100 results on '"Martinsen, Thor"'
Search Results
2. Bisecting binomial coefficients
- Author
-
Ionascu, Eugen J., Martinsen, Thor, and Stanica, Pantelimon
- Subjects
Mathematics - Combinatorics - Abstract
In this paper, we deal with the problem of bisecting binomial coefficients. We find many (previously unknown) infinite classes of integers which admit nontrivial bisections, and a class with only trivial bisections. As a byproduct of this last construction, we show conjectures Q2 and Q4 of Cusick and Li. We next find several bounds for the number of nontrivial bisections and further compute (using a supercomputer) the exact number of such bisections for n <= 51.
- Published
- 2016
3. Decomposing generalized bent and hyperbent functions
- Author
-
Martinsen, Thor, Meidl, Wilfried, Mesnager, Sihem, and Stanica, Pantelimon
- Subjects
Computer Science - Information Theory ,94C10, 06E30, 05B10 - Abstract
In this paper we introduce generalized hyperbent functions from $F_{2^n}$ to $Z_{2^k}$, and investigate decompositions of generalized (hyper)bent functions. We show that generalized (hyper)bent functions from $F_{2^n}$ to $Z_{2^k}$ consist of components which are generalized (hyper)bent functions from $F_{2^n}$ to $Z_{2^{k^\prime}}$ for some $k^\prime < k$. For odd $n$, we show that the Boolean functions associated to a generalized bent function form an affine space of semibent functions. This complements a recent result for even $n$, where the associated Boolean functions are bent., Comment: 24 pages
- Published
- 2016
4. Partial Spread and Vectorial Generalized Bent Functions
- Author
-
Martinsen, Thor, Meidl, Wilfried, and Stanica, Pantelimon
- Subjects
Computer Science - Information Theory - Abstract
In this paper we generalize the partial spread class and completely describe it for generalized Boolean functions from $\F_2^n$ to $\mathbb{Z}_{2^t}$. Explicitly, we describe gbent functions from $\F_2^n$ to $\mathbb{Z}_{2^t}$, which can be seen as a gbent version of Dillon's $PS_{ap}$ class. For the first time, we also introduce the concept of a vectorial gbent function from $\F_2^n$ to $\Z_q^m$, and determine the maximal value which $m$ can attain for the case $q=2^t$. Finally we point to a relation between vectorial gbent functions and relative difference sets.
- Published
- 2015
5. Generalized bent functions and their Gray images
- Author
-
Martinsen, Thor, Meidl, Wilfried, and Stanica, Pantelimon
- Subjects
Computer Science - Information Theory - Abstract
In this paper we prove that generalized bent (gbent) functions defined on $\mathbb{Z}_2^n$ with values in $\mathbb{Z}_{2^k}$ are regular, and find connections between the (generalized) Walsh spectrum of these functions and their components. We comprehensively characterize generalized bent and semibent functions with values in $\mathbb{Z}_{16}$, which extends earlier results on gbent functions with values in $\mathbb{Z}_4$ and $\mathbb{Z}_8$. We also show that the Gray images of gbent functions with values in $\mathbb{Z}_{2^k}$ are semibent/plateaued when $k=3,4$.
- Published
- 2015
6. Tools in Analyzing Linear Approximation for Boolean Functions Related to FLIP
- Author
-
Maitra, Subhamoy, Mandal, Bimal, Martinsen, Thor, Roy, Dibyendu, Stănică, Pantelimon, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Chakraborty, Debrup, editor, and Iwata, Tetsu, editor
- Published
- 2018
- Full Text
- View/download PDF
7. On Symmetry and Differential Properties of Generalized Boolean Functions
- Author
-
Martinsen, Thor, Meidl, Wilfried, Pott, Alexander, Stănică, Pantelimon, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Budaghyan, Lilya, editor, and Rodríguez-Henríquez, Francisco, editor
- Published
- 2018
- Full Text
- View/download PDF
8. Octal Bent Generalized Boolean Functions
- Author
-
Stanica, Pante and Martinsen, Thor
- Subjects
Mathematics - Combinatorics ,Computer Science - Information Theory ,05B10, 06E30, 94C10 - Abstract
In this paper we characterize (octal) bent generalized Boolean functions defined on $\BBZ_2^n$ with values in $\BBZ_8$. Moreover, we propose several constructions of such generalized bent functions for both $n$ even and $n$ odd.
- Published
- 2011
9. Generalized Bent Functions and Their Gray Images
- Author
-
Martinsen, Thor, Meidl, Wilfried, Stănică, Pantelimon, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Duquesne, Sylvain, editor, and Petkova-Nikova, Svetla, editor
- Published
- 2016
- Full Text
- View/download PDF
10. Bisecting binomial coefficients
- Author
-
Ionaşcu, Eugen J., Martinsen, Thor, and Stănică, Pantelimon
- Published
- 2017
- Full Text
- View/download PDF
11. On Symmetry and Differential Properties of Generalized Boolean Functions
- Author
-
Martinsen, Thor, primary, Meidl, Wilfried, additional, Pott, Alexander, additional, and Stănică, Pantelimon, additional
- Published
- 2018
- Full Text
- View/download PDF
12. Tools in Analyzing Linear Approximation for Boolean Functions Related to FLIP
- Author
-
Maitra, Subhamoy, primary, Mandal, Bimal, additional, Martinsen, Thor, additional, Roy, Dibyendu, additional, and Stănică, Pantelimon, additional
- Published
- 2018
- Full Text
- View/download PDF
13. Partial spread and vectorial generalized bent functions
- Author
-
Martinsen, Thor, Meidl, Wilfried, and Stănică, Pantelimon
- Published
- 2017
- Full Text
- View/download PDF
14. The Self-Shrinking Conflation Generator: A Proposed Improvement to the Self-Shrinking Generator
- Author
-
Stanica, Pantelimon, primary, Kanth, Vikram, additional, and Martinsen, Thor, additional
- Published
- 2022
- Full Text
- View/download PDF
15. FRAMEWORK FOR ANONYMIZED COVERT COMMUNICATIONS: A BLOCKCHAIN-BASED PROOF-OF-CONCEPT
- Author
-
McEachen, John C., Tummala, Murali, Martinsen, Thor, Thulasiraman, Preetha, Bollmann, Chad A., Electrical and Computer Engineering (ECE), Kanth, Vikram K., McEachen, John C., Tummala, Murali, Martinsen, Thor, Thulasiraman, Preetha, Bollmann, Chad A., Electrical and Computer Engineering (ECE), and Kanth, Vikram K.
