• Title/Summary/Keyword: $Gr{\ddot{o}}bner$ basis

Search Result 3, Processing Time 0.021 seconds

$Gr\ddot{o}bner$ basis versus indicator function (그뢰브너 기저와 지시함수와의 관계)

  • Kim, Hyoung-Soon;Park, Dong-Kwon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.20 no.6
    • /
    • pp.1015-1027
    • /
    • 2009
  • Many problems of confounding and identifiability for polynomial models in an experimental design can be solved using methods of algebraic geometry. The theory of $Gr\ddot{o}bner$ basis is used to characterize the design. In addition, a fractional factorial design can be uniquely represented by a polynomial indicator function. $Gr\ddot{o}bner$ bases and indicator functions are powerful computational tools to deal with ideals of fractions based on each different theoretical aspects. The problem posed here is to give how to move from one representation to the other. For a given fractional factorial design, the indicator function can be computed from the generating equations in the $Gr\ddot{o}bner$ basis. The theory is tested using some fractional factorial designs aided by a modern computational algebra package CoCoA.

  • PDF

Gröbner Basis Attacks on Lightweight RFID Authentication Protocols

  • Han, Dae-Wan
    • Journal of Information Processing Systems
    • /
    • v.7 no.4
    • /
    • pp.691-706
    • /
    • 2011
  • Since security and privacy problems in RFID systems have attracted much attention, numerous RFID authentication protocols have been suggested. One of the various design approaches is to use light-weight logics such as bitwise Boolean operations and addition modulo $2^m$ between m-bits words. Because these operations can be implemented in a small chip area, that is the major requirement in RFID protocols, a series of protocols have been suggested conforming to this approach. In this paper, we present new attacks on these lightweight RFID authentication protocols by using the Gr$\ddot{o}$bner basis. Our attacks are superior to previous ones for the following reasons: since we do not use the specific characteristics of target protocols, they are generally applicable to various ones. Furthermore, they are so powerful that we can recover almost all secret information of the protocols. For concrete examples, we show that almost all secret variables of six RFID protocols, LMAP, $M^2AP$, EMAP, SASI, Lo et al.'s protocol, and Lee et al.'s protocol, can be recovered within a few seconds on a single PC.

The fraction of simplex-centroid mixture designs (심플렉스 중심배열법의 일부실시에 관한 연구)

  • Kim, Hyoung Soon;Park, Dong Kwon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.6
    • /
    • pp.1295-1303
    • /
    • 2015
  • In a mixture experiment, one may be interested in estimating not only main effects but also some interactions. Main effects and interactions may be estimated through appropriate designs such as simplex-centroid designs. However, the estimability problems, implied by the sum to one functional relationship among the factors, have strong consequences on the confounding and identifiability of models for such designs. To handle these problems, we address homogeneous polynomial model based on the computational commutative algebra (CCA) instead of using $Scheff{\acute{e}}s$ canonical model which is typically used. The problem posed here is to give how to choose estimable main effects and also some low-degree interactions. The theory is tested using a fraction of simplex-centroid designs aided by a modern computational algebra package CoCoA.