Security aspects of the Authentication used in Quantum Cryptography

Size: px
Start display at page:

Download "Security aspects of the Authentication used in Quantum Cryptography"

Transcription

1 SECURITY ASPECTS OF THE AUTHENTICATION USED IN QUANTUM CRYPTOGRAPHY Securiy asecs of he Auhenicaion used in Quanum Cryograhy Jörgen Cederlöf and Jan-Åe Larsson and Maemaisa Insiuionen, Linöings Universie, SE Linöing, Sweden arxiv:quan-h/06009v2 6 Nov 2006 Absrac Uncondiionally secure message auhenicaion is an imoran ar of Quanum Cryograhy QC). We analyze securiy effecs of using a ey obained from QC for auhenicaion uroses in laer rounds of QC. In aricular, he eavesdroer gains arial nowledge on he ey in QC ha may have an effec on he securiy of he auhenicaion in he laer round. Our iniial analysis indicaes ha his arial nowledge has lile effec on he auhenicaion ar of he sysem, in agreemen wih revious resuls on he issue. However, when aing he full QC roocol ino accoun, he icure is differen. By accessing he quanum channel used in QC, he aacer can change he message o be auhenicaed. This ogeher wih arial nowledge of he ey does incur a securiy weaness of he auhenicaion. The underlying reason for his is ha he auhenicaion used, which is insensiive o such message changes when he ey is unnown, becomes sensiive when used wih a arially nown ey. We sugges a simle soluion o his roblem, and sress usage of his or an equivalen exra securiy measure in QC. Index Terms Quanum Cryograhy, Quanum Key Disribuion, Quanum Key Growing, Auhenicaion. I. INTRODUCTION QUANTUM CRYPTOGRAPHY, or more accuraely Quanum Key Growing QKG), uses roeries of quanum mechanical sysems o share a secre ey beween wo sies. QKG was firs roosed in 984 [] and here are several variaions on he heme oday [2] [4]. Since here are excellen descriions of hese sysems elsewhere e.g., [4]), we will only ouline he generic ses of a QKG algorihm here, and hen focus on he auhenicaion used. The securiy of QKG is based on laws of naure [5] [7] raher han comuaional comlexiy as is usually he case for ey-sharing sysems [8], and herefore we will here no assume ha here are any bounds o he comuaional caaciy of he aacer. We will use common-racice erminology and refer o he sender, receiver and eavesdroer as Alice, Bob, and Eve, resecively. To se u a QKG sysem Alice and Bob need a quanum channel beween hem where hey can send and receive, or share, quanum sysems, e.g., quanum bis qubis). One examle is an oical fibre carrying single hoons wih he qubi coded in he hoon s olarizaion, bu here are many oher ossibiliies. In a erfec channel every qubi sen by Alice is received and correcly measured by Bob, and Bob receives no qubis which Alice has no sen. In racice, such channels don exis. A real-world channel can lose almos all qubis in ransi, mae Bob hin he received qubis never sen by Alice and modify some of he qubis ha do go from Alice o Bob. Bu a erfec channel is no needed, as long as he errors are wihin some limis QKG will sill roduce a ey ha is boh shared and secre [4], [9] [4]. They will also need a classical communicaion channel. The alernaives include bu are no limied o he Inerne, he same oical fibre used above, and a newor cable arallel o he oical fibre. Ofen in his conex a simlifying assumion is used: ha he classical channel can be eavesdroed on, bu no be modified by Eve. Unforunaely, unmodifiable channels don exis in he real world, so message auhenicaion mus be used o allow Alice and Bob o deec Eve s modificaion aems. To be able o auhenicae, Alice and Bob will need a small) shared secre ey o sar wih. The urose of he QKG sysem is o use he wo channels and a small orion of he already shared ey o generae new ey orion, larger han he one jus used. The iniial ey only needs o be large enough o allow for he firs generaion sequence, yically o auhenicae wo messages, one from Alice o Bob and one in he oher direcion. This will enable he ey o grow somewha QKG), and will allow for furher runs, in which he ey will grow even more. A round consiss of a number of ses: ) Raw ey generaion: Use he quanum channel o ransmi/generae a bi sequence, shared beween Alice and Bob bu equal only in a orion of he osiions. The size of his orion deends on he roocol used, roeries of he channel, and wheher Eve is lisening on he quanum channel. 2) Sifing: Remove mos of he bis ha do no mach by comaring arameers of each use of he quanum channel, he seings. This will discard noisy bis wihou sending any informaion abou he value of he bis on he classical channel. A smaller sifed ey is obained which is equal a Alice and Bob in a considerably larger orion, he size of which deends on roeries of he channel and wheher Eve is lisening. 3) Error correcion, or ey reconciliaion [5]: Perform error correcion on he sifed ey and esimae he error rae o deec wheher Eve was lisening on he quanum channel, eiher wih a few sacrificed bis from he sifed ey, or wih some of he sifed-ou bis from he las se, deending on deails of he roocol. If he error rae is above a re-deermined bound, Alice and Bob conclude ha Eve has been lisening and he round mus be abored.

2 SECURITY ASPECTS OF THE AUTHENTICATION USED IN QUANTUM CRYPTOGRAPHY 2 4) Privacy amlificaion [6] [8]: If he noise is lower han he redeermined bound, Eve may sill have been lisening bu in ha case she has oed o only exrac very lile informaion. In his case, Alice and Bob can erform rivacy amlificaion o lower Eve s informaion even furher, sacrificing a few bis of heir candidae ey in he rocess. 5) Auhenicaion [9] [2]: The final se of each round is o auhenicae he messages sen from Alice o Bob and from Bob o Alice on he classical channel, o mae sure Eve has no modified hese messages. The sender uses ey bis from he reviously shared secre ey o creae an auhenicaion ag from he message. The used ey bis are hen discarded. The ag is sen along wih he message and he reciien uses his coy of he ey o generae anoher ag from he received message. If he ags are idenical, he message is acceed as auhenic and he new ey jus generaed is added o he remaining ey from he las round. If he auhenicaion fails, Eve is assumed o be rying o inerfere and he round should be abored. A comlicaion is he fac ha he error correcion is no erfec. An error can, wih a small robabiliy, snea hrough. If ha error is in he ey used for auhenicaion in a laer round, he auhenicaion will fail even wihou Eve being resen.) There are variaions in he deails bu all QKG roocols conain hese main ses. Eve s resence is deeced via high error rae on he quanum channel in se 3 or failure of auhenicaion on he classical channel in se 5. If he auhenicaion se is no erformed, all QKG roocols are susceible o a man-in-he-middle aac, where Eve would imersonae Bob when communicaing wih Alice and vice versa. Even when erforming auhenicaion, one broen round will rovide Eve wih he auhenicaion ey for a subsequen round and can brea ha oo, and so on for all fuure rounds. We will examine he auhenicaion se of he roocols in some more deail here and show ha i is also sensiive o choice of message o be auhenicaed. II. AUTHENTICATION In QKG, he sandard is o use Wegman-Carer auhenicaion [9] [2]. This is he auhenicaion equivalen of he Vernam ciher he one-ime ad, see e.g. [22]), for which all messages are equally liely if he ey is unnown. In Wegman-Carer auhenicaion, all values of he ag are equally liely if he ey is unnown, and even if one message-ag air is nown, all values of he ag corresonding o anoher message sill are almos) equally liely. A ag is shorer han a message, so in comarison, jus guessing a ag will be more liely o succeed han he corresonding guess of a message in OTP. Neverheless, given a sufficienly long ag lengh, he robabiliy of correcly guessing he ag will be very low in Wegman-Carer auhenicaion. Tha is, he robabiliy of generaing he correc ag for a forged message will be very low. In he Vernam ciher, he required ey needs o be a leas as long as he message o be encryed. Forunaely, in Wegman-Carer auhenicaion, he required ey grows only logarihmically wih he message lengh. This is essenial for QKG as i is hen only a maer of maing he rounds large enough o gain more ey han is los in he auhenicaion. Formally, he fundamenal building bloc of Wegman-Carer auhenicaion is called universal families of hash funcions, a family H of funcions ha ma a message in he se of ossible messages M o a ag in he se of ags T. The following formal definiion of he aroriae family of hash funcions is aen from [2]: Definiion : ǫ-almos srongly-universal 2 ǫ-asu 2 ) hash funcions Le M and T be finie ses and call funcions from M o T hash funcions. Le ǫ be a osiive real number. A se H of hash funcions is ǫ-almos srongly-universal 2 if he following wo condiions are saisfied: a) The number of hash funcions in H ha aes an arbirary m M o an arbirary T is exacly /. b) The fracion of hose funcions ha also aes an arbirary m 2 m in M o an arbirary 2 T ossibly equal o ) is no more han ǫ. The arameer ǫ conrols a rade-off beween he size of H and he robabiliy o guess he correc ag. The lower bound of ǫ = / can be achieved if a large family can be oleraed and Wegman and Carer included several such examles in [9]. Those families are oo large o be usable in QKG, bu Wegman and Carer laer showed [20] ha by jus doubling he ossibiliy of a correc guess, a much smaller 2/-ASU 2 family can be consruced. Tha family is small enough for QKG, and alhough here are many oher similar families, he exac choice is no imoran and we will use heir original examle from [20] below. Pu in formal language, he auhenicaion roceeds as follows. Alice and Bob share a secre ey jus large enough o selec a hash funcion h H, 0 <. Alice wans Bob o have he message m A M and sends boh m A and A = h m A ). Bob verifies ha A really equals h m A ) and acces he message as auhenic if i does. The ey is hen discarded and never reused. Le us now inroduce Eve, who has conrol over he channel beween Alice and Bob and wans Bob o acce a faed message m E M. To her he secre ey is a random variable K uniform over is whole range 0 K <. If he ey is a random variable, so is he ag for her message T E = h K m E ). The firs condiion of Def. says ha if K is uniform over is whole range, so is T E see Fig. ). Eve can ae a guess, bu any guess is correc only wih he robabiliy PT E = ) = /. ) A word of warning is erhas aroriae regarding erminology, as hese hash funcions are quie differen from cryograhically secure hash funcions someimes menioned in connecion wih auhenicaion. I is imossible o consruc unbreaable cryograhically secure hash funcions see e.g. [23]). They have similariies and boh deserve o be called hash funcions, bu he individual hash funcions of Wegman-Carer are no, and need no be, cryograhically secure in he classical sense.

