Private Key Cryptography. TELE3119: Week2
|
|
- Lesley Bell
- 5 years ago
- Views:
Transcription
1 Private Key Cryptography TELE3119: Week2
2 Private Key Ecryptio Also referred to as: covetioal ecryptio symmetric key ecryptio secret-key or sigle-key ecryptio Oly alterative before public-key ecryptio i 1970 s Still most widely used alterative 2-2
3 Private Key Cryptography Oe key shared by both participators oe key, two operatios (ecryptio ad decryptio) 2-3
4 Example: Polyalphabetic ecryptio 500 years ago! moo-alphabetic ciphers, C 1, C 2,,C Cyclig patter: e.g., =4, C 1,C 3,C 4,C 3,C 2 ; C 1,C 3,C 4,C 3,C 2 ; For each ew plaitext symbol, use subseuet moo-alphabetic cipher i cyclic patter dog: d from C 1, o from C 3, g from C 4 Key: the ciphers ad the cyclic patter 2-4
5 Polyalphabetic ecryptio example Plaitext letter: a b c d e f g h i j k l m o p r s t u v w x y z C 1 (k=5) : f g h i j k l m o p r s t u v w x y z a b c d e C 2 (k=19) : t u v w x y z a b c d e f g h i j k l m o p r s Patter: C 1, C 2, C 2, C 1, C 2 Plaitext message: bob, i love you Cipher text message:? ghu, etox dhz Key? 2-5
6 Two types of moder private ciphers Stream ciphers ecrypt oe bit at a time E.g. RC4 Block ciphers Break plaitext message i eual-size blocks Ecrypt each block as a uit E.g. DES, IDEA, AES 2-6
7 Stream Ciphers pseudo radom iput key keystream geerator keystream Combie each bit of keystream with bit of plaitext to get bit of ciphertext XOR operatio m(i) = i th bit of message ks(i) = i th bit of keystream c(i) = i th bit of ciphertext c(i) = ks(i) Å m(i) (Å = exclusive or) m(i) = ks(i) Å c(i) 2-7
8 Review: XOR is their bit- XOR of two strigs i {0,1} wise additio mod 2 2-8
9 Give M ad C, ca you compute the Key? a) No, I caot compute the key b) Yes, the key is k = m c c) I ca oly compute half the bits of the key d) Yes, the key is k = m m 2-9
10 Give M ad C, ca you compute the Key? a) No, I caot compute the key b) Yes, the key is k = m c c) I ca oly compute half the bits of the key d) Yes, the key is k = m m Msg: Key: Ct:
11 RC4 Stream Cipher RC4 is a popular stream cipher Ecrypts plaitext 1 byte at a time Key ca be from 1 of 256 bytes Used i WEP for Ca be used i SSL Very fast Ecryptio/ Decryptio But, log keys As log as plaitext 2-11
12 Block ciphers Message to be ecrypted is processed i blocks of k bits (e.g., 64-bit blocks). Note: Small block size is t secure 1-to-1 mappig is used to map k-bit block of plaitext to k-bit block of ciphertext Example of oe possible mappig with k=3: iput output iput output What is the ciphertext for ? 2-12
13 Block ciphers How may possible mappigs are there for k=3? How may 3-bit iputs? How may permutatios of the 3-bit iputs? Aswer: 40,320 ; ot very may! I geeral, 2 k! mappigs; huge for k=64 Problem: Table approach reuires table with 2 64 etries, each etry with 64 bits Table too big: istead use fuctio that simulates a radomly permuted table 2-13
14 Prototype fuctio 64-bit iput 8 bits 8 bits 8 bits 8 bits 8 bits 8 bits 8 bits 8 bits T 1 T 2 T 3 T 4 T 5 T 6 T 7 T 8 8 bits 8 bits 8 bits 8 bits 8 bits 8 bits 8 bits 8 bits 64-bit scrambler 8-bit to 8-bit mappig Loop for rouds 64-bit output 2-14
15 Why rouds i prototype? If oly a sigle roud, the oe bit of iput affects at most 8 bits of output. I 2 d roud, the 8 affected bits get scattered ad iputted ito multiple substitutio boxes. How may rouds? How may times do you eed to shuffle cards Becomes less efficiet as icreases 2-15
16 Questio What is the key for the prototype fuctio of block cipher? Note: Scramble fuctio is publicly kow 2-16
