Probabilistic Cycle Detection for Schneie's Solitaire Keystream Algorithm

Total Page:16

File Type:pdf, Size:1020Kb

Probabilistic Cycle Detection for Schneie's Solitaire Keystream Algorithm 2014 Eighth International Conference on Software Security and Reliability - Companion Probabilistic Cycle Detection for Schneier’s Solitaire Keystream Algorithm Wiem Tounsi∗, Benjamin Justus∗, Nora Cuppens-Boulahia∗,Fred´ eric´ Cuppens∗, Joaquin Garcia-Alfaro∗∗ ∗Institut Mines-Telecom, Tel´ ecom´ Bretagne, Cesson Sevign´ e,´ France ∗∗Institut Mines-Telecom, Tel´ ecom´ SudParis, CNRS Samovar UMR 5157, Evry, France {FirstName.SurName}@telecom-bretagne.eu ; [email protected] Abstract—Pencil-and-paper ciphers are plausible solutions In this paper, we address some of the aforementioned that could provide lightweight protection to the communication questions about the keystream algorithm of Solitaire. Further- of resource-constrained devices. A good example in this more, we propose a slight variation of the original design category is Schneier’s Solitaire cipher. In this paper, we propose a probabilistic solution that is able to estimate Solitaire’s which could be used as a pseudo-random number generator keystream cycle length. We also present a variation of Solitaire’s (PRNG). We present a cycle detection algorithm, which is original design, and evaluate the resulting construction in terms computationally feasible when the deck size associated to the of predictability. We conduct statistical randomness tests on PRNG is relatively small. We conduct experimental results and both the original design and the modified version based on the show that it is possible to predict the maximum cycle length NIST randomness test suite. The results show that our approach improves the randomness of original Solitaire’s output sequences. period for the Solitaire PRNG of any deck size. To verify the randomness quality of Solitaire keystream, we conduct as well Keywords: ICT Security, Cryptography, Pencil-and-Paper some statistical evaluations of sample sequences generated by Ciphers, Pseudo-Random Number Generators (PRNG), Cycle both Solitaire and our modified version. The evaluations are Detection, Randomness Evaluation. based on the NIST statistical test suite for random and pseudo- random number generators [17]. I. INTRODUCTION Resource-constrained devices, such as sensors and passive Paper organization: Section II introduces the cycle detec- RFID tags, require the input of lightweight cipher designs in tion problem for PRNGs. Section III describes Solitaire’s order to protect their communications [8], [12]. Pencil-and- keystream algorithm. Section IV introduces our cycle estima- paper ciphers, also known as hand ciphers or field ciphers by tion algorithm and reports our experimental results. Section V the military, are a plausible solution to address such a concern presents the NIST randomness evaluation results on the quality [16]. Pencil-and-paper ciphers are encryption methods that are of the Solitaire PRNG. Section VI outlines related work. operated by human beings, and they hold an appropriate bal- Section VII concludes the paper. ance between security and lightweight computation. According II. PRNGS AND THE CYCLE DETECTION PROBLEM to studies like [11], humans and resource-constrained devices share similar sets of memory properties. For example, passive Deterministic pseudo-random number generators (PRNGs) RFID tags are able to store only short secrets of about 32 are often used to generate identical sequences for both the to 128 bits of length in their volatile memory. Human can sender and receiver sides of a communication exchange [19]. maintain about seven decimal digits in their immediate mem- We assume that this sequence is generated synchronously in ory [13]. Nevertheless, electronic devices are more efficient at each party. We also assume that the same sequence is used performing logical operations (e.g., AND, OR, and XOR-like to encrypt the messages following the one-time-pad principle operations), and at choosing random values. [7]. Most PRNGs are designed based on a wide range of Schneier’s Solitaire cipher is a good example of a pencil- cryptographic primitives [3], [6]. Today’s PRNGs are typically and-paper cipher that could be used to protect the commu- based on hash function or block cipher designs. Given the nications of resource-constrained devices. It was designed limited computing power of resource-constrained devices (e.g., by Bruce Schneier at the request of Neal Stephenson for passive RFID tags), block cipher based implementations are the Cryptonomicon novel [18]. Originally called Pontifex in expected to be in use. Stephenson’s novel, the algorithm behind Solitaire aims at Solitaire’s keystream algorithm can be used as a PRNG producing a practical cryptosystem calculated with an ordinary whose output is partitioned in blocks of length n. In block deck of playing cards. Despite