3 SECURITY ASPECTS OF THE AUTHENTICATION USED IN QUANTUM CRYPTOGRAPHY 3 / Fig.. In Wegman-Carer auhenicaion, a given message m organizes he eys ino subses ha each ma he message o one value of he ag = h m), and hese subses are of equal size for an ǫ-asu 2 family of hash funcions). Tha is, o Eve, he ey K is comleely unnown uniformly disribued), and herefore so is he ag T E = h K m E ) for her message m E. / / / h m A) = A {}}{ reordered) Eve may also wai unil Alice ries o send an auhenicaed message o Bob, ic u he message and he ag, and mae sure Bob never see hem. Wih boh m A and A = h K m A ) a her disosal she can, given enough comuing ower, rule ou all eys ha do no mach and be lef wih jus / of he eys o guess from, see Fig. 2. However, he second condiion of Def. says ha even wih his nowledge, any ag value guessed by Eve is correc equal o he correc ag T E ) for her m E m A wih K uniform over is whole range) a bes wih he robabiliy P T E = h K m A ) = A ) ǫ 2) The arameer ǫ is clearly an uer limi on he robabiliy ha Eve maes he righ guess and manages o fool Bob ino acceing a fae message, a leas if Eve nows nohing abou he ey beforehand. In fac, Wegman-Carer auhenicaion is cryograhically secure in he following way: he robabiliy of Eve guessing he ag value for her message m E does no deend on which message m A Alice sends, as long as i is no equal o Eve s message m E. The robabiliy is always less han ǫ, indeendenly of m A, or u in oher words, here are no message-ag airs from Alice ha are significanly weaer han ohers. Even if Eve was allowed o choose m A differen from m E ) and was given he ag for ha message, she would no be in an imroved siuaion as regards he ag T E corresonding o her message m E. This may no seem imoran a his oin, bu will rove o be ineresing laer. If Eve ries o brea he auhenicaion in he above scenario and fails, her resence will be deeced and he QKG round will be abored. A comlicaing facor is ha he auhenicaion can fail from ime o ime wihou Eve because of channel noise, so Eve can ry o brea he auhenicaion bu o avoid raising susicion she should only do his seldom. The arameer ǫ should be chosen so ha even if Eve does his, he execed life of he sysem is long enough for Alice s and ǫ Fig. 2. In Wegman-Carer auhenicaion, a given message-ag air corresonds o one subse of eys ha ma he message ono ha ag value. A differen message induces a differen family of subses, and will sread ou he remaining eys so ha all ag values have a robabiliy less han or equal o ǫ for an ǫ-asu 2 family of hash funcions, if he eys are equally robable). Bob s needs. For he 2/-ASU 2 family from [20], a 32-bi ag would give a robabiliy of 2 3 o generae he correc ag afer having seen a message-ag air. On average, Eve would need aems. If one exra failure of he auhenicaion, e.g., every en seconds is no deecable, i would ae on average 680 years o guess he correc ag. This would be long enough for mos uses. III. PARTIALLY KNOWN KEY Above, we have assumed ha Eve has no informaion on he secre ey used in he auhenicaion, i.e., o Eve he ey K was a random variable uniform over is whole range. This is an unrealisic requiremen in QKG. Informaion leaage in he quanum ransmission hase is unavoidable bu he damage can be reduced by using rivacy amlificaion, which will reduce Eve s nowledge of he ey significanly, bu no all he way o nohing. As soon as he whole re-shared ey is used Alice and Bob will have o sar rusing auhenicaion wih a ey ha is no comleely secre. If Eve has some informaion on he ey, bu has no seen any message-ag air as deiced in Fig. 3), an uer bound for he chance ha Eve s generaed, or guessed, ag value

4 SECURITY ASPECTS OF THE AUTHENTICATION USED IN QUANTUM CRYPTOGRAPHY 4 / / 2 h m A) = A {}}{ / a) A nonuniform disribuion on induces a nonuniform disribuion on. 2 / reordered) / b) The disribuion can be very sew, for insance if Eve holds informaion ha allows her o rule ou some eys enirely. Fig. 3. Eve s informaion on he ey will induce a nonuniform disribuion on, and also on. is correc is he sum of robabiliies for he / mos robable eys. The min-enroy of he ey, H K) = min log2 PK = ) ), 3) rovides a somewha looser bu simler bound given by PT E = ) 2 H K), 4) corresonding o he exreme case for which he / mos robable eys have equal robabiliy. If Eve nows nohing abou he ey her ey min-)enroy equals he size of he ey and he robabiliy is bounded by) / as execed. If Eve has only lile nowledge, here is only a lile increase in her robabiliy of guessing he correc ag for her message. However, his changes radically in he case where Eve has a lile nowledge on he ey and ics u a message-ag air see Fig. 4). She again gains addiional informaion ha may increase her nowledge abou he ey, bu his increase is no bounded. Tha is, she can guess generae) he correc ag E Fig. 4. If Eve can rule ou cerain eys wih her very limied informaion, i may haen ha Alice s message-ag air allows Eve o rule ou all eys exce for a few ha all ma her message o he same ag. She can now send her message and ha ag, nowing ha Bob will acce i. There is no ris whasoever ha Bob will deec her. for her m E m A wih he robabiliy P T E = h K m A ) = A ) 5) There is no longer any bound on his robabiliy. This is because, wih informaion abou he ey, K is no longer uniformly disribued o Eve). In his siuaion, Eve has revious nowledge abou which values of he ey ha are ossible. Here, his nowledge is obained from earlier rounds of he QKG roocol, in our examle in Fig. 4 is in he form of a lis of eys ha she can rule ou from he ossible eys: H E = H \ {h,, h n }. 6) In addiion, he message-ag air m A + A ha Eve receives from Alice idenifies a subse of eys hash funcions) of size / from which he ey mus have been drawn: H A = {h H : hm A ) = A }. 7) Given ha he se of ossible eys is H E raher han H, he final se of ossible eys is no H A bu H AE = H A H E 8)

