A proposal for: Functionality classes for random number generators 1

Size: px
Start display at page:

Download "A proposal for: Functionality classes for random number generators 1"

Transcription

1 Wolfgag Killma T-Systems GEI GmbH, Bo Werer Schidler Budesamt für Sicherheit i der Iformatiostechik (BSI), Bo A proposal for: Fuctioality classes for radom umber geerators Versio.0 8 September 0 The authors wish to express their thaks for the umerous commets, suggestios ad otes that have bee icorporated ito this documet. 8 September 0 AIS 0 / AIS 3 page

2 Table of cotets. Itroductio Motivatio Abbreviatios Commo Criteria (Abbreviatios) Termiology Symbols Basic Cocepts Radomess Cocept of Radomess ad Radom Experimets Radom umber geerators (RNGs) Radom Numbers i IT Security Usage of Radom Numbers i IT Security Basic cosideratios for RNG types Desig Descriptio of RNG Mathematical Backgroud Radom variables Etropy ad Guess Work Radom mappigs Stochastics ad Statistical Aalysis of Physical RNGs Stochastic model Overview of Statistical Tests Stadard Statistical Tests Test procedures Additioal Statistical Tests Security Fuctioal Requiremets - Family FCS_RNG Defiitio of FCS_RNG Security capabilities of RNG types Ratioale for defiitio of the exteded compoet Pre-defied RNG Classes Overview of pre-defied RNG classes Geeral Remarks (Exemplary applicatios, side-chael attacks, fault attacks) Class PTG Security fuctioal requiremets for the RNG class PTG September 0 AIS 0 / AIS 3 page

3 4.3.. Applicatio otes Class PTG Security fuctioal requiremets for the RNG class PTG Applicatio otes Further aspects Class PTG Security fuctioal requiremets for the RNG class PTG Applicatio otes Further aspects Class DRG Security fuctioal requiremets for the RNG class DRG Applicatio otes Further aspects Class DRG Security fuctioal requiremets for the RNG class DRG Applicatio otes Further aspects Class DRG Security fuctioal requiremets for the RNG class DRG Applicatio otes Further aspects Class DRG Security fuctioal requiremets for the RNG class DRG Applicatio otes Further aspects Class NTG Security fuctioal requiremets for the NPTRNG class NTG Applicatio otes Examples Guesswork for biomial distributed data Cotigecy tables Forward ad backward secrecy Examples of post-processig algorithms Vo Neuma ubiasig Xorig of o-overlappig segmets of idepedet bits September 0 AIS 0 / AIS 3 page 3

4 Two sources Uiformly distributed iput data for radom mappigs Examples of olie test, tot test, ad start-up test A olie test of the iteral radom umbers A straightforward olie test A more sophisticated olie test procedure Examples of RNG desigs PTRNG with two oisy diodes Examples of DRNGs NPTRNG Literature September 0 AIS 0 / AIS 3 page 4

5 Tables Table : Attack potetial, guessig probability ad security bits... Table : Attack potetial ad guessig passwords... Table 3: Statistics of radom mappigs Table 4: Statistics of radom permutatios Table 5: Brief overview of error types of statistical tests Table 6: Typical values of χ -distributio with degree of freedom Table 7: Typical values of χ -distributio with degree of freedom d Table 8: Typical values of χ -distributio for rus Table 9: Typical values of Normal (Gaussia) N(0,) for a two-sided test of autocorrelatio Table 0: Parameters for etropy test Table : Recommeded parameter settigs for the NIST test suite Table : Attack potetial, Mi-etropy, ad recommeded legth of the iteral state Table 3: Requiremets for the parameters i (DRG..3) depedig o claimed attack potetial Table 4: Work factor ad work factor defect for uiform mappigs with equidistributed iput... Table 5: Probability for a oise alarm withi a test suite ad the expected umber of oise alarms per year for differet distributios of the das-radom umbers September 0 AIS 0 / AIS 3 page 5

6 Figures Figure : Mi-etropy, collisio-etropy ad Shao-etropy for biary-valued radom variables Figure : Cotigecy table for couts of cosecutive bits strigs Figure 3: Example of PTRNGs that belog to the pre-defied classes PTG. ad PTG Figure 4: Example of a PTG.3 ad NTG. that belogs to the pre-defied class PTG.3 ad NTG Figure 5: Examples of DRNGs that belog to the pre-defied classes DRG. ad DRG Figure 6: Examples of DRNGs that belog to the pre-defied classes DRG.3 ad DRG Figure 7: Probabilities of vectors of legth = Figure 8: Success probability (p = 0.55, = 0) Figure 9: Basic desig of RNG with oisy diodes... 7 Figure 0: Variat of the basic desig of RNG with oisy diodes... 7 Figure : Examples of self-protectio i PTRNG based o oise diodes... 0 Figure : RGB Fuctioal model defied i [NIST800-90]... Figure 3: Fuctioal desig of the Liux NPTRNG September 0 AIS 0 / AIS 3 page 6

7 . Itroductio.. Motivatio Radom Number Geerators (RNG) are icorporated i may IT products ad play a importat role i umerous cryptographic applicatios. However, the Iformatio Techology Security Evaluatio Criteria (ITSEC) ad the Commo Criteria (CC) do ot specify ay uiform evaluatio criteria for RNG, or do their correspodig evaluatio methodologies (Iformatio Techology Security Evaluatio Maual [ITSEM]) ad Commo Evaluatio Methodology [CEM]) specify such criteria. The documet is iteded for use by developers, evaluators ad certifiers. 3 Chapter itroduces this field, addresses basic cocepts, ad explais foudatios that support the uderstadig of the remaiig parts of this documet. Chapter 3 defies a CC family FCS_RNG ad the exteded compoet FCS_RNG. for descriptio of security fuctioal requiremets i protectio profiles or security targets. Chapter 4 describes pre-defied classes for physical true, o-physical true, determiistic ad hybrid radom umber geerators. It sketches RNG specific iformatio ad evidece the developer is expected to provide for the assurace compoets selected i the ST. The basic cocepts ad evaluatio criteria are illustrated by additioal examples i chapter 5. 4 All software tools refereced i the followig paragraphs are freeware. The statistical calculatios may be performed usig: - The BSI test suite for statistical test procedures A ad B, which is available o the BSI website [AIS03Stat]. - The NIST test suite ad guidace documetatio [SP800-], which is available o the NIST RNG project website describig the implemeted tests - The statistics program R, which is available o the website There are several books (e.g., [SaHe06], [Prus06], [Ligg07]) describig statistical methods together with R scripts implemetig these methods. 5 This documet updates the previous documets [AIS0A] ad [AIS3A] used as the evaluatio methodology for RNG i the Germa CC scheme. The families described i parts ad 3 relate to the RNG classes described i [AIS0A] ad [AIS3A] as follows (coarse comparisos): RNG class PTG. Comparable to [AIS0] or [AIS3] class AIS3, P Commets Physical RNG with iteral tests that detect a total failure of the etropy source ad o-tolerable statistical defects of the iteral radom umbers PTG. AIS3, P PTG., additioally a stochastic model of the etropy source ad statistical tests of the radom raw 8 September 0 AIS 0 / AIS 3 page 7

8 RNG class PTG.3 DRG. DRG. Comparable to [AIS0] or [AIS3] class No couterpart AIS0, K, partly K3 AIS0, K3 Commets umbers (istead of the iteral radom umbers) PTG., additioally with cryptographic postprocessig (hybrid PTRNG) DRNG with forward secrecy accordig to [ISO803] DRG. with additioal backward secrecy accordig to [ISO803] DRG.3 AIS0, K4 DRG. with additioal ehaced backward secrecy DRG.4 No couterpart DRG.3 with additioal ehaced forward secrecy (hybrid DRNG) NTG. No couterpart No-physical true RNG with etropy estimatio.. Abbreviatios 6 I this documet we use the followig abbreviatios: RNG radom umber geerator DRNG determiistic RNG TRNG true RNG PTRNG physical true RNG (short: physical RNG) NPTRNG o-physical true RNG das digitized aalog oise sigal iid idepedet ad idetically distributed pp. pages iff if ad oly if {x,y, } A list x,y, of idices, e.g., ADV_FSP.{,} stads for ADV_FSP. ad ADV_FSP..3. Commo Criteria (Abbreviatios) PP ST EAL ADV TOE TSF SFR Protectio Profile Security Target Evaluatio Assurace Level Assurace Developmet Target of Evaluatio TOE Security Fuctioality Security Fuctioal Requiremet To avoid misuderstadig, we do ot apply the straightforward abbreviatio PRNG because this ofte stads for pseudoradom umber geerator. 8 September 0 AIS 0 / AIS 3 page 8