decades of existence, few cipher-based PRNGs, the unpredictability of the generator is attacks or cryptanalysis techniques against Solitaire have been assured as long as a threshold N (related to the number of reported in the related literature. Questions such as the period PRNG outputs) is not reached — within the same initial state. of the Solitaire keystream algorithm, statistical properties of This threshold always exists due to the deterministic nature of its generated pseudo-random sequences, and complexity of the PRNGs. Once N is reached, the outputs may enter into a cycle. Solitaire internal states remain open. This cycle is predefined in classical designs of block ciphers, 978-1-4799-5843-6/14 $31.00 © 2014 IEEE 113 DOI 10.1109/SERE-C.2014.29 e.g., Cipher Block Chaining (CBC). It is typically equal to from some t’th number onwards. Here o(t) denotes the t’th 2n/2 [5]. In the sequel, we aim at estimating the threshold number in the keystream output, and S(t) the corresponding value N as the maximum cycle length for the Solitaire PRNG. Solitaire state. Thus, the task of detecting a cycle in the keystream is equivalent to finding a repetition of the Solitaire III. THE SOLITAIRE KEYSTREAM ALGORITHM state at some regular time intervals. This approach turns out to We start with a concise description of the Solitaire be computationally feasible for us when the number of cards keystream algorithm. Further details, including additional ex- is less than 16 (i.e. n ≤ 16, cf. Section IV-A). amples can be found in [18]. Solitaire generates its keystream Let o(t) be a keystream element within a cycle. The cycle using a deck of cards. Each card in the deck (54 cards, length which contains o(t) is equal to the size of the orbit including the 2 jokers) corresponds to a number 1 to 54. For generated by <S(t) > that acted under the transformation instance here, we use the bridge order of suits: clubs (1 - F . Pogorelov and Pudovkina give in [14] some algebraic 13), diamonds (14 - 26), hearts (27 - 39), spades (40 - 52), descriptions of the orbits generated by individual actions Fi. Joker A = 53, Joker B = 54. To initialize the deck, we have to At present, a complete algebraic description of those orbits arrange the cards in the initial configuration that is the state. generated by <F = F1,F2,F3,F4 > does not exist in The state (or key) in this instance corresponds to an element the literature. The best we can do theoretically is to write of the permutation group S54. To produce a single output from down the trivial bound (i.e., the maximum cycle length is the keystream algorithm, the followings steps should be carried necessarily less than the group order |Sn| = n!). There are out: some evidences, as shown in the next sections, that suggest 1) Find the A joker. Move it one card down. If the joker the orbit sizes should grow exponentially with respect to n. is the bottom card of the deck, move it just below the top card. B. Uniform Distribution Property of Keystream Outputs 2) Find the B joker. Move it two cards down. If the joker We start by validating the uniform distribution property of is the bottom card of the deck, move it just below the the Solitaire keystream outputs. Figures 1(a) and 1(b) plot second card. If the joker is one up from the bottom card, the frequency of occurrence of all possible keystream output move it just below the top card. values. They correspond to, respectively, a deck of 10 cards 3) Perform a triple cut. That is, swap the cards above the (Figure 1(a)); and 66 cards (Figure 1(b)). The plots depict the first joker with the cards below the second joker. average value associated to the frequency of occurrence of 4) Perform a count cut. Look at the bottom card. Count each card (excluding the jokers, which are never provided as down from the top card that number. Cut after the card a valid output). It also represents their 95% confidence inter- that you counted down to, leaving the bottom card on vals. To generate these two figures, we used 1,000 different the bottom. sequences, composed of 100,000 keystream outputs each. 5) Find the output card (number). To do this, look at the top We can observe that the uniform distribution property card. Count down that many cards. If one hits a joker, emerges when the number of cards n gets large. Indeed, as restart Step 1. This is the output card/number. can be seen from Figure 1(a), the probability distribution Solitaire is a block-permutation based algorithm. The for a deck of 10 cards lies in the range between 0.118 keystream output starts repeating itself after a cycle is reached. and 0.137. This is to be compared with the perfect uniform The cycle length of the keystream is a crucial piece of distribution score 1/8=0.125. For a deck of 66 cards, information since key recovery becomes possible once an the discrepancy between the actual probability distribution adversary is able to predict the keystream outputs.