5 SECURITY ASPECTS OF THE AUTHENTICATION USED IN QUANTUM CRYPTOGRAPHY 5 If only one ey remains in his subse, Eve will now which ey was drawn. In his case she can simly creae a ag using he idenified ey. Bu i is also ossible o use he resul if more han one ey is resen in H AE. More secifically, when H AE ǫ/, 9) here may exis messages m ha are such ha h, h 2 H AE, h m) = h 2 m). 0) Tha is, for his message, all remaining eys ma o he same ag. The maximum number ǫ/ is given in requiremen b) in Def.. The number of messages wih his roery will increase as H AE decreases from ǫ/. If one of hese messages coincides wih m E, Eve can successfully brea he auhenicaion. She may no now exacly which ey was drawn bu she nows enough o creae he correc ag E = h m E ) for her message. Even when her referred message m E does no coincide wih one of he above messages, Eve has some freedom in choosing m E and may be able o adjus her message so ha she can use he above echnique. We will from here on assume ha his is he case: ha Eve can choose her message m E so ha she can generae he correc ag E for i as soon as ineq. 9) holds. The ne resul is ha Eve has informaion a hand ha enables her o deermine wheher her aac will be successful. In shor: Eve can choose o a he quanum channel in such a way ha he disurbance is below he noise limi se by Alice and Bob. Her aim is no o use he informaion she gahers o decode messages sen wih he generaed ey, bu o brea he auhenicaion of he QKG sysem. She hen inerces each message-ag air sen by Alice and uses he addiional informaion rovided by he air o deermine he ag for her forged message. She will only be successful occasionally, when ) he message m A sen by Alice is such ha a leas one of he subses deiced in Fig. 4 conain less han ǫ/ eys, and 2) he ey, randomly drawn o Eve, ends u in such a subse. Because Eve can deermine when he aac is successful, i.e., when he remaining eys all ma her message o he same ag, she will only relace Alices message-ag air on he classical channel when she is cerain of success. As long as Eve says assive she does no ris deecion, and she acively relaces he message-ag air only when her ag is correc. This aac is ossible o erform each round, insead of he sarse aems ha he reviosly menioned guessing sraegy allowed. In wha follows, o simlify he analysis, we will assume ha Eve erforms he acive relacemen only when she is cerain of success, even hough his is no sricly necessary. Eve can calculae he robabiliy of success from similar consideraions as used above, even when i is less han one. I would be ossible o devise a more comlicaed guessing sraegy o be used by Eve in his case, bu ha is beyond he scoe of his aer. IV. SECURITY? Le us assess he severiy of his hrea by esimaing he robabiliy ha Eve receives he righ message-ag air given only a lile informaion on he ey. We will assume ha Eve uses all her informaion o eliminae r) eys wih r, see Fig. 3b)), and hus ha he rue ey o her is drawn from he remaining r = H E eys wih equal robabiliy. This assumion simlifies our calculaions bu is no really essenial. The quesion is now how many eys remain in H AE = H A H E afer receiving a message-ag air from Alice. Firs, we will also assume ha Eve can do nohing more han remove eys essenially a random wih her iniial nowledge of he ey. The message-ag air ha Eve receives corresonds o drawing / eys from H wihou reurning hem. The rue ey will always be resen in he drawn eys and is of course one of he remaining, ossible eys), while he oher / eys are drawn from eys of which r are ossible, i.e., belong o H E. The number of drawn ossible eys X is a random variable, and removing he rue ey, he random variable X ) will be hyergeomerically disribued: X ) Hy, ) r,. ) In oher words, P X = i) = ) r r ) i / i ). 2) / The ineresing case is when he number of eys drawn is less han ǫ/, or ) ) r r P X ǫ ) ǫ/ i / i = ). i= / 3) This robabiliy is comlicaed o evaluae bu can be esimaed using he Chebyshev inequaliy 2 P X µ cσ) /c 2, 4) which yields P X ǫ ) = P µ X µ ǫ ) P X µ µ ǫ ) = P X µ µ ǫ σ σ 2 ) σ 2. µ ǫ 5) In our case he mean value is ) r µ = + 6) 2 I can be noed ha he Chebyshev inequaliy is raher loose, bu i is generally valid and will be sufficien for our uroses here.

6 SECURITY ASPECTS OF THE AUTHENTICATION USED IN QUANTUM CRYPTOGRAPHY 6 and he sandard deviaion is ) r σ = r ) /. 2 7) This simlifies considerably in he asymoic regime where we have and P µ = r X ǫ ) r r/, 8) and σ = r r) r ǫ r r). 9) ) 2 = r r) r ǫ) 2. 20) Furher, when r ǫ his simlifies o P X ǫ ) r r, 2) In racice, he righ-hand consan is very small. The 2/- ASU 2 hash family from [20] is of size = 4 log log M, 22) e.g., for a 00 bi message and a 32 bi ag, his ranslaes o = 2 276, 23) i.e., roughly 2 bi of ey used. If Eve is allowed o have, e.g., /8 bi iniial nowledge of he ey so ha r 0.97), her chance o brea he sysem wihou fearing deecion is less han each round. A 000 rounds/s, Eve s execed ime o brea he sysem would be a leas years, much longer han when jus guessing once every en seconds. Remember ha using his aroach, Eve does no guess he ag value bu only ries o brea he sysem when she is cerain of success. This resul is he same as in [24]; even if Eve has a lile informaion on he ey used for auhenicaion, her chances a breaing he auhenicaion does no increase subsanially. However, Eve can do more han jus wai for he righ message-ag air o arrive; she may have a cunning lan. V. A POSSIBLE ATTACK Eve s main obsacle above is he Chebyshev inequaliy. Viewed in anoher manner, he cenral limi heorem ensures ha mos of he subses will, wih high robabiliy, conain a number of remaining eys very close o r/ ǫ/. Eve s chances of breaing he auhenicaion would increase dramaically if he remaining eys were sli ino subses of only wo inds: wih eiher ǫ/ or / eys in each subse. This will change he robabiliy disribuion discussed above, so ha he argumen ha used he Chebyshev inequaliy does no aly anymore. Eve would hen be able o brea he auhenicaion if he correc ey would haen o fall in a subse wih ǫ/ remaining eys, since we assume ha Eve has enough freedom o generae a message-ag air of her own as soon as his haens. There are a few mehods ha Eve could use o arrange he subses o her liing, bu he easies mehod would be o change he message: he message from Alice o Bob conains a lo of daa ha describes wha has haened on he quanum channel. And Eve can access and change wha haens on he quanum channel. In essence, Eve has some influence on he conen of he message ha Alice sends, and as a consequence, Eve can change he subses. Noe ha his aac would use a differen ye of changes on he quanum channel han hose caused by Eve exracing informaion from i, and need no be deecable as an increased noise level in he reconciliaion se of he roocol. The aac is differen in is aim since i is no inended o increase Eve s informaion on he ey, bu raher o maximize he usefulness of he informaion she has obained in a revious round. Assuming ha Eve does his as bes as she can, he subses may well be such ha here remains eiher ǫ/ or / eys in each subse see Fig. 5). / Fig. 5. Eve may be able o influence he message from Alice o arrange for subses of wo inds, eiher wih ǫ/ remaining ey values on he lef in he figure) or / remaining ey values on he righ), o have as many subses as ossible wih ǫ/ remaining ey values. In his siuaion, he robabiliy of success is insead he robabiliy ha he correc ey ends u in one of he subses wih ǫ/ remaining eys in i. The number of such subses are eliminaed eys n = eliminaed eys in a good subse r) = ǫ)/ and he robabiliy of ending u in such a subse is P X ǫ ) ossible eys in good subses = ossible eys = nǫ/ = r ǫ r r ǫ. 24) 25) The change in robabiliy disribuion gives a dramaic increase in robabiliy from he bound in ineq. 2) o he value in eqn. 25). The difference beween / and ǫ/ ǫ) is immense for our 2/-ASU 2 hash family, since eqn. 22) gives = 2 4log log M = ǫ < ǫ ǫ. 26) In our examle, using a 2/-ASU 2 hash family, a 32 bi ag and /8 bi iniial nowledge of he ey so ha r 0.970), he robabiliy of success is Again, a 000 rounds/s, Eve s execed ime o brea he sysem would be jus nine monhs. Yes, read ha again. Nine monhs o

