Mutual Information Analysis: How, When and Why?
|
|
- Vivien Chandler
- 7 years ago
- Views:
Transcription
1 Mutual Information Analysis: How, When and Why? Nicolas Veyrat-Charvillon and François-Xavier Standaert Crypto Group Université catholique de Louvain CHES 09, September 3rd 2009
2 Side-channel analysis j Adversary predict V j,p model X j,p P D j j s? compute V s,p leak Y k,p k Device
3 Classical attacks Classical solutions in non profiled SCA: Kocher s original DPA, at Crypto 1999 Correlation attacks, at CHES 2004
4 So, what to do? X 0 = y 0 y 1 y 3 y 7 y y 2 y 5 y y 4 y 6 y 13 y 8 y 9 y y y X 1 = y 7 y 0 y 1 y 5 y 6... y 2 y 3 y 8... y 13 y 4 y 10 y 15 y 9 y y y 14...
5 Pearson s correlation coefficient Measure of linear dependence between r.v. s X and Y. ρ(x, Y ) = cov(x, Y ) σ X σ Y = E[XY ] E[X ] E[Y ] σ x σ Y.
6 Pearson s correlation coefficient Measure of linear dependence between r.v. s X and Y. ρ(x, Y ) = cov(x, Y ) σ X σ Y = E[XY ] E[X ] E[Y ] σ x σ Y.
7 Pearson s correlation coefficient Measure of linear dependence between r.v. s X and Y. ρ(x, Y ) = cov(x, Y ) σ X σ Y = E[XY ] E[X ] E[Y ] σ x σ Y.
8 So, what to do? Pr [Y = y] x = 0 x = 1 x = 2 x = 3 x = 4 Pr [Y = y, X = x] Pr [Y = y, X = x] X 0 = y 0 y 1 y 3 y 7 y y 2 y 5 y y 4 y 6 y 13 y 8 y 9 y y y y X 1 = y 7 y 0 y 1 y 5 y 6... y 2 y 3 y 8... y 13 y 4 y 10 y 15 y 9 y y y y
9 So, what to do? 1 Estimate the probability density of the leakages 2 Test for a dependence between X and Y
10 Mutual information Analysis Introduced at CHES 2008 by Gierlichs & al. Aims at genericity: as little assumptions as possible about the leakage H [X, Y ] y H [X Y ] I (X ; Y ) H [Y X ]
11 How to use MIA: the information theoretic toolbox Outline 1 How to use MIA: the information theoretic toolbox 2 When to use it: MIA versus correlation 3 Why to use it: MIA as an evaluation metric
12 How to use MIA: the information theoretic toolbox 1 Estimation: Non-parametric methods y y
13 How to use MIA: the information theoretic toolbox 1 Estimation: Non-parametric methods y y Well, non-parametric... bin width and bandwidth to choose
14 How to use MIA: the information theoretic toolbox Information theoretic definitions Shannon s entropy, a measure of information H [X ] = x X Pr [X = x] log (Pr [X = x]) Mutual information, a general measure of dependence I (X ; Y ) = Pr [X = x, Y = y] x X,y Y log ( Pr [X = x, Y = y] ) Pr [X = x] Pr [Y = y]
15 How to use MIA: the information theoretic toolbox Information theoretic definitions H [X, Y ] H [X ] H [Y ] H [X Y ] I (X ; Y ) H [Y X ] Information diagram
16 How to use MIA: the information theoretic toolbox 2 Test: Kullback-Leibler divergence D KL (P Q) = z Z Pr [Z = z, Z P] log Relation to mutual information: Pr [Z = z, Z P] Pr [Z = z, Z Q] I (X ; Y ) = D KL (Pr [X, Y ] Pr [X ] Pr [Y ]) = E x X (D KL (Pr [Y X = x] Pr [Y ]))
17 How to use MIA: the information theoretic toolbox 2 Test: F-divergences I f (P, Q) = z Z Pr [Z = z, Z Q] f ( ) Pr [Z = z, Z P] Pr [Z = z, Z Q] Different parameter functions f give different measures: Kullback-Leibler divergence f (t) = t log t Inverse Kullback-Leibler f (t) = log t Pearson χ 2 divergence f (t) = (t 1) 2 Hellinger distance f (t) = 1 t Total variation f (t) = t 1
18 How to use MIA: the information theoretic toolbox 1&2: Implicit pdf estimation Empirical cumulative function: F (x t ) = 1 n n χ xi x t, where χ xi x t = i=1 { 1 if xi x t 0 otherwise. Two sample Kolmogorov-Smirnov test D KS (P Q) = sup x t F P (x t ) F Q (x t ) Two sample Cramér-von-Mises test D CvM (P Q) = + (F P (x t ) F Q (x t )) 2 dx t
