, 2001 [12] O Goldreich ad L A Levi A Hard-Core Predicate for all Oe-Way Fuctios I Symposium o the Theory of Computatio (STOC), pages 25 32, 1989 [13] Näslud All Bits i ax + b mod p are Hard I N oblitz, editor, CRYPTO 96, Lecture Notes i Computer Sciece 1109, pages , 1996 [14] Natioal Istitute of Stadards ad Techology FIPS PUB 81: DS odes of Operatio fipspubs/fip81htm, 1980 [15] Natioal Istitute of Stadards ad Techology Recommedatio for Block Cipher odes of Operatio gov/publicatios/istpubs/800-38a/sp800-38apdf, December 2001 [16] O Rabi Digital Sigatures ad Public ey Fuctios as Itractable as Factorizatio Techical Report T-212, Laboratory of Computer Sciece, assachusett Istitute of Techology, 1979 [17] R L Rivest All-or-Nothig cryptio ad the Package Trasform I Biham, editor, FS 97, Lecture Notes i Computer Sciece 1267, pages , 1997 [18] R L Rivest, A Shamir, ad L Adlema A ethod for Obtaiig Digital Sigatures ad Public-ey Cryptosystems CAC, 21(2): , 1978 [19] A Shamir O the Geeratio of Cryptographically Strog Pseudo-Radom Sequeces I S ve ad O ariv, editors, Iteratioal Colloquium o Automata, Laguages ad Programmig (ICALP 81), Lecture Notes i Computer Sciece 115, pages , 1981 [20] C Shao Commuicatio Theory of Secrecy Systems Bell System Techical Joural, 28(4): , 1949 [21] A C-C Yao Theory ad Applicatios of Trapdoor Fuctios (xteded Abstract) I Symposium o Foudatios of Computer Sciece (FOCS), pages 80 91, 1982

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

1. MATHEMATICAL INDUCTION

1. MATHEMATICAL INDUCTION 1. MATHEMATICAL INDUCTION EXAMPLE 1: Prove that for ay iteger 1. Proof: 1 + 2 + 3 +... + ( + 1 2 (1.1 STEP 1: For 1 (1.1 is true, sice 1 1(1 + 1. 2 STEP 2: Suppose (1.1 is true for some k 1, that is 1

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

THE ABRACADABRA PROBLEM

THE ABRACADABRA PROBLEM THE ABRACADABRA PROBLEM FRANCESCO CARAVENNA Abstract. We preset a detailed solutio of Exercise E0.6 i [Wil9]: i a radom sequece of letters, draw idepedetly ad uiformly from the Eglish alphabet, the expected

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

Convexity, Inequalities, and Norms

Convexity, Inequalities, and Norms Covexity, Iequalities, ad Norms Covex Fuctios You are probably familiar with the otio of cocavity of fuctios. Give a twicedifferetiable fuctio ϕ: R R, We say that ϕ is covex (or cocave up) if ϕ (x) 0 for

More information

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5

More information

Irreducible polynomials with consecutive zero coefficients

Irreducible polynomials with consecutive zero coefficients Irreducible polyomials with cosecutive zero coefficiets Theodoulos Garefalakis Departmet of Mathematics, Uiversity of Crete, 71409 Heraklio, Greece Abstract Let q be a prime power. We cosider the problem

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Sequences and Series

Sequences and Series CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their

More information

Integer Factorization Algorithms

Integer Factorization Algorithms Iteger Factorizatio Algorithms Coelly Bares Departmet of Physics, Orego State Uiversity December 7, 004 This documet has bee placed i the public domai. Cotets I. Itroductio 3 1. Termiology 3. Fudametal

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

FOUNDATIONS OF MATHEMATICS AND PRE-CALCULUS GRADE 10

FOUNDATIONS OF MATHEMATICS AND PRE-CALCULUS GRADE 10 FOUNDATIONS OF MATHEMATICS AND PRE-CALCULUS GRADE 10 [C] Commuicatio Measuremet A1. Solve problems that ivolve liear measuremet, usig: SI ad imperial uits of measure estimatio strategies measuremet strategies.