7 SECURITY ASPECTS OF THE AUTHENTICATION USED IN QUANTUM CRYPTOGRAPHY 7 brea a QKG sysem wihou ris of deecion. The immense difference beween he wo execed imes above suggess ha his is a roblem even when Eve is no able o obain he ideal subses. The real heoreical reason for he exisence of his aac is ha Wegman-Carer auhenicaion wih a arially nown ey is no cryograhically secure in he way discussed in Secion II, concerning Wegman-Carer auhenicaion wih a comleely secre ey. Here, he robabiliy of Eve guessing he ag value for her message m E does deend on which message m A Alice sends even when i is no equal o Eve s message m E ). Pu in oher words, here are message-ag airs from Alice ha are weaer han ohers. In QKG, Eve can influence m A via he quanum channel and is given he ag for ha message, and his will imrove her siuaion as regards he deerminaion of he correc ag E corresonding o her message m E. I is clear ha simly sending he ag along wih he message o rove auheniciy does no wor in he long run if Eve has a small bu non-zero nowledge of he auhenicaion ey used and can influence he message Alice wans o send. The lile informaion carried by he ag can be enough ogeher wih wha Eve already has, o mae Eve cerain ha her aac will be successful. The robabiliy of his haening in a run is small bu Eve can wai, no rying o brea he auhenicaion unil she is sure of success. VI. PREVENTION To reven Eve from breaing he QKG sysem, Alice and Bob may adjus he arameer choices of by using a larger ag, or r by requiring more rivacy amlificaion. This o mae he execed ime-of-life of he sysem long enough o sui heir ase, bu his will use u more ey in he auhenicaion, and/or require hem o sacrifice more ey during rivacy amlificaion. The ey roducion rae of such a sysem will be lowered, and given he meager ouu of he sysems used oday, his is robably no desirable. Minimizing his effec would require a deailed analysis of each individual QKG roocol. A simler, more efficien and generic fix would be o delay he second ransfer of informaion o Eve so ha she has o mae he decision o ry o brea he auhenicaion before she nows if she will succeed, i.e., before she has received he ag. The mos obvious way o do his is o force Eve o send he message Alice s or her own) o Bob before she ges hold of he ag. One soluion is using synchronized clocs and sending messages and ags a re-agreed imes, wih a ause longer han he recisions of he clocs. Synchronized clocs are already recommended for oher securiy uroses in resen QKG sysems []. Anoher soluion ha does no need clocs is for Alice o send he message o Bob, who relies wih a large random number never seen by Eve or used before, a sal. Alice calculaes a ag based on he concaenaion of he message and he sal and sends ha ag o Bob. Before Eve has seen he ag she will no now if she will be able o forge a message/sal/ag rile, and she will no see he ag before she sends a sal o Alice. Eve can eiher send he real message o Bob and fail bu say undeeced or send Alice a faed sal and/or Bob a faed message. In he laer case, wih he above arameer choices, i is almos cerain ha he ag she receives from Alice won give he aroriae addiional informaion, which reduces his aac o he simle guessing sraegy iniially described above. VII. CONCLUSIONS To conclude, even hough Wegman-Carer auhenicaion seems secure when used wih a arially nown ey [24], he usual imlemenaion of a QKG sysem conains an addiional subley. Eve can influence he message o be sen, and ogeher wih arial nowledge of he ey, his oens u Eve s ossibiliies. Forunaely a simle remedy exiss: force Eve o mae her aac before she nows ha i will succeed, by maing sure Alice will no send he auhenicaion ag unil eiher Bob has received he message or Eve has aemed breaing he sysem. A real-world imlemenaion of a QKG sysem migh already have similar roeries since a) he messages in quesion are o a large exen comosed of random bisequences, and b) a round normally consiss of a dialogue of several messages and an auhenicaion ag for all of hem a he very end of he round. Wheher his is enough o ee he sysem secure deends on he deails of he sysem, bu imlemening he soluion roosed here is chea and requires no dee analysis of he sysem. We would herefore recommend doing jus ha in fuure QKG sysems. REFERENCES [] C. H. Benne and G. Brassard, Quanum cryograhy: Public ey disribuion and coin ossing, in Proc. of he IEEE In. Conf. on Comuers, Sysems, and Signal Processing, Bangalore, India. New Yor: IEEE, 984, [2] A. K. Eer, Quanum cryograhy based on Bell s heorem, Phys. Rev. Le., vol. 67, , 99. [3] C. H. Benne, F. Bessee, G. Brassard, L. Salvail, and J. Smolin, Exerimenal quanum cryograhy, J. Cryo., vol. 5,. 3 28, 992. [4] N. Gisin, G. Ribordy, W. Tiel, and H. Zbinden, Quanum cryograhy, Rev. Mod. Phys., vol. 74, , [5] J. S. Bell, On he Einsein-Podolsy-Rosen aradox, Physics, vol., , 964. [6] J. F. Clauser, Exerimenal disincion beween he quanum and classical field-heoreic redicions for he hooelecric effec, Phys. Rev. D, vol. 9, , 974. [7] W. K. Wooers and W. H. Zure, A single quanum canno be cloned, Naure London), vol. 299, , 982. [8] R. L. Rives, A. Shamir, and L. Adleman, A mehod for obaining digial signaures and ublic-ey cryosysems, Communicaions of he ACM, vol. 2, , 978. [9] D. Mayers, Quanum ey disribuion and sring oblivious ransfer in noisy channels, in Advances in cryology Proceedings of Cryo 96. Sringer, 996, [0] D. Mayers and A. Yao, Quanum cryograhy wih imerfec aaraus, in Proceedings 39h Annual Symosium on Foundaions of Comuer Science. Los Alamios, CA, USA: IEEE Comu. Soc, 998, [] N. Lüenhaus, Esimaes for racical quanum cryograhy, Phys. Rev. A, vol. 59, , 999. [2] P. W. Shor and J. Presill, Simle roof of securiy of he BB84 quanum ey disribuion roocol, Phys. Rev. Le., vol. 85, , [3] D. S. Nai, C. G. Peerson, A. G. Whie, A. J. Berglund, and P. G. Kwia, Enangled sae quanum cryograhy: Eavesdroing on he Eer roocol, Phys. Rev. Le., vol. 84, , 2000.

8 SECURITY ASPECTS OF THE AUTHENTICATION USED IN QUANTUM CRYPTOGRAPHY 8 [4] G. Brassard, N. Lüenhaus, T. Mor, and B. C. Sanders, Limiaions on racical quanum cryograhy, Phys. Rev. Le., vol. 85, , [5] G. Brassard and L. Salvail, Secre ey reconciliaion by ublic discussion, in Advances in Cryology: EUROCRYPT 93, T. Helleseh, Ed., vol Sringer, 994, [6] C. H. Benne, G. Brassard, and J.-M. Rober, How o reduce your enemy s informaion, in Advances in Cryology Proceedings of Cryo 85, ser. Lecure Noes in Comuer Science, vol. 28. Sringer Berlin), 986, [7], Privacy amlificaion by ublic discussion, SIAM J. of Com., vol. 7, , 988. [8] C. H. Benne, G. Brassard, C. Creeau, and U. M. Maurer, Generalized rivacy amlificaion, IEEE Transacions on Informaion Theory, vol. 4,. 95, 995. [9] M. N. Wegman and J. L. Carer, Universal classes of hash funcions, J. of Comu. Sysem Sci., vol. 8, , 979. [20], New hash funcions and heir use in auhenicaion and se equaliy, J. of Comu. Sysem Sci., vol. 22, , 98. [2] D. R. Sinson, Universal hashing and auhenicaion codes, in Advances in Cryology: Proceedings of Cryo 9, J. Feigenbaum, Ed., vol Sringer, 99, [22] B. Schneier, Alied Cryograhy. Wiley, 993. [23] N. Ferguson and B. Schneier, Pracical Cryograhy. Wiley, [24] M. Ben-Or, M. Horodeci, D. W. Leung, D. Mayers, and J. Oenheim, The universal comosable securiy of quanum ey disribuion, in Theory of Cryograhy: Second Theory of Cryograhy Conference, TCC 2005, ser. Lecure Noes in Comuer Science, J. Kilian, Ed., vol Sringer, 2005,

Petri Nets for Object-Oriented Modeling

Petri Nets for Object-Oriented Modeling Peri Nes for Objec-Oriened Modeling Sefan Wi Absrac Ensuring he correcness of concurren rograms is difficul since common aroaches for rogram design do no rovide aroriae mehods This aer gives a brief inroducion

More information

4 Error Control. 4.1 Issues with Reliable Protocols

4 Error Control. 4.1 Issues with Reliable Protocols 4 Error Conrol Jus abou all communicaion sysems aemp o ensure ha he daa ges o he oher end of he link wihou errors. Since i s impossible o build an error-free physical layer (alhough some shor links can

More information

Coded Caching with Multiple File Requests

Coded Caching with Multiple File Requests Coded Caching wih Muliple File Requess Yi-Peng Wei Sennur Ulukus Deparmen of Elecrical and Compuer Engineering Universiy of Maryland College Park, MD 20742 ypwei@umd.edu ulukus@umd.edu Absrac We sudy a

More information

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes.