19 How to use MIA: the information theoretic toolbox Experimental results 1 success rate correlation histogram MIA Kernel MIA (D KL ) Kernel χ Kernel Hellinger Kolmogorov-Smirnov 0.2 KS normalized Cramér-von-Mises messages Success rate of different distinguishers
20 How to use MIA: the information theoretic toolbox Experimental results 1 success rate correlation histogram MIA Kernel MIA (D KL ) Kernel χ Kernel Hellinger Kolmogorov-Smirnov 0.2 KS normalized Cramér-von-Mises messages Success rate of different distinguishers
21 How to use MIA: the information theoretic toolbox Experimental results 1 success rate correlation histogram MIA Kernel MIA (D KL ) Kernel χ Kernel Hellinger Kolmogorov-Smirnov 0.2 KS normalized Cramér-von-Mises messages Success rate of different distinguishers
22 How to use MIA: the information theoretic toolbox Experimental results 1 success rate correlation histogram MIA Kernel MIA (D KL ) Kernel χ Kernel Hellinger Kolmogorov-Smirnov 0.2 KS normalized Cramér-von-Mises messages Success rate of different distinguishers
23 How to use MIA: the information theoretic toolbox Experimental results 1 success rate correlation histogram MIA Kernel MIA (D KL ) Kernel χ Kernel Hellinger Kolmogorov-Smirnov 0.2 KS normalized Cramér-von-Mises messages Success rate of different distinguishers
24 How to use MIA: the information theoretic toolbox Experimental results 1 success rate correlation histogram MIA Kernel MIA (D KL ) Kernel χ Kernel Hellinger Kolmogorov-Smirnov 0.2 KS normalized Cramér-von-Mises messages Success rate of different distinguishers
25 When to use it: MIA versus correlation Outline 1 How to use MIA: the information theoretic toolbox 2 When to use it: MIA versus correlation 3 Why to use it: MIA as an evaluation metric
26 When to use it: MIA versus correlation An example: leaky bit on a data bus a 1 a 2 a 3 a 4 Data bus Pr [Y = y] x = 0 x = 1 x = 2 x = 3 x = 4 Pr [Y = y, X = x] y Effect of a leaky bit on the pdfs
27 When to use it: MIA versus correlation An example: leaky bit on a data bus a 1 a 2 a 3 a 4 Data bus Pr [Y = y] x = 0 x = 1 x = 2 x = 3 x = 4 Pr [Y = y, X = x] y Effect of a leaky bit on the pdfs
28 When to use it: MIA versus correlation An example: leaky bit on a data bus a 1 a 2 a 3 a 4 Data bus Pr [Y = y] x = 0 x = 1 x = 2 x = 3 x = 4 Pr [Y = y, X = x] y Effect of a leaky bit on the pdfs
29 When to use it: MIA versus correlation An example: leaky bit on a data bus messages a messages a 1 messages Correlation Kernel MIA (D KL ) KS normalized Weight of the first leaking bit vs number of messages for a success rate of 50% (left), 75% (middle) and 90% (right) a 1
30 When to use it: MIA versus correlation Limitations MIA is not the only way to go here: DPA would work! What about: protected logics masking scheme More resilient to erroneous leakage models But not immune, requires I (X g ; Y ) > I (X w ; Y )
31 Why to use it: MIA as an evaluation metric Outline 1 How to use MIA: the information theoretic toolbox 2 When to use it: MIA versus correlation 3 Why to use it: MIA as an evaluation metric
32 Why to use it: MIA as an evaluation metric MIA versus Mutual Information Metric Eurocrypt 2009:
33 Why to use it: MIA as an evaluation metric MIA is not MIM More precisely: 1 MIA: Î (X ; Y ) / MIM: I (K; Y ) 2 MIM directly targets the key dependencies 3 MIA requires an intermediate variable 4 MIM approximates I (K; Y ) with templates 5 MIA estimates Î (X ; Y ) on-the-fly If the leakage model used by the adversary is not perfect, MIA will underestimate the leakage: I (K; Y ) > Î (X ; Y )
34 Why to use it: MIA as an evaluation metric Summarizing MIA is a toolbox MIA is more resilient to erroneous leakage models MIA and MIM are two complementary tools with different purpose: generic adversary and generic evaluation tool