Recommended publications
  • 11Th International Conference for Internet Technology and Secured Transactions
    Analysis of PRNGs with Large State Spaces and Structural Improvements Gabriele Spenger, Jörg Keller Faculty of Mathematics and Computer Science FernUniversität in Hagen 58084 Hagen, Germany [email protected], [email protected] Abstract usually been subject for a lot of scientific work trying to find any kinds of weaknesses before their standardization. But there are also occasions where the The security of cryptographic functions such as standards do not provide the right tools for an pseudo random number generators (PRNGs) can application. One example is the application on low cost usually not be mathematically proven. Instead, RFID transmitters, which only allow a very low statistical properties of the generator are commonly complexity of the algorithms due to the cost restraints evaluated using standardized test batteries on a (the cost is mostly driven by the required chip area [1]). limited number of output values. This paper In these cases, it might be required to use a non- demonstrates that valuable additional information standardized algorithm. This implies the danger of about the properties of the algorithm can be gathered choosing an algorithm that does not provide the by analyzing the state space. As the state space for necessary security. practical use cases is usually huge, two approaches Besides the algorithms themselves also a couple of are presented to make this analysis manageable. methods for the assessment of the suitability of Results for a practical application of these cryptographic functions have been standardized. approaches to the algorithms AKARI and A5/1 are Examples for methods for assessing the security of provided, giving new insights about the suitability of PRNGs are the Marsaglia suite of Tests of these PRNGs for security applications.
    [Show full text]
  • Using Map Service API for Driving Cycle Detection for Wearable GPS Data: Preprint
    Using Map Service API for Driving Cycle Detection for Wearable GPS Data Preprint Lei Zhu and Jeffrey Gonder National Renewable Energy Laboratory To be presented at Transportation Research Board (TRB) 97th Annual Meeting Washington, DC January 7-11, 2018 NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Operated by the Alliance for Sustainable Energy, LLC This report is available at no cost from the National Renewable Energy Laboratory (NREL) at www.nrel.gov/publications. Conference Paper NREL/CP-5400-70474 December 2017 Contract No. DE-AC36-08GO28308 NOTICE The submitted manuscript has been offered by an employee of the Alliance for Sustainable Energy, LLC (Alliance), a contractor of the US Government under Contract No. DE-AC36-08GO28308. Accordingly, the US Government and Alliance retain a nonexclusive royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for US Government purposes. This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States government or any agency thereof.
    [Show full text]
  • Exact Learning of Sequences from Queries and Trackers
    UNIVERSITY OF CALIFORNIA, IRVINE Exact Learning of Sequences from Queries and Trackers DISSERTATION submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in Computer Science by Pedro Ascens~ao Ferreira Matias Dissertation Committee: Distinguished Professor Michael T. Goodrich, Chair Distinguished Professor David Eppstein Professor Sandy Irani 2021 Chapter 2 c 2020 Springer Chapter 4 c 2021 Springer All other materials c 2021 Pedro Ascens~aoFerreira Matias DEDICATION To my parents Margarida and Lu´ıs,to my sister Ana and to my brother Luisito, for the encouragement in choosing my own path, and for always being there. { Senhorzinho Doutorzinho ii TABLE OF CONTENTS Page COVER DEDICATION ii TABLE OF CONTENTS iii LIST OF FIGURES v ACKNOWLEDGMENTS vii VITA ix ABSTRACT OF THE DISSERTATION xii 1 Introduction 1 1.1 Learning Strings . .3 1.2 Learning Paths in a Graph . .4 1.3 Literature Overview on Exact Learning and Other Learning Models . .5 2 Learning Strings 12 2.1 Introduction . 12 2.1.1 Related Work . 14 2.1.2 Our Results . 18 2.1.3 Preliminaries . 19 2.2 Substring Queries . 20 2.2.1 Uncorrupted Periodic Strings of Known Size . 22 2.2.2 Uncorrupted Periodic Strings of Unknown Size . 25 2.2.3 Corrupted Periodic Strings . 30 2.3 Subsequence Queries . 36 2.4 Jumbled-index Queries . 39 2.5 Conclusion and Open Questions . 46 3 Learning Paths in Planar Graphs 48 3.1 Introduction . 48 3.1.1 Related Work . 50 3.1.2 Definitions . 52 iii 3.2 Approximation algorithm . 53 3.2.1 Lower bound on OPT .........................
