Mutual Information Analysis: How, When and Why?

Size: px
Start display at page:

Download "Mutual Information Analysis: How, When and Why?"

Transcription

1 Mutual Information Analysis: How, When and Why? Nicolas Veyrat-Charvillon and François-Xavier Standaert Crypto Group Université catholique de Louvain CHES 09, September 3rd 2009

2 Side-channel analysis j Adversary predict V j,p model X j,p P D j j s? compute V s,p leak Y k,p k Device

3 Classical attacks Classical solutions in non profiled SCA: Kocher s original DPA, at Crypto 1999 Correlation attacks, at CHES 2004

4 So, what to do? X 0 = y 0 y 1 y 3 y 7 y y 2 y 5 y y 4 y 6 y 13 y 8 y 9 y y y X 1 = y 7 y 0 y 1 y 5 y 6... y 2 y 3 y 8... y 13 y 4 y 10 y 15 y 9 y y y 14...

5 Pearson s correlation coefficient Measure of linear dependence between r.v. s X and Y. ρ(x, Y ) = cov(x, Y ) σ X σ Y = E[XY ] E[X ] E[Y ] σ x σ Y.

6 Pearson s correlation coefficient Measure of linear dependence between r.v. s X and Y. ρ(x, Y ) = cov(x, Y ) σ X σ Y = E[XY ] E[X ] E[Y ] σ x σ Y.

7 Pearson s correlation coefficient Measure of linear dependence between r.v. s X and Y. ρ(x, Y ) = cov(x, Y ) σ X σ Y = E[XY ] E[X ] E[Y ] σ x σ Y.

8 So, what to do? Pr [Y = y] x = 0 x = 1 x = 2 x = 3 x = 4 Pr [Y = y, X = x] Pr [Y = y, X = x] X 0 = y 0 y 1 y 3 y 7 y y 2 y 5 y y 4 y 6 y 13 y 8 y 9 y y y y X 1 = y 7 y 0 y 1 y 5 y 6... y 2 y 3 y 8... y 13 y 4 y 10 y 15 y 9 y y y y

9 So, what to do? 1 Estimate the probability density of the leakages 2 Test for a dependence between X and Y

10 Mutual information Analysis Introduced at CHES 2008 by Gierlichs & al. Aims at genericity: as little assumptions as possible about the leakage H [X, Y ] y H [X Y ] I (X ; Y ) H [Y X ]

11 How to use MIA: the information theoretic toolbox Outline 1 How to use MIA: the information theoretic toolbox 2 When to use it: MIA versus correlation 3 Why to use it: MIA as an evaluation metric

12 How to use MIA: the information theoretic toolbox 1 Estimation: Non-parametric methods y y

13 How to use MIA: the information theoretic toolbox 1 Estimation: Non-parametric methods y y Well, non-parametric... bin width and bandwidth to choose

14 How to use MIA: the information theoretic toolbox Information theoretic definitions Shannon s entropy, a measure of information H [X ] = x X Pr [X = x] log (Pr [X = x]) Mutual information, a general measure of dependence I (X ; Y ) = Pr [X = x, Y = y] x X,y Y log ( Pr [X = x, Y = y] ) Pr [X = x] Pr [Y = y]

15 How to use MIA: the information theoretic toolbox Information theoretic definitions H [X, Y ] H [X ] H [Y ] H [X Y ] I (X ; Y ) H [Y X ] Information diagram

16 How to use MIA: the information theoretic toolbox 2 Test: Kullback-Leibler divergence D KL (P Q) = z Z Pr [Z = z, Z P] log Relation to mutual information: Pr [Z = z, Z P] Pr [Z = z, Z Q] I (X ; Y ) = D KL (Pr [X, Y ] Pr [X ] Pr [Y ]) = E x X (D KL (Pr [Y X = x] Pr [Y ]))

17 How to use MIA: the information theoretic toolbox 2 Test: F-divergences I f (P, Q) = z Z Pr [Z = z, Z Q] f ( ) Pr [Z = z, Z P] Pr [Z = z, Z Q] Different parameter functions f give different measures: Kullback-Leibler divergence f (t) = t log t Inverse Kullback-Leibler f (t) = log t Pearson χ 2 divergence f (t) = (t 1) 2 Hellinger distance f (t) = 1 t Total variation f (t) = t 1

18 How to use MIA: the information theoretic toolbox 1&2: Implicit pdf estimation Empirical cumulative function: F (x t ) = 1 n n χ xi x t, where χ xi x t = i=1 { 1 if xi x t 0 otherwise. Two sample Kolmogorov-Smirnov test D KS (P Q) = sup x t F P (x t ) F Q (x t ) Two sample Cramér-von-Mises test D CvM (P Q) = + (F P (x t ) F Q (x t )) 2 dx t

