Universal Fuzzy Statistical Test for Pseudo Random Number Generators (UFST-PRNG)
|
|
- Kathlyn Blake
- 5 years ago
- Views:
Transcription
1 Universal Fuzzy Statistical Test for Pseudo Random Number Generators (UFST-PRNG) Raad A. Muhajjar, Ph.D. ICCR Scholar, Dept. of Computer Science, Dr. S. Kazim Naqvi, Sr. System Analyst, Centre for IT,
2 Outline Basic Information Operating System PRNGs (Linux & Windows) The solution UFST-PRNG Limitations & Directions for Future Work 2
3 Basic Information Pseudorandom or random bit generator is a device or algorithm which outputs a sequence of statistically independent and unbiased binary digits. It also can be used to generate (uniformly distributed) random numbers [51]. Pseudorandom number generators are important in cryptographic applications. For real security, PRNG output must to be unpredictable for adversaries. Many protocols rely on the ability to have random looking numbers.
4 Basic Information Weak random values increase the chances for adversaries to break the system. Breaking the Netscape implementation of SSL [4] and predicting Java session-ids [5] are two well documented instances. Although the theory of random number generation is well researched, building a secure RNG in practice has proven to be quite difficult. As all operating systems provide RNGs, most cryptographic applications take their output quality to be good for granted. Unfortunately, this is not true. The basic weakness with seeds and keys can be effectively exploited by hackers/adversaries to break the system.
5 Basic Information To alleviate problem with PRNG sources, a new practical test A Universal Statistical Test for Pseudorandom Numbers (UFST-PRNG) for investigating the randomness of cryptographic RNGs has been proposed and implemented. This new practical test is based on statistical tests, the next-bit test theory, and fuzzy logic. The new proposed test has the property that, if the bit string passes the test, it will definitely pass the standard tests. In addition it will pass, yet another test dependent on the idea of predict next bit tests [8]. 5
6 Outline Basic Information Operating System PRNGs (Linux & Windows) The solution UFST-PRNG Limitations & Directions for Future Work Footer 6
7 Linux Operating System o Linux, Mac OS, FreeBSD and OpenBSD provide access to PRNGs through device nodes /dev/random and /dev/urandom. o The Linux pseudorandom number generator (LPRNG) is part of the kernel of all Linux distributions and the outputs of this generator is used for almost every security protocol. 7
8 Analysis of Linux PRNG First, a function was developed to capture the Linux PRNG state into a file. Then these random sequences were analyzed using standard statistical tests, NIST test suite, and a new universal test for bit strings. 8
9 Program segment for extracting seq. from LPRNG
10 Few Sequences generated from /dev/random
11 Results of The NIST Statistical Test Suite NIST Statistical Test P.Value Assessment Frequency SUCCESS Cusum-Forward SUCCESS Cusum-Reverse SUCCESS Runs SUCCESS Long Runs of Ones SUCCESS Block Frequency (m=128 ) SUCCESS Spectral DFT SUCCESS Overlapping Templates m= SUCCESS Non-Overlapping Templates (m= 9, B= ) SUCCESS Approximate Entropy m= SUCCESS Lempel Ziv Complexity SUCCESS Linear Complexity (M=368) SUCCESS Serial (m=5) SUCCESS SUCCESS Table 6.5 Result NIST statistical test suite on Sequence No.1 of Table
12 Result of Standard statistical Tests Run Test : The input to the Run test is the sequence No.1 ( Bi e i ) 2 Z= + ei i= 1 k (Gi ei ) 2 i= 1 e i k the result of Run test has been got as: Z=
13 Result of Standard statistical Tests Autocorrelation Test: sequence output from The test on the first /dev/random has been conducted. n d F = 2( A(d ) )/ n d 2 From equation above, when the value of d =10, the P-value for the Autocorrelation test has been got as: F=
14 Result of A New Universal Test for Bit Strings For Local non-random behavior : As shown in the below Table, it is possible to predict the last colored bits if the first colored bits are known. 14
15 15
16 16
17 Local non-random behavior 17
18 For Local non-random behavior The result shows that more than L+1 bits can be predicted using L-1 bits. Thus, there is some local non-randomness in the sequence No.1 generated by /dev/random and as such the test fails. 18
19 For overall non-random behavior The curve resulting from the number of predictable bits after them for sequence No.1 is compared to another curve resulting from De_bruijn sequence [4]. Both have been shown in the following Figure. 19
20 20
21 For overall non-random behavior It can be easily seen that the graph of Sequence No.1 is quite dissimilar to the required graph for Debruijn sequence. This means that the random sequence No.1 extracted from the /dev/random generator shows overall non-random behavior. 21
22 Summary for LPRNG The architecture of LPRNG /dev/random in Red Hat Enterprise Linux EL has been presented. To study the quality of randomness in the LPRNG, a number of sequences were generated 22
23 Summary for LPRNG The test using /dev/random function then NIST, standard statistical tests and A New Universal test for bit string were applied. It was found that 100% of the sequences generated from /dev/random generator passed the NIST test suite and standard statistical tests but 30% of these sequence failed to pass tests based on the next-bit theory. 23
24 Windows Operating System All Windows versions since Windows 95 have a Crypto API function CryptGenRandom for generating cryptographically secure random numbers. The PRNG of Windows 2000 & Windows XP were examined. The CryptGenRandom function was used to generate the random sequences from the Windows Pseudo Random Number Generator (WPRNG). 24
25 Analysis of Windows PRNG First, a function was developed to capture the Windows PRNG state into a file. Then these random sequences were analyzed using standard statistical tests, NIST test suite, and a new universal test for bit strings. 25
26 Program segment for extracting seq. from WPRNG
27 Few Seq. generated from WPRNG 27
28 Results of The NIST Stat. Test Suite 28
29 Result of Standard stat. Tests The Result of Run Test is : Z= The Result of Autocorrelation Test is : F=
30 A new universal test for bit strings 30
31 31
32 Local non-random behavior 32
33 Overall non-random behavior 33
34 Summary for WPRNG Study the quality of randomness in the WPRNG, a number of sequences have been generated using Crypto API function CryptGenRandom then applied NIST suite, a new universal test for bit strings and other standard statistical tests 34
35 Summary for WPRNG This work found that the random sequences generated by WPRNG are weaker than those generated by /dev/random. 55% of the random sequences generated using WPRNG failed to pass the NIST test suite and standards statistical tests. 72% of the sequences fail in tests based on the next-bit theory such as A new universal test for bit strings. 35
36 Thus.. In this paper, an extensive statistical analytic investigation for PRNGs of Linux and Windows OS was made. This enabled us to conclude that the random bit strings generated by LPRNG and WPRNG are weak. If a hacker is able to predict few-bits he can potentially recover the key, which can jeopardize the entire security.