- Abstract
In this dissertation, we present an information hiding approach incorporating anonymity that builds on existing classical steganographic models. Current security definitions are not sufficient to analyze the proposed information hiding approach as steganography offers data privacy by hiding the existence of data, a property that is distinct from confidentiality (data existence is known but access is restricted) and authenticity (data existence is known but manipulation is restricted). Combinations of the latter two properties are common in analyses, such as Authenticated Encryption with Associated Data (AEAD), yet there is a lack of research on combinations with steganography. This dissertation also introduces the security definition of Authenticated Stegotext with Associated Data (ASAD), which captures steganographic properties even when there is contextual information provided alongside the hidden data. We develop a hierarchical framework of ASAD variants, corresponding to different channel demands. We present a real-world steganographic embedding scheme, Authenticated SteGotex with Associated tRansaction Data (ASGARD), that leverages a blockchain-based application as a medium for sending hidden data. We analyze ASGARD in our framework and show that it meets Level-4 ASAD security. Finally, we implement ASGARD on the Ethereum platform as a proof-of-concept and analyze some of the ways an adversary might detect our embedding activity by analyzing historical Ethereum data., Lieutenant, United States Navy, Approved for public release. Distribution is unlimited.
- Published
- 2022
16. NEURAL NETWORK DISTRIBUTIONAL INITIAL CONDITION ROBUSTNESS IN POWER SYSTEMS
- Author
-
Kang, Wei, Martinsen, Thor, Gannon, Anthony J., Applied Mathematics (MA), Smith, Philip B., Kang, Wei, Martinsen, Thor, Gannon, Anthony J., Applied Mathematics (MA), and Smith, Philip B.
- Abstract
How can we measure and classify neural network robustness across differently distributed data to avoid misuse of machine learning tools? This thesis adopts several metrics to measure the initial condition robustness of feedforward neural networks, allowing the creators of such networks to measure and refine their robustness and performance. This could allow highly robust neural networks to be used reliably on untrained data distributions and prevent the use of less robust networks as a black box in a poor environment. We test this measurement of robustness on a series of differently sized neural networks trained to detect and classify microgrid power system faults, giving examples of both robust and nonrobust networks, along with suggestions on how to maximize robustness. The analysis reveals that collecting data from segments along trajectories enhances the robustness of neural networks. In such data sets, the distribution of data points is dominated by the dynamics of the system, not the initial state distribution.
- Published
- 2022
17. ROBUSTNESS OF MACHINE LEARNING FOR POWER SYSTEMS
- Author
-
Kang, Wei, Martinsen, Thor, Gannon, Anthony J., Applied Mathematics (MA), Kozak, Elana P., Kang, Wei, Martinsen, Thor, Gannon, Anthony J., Applied Mathematics (MA), and Kozak, Elana P.
- Abstract
The applications of machine learning are broad and useful for a variety of industry and military objectives, but are the current methods robust? Robustness requires more than accuracy in ideal conditions; it means the system is resistant to perturbations in the data, both from natural and adversarial causes. This research aims to analyze the robustness of neural networks used for power-grid fault classifications. We focus on data generated from simulations of the classical 9-bus model; however, these methods and results can be extended to more complex microgrids, such as those found on naval ships, submarines, and bases. First, we measure the effects of random and adversarial noise on the testing data and compare three network types. Then we test different structures by varying the number of nodes and layers. Finally, we test whether adding noise to the training data can improve robustness. Before machine learning methods are adopted on submarines, we must first understand their weaknesses and potential for error. This research provides the foundation for how to test robustness, where neural networks are at risk from random or adversarial noise, and how to modify networks to improve their robustness.
- Published
- 2022
18. Robustness and Vulnerability Measures of Deep Learning Methods for Cyber Defense
- Author
-
Naval Postgraduate School (U.S.), Naval Research Program (NRP), Applied Mathematics (MA), Martinsen, Thor, Kang, Wei, Naval Postgraduate School (U.S.), Naval Research Program (NRP), Applied Mathematics (MA), Martinsen, Thor, and Kang, Wei
- Abstract
NPS NRP Technical Report, Navy networks and infrastructures are under frequent cyberattack. One developing area of application of Artificial Intelligence (AI) and Machine Learning (ML) is cybersecurity. However, some weakness of machine learning, such as the lack of interpretability and the susceptibility to adversarial data, are important issues that must be studied for reliable and safe applications of AI tools. The robustness of deep learning (DL) techniques used in computer vision and language processing have been extensively studied. However, less is currently known about the vulnerabilities and robustness of DL methods suitable in cybersecurity applications. The goal of this research is to investigate mathematical concepts and quantitative measures of robustness and vulnerability to adversarial data for cybersecurity DL and to create computational algorithms capable of quantitatively evaluating the robustness and vulnerability of DL tools. The tasks of the project include literature review, an innovative study of mathematical concepts, the development of computational algorithms, the validation of the concepts and algorithms through examples. The deliverables of the project include technical reports, student thesis, and technical papers for publication. This work will enhance understanding of vulnerabilities of deep learning systems that could be incorporated in future DoN networks, and provide the US Navy with computational tools capable of measuring the robustness of the AI enabled systems., Navy Cyber Defense Operations Command, N2/N6 - Information Warfare, This research is supported by funding from the Naval Postgraduate School, Naval Research Program (PE 0605853N/2098). https://nps.edu/nrp, Chief of Naval Operations (CNO), Approved for public release. Distribution is unlimited.