35 Conclusion Any Questions?
36 Conclusion T. W. Anderson. On the distribution of the two-sample cramér-von mises criterion. The Annals of Mathematical Statistics, 33 (3) : , Sébastien Aumonier. Generalized correlation power analysis. In Ecrypt Workshop on Tools For Cryptanalysis. Krakòw, Poland, September E. Brier, C. Clavier, F. Olivier. Correlation power analysis with a leakage model. In CHES 2004, LNCS, vol 3156, pp 16-29, Boston, MA, USA, August T.M. Cover, J.A. Thomas. Elements of Information Theory. Wiley, 1991.
37 Conclusion Imre Csiszár and Paul C. Shields. Information theory and statistics: a tutorial. Commun. Inf. Theory, vol 1, num 4, pp , DPA Contest 2008/2009, B. Gierlichs, L. Batina, P. Tuyls, B. Preneel. Mutual information analysis. In CHES 2008, LNCS, vol 5154, pp , Washington DC, USA, August P. Kocher, J. Jaffe, B. Jun, Differential power analysis. In Crypto 1999, LNCS, vol 1666, pp , Santa-Barbara, CA, USA, August Emmanuel Prouff and Matthieu Rivain. Theoretical and practical aspects of mutual information based side channel analysis.
38 Conclusion To appear in ACNS, Applied Cryptography and Network Security, LNCS, Paris, June Francois-Xavier Standaert, Tal G. Malkin, and Moti Yung. A unified framework for the analysis of side-channel key recovery attacks (extended version). Cryptology eprint Archive, Report 2006/139,
Physical Security: Status and Outlook
Physical Security: Status and Outlook ECRYPT II: Crypto for 2020 January 22-24, Tenerife, Spain Stefan Tillich Ideal World P C 2 Real World P C, C,errC 3 Implementation Attacks First publication ~ 16 years
More informationUnknown Plaintext Template Attacks
Unknown Plaintext Template Attacks Neil Hanley, Michael Tunstall 2, and William P. Marnane Department of Electrical and Electronic Engineering, University College Cork, Ireland. neilh@eleceng.ucc.ie, l.marnane@ucc.ie
More informationApplying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag
Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag Thomas Korak Thomas Plos Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology,
More informationPertinent Side Channel Attacks on Elliptic Curve Cryptographic Systems
Pertinent Side Channel Attacks on Elliptic Curve Cryptographic Systems Stanford University CS259c/MATH250: Elliptic Curves in Cryptography December 15, 2011 1 Introduction Elliptic curve cryptosystems
More informationInformation Leakage of Flip-Flops in DPA-Resistant Logic Styles
Information Leakage of Flip-Flops in DPA-Resistant Logic Styles Amir Moradi 1,, Thomas Eisenbarth 2, Axel Poschmann 2, Carsten Rolfes 2, Christof Paar 2, Mohammad T. Manzuri Shalmani 1, and Mahmoud Salmasizadeh
More informationHow To Protect Your Computer From First Order Attacks With A Threshold Implementation
A More Efficient AES Threshold Implementation Begül Bilgin 1,2, Benedikt Gierlichs 1, Svetla Nikova 1, Ventzislav Nikov 3, and Vincent Rijmen 1 1 KU Leuven, ESAT-COSIC and iminds, Belgium {name.surname}@esat.kuleuven.be
More informationCapacity Limits of MIMO Channels
Tutorial and 4G Systems Capacity Limits of MIMO Channels Markku Juntti Contents 1. Introduction. Review of information theory 3. Fixed MIMO channels 4. Fading MIMO channels 5. Summary and Conclusions References
More informationThe Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
More informationWHAT IS A JOURNAL CLUB?