37 Outline Basic Information Operating System PRNGs (Linux & Windows) The solution UFST-PRNG Limitations & Directions for Future Work Footer 37
38 The Solution The above study and results on two most popular operating systems viz. Windows and Linux shows that the security in cryptographic applications can be compromised because of weaknesses in the PRNG algorithms of the OS loaded on the interacting machines. 38
39 The Solution There are two possible ways to deal with this issue; first; - change the PRNG algorithms in the OS systems; second; - develop a way which can bridge the requirements of producing quality random numbers on the existing machines and OS. 39
40 The Solution-UFST-PRNG Framework In this paper, I have proposed to implement the later solution for feasibility reasons. The proposed solution (UFST-PRNG Framework) requires that as soon as the OS generates a random sequence, it is captured and put it on rigorous standard statistical tests and tests based on next-bit theory for checking the quality of randomness. 40
41 The Solution-UFST-PRNG Framework Once the UFST-PRNG test determines that a sequence is weak, it is not forwarded to any application rather, the system will be requested to generate a new random sequence for consumption of the requesting application. 41
42 Requirement for implemental UFST-PRNG A test that can efficiently identity if a pseudorandom sequences is good or not for security purposes?
43 Outline Basic Information Operating System PRNGs (Linux & Windows) The solution UFST-PRNG Limitations & Directions for Future Work Footer 43
44 A Universal Fuzzy Statistical Test for Pseudorandom Number Generators (UFST-PRNG) To alleviate problem with PRNG sources, in this paper an attempt to design and implement a new practical test for bit string generators was made based on statistical tests, the next-bit test theory, and fuzzy logic. 44
45 The General Architecture of UFST-PRNG Test
46 The General Architecture of UFST-PRNG Test Fuzzification: The Fuzzification job is to transform the crisp valued inputs Z, F, and R into fuzzy sets depending on the trapezoidal membership functions 46
47 Three trapezoidal membershi p functions have been used as inputs
48 The General Architecture of UFST-PRNG Test
49 The General Architecture of UFST-PRNG Test Inference System : There are two steps to complete the work of Inference System in UFSTPRNG. They are as the following: Set of IF-THEN Apply the Minimum methods for Fire Rules 49
50 Inference System Set of IF-THEN: The behavior of system to be controlled is described in this component through a set of IF_THEN rules describing inputoutput relations in terms of fuzzy sets. Here Mamdani fuzzy rules was used, each rule is represented as: IF A IS Strong AND B IS Accepted AND C IS Weak THEN D IS Accepted 3 May
51 The General Architecture of UFST-PRNG Test
52 Inference System The inference rules in proposed test are 27 rules as shown in the following Table. 52
53 The General Architecture of UFST-PRNG Test Apply the Minimum methods for Fire Rules: The premises of all rules are compared to the crisp inputs to determine which rules apply to the current situation. This matching process involves determining the certainty that a rule applies (μ premise) which could be calculated by the Minimum methods as: μpremises= Min (μ (Z), μ (F), μ (R)) 3 May
54 The General Architecture of UFST-PRNG Test
55 The General Architecture of UFST-PRNG Test Defuzzification: The defuzzifire takes the output fuzzy sets from the inference system and transforms them into crisp values depending on the triangular membership functions and the centre of gravity method. It is given by: n μ C i i i = 1 Crisp Output = n μ i i=1 55
56 The General Architecture of UFST-PRNG Test Triangular membership functions as output of this system 3 May
57 The General Architecture of UFST-PRNG Test
58 UFST-PRNGs Summary To overcome the inherent problems of PRNGs, which hamper the Cryptographic security, the UFST-PRNG Framework and Test was proposed. The UFST-PRNG test is based on standard statistical tests, the next-bit test theory, and fuzzy logic. 58
59 UFST-PRNGs Summary 1. In this paper, I have demonstrated the use of UFSTPRNG on random sequences generated using Linux and Windows PRNGs respectively. 2. The test has a very useful property that if a random string passes UFST-PRNG, the string will also pass other standard statistical test and tests based on nextbit theory but the inverse may not be always true. 59
60 UFST-PRNGs Summary 1. In addition to test standard statistical properties the UFST-PRNG test also determines both local and overall non-random behaviors of the bit strings. Thus, UFST-PRNG may be used as a single unified test to check the quality of randomness of bit strings. 2. It can be applied to all the strings, from rather small to those containing large number of bits.