9 .4. Termiology 7 I this documet we use the followig termiology: 8 Backward secrecy The assurace that previous output values caot be determied (i.e., computed or guessed with o-egligible probability) from the curret or future output values. 9 Bit strig A fiite sequece of oes ad zeroes. 0 Biomial distributio Biomial distributio with parameters ad p, P X k p p k k { = } = ( ) k Black box A idealized mechaism that accepts iputs ad produces outputs, which is desiged such that a observer caot see iside the box or determie exactly what is happeig iside that box. Cotrast with a glass box. Cryptographic boudary A explicitly defied cotiuous perimeter that establishes the physical bouds of a cryptographic module ad cotais all the hardware, software ad/or firmware compoets of a cryptographic module. [ISO/IEC 9790] 3 Cryptographic post-processig A post-processig algorithm that geerates the iteral umbers of a TRNG by meas of a cryptographic mechaism 4 das-radom umber Bit strig that results directly from the digitizatio of aalogue oise sigals (das) i a physical RNG. Das-radom umbers costitute a special case of raw radom umbers. NOTE: Assume, for istace, that a PTRNG uses a Zeer diode. Regular comparisos of the (amplified) voltage (aalogue sigal) with a threshold value provide values 0 ad, which may be iterpreted as das-radom umbers. I cotrast, for rig oscillators o FPGAs it is ot obvious how to defie the aalogue sigal. At least i the true sese of the word it may be problematic to speak of das radom umber i this cotext. NOTE: I [AIS3A] for physical RNGs the term 'das-radom umber' was cosistetly used. Apart from cocrete examples i this documet we use the more geeral term 'raw radom umber' for both physical ad o-physical true RNGs. 5 Determiistic RNG 8 September 0 AIS 0 / AIS 3 page 9

10 A RNG that produces radom umbers by applyig a determiistic algorithm to a radomlyselected seed ad, possibly, o additioal exteral iputs. 6 Digitizatio Derivatio process of raw radom umbers from raw radom sigals, usually performed at discrete poits i time. 7 Edorsed algorithm Cryptographic algorithm edorsed by a certificatio body for certified products; that is, either a) specified i a edorsed stadard, b) adopted i a edorsed stadard ad specified either i a appedix of the edorsed stadard or i a documet refereced by the edorsed stadard, or c) specified i the list of Edorsed security fuctios. 8 Ehaced backward secrecy The assurace that previous output values of a DRNG caot be determied (i.e., computed or guessed with o-egligible probability) from the curret iteral state, or from curret or future output values. NOTE: The kowledge of the curret state of a pure DRNG (with o additioal iput or with publicly kow iput) implies kowledge of the curret ad future output. 9 Ehaced forward secrecy The assurace that subsequet (future) values of a DRNG caot be determied (i.e., computed or guessed with o-egligible probability) from the curret iteral state, or from curret or previous output values. NOTE: The ehaced forward secrecy may be esured by reseedig or refreshig the DRNG iteral state, which may be performed automatically or iitiated o user demad. 0 Etropy A measure of disorder, radomess or variability i a closed system. The etropy of a radom variable X is a mathematical measure of the amout of iformatio gaied by a observatio of X. Etropy source A compoet, device or evet that geerates upredictable output values which, whe captured ad processed i some way, yields discrete values (usually, a bit strig) cotaiig etropy (Examples: electroic circuits, radioactive decay, RAM data of a PC, API fuctios, user iteractios). Etropy sources provide radomess for true ad hybrid radom umber geerators. Exteral radom umbers 8 September 0 AIS 0 / AIS 3 page 0

11 Radom umbers used by a applicatio (usually the cocateatio of output radom umbers) 3. 3 Fiite state machie A mathematical model of a sequetial machie that comprises a fiite set of admissible states, a fiite set of admissible iputs (seed, ad possibly additioal iput or publicly kow iput), a fiite set of admissible outputs, a mappig from the set of iputs ad the sets of states to the set of state trasitios (i.e., state trasitio mappig), ad a mappig from the set of iputs ad the set of states to the set of outputs (i.e., output fuctio). 4 Forward secrecy The assurace that subsequet (future) values caot be determied (i.e., computed or guessed with o-egligible probability) from curret or previous output values. 5 Glass box A idealized mechaism that accepts iputs ad produces outputs. It is desiged such that a observer ca see iside ad determie exactly what is goig o. Cotrast with a black box. 6 Huma etropy source A etropy source that icludes a radom huma compoet (Examples: key strokes, mouse movemet). 7 Hybrid RNG A RNG that applies desig elemets from DRNGs ad PTRNGs; see also hybrid DRNG ad hybrid PTRNG. 8 Hybrid DRNG A DRNG acceptig exteral iput values besides the seed; i.e., a hybrid DRNG uses a additioal etropy source. Idetical output sequeces demad idetical seeds ad idetical exteral iput values. 9 Hybrid PTRNG A PTRNG with a (complex) post-processig algorithm. The goal of (sometimes additioal) cryptographic post-processig with memory is to icrease the computatioal complexity of the output sequece. NOTE: A complex algorithmic post-processig algorithm may be viewed as a additioal security achor for the case whe the etropy per output bit is smaller tha assumed. 30 Ideal RNG A mathematical costruct that geerates idepedet ad uiformly distributed radom umbers. A ideal RNG ca be described by a sequece of idepedet idetically distributed 3 Exteral radom umbers are outside the scope of this documet. 8 September 0 AIS 0 / AIS 3 page

12 radom variables X, t T, that are uiformly distributed o a fiite set Ω ; i our cotext, typically 0, or Ω = 0, c. 3 Iteral radom umbers For DRNGs: values of the output fuctio; for PTRNGs: radom umbers after post-processig. The iteral umbers are iteded to be output upo request by a user. 3 Kerckhoffs box A idealized cryptosystem where the desig ad public keys are kow to a adversary, but i which there are secret keys ad/or other private iformatio that is ot kow to a adversary. A Kerckhoffs box lies betwee a black box ad a glass box i terms of the kowledge of a adversary. 33 Kow-aswer test A method of testig the correctess of a determiistic mechaism by checkig whether for give iput, the mechaism outputs the correct (kow) value. 34 Noise alarm Cosequece of a applicatio of a olie test that suggests (e.g., due to a failure of a statistical test) that the quality of the geerated radom umbers is ot sufficietly good. 35 Noise source Special type of etropy source that cosists of dedicated hardware (e.g., a electroic circuit) used by PTRNGs. 36 No-physical true RNG A true RNG whose etropy source is ot dedicated hardware but e.g., provides system data (RAM data or system time of a PC, output of API fuctios etc.) or huma iteractio (key strokes, mouse movemet, etc.). 37 Normal (Gaussia) distributio Normal (Gaussia) distributio with mea µ ad variace σ, is defied by u X µ e P x = du. σ π 38 Oe-way fuctio A fuctio with the property that it is easy to compute the output for a give iput but it is computatioally ifeasible to fid for a give output a iput, which maps to this output. [ISO/IEC 770-3]. 39 Olie test t Ω = { } { } x / 8 September 0 AIS 0 / AIS 3 page