19 How to use MIA: the information theoretic toolbox Experimental results 1 success rate correlation histogram MIA Kernel MIA (D KL ) Kernel χ Kernel Hellinger Kolmogorov-Smirnov 0.2 KS normalized Cramér-von-Mises messages Success rate of different distinguishers

20 How to use MIA: the information theoretic toolbox Experimental results 1 success rate correlation histogram MIA Kernel MIA (D KL ) Kernel χ Kernel Hellinger Kolmogorov-Smirnov 0.2 KS normalized Cramér-von-Mises messages Success rate of different distinguishers

21 How to use MIA: the information theoretic toolbox Experimental results 1 success rate correlation histogram MIA Kernel MIA (D KL ) Kernel χ Kernel Hellinger Kolmogorov-Smirnov 0.2 KS normalized Cramér-von-Mises messages Success rate of different distinguishers

22 How to use MIA: the information theoretic toolbox Experimental results 1 success rate correlation histogram MIA Kernel MIA (D KL ) Kernel χ Kernel Hellinger Kolmogorov-Smirnov 0.2 KS normalized Cramér-von-Mises messages Success rate of different distinguishers

23 How to use MIA: the information theoretic toolbox Experimental results 1 success rate correlation histogram MIA Kernel MIA (D KL ) Kernel χ Kernel Hellinger Kolmogorov-Smirnov 0.2 KS normalized Cramér-von-Mises messages Success rate of different distinguishers

24 How to use MIA: the information theoretic toolbox Experimental results 1 success rate correlation histogram MIA Kernel MIA (D KL ) Kernel χ Kernel Hellinger Kolmogorov-Smirnov 0.2 KS normalized Cramér-von-Mises messages Success rate of different distinguishers

25 When to use it: MIA versus correlation Outline 1 How to use MIA: the information theoretic toolbox 2 When to use it: MIA versus correlation 3 Why to use it: MIA as an evaluation metric

26 When to use it: MIA versus correlation An example: leaky bit on a data bus a 1 a 2 a 3 a 4 Data bus Pr [Y = y] x = 0 x = 1 x = 2 x = 3 x = 4 Pr [Y = y, X = x] y Effect of a leaky bit on the pdfs

27 When to use it: MIA versus correlation An example: leaky bit on a data bus a 1 a 2 a 3 a 4 Data bus Pr [Y = y] x = 0 x = 1 x = 2 x = 3 x = 4 Pr [Y = y, X = x] y Effect of a leaky bit on the pdfs

28 When to use it: MIA versus correlation An example: leaky bit on a data bus a 1 a 2 a 3 a 4 Data bus Pr [Y = y] x = 0 x = 1 x = 2 x = 3 x = 4 Pr [Y = y, X = x] y Effect of a leaky bit on the pdfs

29 When to use it: MIA versus correlation An example: leaky bit on a data bus messages a messages a 1 messages Correlation Kernel MIA (D KL ) KS normalized Weight of the first leaking bit vs number of messages for a success rate of 50% (left), 75% (middle) and 90% (right) a 1

30 When to use it: MIA versus correlation Limitations MIA is not the only way to go here: DPA would work! What about: protected logics masking scheme More resilient to erroneous leakage models But not immune, requires I (X g ; Y ) > I (X w ; Y )

31 Why to use it: MIA as an evaluation metric Outline 1 How to use MIA: the information theoretic toolbox 2 When to use it: MIA versus correlation 3 Why to use it: MIA as an evaluation metric

32 Why to use it: MIA as an evaluation metric MIA versus Mutual Information Metric Eurocrypt 2009:

33 Why to use it: MIA as an evaluation metric MIA is not MIM More precisely: 1 MIA: Î (X ; Y ) / MIM: I (K; Y ) 2 MIM directly targets the key dependencies 3 MIA requires an intermediate variable 4 MIM approximates I (K; Y ) with templates 5 MIA estimates Î (X ; Y ) on-the-fly If the leakage model used by the adversary is not perfect, MIA will underestimate the leakage: I (K; Y ) > Î (X ; Y )

34 Why to use it: MIA as an evaluation metric Summarizing MIA is a toolbox MIA is more resilient to erroneous leakage models MIA and MIM are two complementary tools with different purpose: generic adversary and generic evaluation tool

35 Conclusion Any Questions?

36 Conclusion T. W. Anderson. On the distribution of the two-sample cramér-von mises criterion. The Annals of Mathematical Statistics, 33 (3) : , Sébastien Aumonier. Generalized correlation power analysis. In Ecrypt Workshop on Tools For Cryptanalysis. Krakòw, Poland, September E. Brier, C. Clavier, F. Olivier. Correlation power analysis with a leakage model. In CHES 2004, LNCS, vol 3156, pp 16-29, Boston, MA, USA, August T.M. Cover, J.A. Thomas. Elements of Information Theory. Wiley, 1991.