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

Overview on S-Box Design Principles

Overview on S-Box Design Principles Overview o S-Box Desig Priciples Debdeep Mukhopadhyay Assistat Professor Departmet of Computer Sciece ad Egieerig Idia Istitute of Techology Kharagpur INDIA -721302 What is a S-Box? S-Boxes are Boolea

More information

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here). BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook - Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

Asymptotic Growth of Functions

Asymptotic Growth of Functions CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll

More information

Chapter 5: Inner Product Spaces

Chapter 5: Inner Product Spaces Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

3 Basic Definitions of Probability Theory

3 Basic Definitions of Probability Theory 3 Basic Defiitios of Probability Theory 3defprob.tex: Feb 10, 2003 Classical probability Frequecy probability axiomatic probability Historical developemet: Classical Frequecy Axiomatic The Axiomatic defiitio

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

SAMPLE QUESTIONS FOR FINAL EXAM. (1) (2) (3) (4) Find the following using the definition of the Riemann integral: (2x + 1)dx

SAMPLE QUESTIONS FOR FINAL EXAM. (1) (2) (3) (4) Find the following using the definition of the Riemann integral: (2x + 1)dx SAMPLE QUESTIONS FOR FINAL EXAM REAL ANALYSIS I FALL 006 3 4 Fid the followig usig the defiitio of the Riema itegral: a 0 x + dx 3 Cosider the partitio P x 0 3, x 3 +, x 3 +,......, x 3 3 + 3 of the iterval

More information

University of California, Los Angeles Department of Statistics. Distributions related to the normal distribution

University of California, Los Angeles Department of Statistics. Distributions related to the normal distribution Uiversity of Califoria, Los Ageles Departmet of Statistics Statistics 100B Istructor: Nicolas Christou Three importat distributios: Distributios related to the ormal distributio Chi-square (χ ) distributio.

More information

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009)

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009) 18.409 A Algorithmist s Toolkit October 27, 2009 Lecture 13 Lecturer: Joatha Keler Scribe: Joatha Pies (2009) 1 Outlie Last time, we proved the Bru-Mikowski iequality for boxes. Today we ll go over the

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

Trigonometric Form of a Complex Number. The Complex Plane. axis. ( 2, 1) or 2 i FIGURE 6.44. The absolute value of the complex number z a bi is

Trigonometric Form of a Complex Number. The Complex Plane. axis. ( 2, 1) or 2 i FIGURE 6.44. The absolute value of the complex number z a bi is 0_0605.qxd /5/05 0:45 AM Page 470 470 Chapter 6 Additioal Topics i Trigoometry 6.5 Trigoometric Form of a Complex Number What you should lear Plot complex umbers i the complex plae ad fid absolute values

More information

The following example will help us understand The Sampling Distribution of the Mean. C1 C2 C3 C4 C5 50 miles 84 miles 38 miles 120 miles 48 miles

The following example will help us understand The Sampling Distribution of the Mean. C1 C2 C3 C4 C5 50 miles 84 miles 38 miles 120 miles 48 miles The followig eample will help us uderstad The Samplig Distributio of the Mea Review: The populatio is the etire collectio of all idividuals or objects of iterest The sample is the portio of the populatio

More information

Infinite Sequences and Series

Infinite Sequences and Series CHAPTER 4 Ifiite Sequeces ad Series 4.1. Sequeces A sequece is a ifiite ordered list of umbers, for example the sequece of odd positive itegers: 1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29...

More information

WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER?

WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER? WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER? JÖRG JAHNEL 1. My Motivatio Some Sort of a Itroductio Last term I tought Topological Groups at the Göttige Georg August Uiversity. This

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 haupt@ieee.org Abstract:

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n We will cosider the liear regressio model i matrix form. For simple liear regressio, meaig oe predictor, the model is i = + x i + ε i for i =,,,, This model icludes the assumptio that the ε i s are a sample

More information

INFINITE SERIES KEITH CONRAD

INFINITE SERIES KEITH CONRAD INFINITE SERIES KEITH CONRAD. Itroductio The two basic cocepts of calculus, differetiatio ad itegratio, are defied i terms of limits (Newto quotiets ad Riema sums). I additio to these is a third fudametal

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction

THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction THE ARITHMETIC OF INTEGERS - multiplicatio, expoetiatio, divisio, additio, ad subtractio What to do ad what ot to do. THE INTEGERS Recall that a iteger is oe of the whole umbers, which may be either positive,

More information

Statistical inference: example 1. Inferential Statistics

Statistical inference: example 1. Inferential Statistics Statistical iferece: example 1 Iferetial Statistics POPULATION SAMPLE A clothig store chai regularly buys from a supplier large quatities of a certai piece of clothig. Each item ca be classified either

More information

MARTINGALES AND A BASIC APPLICATION

MARTINGALES AND A BASIC APPLICATION MARTINGALES AND A BASIC APPLICATION TURNER SMITH Abstract. This paper will develop the measure-theoretic approach to probability i order to preset the defiitio of martigales. From there we will apply this