- Published
- 2022
19. C-DIFFERENTIALS AND GENERALIZED CRYPTOGRAPHIC PROPERTIES OF VECTORIAL BOOLEAN AND P-ARY FUNCTIONS
- Author
-
Dinolt, George W., Martinsen, Thor, Gera, Ralucca, Stanica, Pantelimon, Medina, Luis, University of Puerto Rico, Rio Piedras, Applied Mathematics (MA), Geary, Aaron C., Dinolt, George W., Martinsen, Thor, Gera, Ralucca, Stanica, Pantelimon, Medina, Luis, University of Puerto Rico, Rio Piedras, Applied Mathematics (MA), and Geary, Aaron C.
- Abstract
This dissertation investigates a newly defined cryptographic differential, called a c-differential, and its relevance to the nonlinear substitution boxes of modern symmetric block ciphers. We generalize the notions of perfect nonlinearity, bentness, and avalanche characteristics of vectorial Boolean and p-ary functions using the c-derivative and a new autocorrelation function, while capturing the original definitions as special cases (i.e., when c=1). We investigate the c-differential uniformity property of the inverse function over finite fields under several extended affine transformations. We demonstrate that c-differential properties do not hold in general across equivalence classes typically used in Boolean function analysis, and in some cases change significantly under slight perturbations. Thus, choosing certain affine equivalent functions that are easy to implement in hardware or software without checking their c-differential properties could potentially expose an encryption scheme to risk if a c-differential attack method is ever realized. We also extend the c-derivative and c-differential uniformity into higher order, investigate some of their properties, and analyze the behavior of the inverse function's second order c-differential uniformity. Finally, we analyze the substitution boxes of some recognizable ciphers along with certain extended affine equivalent variations and document their performance under c-differential uniformity., Commander, United States Navy, Approved for public release. Distribution is unlimited.
- Published
- 2022
20. Generalized Bent Functions and Their Gray Images
- Author
-
Martinsen, Thor, primary, Meidl, Wilfried, additional, and Stănică, Pantelimon, additional
- Published
- 2016
- Full Text
- View/download PDF
21. Robustness and Vulnerability Measures of Deep Learning Methods for Cyber Defense
- Author
-
Martinsen, Thor, Kang, Wei, Naval Postgraduate School (U.S.), Naval Research Program (NRP), and Applied Mathematics (MA)
- Subjects
Machine Learning ,Deep Learning ,Cybersecurity - Abstract
NPS NRP Executive Summary Navy networks and infrastructures are under frequent cyberattack. One developing area of application of Artificial Intelligence (AI) and Machine Learning (ML) is cybersecurity. However, some weakness of machine learning, such as the lack of interpretability and the susceptibility to adversarial data, are important issues that must be studied for reliable and safe applications of AI tools. The robustness of deep learning (DL) techniques used in computer vision and language processing have been extensively studied. However, less is currently known about the vulnerabilities and robustness of DL methods suitable in cybersecurity applications. The goal of this research is to investigate mathematical concepts and quantitative measures of robustness and vulnerability to adversarial data for cybersecurity DL and to create computational algorithms capable of quantitatively evaluating the robustness and vulnerability of DL tools. The tasks of the project include literature review, an innovative study of mathematical concepts, the development of computational algorithms, the validation of the concepts and algorithms through examples. The deliverables of the project include technical reports, student thesis, and technical papers for publication. This work will enhance understanding of vulnerabilities of deep learning systems that could be incorporated in future DoN networks, and provide the US Navy with computational tools capable of measuring the robustness of the AI enabled systems. Navy Cyber Defense Operations Command N2/N6 - Information Warfare This research is supported by funding from the Naval Postgraduate School, Naval Research Program (PE 0605853N/2098). https://nps.edu/nrp Chief of Naval Operations (CNO) Approved for public release. Distribution is unlimited.
