The Pre-images of Bitwise AND Functions in Forensic Analysis
نویسندگان
چکیده
Mechanisms now exist that detect tampering of a database, through the use of cryptographically-strong hash functions, as well as algorithms for forensic analysis of such tampering, thereby determining who, when, and what. This paper shows that for one such forensic analysis algorithm, the tiled bitmap algorithm, determining when and what, which goes far in determining who, has at its core computing the pre-image of bitwise AND functions. This paper introduces the notion of candidate set (the desired pre-image of a target binary number), provides a complete characterization of the candidate set, and characterizes the cardinality as well as the average cardinality. We then provide an optimal algorithm for computing the candidate set given a target. We show that given an auxiliary candidate array, the candidate set can be computed in constant time. This latter algorithm is applicable when the target is a suffix of another target number for which a candidate set has already been computed.
منابع مشابه
Hardware Support for the Display and Manipulation of Binary Voxel Models
We use one of the available frame buffers for storage and direct display of the bi nary voxel data set. The other frame buffer holds either a surface normal view, a depth-shaded pre-image or the binary voxel data set of a secondary object. Altering the light direction or shading function IS performed by manipulating the hardware output lookup tables. An additional frame processor IS employed fo...
متن کاملNon-Archimedean analysis, T-functions, and cryptography
These are lecture notes of a 20-hour course at the International Summer School Mathematical Methods and Technologies in Com-Loosely speaking, a T-function is a map of n-bit words into n-bit words such that each i-th bit of image depends only on low-order bits 0,. .. , i of the pre-image. For example, all arithmetic operations (addition , multiplication) are T-functions, all bitwise logical oper...
متن کاملSimulation and Numerical Analysis of Wireless Psk Systems with Imperfect Carrier Phase Recovery
The bit error probability (BEP) of binary and quaternary PSK (BPSK and QPSK) signals over Rayleigh fading channel with imperfect carrier-phase recovery is derived. The channel is assumed to be slow and frequency-nonselective in which the received signal is constant over at least two symbol intervals. Numerical values for the average BEP are obtained by integrating the conditional BEP expression...
متن کاملBitwise Regularity and Ga-hardness
| We present in this paper a theoretical analysis that relates an irregularity measure of a tness function to the so-called GA-deception. This approach is a continuation of a work 18] that has presented a deception analysis of HH older functions. The analysis developed here is a generalization of this work in two ways : we rst use a \bitwise regularity" instead of a HH older exponent as a basis...
متن کاملBreaking a novel image encryption scheme based on improved hyperchaotic sequences
Recently, a novel image encryption scheme based on improved hyperchaotic sequences was proposed. A pseudorandom number sequence, generated by a hyper-chaos system, is used to determine two involved encryption functions, bitwise exclusive or (XOR) operation and modulo addition. It was reported that the scheme can be broken with some pairs of chosen plain-images and the corresponding cipher-image...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006