17 Ecryptig a large message Why ot just break message i 64-bit blocks, ecrypt each block separately? (paddig the last block if ecessary) If same block of plaitext appears twice, will give same ciphertext. t=1 m(1) = HTTP/1.1 block cipher t=17 m(17) = HTTP/1.1 block cipher c(1) c(17) = k329am02 = k329am02 A attacker could potetially guess the plaitext whe it sees idetical ciphertext blocks (usig kowledge about uderlyig protocol structure) 2-17
18 Ecryptig a large message How about: Geerate radom 64-bit umber r(i) for each plaitext block m(i) Calculate c(i) = K S ( m(i) Å r(i) ) Trasmit c(i), r(i), i=1,2, At receiver: m(i) = K S (c(i)) Å r(i) m= r(1)=001, r(2) =111, r(3)=100 c= Problem: iefficiet, eed to sed c(i) ad r(i) 2-18
19 Cipher Block Chaiig (CBC) CBC geerates its ow radom umbers Have ecryptio of curret block deped o result of previous block c(i) = K S ( m(i) Å c(i-1) ) m(i) = K S ( c(i)) Å c(i-1) How do we ecrypt first block? Iitializatio vector (IV): radom block = c(0) IV does ot have to be secret Chage IV for each message (or sessio) Guaratees that eve if the same message is set repeatedly, the ciphertext will be completely differet each time 2-19
20 Cipher Block Chaiig c(i-1) 2-20
21 CBC aalysis The receiver receives c(i) decrypts it with K s to obtai s(i) = m(i) Å c(i-1) also, kows the c(i-1) the, obtais the cleartext block from m(i) = s(i) Å c(i-1) Leakage? Idetical blocks of cleartext, (almost always) would result differet correspodig ciphertexts IV is set i plaitext, but Trudy does ot kow the private Key The seder seds oly oe overhead block (i.e. the IV) 2-21
22 CBC example Cosider the followig table Plaitext: ; IV = c(0) = 001 c(1) =? c(2) =? c(3) =? iput output iput output
23 CBC example Cosider the followig table Plaitext: ; IV = c(0) = 001 c(1) = K s (m(1) Å c(0))= 100 c(2) = K s (m(2) Å c(1))= 000 c(3) = K s (m(3) Å c(2))= 101 iput output iput output
24 Error propagatio i CBC Cosider a 4-block message: C 1 = K{ m 1 Å IV } C 2 = K{ m 2 Å C 1 } C 3 = K{ m 3 Å C 2 } C 4 = K{ m 4 Å C 3 } If C 2 is damaged durig trasmissio, what happes to the plaitext? 2-24
25 Error propagatio i CBC (ct d) Look at the decryptio process, where C is a garbled versio of C: P 1 = K{C 1 } Å IV P 2 = K{C 2 } Å C 1 P 3 = K{C 3 } Å C 2 P 4 = K{C 4 } Å C 3 P 1 is uaffected P 2 is garbled P 3 is garbled P 4 is uaffected, sice it depeds o C 4 ad C 3 Coclusio: two blocks chage, oe of them predictably 2-25
26 Cuttig ad Pastig CBC Cosider the ecrypted message IV, C 1, C 2, C 3, C 4, C 5 The shorteed message IV, C 1, C 2, C 3, C 4 appears valid The trucated message C 2, C 3, C 4, C 5 is valid; C 2 acts as IV Eve C 2, C 3, C 4 is valid, ad will decrypt properly. Ay subset of a CBC message will decrypt clealy. If we sip out blocks, leavig IV, C 1, C 4, C 5, we oly garble oe block of plaitext. Coclusio: if you wat message itegrity, ecryptio does NOT provide it, you have to do it yourself! 2-26
27 Popular block ciphers DES, 3DES, AES Use fuctios, rather tha predetermied tables alog with a complicated prototype Each uses a strig of bits for a key DES: 64-bit blocks with a 56-bit key AES: 128-bit blocks that ca operate with keys of 128, 192, ad 256 bits log 2-27
28 Private key crypto: DES DES: Data Ecryptio Stadard US ecryptio stadard [NIST 1993] 56-bit private key, 64-bit plaitext iput Block cipher with cipher block chaiig How secure is DES? DES Challege: 56-bit-key-ecrypted phrase decrypted (brute force) i less tha a day No kow good aalytic attack 2-28
29 DES structure Ecryptio Iitial permutatio bit per-roud key geerated from the 56-bit key 16 DES rouds: 64-bit iput + per-roud key è 64-bit output left ad right halves of (64-bit) output swapped fial permutatio (iverse of the iitial permutatio) Decryptio ruig backwards with per-roud keys i reverse order 2-29