WHAT IS A JOURNAL CLUB? With its September 2002 issue, the American Journal of Critical Care debuts a new feature, the AJCC Journal Club. Each issue of the journal will now feature an AJCC Journal Club
More informationCOPYRIGHT AND CITATION CONSIDERATIONS FOR THIS THESIS/ DISSERTATION
COPYRIGHT AND CITATION CONSIDERATIONS FOR THIS THESIS/ DISSERTATION o Attribution You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any
More informationCryptography & Network Security. Introduction. Chester Rebeiro IIT Madras
Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf
More informationSide Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
More informationSecurity Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics Younsung Choi College of Information and Communication Engineering, Sungkyunkwan University,
More informationPart I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
More informationCorrelation key concepts:
CORRELATION Correlation key concepts: Types of correlation Methods of studying correlation a) Scatter diagram b) Karl pearson s coefficient of correlation c) Spearman s Rank correlation coefficient d)
More informationBlock Ciphers that are Easier to Mask: How Far Can we Go?
Block Ciphers that are Easier to Mask: How Far Can we Go? Benoît Gérard 1,2, Vincent Grosso 1, María Naya-Plasencia 3, François-Xavier Standaert 1 1 ICTEAM/ELEN/Crypto Group, Université catholique de Louvain,
More informationInference of Probability Distributions for Trust and Security applications
Inference of Probability Distributions for Trust and Security applications Vladimiro Sassone Based on joint work with Mogens Nielsen & Catuscia Palamidessi Outline 2 Outline Motivations 2 Outline Motivations
More informationSecure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
More informationCORRELATION ANALYSIS
CORRELATION ANALYSIS Learning Objectives Understand how correlation can be used to demonstrate a relationship between two factors. Know how to perform a correlation analysis and calculate the coefficient
More informationMIMO CHANNEL CAPACITY
MIMO CHANNEL CAPACITY Ochi Laboratory Nguyen Dang Khoa (D1) 1 Contents Introduction Review of information theory Fixed MIMO channel Fading MIMO channel Summary and Conclusions 2 1. Introduction The use
More informationEnhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
More informationA Numerical Study on the Wiretap Network with a Simple Network Topology
A Numerical Study on the Wiretap Network with a Simple Network Topology Fan Cheng and Vincent Tan Department of Electrical and Computer Engineering National University of Singapore Mathematical Tools of
More informationSecurity Analysis of DRBG Using HMAC in NIST SP 800-90
Security Analysis of DRBG Using MAC in NIST SP 800-90 Shoichi irose Graduate School of Engineering, University of Fukui hrs shch@u-fukui.ac.jp Abstract. MAC DRBG is a deterministic random bit generator
More informationCorrelational Research. Correlational Research. Stephen E. Brock, Ph.D., NCSP EDS 250. Descriptive Research 1. Correlational Research: Scatter Plots
Correlational Research Stephen E. Brock, Ph.D., NCSP California State University, Sacramento 1 Correlational Research A quantitative methodology used to determine whether, and to what degree, a relationship
More informationEconometrics Simple Linear Regression
Econometrics Simple Linear Regression Burcu Eke UC3M Linear equations with one variable Recall what a linear equation is: y = b 0 + b 1 x is a linear equation with one variable, or equivalently, a straight
More informationA Complete Gradient Clustering Algorithm for Features Analysis of X-ray Images
A Complete Gradient Clustering Algorithm for Features Analysis of X-ray Images Małgorzata Charytanowicz, Jerzy Niewczas, Piotr A. Kowalski, Piotr Kulczycki, Szymon Łukasik, and Sławomir Żak Abstract Methods
More informationNon Parametric Inference
Maura Department of Economics and Finance Università Tor Vergata Outline 1 2 3 Inverse distribution function Theorem: Let U be a uniform random variable on (0, 1). Let X be a continuous random variable
More informationAn Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
More informationDiscussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski.