    [Show full text]
  • Solitaire Playing Card Ciphers
    SOLITAIRE PLAYING CARD CIPHERS To accompany the recent novel Cryptonomicon , Bruce Schneier, author of Applied Cryptography , developed a cipher using the 52 playing cards and two jokers called Solitare , which is described on the Counterpane web site. My Playing Card Cipher I, too, have now succumbed to the temptation to construct an alternative to Solitare . The basic cycle that takes a deck that has already been scrambled to produce a keystream operates as follows: Step 1: From the prepared deck (the order of the cards in it is the key), turn up, and deal out face up in a row, successive cards until the total of the cards (A=1, J=11, Q=12, K=13) is 8 or more. Step 2: If the last card dealt out in Step 1 is a J, Q, or K, take its value, otherwise take the total of the values of the cards dealt out in Step 1. (This gives a number from 8 to 17.) In the next row, deal out that many cards from the top of the deck. Step 3: Deal out the rest of the deck under that row, in successive rows that begin on the left, and end under the lowest card in the top row, the next lowest card in the top row, and so on, in rotation. A red card is lower than a black card of the same denomination, and when there are two cards of the same color and denomination, the first one in the row is considered lower. These first three steps may lead to a layout which looks like this: 7S QH 3D 6S 3C 2D QD 4S 8S JS JD 10H QC 8H 5H AC 6D KS 10C QS 9D 5D 2H 3S KD JH 2S 9C 9H 6H 8C 2C 7H JC 4C 8D 3H KC 7D 6C AH 4H 5C 10D 10S 7C 9S KH 4D AD 5S AS Step 4: Take the cards dealt out in Step 3, and pick them up by columns, starting with those under the lowest card in the row dealt out in Step 2.
    [Show full text]
  • 1 Abelian Group 266 Absolute Value 307 Addition Mod P 427 Additive
    1 abelian group 266 certificate authority 280 absolute value 307 certificate of primality 405 addition mod P 427 characteristic equation 341, 347 additive identity 293, 497 characteristic of field 313 additive inverse 293 cheating xvi, 279, 280 adjoin root 425, 469 Chebycheff’s inequality 93 Advanced Encryption Standard Chebycheff’s theorem 193 (AES) 100, 106, 159 Chinese Remainder Theorem 214 affine cipher 13 chosen-plaintext attack xviii, 4, 14, algorithm xix, 150 141, 178 anagram 43, 98 cipher xvii Arithmetica key exchange 183 ciphertext xvii, 2 Artin group 185 ciphertext-only attack xviii, 4, 14, 142 ASCII xix classic block interleaver 56 asymmetric cipher xviii, 160 classical cipher xviii asynchronous cipher 99 code xvii Atlantic City algorithm 153 code-book attack 105 attack xviii common divisor 110 authentication 189, 288 common modulus attack 169 common multiple 110 baby-step giant-step 432 common words 32 Bell’s theorem 187 complex analysis 452 bijective 14, 486 complexity 149 binary search 489 composite function 487 binomial coefficient 19, 90, 200 compositeness test 264 birthday paradox 28, 389 composition of permutations 48 bit operation 149 compression permutation 102 block chaining 105 conditional probability 27 block cipher 98, 139 confusion 99, 101 block interleaver 56 congruence 130, 216 Blum integer 164 congruence class 130, 424 Blum–Blum–Shub generator 337 congruential generator 333 braid group 184 conjugacy problem 184 broadcast attack 170 contact method 44 brute force attack 3, 14 convolution product 237 bubble sort 490 coprime
    [Show full text]
  • Playfair Decoder Download
    Playfair decoder download playfair cipher decoder free download. BitShade BitShade is a graphic utility to encrypt/decrypt with AES and/or base64 encode/decode a file. This is a simple application that uses the Playfair cipher to encode messages."The Playfair cipher or Playfair square is a manual symmetric. PlayFair Cipher is a symmetrical encryption process based on a So if you need to download the PlayFair Cipher script for offline use, for you, your company or ​PlayFair Decoder · ​How to encrypt using · ​How to decrypt PlayFair. Playfair Decoder Cipher Encryption Decryption Software Direct Link: >>> Playfair Decoder Cipher Encryption Decryption Software. Playfair Cipher Tool. To encipher a message, replace the example key with your own word or phrase, replace the example message(s) and click on the Submit. The Playfair cipher or Playfair square or Wheatstone-Playfair cipher or Wheatstone cipher is a .. Create a book · Download as PDF · Printable version. The Playfair cipher is a digraph substitution cipher. It employs a table where one letter of the alphabet is omitted, and the letters are arranged in a 5x5 grid. Cipher tools - Contains: vigenere, mobile cipher, morse code, ascii code, binary code, oct braille decoder, fake text, front to back text, mathias sandorf, playfair. Playfair Cipher, free playfair cipher software downloads. The Playfair cipher or Playfair square is a manual symmetric. PlayFair Cipher is a symmetrical encryption process based on a So if you need to download the. Download book PDF In this paper we will enhance the traditional Blick Playfair Cipher by encrypting the Download to read the full conference paper text.