37 Conclusion Imre Csiszár and Paul C. Shields. Information theory and statistics: a tutorial. Commun. Inf. Theory, vol 1, num 4, pp , DPA Contest 2008/2009, B. Gierlichs, L. Batina, P. Tuyls, B. Preneel. Mutual information analysis. In CHES 2008, LNCS, vol 5154, pp , Washington DC, USA, August P. Kocher, J. Jaffe, B. Jun, Differential power analysis. In Crypto 1999, LNCS, vol 1666, pp , Santa-Barbara, CA, USA, August Emmanuel Prouff and Matthieu Rivain. Theoretical and practical aspects of mutual information based side channel analysis.

38 Conclusion To appear in ACNS, Applied Cryptography and Network Security, LNCS, Paris, June Francois-Xavier Standaert, Tal G. Malkin, and Moti Yung. A unified framework for the analysis of side-channel key recovery attacks (extended version). Cryptology eprint Archive, Report 2006/139,

Physical Security: Status and Outlook

Physical Security: Status and Outlook Physical Security: Status and Outlook ECRYPT II: Crypto for 2020 January 22-24, Tenerife, Spain Stefan Tillich Ideal World P C 2 Real World P C, C,errC 3 Implementation Attacks First publication ~ 16 years

More information

Unknown Plaintext Template Attacks

Unknown Plaintext Template Attacks Unknown Plaintext Template Attacks Neil Hanley, Michael Tunstall 2, and William P. Marnane Department of Electrical and Electronic Engineering, University College Cork, Ireland. neilh@eleceng.ucc.ie, l.marnane@ucc.ie

More information

Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag

Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag Thomas Korak Thomas Plos Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology,

More information

Pertinent Side Channel Attacks on Elliptic Curve Cryptographic Systems

Pertinent Side Channel Attacks on Elliptic Curve Cryptographic Systems Pertinent Side Channel Attacks on Elliptic Curve Cryptographic Systems Stanford University CS259c/MATH250: Elliptic Curves in Cryptography December 15, 2011 1 Introduction Elliptic curve cryptosystems

More information

Information Leakage of Flip-Flops in DPA-Resistant Logic Styles

Information Leakage of Flip-Flops in DPA-Resistant Logic Styles Information Leakage of Flip-Flops in DPA-Resistant Logic Styles Amir Moradi 1,, Thomas Eisenbarth 2, Axel Poschmann 2, Carsten Rolfes 2, Christof Paar 2, Mohammad T. Manzuri Shalmani 1, and Mahmoud Salmasizadeh

More information

How To Protect Your Computer From First Order Attacks With A Threshold Implementation

How To Protect Your Computer From First Order Attacks With A Threshold Implementation A More Efficient AES Threshold Implementation Begül Bilgin 1,2, Benedikt Gierlichs 1, Svetla Nikova 1, Ventzislav Nikov 3, and Vincent Rijmen 1 1 KU Leuven, ESAT-COSIC and iminds, Belgium {name.surname}@esat.kuleuven.be

More information

Capacity Limits of MIMO Channels

Capacity Limits of MIMO Channels Tutorial and 4G Systems Capacity Limits of MIMO Channels Markku Juntti Contents 1. Introduction. Review of information theory 3. Fixed MIMO channels 4. Fading MIMO channels 5. Summary and Conclusions References

More information

The Advanced Encryption Standard (AES)

The Advanced Encryption Standard (AES) The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow

More information

WHAT IS A JOURNAL CLUB?

WHAT IS A JOURNAL CLUB? WHAT IS A JOURNAL CLUB? With its September 2002 issue, the American Journal of Critical Care debuts a new feature, the AJCC Journal Club. Each issue of the journal will now feature an AJCC Journal Club

More information

COPYRIGHT AND CITATION CONSIDERATIONS FOR THIS THESIS/ DISSERTATION

COPYRIGHT AND CITATION CONSIDERATIONS FOR THIS THESIS/ DISSERTATION COPYRIGHT AND CITATION CONSIDERATIONS FOR THIS THESIS/ DISSERTATION o Attribution You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any

More information

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf

More information

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Side Channel Analysis and Embedded Systems Impact and Countermeasures Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side

More information

Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics

Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics Younsung Choi College of Information and Communication Engineering, Sungkyunkwan University,

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

Correlation key concepts:

Correlation key concepts: CORRELATION Correlation key concepts: Types of correlation Methods of studying correlation a) Scatter diagram b) Karl pearson s coefficient of correlation c) Spearman s Rank correlation coefficient d)

More information

Block Ciphers that are Easier to Mask: How Far Can we Go?