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski. Fabienne Comte, Celine Duval, Valentine Genon-Catalot To cite this version: Fabienne
More informationProbabilistic Latent Semantic Analysis (plsa)
Probabilistic Latent Semantic Analysis (plsa) SS 2008 Bayesian Networks Multimedia Computing, Universität Augsburg Rainer.Lienhart@informatik.uni-augsburg.de www.multimedia-computing.{de,org} References
More informationLinköping University Electronic Press
Linköping University Electronic Press Book Chapter Multi-modal Image Registration Using Polynomial Expansion and Mutual Information Daniel Forsberg, Gunnar Farnebäck, Hans Knutsson and Carl-Fredrik Westin
More informationJitter Measurements in Serial Data Signals
Jitter Measurements in Serial Data Signals Michael Schnecker, Product Manager LeCroy Corporation Introduction The increasing speed of serial data transmission systems places greater importance on measuring
More informationSmall Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards
Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards Junrong Liu 1, Yu Yu 1,2,3, François-Xavier Standaert 4, Zheng Guo 1,5, Dawu Gu 1, Wei Sun 1, Yijie
More informationBit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach Gamil R. S. Qaid 1, Sanjay N. Talbar 2 1 Research Student, Electronics & Telecommunications Dept.,S.G.G.S. institute
More informationTowards a Tight Finite Key Analysis for BB84
The Uncertainty Relation for Smooth Entropies joint work with Charles Ci Wen Lim, Nicolas Gisin and Renato Renner Institute for Theoretical Physics, ETH Zurich Group of Applied Physics, University of Geneva
More informationHorizontal Correlation Analysis on Exponentiation
Horizontal Correlation Analysis on Exponentiation Christophe Clavier 1, Benoit Feix 2, Georges Gagnerot 2, Mylène Roussellet 2, and Vincent Verneuil 2,3 1 XLIM-CNRS, Université de Limoges, Limoges, France
More informationDPA : Attaques et Contre-mesures
SECURE DPA : Attaques et Contre-mesures Shivam BHASIN, Taoufik CHOUTA, Guillaume DUC, Jean-Luc DANGER, Aziz EL AABID, Florent FLAMENT, Philippe HOOGVORST, Tarik GRABA, Sylvain GUILLEY, Houssem MAGHR EBI,
More informationSample Size and Power in Clinical Trials
Sample Size and Power in Clinical Trials Version 1.0 May 011 1. Power of a Test. Factors affecting Power 3. Required Sample Size RELATED ISSUES 1. Effect Size. Test Statistics 3. Variation 4. Significance
More informationNotes on Probability and Statistics
Notes on Probability and Statistics Andrew Forrester January 28, 2009 Contents 1 The Big Picture 1 2 Counting with Combinatorics 2 2.1 Possibly Useful Notation...................................... 2 2.2
More informationInternational Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
More informationThreshold Implementations Against Side-Channel Attacks and Glitches
Threshold Implementations Against Side-Channel Attacks and Glitches Svetla Nikova 1, Christian Rechberger 2, and Vincent Rijmen 2 1 Department Electrical Engineering, ESAT/COSIC, Katholieke Universiteit
More informationDetecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
More information096 Professional Readiness Examination (Mathematics)
096 Professional Readiness Examination (Mathematics) Effective after October 1, 2013 MI-SG-FLD096M-02 TABLE OF CONTENTS PART 1: General Information About the MTTC Program and Test Preparation OVERVIEW
More informationModeling Individual Claims for Motor Third Party Liability of Insurance Companies in Albania
Modeling Individual Claims for Motor Third Party Liability of Insurance Companies in Albania Oriana Zacaj Department of Mathematics, Polytechnic University, Faculty of Mathematics and Physics Engineering
More informationMath 431 An Introduction to Probability. Final Exam Solutions
Math 43 An Introduction to Probability Final Eam Solutions. A continuous random variable X has cdf a for 0, F () = for 0 <
More informationSTART Selected Topics in Assurance
START Selected Topics in Assurance Related Technologies Table of Contents Introduction Some Statistical Background Fitting a Normal Using the Anderson Darling GoF Test Fitting a Weibull Using the Anderson
More informationTesting Framework for estream Profile II Candidates
Testing Framework for estream Profile II Candidates L. Batina 1, S. Kumar 2, J. Lano 1, K. Lemke 2, N. Mentens 1, C. Paar 2, B. Preneel 1, K. Sakiyama 1 and I. Verbauwhede 1 1 Katholieke Universiteit Leuven,
More informationCRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed 1, D. Rajya Lakshmi 2 and Sayed Abdul Sattar 3 1 Department of Computer Science and
More informationSections 2.11 and 5.8
Sections 211 and 58 Timothy Hanson Department of Statistics, University of South Carolina Stat 704: Data Analysis I 1/25 Gesell data Let X be the age in in months a child speaks his/her first word and
More informationDeveloping competitive advantages through e-business of Lithuania s SMEs
Developing competitive advantages through e-business of Lithuania s SMEs R. Gatautis Marketing department, Economics and Management Faculty, Kaunas University of Technology, Laisves av. 55, Kaunas LT-3000,
More informationThree Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris
Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris Sanjay KANADE, Danielle CAMARA, Emine KRICHEN, Dijana PETROVSKA-DELACRÉTAZ, and Bernadette DORIZZI TELECOM & Management
More informationContribution of the French MetroSec
Contribution of the French MetroSec project to traffic anomalies detection ti Philippe OWEZARSKI LAAS-CNRS Toulouse, France owe@laas.fr With the contribution of Patrice Abry, Pierre Borgnat, Nicolas Larrieu,
More informationIdentity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks
Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks Tsz Hon Yuen - Huawei, Singapore Ye Zhang - Pennsylvania State University, USA Siu Ming
More information**BEGINNING OF EXAMINATION** The annual number of claims for an insured has probability function: , 0 < q < 1.