30 Private key crypto: DES DES operatio iitial permutatio 16 idetical rouds of fuctio applicatio, each usig differet 48 bits of key fial permutatio 2-30
31 Why Permute? EDS: a modified DES without permutatios Let s assume we ca break EDS Give <plaitext, ciphertext> we ca calculate the Key <m, c> i DES Do iverse of iitial permutatio o m to get m Do iverse of fial permutatio o c to get c Feed <m, c > to our EDS ad get the Key o security value! make DES less efficiet to implemet i software 2-31
32 3DES (Triple DES) DES s 56-bit key is too short to be secure Ca we apply DES multiple times to make it stroger? How? 3DES: ecrypt 3 times with 3 distict keys (actually ecrypt, decrypt, ecrypt) 2-32
33 3DES 2-33
34 Double Ecryptio with DES Ecryptig twice with the same key? Plaitext èèciphertext K K brute-force attack still eeds to search oly 2 56 keys Each step of testig a key is twice as much work A factor of 2 is ot much added security the same level of extra work for good guys too! 2-34
35 Double Ecryptio with DES Ecryptig twice with two keys? a aive brute-force reuires searchig keys i fact, oly eed to search about 2 57 keys: meet-i-the-middle attack (a kow-plaitext attack) 2-35
36 meet-i-the-middle attack Assume, you have few <m 1,c 1 >, <m 2,c 2 > ad <m 3,c 3 > ecrypted by 2DES. Fid K 1 ad K 2. Make Table A of 2 56 etries K A (m 1 ) = r. Sort Table A by r Make Table B of 2 56 etries K B (r) = c 1. Sort Table B by r Search through sorted tables with matchig etries: <K A, r> ad <K B, r> pair of <K A, K B > is a cadidate Test cadidates with kow <m1, c1>, <m2, c2>, oly the correct key pair work for all of them 2-36
37 meet-i-the-middle attack 2 48 etries appear i both tables Oe of those correspods to the correct <K 1, K 2 > Computatio complexity: O(2 56 ) assumig eough space is provided to sort table A ad B i O(2 56 ) 2-37
38 3DES 2 keys used istead of 3 keys euivalet key legth is 112 bits 3DES operatios: EDE for ecryptio, DED for decryptio 3DES is iefficiet ad expesive Some systems implemet 3DES with 3 keys Not stadard If K 1 =K 2 è 3DES becomes euivalet of DES 2-38
39 AES: Advaced Ecryptio Stadard ew (Nov. 2001) symmetric-key NIST stadard, replacig DES processes data i 128 bit blocks 128, 192, or 256 bit keys brute force decryptio (try each key) takig 1 sec o DES, takes 149 trillio years for AES 2-39
40 PRIVATE KEY AGREEMENT 2-40
41 Oe Time Pad (OTP) Veram cipher (1917) The oly existig mathematically ubreakable ecryptio (Claude Shao) A truly radom key (ot geerated by a computer fuctio) The Key is used oly oce There should oly be two copies of the key: oe for the seder ad oe for the receiver Should be destroyed after use ciphertext = XOR (plaitext, key) plaitext = XOR (ciphertext, key) 2-41
42 OTP operatio two pads of paper cotaiig idetical radom seueces of letters are produced ad securely issued to both Alice chooses the appropriate uused page from the pad The way to do this is ormally arraged for i advace, as for istace 'use the 12th sheet o 1 May', or 'use the ext available sheet for the ext message'. The material o the selected sheet is the key for this message. Problem: two time pad is isecure! 2-42
43 OTP challeges Two Time Pad : c 1 = m 1 Å k c 2 = m 2 Å k Eavesdropper gets c 1 ad c 2 c 1 Å c 2 = m 1 Å m 2 Eough redudacy i ASCII (ad Eglish) that m 1 Å m 2 is eough to kow m 1 ad m 2 Impractical How do you trasfer OTP securely? As log as the message 2-43
44 Key distributio? 1. A key could be selected by A ad physically delivered to B. 2. A third party could select the key ad physically deliver it to A ad B. 3. If A ad B have previously ad recetly used a key, oe party could trasmit the ew key to the other, ecrypted usig the old key. 4. If A ad B each have a ecrypted coectio to a third party C (i.e. a key distributio ceter), C could deliver a key o the ecrypted liks to A ad B. 2-44