More information

Cooley-Tukey. Tukey FFT Algorithms. FFT Algorithms. Cooley

Cooley-Tukey. Tukey FFT Algorithms. FFT Algorithms. Cooley Cooley Cooley-Tuey Tuey FFT Algorithms FFT Algorithms Cosider a legth- sequece x[ with a -poit DFT X[ where Represet the idices ad as +, +, Cooley Cooley-Tuey Tuey FFT Algorithms FFT Algorithms Usig these

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

3. Greatest Common Divisor - Least Common Multiple

3. Greatest Common Divisor - Least Common Multiple 3 Greatest Commo Divisor - Least Commo Multiple Defiitio 31: The greatest commo divisor of two atural umbers a ad b is the largest atural umber c which divides both a ad b We deote the greatest commo gcd

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. This documet was writte ad copyrighted by Paul Dawkis. Use of this documet ad its olie versio is govered by the Terms ad Coditios of Use located at http://tutorial.math.lamar.edu/terms.asp. The olie versio

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised

More information

Permutations, the Parity Theorem, and Determinants

Permutations, the Parity Theorem, and Determinants 1 Permutatios, the Parity Theorem, ad Determiats Joh A. Guber Departmet of Electrical ad Computer Egieerig Uiversity of Wiscosi Madiso Cotets 1 What is a Permutatio 1 2 Cycles 2 2.1 Traspositios 4 3 Orbits

More information

Notes on exponential generating functions and structures.

Notes on exponential generating functions and structures. Notes o expoetial geeratig fuctios ad structures. 1. The cocept of a structure. Cosider the followig coutig problems: (1) to fid for each the umber of partitios of a -elemet set, (2) to fid for each the

More information

Maximum Likelihood Estimators.

Maximum Likelihood Estimators. Lecture 2 Maximum Likelihood Estimators. Matlab example. As a motivatio, let us look at oe Matlab example. Let us geerate a radom sample of size 00 from beta distributio Beta(5, 2). We will lear the defiitio

More information

Lecture 3. denote the orthogonal complement of S k. Then. 1 x S k. n. 2 x T Ax = ( ) λ x. with x = 1, we have. i = λ k x 2 = λ k.

Lecture 3. denote the orthogonal complement of S k. Then. 1 x S k. n. 2 x T Ax = ( ) λ x. with x = 1, we have. i = λ k x 2 = λ k. 18.409 A Algorithmist s Toolkit September 17, 009 Lecture 3 Lecturer: Joatha Keler Scribe: Adre Wibisoo 1 Outlie Today s lecture covers three mai parts: Courat-Fischer formula ad Rayleigh quotiets The

More information

The Stable Marriage Problem

The Stable Marriage Problem The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,

More information

CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations

CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations CS3A Hadout 3 Witer 00 February, 00 Solvig Recurrece Relatios Itroductio A wide variety of recurrece problems occur i models. Some of these recurrece relatios ca be solved usig iteratio or some other ad

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Chapter 5 O A Cojecture Of Erdíos Proceedigs NCUR VIII è1994è, Vol II, pp 794í798 Jeærey F Gold Departmet of Mathematics, Departmet of Physics Uiversity of Utah Do H Tucker Departmet of Mathematics Uiversity

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8 CME 30: NUMERICAL LINEAR ALGEBRA FALL 005/06 LECTURE 8 GENE H GOLUB 1 Positive Defiite Matrices A matrix A is positive defiite if x Ax > 0 for all ozero x A positive defiite matrix has real ad positive

More information

5: Introduction to Estimation

5: Introduction to Estimation 5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample

More information

CS103X: Discrete Structures Homework 4 Solutions

CS103X: Discrete Structures Homework 4 Solutions CS103X: Discrete Structures Homewor 4 Solutios Due February 22, 2008 Exercise 1 10 poits. Silico Valley questios: a How may possible six-figure salaries i whole dollar amouts are there that cotai at least

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

Case Study. Normal and t Distributions. Density Plot. Normal Distributions

Case Study. Normal and t Distributions. Density Plot. Normal Distributions Case Study Normal ad t Distributios Bret Halo ad Bret Larget Departmet of Statistics Uiversity of Wiscosi Madiso October 11 13, 2011 Case Study Body temperature varies withi idividuals over time (it ca

More information

Factoring x n 1: cyclotomic and Aurifeuillian polynomials Paul Garrett <garrett@math.umn.edu>

Factoring x n 1: cyclotomic and Aurifeuillian polynomials Paul Garrett <garrett@math.umn.edu> (March 16, 004) Factorig x 1: cyclotomic ad Aurifeuillia polyomials Paul Garrett Polyomials of the form x 1, x 3 1, x 4 1 have at least oe systematic factorizatio x 1 = (x 1)(x 1