61 UFST-PRNGs Summary 1. The UFST-PRNG framework is a model, which uses UFST-PRNG to test the goodness of random bits generated by the PRNGs. 2. It can be equally effective in improving the security of any application which depends on random sequences from operating system. 61
62 UFST-PRNGs Summary 1. As the UFST-PRNG framework is able to solve the root problems related to weak random numbers it will definitely help in boosting the security in cryptographic applications. 62
63 Outline Basic Information Operating System PRNGs (Linux & Windows) The solution UFST-PRNG Limitations & Directions for Future Work Footer 63
64 Limitations & Directions for Future Work The UFST-PRNG framework needs to be made operational as software. All Client machines must support UFST-PRNG framework. In addition, the framework will add some processing overhead on the server as well as on client machines. The impact of UFST-PRNG on performance may further be studied. 64
65 Important References used in the Presentation Bruce Potter, Wireless Hotspots: Petri Dish of Wireless Security, Communications of the ACM June 2006, Vol. 49, No. 6, pp I. Goldberg and D. Wagner, Randomness and the Netscape browser, Dr Dobb s, Jan. 1996, pp P. Gutmann. Software generation of practically strong random numbers. In Proc. of 7th USENIX Security Symposium, An updated version appears in B. Sadeghiyah and J. Mohajeri, A new universal test for bit strings, Lecturer Notes in Computer Science, Springer ACISP "96, pp Raad A. Muhajjar, Rafat Parveen, Nupur Prakash, and S. Kazim Naqvi., A Universal Fuzzy Statistical Test for Bit Strings, Communicated in International Journal of Computation Intelligence and Applications (IJCIA). Ian S. Shaw, Fuzzy Control of Industrial Systems: Theory and Applications, Kluwer Academic Publishers; ISBN: , 1998.
66 THANKS 66
67 Questions? 67
Security of Pseudo-Random Number Generators With Input
Security of Pseudo-Random Number Generators With Input Damien Vergnaud École normale supérieure INRIA PSL wr0ng April, 30th 2017 (with Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault & Daniel Wichs)
More informationCryptanalysis of the Windows Random Number Generator
Cryptanalysis of the Windows Random Number Generator Masaryk University in Brno Faculty of Informatics Jan Krhovják Presentation based on paper: Cryptanalysis of the Random Number Generator of the Windows
More informationCSC 482/582: Computer Security. Applying Cryptography
Applying Cryptography Topics 1. Applications of Randomness 2. Defining and Evaluating Randomness 3. Pseudo-Random Number Generators (PRNGs) 4. Cryptographically Secure PRNGs (CSPRNGs) 5. Attacks on PRNGs
More informationAttack on Sun s MIDP Reference Implementation of SSL
Attack on Sun s MIDP Reference Implementation of SSL Kent Inge Simonsen, Vebjørn Moen, and Kjell Jørgen Hole Department of Informatics, University of Bergen Pb. 7800, N-5020 Bergen, Norway {kentis,moen,kjell.hole}@ii.uib.no
More informationRandom number generation
Cryptographic Protocols (EIT ICT MSc) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu
More informationTopics. Key Generation. Applying Cryptography
Applying Cryptography Topics 1. Key Generation 2. Randomness and Information Theory 3. PRNGs 4. Entropy Gathering 5. Key Storage 6. Cryptographic APIs Key Generation Goal: generate difficult to guess keys
More informationFUZZY LOGIC TECHNIQUES. on random processes. In such situations, fuzzy logic exhibits immense potential for
FUZZY LOGIC TECHNIQUES 4.1: BASIC CONCEPT Problems in the real world are quite often very complex due to the element of uncertainty. Although probability theory has been an age old and effective tool to
More informationCHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS
CHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS 4.1. INTRODUCTION This chapter includes implementation and testing of the student s academic performance evaluation to achieve the objective(s)
More informationCSC 580 Cryptography and Computer Security
CSC 580 Cryptography and Computer Security Random Bit Generators (Sections 8.1-8.3) February 20, 2018 Overview Today: HW 4 solution discussion Pseudorandom generation - concepts and simple techniques Reminder:
More informationIntroduction to Fuzzy Logic and Fuzzy Systems Adel Nadjaran Toosi
Introduction to Fuzzy Logic and Fuzzy Systems Adel Nadjaran Toosi Fuzzy Slide 1 Objectives What Is Fuzzy Logic? Fuzzy sets Membership function Differences between Fuzzy and Probability? Fuzzy Inference.
