Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.

Successfully reported this slideshow.

Like this presentation? Why not share!

- Kgc2014 삼한제국기 포스트모템 김찬웅 by Chanwoong Kim 1527 views
- 편리하고 익숙하자 by Jamie Seol 3090 views
- [NDC16] Effective Git by Chanwoong Kim 21904 views
- Differentiable Neural Computer by Taehoon Kim 5349 views
- 딥러닝을 위한 기초 수학 by Jamie Seol 14076 views
- 딥러닝과 강화 학습으로 나보다 잘하는 쿠키런 AI 구현하기 DE... by Taehoon Kim 131413 views

1,105 views

Published on

Published in:
Technology

No Downloads

Total views

1,105

On SlideShare

0

From Embeds

0

Number of Embeds

4

Shares

0

Downloads

8

Comments

0

Likes

2

No embeds

No notes for slide

- 1. Juno [u∶no∶] draw passwords 연세대학교 수학과 설진석
- 2. Abstract • alternative cryptographic hash function • image based • using Life-Like Cellular Automata • algorithm development
- 3. Preliminaries • Classical Mathematics • Automata Theory
- 4. Cryptographic Hash Function • given a function f: X → H, H = L(w{n}) • f is called cryptographic hash function if • • • Pa, b ∈ X (f(a)=f(b)) ≦ p -1 for ∀h ∈ H, “answering f (h)” is a NP-problem where • X : given set • p : desired probability • n : natural number
- 5. Cellular Automata • In n dimensional grid, given a • • T : transition rule • • S : set of states B : neighbor Each cell’s next state is determined by current state of the cell and neighbor applied by transition rule.
- 6. one-dimensional CA example • each row denotes step • each column denotes cell’s state history
- 7. Life-Like Cellular Automata • In two-dimensional grid • S : “alive” or “dead” • T : “survive”, “birth”, or “death” determined by number of “alive” cells in neighbor • B : Moore neighborhood (adjacent 8 cells)
- 8. LLCA example: Conway’s Game of Life • rule string B3/S23 • A cell survives if 2 or 3 neighbor is alive, and births if 2 neighbor is alive. Otherwise, it dies.
- 9. Object • drawing password, rather than inserting string • using LLCA as cryptographic hash function
- 10. Algorithm Raw Drawing Simplify Encode Hash via LLCA
- 11. Encoding 1 0 0 0 1 Original 0 1 0 0 1 0 1 0 0 0 0 0 1 1 1 Binary 8611d Result fixed sized image = fixed sized string 8 6 1 1 d Hex
- 12. LLCA as Hash? • LLCA is a function • • CA itself is a deterministic inverse LLCA is NP • checking answer is P • using “number of live neighbors”, so inverse can be calculated with non-deterministic turing machine
- 13. Limitations • sparse initial state generates sparse output • • requires minimum alive cells to be meaningful value infeasible to control or calculate collision probability p
- 14. Benefits and Applications • At least, it is valid cryptographic hash function • Calculation can be parallelized • Easy to control complexity • • • changing rule string terminating condition Can be used for signature authentication, or fingerprints
- 15. Implementation • Using coffee-script based LLCA library “Plasmid” • • http://nyamukoong.github.io/plasmid/ Result: https://theeluwin.kr/juno/

No public clipboards found for this slide

Be the first to comment