More information

Trackless online algorithms for the server problem

Trackless online algorithms for the server problem Iformatio Processig Letters 74 (2000) 73 79 Trackless olie algorithms for the server problem Wolfgag W. Bei,LawreceL.Larmore 1 Departmet of Computer Sciece, Uiversity of Nevada, Las Vegas, NV 89154, USA

More information

THE HEIGHT OF q-binary SEARCH TREES

THE HEIGHT OF q-binary SEARCH TREES THE HEIGHT OF q-binary SEARCH TREES MICHAEL DRMOTA AND HELMUT PRODINGER Abstract. q biary search trees are obtaied from words, equipped with the geometric distributio istead of permutatios. The average

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

Plug-in martingales for testing exchangeability on-line

Plug-in martingales for testing exchangeability on-line Plug-i martigales for testig exchageability o-lie Valetia Fedorova, Alex Gammerma, Ilia Nouretdiov, ad Vladimir Vovk Computer Learig Research Cetre Royal Holloway, Uiversity of Lodo, UK {valetia,ilia,alex,vovk}@cs.rhul.ac.uk

More information

Generalized Scheme For Fractal Based Digital Signature (GFDS)

Generalized Scheme For Fractal Based Digital Signature (GFDS) IJCSS Iteratioal Joural of Computer Sciece ad etwork Security, VOL.7 o.7, July 2007 99 Geeralized Scheme For Fractal Based Digital Sigature (GFDS) Mohammad Ahmad Alia ad Azma Bi Samsudi, School of Computer

More information

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 49-60 A Faster Clause-Shorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece

More information

Section 11.3: The Integral Test

Section 11.3: The Integral Test Sectio.3: The Itegral Test Most of the series we have looked at have either diverged or have coverged ad we have bee able to fid what they coverge to. I geeral however, the problem is much more difficult

More information

Hypergeometric Distributions

Hypergeometric Distributions 7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you

More information

Chapter 7 - Sampling Distributions. 1 Introduction. What is statistics? It consist of three major areas:

Chapter 7 - Sampling Distributions. 1 Introduction. What is statistics? It consist of three major areas: Chapter 7 - Samplig Distributios 1 Itroductio What is statistics? It cosist of three major areas: Data Collectio: samplig plas ad experimetal desigs Descriptive Statistics: umerical ad graphical summaries

More information

Theorems About Power Series

Theorems About Power Series Physics 6A Witer 20 Theorems About Power Series Cosider a power series, f(x) = a x, () where the a are real coefficiets ad x is a real variable. There exists a real o-egative umber R, called the radius

More information

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean 1 Social Studies 201 October 13, 2004 Note: The examples i these otes may be differet tha used i class. However, the examples are similar ad the methods used are idetical to what was preseted i class.

More information

Analysis Notes (only a draft, and the first one!)

Analysis Notes (only a draft, and the first one!) Aalysis Notes (oly a draft, ad the first oe!) Ali Nesi Mathematics Departmet Istabul Bilgi Uiversity Kuştepe Şişli Istabul Turkey aesi@bilgi.edu.tr Jue 22, 2004 2 Cotets 1 Prelimiaries 9 1.1 Biary Operatio...........................

More information

CS100: Introduction to Computer Science

CS100: Introduction to Computer Science I-class Exercise: CS100: Itroductio to Computer Sciece What is a flip-flop? What are the properties of flip-flops? Draw a simple flip-flop circuit? Lecture 3: Data Storage -- Mass storage & represetig

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

Lecture 2: Karger s Min Cut Algorithm

Lecture 2: Karger s Min Cut Algorithm priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.

More information

Class Meeting # 16: The Fourier Transform on R n

Class Meeting # 16: The Fourier Transform on R n MATH 18.152 COUSE NOTES - CLASS MEETING # 16 18.152 Itroductio to PDEs, Fall 2011 Professor: Jared Speck Class Meetig # 16: The Fourier Trasform o 1. Itroductio to the Fourier Trasform Earlier i the course,

More information

CS100: Introduction to Computer Science

CS100: Introduction to Computer Science Review: History of Computers CS100: Itroductio to Computer Sciece Maiframes Miicomputers Lecture 2: Data Storage -- Bits, their storage ad mai memory Persoal Computers & Workstatios Review: The Role of

More information

G r a d e. 2 M a t h e M a t i c s. statistics and Probability

G r a d e. 2 M a t h e M a t i c s. statistics and Probability G r a d e 2 M a t h e M a t i c s statistics ad Probability Grade 2: Statistics (Data Aalysis) (2.SP.1, 2.SP.2) edurig uderstadigs: data ca be collected ad orgaized i a variety of ways. data ca be used