Block Ciphers that are Easier to Mask: How Far Can we Go? Block Ciphers that are Easier to Mask: How Far Can we Go? Benoît Gérard 1,2, Vincent Grosso 1, María Naya-Plasencia 3, François-Xavier Standaert 1 1 ICTEAM/ELEN/Crypto Group, Université catholique de Louvain,

More information

Inference of Probability Distributions for Trust and Security applications

Inference of Probability Distributions for Trust and Security applications Inference of Probability Distributions for Trust and Security applications Vladimiro Sassone Based on joint work with Mogens Nielsen & Catuscia Palamidessi Outline 2 Outline Motivations 2 Outline Motivations

More information

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in

More information

CORRELATION ANALYSIS

CORRELATION ANALYSIS CORRELATION ANALYSIS Learning Objectives Understand how correlation can be used to demonstrate a relationship between two factors. Know how to perform a correlation analysis and calculate the coefficient

More information

MIMO CHANNEL CAPACITY

MIMO CHANNEL CAPACITY MIMO CHANNEL CAPACITY Ochi Laboratory Nguyen Dang Khoa (D1) 1 Contents Introduction Review of information theory Fixed MIMO channel Fading MIMO channel Summary and Conclusions 2 1. Introduction The use

More information

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra

More information

A Numerical Study on the Wiretap Network with a Simple Network Topology

A Numerical Study on the Wiretap Network with a Simple Network Topology A Numerical Study on the Wiretap Network with a Simple Network Topology Fan Cheng and Vincent Tan Department of Electrical and Computer Engineering National University of Singapore Mathematical Tools of

More information

Security Analysis of DRBG Using HMAC in NIST SP 800-90

Security Analysis of DRBG Using HMAC in NIST SP 800-90 Security Analysis of DRBG Using MAC in NIST SP 800-90 Shoichi irose Graduate School of Engineering, University of Fukui hrs shch@u-fukui.ac.jp Abstract. MAC DRBG is a deterministic random bit generator

More information

Correlational Research. Correlational Research. Stephen E. Brock, Ph.D., NCSP EDS 250. Descriptive Research 1. Correlational Research: Scatter Plots

Correlational Research. Correlational Research. Stephen E. Brock, Ph.D., NCSP EDS 250. Descriptive Research 1. Correlational Research: Scatter Plots Correlational Research Stephen E. Brock, Ph.D., NCSP California State University, Sacramento 1 Correlational Research A quantitative methodology used to determine whether, and to what degree, a relationship

More information

Econometrics Simple Linear Regression

Econometrics Simple Linear Regression Econometrics Simple Linear Regression Burcu Eke UC3M Linear equations with one variable Recall what a linear equation is: y = b 0 + b 1 x is a linear equation with one variable, or equivalently, a straight

More information

A Complete Gradient Clustering Algorithm for Features Analysis of X-ray Images

A Complete Gradient Clustering Algorithm for Features Analysis of X-ray Images A Complete Gradient Clustering Algorithm for Features Analysis of X-ray Images Małgorzata Charytanowicz, Jerzy Niewczas, Piotr A. Kowalski, Piotr Kulczycki, Szymon Łukasik, and Sławomir Żak Abstract Methods

More information

Non Parametric Inference

Non Parametric Inference Maura Department of Economics and Finance Università Tor Vergata Outline 1 2 3 Inverse distribution function Theorem: Let U be a uniform random variable on (0, 1). Let X be a continuous random variable

More information

An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography

An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography

More information

Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski.

Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski. Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski. Fabienne Comte, Celine Duval, Valentine Genon-Catalot To cite this version: Fabienne

More information

Probabilistic Latent Semantic Analysis (plsa)

Probabilistic Latent Semantic Analysis (plsa) Probabilistic Latent Semantic Analysis (plsa) SS 2008 Bayesian Networks Multimedia Computing, Universität Augsburg Rainer.Lienhart@informatik.uni-augsburg.de www.multimedia-computing.{de,org} References

More information

Linköping University Electronic Press

Linköping University Electronic Press Linköping University Electronic Press Book Chapter Multi-modal Image Registration Using Polynomial Expansion and Mutual Information Daniel Forsberg, Gunnar Farnebäck, Hans Knutsson and Carl-Fredrik Westin

More information

Jitter Measurements in Serial Data Signals

Jitter Measurements in Serial Data Signals Jitter Measurements in Serial Data Signals Michael Schnecker, Product Manager LeCroy Corporation Introduction The increasing speed of serial data transmission systems places greater importance on measuring

More information

Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards

Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards Junrong Liu 1, Yu Yu 1,2,3, François-Xavier Standaert 4, Zheng Guo 1,5, Dawu Gu 1, Wei Sun 1, Yijie

More information

Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach

Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach Gamil R. S. Qaid 1, Sanjay N. Talbar 2 1 Research Student, Electronics & Telecommunications Dept.,S.G.G.S. institute

