Fast Computation of Large Distributions and Its Cryptographic Applications
نویسندگان
چکیده
LetX1,X2, . . . ,Xk be independent n bit random variables. If they have arbitrary distributions, we show how to compute distributions like Pr{X1 ⊕X2 ⊕ · · · ⊕Xk} and Pr{X1 X2 · · · Xk} in complexity O(kn2). Furthermore, if X1,X2, . . . , Xk are uniformly distributed we demonstrate a large class of functions F (X1, X2, . . . ,Xk), for which we can compute their distributions efficiently. These results have applications in linear cryptanalysis of stream ciphers as well as block ciphers. A typical example is the approximation obtained when additions modulo 2 are replaced by bitwise addition. The efficiency of such an approach is given by the bias of a distribution of the above kind. As an example, we give a new improved distinguishing attack on the stream cipher SNOW 2.0.
منابع مشابه
Differential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملHessian Stochastic Ordering in the Family of multivariate Generalized Hyperbolic Distributions and its Applications
In this paper, random vectors following the multivariate generalized hyperbolic (GH) distribution are compared using the hessian stochastic order. This family includes the classes of symmetric and asymmetric distributions by which different behaviors of kurtosis in skewed and heavy tail data can be captured. By considering some closed convex cones and their duals, we derive some necessary and s...
متن کاملA Fast Calculation Method for Analyzing the Effect of Wind Generation on ATC
Wind energy penetration in power system has been increased very fast and large amount of capitals invested for wind farms all around the world. Meanwhile, in power systems with wind turbine generators (WTGs), the value of Available transfer capability (ATC) is influenced by the probabilistic nature of the wind power. The Mont Carlo Simulation (MCS) is the most common method to model the uncerta...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملEfficient Computation of Fourier Transforms on Compact Groups
This paper generalizes the fast Fourier transform algorithm to the computationof Fourier transformson compact Lie groups. The basic technique uses factorization of group elements and Gel'fand-Tsetlin bases to simplify the computations, and may be extended to treat the computation of Fourier transforms of nitely supported distributions on the group. Similar transforms may be deened on homogeneou...
متن کامل