ORTHOGONAL ARRAYS APPLICATION TO PSEUDORANDOM NUMBERS GENERATION AND OPTIMIZATION PROBLEMS A.G.Chefranov †‡, T.A.Mazurova ‡, I.D.Sidorov ‡, T.S.Letia 

Slides:



Advertisements
Similar presentations
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
Longest Common Subsequence
Biomedical Statistics Testing for Normality and Symmetry Teacher:Jang-Zern Tsai ( 蔡章仁 ) Student: 邱瑋國.
Generating Random Numbers
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Random Number Generation. Random Number Generators Without random numbers, we cannot do Stochastic Simulation Most computer languages have a subroutine,
Algebraic, transcendental (i.e., involving trigonometric and exponential functions), ordinary differential equations, or partial differential equations...
Session 2: Secret key cryptography – stream ciphers – part 2.
Stream ciphers 2 Session 2. Contents PN generators with LFSRs Statistical testing of PN generator sequences Cryptanalysis of stream ciphers 2/75.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
Self Organization of a Massive Document Collection
Random number generation Algorithms and Transforms to Univariate Distributions.
CHAPTER 16 MARKOV CHAIN MONTE CARLO
Hash Tables1 Part E Hash Tables  
A Data Locality Optimizing Algorithm based on A Data Locality Optimizing Algorithm by Michael E. Wolf and Monica S. Lam.
Bayesian belief networks 2. PCA and ICA
Ordinary least squares regression (OLS)
Module C9 Simulation Concepts. NEED FOR SIMULATION Mathematical models we have studied thus far have “closed form” solutions –Obtained from formulas --
CSCE Monte Carlo Methods When you can’t do the math, simulate the process with random numbers Numerical integration to get areas/volumes Particle.
Chapter 2 Basic Encryption and Decryption (part B)
Lecture 23 Symmetric Encryption
ON MULTIVARIATE POLYNOMIAL INTERPOLATION
CS555Spring 2012/Topic 91 Cryptography CS 555 Topic 9: Block Cipher Construction & DES.
Separate multivariate observations
Ch. 8 & 9 – Linear Sorting and Order Statistics What do you trade for speed?
ETM 607 – Random Number and Random Variates
Component Reliability Analysis
Summarized by Soo-Jin Kim
Cryptography and Network Security
Lecture 12: Parallel Sorting Shantanu Dutt ECE Dept. UIC.
Topic 1 modelling of sensors systems ETEC Calibration methods We have a RTD sensing the temperature. The integer of the sensor inside the PLC is.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Order Statistics The ith order statistic in a set of n elements is the ith smallest element The minimum is thus the 1st order statistic The maximum is.
Random-Number Generation Andy Wang CIS Computer Systems Performance Analysis.
Stochastic Linear Programming by Series of Monte-Carlo Estimators Leonidas SAKALAUSKAS Institute of Mathematics&Informatics Vilnius, Lithuania
CPSC 531: RN Generation1 CPSC 531:Random-Number Generation Instructor: Anirban Mahanti Office: ICT Class Location:
Chapter 7 Random-Number Generation
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
Module 1: Statistical Issues in Micro simulation Paul Sousa.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Basic Concepts in Number Theory Background for Random Number Generation 1.For any pair of integers n and m, m  0, there exists a unique pair of integers.
Modeling and Simulation Random Number Generators
Motif finding with Gibbs sampling CS 466 Saurabh Sinha.
Non-Informative Dirichlet Score for learning Bayesian networks Maomi Ueno and Masaki Uto University of Electro-Communications, Japan 1.Introduction: Learning.
Classical Encryption techniques
Data Encryption Standard CS-471/971. Category of Standard: Computer Security. Explanation: The Data Encryption Standard (DES) specifies a FIPS approved.
1 Combinatorial Problem. 2 Graph Partition Undirected graph G=(V,E) V=V1  V2, V1  V2=  minimize the number of edges connect V1 and V2.
Spectral Sequencing Based on Graph Distance Rong Liu, Hao Zhang, Oliver van Kaick {lrong, haoz, cs.sfu.ca {lrong, haoz, cs.sfu.ca.
Lecture 23 Symmetric Encryption
Block Ciphers and the Advanced Encryption Standard
Principal Component Analysis (PCA)
+ Chapter 5 Overview 5.1 Introducing Probability 5.2 Combining Events 5.3 Conditional Probability 5.4 Counting Methods 1.
Fidelity of a Quantum ARQ Protocol Alexei Ashikhmin Bell Labs  Classical Automatic Repeat Request (ARQ) Protocol  Quantum Automatic Repeat Request (ARQ)
R ANDOM N UMBER G ENERATORS Modeling and Simulation CS
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
Unit-8 Sorting Algorithms Prepared By:-H.M.PATEL.
Searching a Linear Subspace Lecture VI. Deriving Subspaces There are several ways to derive the nullspace matrix (or kernel matrix). ◦ The methodology.
ELEC692 VLSI Signal Processing Architecture Lecture 12 Numerical Strength Reduction.
1 Combinatorial Problem. 2 Graph Partition Undirected graph G=(V,E) V=V1  V2, V1  V2=  minimize the number of edges connect V1 and V2.
Chapter 7. Classification and Prediction
Chapter 3 Component Reliability Analysis of Structures.
Chapter 7 Random Number Generation
Chapter 7 Random-Number Generation
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Cryptography Lecture 15.
Presentation transcript:

ORTHOGONAL ARRAYS APPLICATION TO PSEUDORANDOM NUMBERS GENERATION AND OPTIMIZATION PROBLEMS A.G.Chefranov †‡, T.A.Mazurova ‡, I.D.Sidorov ‡, T.S.Letia  †Eastern Mediterranean University, Gazimagusa, North Cyprus ‡Taganrog State University of Radio-Engineering, Taganrog, Russia  Technical University of Cluj-Napoca, Cluj-Napoca, Romania

Orthogonal Arrays Orthogonal arrays (OA) are widely used in many areas. In OA of strength t with L levels having L t rows and f columns with elements from {0,..,L-1} each combination of t columns contains without repetition all L t combinations of numbers {0,..,L-1}. OA may be used for generation of pseudorandom sequences using enumeration of combinations of columns and writing their rows in line. This results in very long not repeated sequences of numbers even in the case of rather small values of L and t. Thus, for L=7 and t=4 period length is equal to This approach requires generation of full OA; in the mentioned above case it contains 7 4 rows each of 7 numbers from {0,..,6}. For effective enumeration of permutations for this algorithm special partially factorial numbers representation is introduced. Also, directly formula for generating elements of OA may be used for pseudorandom numbers generation. Estimation of distances between OA rows is made showing uniform distribution of these vectors. This may be the ground for using OA in optimization

Formula for OA Generation Elements of OA with prime L, strength t, L columns: (1)

OA-PRNGA1 1. Choose L,t and some permutation of OA rows and permutation of some t columns as a seed of algorithm 2. Run through OA rows inside selected columns outputting OA elements as pseudorandom numbers. To improve statistical characteristics of generated sequence some transformation may be applied to it (for example, 0-s from this sequence are deleted, values are taken modulus 2, resulting bit sequence is transformed by grouping 2 neighboring bits, 00-s and 11-s are deleted, 01-s and 10-s are converted into 0-s and 1-s respectively, and then XORing of neighboring bytes). 3. Take next combination of this or next t columns, repeat step 2 4. Take next permutation of OA rows, repeat steps 2,3

Partially Factorial-Based Numbers Representation n is a length of permutation, xi – numbers, which can be uniquely obtained from permutation, and which uniquely define respective permutation (2)

Enumeration of Permutations and Calculation of xi Let we have permutation a1a2…an-1. Substituting n serially on all possible (numerated as 0,.., n-1) positions in this permutation we get n new permutations: na1a2…an-1, a1na2…an-1, …, a1a2…nan-1, a1a2…an-1n. To enumerate all permutations of 3 elements 0,1,2: 0 (all permutations of 1 element are ready), 10, 01 (all permutations of 2 elements are got), 210, 120, 102 (got by substitution of 2 into 1st permutation of size 2), 201, 021, 012 (all permutations are got). Value xi may be defined as place for insertion chosen in this algorithm for i-th element while getting particular permutation, for example, if we take permutation 012 then x0 = 0, x1 =1, x2 =2, and according to (2) x=3*x1+1*x2=5, for permutation 201 we get x0 = 0, x1 =1, x2 =0, x= 3*x1+1*x2=3, value of x0 will always be equal to 0.

