用户名: 密码: 验证码:
Finding minimum gaps and designing key derivation functions.
详细信息   
  • 作者:Li ; Yu-Hsin.
  • 学历:Doctor
  • 年:2011
  • 导师:Cheng,Qi,eadvisorDhall,Sudarshanecommittee memberKim,Changwookecommittee memberSchmidt,Ralfecommittee memberThulasiraman,Krishnaiyanecommittee member
  • 毕业院校:The University of Oklahoma
  • Department:School of Computer Science.
  • ISBN:9781124632261
  • CBH:3454264
  • Country:USA
  • 语种:English
  • FileSize:753804
  • Pages:104
文摘
The problem size gets larger as computers become faster. Using naive algorithms,even equipped with fast CPUs and large memories,computers still cannot handle many problems of certain size. Some searching tasks,however,can be answered with the help of the algorithmic technique,such as time and space trade-off. Let k and n be positive integers,n > k. Define rn,k) to be the minimum positive value of a1+&cdots;+ ak-b1 -&cdots;-bk where a1,a 2,·;·;·;,ak,b1,b2,·;·;·;,bk are positive integers no larger than n. It is important to find a tight bound for rn,k),in connection to the sum-of-square-roots problem,a famous open problem in computational geometry. The current best lower bound and upper bound are far apart. For exact values of rn,k),only a few simple cases have been reported so far,and they can be found easily using exhaustive search. A new algorithm is developed to find rn,k) exactly in nk+ ok ) time and in nk/2+o k space. Space usage is decreased dramatically along with little increase in time,compared to an intuitive trade-off method. Our algorithm reduces time for swap-in and swap-out,minimizing the total running time. The problem is solved in size that was infeasible for a naive trade-off scheme. We also present lots of numerical data. The time and space trade-off technique has its limitation. For some problems,when space is reduced to a certain extent,time will be increased exponentially. The trade-off technique does not apply to this situation. We explore such a property that discourages trade-off attacks. Key generation is an important part of symmetric-key encryption algorithms,such as AES. A key derivation function can be used to generate symmetric cipher session keys. As CPU technology advances,key derivation functions are more vulnerable to off-line brute force attacks. Based on the Memory Wall problem,we propose a simple number-theoretic way to mitigate exhaustive search attacks. We also present a formal definition of memory-bounded functions. On one hand,if attackers try to reduce memory usage,they are forced to spend dramatically more time. On the other hand,a memory-bound security scheme will minimize the difference between high-end and low-end computers. Trade-off attacks will hence be deterred.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700