More informationCuttingedge crypto graphy
The latest cryptographic solutions from Linux on the System z platform BY PETER SPERA Cuttingedge crypto graphy Can Linux* for the IBM* System z* platform meet the cryptographic needs of today s enterprise
More information/dev/random and Your FIPS Validation Can Be Friends
/dev/random and Your FIPS 140-2 Validation Can Be Friends Yes, Really Valerie Fenwick Manager, Solaris Cryptographic Technologies team Oracle May 19, 2016 Photo by CGP Grey, http://www.cgpgrey.com/ Creative
More informationA Secured Key Generation Scheme Using Enhanced Entropy
236 A Secured Key Generation Scheme Using Enhanced Entropy M.S. Irfan Ahmed Asst. Professor, VLB Engineering College, Coimbatore E.R. Naganathan Reader, Computer Science Department Alagappa University,
More informationRandomness in Cryptography
Randomness in Cryptography JKU Linz 2007 Randomness in Cryptography 1 Randomness? Randomness in Cryptography 2 The need for randomness Contents 1 Introduction The need for randomness Formal denitions,
More informationARTIFICIAL INTELLIGENCE. Uncertainty: fuzzy systems
INFOB2KI 2017-2018 Utrecht University The Netherlands ARTIFICIAL INTELLIGENCE Uncertainty: fuzzy systems Lecturer: Silja Renooij These slides are part of the INFOB2KI Course Notes available from www.cs.uu.nl/docs/vakken/b2ki/schema.html
More informationInformation Security CS526
Information CS 526 Topic 3 Ciphers and Cipher : Stream Ciphers, Block Ciphers, Perfect Secrecy, and IND-CPA 1 Announcements HW1 is out, due on Sept 10 Start early, late policy is 3 total late days for
More informationFuzzy Networks for Complex Systems. Alexander Gegov University of Portsmouth, UK
Fuzzy Networks for Complex Systems Alexander Gegov University of Portsmouth, UK alexander.gegov@port.ac.uk Presentation Outline Introduction Types of Fuzzy Systems Formal Models for Fuzzy Networks Basic
More informationSpeed regulation in fan rotation using fuzzy inference system
58 Scientific Journal of Maritime Research 29 (2015) 58-63 Faculty of Maritime Studies Rijeka, 2015 Multidisciplinary SCIENTIFIC JOURNAL OF MARITIME RESEARCH Multidisciplinarni znanstveni časopis POMORSTVO
More informationThe Design and Analysis of a True Random Number Generator in a Field Programmable Gate Array. By Paul Kohlbrenner November 20, 2003
The Design and Analysis of a True Random Number Generator in a Field Programmable Gate Array By Paul Kohlbrenner November 20, 2003 Presentation Organization 1. Thesis goal 2. The need for random bits in
More informationInformation Security CS526
Information Security CS 526 Topic 3 Cryptography: One-time Pad, Information Theoretic Security, and Stream CIphers 1 Announcements HW1 is out, due on Sept 11 Start early, late policy is 3 total late days
More informationLotfi Zadeh (professor at UC Berkeley) wrote his original paper on fuzzy set theory. In various occasions, this is what he said
FUZZY LOGIC Fuzzy Logic Lotfi Zadeh (professor at UC Berkeley) wrote his original paper on fuzzy set theory. In various occasions, this is what he said Fuzzy logic is a means of presenting problems to
More informationAcronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector
Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National
More informationCPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017
CPSC 531: System Modeling and Simulation Carey Williamson Department of Computer Science University of Calgary Fall 2017 Outline Random number generation Properties of random numbers Linear Congruential
More informationAdvanced Inference in Fuzzy Systems by Rule Base Compression
Mathware & Soft Computing 14 (2007), 201-216 Advanced Inference in Fuzzy Systems by Rule Base Compression A. Gegov 1 and N. Gobalakrishnan 2 1,2 University of Portsmouth, School of Computing, Buckingham
More informationPseudo-random number generators
Pseudo-random number generators -- Definition and motivation -- Classification of attacks -- Examples: DSA PRNG and Yarrow-160 (c) Levente Buttyán (buttyan@crysys.hu) Definitions a random number is a number
More informationANALYTICAL STRUCTURES FOR FUZZY PID CONTROLLERS AND APPLICATIONS
International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 6545(Print) ISSN 0976 6553(Online), Volume 1 Number 1, May - June (2010), pp. 01-17 IAEME, http://www.iaeme.com/ijeet.html
More informationECE571: Advanced Microprocessor Design Final Project Spring Officially Due: Friday, 4 May 2018 (Last day of Classes)
Overview: ECE571: Advanced Microprocessor Design Final Project Spring 2018 Officially Due: Friday, 4 May 2018 (Last day of Classes) Design a project that explores the power, energy, and/or performance
More informationFuzzy Based Decision System for Gate Limiter of Hydro Power Plant
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 5, Number 2 (2012), pp. 157-166 International Research Publication House http://www.irphouse.com Fuzzy Based Decision