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes. 8.F Baery Charging Task Sam wans o ake his MP3 player and his video game player on a car rip. An hour before hey plan o leave, he realized ha he forgo o charge he baeries las nigh. A ha poin, he plugged

More information

Control of Job Arrivals with Processing Time Windows into Batch Processor Buffer

Control of Job Arrivals with Processing Time Windows into Batch Processor Buffer onrol of Job Arrivals wih Processing ime Windows ino Bach Processor John Benedic. AJAN 1, Aa Iyer SIVAKUMAR 1, and Sanley B. GERSHWIN 2 1 Nanyang echnological Universiy 2 Massachuses Insiue of echnology

More information

Data Structures and Algorithms

Data Structures and Algorithms Daa Srucures and Algorihms The maerial for his lecure is drawn, in ar, from The Pracice of Programming (Kernighan & Pike) Chaer 2 1 Goals of his Lecure Hel you learn (or refresh your memory) abou: Common

More information

A new method for 3-dimensional roadway design using visualization techniques

A new method for 3-dimensional roadway design using visualization techniques Urban Transor XIII: Urban Transor and he Environmen in he 2s Cenury 23 A new mehod for 3-dimensional roadway design using visualizaion echniques G. Karri & M. K. Jha Dearmen of Civil Engineering, Morgan

More information

NEWTON S SECOND LAW OF MOTION

NEWTON S SECOND LAW OF MOTION Course and Secion Dae Names NEWTON S SECOND LAW OF MOTION The acceleraion of an objec is defined as he rae of change of elociy. If he elociy changes by an amoun in a ime, hen he aerage acceleraion during

More information

A Matching Algorithm for Content-Based Image Retrieval

A Matching Algorithm for Content-Based Image Retrieval A Maching Algorihm for Conen-Based Image Rerieval Sue J. Cho Deparmen of Compuer Science Seoul Naional Universiy Seoul, Korea Absrac Conen-based image rerieval sysem rerieves an image from a daabase using

More information

COSC 3213: Computer Networks I Chapter 6 Handout # 7

COSC 3213: Computer Networks I Chapter 6 Handout # 7 COSC 3213: Compuer Neworks I Chaper 6 Handou # 7 Insrucor: Dr. Marvin Mandelbaum Deparmen of Compuer Science York Universiy F05 Secion A Medium Access Conrol (MAC) Topics: 1. Muliple Access Communicaions:

More information

Lecture 18: Mix net Voting Systems

Lecture 18: Mix net Voting Systems 6.897: Advanced Topics in Crypography Apr 9, 2004 Lecure 18: Mix ne Voing Sysems Scribed by: Yael Tauman Kalai 1 Inroducion In he previous lecure, we defined he noion of an elecronic voing sysem, and specified

More information

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR . ~ PART 1 c 0 \,).,,.,, REFERENCE NFORMATON CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONTOR n CONTROL DATA 6400 Compuer Sysems, sysem funcions are normally handled by he Monior locaed in a Peripheral

More information

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report)

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report) Implemening Ray Casing in Terahedral Meshes wih Programmable Graphics Hardware (Technical Repor) Marin Kraus, Thomas Erl March 28, 2002 1 Inroducion Alhough cell-projecion, e.g., [3, 2], and resampling,

More information

CENG 477 Introduction to Computer Graphics. Modeling Transformations

CENG 477 Introduction to Computer Graphics. Modeling Transformations CENG 477 Inroducion o Compuer Graphics Modeling Transformaions Modeling Transformaions Model coordinaes o World coordinaes: Model coordinaes: All shapes wih heir local coordinaes and sies. world World

More information

Assignment 2. Due Monday Feb. 12, 10:00pm.

Assignment 2. Due Monday Feb. 12, 10:00pm. Faculy of rs and Science Universiy of Torono CSC 358 - Inroducion o Compuer Neworks, Winer 218, LEC11 ssignmen 2 Due Monday Feb. 12, 1:pm. 1 Quesion 1 (2 Poins): Go-ack n RQ In his quesion, we review how

More information

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks Less Pessimisic Wors-Case Delay Analysis for Packe-Swiched Neworks Maias Wecksén Cenre for Research on Embedded Sysems P O Box 823 SE-31 18 Halmsad maias.wecksen@hh.se Magnus Jonsson Cenre for Research

More information

4. Minimax and planning problems

4. Minimax and planning problems CS/ECE/ISyE 524 Inroducion o Opimizaion Spring 2017 18 4. Minima and planning problems ˆ Opimizing piecewise linear funcions ˆ Minima problems ˆ Eample: Chebyshev cener ˆ Muli-period planning problems

More information

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Tes - Accredied Configuraion Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Quesion 1 of 50. Which of he following saemens is NOT abou Palo Alo Neworks firewalls? Sysem defauls may be resored by performing

More information

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008 MATH 5 - Differenial Equaions Sepember 15, 8 Projec 1, Fall 8 Due: Sepember 4, 8 Lab 1.3 - Logisics Populaion Models wih Harvesing For his projec we consider lab 1.3 of Differenial Equaions pages 146 o

More information

An Improved Square-Root Nyquist Shaping Filter

An Improved Square-Root Nyquist Shaping Filter An Improved Square-Roo Nyquis Shaping Filer fred harris San Diego Sae Universiy fred.harris@sdsu.edu Sridhar Seshagiri San Diego Sae Universiy Seshigar.@engineering.sdsu.edu Chris Dick Xilinx Corp. chris.dick@xilinx.com

More information

Project #1 Math 285 Name:

Project #1 Math 285 Name: Projec #1 Mah 85 Name: Solving Orinary Differenial Equaions by Maple: Sep 1: Iniialize he program: wih(deools): wih(pdeools): Sep : Define an ODE: (There are several ways of efining equaions, we sar wih

More information

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding Moivaion Image segmenaion Which pixels belong o he same objec in an image/video sequence? (spaial segmenaion) Which frames belong o he same video sho? (emporal segmenaion) Which frames belong o he same

More information

EECS 487: Interactive Computer Graphics

EECS 487: Interactive Computer Graphics EECS 487: Ineracive Compuer Graphics Lecure 7: B-splines curves Raional Bézier and NURBS Cubic Splines A represenaion of cubic spline consiss of: four conrol poins (why four?) hese are compleely user specified

More information

Voltair Version 2.5 Release Notes (January, 2018)

Voltair Version 2.5 Release Notes (January, 2018) Volair Version 2.5 Release Noes (January, 2018) Inroducion 25-Seven s new Firmware Updae 2.5 for he Volair processor is par of our coninuing effors o improve Volair wih new feaures and capabiliies. For

More information

Real Time Integral-Based Structural Health Monitoring

Real Time Integral-Based Structural Health Monitoring Real Time Inegral-Based Srucural Healh Monioring The nd Inernaional Conference on Sensing Technology ICST 7 J. G. Chase, I. Singh-Leve, C. E. Hann, X. Chen Deparmen of Mechanical Engineering, Universiy

More information

Quantitative macro models feature an infinite number of periods A more realistic (?) view of time

Quantitative macro models feature an infinite number of periods A more realistic (?) view of time INFINIE-HORIZON CONSUMPION-SAVINGS MODEL SEPEMBER, Inroducion BASICS Quaniaive macro models feaure an infinie number of periods A more realisic (?) view of ime Infinie number of periods A meaphor for many

More information

MB86297A Carmine Timing Analysis of the DDR Interface

MB86297A Carmine Timing Analysis of the DDR Interface Applicaion Noe MB86297A Carmine Timing Analysis of he DDR Inerface Fujisu Microelecronics Europe GmbH Hisory Dae Auhor Version Commen 05.02.2008 Anders Ramdahl 0.01 Firs draf 06.02.2008 Anders Ramdahl

More information

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional);

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional); QoS in Frame Relay Frame relay characerisics are:. packe swiching wih virual circui service (virual circuis are bidirecional);. labels are called DLCI (Daa Link Connecion Idenifier);. for connecion is

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Disribued Compuing Group Chaper 8 LOCATION SERVICES Mobile Compuing Winer 2005 / 2006 Overview Mobile IP Moivaion Daa ransfer Encapsulaion Locaion Services & Rouing Classificaion of locaion services Home

More information

Announcements For The Logic of Boolean Connectives Truth Tables, Tautologies & Logical Truths. Outline. Introduction Truth Functions

Announcements For The Logic of Boolean Connectives Truth Tables, Tautologies & Logical Truths. Outline. Introduction Truth Functions Announcemens For 02.05.09 The Logic o Boolean Connecives Truh Tables, Tauologies & Logical Truhs 1 HW3 is due nex Tuesday William Sarr 02.05.09 William Sarr The Logic o Boolean Connecives (Phil 201.02)

More information

A Principled Approach to. MILP Modeling. Columbia University, August Carnegie Mellon University. Workshop on MIP. John Hooker.