13 A quality check of the geerated radom umbers while a PTRNG is i operatio; usually realized by physical measuremets, by a statistical test, or by a test procedure that applies several statistical tests. 40 Pure DRNG A DRNG that does ot accept ay exteral iput apart from the seed. Idetical seed values result i idetical output sequeces (radom umbers). 4 Physical true RNG (PTRNG) A RNG where dedicated hardware serves as a etropy source. NOTE: we use the short term physical RNG for physical true RNG as well because all physical RNG are true RNG by defiitio. We use the abbreviatio PTRNG istead of PRNG to avoid cofusio with pseudoradom geerators. 4 Poisso distributio Poisso distributio, where λ is the mea umber of evets per time iterval e for k = 0,,, K P( X = k) = k! 0 else 43 Post-processig (algorithm) Trasformatio of raw radom umbers that have bee derived from the etropy source ito the iteral radom umbers 44 Pure PTRNG A PTRNG without (complex) post-processig. A total failure of a pure PTRNG etropy source typically results i costat output or periodic patters if o post-processig algorithm is implemeted, or i outputs of a weak DRNG if a simple mathematical (o-cryptographic) post-processig algorithm is implemeted. 45 P-value k λ λ The p-value quatifies the probability that the test values are at least as extreme as the particular value, which has just bee observed (tail probability) if the ull hypothesis is true. If this p- value is smaller tha a pre-defied boud, the statisticia rejects the ull hypothesis. NOTE: Alteratively, a particular sigificace level α may be defied before the sample is draw. 46 Radom umber geerator (RNG) A group of compoets or a algorithm that outputs sequeces of discrete values (usually represeted as bit strigs). 47 Radom variable 8 September 0 AIS 0 / AIS 3 page 3

14 Mathematical costructio that quatifies radomess. A real-valued radom variable is a fuctio that assigs to each outcome i the sample space Ω a value of R, i.e., X : Ω R. More precisely, there exist σ-algebras σ Ω of Ω ad σr of R for which X is a ( σ Ω, σ R ) - measurable fuctio, i.e., for each r σ R holds X ( r) σ. 48 Raw radom umber Raw radom umbers are derived at discrete poits i time from raw radom sigals that are geerated by the etropy source of a PTRNG or NPTRNG. Raw radom umbers have ot bee post-processed. Raw radom umbers assume discrete values. NOTE: For particular types of TRNGs it may ot be uique, which discrete values (ormally bits or bit strigs) are iterpreted as the raw radom umbers. The defiitio of the raw radom umbers may ifluece their distributio. Of course, for the chose defiitio the raw radom umbers must fulfil the requiremets that are specified i the respective fuctioality class. Ω NOTE: For may types of physical RNGs raw radom umbers are computed from aalogue sigals that are geerated by the etropy source, motivatig the otio of das ('digitized aalogue sigal') radom umbers. Examples are PTRNGs that are based o oisy diodes or oscillators. For PTRNGs that are based o rig oscillators o a FPGA, for istace, the term 'aalogue sigal' is less adequate (cf. the first ote to das radom umbers). 49 Raw radom umber sequece Sequece of discrete radom values that have directly bee derived by digitizatio from the output of the etropy source; sequece of raw radom umbers. 50 Raw radom sigal Radomly chagig sigal that is provided by a etropy source of a PTRNG, which is used to geerate raw radom umbers. NOTE: I physical experimets ad for electroic circuits raw radom sigals are ofte timecotiuous ad assume values i cotiuous rages. For a PTRNG o a FPGA that exploits a rig oscillator the curret state of the iverter chai with time jitter might be iterpreted as a raw radom sigal. 5 Realizatio (of a radom variable) Value assumed by a radom variable. 5 Refreshig Use of fresh etropy provided by a iteral or exteral source of radomess i the state trasitio fuctio of a hybrid RNG (covers both reseedig ad seed-update). 8 September 0 AIS 0 / AIS 3 page 4

15 53 Reseedig 54 Seed Re-iitializatio of the iteral state of a RNG (typically, a DRNG), depedig o exteral iput (ew seed value), but disregardig the curret value of the iteral state. Value used to iitialize the iteral state of a RNG. 55 Seedig procedure Procedure for iitializatio, re-iitializatio ad refreshig of the iteral state of a DRNG as described i the guidace documetatio. 56 Secret parameter A iput value (optioal) to the RNG durig iitializatio. 57 Seed life The period betwee the iitializatio of the iteral state of a RNG (typically, of a DRNG) with a seed value util reseedig / seed-updatig the iteral state with the ext seed value. 58 Seed-update Reewal of the iteral state of a RNG (typically, a DRNG) by cosiderig both the curret iteral state ad exteral iput data. 59 Sigal 60 State Physical carrier of iformatio. A state is defied as a istatiatio of a radom umber geerator or ay part thereof with respect to time ad circumstace. 6 Statioary process The sequece of radom variables X, X,... is called statioary if for all positive itegers ad t, ad arbitrary (measurable) sets A the followig equality holds Pr{ X A,..., X A } = Pr{ X A,..., X A }. 6 Stochastic model k k t+ t+ k k j A stochastic model is a mathematical descriptio (of relevat properties) of a TRNG usig radom variables, i.e., a model of the reality uder certai coditios ad limitatios. A stochastic model used for TRNG aalysis shall support the estimatio of the etropy of the raw radom umbers ad fially of the iteral radom umbers. Moreover, it should allow to uderstad the factors that may affect the etropy. 8 September 0 AIS 0 / AIS 3 page 5

16 63 Thermal oise Iheret productio of spurious electroic sigals (also kow as white oise) withi a electroic compoet (e.g., a operatioal amplifier, a reversed biased diode, or a resistor) 4, ot desirable for typical applicatios 64 Total breakdow of a etropy source The etropy of the future raw radom umbers equals 0. Note: Depedig o the cocrete RNG desig, a total breakdow of the etropy source may result i costat or short-period sequeces of raw radom umbers. 65 Total failure test of a oise source The total failure test of the radom oise source detects a total breakdow of radom oise source. 66 True RNG A device or mechaism for which the output values deped o some upredictable source (oise source, etropy source) that produces etropy. Note: The class of TRNGs splits ito two subclasses (PTRNGs ad NPTRNGs). 67 Uiform distributio A radom variable X that assumes values o a fiite set M is said to have uiform distributio (or equivaletly: X is uiformly distributed) o M if Pr X = m = M for each m M..5. Symbols 68 I this documet we use the followig symbols: { } A Pr{ X = x} Pr{ x} B (, p) B Oe-way fuctio of A to B Probability that the radom variable X assumes the value x Probability of the value x (short otatio if it is clear which radom variable is cocered) Biomial distributio with parameters ad p N ( µ, σ ) Normal (Gaussia) distributio with mea µ ad variace σ 4 Typically, i electroic circuits a cocetrated effort is exerted to miimize these pheomea. However, this exact pheomeo ca be take advatage of i the productio of radom bit streams as it results i some upredictable behaviour ad, therefore, may be used as a etropy source. 8 September 0 AIS 0 / AIS 3 page 6

17 P o ( λ ) Poisso distributio, where λ is the mea of evets per time iterval Additio i GF(), 0 0 = 0, 0 =, 0 =, = 0 X Cocateatio of two strigs X ad Y. The strigs X ad Y are either both bit strigs, or both byte strigs. Ceilig: the smallest iteger greater tha or equal to X, X = mi N X X Floor: the largest iteger less tha or equal to X, X = max{ N X} () () N Y X X π w ( x) { } For a fiite set X the otatio X deotes its cardiality. If X is a strig deotes its legth. Symmetric group over the set S, i.e., the group of all permutatios over S with compositio as group operatio. Symmetric semi-group over the set S, i.e., the semi-group of all ijective (ot ecessarily surjective) mappigs with compositio as semi-group operatio. The projectio of a vector x = ( x, x, K, x ) oto the coordiates { w } w = i, i, K, i,. That is, π ( x) = ( x, x, K, x ). Set of atural umbers 0 w i i i w X R Set of real umbers Set of itegers, {,..., } 8 September 0 AIS 0 / AIS 3 page 7