    [Show full text]
  • Cuckoo Cycle: a Memory Bound Graph-Theoretic Proof-Of-Work
    Cuckoo Cycle: a memory bound graph-theoretic proof-of-work John Tromp December 31, 2014 Abstract We introduce the first graph-theoretic proof-of-work system, based on finding small cycles or other structures in large random graphs. Such problems are trivially verifiable and arbitrarily scalable, presumably requiring memory linear in graph size to solve efficiently. Our cycle finding algorithm uses one bit per edge, and up to one bit per node. Runtime is linear in graph size and dominated by random access latency, ideal properties for a memory bound proof-of-work. We exhibit two alternative algorithms that allow for a memory-time trade-off (TMTO)|decreased memory usage, by a factor k, coupled with increased runtime, by a factor Ω(k). The constant implied in Ω() gives a notion of memory-hardness, which is shown to be dependent on cycle length, guiding the latter's choice. Our algorithms are shown to parallelize reasonably well. 1 Introduction A proof-of-work (PoW) system allows a verifier to check with negligible effort that a prover has expended a large amount of computational effort. Originally introduced as a spam fighting measure, where the effort is the price paid by an email sender for demanding the recipient's attention, they now form one of the cornerstones of crypto currencies. As proof-of-work for new blocks of transactions, Bitcoin [1] adopted Adam Back's hashcash [2]. Hashcash entails finding a nonce value such that application of a cryptographic hash function to this nonce and the rest of the block header, results in a number below a target threshold1.
    [Show full text]
  • Graph Algorithms: the Core of Graph Analytics
    Graph Algorithms: The Core of Graph Analytics Melli Annamalai and Ryota Yamanaka, Product Management, Oracle August 27, 2020 AskTOM Office Hours: Graph Database and Analytics • Welcome to our AskTOM Graph Office Hours series! We’re back with new product updates, use cases, demos and technical tips https://asktom.oracle.com/pls/apex/asktom.search?oh=3084 • Sessions will be held about once a month • Subscribe at the page above for updates on upcoming session topics & dates And submit feedback, questions, topic requests, and view past session recordings • Note: Spatial now has a new Office Hours series for location analysis & mapping features in Oracle Database: https://asktom.oracle.com/pls/apex/asktom.search?oh=7761 2 Copyright © 2020, Oracle and/or its affiliates Safe harbor statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, timing, and pricing of any features or functionality described for Oracle’s products may change and remains at the sole discretion of Oracle Corporation. 3 Copyright © 2020, Oracle and/or its affiliates Agenda 1. Introduction to Graph Algorithms Melli 2. Graph Algorithms Use Cases Melli 3. Running Graph Algorithms Ryota 4. Scalability in Graph Analytics Ryota Melli Ryota Nashua, New Hampshire, USA Bangkok, Thailand @AnnamalaiMelli @ryotaymnk
    [Show full text]
  • 29 Yudhvir Yogesh Chaba.Pmd
    International Journal of Information Technology and Knowledge Management July-December 2008, Volume 1, No. 2, pp. 475-483 INORMATION THEORY TESTS BASED PERORMANCE EVALUATION O CRYPTOGRAPHIC TECHNIQUES YUDHVIR SINGH & YOGESH CHABA ABSTRACT Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and considerable research effort is required. This paper is devoted to the security and attack aspects of cryptographic techniques. We have discussed the dominant issues of security and various information theory characteristics of various cipher texts. The simulation based information theory tests such as Entropy, !loating !requency, Histogram, N-Gram, Autocorrelation and Periodicity on cipher text are done. The simulation based randomness tests such as !requency Test, Poker Test, Runs Test and Serial Test on cipher text are done. !inally, we have benchmarked some well-known cryptographic algorithms in search for the best compromise in security. Keywords: Cryptography, Ciphers, Secret Key Cryptography, Security, Attack, Attacks Analysis and Performance. 1. INTRODUCTION Common design criterion for every cryptosystem is that the algorithms used for encryption and decryption are publicly known and that the security of the scheme only relies on the secrecy of a short secret called the key [1][2]. !igure 1 shows the brief overview of all parts of an encryption system. It considers classical symmetric encryption only, i.e., both the sender and the receiver of a secret message share a common secret key K. An efficient encryption algorithm E, takes the key and a plaintext and outputs a ciphertext, and an efficient decryption algorithm D, takes the key and a ciphertext and outputs a plaintext.