A Principled Approach to. MILP Modeling. Columbia University, August Carnegie Mellon University. Workshop on MIP. John Hooker. Slide A Principled Approach o MILP Modeling John Hooer Carnegie Mellon Universiy Worshop on MIP Columbia Universiy, Augus 008 Proposal MILP modeling is an ar, bu i need no be unprincipled. Slide Proposal

More information

Gauss-Jordan Algorithm

Gauss-Jordan Algorithm Gauss-Jordan Algorihm The Gauss-Jordan algorihm is a sep by sep procedure for solving a sysem of linear equaions which may conain any number of variables and any number of equaions. The algorihm is carried

More information

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012 EDA421/DIT171 - Parallel and Disribued Real-Time Sysems, Chalmers/GU, 2011/2012 Lecure #4 Updaed March 16, 2012 Aemps o mee applicaion consrains should be done in a proacive way hrough scheduling. Schedule

More information

An efficient approach to improve throughput for TCP vegas in ad hoc network

An efficient approach to improve throughput for TCP vegas in ad hoc network Inernaional Research Journal of Engineering and Technology (IRJET) e-issn: 395-0056 Volume: 0 Issue: 03 June-05 www.irje.ne p-issn: 395-007 An efficien approach o improve hroughpu for TCP vegas in ad hoc

More information

An Efficient Delivery Scheme for Coded Caching

An Efficient Delivery Scheme for Coded Caching 201 27h Inernaional Teleraffic Congress An Efficien Delivery Scheme for Coded Caching Abinesh Ramakrishnan, Cedric Wesphal and Ahina Markopoulou Deparmen of Elecrical Engineering and Compuer Science, Universiy

More information

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters SHORT TERM PREDICTIONS A MONITORING SYSTEM by Michiel Helder and Marielle C.T.A Geurs Hoofdkanoor PTT Pos / Duch Posal Services Headquarers Keywords macro ime series shor erm predicions ARIMA-models faciliy

More information

1 œ DRUM SET KEY. 8 Odd Meter Clave Conor Guilfoyle. Cowbell (neck) Cymbal. Hi-hat. Floor tom (shell) Clave block. Cowbell (mouth) Hi tom.

1 œ DRUM SET KEY. 8 Odd Meter Clave Conor Guilfoyle. Cowbell (neck) Cymbal. Hi-hat. Floor tom (shell) Clave block. Cowbell (mouth) Hi tom. DRUM SET KEY Hi-ha Cmbal Clave block Cowbell (mouh) 0 Cowbell (neck) Floor om (shell) Hi om Mid om Snare Floor om Snare cross sick or clave block Bass drum Hi-ha wih foo 8 Odd Meer Clave Conor Guilfole

More information

Data Structures and Algorithms. The material for this lecture is drawn, in part, from The Practice of Programming (Kernighan & Pike) Chapter 2

Data Structures and Algorithms. The material for this lecture is drawn, in part, from The Practice of Programming (Kernighan & Pike) Chapter 2 Daa Srucures and Algorihms The maerial for his lecure is drawn, in par, from The Pracice of Programming (Kernighan & Pike) Chaper 2 1 Moivaing Quoaion Every program depends on algorihms and daa srucures,

More information

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL Klečka Jan Docoral Degree Programme (1), FEEC BUT E-mail: xkleck01@sud.feec.vubr.cz Supervised by: Horák Karel E-mail: horak@feec.vubr.cz

More information

Learning in Games via Opponent Strategy Estimation and Policy Search

Learning in Games via Opponent Strategy Estimation and Policy Search Learning in Games via Opponen Sraegy Esimaion and Policy Search Yavar Naddaf Deparmen of Compuer Science Universiy of Briish Columbia Vancouver, BC yavar@naddaf.name Nando de Freias (Supervisor) Deparmen

More information

! errors caused by signal attenuation, noise.!! receiver detects presence of errors:!

! errors caused by signal attenuation, noise.!! receiver detects presence of errors:! Daa Link Layer! The Daa Link layer can be furher subdivided ino:!.! Logical Link Conrol (LLC): error and flow conrol!.! Media Access Conrol (MAC): framing and media access! differen link proocols may provide

More information

STEREO PLANE MATCHING TECHNIQUE

STEREO PLANE MATCHING TECHNIQUE STEREO PLANE MATCHING TECHNIQUE Commission III KEY WORDS: Sereo Maching, Surface Modeling, Projecive Transformaion, Homography ABSTRACT: This paper presens a new ype of sereo maching algorihm called Sereo

More information

Chapter 3 MEDIA ACCESS CONTROL

Chapter 3 MEDIA ACCESS CONTROL Chaper 3 MEDIA ACCESS CONTROL Overview Moivaion SDMA, FDMA, TDMA Aloha Adapive Aloha Backoff proocols Reservaion schemes Polling Disribued Compuing Group Mobile Compuing Summer 2003 Disribued Compuing

More information

Optimal Crane Scheduling

Optimal Crane Scheduling Opimal Crane Scheduling Samid Hoda, John Hooker Laife Genc Kaya, Ben Peerson Carnegie Mellon Universiy Iiro Harjunkoski ABB Corporae Research EWO - 13 November 2007 1/16 Problem Track-mouned cranes move

More information

Automatic Calculation of Coverage Profiles for Coverage-based Testing

Automatic Calculation of Coverage Profiles for Coverage-based Testing Auomaic Calculaion of Coverage Profiles for Coverage-based Tesing Raimund Kirner 1 and Waler Haas 1 Vienna Universiy of Technology, Insiue of Compuer Engineering, Vienna, Ausria, raimund@vmars.uwien.ac.a

More information

Pointer Analysis. Outline: What is pointer analysis Intraprocedural pointer analysis Interprocedural pointer analysis. Andersen and Steensgaard

Pointer Analysis. Outline: What is pointer analysis Intraprocedural pointer analysis Interprocedural pointer analysis. Andersen and Steensgaard Poiner anaysis Poiner Anaysis Ouine: Wha is oiner anaysis Inrarocedura oiner anaysis Inerrocedura oiner anaysis Andersen and Seensgaard Poiner and Aias Anaysis Aiases: wo exressions ha denoe he same memory

More information

Evaluation and Improvement of Region-based Motion Segmentation

Evaluation and Improvement of Region-based Motion Segmentation Evaluaion and Improvemen of Region-based Moion Segmenaion Mark Ross Universiy Koblenz-Landau, Insiue of Compuaional Visualisics, Universiässraße 1, 56070 Koblenz, Germany Email: ross@uni-koblenz.de Absrac

More information

Efficient Computation of Parameterized Pointer Information for Interprocedural Analyses

Efficient Computation of Parameterized Pointer Information for Interprocedural Analyses Efficien Comuaion of Parameerized Poiner Informaion for Inerrocedural Analyses Donlin Lian and Mary Jean Harrold Collee of Comuin Georia Insiue of Technoloy Alana, GA 30332, USA {dlian,harrold}@cc.aech.edu

More information

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS Mohammed A. Aseeri and M. I. Sobhy Deparmen of Elecronics, The Universiy of Ken a Canerbury Canerbury, Ken, CT2

More information

4.1 3D GEOMETRIC TRANSFORMATIONS

4.1 3D GEOMETRIC TRANSFORMATIONS MODULE IV MCA - 3 COMPUTER GRAPHICS ADMN 29- Dep. of Compuer Science And Applicaions, SJCET, Palai 94 4. 3D GEOMETRIC TRANSFORMATIONS Mehods for geomeric ransformaions and objec modeling in hree dimensions

More information

Pricing Interest Rate and currency Swaps. Up-front fee. Valuation (MTM)

Pricing Interest Rate and currency Swaps. Up-front fee. Valuation (MTM) Pricing Ineres Rae an currency Swas. U-ron ee. Valuaion (MM) A lain vanilla swa ricing is he rocess o seing he ixe rae, so ha he iniial value o he swa is zero or boh couneraries. hereaer i is osiive or

More information

1.4 Application Separable Equations and the Logistic Equation

1.4 Application Separable Equations and the Logistic Equation 1.4 Applicaion Separable Equaions and he Logisic Equaion If a separable differenial equaion is wrien in he form f ( y) dy= g( x) dx, hen is general soluion can be wrien in he form f ( y ) dy = g ( x )

More information

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES B. MARCOTEGUI and F. MEYER Ecole des Mines de Paris, Cenre de Morphologie Mahémaique, 35, rue Sain-Honoré, F 77305 Fonainebleau Cedex, France Absrac. In image