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 3, Issue 2, July- September (2012), pp. 157-166 IAEME: www.iaeme.com/ijcet.html Journal
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK MORE RANDOMNESS OF IMPROVED RC4 (IRC4) THAN ORIGINAL RC4 HEMANTA DEY 1, DR. UTTAM
More informationCHAPTER 5 FUZZY LOGIC CONTROL
64 CHAPTER 5 FUZZY LOGIC CONTROL 5.1 Introduction Fuzzy logic is a soft computing tool for embedding structured human knowledge into workable algorithms. The idea of fuzzy logic was introduced by Dr. Lofti
More informationParallel Implementation of the NIST Statistical Test Suite
Parallel Implementation of the NIST Statistical Test Suite Alin Suciu, Iszabela Nagy, Kinga Marton, Ioana Pinca Computer Science Department Technical University of Cluj-Napoca Cluj-Napoca, Romania Alin.Suciu@cs.utcluj.ro,
More informationFUZZY INFERENCE SYSTEM AND PREDICTION
JOURNAL OF TRANSLOGISTICS 2015 193 Libor ŽÁK David VALIŠ FUZZY INFERENCE SYSTEM AND PREDICTION Keywords: fuzzy sets, fuzzy logic, fuzzy inference system, prediction implementation, employees ABSTRACT This
More informationNEW CLASS OF PSEUDORANDOM D-SEQUENCES TO GENERATE CRYPTOGRAPHIC KEYS B. Prashanth Reddy Oklahoma State University, Stillwater
NEW CLASS OF PSEUDORANDOM D-SEQUENCES TO GENERATE CRYPTOGRAPHIC KEYS B. Prashanth Reddy Oklahoma State University, Stillwater Abstract This article proposes the use of pseudorandom decimal sequences that
More informationLecture notes. Com Page 1
Lecture notes Com Page 1 Contents Lectures 1. Introduction to Computational Intelligence 2. Traditional computation 2.1. Sorting algorithms 2.2. Graph search algorithms 3. Supervised neural computation
More informationFuzzy Logic Controller
Fuzzy Logic Controller Debasis Samanta IIT Kharagpur dsamanta@iitkgp.ac.in 23.01.2016 Debasis Samanta (IIT Kharagpur) Soft Computing Applications 23.01.2016 1 / 34 Applications of Fuzzy Logic Debasis Samanta
More informationIdentification of Vehicle Class and Speed for Mixed Sensor Technology using Fuzzy- Neural & Genetic Algorithm : A Design Approach
Identification of Vehicle Class and Speed for Mixed Sensor Technology using Fuzzy- Neural & Genetic Algorithm : A Design Approach Prashant Sharma, Research Scholar, GHRCE, Nagpur, India, Dr. Preeti Bajaj,
More informationWhy Fuzzy Fuzzy Logic and Sets Fuzzy Reasoning. DKS - Module 7. Why fuzzy thinking?
Fuzzy Systems Overview: Literature: Why Fuzzy Fuzzy Logic and Sets Fuzzy Reasoning chapter 4 DKS - Module 7 1 Why fuzzy thinking? Experts rely on common sense to solve problems Representation of vague,
More informationFUZZY INFERENCE SYSTEMS
CHAPTER-IV FUZZY INFERENCE SYSTEMS Fuzzy inference is the process of formulating the mapping from a given input to an output using fuzzy logic. The mapping then provides a basis from which decisions can
More informationThe Travelling Salesman Problem. in Fuzzy Membership Functions 1. Abstract
Chapter 7 The Travelling Salesman Problem in Fuzzy Membership Functions 1 Abstract In this chapter, the fuzzification of travelling salesman problem in the way of trapezoidal fuzzy membership functions
More informationIntroduction 3 Fuzzy Inference. Aleksandar Rakić Contents
Beograd ETF Fuzzy logic Introduction 3 Fuzzy Inference Aleksandar Rakić rakic@etf.rs Contents Mamdani Fuzzy Inference Fuzzification of the input variables Rule evaluation Aggregation of rules output Defuzzification
More informationEnding the Entropy Drought
White Paper: Ending the Entropy Drought February 2018 All questions and enquiries regarding this white paper should be directed to: John Lister Director of Cyber Security jlister@cognitiocorp.com February
More informationPseudorandom Number Generation
Pseudorandom Number Generation Thanks once again to A. Joseph, D. Tygar, U. Vazirani, and D. Wagner at the University of California, Berkeley 1 What Can Go Wrong? An example: This generates a 16 byte (128
More informationCHAPTER 4 FREQUENCY STABILIZATION USING FUZZY LOGIC CONTROLLER
60 CHAPTER 4 FREQUENCY STABILIZATION USING FUZZY LOGIC CONTROLLER 4.1 INTRODUCTION Problems in the real world quite often turn out to be complex owing to an element of uncertainty either in the parameters
More informationFUZZY INFERENCE. Siti Zaiton Mohd Hashim, PhD
FUZZY INFERENCE Siti Zaiton Mohd Hashim, PhD Fuzzy Inference Introduction Mamdani-style inference Sugeno-style inference Building a fuzzy expert system 9/29/20 2 Introduction Fuzzy inference is the process
More informationUNCLASSIFIED//FOR OFFICIAL USE ONLY INDUSTRIAL CONTROL SYSTEMS CYBER EMERGENCY RESPONSE TEAM
ADVISORY ICSA-10-019-01 ZIGBEE PSEUDORANDOM NUMBER GENERATOR VULNERABILITY January 19, 2010 OVERVIEW On January 09, 2010, a security researcher published an attack on a ChipCon (CC) implementation of ZigBee
More informationWhat is all the Fuzz about?