More information

Towards a Tight Finite Key Analysis for BB84

Towards a Tight Finite Key Analysis for BB84 The Uncertainty Relation for Smooth Entropies joint work with Charles Ci Wen Lim, Nicolas Gisin and Renato Renner Institute for Theoretical Physics, ETH Zurich Group of Applied Physics, University of Geneva

More information

Horizontal Correlation Analysis on Exponentiation

Horizontal Correlation Analysis on Exponentiation Horizontal Correlation Analysis on Exponentiation Christophe Clavier 1, Benoit Feix 2, Georges Gagnerot 2, Mylène Roussellet 2, and Vincent Verneuil 2,3 1 XLIM-CNRS, Université de Limoges, Limoges, France

More information

DPA : Attaques et Contre-mesures

DPA : Attaques et Contre-mesures SECURE DPA : Attaques et Contre-mesures Shivam BHASIN, Taoufik CHOUTA, Guillaume DUC, Jean-Luc DANGER, Aziz EL AABID, Florent FLAMENT, Philippe HOOGVORST, Tarik GRABA, Sylvain GUILLEY, Houssem MAGHR EBI,

More information

Sample Size and Power in Clinical Trials

Sample Size and Power in Clinical Trials Sample Size and Power in Clinical Trials Version 1.0 May 011 1. Power of a Test. Factors affecting Power 3. Required Sample Size RELATED ISSUES 1. Effect Size. Test Statistics 3. Variation 4. Significance

More information

Notes on Probability and Statistics

Notes on Probability and Statistics Notes on Probability and Statistics Andrew Forrester January 28, 2009 Contents 1 The Big Picture 1 2 Counting with Combinatorics 2 2.1 Possibly Useful Notation...................................... 2 2.2

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

Threshold Implementations Against Side-Channel Attacks and Glitches

Threshold Implementations Against Side-Channel Attacks and Glitches Threshold Implementations Against Side-Channel Attacks and Glitches Svetla Nikova 1, Christian Rechberger 2, and Vincent Rijmen 2 1 Department Electrical Engineering, ESAT/COSIC, Katholieke Universiteit

More information

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop

More information

096 Professional Readiness Examination (Mathematics)

096 Professional Readiness Examination (Mathematics) 096 Professional Readiness Examination (Mathematics) Effective after October 1, 2013 MI-SG-FLD096M-02 TABLE OF CONTENTS PART 1: General Information About the MTTC Program and Test Preparation OVERVIEW

More information

Modeling Individual Claims for Motor Third Party Liability of Insurance Companies in Albania

Modeling Individual Claims for Motor Third Party Liability of Insurance Companies in Albania Modeling Individual Claims for Motor Third Party Liability of Insurance Companies in Albania Oriana Zacaj Department of Mathematics, Polytechnic University, Faculty of Mathematics and Physics Engineering

More information

Math 431 An Introduction to Probability. Final Exam Solutions

Math 431 An Introduction to Probability. Final Exam Solutions Math 43 An Introduction to Probability Final Eam Solutions. A continuous random variable X has cdf a for 0, F () = for 0 <

More information

START Selected Topics in Assurance

START Selected Topics in Assurance START Selected Topics in Assurance Related Technologies Table of Contents Introduction Some Statistical Background Fitting a Normal Using the Anderson Darling GoF Test Fitting a Weibull Using the Anderson

More information

Testing Framework for estream Profile II Candidates

Testing Framework for estream Profile II Candidates Testing Framework for estream Profile II Candidates L. Batina 1, S. Kumar 2, J. Lano 1, K. Lemke 2, N. Mentens 1, C. Paar 2, B. Preneel 1, K. Sakiyama 1 and I. Verbauwhede 1 1 Katholieke Universiteit Leuven,

More information

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed 1, D. Rajya Lakshmi 2 and Sayed Abdul Sattar 3 1 Department of Computer Science and

More information

Sections 2.11 and 5.8

Sections 2.11 and 5.8 Sections 211 and 58 Timothy Hanson Department of Statistics, University of South Carolina Stat 704: Data Analysis I 1/25 Gesell data Let X be the age in in months a child speaks his/her first word and

More information

Developing competitive advantages through e-business of Lithuania s SMEs

Developing competitive advantages through e-business of Lithuania s SMEs Developing competitive advantages through e-business of Lithuania s SMEs R. Gatautis Marketing department, Economics and Management Faculty, Kaunas University of Technology, Laisves av. 55, Kaunas LT-3000,

More information

Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris

Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris Sanjay KANADE, Danielle CAMARA, Emine KRICHEN, Dijana PETROVSKA-DELACRÉTAZ, and Bernadette DORIZZI TELECOM & Management