More information

Exercise 3: Bluetooth BR/EDR

Exercise 3: Bluetooth BR/EDR Wireless Communicaions, M. Rupf. Exercise 3: Blueooh BR/EDR Problem 1: Blueooh Daa Raes. Consider he ACL packe 3-DH5 wih a maximum user payload of 1021 byes. a) Deermine he maximum achievable daa rae in

More information

Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links

Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links 1 in Low-uy-ycle Wireless Sensor Neworks wih Unreliable Links Shuo uo, Suden Member, IEEE, Liang He, Member, IEEE, Yu u, Member, IEEE, o Jiang, Suden Member, IEEE, and Tian He, Member, IEEE bsrac looding

More information

Non-uniform Subdivision for B-splines of Arbitrary Degree

Non-uniform Subdivision for B-splines of Arbitrary Degree Non-niform Sbdivision for B-slines of Arbirary Degree S. Schaefer, R. Goldman We resen an efficien algorihm for sbdividing non-niform B-slines of arbirary degree in a manner similar o he Lane-Riesenfeld

More information

Flow graph/networks MAX FLOW APPLICATIONS. Flow constraints. Max flow problem 4/26/12

Flow graph/networks MAX FLOW APPLICATIONS. Flow constraints. Max flow problem 4/26/12 4// low graph/nework MX LOW PPLIION 30, pring 0 avid Kauchak low nework direced, weighed graph (V, ) poiive edge weigh indicaing he capaciy (generally, aume ineger) conain a ingle ource V wih no incoming

More information

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding Indian Journal of Science and Technology, Vol 8(21), DOI: 10.17485/ijs/2015/v8i21/69958, Sepember 2015 ISSN (Prin) : 0974-6846 ISSN (Online) : 0974-5645 Analysis of Various Types of Bugs in he Objec Oriened

More information

Analyzing of RESPIRE, a novel approach to automatically blocking SYN flooding attacks

Analyzing of RESPIRE, a novel approach to automatically blocking SYN flooding attacks Analyzing of RESPIRE, a novel approach o auomaically blocking SYN flooding aacks ANDRÁS KORN, JUDIT GYIMESI, DR. GÁBOR FEHÉR Budapes Universiy of Technology and Economics, Deparmen of Telecommunicaion

More information

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services Improving he Efficiency of Dynamic Service Provisioning in Transpor Neworks wih Scheduled Services Ralf Hülsermann, Monika Jäger and Andreas Gladisch Technologiezenrum, T-Sysems, Goslarer Ufer 35, D-1585

More information

Video Content Description Using Fuzzy Spatio-Temporal Relations

Video Content Description Using Fuzzy Spatio-Temporal Relations Proceedings of he 4s Hawaii Inernaional Conference on Sysem Sciences - 008 Video Conen Descripion Using Fuzzy Spaio-Temporal Relaions rchana M. Rajurkar *, R.C. Joshi and Sananu Chaudhary 3 Dep of Compuer

More information

CS422 Computer Networks

CS422 Computer Networks CS422 Compuer Neworks Lecure 2 Physical Layer Dr. Xiaobo Zhou Deparmen of Compuer Science CS422 PhysicalLayer.1 Quesions of Ineress How long will i ake o ransmi a message? How many bis are in he message

More information

NRMI: Natural and Efficient Middleware

NRMI: Natural and Efficient Middleware NRMI: Naural and Efficien Middleware Eli Tilevich and Yannis Smaragdakis Cener for Experimenal Research in Compuer Sysems (CERCS), College of Compuing, Georgia Tech {ilevich, yannis}@cc.gaech.edu Absrac

More information

Definition and examples of time series

Definition and examples of time series Definiion and examples of ime series A ime series is a sequence of daa poins being recorded a specific imes. Formally, le,,p be a probabiliy space, and T an index se. A real valued sochasic process is

More information

Distributed Task Negotiation in Modular Robots

Distributed Task Negotiation in Modular Robots Disribued Task Negoiaion in Modular Robos Behnam Salemi, eer Will, and Wei-Min Shen USC Informaion Sciences Insiue and Compuer Science Deparmen Marina del Rey, USA, {salemi, will, shen}@isi.edu Inroducion

More information

Research Article Auto Coloring with Enhanced Character Registration

Research Article Auto Coloring with Enhanced Character Registration Compuer Games Technology Volume 2008, Aricle ID 35398, 7 pages doi:0.55/2008/35398 Research Aricle Auo Coloring wih Enhanced Characer Regisraion Jie Qiu, Hock Soon Seah, Feng Tian, Quan Chen, Zhongke Wu,

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Sociey Convenion Paper Presened a he 119h Convenion 2005 Ocober 7 10 New Yor, New Yor USA This convenion paper has been reproduced from he auhor's advance manuscrip, wihou ediing, correcions,

More information

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley.

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley. Shores Pah Algorihms Background Seing: Lecure I: Shores Pah Algorihms Dr Kieran T. Herle Deparmen of Compuer Science Universi College Cork Ocober 201 direced graph, real edge weighs Le he lengh of a pah

More information

Time Expression Recognition Using a Constituent-based Tagging Scheme

Time Expression Recognition Using a Constituent-based Tagging Scheme Track: Web Conen Analysis, Semanics and Knowledge Time Expression Recogniion Using a Consiuen-based Tagging Scheme Xiaoshi Zhong and Erik Cambria School of Compuer Science and Engineering Nanyang Technological

More information

The Roots of Lisp paul graham

The Roots of Lisp paul graham The Roos of Lisp paul graham Draf, January 18, 2002. In 1960, John McCarhy published a remarkable paper in which he did for programming somehing like wha Euclid did for geomery. 1 He showed how, given

More information

Fill in the following table for the functions shown below.

Fill in the following table for the functions shown below. By: Carl H. Durney and Neil E. Coer Example 1 EX: Fill in he following able for he funcions shown below. he funcion is odd he funcion is even he funcion has shif-flip symmery he funcion has quarer-wave

More information

A NOVEL THROUGHPUT AND PACKET DELAY ANALYSIS OF CONTROL SCHEME BASED ON A MARKOV CHAIN MODEL IN DENSE IEEE WLAN

A NOVEL THROUGHPUT AND PACKET DELAY ANALYSIS OF CONTROL SCHEME BASED ON A MARKOV CHAIN MODEL IN DENSE IEEE WLAN Inernaional Journal of Mechanical Engineering and echnology (IJME) Volume 8, Issue 7, July 207,. 604 62, Aricle ID: IJME_08_07_068 Available online a h://www.iaeme.com/ijme/issues.as?jyeijme&vye8&iye7

More information

Visual Indoor Localization with a Floor-Plan Map

Visual Indoor Localization with a Floor-Plan Map Visual Indoor Localizaion wih a Floor-Plan Map Hang Chu Dep. of ECE Cornell Universiy Ihaca, NY 14850 hc772@cornell.edu Absrac In his repor, a indoor localizaion mehod is presened. The mehod akes firsperson

More information

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch CableCARD Power Swich General Descripion is designed o supply power o OpenCable sysems and CableCARD hoss. These CableCARDs are also known as Poin of Disribuion (POD) cards. suppors boh Single and Muliple

More information

Improved TLD Algorithm for Face Tracking

Improved TLD Algorithm for Face Tracking Absrac Improved TLD Algorihm for Face Tracking Huimin Li a, Chaojing Yu b and Jing Chen c Chongqing Universiy of Poss and Telecommunicaions, Chongqing 400065, China a li.huimin666@163.com, b 15023299065@163.com,

More information

EP2200 Queueing theory and teletraffic systems

EP2200 Queueing theory and teletraffic systems EP2200 Queueing heory and eleraffic sysems Vikoria Fodor Laboraory of Communicaion Neworks School of Elecrical Engineering Lecure 1 If you wan o model neworks Or a comple daa flow A queue's he key o help

More information

MOTION DETECTORS GRAPH MATCHING LAB PRE-LAB QUESTIONS

MOTION DETECTORS GRAPH MATCHING LAB PRE-LAB QUESTIONS NME: TE: LOK: MOTION ETETORS GRPH MTHING L PRE-L QUESTIONS 1. Read he insrucions, and answer he following quesions. Make sure you resae he quesion so I don hae o read he quesion o undersand he answer..