18 . Basic Cocepts 69 This chapter explais basic mathematical cocepts that are applied i the security aalysis of RNGs. At first, we describe the cocept of radomess, which is the core for ay RNG. For true radom sequeces, this refers to the etropy source; ad for pseudo-radom sequeces, to the seed. Probability theory describes ad aalyzes radomess by meas of abstract mathematical objects, modellig radomess by radom variables ad radom processes. Statistics liks these abstract mathematical models with real-world RNGs by experimets. These experimets may be used to estimate parameters that describe the models or to test hypotheses deduced from the models... Radomess 70 Subsectio.. provides a ituitive otio of radomess, which will be made precise i a mathematical sese i sectio Cocept of Radomess ad Radom Experimets 7 The core of ay o-determiistic (true) radom umber geerator (TRNG) is the etropy source that, loosely speakig, geerates radomess. 7 A experimet is called upredictable if the observable outcome of the experimet is (to a certai extet) ukow before it is coducted. After the experimet has bee performed, the degree of ucertaity depeds o the ability to observe the outcome. I this documet we deote the outcome of a experimet as radom if it is upredictable, i.e., if it caot be predicted with certaity. Etropy quatifies the amout of upredictability relative to the observer. 73 Experimets are called idepedet if the outcomes of previous experimets do ot ifluece the outcome of the curret experimet. 74 A radom experimet is called ubiased, if each admissible outcome has the same chace of occurrig. 75 Ideal radom experimets are upredictable, idepedet ad ubiased (ideal radomess). Ideal radomess excludes order ad regularity i the sequece of outcomes of repeated experimets uless these occur by chace. Ay deviatio from these properties, i.e., depedecy or bias, makes the experimet less radom. 76 The goal of ay true RNG is clearly to geerate ideal radom umbers. However, real-world RNGs ca oly achieve this goal approximately. The key poit of ay RNG evaluatio is to verify to what extet the TOE guaratees fulfillmet of this goal. 77 How ca we determie to what extet a experimet is radom (bias, depedecies)? Assume that a attacker kows the outcomes of may previous experimets. Why should he ot be able to guess future outcomes? It is meaigless to argue about radomess o the basis of a sigle ru of a experimet or o the basis of a small umber of experimets. The radomess of a experimet ca oly be observed asymptotically. A statistical test that applies a computable fuctio tests the hypothesis of whether the sequece of outcomes is typical i some sese. Ideal radom sequeces belog to ay (before the observatio of the experimets) reasoably defied majority of sequeces with overwhelmig probability, ot showig ay regularity 8 September 0 AIS 0 / AIS 3 page 8

19 patters that ca be detected by this statistical test 5. Ay fiite collectio of statistical tests ca oly check for fiitely may types of regularity. A statistical test may ot cotradict or it may reject the radomess hypothesis uder specific assumptios, but this caot serve as a proof for the radomess of a arbitrary experimet. Testig the radomess of RNG output sequeces is computatioally hard uder black box assumptios. Hece, it is importat to uderstad the ature of the radom source to rate the radomess of umber geeratio.... Radom umber geerators (RNGs) 78 Geerally, a RNG cosists of a o-determiistic part (etropy source) that geerates opredictable digital data, ad a determiistic part that geerates from this data the output sequece of the RNG (radom umbers). The o-determiistic part of the RNG exploits a physical etropy source or ay other kid of o-physical etropy source to geerate a raw radom umber sequece, which is determiistically post-processed. Either the determiistic part or the o-determiistic part may be omitted, givig a pure PTRNG or a pure DRNG, respectively. PTRNG 79 The core of ay physical RNG (PTRNG) is the etropy source, which is used to geerate the raw radom umbers. By exploitig a aalogue sigal, a digitizatio mechaism geerates a sequece of digital raw data (raw radom umbers; usually das-radom umbers). Additioally, the PTRNG may comprise a post-processig algorithm that trasforms the raw data to iteral radom umbers. Note that formally a missig post-processig algorithm ca be iterpreted as the idetity mappig. 80 Physical etropy sources are based o physical microscopic radom processes. Measuremets of these processes result i digital radom umbers. Examples of time-discrete physical etropy sources are: - Radioactive atomic disitegratio: The umber of decay evets (detected particles) per time iterval follows a Poisso distributio (cf. [Neue04], sectio 4.). - Shot etropy of a diode: The shot etropy of a parallel-plae temperature-limited diode is o-determiistic. The umber of electros emitted from the tube s cathode durig a time iterval follows a Poisso distributio (cf. [DaR087], sectio 7-). The Poisso distributio implies that the iter-occurrece waitig time betwee cosecutive evets is expoetially distributed. 8 A large umber of discrete radom evets like e.g. emitted electros may be observed as aalogue etropy sigal. Examples of aalogue physical etropy sources are (cf. [BuLu08] for examples): - Thermal resistive etropy: The voltage betwee resistors varies radomly due to vibratio of atoms. Ideally, the thermal etropy sigal has the same eergy i all 5 cf. to Chaiti s defiitio of radom strigs ad Marti-Löf tests i e.g. [Cal]. 8 September 0 AIS 0 / AIS 3 page 9

20 frequecy bads (so called white etropy ). Samplig a ideally-amplified white etropy sigal geerates a sequece of idepedet bits. - Diode breakdow etropy: The reverse curret through diodes varies radomly due to tuellig of electros. The power of the etropy sigal is iversely proportioal to the frequecy. - Free ruig oscillators geerate digital sigals with a edge-to-edge radom aalogue time drift (jitter). Samplig a fast oscillator by a lower frequecy oscillator geerates a radom bit sigal. If the stadard deviatio of the slow oscillator is cosiderably greater tha the fast period, the sampled bit sequece may be expected to be ucorrelated. 8 A typical goal of algorithmic post-processig may be to extract etropy from the das-radom umbers sequece i order to icrease the etropy per bit, e.g., to correct a give bias. Note that icreasig the etropy per bit demads data compressio, reducig the output rate. A cryptographic post-processig algorithm may be viewed as a additioal security achor. NPTRNG 83 A o-physical true RNG (NPTRNG) uses exteral sigals as etropy source to geerate radom umbers for output. 84 Examples of such exteral etropy sources are: - Processes as disk I/O operatios ad iterrupts (cf. e.g. Liux RNG /dev/radom [GuPR06]). - System data as tick couter sice system boot, process ad thread IDs, curret local time (cf. e. g., fuctio CryptGeRadom of Microsoft Widows CE Ehaced Cryptographic Provider [MSCE06]). - Huma iteractio as mouse movemet ad key strokes (cf. PGP key geeratio [PGP]). 85 The NPTRNG are based o the cocept of radomess as lack of iformatio about processes ad their outcomes. If a huge amout of data from differet sources are collected ad mapped oto a shorter sequece (e.g., by a hash fuctio), the output value will appear radom to a observer who either kows the source data or is able to cotrol them. DRNG 86 A determiistic RNG (DRNG) geerates radom umbers with a determiistic algorithm ad starts with a radomly selected seed. The output sequece depeds o the seed ad possibly also o additioal exteral iput values. 87 Examples: - Determiistic radom bit geerators based o hash fuctios, as described i [ISO803], Aex C. - NIST-recommeded DRNG based o hash fuctios or block ciphers [NIST800-90]. 8 September 0 AIS 0 / AIS 3 page 0