- Published
- 2022
22. The Self-Shrinking Conflation Generator: A Proposed Improvement to the Self-Shrinking Generator.
- Author
-
Kanth, Vikram, Martinsen, Thor, and Stănică, Pantelimon
- Subjects
- *
SHIFT registers , *RANDOM numbers , *MATHEMATICAL analysis , *STREAM ciphers , *BINARY sequences - Abstract
The backbone of many cybersecurity applications and algorithms require random numbers. One of the most commonly used pseudo-random number generators is the Linear Feedback Shift Register (LFSR), which is fast, computationally inexpensive, and has excellent statistical properties. Unfortunately LFSRs have a number of weaknesses, some of which were addressed by decimation-based sequence generators such as the self-shrinking generator (SSG). Regrettably, the SSG was also found to be vulnerable to attack. In this paper, we propose an improvement to the SSG called the self-shrinking conflation generator (SSCG). Our approach is based on the observation that what is discarded during the self-shrinking process of the SSG, is from a cryptographic perspective, just as good as that which is kept. By combining the bits the SSG would normally discard with those it retains, using the exclusive OR (XOR) operation, we create a modified SSG bitstream with several improved characteristics. To highlight these improvements, we provide some mathematical security analysis associated with this approach, apply the National Institute of Standards and Technology (NIST) statistical test suite to several different bitstreams created using LFSRs driven by different degree primitive polynomials, and compare our results to that of the SSG. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
23. Bent and generalized bent Boolean functions
- Author
-
Stănică, Pantelimon, Martinsen, Thor, Gangopadhyay, Sugata, and Singh, Brajesh Kumar
- Published
- 2013
- Full Text
- View/download PDF
24. DESIGN OF A TAILORABLE PHYSICAL LAYER SECURITY FRAMEWORK INCLUDING ALTERNATING SPACE-TIME CODING AND GRAY CODE HOPPING
- Author
-
Ha, Tri T., Jenn, David C., Kragh, Frank E., Martinsen, Thor, Romero, Ric, Electrical and Computer Engineering (ECE), Cribbs, Michael R., Ha, Tri T., Jenn, David C., Kragh, Frank E., Martinsen, Thor, Romero, Ric, Electrical and Computer Engineering (ECE), and Cribbs, Michael R.
- Abstract
A physical layer security framework is developed that may be tailored to a particular wireless communications link. Alternating space-time coding and Gray code hopping techniques are presented that may be implemented individually or concurrently. The first technique may be utilized in any multiple-input multiple-output system with choice of single- or multi-space-time code configurations. Orthogonal, non-orthogonal, and spatially-multiplexed space-time codes are included to achieve a desired diversity-multiplexing balance in addition to demonstrated security benefits. Gray code hopping may be used in any system with common digital modulation schemes to "hop" between alternative binary reflected Gray code mappings of bits to complex-valued modulation symbols. Unlike similar constellation remapping techniques, Gray code hopping provides improved physical layer security against plaintext attacks without sacrificing bit error rate performance. To facilitate these schemes, we present two series of algorithms that systematically build large sets of unique alternative space-time codes and modulation mappings. Decoding methods are discussed to allow for channel equalization and symbol co-phasing when employing an alternating space-time code. Equivalent modulation/demodulation approaches are provided for Gray code hopping. Information-theoretic and computational security analysis, Monte Carlo simulations, and over-the-air testing are completed as confirmation of proposed methods., Lieutenant Commander, United States Navy, Approved for public release. Distribution is unlimited.
- Published
- 2021
25. A STATISTICAL ANALYSIS OF SOME STANDARD CIPHERS’ CRYPTOGRAPHIC PRIMITIVES
- Author
-
Stanica, Pantelimon, Bassett, Robert L., Martinsen, Thor, Applied Mathematics (MA), Operations Research (OR), Zillmer, Devon, Stanica, Pantelimon, Bassett, Robert L., Martinsen, Thor, Applied Mathematics (MA), Operations Research (OR), and Zillmer, Devon
- Abstract
Encryption is ubiquitous in the modern environment. While public/private key architecture has provided an amazing and powerful way to encrypt information so that only one intended recipient can decrypt, the computation required for this approach means that this encryption method can quickly grow extremely expensive. With that in mind, there are a variety of open-source stream ciphers that seek to provide relatively inexpensive stream ciphers to securely encrypt information. But these stream ciphers all operate using very different techniques to generate their keystream, as seen in the stark differences in paradigms between ciphers. As such, it is not immediately clear what operations are required to achieve the desired level of encryption. What cryptographic primitives are most common or efficacious in achieving security? Examining the Data Encryption Standard, Advanced Encryption Standard, and the stream cipher winners of the eStream II competition, an underlying trend composed of two operations emerges. Despite observing no clear n-grams defining precise cryptographic primitives, we identify a general structure common to all stream ciphers. Additionally, we identify that substitution boxes or multiplication operations are not necessary for stream ciphers, whereas addition and rotation operations seem to be essential., Major, United States Army, Approved for public release. Distribution is unlimited.
- Published
- 2021
26. STRUCTURAL PROPERTIES OF I-GRAPHS: THEIR INDEPENDENCE NUMBERS AND CAYLEY GRAPHS
- Author
-
Martinsen, Thor, Gera, Ralucca, Stanica, Pantelimon, Applied Mathematics (MA), Klein, Zachary J., Martinsen, Thor, Gera, Ralucca, Stanica, Pantelimon, Applied Mathematics (MA), and Klein, Zachary J.
- Abstract
We discuss in this paper the independence numbers and algebraic properties of I-graphs. The I-graphs are a further generalization of the Generalized Petersen graphs whose independence numbers have been previously researched. Specifically, we give bounds for the independence number of different I-graphs and sub-classes of I-graphs, and exactly determine the independence number for other I-graphs and sub-classes of I-graphs. We also analyze the automorphism groups of the I-graphs. These groups have been characterized in previous papers; in this paper, we examine them via their Cayley graphs. These Cayley graphs are characterized completely and examined according to their graph theoretical and algebraic properties., Ensign, United States Navy, Approved for public release. distribution is unlimited
- Published
- 2020
27. CHAOTIC COMBINER FOR LINEAR FEEDBACK SHIFT REGISTER SEQUENCES
- Author
-
Martinsen, Thor, Neta, Beny, Applied Mathematics (MA), Gutzler, Alexander, Martinsen, Thor, Neta, Beny, Applied Mathematics (MA), and Gutzler, Alexander
- Abstract
Cryptography is widely used by everybody in day-to-day activities. Many cryptographic algorithms rely on pseudorandom number sequences. One of the quickest methods of pseudorandom number generation is using linear feedback shift registers (LFSR) to generate sequences. LFSR sequences exhibit good statistical properties, but alone are not adequately secure due to their low linear complexity. To enhance the security, separate LFSR sequences can be combined into a single pseudorandom string by using a combiner. In this thesis, creating a combiner function using another pseudorandom sequence derived from the chaotic motion of a double pendulum is investigated. Using the information from this driving function, an iterative process occurs whereby certain LFSR sequence blocks are selected and combined. The resultant sequences are sufficiently random as proven by the 15 tests adopted by the National Institute of Standards and Technology to evaluate the randomness of binary strings.