More information

It is easier to visualize plotting the curves of cos x and e x separately: > plot({cos(x),exp(x)},x = -5*Pi..Pi,y = );

It is easier to visualize plotting the curves of cos x and e x separately: > plot({cos(x),exp(x)},x = -5*Pi..Pi,y = ); Mah 467 Homework Se : some soluions > wih(deools): wih(plos): Warning, he name changecoords has been redefined Problem :..7 Find he fixed poins, deermine heir sabiliy, for x( ) = cos x e x > plo(cos(x)

More information

Towards a Realistic Model for Failure Propagation in Interdependent Networks

Towards a Realistic Model for Failure Propagation in Interdependent Networks Towards a Realisic Model for Failure Propagaion in Inerdependen Neworks Agosino Suraro, Simone Silvesri, Mauro Coni, Sajal K. Das Deparmen of Mahemaics, Universiy of Padua, email: agosino.suraro@sudeni.unipd.i,

More information

Midterm Exam Announcements

Midterm Exam Announcements Miderm Exam Noe: This was a challenging exam. CSCI 4: Principles o Programming Languages Lecure 1: Excepions Insrucor: Dan Barowy Miderm Exam Scores 18 16 14 12 10 needs improvemen 8 6 4 2 0 0-49 50-59

More information

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers Packe cheduling in a Low-Laency Opical Inerconnec wih Elecronic Buffers Lin Liu Zhenghao Zhang Yuanyuan Yang Dep Elecrical & Compuer Engineering Compuer cience Deparmen Dep Elecrical & Compuer Engineering

More information

parametric spline curves

parametric spline curves arameric sline curves comuer grahics arameric curves 9 fabio ellacini curves used in many conexs fons animaion ahs shae modeling differen reresenaion imlici curves arameric curves mosly used comuer grahics

More information

BEST DYNAMICS NAMICS CRM A COMPILATION OF TECH-TIPS TO HELP YOUR BUSINESS SUCCEED WITH DYNAMICS CRM

BEST DYNAMICS NAMICS CRM A COMPILATION OF TECH-TIPS TO HELP YOUR BUSINESS SUCCEED WITH DYNAMICS CRM DYNAMICS CR A Publicaion by elogic s fines Microsof Dynamics CRM Expers { ICS CRM BEST OF 2014 A COMPILATION OF TECH-TIPS TO HELP YOUR BUSINESS SUCCEED WITH DYNAMICS CRM NAMICS CRM { DYNAMICS M INTRODUCTION

More information

Axiomatic Foundations and Algorithms for Deciding Semantic Equivalences of SQL Queries

Axiomatic Foundations and Algorithms for Deciding Semantic Equivalences of SQL Queries Axiomaic Foundaions and Algorihms for Deciding Semanic Equivalences of SQL Queries Shumo Chu, Brendan Murphy, Jared Roesch, Alvin Cheung, Dan Suciu Paul G. Allen School of Compuer Science and Engineering

More information

Spline Curves. Color Interpolation. Normal Interpolation. Last Time? Today. glshademodel (GL_SMOOTH); Adjacency Data Structures. Mesh Simplification

Spline Curves. Color Interpolation. Normal Interpolation. Last Time? Today. glshademodel (GL_SMOOTH); Adjacency Data Structures. Mesh Simplification Las Time? Adjacency Daa Srucures Spline Curves Geomeric & opologic informaion Dynamic allocaion Efficiency of access Mesh Simplificaion edge collapse/verex spli geomorphs progressive ransmission view-dependen

More information

Difficulty-aware Hybrid Search in Peer-to-Peer Networks

Difficulty-aware Hybrid Search in Peer-to-Peer Networks Difficuly-aware Hybrid Search in Peer-o-Peer Neworks Hanhua Chen, Hai Jin, Yunhao Liu, Lionel M. Ni School of Compuer Science and Technology Huazhong Univ. of Science and Technology {chenhanhua, hjin}@hus.edu.cn

More information

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks Journal of Compuer Science 2 (5): 466-472, 2006 ISSN 1549-3636 2006 Science Publicaions Performance Evaluaion of Implemening Calls Prioriizaion wih Differen Queuing Disciplines in Mobile Wireless Neworks

More information

The Impact of Product Development on the Lifecycle of Defects

The Impact of Product Development on the Lifecycle of Defects The Impac of Produc Developmen on he Lifecycle of Rudolf Ramler Sofware Compeence Cener Hagenberg Sofware Park 21 A-4232 Hagenberg, Ausria +43 7236 3343 872 rudolf.ramler@scch.a ABSTRACT This paper invesigaes

More information

CS 152 Computer Architecture and Engineering. Lecture 7 - Memory Hierarchy-II

CS 152 Computer Architecture and Engineering. Lecture 7 - Memory Hierarchy-II CS 152 Compuer Archiecure and Engineering Lecure 7 - Memory Hierarchy-II Krse Asanovic Elecrical Engineering and Compuer Sciences Universiy of California a Berkeley hp://www.eecs.berkeley.edu/~krse hp://ins.eecs.berkeley.edu/~cs152

More information

A time-space consistency solution for hardware-in-the-loop simulation system

A time-space consistency solution for hardware-in-the-loop simulation system Inernaional Conference on Advanced Elecronic Science and Technology (AEST 206) A ime-space consisency soluion for hardware-in-he-loop simulaion sysem Zexin Jiang a Elecric Power Research Insiue of Guangdong

More information

Chapter 4 Sequential Instructions

Chapter 4 Sequential Instructions Chaper 4 Sequenial Insrucions The sequenial insrucions of FBs-PLC shown in his chaper are also lised in secion 3.. Please refer o Chaper, "PLC Ladder diagram and he Coding rules of Mnemonic insrucion",

More information

Mobile Robots Mapping

Mobile Robots Mapping Mobile Robos Mapping 1 Roboics is Easy conrol behavior percepion modelling domain model environmen model informaion exracion raw daa planning ask cogniion reasoning pah planning navigaion pah execuion

More information

Optics and Light. Presentation

Optics and Light. Presentation Opics and Ligh Presenaion Opics and Ligh Wha comes o mind when you hear he words opics and ligh? Wha is an opical illusion? Opical illusions can use color, ligh and paerns o creae images ha can be

More information

Attack-Resilient Time Synchronization for Wireless Sensor Networks

Attack-Resilient Time Synchronization for Wireless Sensor Networks ack-resilien Time Synchronizaion for Wireless Sensor Neworks Hui Song, Sencun Zhu, and Guohong Cao Deparmen of Compuer Science & Engineering The Pennsylvania Sae Universiy Universiy Park, P 1682 Email:

More information

ME 406 Assignment #1 Solutions

ME 406 Assignment #1 Solutions Assignmen#1Sol.nb 1 ME 406 Assignmen #1 Soluions PROBLEM 1 We define he funcion for Mahemaica. In[1]:= f@_d := Ep@D - 4 Sin@D (a) We use Plo o consruc he plo. In[2]:= Plo@f@D, 8, -5, 5

More information

Nonparametric CUSUM Charts for Process Variability

Nonparametric CUSUM Charts for Process Variability Journal of Academia and Indusrial Research (JAIR) Volume 3, Issue June 4 53 REEARCH ARTICLE IN: 78-53 Nonparameric CUUM Chars for Process Variabiliy D.M. Zombade and V.B. Ghue * Dep. of aisics, Walchand

More information

COMP26120: Algorithms and Imperative Programming

COMP26120: Algorithms and Imperative Programming COMP26120 ecure C3 1/48 COMP26120: Algorihms and Imperaive Programming ecure C3: C - Recursive Daa Srucures Pee Jinks School of Compuer Science, Universiy of Mancheser Auumn 2011 COMP26120 ecure C3 2/48

More information

LHP: An end-to-end reliable transport protocol over wireless data networks

LHP: An end-to-end reliable transport protocol over wireless data networks LHP: An end-o-end reliable ranspor proocol over wireless daa neworks Xia Gao, Suhas N. Diggavi, S. Muhukrishnan Absrac The nex generaion wireless neworks are posied o suppor large scale daa applicaions.

More information

Location. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471

Location. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471 Produc Descripion Insallaion and User Guide Transiser Dimmer (454) The DIN rail mouned 454 is a 4channel ransisor dimmer. I can operae in one of wo modes; leading edge or railing edge. All 4 channels operae

More information

Vulnerability Evaluation of Multimedia Subsystem Based on Complex Network

Vulnerability Evaluation of Multimedia Subsystem Based on Complex Network JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST 23 439 Vulnerabiliy valuaion of Mulimedia Subsysem Based on Complex ewor Xiaoling Tang Insiue of Higher ducaion Research, Jilin Business and Technology College,

More information