21 88 A DRNG may be viewed as a fiite automato that receives iput (seed ad possibly also additioal exteral iput). The DRNG updates the iteral state (possibly also cosiderig additioal iput) ad geerates output that depeds o the curret iteral state ad possibly o additioal iput. The DRNG (or more geerally, the determiistic part of a RNG) may gai etropy from the seed ad possibly from additioal iput durig the operatioal work (reseedig or refreshig). The seed ad the additioal iput may be provided by differet sources. 89 A DRNG may be based o the cocept of complexity-theoretic radomess (cf. e.g. [Calu0] for details). The sequeces geerated by a DRNG the shall be computatioally idistiguishable from radom sequeces geerated by computatioal power. Hybrid RNG 90 A hybrid RNG combies the desig priciples of true ad determiistic RNGs, i particular, it cosists of a etropy source ad a determiistic part. The etropy source of a hybrid PTRNG should provide at least as much etropy as the output radom umbers might at most cotai 6. Loosely speakig, this meas that the etropy source must geerate at least so much etropy that a perfect post-processig algorithm might geerate a ideal output sequece. A hybrid DRNG usually gets (cosiderably) less etropy from the etropy source by reseedig (or refreshig) tha the legth of its output measured i bits. Roughly speakig, the security of hybrid PTRNGs relies o both the etropy of the output sequeces ad the computatioal complexity, while the security of hybrid DRNGs essetially relies o computatioal complexity... Radom Numbers i IT Security... Usage of Radom Numbers i IT Security 9 May security mechaisms eed secrets, e.g., cryptographic keys or autheticatio data. Upredictable radom umbers are ideal secrets for IT security applicatios. The use of RNGs as a security mechaism results i requiremets o the radom umbers, or more specifically, o their geeratio. 9 I the termiology of the Commo Criteria, RNGs are probabilistic mechaisms. The vulerability aalysis assesses the stregth of permutatioal or probabilistic mechaisms ad other mechaisms to esure that they ca withstad direct attacks (cf. [CEM], sectio B...3, ad chapter 5.7 of this documet for details). 93 Guessig a secret by (i) selectig a admissible value; ad (ii) checkig whether it is correct, is typical for direct attacks. To icrease the success probability, it may be reasoable to formulate ad aalyze a stochastic model that cosiders how the secret has bee geerated, i.e., the probability distributio of the admissible values, e.g., a set of passwords or a key space. The ability to verify guesses depeds o the availability of suitable referece data ad o the workload of the checkig procedure. A cryptographic key may be guessed idepedet of the TOE. If the attacker kows the cryptographic algorithm ad sufficietly may plai text / cipher text pairs, the key ca be searched for by meas of massive parallel high-speed computatios without ay cryptaalysis. Passwords may be foud out by trial ad error, but the password mechaism may limit the umber of autheticatio attempts i time (e.g., if huma user iput is assumed) ad the total umber of guesses (e.g., by requiremet of the compoet FIA_AFL., cf. [CCV3_] for details). From the attacker s poit of view, the situatio is clearly much more 6 Cf. paragraph 9 o page 8 for details. 8 September 0 AIS 0 / AIS 3 page

22 comfortable if he kows some referece strig that has bee calculated from the correct password, which allows automatic search. 94 Table describes the lik betwee the maximum success probability of a sigle guess of a cryptographic key, the umber of security bits, ad the assumed attack potetial accordig to the CC. Table : Attack potetial, guessig probability ad security bits Compoet of the vulerability aalysis Commo Criteria Versio.3 Commo Criteria Versio 3. AVA_VAN.{, } (basic) Success probability of a sigle guess ε Security bits 0 40 security bits AVA_SOF., low AVA_VLA. (low) AVA_VAN.3 (ehaced basic) ε security bits AVA_SOF., medium AVA_VLA.3 (moderate) AVA_VAN.4 (moderate) ε security bits AVA_SOF., high AVA_VLA.4 (high) AVA_VAN.5 (high) ε security bits 95 As a geeral rule, the guessig probability for passwords must ot exceed the upper bouds give i Table, which deped o the assumed attack potetial that is claimed i the security target. If a probabilistic or permutatioal mechaism relies o etry of data by a huma user (e.g., the choice of a password), the worst case should be cosidered. 96 Table describes the lik betwee maximum guessig probability ε for passwords ad the assumed attack potetial accordig to the CC. Table : Attack potetial ad guessig passwords Compoet of the vulerability aalysis Commo Criteria Versio.3 Commo Criteria Versio 3. Success probability of a sigle guess Success probability with blockig after 3 failed attempts Recommeded AVA_VAN.{,} (basic) ε 0 4 ε ε 0 5 AVA_SOF., low AVA_VLA. (low) AVA_VAN.3 (ehaced basic) ε 0 4 ε ε September 0 AIS 0 / AIS 3 page

23 Compoet of the vulerability aalysis Commo Criteria Versio.3 Commo Criteria Versio 3. Success probability of a sigle guess Success probability with blockig after 3 failed attempts Recommeded AVA_VAN.{,} (basic) ε 0 4 ε ε 0 5 AVA_SOF., medium AVA_VLA.3 (moderate) AVA_VAN.4 (moderate) ε 0 5 ε ε 0 7 AVA_SOF., high AVA_VLA.4 (high) AVA_VAN.5 (high) ε 0 6 ε ε Basic cosideratios for RNG types 97 For a reasoably desiged RNG, the geerated radom umbers should be mutually distict if the radom umbers are sufficietly log. 98 R: (statistical ucospiciousess) The applicatio of statistical (stadard) black box tests or test suites does ot distiguish the geerated radom umbers from realizatios of uiformly distributed idepedet radom variables. A more challegig formulatio of this requiremet says that statistical tests caot distiguish betwee radom umbers ad realizatios of ideal sequeces. (Of course, ufair tests, e.g., referrig the actual seed value of a DRNG, have to be excluded ayway.) 99 R (backward ad forward security): It must (at least practically) be impossible to determie predecessors or successors of kow sub-sequeces of output radom umbers. The guessig probability shall be at most egligibly greater tha without the kowledge of the sub-sequece. 00 R3 (ehaced backward security): Eve if a adversary kows the curret iteral state of the RNG, the publicly kow iputs (if ay exist), ad the curret ad future radom umbers, she shall (at least practically) ot be able to determie precedig radom umbers; that is, she shall be able to guess these radom umbers oly with a egligibly greater probability tha without this kowledge. Note that the (weaker) backward security demads that previous radom umbers caot be determied from the curret ad future radom umbers. The kowledge of curret or future output radom umbers may be relevat for physical RNG with iteral memory (used for the post-processig algorithm). For a pure DRNG, the iteral state ad all the publicly kow iputs determie the curret ad the future radom umbers. 0 R4 (ehaced forward security): Eve if a adversary kows the iteral state of the RNG, all the publicly kow iputs ad a sequece of precedig radom umbers, she shall (at least practically) ot be able to determie the ext radom umber; that is, she shall ot be able to guess this radom umber with o-egligibly greater probability tha without this kowledge. 8 September 0 AIS 0 / AIS 3 page 3

24 Note that the (weaker) forward security requires that future radom umbers caot be determied from the curret ad previous output values. Pure DRNG may fulfil forward secrecy if the iteral state caot be determied from the kowledge of the curret ad the previous output values (radom umbers). Forward secrecy uder the additioal coditio that the curret iteral state is compromised (ehaced forward security) caot be achieved by pure DRNGs. Ehaced forward security may be achieved by hybrid DRNGs if the iteral state is permaetly reseeded (or is updated) with data that was geerated by a strog etropy source. 0 Requiremet R is usually verified by a fixed set of statistical black box tests ad possibly by some additioal statistical tests that are tailored to the cocrete RNG. For true RNGs without a history-depedet iteral state, Requiremet R is essetially equivalet to the combiatio of Requiremet R3 ad Requiremet R4. 03 Requiremet R4 caot be fulfilled by pure DRNGs, sice the iteral state clearly determies all subsequet radom umbers. Forward secrecy requires sufficiet refreshig or reseedig of the iteral state. 04 Requiremet R3 may be dropped for devices that are assumed to be secure agaist all kids of attacks that could discover (parts of) the iteral state or for devices that are operated i a secure eviromet. Requiremet R4 may be relevat if it caot be excluded that a adversary has uoticed access to the device ad is able to discover the iteral state of the device...3. Desig Descriptio of RNG Overview 05 The descriptio of the RNG desig i geeral comprises () the etropy source of the o-determiistic part, () the digitizatio of the raw radom sigal provided by the etropy source, (3) ay post-processig of the raw radom umber sequece producig the iteral radom umbers, (4) the determiistic part of the RNG i terms of the iteral state, the state trasitio fuctio ϕ, ad the output fuctio ψ, (5) the seedig, refreshig (or reseedig) mechaism of the determiistic part of the RNG, ad (6) ay secrets ad publicly kow iput of the determiistic part of the RNG (iclusively, the geeratio process ad how it is used). Depedig o the RNG desig, some of these desig elemets come from exteral sources or they may be trivial as discussed below. PTRNG 06 The PTRNG desig is i geeral described by () the iteral etropy source that geerates raw radom sigals, 8 September 0 AIS 0 / AIS 3 page 4