What is all the Fuzz about? Fuzzy Systems CPSC 433 Christian Jacob Dept. of Computer Science Dept. of Biochemistry & Molecular Biology University of Calgary Fuzzy Systems in Knowledge Engineering Fuzzy
More informationComparative Analysis of SLA-LFSR with Traditional Pseudo Random Number Generators
International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 6 (2017), pp. 1461-1470 Research India Publications http://www.ripublication.com Comparative Analysis of SLA-LFSR
More informationFUZZY SYSTEMS: Basics using MATLAB Fuzzy Toolbox. Heikki N. Koivo
FUZZY SYSTEMS: Basics using MATLAB Fuzzy Toolbox By Heikki N. Koivo 200 2.. Fuzzy sets Membership functions Fuzzy set Universal discourse U set of elements, {u}. Fuzzy set F in universal discourse U: Membership
More informationTOOL WEAR CONDITION MONITORING IN TAPPING PROCESS BY FUZZY LOGIC
TOOL WEAR CONDITION MONITORING IN TAPPING PROCESS BY FUZZY LOGIC Ratchapon Masakasin, Department of Industrial Engineering, Faculty of Engineering, Kasetsart University, Bangkok 10900 E-mail: masakasin.r@gmail.com
More informationLecture 5 Fuzzy expert systems: Fuzzy inference Mamdani fuzzy inference Sugeno fuzzy inference Case study Summary
Lecture 5 Fuzzy expert systems: Fuzzy inference Mamdani fuzzy inference Sugeno fuzzy inference Case study Summary Negnevitsky, Pearson Education, 25 Fuzzy inference The most commonly used fuzzy inference
More informationINTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 ISSN 0976 6464(Print)
More informationResearch Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel.
Research Statement Yehuda Lindell Dept. of Computer Science Bar-Ilan University, Israel. lindell@cs.biu.ac.il www.cs.biu.ac.il/ lindell July 11, 2005 The main focus of my research is the theoretical foundations
More informationfuzzylite a fuzzy logic control library in C++
fuzzylite a fuzzy logic control library in C++ Juan Rada-Vilela jcrada@fuzzylite.com Abstract Fuzzy Logic Controllers (FLCs) are software components found nowadays within well-known home appliances such
More informationDeciphering Data Fusion Rule by using Adaptive Neuro-Fuzzy Inference System
Deciphering Data Fusion Rule by using Adaptive Neuro-Fuzzy Inference System Ramachandran, A. Professor, Dept. of Electronics and Instrumentation Engineering, MSRIT, Bangalore, and Research Scholar, VTU.
More informationLecture 4: Hashes and Message Digests,
T-79.159 Cryptography and Data Security Lecture 4: Hashes and Message Digests Helsinki University of Technology mjos@tcs.hut.fi 1 Cryptographic hash functions Maps a message M (a bit string of arbitrary
More informationRecurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications
Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications D.A. Karras 1 and V. Zorkadis 2 1 University of Piraeus, Dept. of Business Administration,
More informationS. Sreenivasan Research Scholar, School of Advanced Sciences, VIT University, Chennai Campus, Vandalur-Kelambakkam Road, Chennai, Tamil Nadu, India
International Journal of Civil Engineering and Technology (IJCIET) Volume 9, Issue 10, October 2018, pp. 1322 1330, Article ID: IJCIET_09_10_132 Available online at http://www.iaeme.com/ijciet/issues.asp?jtype=ijciet&vtype=9&itype=10
More informationFuzzy Reasoning. Outline
Fuzzy Reasoning Outline Introduction Bivalent & Multivalent Logics Fundamental fuzzy concepts Fuzzification Defuzzification Fuzzy Expert System Neuro-fuzzy System Introduction Fuzzy concept first introduced
More informationPerformance Testing: A Comparative Study and Analysis of Web Service Testing Tools
Performance Testing: A Comparative Study and Analysis of Web Service Testing Tools Dr.V.Asha 1, Divyabindu M C 2, Asha V 3 1,2,3 Department of Master of Computer Applications, New Horizon College of Engineering,
More informationUNIVERSITY OF CALGARY. Analysis of Linux Random Number Generator in Virtualized Environment. Rashmi Kumari A THESIS
UNIVERSITY OF CALGARY Analysis of Linux Random Number Generator in Virtualized Environment by Rashmi Kumari A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS
More informationRandom-Number Generation
Random-Number Generation Overview Desired properties of a good generator Linear-congruential generators Tausworthe generators Survey of random number generators Seed selection Myths about random number
More informationSOLUTION: 1. First define the temperature range, e.g. [0 0,40 0 ].