More information

Contribution of the French MetroSec

Contribution of the French MetroSec Contribution of the French MetroSec project to traffic anomalies detection ti Philippe OWEZARSKI LAAS-CNRS Toulouse, France owe@laas.fr With the contribution of Patrice Abry, Pierre Borgnat, Nicolas Larrieu,

More information

Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks Tsz Hon Yuen - Huawei, Singapore Ye Zhang - Pennsylvania State University, USA Siu Ming

More information

**BEGINNING OF EXAMINATION** The annual number of claims for an insured has probability function: , 0 < q < 1.

**BEGINNING OF EXAMINATION** The annual number of claims for an insured has probability function: , 0 < q < 1. **BEGINNING OF EXAMINATION** 1. You are given: (i) The annual number of claims for an insured has probability function: 3 p x q q x x ( ) = ( 1 ) 3 x, x = 0,1,, 3 (ii) The prior density is π ( q) = q,

More information

Measurement and Metrics Fundamentals. SE 350 Software Process & Product Quality

Measurement and Metrics Fundamentals. SE 350 Software Process & Product Quality Measurement and Metrics Fundamentals Lecture Objectives Provide some basic concepts of metrics Quality attribute metrics and measurements Reliability, validity, error Correlation and causation Discuss

More information

Section 3 Part 1. Relationships between two numerical variables

Section 3 Part 1. Relationships between two numerical variables Section 3 Part 1 Relationships between two numerical variables 1 Relationship between two variables The summary statistics covered in the previous lessons are appropriate for describing a single variable.

More information

A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA

A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA ABSTRACT Obaida Mohammad Awad Al-Hazaimeh Department of Information Technology, Al-balqa Applied University, AL-Huson University College, Irbid,

More information

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS 1. Bandwidth: The bandwidth of a communication link, or in general any system, was loosely defined as the width of

More information

On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments

On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments Suman Jana, Sriram Nandha Premnath Mike Clark, Sneha K. Kasera, Neal Patwari University of Utah Srikanth

More information

Lightweight Cryptography From an Engineers Perspective

Lightweight Cryptography From an Engineers Perspective Lightweight Cryptography From an Engineers Perspective ECC 2007 Acknowledgement Christof Paar A. Bogdanov, L. Knudsen, G. Leander, M. Robshaw, Y. Seurin, C. Vikkelsoe S. Kumar 2 Outline Motivation Hardware

More information

Reading.. IMAGE COMPRESSION- I IMAGE COMPRESSION. Image compression. Data Redundancy. Lossy vs Lossless Compression. Chapter 8.

Reading.. IMAGE COMPRESSION- I IMAGE COMPRESSION. Image compression. Data Redundancy. Lossy vs Lossless Compression. Chapter 8. Reading.. IMAGE COMPRESSION- I Week VIII Feb 25 Chapter 8 Sections 8.1, 8.2 8.3 (selected topics) 8.4 (Huffman, run-length, loss-less predictive) 8.5 (lossy predictive, transform coding basics) 8.6 Image

More information

Single and Multiple-Case Study Designs IS493

Single and Multiple-Case Study Designs IS493 1 2 Research Strategies Basic oppositions Survey research versus Case study quantitative versus qualitative The whole gamut Experiment Survey Archival analysis Historical research Case study 3 Basic Conditions

More information

Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.

Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC. A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various

More information

Statistical issues in the analysis of microarray data

Statistical issues in the analysis of microarray data Statistical issues in the analysis of microarray data Daniel Gerhard Institute of Biostatistics Leibniz University of Hannover ESNATS Summerschool, Zermatt D. Gerhard (LUH) Analysis of microarray data

More information

In mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data.

In mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data. MATHEMATICS: THE LEVEL DESCRIPTIONS In mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data. Attainment target

More information

The CUSUM algorithm a small review. Pierre Granjon

The CUSUM algorithm a small review. Pierre Granjon The CUSUM algorithm a small review Pierre Granjon June, 1 Contents 1 The CUSUM algorithm 1.1 Algorithm............................... 1.1.1 The problem......................... 1.1. The different steps......................

More information

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher

More information

Security testing of hardware product

Security testing of hardware product Alain MERLE CESTI LETI CEA Grenoble Alain.merle@cea.fr Security testing of hardware product DCIS/SASTI/CESTI 1 Abstract «What are you doing in ITSEFs?» Testing, Security testing, Attacks, Evaluations,

More information

Khalid Sayood and Martin C. Rost Department of Electrical Engineering University of Nebraska

Khalid Sayood and Martin C. Rost Department of Electrical Engineering University of Nebraska PROBLEM STATEMENT A ROBUST COMPRESSION SYSTEM FOR LOW BIT RATE TELEMETRY - TEST RESULTS WITH LUNAR DATA Khalid Sayood and Martin C. Rost Department of Electrical Engineering University of Nebraska The

More information

Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images

Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images Encryption Quality Analysis and Security Evaluation CAST-128 Algorithm and its Modified Version using Digital s Krishnamurthy G N, Dr. V Ramaswamy Abstract this paper demonstrates analysis well known block

More information

A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC

A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC International Journal of Network Security, Vol.18, No.2, PP.217-223, Mar. 2016 217 A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC Dianli Guo and Fengtong

More information

1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.