OA-PRNGA2 1. Choose L,t, some OA row number N and some combination of 2L numbers from {0,..,L-1} mix[2,L] as a seed. 2. Calculate next L OA row numbers and mix them with array mix, outputting L numbers taken as L outputs of generator. This mixture may be taken as where out[i] stands for i-th output pseudorandom number obtained from current OA row, i-th element of which is denoted as OArow[i] 3. Take next row cyclically by L t, repeat step 2.

Measures Used for Comparison number of 1-s in generated bit sequence (length>=20000 bit), statistics is where k=2, must have asymptotic distribution as χ 2 with k-1 levels of freedom; number of m-bit vectors, statistics is given by: where Ni is a frequency of appearance of i-th vector in their sequence of k vectors; must have asymptotic distribution as χ 2 with 2 m -1levels of freedom;

Measures Used for Comparison-1 number of sequences of 1-s and 0-s, statistics is where Bi is number of series of 0-s of length i, Gi is number of series of 1-s of length i, Ei=(n-i+3)/(2i+2) is expected number of series, k is maximal integer i for which Ei > 5; must have asymptotic distribution as χ 2 with 2k-2 levels of freedom;

Measures Used for Comparison-2 coefficient of sequential correlation showing dependency of the next symbol on the previous one, calculated as Value of this statistics must be near 0 in 95% of occasions, n>2

Comparison Results Sequences of 2500 and bytes were used OA-PRNGA1, OA-PRNGA2, RC4, Standard Delphi Generator were compared Approximately same characteristics Timing for OA-PRNGA1 is slightly worse P-4 1.7Ghz 256 M was used

UNIFORMITY OF OA ROWS DISTRIBUTION AND OA APPLICATION TO OPTIMIZATION PROBLEMS Theorem. Distance between any two rows of OA with L levels, L is a prime, L+1 columns, strength t=2, where is =

Investigated for Optimization Functions Rosenbrock’s saddle and its generalization: Himmelblau’s function and its generalizations

OA-Based Optimization Algorithms Essence of these algorithms is in mapping of initial ranges for each variable onto set of levels, calculation of function in the points shown by respective columns of OA, selection of the best point, and remapping of twice shrunk range on the set of levels. There may be used different approaches to select next point: by averaging of function’s values along each of dimensions separately, and choosing the optimal one as combination of separate optimums (AvgOA), or find best function value and choose corresponding set of variables as next optimum (DirOA); for remapping, next optimal point components may retain their relative positions as in the previous act of mapping (AvgOA, DirOA), or they become the center of new mapped range (CenOA).

Results of Algorithms Investigation Algorithms DirOA, AvgOA, CenOA together with Monte-Carlo method (MCM) were considered Number of functions’ arguments 2-19 Number of OA levels up to 19 Number of runs for MCM up to For little number of variables OA-based optimization algorithms have nearly the same productivity as MCM, but for larger number of variables (5-19) OA- based algorithms give significantly better results in quality and in timings as well.

Conclusion Applicability of two proposed OA-based algorithms for pseudorandom numbers generating with extremely large periods was shown by comparison with well known algorithms. Special partially factorial numbers representation was introduced for effective enumeration of permutations for generated pseudorandom sequences. Such sequences may be used as stream ciphers for encryption in networks and for random number generation while modeling. Uniformity of scattering of points represented by OA rows is estimated. OA-based optimization algorithms iteratively reducing scope of search with the help of OA were considered. Relatively low computational complexity and sufficient accuracy especially in the case of large number of variables allows using them for optimization in control processes.