2. 2. USING MATLAB Fuzzy Toolbox GUI PROBLEM 2.1. Let the room temperature T be a fuzzy variable. Characterize it with three different (fuzzy) temperatures: cold,warm, hot. SOLUTION: 1. First define the
More informationChapter 7 Fuzzy Logic Controller
Chapter 7 Fuzzy Logic Controller 7.1 Objective The objective of this section is to present the output of the system considered with a fuzzy logic controller to tune the firing angle of the SCRs present
More informationCyber Security Applied Cryptography. Dr Chris Willcocks
Cyber Security Applied Cryptography Dr Chris Willcocks Introduction 1. Content in this lecture will be examinable 2. This is a single lecture on applied cryptography for computer security. there is an
More informationMODELING FOR RESIDUAL STRESS, SURFACE ROUGHNESS AND TOOL WEAR USING AN ADAPTIVE NEURO FUZZY INFERENCE SYSTEM
CHAPTER-7 MODELING FOR RESIDUAL STRESS, SURFACE ROUGHNESS AND TOOL WEAR USING AN ADAPTIVE NEURO FUZZY INFERENCE SYSTEM 7.1 Introduction To improve the overall efficiency of turning, it is necessary to
More informationA Countermeasure Circuit for Secure AES Engine against Differential Power Analysis
A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis V.S.Subarsana 1, C.K.Gobu 2 PG Scholar, Member IEEE, SNS College of Engineering, Coimbatore, India 1 Assistant Professor
More informationEfficient and Sustainable Self-healing Protocols for Unattended Wireless Sensor Networks
Efficient and Sustainable Self-healing Protocols for Unattended Wireless Sensor Networks Juan Chen 1, Hongli Zhang 1, Binxing Fang 1,3, Xiaojiang Du 2, Haining Yu 1, Xiangzhan Yu 1 1 Research Center of
More informationAn Investigation of the FreeBSD r RNG Bugfix
Manuscript. First posted online October 3, 2016. An Investigation of the FreeBSD r278907 RNG Bugfix Wilson Lian Hovav Shacham Stefan Savage Abstract Operating systems and applications rely on random number
More informationWhat is the Q in QRNG?
What is the Q in QRNG? V1.2 October 2017 Table of Content 1. What is the Q in QRNG?... 3 2. What is a random number?... 3 3. Generating random numbers... 4 3.1 Types of random number generator... 4 3.2
More informationFuzzy Expert Systems Lecture 8 (Fuzzy Systems)
Fuzzy Expert Systems Lecture 8 (Fuzzy Systems) Soft Computing is an emerging approach to computing which parallels the remarkable ability of the human mind to reason and learn in an environment of uncertainty
More informationCHAPTER 6 SOLUTION TO NETWORK TRAFFIC PROBLEM IN MIGRATING PARALLEL CRAWLERS USING FUZZY LOGIC
CHAPTER 6 SOLUTION TO NETWORK TRAFFIC PROBLEM IN MIGRATING PARALLEL CRAWLERS USING FUZZY LOGIC 6.1 Introduction The properties of the Internet that make web crawling challenging are its large amount of
More informationSimultaneous Perturbation Stochastic Approximation Algorithm Combined with Neural Network and Fuzzy Simulation
.--- Simultaneous Perturbation Stochastic Approximation Algorithm Combined with Neural Networ and Fuzzy Simulation Abstract - - - - Keywords: Many optimization problems contain fuzzy information. Possibility
More informationLive Demo: A New Hardware- Based Approach to Secure the Internet of Things
SESSION ID: CCS-W04 Live Demo: A New Hardware- Based Approach to Secure the Internet of Things Cesare Garlati Chief Security Strategist prpl Foundation @CesareGarlati Securing the Internet of (broken)
More informationFUZZY LOGIC APPROACH TO IMPROVING STABLE ELECTION PROTOCOL FOR CLUSTERED HETEROGENEOUS WIRELESS SENSOR NETWORKS
3 st July 23. Vol. 53 No.3 25-23 JATIT & LLS. All rights reserved. ISSN: 992-8645 www.jatit.org E-ISSN: 87-395 FUZZY LOGIC APPROACH TO IMPROVING STABLE ELECTION PROTOCOL FOR CLUSTERED HETEROGENEOUS WIRELESS
More informationApplication of a Fuzzy Inference System to Measure Maintainability of Object-Oriented Software
Application of a Fuzzy Inference System to Measure Maintainability of Object-Oriented Software Nasib Singh Gill and Meenakshi Sharma Department of Computer Science & Applications Maharshi Dayanand University,
More informationOutlines. Fuzzy Membership Function Design Using Information Theory Measures and Genetic Algorithms. Outlines
Fuzzy Membership Function Design Using Information Theory Measures and Genetic Algorithms Outlines Introduction Problem Statement Proposed Approach Results Conclusion 2 Outlines Introduction Problem Statement
More informationFigure 2-1: Membership Functions for the Set of All Numbers (N = Negative, P = Positive, L = Large, M = Medium, S = Small)
Fuzzy Sets and Pattern Recognition Copyright 1998 R. Benjamin Knapp Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that
More informationCONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS
CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department
More informationCS 241 Honors Nothing is Ever Random
CS 241 Honors Nothing is Ever Random Kevin Hong University of Illinois Urbana-Champaign Feburary 13, 2018 Kevin Hong (UIUC) Randomness and Entropy Feburary 13, 2018 1 / 11 Kevin Hong (UIUC) Randomness
More informationCrypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL))
Introduction (Mihir Bellare Text/Notes: http://cseweb.ucsd.edu/users/mihir/cse207/) Cryptography provides: Data Privacy Data Integrity and Authenticity Crypto-systems all around us ATM machines Remote
More informationA Comparison of Data Encryption Algorithms with the Proposed Algorithm: Wireless Security
A Comparison of Data Encryption Algorithms with the Proposed Algorithm: Wireless Security Shadi R. Masadeh, Shadi Aljawarneh, Nedal Turab Faculty of Information Technology Isra University P.O. Box 22,
More informationMTAT Applied Cryptography
MTAT.07.017 Applied Cryptography Introduction, Randomness, One-Time Pad, Stream Ciphers University of Tartu Spring 2014 1 / 31 Who am I Arnis Paršovs MSc in Cyber Security Tallinn University of Technology,
More informationSecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine Security Policy Abstract: This document specifies Security Policy enforced by the SecureDoc Cryptographic Engine compliant with the requirements of FIPS 140-2
More informationPLC IMPLEMENTATION OF A FUZZY SYSTEM
The 6 th edition of the Interdisciplinarity in Engineering International Conference Petru Maior University of Tîrgu Mureş, Romania, 202 PLC IMPLEMENTATION OF A FUZZY SYSTEM Adrian-Vasile DUKA # # Department
More informationKernel level AES Acceleration using GPUs
Kernel level AES Acceleration using GPUs TABLE OF CONTENTS 1 PROBLEM DEFINITION 1 2 MOTIVATIONS.................................................1 3 OBJECTIVE.....................................................2
More informationNetwork Security. Random Number Generation. Chapter 6. Network Security (WS 2003): 06 Random Number Generation 1 Dr.-Ing G.