1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics. Curriculum Vitae Vassilis Zikas Postdoctoral Researcher, UCLA University of California, Los Angeles Los Angeles, CA 90095-1596 +1 (424) 781-7942 vzikas@cs.ucla.edu www.cs.ucla.edu/~vzikas Education 2006

More information

MULTIVARIATE PROBABILITY DISTRIBUTIONS

MULTIVARIATE PROBABILITY DISTRIBUTIONS MULTIVARIATE PROBABILITY DISTRIBUTIONS. PRELIMINARIES.. Example. Consider an experiment that consists of tossing a die and a coin at the same time. We can consider a number of random variables defined

More information

Suppression of Four Wave Mixing in 8 Channel DWDM System Using Hybrid Modulation Technique

Suppression of Four Wave Mixing in 8 Channel DWDM System Using Hybrid Modulation Technique International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 2 (2014), pp. 97-108 International Research Publication House http://www.irphouse.com Suppression of Four

More information

What is Modeling and Simulation and Software Engineering?

What is Modeling and Simulation and Software Engineering? What is Modeling and Simulation and Software Engineering? V. Sundararajan Scientific and Engineering Computing Group Centre for Development of Advanced Computing Pune 411 007 vsundar@cdac.in Definitions

More information

Multiagent Reputation Management to Achieve Robust Software Using Redundancy

Multiagent Reputation Management to Achieve Robust Software Using Redundancy Multiagent Reputation Management to Achieve Robust Software Using Redundancy Rajesh Turlapati and Michael N. Huhns Center for Information Technology, University of South Carolina Columbia, SC 29208 {turlapat,huhns}@engr.sc.edu

More information

PS 271B: Quantitative Methods II. Lecture Notes

PS 271B: Quantitative Methods II. Lecture Notes PS 271B: Quantitative Methods II Lecture Notes Langche Zeng zeng@ucsd.edu The Empirical Research Process; Fundamental Methodological Issues 2 Theory; Data; Models/model selection; Estimation; Inference.

More information

South Carolina College- and Career-Ready (SCCCR) Probability and Statistics

South Carolina College- and Career-Ready (SCCCR) Probability and Statistics South Carolina College- and Career-Ready (SCCCR) Probability and Statistics South Carolina College- and Career-Ready Mathematical Process Standards The South Carolina College- and Career-Ready (SCCCR)

More information

Optical Fibres. Introduction. Safety precautions. For your safety. For the safety of the apparatus

Optical Fibres. Introduction. Safety precautions. For your safety. For the safety of the apparatus Please do not remove this manual from from the lab. It is available at www.cm.ph.bham.ac.uk/y2lab Optics Introduction Optical fibres are widely used for transmitting data at high speeds. In this experiment,

More information

Behavioral Entropy of a Cellular Phone User

Behavioral Entropy of a Cellular Phone User Behavioral Entropy of a Cellular Phone User Santi Phithakkitnukoon 1, Husain Husna, and Ram Dantu 3 1 santi@unt.edu, Department of Comp. Sci. & Eng., University of North Texas hjh36@unt.edu, Department

More information

Measurement and Modelling of Internet Traffic at Access Networks

Measurement and Modelling of Internet Traffic at Access Networks Measurement and Modelling of Internet Traffic at Access Networks Johannes Färber, Stefan Bodamer, Joachim Charzinski 2 University of Stuttgart, Institute of Communication Networks and Computer Engineering,

More information

A new cost model for comparison of Point to Point and Enterprise Service Bus integration styles

A new cost model for comparison of Point to Point and Enterprise Service Bus integration styles A new cost model for comparison of Point to Point and Enterprise Service Bus integration styles MICHAL KÖKÖRČENÝ Department of Information Technologies Unicorn College V kapslovně 2767/2, Prague, 130 00

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

Overview of Monte Carlo Simulation, Probability Review and Introduction to Matlab

Overview of Monte Carlo Simulation, Probability Review and Introduction to Matlab Monte Carlo Simulation: IEOR E4703 Fall 2004 c 2004 by Martin Haugh Overview of Monte Carlo Simulation, Probability Review and Introduction to Matlab 1 Overview of Monte Carlo Simulation 1.1 Why use simulation?

More information

Experiment #1, Analyze Data using Excel, Calculator and Graphs.

