首页> 外文学位 >Finding minimum gaps and designing key derivation functions.
【24h】

Finding minimum gaps and designing key derivation functions.

机译:寻找最小的差距并设计关键的推导函数。

获取原文
获取原文并翻译 | 示例

摘要

The problem size gets larger as computers become faster. Using naive algorithms, even equipped with fast CPUs and large memories, computers still cannot handle many problems of certain size. Some searching tasks, however, can be answered with the help of the algorithmic technique, such as time and space trade-off.;Let k and n be positive integers, n > k. Define r(n, k) to be the minimum positive value of a1+&cdots;+ ak-b1 -&cdots;-bk where a1, a 2, ···, ak, b1, b2, ···, bk are positive integers no larger than n. It is important to find a tight bound for r(n, k), in connection to the sum-of-square-roots problem, a famous open problem in computational geometry. The current best lower bound and upper bound are far apart. For exact values of r(n, k), only a few simple cases have been reported so far, and they can be found easily using exhaustive search. A new algorithm is developed to find r(n, k) exactly in nk+ o(k ) time and in nk/2+o k space. Space usage is decreased dramatically along with little increase in time, compared to an intuitive trade-off method. Our algorithm reduces time for swap-in and swap-out, minimizing the total running time. The problem is solved in size that was infeasible for a naive trade-off scheme. We also present lots of numerical data.;The time and space trade-off technique has its limitation. For some problems, when space is reduced to a certain extent, time will be increased exponentially. The trade-off technique does not apply to this situation. We explore such a property that discourages trade-off attacks.;Key generation is an important part of symmetric-key encryption algorithms, such as AES. A key derivation function can be used to generate symmetric cipher session keys. As CPU technology advances, key derivation functions are more vulnerable to off-line brute force attacks. Based on the Memory Wall problem, we propose a simple number-theoretic way to mitigate exhaustive search attacks. We also present a formal definition of memory-bounded functions. On one hand, if attackers try to reduce memory usage, they are forced to spend dramatically more time. On the other hand, a memory-bound security scheme will minimize the difference between high-end and low-end computers. Trade-off attacks will hence be deterred.
机译:随着计算机变得越来越快,问题的规模也越来越大。使用天真的算法,即使配备了快速的CPU和大容量的内存,计算机仍然无法解决许多特定大小的问题。但是,某些搜索任务可以借助算法技术来解决,例如时间和空间的权衡。让k和n为正整数,n> k。将r(n,k)定义为a1 +++ ak-b1 --bk的最小正值,其中a1,a 2,···,ak,b1,b2,···,bk为正不大于n的整数。重要的是找到与平方根问题和计算几何中一个著名的开放问题有关的r(n,k)的紧边界。当前的最佳下限和上限相距甚远。对于r(n,k)的确切值,到目前为止,仅报告了一些简单的情况,并且可以使用穷举搜索轻松找到它们。开发了一种新算法来精确地在nk + o(k)时间和nk / 2 + o k空间中找到r(n,k)。与直观的权衡方法相比,空间使用量显着减少,而时间却很少增加。我们的算法减少了换入和换出时间,从而最大程度地减少了总运行时间。解决这个问题的规模对于天真的权衡方案是不可行的。我们还提供了大量数值数据。;时空权衡技术有其局限性。对于某些问题,当空间减小到一定程度时,时间将成倍增加。权衡技术不适用于这种情况。我们探索了这样一种阻止折衷攻击的属性。密钥生成是对称密钥加密算法(例如AES)的重要组成部分。密钥派生函数可用于生成对称密码会话密钥。随着CPU技术的发展,关键派生功能更容易受到离线暴力攻击。基于内存墙问题,我们提出了一种简单的数论方法来减轻穷举搜索攻击。我们还提出了内存限制函数的正式定义。一方面,如果攻击者试图减少内存使用量,他们将被迫花费大量时间。另一方面,内存绑定安全方案将使高端计算机与低端计算机之间的差异最小化。因此,权衡攻击将被阻止。

著录项

  • 作者

    Li, Yu-Hsin.;

  • 作者单位

    The University of Oklahoma.;

  • 授予单位 The University of Oklahoma.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2011
  • 页码 103 p.
  • 总页数 103
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号