Proving the Impossible is Impossible is Possible: Disproofs Based on Hereditary Partitions
نویسندگان
چکیده
A novel technique, ca l led heredi tary p a r t i t i o n s , is Introduced. I t permits the r igorous proof tha t , in a given axiomat izat ion, cer ta in states can never be reached. The technique is implemented in a computer program, DISPROVER, and is applied to robot wor lds. DISPROVER cooperates wi th a pathf ind ing program when the l a t t e r encounters d i f f i c u l t i e s .
منابع مشابه
Novel Impossible Differential Cryptanalysis of Zorro Block Cipher
Impossible difference attack is a powerful tool for evaluating the security of block ciphers based on finding a differential characteristic with the probability of exactly zero. The linear layer diffusion rate of a cipher plays a fundamental role in the security of the algorithm against the impossible difference attack. In this paper, we show an efficient method, which is independent of the qua...
متن کاملImpossible Differential Cryptanalysis on Deoxys-BC-256
Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal tweakable block cipher. First, we find a 4.5-round...
متن کاملA new method for accelerating impossible differential cryptanalysis and its application on LBlock
Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...
متن کاملImpossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)
Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...
متن کاملA new model for mining method selection based on grey and TODIM methods
One of the most important steps involved in mining operations is to select an appropriate extraction method for mine resources. After choosing the extraction method, it is usually impossible to replace it with another one because it may be so expensive that implementation of the entire project could be economically impossible. Choosing a mining method depends on the geological and geometrical c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1973