Experiment #1, Analyze Data using Excel, Calculator and Graphs. Physics 182 - Fall 2014 - Experiment #1 1 Experiment #1, Analyze Data using Excel, Calculator and Graphs. 1 Purpose (5 Points, Including Title. Points apply to your lab report.) Before we start measuring

More information

Testing for Granger causality between stock prices and economic growth

Testing for Granger causality between stock prices and economic growth MPRA Munich Personal RePEc Archive Testing for Granger causality between stock prices and economic growth Pasquale Foresti 2006 Online at http://mpra.ub.uni-muenchen.de/2962/ MPRA Paper No. 2962, posted

More information

Introduction: Overview of Kernel Methods

Introduction: Overview of Kernel Methods Introduction: Overview of Kernel Methods Statistical Data Analysis with Positive Definite Kernels Kenji Fukumizu Institute of Statistical Mathematics, ROIS Department of Statistical Science, Graduate University

More information

Simple Linear Regression Inference

Simple Linear Regression Inference Simple Linear Regression Inference 1 Inference requirements The Normality assumption of the stochastic term e is needed for inference even if it is not a OLS requirement. Therefore we have: Interpretation

More information

Taking the Mystery out of the Infamous Formula, "SNR = 6.02N + 1.76dB," and Why You Should Care. by Walt Kester

Taking the Mystery out of the Infamous Formula, SNR = 6.02N + 1.76dB, and Why You Should Care. by Walt Kester ITRODUCTIO Taking the Mystery out of the Infamous Formula, "SR = 6.0 + 1.76dB," and Why You Should Care by Walt Kester MT-001 TUTORIAL You don't have to deal with ADCs or DACs for long before running across

More information

Credit Risk Models. August 24 26, 2010

Credit Risk Models. August 24 26, 2010 Credit Risk Models August 24 26, 2010 AGENDA 1 st Case Study : Credit Rating Model Borrowers and Factoring (Accounts Receivable Financing) pages 3 10 2 nd Case Study : Credit Scoring Model Automobile Leasing

More information

Institute of Southern Punjab, Multan

Institute of Southern Punjab, Multan Institute of Southern Punjab, Multan Network Security Brief Introduction Lecture#1 Mazhar Hussain E-mail: mazhar.hussain@isp.edu.pk Blog https://mazharhussainatisp.wordpress.com/ Grading Policy Classification

More information

Some Research Problems in Uncertainty Theory

Some Research Problems in Uncertainty Theory Journal of Uncertain Systems Vol.3, No.1, pp.3-10, 2009 Online at: www.jus.org.uk Some Research Problems in Uncertainty Theory aoding Liu Uncertainty Theory Laboratory, Department of Mathematical Sciences

More information

Trading Security with Quality of Experience

Trading Security with Quality of Experience Trading Security with Quality of Experience Alessandro Aldini University of Urbino Carlo Bo, Italy Dagstuhl Seminar 12481, Quantitative Security Analysis Outline 1 Introduction 2 Security vs. performability

More information

Problem of the Month: Fair Games

Problem of the Month: Fair Games Problem of the Month: The Problems of the Month (POM) are used in a variety of ways to promote problem solving and to foster the first standard of mathematical practice from the Common Core State Standards:

More information

A Correlation of. to the. South Carolina Data Analysis and Probability Standards

A Correlation of. to the. South Carolina Data Analysis and Probability Standards A Correlation of to the South Carolina Data Analysis and Probability Standards INTRODUCTION This document demonstrates how Stats in Your World 2012 meets the indicators of the South Carolina Academic Standards

More information

UNIVERSITY OF NAIROBI

UNIVERSITY OF NAIROBI UNIVERSITY OF NAIROBI MASTERS IN PROJECT PLANNING AND MANAGEMENT NAME: SARU CAROLYNN ELIZABETH REGISTRATION NO: L50/61646/2013 COURSE CODE: LDP 603 COURSE TITLE: RESEARCH METHODS LECTURER: GAKUU CHRISTOPHER

More information

Covariance and Correlation

Covariance and Correlation Covariance and Correlation ( c Robert J. Serfling Not for reproduction or distribution) We have seen how to summarize a data-based relative frequency distribution by measures of location and spread, such

More information

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS INTRODUCTION TO STATISTICS MATH 2050

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS INTRODUCTION TO STATISTICS MATH 2050 PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS INTRODUCTION TO STATISTICS MATH 2050 Class Hours: 2.0 Credit Hours: 3.0 Laboratory Hours: 2.0 Date Revised: Fall 2013 Catalog Course Description: Descriptive

More information

A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks

A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks HoonJae Lee 1, ManKi Ahn 2, SeonGan Lim 3, and SangJae Moon 4 1 Dongseo University, Busan, 617-716, Korea hjlee@dongseo.ac.kr

More information

Adaptive Online Gradient Descent

Adaptive Online Gradient Descent Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650

More information