25 () the digitizatio mechaism of the raw radom sigal ito the raw radom umber sequece, (3) ay post-processig of the raw radom umber sequece geeratig the iteral radom umbers 7, secrets ad publicly kow values (if there are ay), ad (4) the olie test(s) (applied to the raw radom umbers or the iteral radom umbers), a tot test (shall detect a total failure of the etropy source), ad a start-up test. 07 The post-processig algorithm may comprise a cryptographic oe-way fuctio to prevet the aalysis of the raw radom umber sequece o the basis of kowledge of the RNG output. A hybrid PTRNG may cotai a DRNG for post-processig. NPTRNG 08 I geeral the desig of a NPTRNG is described by () the exteral etropy sources cotiuously providig digital raw radom sigals as iput to the NPTRNG, () ay secrets ad publicly kow iput values (icludig the geeratio process ad how it is used) if used by the NPTRNG, (3) the pre-processig of the raw radom umber sequece ad publicly kow iput, (4) the determiistic post-processig of the pre-processed iput i terms of the iteral state, the state trasitio fuctio ϕ, ad the output fuctio ψ, ad (5) the self-test, if implemeted. 09 Usually the etropy source of a NPTRNG provides low-etropy sequeces. If directly used for output these sequeces must be compressed. However, i may desigs these sequeces are used to update the iteral state of a DRNG. Usually, the core of the post-processig algorithm is a hash fuctio. For a o-physical true RNG, the average etropy of the raw data must at least equal the output legth of the iteral radom umbers i bits (cf. paragraph for details o hybrid RNG). DRNG 0 I geeral the desig of a DRNG is described by - the seedig procedure that geerates the first iteral state of the DRNG, - the geeratio of the output ad the ext iteral state of the DRNG, ad - the cotrol system for DRNG istatiatio, de-istatiatio, ad limitatio for the amout of radom umbers produced after seedig. The seedig procedure may distiguish betwee 7 Formally, a missig post-processig may be iterpreted as the idetity mappig. 8 September 0 AIS 0 / AIS 3 page 5

26 - the istatiatio of the DRNG geeratig the iitial iteral state usig a etropy iput strig, ad - the reseedig / refreshig of the DRNG geeratig the ext iteral state from the curret iteral state ad (possibly) a exteral iput strig. We describe the determiistic part of a RNG by a 6-tuple ( S, I, R, ϕ, ψ, pa), more precisely: S set of iteral states I iput alphabet R output alphabet s 0 iitial iteral state (derived from the seed) 8 ϕ : S I S (state trasitio fuctio), s : = ϕ( s, i ) () ψ : S I R (output fuctio), r = ψ ( s, i ) () probability distributio of the iitial iteral state s that is derived from the seed 9. For the descriptio of multistep-behaviour of the 6-tuple we derive the exteded trasitio fuctio ϕ * ad exteded output fuctio ψ * over S I *, i* = ( i, K, i ) I * ad k k R* =U R hold k = : ϕ *: S I* S ϕ *( s, i ) = ϕ( ϕ( Kϕ( ϕ( s, i, ), i ) K, ik ), ik ) (3) I* =U k = ψ *: S I* R *, ψ *( s, i*) = ( ψ ( s, i ), ψ ( ψ ( s, i ), i ), K, ψ ( ψ ( Kψ ( ψ ( s, i ), i ) K, ik ), ik ) (4) I k, where for s S ad 3 I some cases oe may require that ϕ or ψ * are oe-way fuctios (i a sese discussed below), i.e. that it is easy to compute the output for a give iput but it is computatioally ifeasible to fid for a give output a iput, which maps to this output. For ϕ directly follows that S I shall be sufficietly large prevetig exhaustive search of appropriate ( s, i ) such that ϕ ( s, i ) = s for a give s, s UU ϕ( s, i). For small R the set R * will cotai short s S i I + pa 0 I may cases, the seed equals the first iteral state. 8 September 0 AIS 0 / AIS 3 page 6

27 output sequeces allowig to guess a appropriate ( s, i*) such that ψ *( s, i*) = r * for a give r *, UU. If we require the exteded output fuctio * r* ϕ( s, i*) s S i* I* ψ beig a oeway fuctio it requires more precisely the oe-way feature for sufficietly log output sequeces r *, i.e. r * > l, where l is big eough that ( s, i*). l R prevets exhaustive search of 4 The 6-tuple is a semiformal 0 descriptio of the determiistic part of the RNG. It is ot ecessarily formal, because it may ot ecessarily allow formal proofs as demaded by formal descriptio laguages. For DRNGs, secrets metioed above may be viewed as part of the seed or the iteral state. 5 The 6-tuple may defie a MEALY machie, where the iitial (startig) iteral state is a radom value derived from a radom variable with distributio p A (this is a extesio of the defiitio e.g., i [HDCM00]). 6 Apart from the seed, a DRNG may get additioal iput data while it is i operatio. Without loss of geerality, we may assume that a exteral etropy source geerates data a,... A : = A { }, where A deotes a fiite set of admissible iput values, ad the a, 0 ο 0 value a = ο is logically equivalet to o iput from a exteral etropy source i step. Aalogously, we assume that b, b,... B : = B0 { ο} deotes a sequece of publicly kow data, where B0 deotes a fiite set of admissible iput values, ad b = ο is logically equivalet to o publicly kow exteral iput i Step. Note: the publicly kow iput does ot provide ay etropy to the RNG, but may affect the iteral state ad the output of the RNG. I particular, we have s : = ϕ ( s, a, b ) ad r = ψ ( s, a, b. We defie i + : ) : = ( a, b ) I : = A B for, where i is the iput to ϕ ad ψ i Step. 7 If a = ο for all, we may simplify the model by eglectig the set A, i.e., we may set I = B. Aalogously, we may set I = A if o publicly kow values are fed ito the DRNG durig its life cycle. 8 A pure DRNG rus without ay exteral iput after seedig, i.e., i = ( ο, ο) for all. The state fuctio ad the output fuctio of the MEALY machie may be simplified to ( S, R, ϕ, ψ, p A ) with ϕ : S S, s : = ϕ ( s ) ad ψ : S, r = ψ ( s ). (5) + R : 0 semiformal meas expressed i a restricted sytax laguage with defied sematics (cf. CC part paragraph 8). formal meas expressed i a restricted sytax laguage with defied sematics based o well-established mathematical cocepts (cf. CC part paragraph 5). 8 September 0 AIS 0 / AIS 3 page 7

28 Hybrid RNG 9 Whether a hybrid RNG is categorized as a hybrid DRNG (which meas that its security essetially is based o computatioal complexity) or as a hybrid PTRNG (which meas that its primary security achor is based o etropy) is ot always clear. It may be difficult or eve ot clear i cocrete cases. Roughly speakig, the classificatio essetially depeds o the relatio betwee the etropy of the seed-update material (that is, the etropy of the reseedig material), ad the maximum etropy the iteral radom umbers may attai, amely lg R, which is provided by ideal RNGs. Let us assume the followig: () The sequece of additioal iputs a, a K, is statioary (or more precisely, the sequece a, a K, is assumed to be geerated by statioary radom variables A, A K, ) ad has Mi-etropy h = H ( a i, K, a i + k ) ; () Withi k cycles, the state trasitio fuctio at most slightly reduces the etropy of the iteral state (If the mappig ϕ : S { i} S is a permutatio over S, for ay fixed i I The etropy of the iteral state is ot reduced, eve if a adversary kows all exteral iput values.); ad (3) ψ is surjective. If k lg R ε, for a small costat ε, the RNG may behave like a hybrid PTRNG sice the o-determiistic part of the RNG provides at least almost as much etropy as the output sequece may have i the best case. Note, however, that this does ot prove that the etropy of the output is ideed close to lg R or equivaletly, the iteral radom umbers are (at least almost) uiformly distributed ad idepedet. This clearly depeds o the cocrete RNG, i.e., o the state trasitio fuctio ad the output fuctio, ad demads a solid proof. I cotrast, if + H ( s ) << k lg R, the odetermiistic RNG part does ot provide sufficiet etropy to esure that the output sequece ca be truly radom: The RNG behaves as a hybrid DRNG..3. Mathematical Backgroud.3.. Radom variables h h i 0 A experimet is ay physically or metally coceivable udertakig that results i a measurable outcome. The sample space is the set Ω of possible outcomes of a experimet. Uless otherwise stated, i this documet we assume the sample space as fiite set. The sample size of a experimet is the umber of possible outcomes of the experimet (= cardiality of the sample space). A evet is a subset of Ω. A probability measure o a fiite sample space Ω is a fuctio Pr from the power set of Ω (= set of subsets of Ω ) ito the iterval [0,] satisfyig k P{ Ω } = (6) We follow the termiology i [HDCM], chapter 7 Discrete Probability. 8 September 0 AIS 0 / AIS 3 page 8