- Published
- 2020
28. A MOVING TARGET DEFENSE SCHEME WITH OVERHEAD OPTIMIZATION USING PARTIALLY OBSERVABLE MARKOV DECISION PROCESSES WITH ABSORBING STATES
- Author
-
Jenn, David C., McEachen, John C., Tummala, Murali, Martinsen, Thor, Thulasiraman, Preetha, Electrical and Computer Engineering (ECE), McAbee, Ashley S., Jenn, David C., McEachen, John C., Tummala, Murali, Martinsen, Thor, Thulasiraman, Preetha, Electrical and Computer Engineering (ECE), and McAbee, Ashley S.
- Abstract
Moving target defense (MTD) is a promising strategy for gaining advantage over cyber attackers, but these dynamic reconfigurations can impose significant overhead. We propose implementing MTD within an optimization framework so that we seize defensive advantage while minimizing overhead. This dissertation presents an MTD scheme that leverages partially observable Markov decision processes (POMDP) with absorbing states to select the optimal defense based on partial observations of the cyber attack phase. In this way, overhead is minimized as reconfigurations are triggered only when the potential benefit outweighs the cost. We formulate and implement a POMDP within a system with Monte-Carlo planning-based decision making configured to reflect defender-defined priorities for the cost-benefit tradeoff. The proposed system also includes a performance -monitoring scheme for continuous validation of the model, critical given attackers' ever-changing techniques. We present simulation results that confirm the system fulfills the design goals, thwarting 99% of inbound attacks while sustaining system availability at greater than 94% even as probability of attack phase detection dropped to 0.74. A comparable system that triggered MTD techniques pseudorandomly maintained just 43% availability when providing equivalent attack suppression, which illustrates the utility of our proposed scheme.
- Published
- 2020
29. DOUBLE PENDULUM CHAOTIC MODEL FOR PSEUDORANDOM NUMBER GENERATION
- Author
-
Martinsen, Thor, Neta, Beny, Applied Mathematics (MA), Hard, Ryan C., Martinsen, Thor, Neta, Beny, Applied Mathematics (MA), and Hard, Ryan C.
- Abstract
The double pendulum is a system of two connected masses, one tethered to a point in space and the other tethered to the first mass. The double pendulum exhibits chaotic motion under the influence of an external force such as the gravitational force. The chaotic motion is sensitive to the initial conditions or positions of the masses, resulting in an infinite number of possible motion paths. The chaotic motion paths produced by the double pendulum can be exploited to produce binary sequences. This thesis focuses on determining if the chaotic motion of the double pendulum can be used as a pseudorandom number generator (PRNG) by modeling the motion and using different methods of extracting bits from the motion paths to produce pseudorandom binary sequences. The pseudorandom binary sequences are then evaluated using tests for randomness as defined by the National Institute of Standards and Technology (NIST). The methods of bit extraction can then be compared based on their NIST test results to ultimately determine the practicality of the double pendulum as a PRNG. Considerations can be made for different methods of bit extraction or the use of different chaotic motions.
- Published
- 2020
30. INDEPENDENCE NUMBER OF SPECIFIED I-GRAPHS
- Author
-
Martinsen, Thor, Gera, Ralucca, Stanica, Pantelimon, Applied Mathematics (MA), Dods, Matthew S., Martinsen, Thor, Gera, Ralucca, Stanica, Pantelimon, Applied Mathematics (MA), and Dods, Matthew S.
- Abstract
In this paper, we study the independence number of various classes of I-graphs. I-graphs are generalizations of the Generalized Petersen Graphs. We provide constructions of independent sets given any parameters, as well as bounds for some subclasses of I-graphs. We also prove exact results for some specific I-graphs., Ensign, United States Navy, Approved for public release. distribution is unlimited
- Published
- 2020
31. NON-LINEAR PSEUDORANDOM BIT GENERATION BY COMBINING BLUM BLUM SHUB AND LINEAR FEEDBACK SHIFT REGISTER SEQUENCES
- Author
-
Stanica, Pantelimon, Martinsen, Thor, Applied Mathematics (MA), Cammack, Andrew M., Stanica, Pantelimon, Martinsen, Thor, Applied Mathematics (MA), and Cammack, Andrew M.