    [Show full text]
  • Pollard's Rho Method
    Computational Number Theory and Algebra June 20, 2012 Lecture 18 Lecturers: Markus Bl¨aser,Chandan Saha Scribe: Chandan Saha In the last class, we have discussed the Pollard-Strassen's integer factoring algorithm that has a run- ning time of O~(s(N)1=2) bit operations, where s(N) is the smallest prime factor of the input (composite) number N. This algorithm has a space complexity of O~(s(N)1=2) bits. In today's class, we will discuss a heuristic, randomized algorithm - namely, Pollard's rho method, whose `believed' expected time complexity is O~(s(N)1=2) bit operations, and which uses only O~(1) space! Although, a rigorous analysis of Pollard's rho method is still open, in practice it is observed that Pollard's rho method is more efficient than Pollard- Strassen factoring algorithm (partly because of the low memory usage of the former). Today, we will cover the following topics: • Pollard's rho method, and • Introduction to smooth numbers. 1 Pollard's rho method Let N be a number that is neither a prime nor a perfect power, and p the smallest prime factor of N. If we pick numbers x0; x1; x2;::: from ZN uniformly, independently at random then after at most p + 1 such pickings we have (for the first time) two numbers xi; xs with i < s such that xi = xs mod p. Since N is not a perfect power, there is another prime factor q > p of N. Since the numbers xi and xs are randomly chosen from ZN , by the Chinese remaindering theorem, xi 6= xs mod q with probability 1 − 1=q even under the condition that xi = xs mod p.
    [Show full text]
  • I/O Efficient Accepting Cycle Detection*
    I/O Efficient Accepting Cycle Detection? J. Barnat, L. Brim, P. Simeˇcekˇ Department of Computer Science, Faculty of Informatics Masaryk University Brno, Czech Republic Abstract. We show how to adapt an existing non-DFS-based accepting cycle detection algorithm OWCTY [10, 15, 29] to the I/O efficient setting and compare its I/O efficiency and practical performance to the existing I/O efficient LTL model checking approach of Edelkamp and Jabbar [14]. The new algorithm exhibits similar I/O complexity with respect to the size of the graph while it avoids quadratic increase in the size of the graph. Therefore, the number of I/O operations performed is significantly lower and the algorithm exhibits better practical performance. 1 Introduction Model checking became one of the standard technique for verification of hard- ware and software systems even though the class of systems that can be fully verified is fairly limited due to the well known state explosion problem [12]. The automata-theoretic approach [33] to model checking finite-state systems against linear-time temporal logic (LTL) reduces to the detection of reachable accepting cycles in a directed graph. Due to the state explosion problem, the graph tends to be extremely large and its size poses real limitations to the verification process. Many more-or-less successful techniques have been introduced [12] to reduce the size of the graph advancing thus the frontier of still tractable systems. Never- theless, for real-life industrial systems these techniques are not efficient enough to fit the data into the main memory. An alternative solution is to increase the computational resources available to the verification process.
    [Show full text]
  • Spread Spectrum Based Statistically Distributed
    BIJIT - BVICAM’s International Journal of Information Technology Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA) A Methodology to Find the Cycle in a Directed GraphUsing Linked List Shubham Rungta1, Samiksha Srivastava2, Uday Shankar Yadav3and Rohit Rastogi4 Submitted in July 2013, Accepted in September 2014 Abstract - In computer science, cycle detection is the Here f(x) is the function and [x: x is 1, 2, 3, 4, 5, 6, y… in algorithmic problem of finding a cycle in a sequence of sequence, where y is 2, 3, 4, 5, and 6 in sequence and is iterated functionvalues. The analysis of cycles in network has repeated], here cycle exists because x repeats the value 2, 3, 4, different application in the design and development in 5, 6 repeatedly. This paper proposes a SUS’s cycle detection communication systems such as the investigation of algorithm to detect cycles and to find number of cycles in any topological features and consideration of reliability and fault directed graph whether it is simple or multi digraph. This tolerance. There are various problems related to the analysis algorithm is also helpful in fetching out the number of cycles in of cycles in network among which the most important one is the whole graph. the detection of cycles in graph. In this paper, we proposed SUS_dcycle method which is a detection algorithm for 2.0 EARLIER WORKS IN THIS FIELD detecting cycle in a directed graph, with the help of linked list 2.1 Floyd's cycle-finding algorithm, also called the "tortoise in order to discover new lists in run time.
    [Show full text]