**BEGINNING OF EXAMINATION** 1. You are given: (i) The annual number of claims for an insured has probability function: 3 p x q q x x ( ) = ( 1 ) 3 x, x = 0,1,, 3 (ii) The prior density is π ( q) = q,
More informationMeasurement and Metrics Fundamentals. SE 350 Software Process & Product Quality
Measurement and Metrics Fundamentals Lecture Objectives Provide some basic concepts of metrics Quality attribute metrics and measurements Reliability, validity, error Correlation and causation Discuss
More informationSection 3 Part 1. Relationships between two numerical variables
Section 3 Part 1 Relationships between two numerical variables 1 Relationship between two variables The summary statistics covered in the previous lessons are appropriate for describing a single variable.
More informationA NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA
A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA ABSTRACT Obaida Mohammad Awad Al-Hazaimeh Department of Information Technology, Al-balqa Applied University, AL-Huson University College, Irbid,
More informationTCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS
TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS 1. Bandwidth: The bandwidth of a communication link, or in general any system, was loosely defined as the width of
More informationOn the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments
On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments Suman Jana, Sriram Nandha Premnath Mike Clark, Sneha K. Kasera, Neal Patwari University of Utah Srikanth
More informationLightweight Cryptography From an Engineers Perspective
Lightweight Cryptography From an Engineers Perspective ECC 2007 Acknowledgement Christof Paar A. Bogdanov, L. Knudsen, G. Leander, M. Robshaw, Y. Seurin, C. Vikkelsoe S. Kumar 2 Outline Motivation Hardware
More informationReading.. IMAGE COMPRESSION- I IMAGE COMPRESSION. Image compression. Data Redundancy. Lossy vs Lossless Compression. Chapter 8.
Reading.. IMAGE COMPRESSION- I Week VIII Feb 25 Chapter 8 Sections 8.1, 8.2 8.3 (selected topics) 8.4 (Huffman, run-length, loss-less predictive) 8.5 (lossy predictive, transform coding basics) 8.6 Image
More informationSingle and Multiple-Case Study Designs IS493
1 2 Research Strategies Basic oppositions Survey research versus Case study quantitative versus qualitative The whole gamut Experiment Survey Archival analysis Historical research Case study 3 Basic Conditions
More informationMasao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
More informationStatistical issues in the analysis of microarray data
Statistical issues in the analysis of microarray data Daniel Gerhard Institute of Biostatistics Leibniz University of Hannover ESNATS Summerschool, Zermatt D. Gerhard (LUH) Analysis of microarray data
More informationIn mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data.
MATHEMATICS: THE LEVEL DESCRIPTIONS In mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data. Attainment target
More informationThe CUSUM algorithm a small review. Pierre Granjon
The CUSUM algorithm a small review Pierre Granjon June, 1 Contents 1 The CUSUM algorithm 1.1 Algorithm............................... 1.1.1 The problem......................... 1.1. The different steps......................