- Abstract
The purpose of this thesis is to analyze the cryptographic properties of a pseudorandom bit generator that combines Blum Blum Shub and linear feedback shift register sequences using a shrinking generator configuration. We sought to answer the questions: (1) What are the strengths and weaknesses of this type of combiner? (2) What constraints must be placed on the input parameters to ensure good cryptographic properties of the output sequence? We generated sequences using variations of this combiner. We then evaluated their cryptographic suitability with the National Institute of Standards and Technology (NIST) statistical test suite. We identified lower bounds on the input parameters to increase the probability that the combiner would perform well under the NIST test suite. Our scheme produced consistently excellent results under NIST testing but is computationally too slow for many practical uses as a stream cipher. Future work could focus on methods to increase the speed of the generator without a loss of excellent cryptographic properties., Major, United States Army, Approved for public release. distribution is unlimited
- Published
- 2020
32. Analysis on Boolean Function in a Restricted (Biased) Domain
- Author
-
Maitra, Subhamoy, primary, Mandal, Bimal, additional, Martinsen, Thor, additional, Roy, Dibyendu, additional, and Stanica, Pantelimon, additional
- Published
- 2020
- Full Text
- View/download PDF
33. Bent and Generalized Bent Boolean Functions
- Author
-
Stanica, Pantelimon, primary, Martinsen, Thor, primary, Gangopadhyay, Sugata, primary, and Singh, Brajesh K., primary
- Published
- 2012
- Full Text
- View/download PDF
34. Correlation immunity, avalanche features, and other cryptographic properties of generalized Boolean functions
- Author
-
Martinsen, Thor, Stǎnicǎ, Pantelimon, and Applied Mathematics
- Subjects
strict avalanche criterion ,information warfare ,bent functions ,information security ,Cryptography ,cyber ,coding theory ,Boolean functions ,generalized Boolean functions ,communications security ,correlation immunity - Abstract
This dissertation investigates correlation immunity, avalanche features, and the bent cryptographic properties for generalized Boolean functions defined on Vn with values in Zԛ. We extend the concept of correlation immunity from the Boolean case to the generalized setting, and provide multiple construction methods for order 1 and higher correlation immune generalized Boolean functions. We establish necessary and sufficient conditions for generalized Boolean functions. Additionally, we discuss correlation immune and rotation symmetric generalized Boolean functions, introducing a construction method along the way. Using a graph-theoretic and probabilistic frame of reference, we subsequently establish several, increasingly stringent, strict avalanche criteria along with a con-struction method for generalized Boolean functions. We introduce the notion of a uniform avalanche criterion and demonstrate that generalized Boolean functions that satisfy this criterion are also order 1 correlation immune and always have Boolean function compo-nents that are both order 1 correlation immune and satisfy the strict avalanche criterion.We subsequently investigate linear structures, directional derivatives and define a unit vector gradient for generalized Boolean function. We introduce the Walsh-Hadamard trans-form of a generalized Boolean function along with the notion of generalized bent Boolean functions. We provide a construction of generalized bent Boolean functions with outputs in Z8 and establish necessary conditions for generalized bent Boolean functions. http://archive.org/details/correlationimmun1094556155 Commander, United States Navy Approved for public release; distribution is unlimited.
- Published
- 2017
35. Partial spread and vectoria bent functions
- Author
-
Martinsen, Thor, Meidl, Wilfried, Stănică, Pantelimon, Naval Postgraduate School, and Applied Mathematics
- Subjects
Generalized Boolean function ,Vectorial function ,Partial spread ,Relative difference set ,Generalized bent function - Abstract
The article of record as published may be found at http://dx.doi.org/10.1007/s10623-016-0283-7
- Published
- 2017
36. Decomposing Generalized Bent and Hyperbent Functions
- Author
-
Martinsen, Thor, primary, Meidl, Wilfried, additional, Mesnager, Sihem, additional, and Stanica, Pantelimon, additional
- Published
- 2017
- Full Text
- View/download PDF
37. Partial spread and vectoria bent functions
- Author
-
Naval Postgraduate School, Applied Mathematics, Martinsen, Thor, Meidl, Wilfried, Stănică, Pantelimon, Naval Postgraduate School, Applied Mathematics, Martinsen, Thor, Meidl, Wilfried, and Stănică, Pantelimon
- Published
- 2017
38. Generalized Boolean functions as combiners
- Author
-
Stanica, Pantelimon, Martinsen, Thor, Applied Mathematics, Di Nallo, Oliver, Stanica, Pantelimon, Martinsen, Thor, Applied Mathematics, and Di Nallo, Oliver
- Abstract
In this digital age, cryptography has formed the backbone of many computer functions. Cryptography drives online commerce and allows privileged information safe transit between two parties as well as many other critical internet uses. The presence of a strong pseudo-random number generator (PRNG) is an absolute requirement in modern cryptography. All modern ciphers draw their strength from having this strong generator. There are currently many ways to generate a secure PRNG. Most current PRNGs generate their stream as a sequence of bits. As a result, most tests performed to ensure randomness are made for binary streams. This thesis introduces a way to generate an integer random number stream using generalized Boolean functions. Additionally, this thesis discusses how to test an integer stream using binary tests. Data from this thesis suggests that high levels of complexity can be obtained using simple quadratic (or other higher degree) generalized combiners. Additionally, our data discusses the ability to generate sequences with high degrees of randomness using a variety of combiner choices for the generalized Boolean function.
- Published
- 2017
39. Applications of probabilistic combiners on linear feedback shift register sequences
- Author
-
Stănică, Pantelimon, Martinsen, Thor, Applied Mathematics, Sharpe, Nicholas J., Stănică, Pantelimon, Martinsen, Thor, Applied Mathematics, and Sharpe, Nicholas J.
- Abstract
Cryptography forms the backbone of modern secure communication. Many different methods are available for encrypting and decrypting data, each with advantages and disadvantages. If communicating parties require speed of encryption more than incredibly robust security, they may use a stream cipher, which is based on generating long strings of bits with linear feedback shift registers (LFSRs), then making those strings cryptographically secure by combining them with a nonlinear Boolean function called a combiner. In this thesis, we investigate a modification to the classical combiner method by introducing a (nonsecure) probabilistic randomization to the order in which the LFSRs are input into the combiner function at each bit. We implemented two different designs for the probabilistic combiner: one that randomly ordered four LFSRs and put them into a four-variable Boolean function, and another that selected only three out of four LFSRs to use as inputs in a three-variable function. Our tests on the resulting output strings show a drastic increase in complexity, while simultaneously passing the stringent randomness tests required by the National Institute of Standards and Technology for pseudorandom numbers.