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

5: Introduction to Estimation

5: Introduction to Estimation 5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

Asymptotic Growth of Functions

Asymptotic Growth of Functions CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

Irreducible polynomials with consecutive zero coefficients

Irreducible polynomials with consecutive zero coefficients Irreducible polyomials with cosecutive zero coefficiets Theodoulos Garefalakis Departmet of Mathematics, Uiversity of Crete, 71409 Heraklio, Greece Abstract Let q be a prime power. We cosider the problem

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the

More information

Statistical inference: example 1. Inferential Statistics

Statistical inference: example 1. Inferential Statistics Statistical iferece: example 1 Iferetial Statistics POPULATION SAMPLE A clothig store chai regularly buys from a supplier large quatities of a certai piece of clothig. Each item ca be classified either

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 49-60 A Faster Clause-Shorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

Tradigms of Astundithi and Toyota

Tradigms of Astundithi and Toyota Tradig the radomess - Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

MARTINGALES AND A BASIC APPLICATION

MARTINGALES AND A BASIC APPLICATION MARTINGALES AND A BASIC APPLICATION TURNER SMITH Abstract. This paper will develop the measure-theoretic approach to probability i order to preset the defiitio of martigales. From there we will apply this

More information

PSYCHOLOGICAL STATISTICS

PSYCHOLOGICAL STATISTICS UNIVERSITY OF CALICUT SCHOOL OF DISTANCE EDUCATION B Sc. Cousellig Psychology (0 Adm.) IV SEMESTER COMPLEMENTARY COURSE PSYCHOLOGICAL STATISTICS QUESTION BANK. Iferetial statistics is the brach of statistics

More information

1. C. The formula for the confidence interval for a population mean is: x t, which was

1. C. The formula for the confidence interval for a population mean is: x t, which was s 1. C. The formula for the cofidece iterval for a populatio mea is: x t, which was based o the sample Mea. So, x is guarateed to be i the iterval you form.. D. Use the rule : p-value

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

Universal coding for classes of sources

Universal coding for classes of sources Coexios module: m46228 Uiversal codig for classes of sources Dever Greee This work is produced by The Coexios Project ad licesed uder the Creative Commos Attributio Licese We have discussed several parametric

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

Overview of some probability distributions.

Overview of some probability distributions. Lecture Overview of some probability distributios. I this lecture we will review several commo distributios that will be used ofte throughtout the class. Each distributio is usually described by its probability

More information

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

MTO-MTS Production Systems in Supply Chains

MTO-MTS Production Systems in Supply Chains NSF GRANT #0092854 NSF PROGRAM NAME: MES/OR MTO-MTS Productio Systems i Supply Chais Philip M. Kamisky Uiversity of Califoria, Berkeley Our Kaya Uiversity of Califoria, Berkeley Abstract: Icreasig cost

More information

Chapter 7 - Sampling Distributions. 1 Introduction. What is statistics? It consist of three major areas:

Chapter 7 - Sampling Distributions. 1 Introduction. What is statistics? It consist of three major areas: Chapter 7 - Samplig Distributios 1 Itroductio What is statistics? It cosist of three major areas: Data Collectio: samplig plas ad experimetal desigs Descriptive Statistics: umerical ad graphical summaries

More information

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC 8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical

More information

Research Method (I) --Knowledge on Sampling (Simple Random Sampling)

Research Method (I) --Knowledge on Sampling (Simple Random Sampling) Research Method (I) --Kowledge o Samplig (Simple Radom Samplig) 1. Itroductio to samplig 1.1 Defiitio of samplig Samplig ca be defied as selectig part of the elemets i a populatio. It results i the fact

More information

Notes on exponential generating functions and structures.

Notes on exponential generating functions and structures. Notes o expoetial geeratig fuctios ad structures. 1. The cocept of a structure. Cosider the followig coutig problems: (1) to fid for each the umber of partitios of a -elemet set, (2) to fid for each the

More information

Hypergeometric Distributions

Hypergeometric Distributions 7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

Case Study. Normal and t Distributions. Density Plot. Normal Distributions

Case Study. Normal and t Distributions. Density Plot. Normal Distributions Case Study Normal ad t Distributios Bret Halo ad Bret Larget Departmet of Statistics Uiversity of Wiscosi Madiso October 11 13, 2011 Case Study Body temperature varies withi idividuals over time (it ca

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

MEI Structured Mathematics. Module Summary Sheets. Statistics 2 (Version B: reference to new book)

MEI Structured Mathematics. Module Summary Sheets. Statistics 2 (Version B: reference to new book) MEI Mathematics i Educatio ad Idustry MEI Structured Mathematics Module Summary Sheets Statistics (Versio B: referece to ew book) Topic : The Poisso Distributio Topic : The Normal Distributio Topic 3:

More information

Z-TEST / Z-STATISTIC: used to test hypotheses about. µ when the population standard deviation is unknown

Z-TEST / Z-STATISTIC: used to test hypotheses about. µ when the population standard deviation is unknown Z-TEST / Z-STATISTIC: used to test hypotheses about µ whe the populatio stadard deviatio is kow ad populatio distributio is ormal or sample size is large T-TEST / T-STATISTIC: used to test hypotheses about

More information

Subject CT5 Contingencies Core Technical Syllabus

Subject CT5 Contingencies Core Technical Syllabus Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

THE HEIGHT OF q-binary SEARCH TREES

THE HEIGHT OF q-binary SEARCH TREES THE HEIGHT OF q-binary SEARCH TREES MICHAEL DRMOTA AND HELMUT PRODINGER Abstract. q biary search trees are obtaied from words, equipped with the geometric distributio istead of permutatios. The average

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

Infinite Sequences and Series

Infinite Sequences and Series CHAPTER 4 Ifiite Sequeces ad Series 4.1. Sequeces A sequece is a ifiite ordered list of umbers, for example the sequece of odd positive itegers: 1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29...

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

The Role of Latin Square in Cipher Systems: A Matrix Approach to Model Encryption Modes of Operation

The Role of Latin Square in Cipher Systems: A Matrix Approach to Model Encryption Modes of Operation UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT 030038 1 The Role of Lati Square i Cipher Systems: A atrix Approach to odel cryptio odes of Operatio Jieju og Computer Sciece Departmet Uiversity of Califoria,

More information

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1, Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-1559 Berli,

More information

Quadrat Sampling in Population Ecology

Quadrat Sampling in Population Ecology Quadrat Samplig i Populatio Ecology Backgroud Estimatig the abudace of orgaisms. Ecology is ofte referred to as the "study of distributio ad abudace". This beig true, we would ofte like to kow how may

More information

Inference on Proportion. Chapter 8 Tests of Statistical Hypotheses. Sampling Distribution of Sample Proportion. Confidence Interval

Inference on Proportion. Chapter 8 Tests of Statistical Hypotheses. Sampling Distribution of Sample Proportion. Confidence Interval Chapter 8 Tests of Statistical Hypotheses 8. Tests about Proportios HT - Iferece o Proportio Parameter: Populatio Proportio p (or π) (Percetage of people has o health isurace) x Statistic: Sample Proportio

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

Normal Distribution.