More informationCSC474/574 - Information Systems Security: Homework1 Solutions Sketch
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher
More informationSecurity testing of hardware product
Alain MERLE CESTI LETI CEA Grenoble Alain.merle@cea.fr Security testing of hardware product DCIS/SASTI/CESTI 1 Abstract «What are you doing in ITSEFs?» Testing, Security testing, Attacks, Evaluations,
More informationKhalid Sayood and Martin C. Rost Department of Electrical Engineering University of Nebraska
PROBLEM STATEMENT A ROBUST COMPRESSION SYSTEM FOR LOW BIT RATE TELEMETRY - TEST RESULTS WITH LUNAR DATA Khalid Sayood and Martin C. Rost Department of Electrical Engineering University of Nebraska The
More informationEncryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images
Encryption Quality Analysis and Security Evaluation CAST-128 Algorithm and its Modified Version using Digital s Krishnamurthy G N, Dr. V Ramaswamy Abstract this paper demonstrates analysis well known block
More informationA More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC
International Journal of Network Security, Vol.18, No.2, PP.217-223, Mar. 2016 217 A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC Dianli Guo and Fengtong
More information1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.
Curriculum Vitae Vassilis Zikas Postdoctoral Researcher, UCLA University of California, Los Angeles Los Angeles, CA 90095-1596 +1 (424) 781-7942 vzikas@cs.ucla.edu www.cs.ucla.edu/~vzikas Education 2006
More informationMULTIVARIATE PROBABILITY DISTRIBUTIONS
MULTIVARIATE PROBABILITY DISTRIBUTIONS. PRELIMINARIES.. Example. Consider an experiment that consists of tossing a die and a coin at the same time. We can consider a number of random variables defined
More informationSuppression of Four Wave Mixing in 8 Channel DWDM System Using Hybrid Modulation Technique
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 2 (2014), pp. 97-108 International Research Publication House http://www.irphouse.com Suppression of Four
More informationWhat is Modeling and Simulation and Software Engineering?
What is Modeling and Simulation and Software Engineering? V. Sundararajan Scientific and Engineering Computing Group Centre for Development of Advanced Computing Pune 411 007 vsundar@cdac.in Definitions
More informationMultiagent Reputation Management to Achieve Robust Software Using Redundancy
Multiagent Reputation Management to Achieve Robust Software Using Redundancy Rajesh Turlapati and Michael N. Huhns Center for Information Technology, University of South Carolina Columbia, SC 29208 {turlapat,huhns}@engr.sc.edu
More informationPS 271B: Quantitative Methods II. Lecture Notes
PS 271B: Quantitative Methods II Lecture Notes Langche Zeng zeng@ucsd.edu The Empirical Research Process; Fundamental Methodological Issues 2 Theory; Data; Models/model selection; Estimation; Inference.
More informationSouth Carolina College- and Career-Ready (SCCCR) Probability and Statistics
South Carolina College- and Career-Ready (SCCCR) Probability and Statistics South Carolina College- and Career-Ready Mathematical Process Standards The South Carolina College- and Career-Ready (SCCCR)
More informationOptical Fibres. Introduction. Safety precautions. For your safety. For the safety of the apparatus
Please do not remove this manual from from the lab. It is available at www.cm.ph.bham.ac.uk/y2lab Optics Introduction Optical fibres are widely used for transmitting data at high speeds. In this experiment,
More informationBehavioral Entropy of a Cellular Phone User
Behavioral Entropy of a Cellular Phone User Santi Phithakkitnukoon 1, Husain Husna, and Ram Dantu 3 1 santi@unt.edu, Department of Comp. Sci. & Eng., University of North Texas hjh36@unt.edu, Department
More informationMeasurement and Modelling of Internet Traffic at Access Networks
Measurement and Modelling of Internet Traffic at Access Networks Johannes Färber, Stefan Bodamer, Joachim Charzinski 2 University of Stuttgart, Institute of Communication Networks and Computer Engineering,
More informationA new cost model for comparison of Point to Point and Enterprise Service Bus integration styles
A new cost model for comparison of Point to Point and Enterprise Service Bus integration styles MICHAL KÖKÖRČENÝ Department of Information Technologies Unicorn College V kapslovně 2767/2, Prague, 130 00
More informationSECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
More informationOverview of Monte Carlo Simulation, Probability Review and Introduction to Matlab
Monte Carlo Simulation: IEOR E4703 Fall 2004 c 2004 by Martin Haugh Overview of Monte Carlo Simulation, Probability Review and Introduction to Matlab 1 Overview of Monte Carlo Simulation 1.1 Why use simulation?