Network Security Chapter 6 Random Number Generation Network Security (WS 2003): 06 Random Number Generation 1 Tasks of Key Management (1) Generation: It is crucial to security, that keys are generated
More informationFuzzy time series forecasting of wheat production
Fuzzy time series forecasting of wheat production Narendra kumar Sr. lecturer: Computer Science, Galgotia college of engineering & Technology Sachin Ahuja Lecturer : IT Dept. Krishna Institute of Engineering
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 3, March ISSN
International Journal of Scientific & Engineering Research, Volume 7, Issue 3, March-2016 1060 An Efficient Energy Aware ZRP-Fuzzy Clustering Protocol for WSN Osama A. Awad, Mariam Rushdi Abstract- Clustering
More informationSP Reviewing The Standard. Stephan Müller atsec information security GmbH
SP800-90 Reviewing The Standard Stephan Müller atsec information security GmbH Email: smueller@atsec.com 13 ICMC 2013, September 24-26, Gaithersburg, MD 13 Agenda Practical aspects of implementing SP800-90A
More informationExtended Diffie-Hellman Technique to Generate Multiple Shared Keys at a Time with Reduced KEOs and its Polynomial Time Complexity
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 Extended Diffie-Hellman Technique to Generate Multiple Shared Keys at a Time with Reduced KEOs and its Polynomial Time Complexity 26 Nistala V.E.S. Murthy
More informationFuzzy-Genetic Approach to Optimize Machining Process Parameters of AWJM
A Project Presentation on Fuzzy-Genetic Approach to Optimize Machining Process Parameters of AWJM By Mahesh Todkar M.Tech. II (ME093119) Guide Dr. N. Venkaiah Contents Introduction to AWJM Literature Review
More informationUsing Fuzzy Logic to Improve Cache Replacement Decisions
182 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.3A, March 26 Using Fuzzy Logic to Improve Cache Replacement Decisions Mojtaba Sabeghi1, and Mohammad Hossein Yaghmaee2,
More informationCOSC 6397 Big Data Analytics. Fuzzy Clustering. Some slides based on a lecture by Prof. Shishir Shah. Edgar Gabriel Spring 2015.
COSC 6397 Big Data Analytics Fuzzy Clustering Some slides based on a lecture by Prof. Shishir Shah Edgar Gabriel Spring 215 Clustering Clustering is a technique for finding similarity groups in data, called
More informationFuzzy rule-based decision making model for classification of aquaculture farms
Chapter 6 Fuzzy rule-based decision making model for classification of aquaculture farms This chapter presents the fundamentals of fuzzy logic, and development, implementation and validation of a fuzzy
More informationWeb Security Vulnerabilities: Challenges and Solutions
Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA
More informationUsing the IEEE Frame Check Sequence as a Pseudo Random Number for Packet Sampling in Wireless Networks
Using the IEEE 802.11 Frame Check Sequence as a Pseudo Random Number for Packet Sampling in Wireless Networks Scott Raynel WAND Network Research Group University of Waikato New Zealand Email: smr26@cs.waikato.ac.nz
More informationENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME
ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME Jae Kwan Lee 1 and Tae Ho Cho 2 1, 2 College of Information and Communication Engineering,
More informationDinner for Two, Reprise
Fuzzy Logic Toolbox Dinner for Two, Reprise In this section we provide the same two-input, one-output, three-rule tipping problem that you saw in the introduction, only in more detail. The basic structure
More informationIn the Name of God. Lecture 17: ANFIS Adaptive Network-Based Fuzzy Inference System
In the Name of God Lecture 17: ANFIS Adaptive Network-Based Fuzzy Inference System Outline ANFIS Architecture Hybrid Learning Algorithm Learning Methods that Cross-Fertilize ANFIS and RBFN ANFIS as a universal
More information