45 Diffie-Hellma Protocol Expoetial key agreemet Allows two users to exchage a secret key Reuires o prior secrets Real-time over a utrusted etwork 2-45
46 Diffie-Hellma Protocol Alice ad Bob ever met ad share o secrets Public ifo: p ad g p is a large prime umber (e.g. 512 bits) g is less tha p (with some restrictios: a primitive root of p) Pick secret, radom a Alice Compute k a =y a mod p = g ba mod p x = g a mod p Y= g b mod p Pick secret, radom b Bob Compute k b =x b mod p = g ab mod p 2-46
47 Diffie-Hellma Protocol k a =g ba mod p k b =g ab mod p Algebraically it is show that k a = k b Users ow have a symmetric private key to ecrypt 2-47
48 Example Alice ad Bob get public umbers p = 23, g = 9 Alice ad Bob compute public values X = 9 4 mod 23 = 6561 mod 23 = 6 Y = 9 3 mod 23 = 729 mod 23 = 16 Alice ad Bob exchage public umbers 2-48
49 Example (ct d) Alice ad Bob compute symmetric keys k a = y a mod p = 16 4 mod 23 = 9 k b = x b mod p = 6 3 mod 23 = 9 Alice ad Bob ow ca talk securely! 2-49
50 Is Diffie-Hellma Secure? Discrete Logarithm (DL) problem: give g a mod p, it s hard to extract a There is o kow efficiet algorithm for doig this This is ot eough for Diffie-Hellma to be secure! Computatioal Diffie-Hellma (CDH) problem: give g a ad g b, it s hard to compute g ab mod p uless you kow a or b, i which case it s easy 2-50
51 Applicatios of Diffie-Hellma Diffie-Hellma is curretly used i may protocols, amely: Secure Sockets Layer (SSL)/Trasport Layer Security (TLS) Secure Shell (SSH) Iteret Protocol Security (IPSec) Public Key Ifrastructure (PKI) 2-51
52 Properties of Diffie-Hellma Diffie-Hellma protocol is a secure key establishmet protocol agaist passive attackers Eavesdropper ca t fid the established key Ca use the ew key for symmetric cryptography Basic Diffie-Hellma protocol is ot secure agaist a active, ma-i-the-middle attacker Basic Diffie-Hellma protocol does ot provide autheticatio Alice might establish a secret key with a bad guy! IPsec combies Diffie-Hellma with sigatures, ati-dos cookies, etc. 2-52
53 (Wo)Ma-i-the-middle Attack A, g a A, g a Alice B, g b Trudy B, g b Bob Trudy kows both keys Usig Diffie-Hellma, Alice ad Bob caot detect a itruder 2-53
54 Research i Secret-Key agreemet Wearable devices, Sesors ad IoTs Resource-costraied Not euipped with radom umbers geerator Traditioal cryptography ca be resource-itesive Idea: Wireless chael that sesor (i.e. Alice) ad base-statio (i.e. Bob) share is uiue ad symmetric to them Elimiatig Recociliatio Cost i Secret Key Geeratio for Body- Wor Health Moitorig Devices, IEEE Tra. o Mob. Comp. [2014] 2-54
55 Secret Key geeratio Wireless chael characteristics (time or freuecy domai) Uiue to Alice ad Bob Eavesdropper (outside oe radio wavelegth from Alice or Bob) will measure differetly Chael Sesig Quatizatio Recociliatio 2-55
Message Integrity and Hash Functions. TELE3119: Week4
Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig
More informationSECURITY PROOF FOR SHENGBAO WANG S IDENTITY-BASED ENCRYPTION SCHEME
SCURITY PROOF FOR SNGBAO WANG S IDNTITY-BASD NCRYPTION SCM Suder Lal ad Priyam Sharma Derpartmet of Mathematics, Dr. B.R.A.(Agra), Uiversity, Agra-800(UP), Idia. -mail- suder_lal@rediffmail.com, priyam_sharma.ibs@rediffmail.com
More informationMessage Authentication Codes. Reading: Chapter 4 of Katz & Lindell
Message Autheticatio Codes Readig: Chapter 4 of Katz & Lidell 1 Message autheticatio Bob receives a message m from Alice, he wats to ow (Data origi autheticatio) whether the message was really set by Alice.