- Published
- 2016
40. Nonquadratic variation of the Blum-Blum-Shub Pseudorandom Number Generator
- Author
-
Stanica, Pantelimon, Martinsen, Thor, Applied Mathematics, Knuth, Thomas, Stanica, Pantelimon, Martinsen, Thor, Applied Mathematics, and Knuth, Thomas
- Abstract
Cryptography is essential for secure online communications. Many different types of ciphers are implemented in modern-day cryptography, but they all have one common factor. All ciphers require a source of randomness, which makes them unpre-dictable. One such source of this randomness is a random number generator. This thesis focuses on Pseudorandom Number Generators (PRNG), specifically, a PRNG called Blum-Blum-Shub (BBS). In this thesis, we make two modifications to BBS, and test our modified generators for randomness using the National Institute of Standards and Technology (NIST) tests. The original BBS is a quadratic generator that generates bits based on the output of squaring terms in a sequence. The first modification replaces the quadratic generator with a cubic generator. The second modification generates bits faster by using more bits per iteration. Data collected in this thesis suggests that the cubic modification performs just as well as the original generator. In addition, data from this thesis suggests that taking more bits per iteration can speed up this process while retaining randomness. In addition, we propose a new cryptosystem based upon the modification of the BBS PRNG introduced in this thesis.
- Published
- 2016
41. Multiprime Blum-Blum-Shub pseudorandom number generator
- Author
-
Stanica, Pantelimon, Martinsen, Thor, Applied Mathematics, Shrestha, Bijesh, Stanica, Pantelimon, Martinsen, Thor, Applied Mathematics, and Shrestha, Bijesh
- Abstract
Blum-Blum-Shub (BBS) is a (probabilistically) secure pseudorandom bit/number generator which outputs a sequence by repeatedly reducing squares modulo the product of two Blum-primes. Our goal for this thesis is to modify the algorithm by using a modulus which is the product of three Blum-primes.We evaluate the effect of this modification using the suite of tests from National Institute of Standards and Technology (NIST). Previous research has evaluated the limit on the number of least important bits that can be extracted per iteration of the BBS algorithm while still maintaining the pseudorandom properties. In this paper, we go beyond the proposed limit and compare the modified BBS with the original BBS using the NIST tests. This paper also discusses the cryptosystem based on the modified BBS as well as the original BBS. We use three metrics for the comparison of performance: the type of tests, the overall performance of sequences against NIST tests, and the time to generate sequences. Our test data shows that both versions performed in a similar manner when subjected to NIST tests. Furthermore, bit generation is significantly faster for sequences generated by taking the last 50 bits or more, while still maintaining pseudorandom properties.
- Published
- 2016
42. Bisecting binomial coefficients
- Author
-
Naval Postgraduate School (U.S.), Applied Mathematics, Ionaşcu, Eugen J., Martinsen, Thor, Stănică, Pantelimon, Naval Postgraduate School (U.S.), Applied Mathematics, Ionaşcu, Eugen J., Martinsen, Thor, and Stănică, Pantelimon
- Abstract
In this paper, we deal with the problem of bisecting binomial coefficients. We find many (previously unknown) infinite classes of integers which admit nontrivial bisections, and a class with only trivial bisections. As a byproduct of this last construction, we show conjectures Q2 and Q4 of Cusick and Li [7]. We next find several bounds for the number of nontrivial bisections and further compute (using a supercomputer) the exact number of such bisections for n ≤ 51.
- Published
- 2016
43. Decomposing generalized bent and hyperbent functions
- Author
-
Naval Postgraduate School (U.S.), Applied Mathematics, Martinsen, Thor, Meidl, Wilfried, Mesnager, Sihem, Stănică, Pantelimon, Naval Postgraduate School (U.S.), Applied Mathematics, Martinsen, Thor, Meidl, Wilfried, Mesnager, Sihem, and Stănică, Pantelimon
- Abstract
In this paper we introduce generalized hyperbent functions from F2n to Z2k, and investigate decompositions of generalized (hyper)bent functions. We show that generalized (hyper)bent functions from F2n to Z2k consist of components which are generalized (hyper)bent functions from F2n to Z2k′ for some k′ < k. For odd n, we show that the Boolean functions associated to a generalized bent function form an affine space of semibent functions. This complements a recent result for even n, where the associated Boolean functions are bent.
- Published
- 2016
44. Ledererfaringer med innføring og bruk av etisk refleksjon som arbeidsmetode
- Author
-
Martinsen, Thor H
- Subjects
etisk refleksjon ,ledelse ,ledere ,verdibasert ledelse ,studentarbeider - Abstract
Drammen kommunes deltakelse i det nasjonale prosjektet ”Samarbeid om etisk kompetanseheving” er bakgrunn for denne oppgaven. Kommunen har deltatt siden 2008 og et stort antall ansatte har fått opplæring og mange virksomheter mange aktive refleksjonsgrupper. Mye fokus rettes mot de ansatte, men hvilken erfaringer har lederne gjort med dette arbeidet. Det gir grunnlaget for problemstillingen for denne studien som er : Hvilke erfaringer har lederne med innføring og bruk av etisk refleksjon som arbeidsmetode blant ansatte?