More informationExperiment #1, Analyze Data using Excel, Calculator and Graphs.
Physics 182 - Fall 2014 - Experiment #1 1 Experiment #1, Analyze Data using Excel, Calculator and Graphs. 1 Purpose (5 Points, Including Title. Points apply to your lab report.) Before we start measuring
More informationTesting for Granger causality between stock prices and economic growth
MPRA Munich Personal RePEc Archive Testing for Granger causality between stock prices and economic growth Pasquale Foresti 2006 Online at http://mpra.ub.uni-muenchen.de/2962/ MPRA Paper No. 2962, posted
More informationIntroduction: Overview of Kernel Methods
Introduction: Overview of Kernel Methods Statistical Data Analysis with Positive Definite Kernels Kenji Fukumizu Institute of Statistical Mathematics, ROIS Department of Statistical Science, Graduate University
More informationSimple Linear Regression Inference
Simple Linear Regression Inference 1 Inference requirements The Normality assumption of the stochastic term e is needed for inference even if it is not a OLS requirement. Therefore we have: Interpretation
More informationTaking the Mystery out of the Infamous Formula, "SNR = 6.02N + 1.76dB," and Why You Should Care. by Walt Kester
ITRODUCTIO Taking the Mystery out of the Infamous Formula, "SR = 6.0 + 1.76dB," and Why You Should Care by Walt Kester MT-001 TUTORIAL You don't have to deal with ADCs or DACs for long before running across
More informationCredit Risk Models. August 24 26, 2010
Credit Risk Models August 24 26, 2010 AGENDA 1 st Case Study : Credit Rating Model Borrowers and Factoring (Accounts Receivable Financing) pages 3 10 2 nd Case Study : Credit Scoring Model Automobile Leasing
More informationInstitute of Southern Punjab, Multan
Institute of Southern Punjab, Multan Network Security Brief Introduction Lecture#1 Mazhar Hussain E-mail: mazhar.hussain@isp.edu.pk Blog https://mazharhussainatisp.wordpress.com/ Grading Policy Classification
More informationSome Research Problems in Uncertainty Theory
Journal of Uncertain Systems Vol.3, No.1, pp.3-10, 2009 Online at: www.jus.org.uk Some Research Problems in Uncertainty Theory aoding Liu Uncertainty Theory Laboratory, Department of Mathematical Sciences
More informationTrading Security with Quality of Experience
Trading Security with Quality of Experience Alessandro Aldini University of Urbino Carlo Bo, Italy Dagstuhl Seminar 12481, Quantitative Security Analysis Outline 1 Introduction 2 Security vs. performability
More informationProblem of the Month: Fair Games
Problem of the Month: The Problems of the Month (POM) are used in a variety of ways to promote problem solving and to foster the first standard of mathematical practice from the Common Core State Standards:
More informationA Correlation of. to the. South Carolina Data Analysis and Probability Standards
A Correlation of to the South Carolina Data Analysis and Probability Standards INTRODUCTION This document demonstrates how Stats in Your World 2012 meets the indicators of the South Carolina Academic Standards
More informationUNIVERSITY OF NAIROBI
UNIVERSITY OF NAIROBI MASTERS IN PROJECT PLANNING AND MANAGEMENT NAME: SARU CAROLYNN ELIZABETH REGISTRATION NO: L50/61646/2013 COURSE CODE: LDP 603 COURSE TITLE: RESEARCH METHODS LECTURER: GAKUU CHRISTOPHER
More informationCovariance and Correlation
Covariance and Correlation ( c Robert J. Serfling Not for reproduction or distribution) We have seen how to summarize a data-based relative frequency distribution by measures of location and spread, such
More informationPELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS INTRODUCTION TO STATISTICS MATH 2050
PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS INTRODUCTION TO STATISTICS MATH 2050 Class Hours: 2.0 Credit Hours: 3.0 Laboratory Hours: 2.0 Date Revised: Fall 2013 Catalog Course Description: Descriptive
More informationA Study on Smart Card Security Evaluation Criteria for Side Channel Attacks
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks HoonJae Lee 1, ManKi Ahn 2, SeonGan Lim 3, and SangJae Moon 4 1 Dongseo University, Busan, 617-716, Korea hjlee@dongseo.ac.kr
More informationAdaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
More information