More informationSecurity of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More informationAn Improvement of the Basic El-Gamal Public Key Cryptosystem
Iteratioal Joural of Computer Applicatios Techology ad Research A Improvemet of the Basic El-Gamal Public Key Cryptosystem W.D.M.G.M. Dissaayake (PG/MPhil/2015/09 Departmet of Computer Egieerig Faculty
More informationNetwork Security. Chapter 2 Basics 2.3 Cryptographic Hash Functions. Motivation (1) Motivation (2) Cryptographic Hash Functions: Definition
Chair for Network Architectures ad Services Departmet of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.3 Cryptographic Hash Fuctios Motivatio Cryptographic Hash Fuctios SHA-1 Message
More informationRandomized and Quantum Protocols in Distributed Computation
Radomized ad Quatum Protocols i Distributed Computatio Michael Be-Or The Hebrew Uiversity Michael Rabi s Birthday Celebratio Radomized Protocols Power of Radomizatio Expoetial speedup for kow algorithms
More informationHash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.
Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative
More informationCryptography Functions
Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)
More informationChair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security
Chair for Network Architectures ad Services Departmet of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Cryptography 2.2 Cryptographic Hash Fuctios Motivatio Cryptographic Hash Fuctios SHA-1,
More informationProbability of collisions in Soft Input Decryption
Issue 1, Volume 1, 007 1 Probability of collisios i Soft Iput Decryptio Nataša Živić, Christoph Rulad Abstract I this work, probability of collisio i Soft Iput Decryptio has bee aalyzed ad calculated.
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13
CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis
More informationCS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1
CS200: Hash Tables Prichard Ch. 13.2 CS200 - Hash Tables 1 Table Implemetatios: average cases Search Add Remove Sorted array-based Usorted array-based Balaced Search Trees O(log ) O() O() O() O(1) O()
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationChair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security
Chair for Network Architectures ad Services Departmet of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Cryptography 2.2 Cryptographic Hash Fuctios Motivatio Cryptographic Hash Fuctios SHA-1,
More informationEE123 Digital Signal Processing
Last Time EE Digital Sigal Processig Lecture 7 Block Covolutio, Overlap ad Add, FFT Discrete Fourier Trasform Properties of the Liear covolutio through circular Today Liear covolutio with Overlap ad add
More informationMajor CSL Write your name and entry no on every sheet of the answer script. Time 2 Hrs Max Marks 70
NOTE:. Attempt all seve questios. Major CSL 02 2. Write your ame ad etry o o every sheet of the aswer script. Time 2 Hrs Max Marks 70 Q No Q Q 2 Q 3 Q 4 Q 5 Q 6 Q 7 Total MM 6 2 4 0 8 4 6 70 Q. Write a
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19
CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationLecture 1: Introduction and Strassen s Algorithm
5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access
More informationLecture 3. RTL Design Methodology. Transition from Pseudocode & Interface to a Corresponding Block Diagram
Lecture 3 RTL Desig Methodology Trasitio from Pseudocode & Iterface to a Correspodig Block Diagram Structure of a Typical Digital Data Iputs Datapath (Executio Uit) Data Outputs System Cotrol Sigals Status
More informationComputers and Scientific Thinking
Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput
More informationLecture 13: Validation
Lecture 3: Validatio Resampli methods Holdout Cross Validatio Radom Subsampli -Fold Cross-Validatio Leave-oe-out The Bootstrap Bias ad variace estimatio Three-way data partitioi Itroductio to Patter Recoitio
More informationSwitching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1
Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)
More informationCIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)
CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig
More informationBASED ON ITERATIVE ERROR-CORRECTION
A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity
More informationLecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein
068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig
More informationChapter 3 Classification of FFT Processor Algorithms
Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As
More information1. SWITCHING FUNDAMENTALS
. SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig
More informationNormal Distributions
Normal Distributios Stacey Hacock Look at these three differet data sets Each histogram is overlaid with a curve : A B C A) Weights (g) of ewly bor lab rat pups B) Mea aual temperatures ( F ) i A Arbor,
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5
Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:
More informationCSE 417: Algorithms and Computational Complexity
Time CSE 47: Algorithms ad Computatioal Readig assigmet Read Chapter of The ALGORITHM Desig Maual Aalysis & Sortig Autum 00 Paul Beame aalysis Problem size Worst-case complexity: max # steps algorithm
More informationCSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS)
CSC165H1, Witer 018 Learig Objectives By the ed of this worksheet, you will: Aalyse the ruig time of fuctios cotaiig ested loops. 1. Nested loop variatios. Each of the followig fuctios takes as iput a
More informationThe Magma Database file formats
The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,
More informationReliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1
Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable
More informationArchitectural styles for software systems The client-server style
Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationAnnouncements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components
Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,
More informationECE4050 Data Structures and Algorithms. Lecture 6: Searching
ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated
More informationA Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN
Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,
More informationEE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 )
EE26: Digital Desig, Sprig 28 3/6/8 EE 26: Itroductio to Digital Desig Combiatioal Datapath Yao Zheg Departmet of Electrical Egieerig Uiversity of Hawaiʻi at Māoa Combiatioal Logic Blocks Multiplexer Ecoders/Decoders
More informationAN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS
Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh
More informationChapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.
Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4
More informationCMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 10: Caches Prof. Yajig Li Uiversity of Chicago Midterm Recap Overview ad fudametal cocepts ISA Uarch Datapath, cotrol Sigle cycle, multi cycle Pipeliig Basic idea,
More informationPolynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0
Polyomial Fuctios ad Models 1 Learig Objectives 1. Idetify polyomial fuctios ad their degree 2. Graph polyomial fuctios usig trasformatios 3. Idetify the real zeros of a polyomial fuctio ad their multiplicity
More informationCS 332 Computer Networks Security
CS 332 Computer Networks Security Professor Szajda Last Time We talked about mobility as a matter of context: How is mobility handled as you move around a room? Between rooms in the same building? As your
More informationCMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems
More informationHardware Design and Performance Estimation of The 128-bit Block Cipher CRYPTON
Hardware Desig ad Performace Estimatio of The 128-bit Block Cipher CRYPTON Eujog Hog, Jai-Hoo Chug, ad Chae Hoo Lim Iformatio ad Commuicatios Research Ceter Future Systems, Ic. 372-2 Yagjae-Dog, Seocho-Ku,
More informationMinimum Spanning Trees
Miimum Spaig Trees Miimum Spaig Trees Spaig subgraph Subgraph of a graph G cotaiig all the vertices of G Spaig tree Spaig subgraph that is itself a (free) tree Miimum spaig tree (MST) Spaig tree of a weighted
More informationThe Simeck Family of Lightweight Block Ciphers
The Simeck Family of Lightweight Block Ciphers Gagqiag Yag, Bo Zhu, Valeti Suder, Mark D. Aagaard, ad Guag Gog Electrical ad Computer Egieerig, Uiversity of Waterloo Sept 5, 205 Yag, Zhu, Suder, Aagaard,
More informationModule 8-7: Pascal s Triangle and the Binomial Theorem
Module 8-7: Pascal s Triagle ad the Biomial Theorem Gregory V. Bard April 5, 017 A Note about Notatio Just to recall, all of the followig mea the same thig: ( 7 7C 4 C4 7 7C4 5 4 ad they are (all proouced
More informationUsing the Keyboard. Using the Wireless Keyboard. > Using the Keyboard
1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries
More informationGuide to Applying Online
Guide to Applyig Olie Itroductio Respodig to requests for additioal iformatio Reportig: submittig your moitorig or ed of grat Pledges: submittig your Itroductio This guide is to help charities submit their
More informationcondition w i B i S maximum u i
ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility
More informationEncryption. INST 346, Section 0201 April 3, 2018
Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:
More informationWYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET
WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56
More informationReview: The ACID properties
Recovery Review: The ACID properties A tomicity: All actios i the Xactio happe, or oe happe. C osistecy: If each Xactio is cosistet, ad the DB starts cosistet, it eds up cosistet. I solatio: Executio of
More informationHeaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015
Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 201 Heaps 201 Goodrich ad Tamassia xkcd. http://xkcd.com/83/. Tree. Used with permissio uder
More informationCS 111: Program Design I Lecture 16: Module Review, Encodings, Lists
CS 111: Program Desig I Lecture 16: Module Review, Ecodigs, Lists Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago October 18, 2016 Last time Dot otatio ad methods Padas: user maual poit
More informationBig-O Analysis. Asymptotics
Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses
More informationSecure Software Upload in an Intelligent Vehicle via Wireless Communication Links
Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects
Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged
More informationCS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python
CS 111: Program Desig I Lecture 19: Networks, the Web, ad gettig text from the Web i Pytho Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 3, 2018 Goals Lear about Iteret Lear about
More informationOne advantage that SONAR has over any other music-sequencing product I ve worked
*gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms
More informationIntroduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.
Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple
More informationn Some thoughts on software development n The idea of a calculator n Using a grammar n Expression evaluation n Program organization n Analysis
Overview Chapter 6 Writig a Program Bjare Stroustrup Some thoughts o software developmet The idea of a calculator Usig a grammar Expressio evaluatio Program orgaizatio www.stroustrup.com/programmig 3 Buildig
More informationChapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3
More informationCSE 2320 Notes 8: Sorting. (Last updated 10/3/18 7:16 PM) Idea: Take an unsorted (sub)array and partition into two subarrays such that.
CSE Notes 8: Sortig (Last updated //8 7:6 PM) CLRS 7.-7., 9., 8.-8. 8.A. QUICKSORT Cocepts Idea: Take a usorted (sub)array ad partitio ito two subarrays such that p q r x y z x y y z Pivot Customarily,
More informationOverview. Chapter 18 Vectors and Arrays. Reminder. vector. Bjarne Stroustrup
Chapter 18 Vectors ad Arrays Bjare Stroustrup Vector revisited How are they implemeted? Poiters ad free store Destructors Iitializatio Copy ad move Arrays Array ad poiter problems Chagig size Templates
More informationSolution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions:
CS 604 Data Structures Midterm Sprig, 00 VIRG INIA POLYTECHNIC INSTITUTE AND STATE U T PROSI M UNI VERSI TY Istructios: Prit your ame i the space provided below. This examiatio is closed book ad closed
More informationK-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns
K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge
More informationDATA STRUCTURES. amortized analysis binomial heaps Fibonacci heaps union-find. Data structures. Appetizer. Appetizer
Data structures DATA STRUCTURES Static problems. Give a iput, produce a output. Ex. Sortig, FFT, edit distace, shortest paths, MST, max-flow,... amortized aalysis biomial heaps Fiboacci heaps uio-fid Dyamic
More informationIMP: Superposer Integrated Morphometrics Package Superposition Tool
IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College
More information1 Graph Sparsfication
CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider
More informationCS 111: Program Design I Lecture 15: Objects, Pandas, Modules. Robert H. Sloan & Richard Warner University of Illinois at Chicago October 13, 2016
CS 111: Program Desig I Lecture 15: Objects, Padas, Modules Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago October 13, 2016 OBJECTS AND DOT NOTATION Objects (Implicit i Chapter 2, Variables,
More informationOnes Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More information9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence
_9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to
More informationBasic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.