- Published
- 2014
45. Partial spread and vectorial generalized bent functions
- Author
-
Martinsen, Thor, primary, Meidl, Wilfried, additional, and Stănică, Pantelimon, additional
- Published
- 2016
- Full Text
- View/download PDF
46. Generalized bent functions and their Gray images
- Author
-
Naval Postgraduate School (U.S.), Applied Mathematics, Martinsen, Thor, Miedl, Wilfried, Stănică, Pantelimon, Naval Postgraduate School (U.S.), Applied Mathematics, Martinsen, Thor, Miedl, Wilfried, and Stănică, Pantelimon
- Abstract
In this paper we proved that generalized bent (gbent) functions defined on Z (n/2) with values in Z(2k) are regular and find connections between the (generalized) Walsh spectrum of these function and their components. We comprehensively characterize generalized bent and semibent functions with values in Z(16), which extends earlier results on gbent function with values in Z(4) and Z(8). We also show that the Gray images of gbent functions with values in (2k) are semibent/plateaued when k = 3,4.
- Published
- 2015
47. Partial spread and vectorial generalized bent functions
- Author
-
Naval Postgraduate School (U.S.), Applied Mathematics, Martinsen, Thor, Meidl, Wilfried, Stănică, Pantelimon, Naval Postgraduate School (U.S.), Applied Mathematics, Martinsen, Thor, Meidl, Wilfried, and Stănică, Pantelimon
- Abstract
In this paper we generalize the partial spread class and completely describe it for generalized Boolean functions from F(n/2) to Z(2t). Explicitly, we describe gbent function from F(n/2) to Z(2t), which can be seen as a gbent versio of Dillon's PS(ap) class. For the first time, we also introduce the concept of a vectorial gbent function from F(n/2) to Z(m/q), and determine the maximal value which m can attain for the q =2(t). Finally we point to a relation between vectorial gbent function and relative difference sets.
- Published
- 2015
48. Refinement composition using doubly labeled transition graphs
- Author
-
Martinsen, Thor, Dinolt, George, Fredricksen, Harold, Naval Postgraduate School (U.S.), Computer Science, and Applied Mathematics
- Subjects
Computer graphics ,Computer science - Abstract
Process Algebra forms a cornerstone in the formal methods area of Computer Science. Among the more widely used approaches is Milner's Communication and Concurrency Systems (CCS). Recently CCS has been extended by Schmidt and Bibighaus through the introduction of Doubly Labeled Transition Systems. This framework has enhanced the model's ability to capture security and availability properties. In this thesis we reformulate, simplify, and extend Bibighaus' work using a graph theoretic framework. The intent is that this abstract mathematical view will make the results more accessible and stimulate additional research. Existing definitions and theorems are redefined and proved using Labeled and Doubly Labeled Transition Graphs (LTG and DLTG). CCS simulation concepts are recast as graph morphisms and the notion of abstraction and refinement are explained through the use of graphs. Bibighaus' work is extended by showing how to carry out non-atomic DLTG refinement, and by developing a form of graph composition involving graph refinements that share a common abstract graph. This type of composition is proven to always be possible with DLTG refinements, and we demonstrate that the composite graph is both a refinement of the abstract graph, and an abstract graph for the refinements from which it was made. http://archive.org/details/refinementcompos109453269 US Navy (USN) author.
- Published
- 2007
49. Bent and Generalized Bent Boolean Functions
- Author
-
NAVAL POSTGRADUATE SCHOOL MONTEREY CA DEPT OF APPLIED MATHEMATICS, Stanica, Pantelimon, Martinsen, Thor, Gangopadhyay, Sugata, Singh, Brajesh K, NAVAL POSTGRADUATE SCHOOL MONTEREY CA DEPT OF APPLIED MATHEMATICS, Stanica, Pantelimon, Martinsen, Thor, Gangopadhyay, Sugata, and Singh, Brajesh K
- Abstract
In this paper, we investigate the properties of generalized bent functions defined on Zn2 with values in Zq, where q greater or equal to 2 is any positive integer. We characterize the class of generalized bent functions symmetric with respect to two variables, provide analogues of Maiorana-McFarland type bent functions and Dillon's functions in the generalized set up. A class of bent functions called generalized spreads is introduced and we show that it contains all Dillon type generalized bent functions and Maiorana-McFarland type generalized bent functions. Thus, unification of two different types of generalized bent functions is achieved. The cross-correlation spectrum of generalized Dillon type bent functions is also characterized. We further characterize generalized bent Boolean functions defined on Zn2 with values in Z4 and Z8. Moreover, we propose several constructions of such generalized bent functions for both n even and n odd.
- Published
- 2012
50. Refinement composition using doubly labeled transition graphs
- Author
-
Dinolt, George, Fredricksen, Harold, Naval Postgraduate School (U.S.), Computer Science, Applied Mathematics, Martinsen, Thor, Dinolt, George, Fredricksen, Harold, Naval Postgraduate School (U.S.), Computer Science, Applied Mathematics, and Martinsen, Thor
- Abstract
Process Algebra forms a cornerstone in the formal methods area of Computer Science. Among the more widely used approaches is Milner's Communication and Concurrency Systems (CCS). Recently CCS has been extended by Schmidt and Bibighaus through the introduction of Doubly Labeled Transition Systems. This framework has enhanced the model's ability to capture security and availability properties. In this thesis we reformulate, simplify, and extend Bibighaus' work using a graph theoretic framework. The intent is that this abstract mathematical view will make the results more accessible and stimulate additional research. Existing definitions and theorems are redefined and proved using Labeled and Doubly Labeled Transition Graphs (LTG and DLTG). CCS simulation concepts are recast as graph morphisms and the notion of abstraction and refinement are explained through the use of graphs. Bibighaus' work is extended by showing how to carry out non-atomic DLTG refinement, and by developing a form of graph composition involving graph refinements that share a common abstract graph. This type of composition is proven to always be possible with DLTG refinements, and we demonstrate that the composite graph is both a refinement of the abstract graph, and an abstract graph for the refinements from which it was made., http://archive.org/details/refinementcompos109453269, US Navy (USN) author.
- Published
- 2012
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.