More information

Perfect Packing Theorems and the Average-Case Behavior of Optimal and Online Bin Packing

Perfect Packing Theorems and the Average-Case Behavior of Optimal and Online Bin Packing SIAM REVIEW Vol. 44, No. 1, pp. 95 108 c 2002 Society for Idustrial ad Applied Mathematics Perfect Packig Theorems ad the Average-Case Behavior of Optimal ad Olie Bi Packig E. G. Coffma, Jr. C. Courcoubetis

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

Probabilistic Engineering Mechanics. Do Rosenblatt and Nataf isoprobabilistic transformations really differ?

Probabilistic Engineering Mechanics. Do Rosenblatt and Nataf isoprobabilistic transformations really differ? Probabilistic Egieerig Mechaics 4 (009) 577 584 Cotets lists available at ScieceDirect Probabilistic Egieerig Mechaics joural homepage: wwwelseviercom/locate/probegmech Do Roseblatt ad Nataf isoprobabilistic

More information

Factors of sums of powers of binomial coefficients

Factors of sums of powers of binomial coefficients ACTA ARITHMETICA LXXXVI.1 (1998) Factors of sums of powers of biomial coefficiets by Neil J. Cali (Clemso, S.C.) Dedicated to the memory of Paul Erdős 1. Itroductio. It is well ow that if ( ) a f,a = the

More information

Our aim is to show that under reasonable assumptions a given 2π-periodic function f can be represented as convergent series

Our aim is to show that under reasonable assumptions a given 2π-periodic function f can be represented as convergent series 8 Fourier Series Our aim is to show that uder reasoable assumptios a give -periodic fuctio f ca be represeted as coverget series f(x) = a + (a cos x + b si x). (8.) By defiitio, the covergece of the series

More information

Overview of some probability distributions.

Overview of some probability distributions. Lecture Overview of some probability distributios. I this lecture we will review several commo distributios that will be used ofte throughtout the class. Each distributio is usually described by its probability

More information

A Mathematical Perspective on Gambling

A Mathematical Perspective on Gambling A Mathematical Perspective o Gamblig Molly Maxwell Abstract. This paper presets some basic topics i probability ad statistics, icludig sample spaces, probabilistic evets, expectatios, the biomial ad ormal

More information

7.1 Finding Rational Solutions of Polynomial Equations

7.1 Finding Rational Solutions of Polynomial Equations 4 Locker LESSON 7. Fidig Ratioal Solutios of Polyomial Equatios Name Class Date 7. Fidig Ratioal Solutios of Polyomial Equatios Essetial Questio: How do you fid the ratioal roots of a polyomial equatio?

More information

Designing Incentives for Online Question and Answer Forums

Designing Incentives for Online Question and Answer Forums Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA shailij@eecs.harvard.edu Yilig Che School of Egieerig ad Applied

More information

How To Solve The Homewor Problem Beautifully

How To Solve The Homewor Problem Beautifully Egieerig 33 eautiful Homewor et 3 of 7 Kuszmar roblem.5.5 large departmet store sells sport shirts i three sizes small, medium, ad large, three patters plaid, prit, ad stripe, ad two sleeve legths log

More information

Universal coding for classes of sources

Universal coding for classes of sources Coexios module: m46228 Uiversal codig for classes of sources Dever Greee This work is produced by The Coexios Project ad licesed uder the Creative Commos Attributio Licese We have discussed several parametric

More information

CS85: You Can t Do That (Lower Bounds in Computer Science) Lecture Notes, Spring 2008. Amit Chakrabarti Dartmouth College

CS85: You Can t Do That (Lower Bounds in Computer Science) Lecture Notes, Spring 2008. Amit Chakrabarti Dartmouth College CS85: You Ca t Do That () Lecture Notes, Sprig 2008 Amit Chakrabarti Dartmouth College Latest Update: May 9, 2008 Lecture 1 Compariso Trees: Sortig ad Selectio Scribe: William Che 1.1 Sortig Defiitio 1.1.1

More information

Entropy of bi-capacities

Entropy of bi-capacities Etropy of bi-capacities Iva Kojadiovic LINA CNRS FRE 2729 Site école polytechique de l uiv. de Nates Rue Christia Pauc 44306 Nates, Frace iva.kojadiovic@uiv-ates.fr Jea-Luc Marichal Applied Mathematics

More information

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy

More information

Tradigms of Astundithi and Toyota

Tradigms of Astundithi and Toyota Tradig the radomess - Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore

More information