Normal Distribution. Normal Distributio www.icrf.l Normal distributio I probability theory, the ormal or Gaussia distributio, is a cotiuous probability distributio that is ofte used as a first approimatio to describe realvalued

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

A Mathematical Perspective on Gambling

A Mathematical Perspective on Gambling A Mathematical Perspective o Gamblig Molly Maxwell Abstract. This paper presets some basic topics i probability ad statistics, icludig sample spaces, probabilistic evets, expectatios, the biomial ad ormal

More information

Amendments to employer debt Regulations

Amendments to employer debt Regulations March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios

More information

Institute of Actuaries of India Subject CT1 Financial Mathematics

Institute of Actuaries of India Subject CT1 Financial Mathematics Istitute of Actuaries of Idia Subject CT1 Fiacial Mathematics For 2014 Examiatios Subject CT1 Fiacial Mathematics Core Techical Aim The aim of the Fiacial Mathematics subject is to provide a groudig i

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

Present Values, Investment Returns and Discount Rates

Present Values, Investment Returns and Discount Rates Preset Values, Ivestmet Returs ad Discout Rates Dimitry Midli, ASA, MAAA, PhD Presidet CDI Advisors LLC dmidli@cdiadvisors.com May 2, 203 Copyright 20, CDI Advisors LLC The cocept of preset value lies

More information

Entropy of bi-capacities

Entropy of bi-capacities Etropy of bi-capacities Iva Kojadiovic LINA CNRS FRE 2729 Site école polytechique de l uiv. de Nates Rue Christia Pauc 44306 Nates, Frace iva.kojadiovic@uiv-ates.fr Jea-Luc Marichal Applied Mathematics

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

Safety Requirements engineering and Proof of implementation

Safety Requirements engineering and Proof of implementation Presetatio to DVClub commuity October 20 th 2015 Safety Requiremets egieerig ad Proof of implemetatio Test ad Verificatio Solutios Deliverig Tailored Solutios for Hardware Verificatio ad Software Testig

More information

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio

More information

Class Meeting # 16: The Fourier Transform on R n

Class Meeting # 16: The Fourier Transform on R n MATH 18.152 COUSE NOTES - CLASS MEETING # 16 18.152 Itroductio to PDEs, Fall 2011 Professor: Jared Speck Class Meetig # 16: The Fourier Trasform o 1. Itroductio to the Fourier Trasform Earlier i the course,

More information

Chapter 14 Nonparametric Statistics

Chapter 14 Nonparametric Statistics Chapter 14 Noparametric Statistics A.K.A. distributio-free statistics! Does ot deped o the populatio fittig ay particular type of distributio (e.g, ormal). Sice these methods make fewer assumptios, they

More information

Estimating Probability Distributions by Observing Betting Practices

Estimating Probability Distributions by Observing Betting Practices 5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,

More information

THE ABRACADABRA PROBLEM

THE ABRACADABRA PROBLEM THE ABRACADABRA PROBLEM FRANCESCO CARAVENNA Abstract. We preset a detailed solutio of Exercise E0.6 i [Wil9]: i a radom sequece of letters, draw idepedetly ad uiformly from the Eglish alphabet, the expected

More information

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n We will cosider the liear regressio model i matrix form. For simple liear regressio, meaig oe predictor, the model is i = + x i + ε i for i =,,,, This model icludes the assumptio that the ε i s are a sample

More information

3 Basic Definitions of Probability Theory

3 Basic Definitions of Probability Theory 3 Basic Defiitios of Probability Theory 3defprob.tex: Feb 10, 2003 Classical probability Frequecy probability axiomatic probability Historical developemet: Classical Frequecy Axiomatic The Axiomatic defiitio

More information

W. Sandmann, O. Bober University of Bamberg, Germany

W. Sandmann, O. Bober University of Bamberg, Germany STOCHASTIC MODELS FOR INTERMITTENT DEMANDS FORECASTING AND STOCK CONTROL W. Sadma, O. Bober Uiversity of Bamberg, Germay Correspodig author: W. Sadma Uiversity of Bamberg, Dep. Iformatio Systems ad Applied

More information

Overview. Learning Objectives. Point Estimate. Estimation. Estimating the Value of a Parameter Using Confidence Intervals

Overview. Learning Objectives. Point Estimate. Estimation. Estimating the Value of a Parameter Using Confidence Intervals Overview Estimatig the Value of a Parameter Usig Cofidece Itervals We apply the results about the sample mea the problem of estimatio Estimatio is the process of usig sample data estimate the value of

More information

Sampling Distribution And Central Limit Theorem

Sampling Distribution And Central Limit Theorem () Samplig Distributio & Cetral Limit Samplig Distributio Ad Cetral Limit Samplig distributio of the sample mea If we sample a umber of samples (say k samples where k is very large umber) each of size,

More information

Real-Time Computing Without Stable States: A New Framework for Neural Computation Based on Perturbations

Real-Time Computing Without Stable States: A New Framework for Neural Computation Based on Perturbations Real-Time Computig Without Stable States: A New Framework for Neural Computatio Based o Perturbatios Wolfgag aass+, Thomas Natschläger+ & Hery arkram* + Istitute for Theoretical Computer Sciece, Techische

More information

Chapter 5: Inner Product Spaces

Chapter 5: Inner Product Spaces Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples

More information

Measures of Spread and Boxplots Discrete Math, Section 9.4

Measures of Spread and Boxplots Discrete Math, Section 9.4 Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,

More information

GCSE STATISTICS. 4) How to calculate the range: The difference between the biggest number and the smallest number.

GCSE STATISTICS. 4) How to calculate the range: The difference between the biggest number and the smallest number. GCSE STATISTICS You should kow: 1) How to draw a frequecy diagram: e.g. NUMBER TALLY FREQUENCY 1 3 5 ) How to draw a bar chart, a pictogram, ad a pie chart. 3) How to use averages: a) Mea - add up all

More information

This document contains a collection of formulas and constants useful for SPC chart construction. It assumes you are already familiar with SPC.

This document contains a collection of formulas and constants useful for SPC chart construction. It assumes you are already familiar with SPC. SPC Formulas ad Tables 1 This documet cotais a collectio of formulas ad costats useful for SPC chart costructio. It assumes you are already familiar with SPC. Termiology Geerally, a bar draw over a symbol

More information

Chapter 7: Confidence Interval and Sample Size

Chapter 7: Confidence Interval and Sample Size Chapter 7: Cofidece Iterval ad Sample Size Learig Objectives Upo successful completio of Chapter 7, you will be able to: Fid the cofidece iterval for the mea, proportio, ad variace. Determie the miimum

More information

CHAPTER 7: Central Limit Theorem: CLT for Averages (Means)

CHAPTER 7: Central Limit Theorem: CLT for Averages (Means) CHAPTER 7: Cetral Limit Theorem: CLT for Averages (Meas) X = the umber obtaied whe rollig oe six sided die oce. If we roll a six sided die oce, the mea of the probability distributio is X P(X = x) Simulatio:

More information

Measuring Magneto Energy Output and Inductance Revision 1

Measuring Magneto Energy Output and Inductance Revision 1 Measurig Mageto Eergy Output ad Iductace evisio Itroductio A mageto is fudametally a iductor that is mechaically charged with a iitial curret value. That iitial curret is produced by movemet of the rotor

More information

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009)

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009) 18.409 A Algorithmist s Toolkit October 27, 2009 Lecture 13 Lecturer: Joatha Keler Scribe: Joatha Pies (2009) 1 Outlie Last time, we proved the Bru-Mikowski iequality for boxes. Today we ll go over the

More information

Lesson 15 ANOVA (analysis of variance)

Lesson 15 ANOVA (analysis of variance) Outlie Variability -betwee group variability -withi group variability -total variability -F-ratio Computatio -sums of squares (betwee/withi/total -degrees of freedom (betwee/withi/total -mea square (betwee/withi

More information

Lesson 17 Pearson s Correlation Coefficient

Lesson 17 Pearson s Correlation Coefficient Outlie Measures of Relatioships Pearso s Correlatio Coefficiet (r) -types of data -scatter plots -measure of directio -measure of stregth Computatio -covariatio of X ad Y -uique variatio i X ad Y -measurig

More information

The Stable Marriage Problem

The Stable Marriage Problem The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,

More information

Plug-in martingales for testing exchangeability on-line

Plug-in martingales for testing exchangeability on-line Plug-i martigales for testig exchageability o-lie Valetia Fedorova, Alex Gammerma, Ilia Nouretdiov, ad Vladimir Vovk Computer Learig Research Cetre Royal Holloway, Uiversity of Lodo, UK {valetia,ilia,alex,vovk}@cs.rhul.ac.uk

More information