5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator
More informationNovel Encryption Schemes Based on Catalan Numbers
D. Sravaa Kumar, H. Sueetha, A. hadrasekhar / Iteratioal Joural of Egieerig Research ad Applicatios (IJERA) ISSN: 48-96 www.iera.com Novel Ecryptio Schemes Based o atala Numbers 1 D. Sravaa Kumar H. Sueetha
More informationDerivation of perspective stereo projection matrices with depth, shape and magnification consideration
Derivatio of perspective stereo projectio matrices with depth, shape ad magificatio cosideratio Patrick Oberthür Jauary 2014 This essay will show how to costruct a pair of stereoscopic perspective projectio
More informationPrivacy-preserving and Secure Top-k Query in Two-tier Wireless Sensor Network
Privacy-preservig ad Secure Top-k Query i Two-tier Wireless Sesor Network Xiaojig Liao, Jiazhog Li School of Computer Sciece ad Techology, Harbi Istitute of Techology, Heilogjiag, Chia Email:{xiaojigliao,lijzh}@hit.edu.c
More informationProject 2.5 Improved Euler Implementation
Project 2.5 Improved Euler Implemetatio Figure 2.5.10 i the text lists TI-85 ad BASIC programs implemetig the improved Euler method to approximate the solutio of the iitial value problem dy dx = x+ y,
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.
Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple
More information15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015
15-859E: Advaced Algorithms CMU, Sprig 2015 Lecture #2: Radomized MST ad MST Verificatio Jauary 14, 2015 Lecturer: Aupam Gupta Scribe: Yu Zhao 1 Prelimiaries I this lecture we are talkig about two cotets:
More informationPseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance
Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured
More informationCryptography and Security in Communication Networks. Data authentication. ETTI - Master - Advanced Wireless Communications
Cryptography ad Security i Commuicatio Networks Data autheticatio ETTI - Master - Advaced Wireless Commuicatios Overview Outlie Data itegrity. Data-origi autheticatio. Digital sigature. Cryptographic hash
More informationRef:
Cryptography & digital signature Dec. 2013 Ref: http://cis.poly.edu/~ross/ 2 Cryptography Overview Symmetric Key Cryptography Public Key Cryptography Message integrity and digital signatures References:
More informationRandom Graphs and Complex Networks T
Radom Graphs ad Complex Networks T-79.7003 Charalampos E. Tsourakakis Aalto Uiversity Lecture 3 7 September 013 Aoucemet Homework 1 is out, due i two weeks from ow. Exercises: Probabilistic iequalities
More informationOur Learning Problem, Again
Noparametric Desity Estimatio Matthew Stoe CS 520, Sprig 2000 Lecture 6 Our Learig Problem, Agai Use traiig data to estimate ukow probabilities ad probability desity fuctios So far, we have depeded o describig
More informationAdministrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today
Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised
More informationHardware Design and Performance Estimation of the 128-bit Block Cipher CRYPTON
Hardware Desig ad Performace Estimatio of the 128-bit Block Cipher CRYPTON Eujog Hog, Jai-Hoo Chug, ad Chae Hoo Lim Future Systems, Ic. 372-2 Yagjae-Dog, Seocho-Ku, Seoul, Korea 137-130 E-mail: {ejhog,
More informationOperating System Concepts. Operating System Concepts
Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the
More informationAnalysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis
Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems
More informationWeston Anniversary Fund
Westo Olie Applicatio Guide 2018 1 This guide is desiged to help charities applyig to the Westo to use our olie applicatio form. The Westo is ope to applicatios from 5th Jauary 2018 ad closes o 30th Jue
More informationPattern Recognition Systems Lab 1 Least Mean Squares
Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig
More informationLecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming
Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis
More informationHomework 1 Solutions MA 522 Fall 2017
Homework 1 Solutios MA 5 Fall 017 1. Cosider the searchig problem: Iput A sequece of umbers A = [a 1,..., a ] ad a value v. Output A idex i such that v = A[i] or the special value NIL if v does ot appear
More informationProceedings of the 10 th USENIX Security Symposium
USENIX Associatio Proceedigs of the 0 th USENIX Security Symposium Washigto, DC, USA August 3 7, 00 THE ADVANCED COMPUTING SYSTEMS ASSOCIATION 00 by The USENIX Associatio All Rights Reserved For more iformatio
More informationAnalysis of Algorithms
Presetatio for use with the textbook, Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Aalysis of Algorithms Iput 2015 Goodrich ad Tamassia Algorithm Aalysis of Algorithms
More information