Attack On the Markov Problem
نویسنده
چکیده
In 2000 Ko gave potential hard problem is proposed called the Markov problem. We give an algorithm, for certain parameters, for solution of the Markov problem. The Markov problem is related to the knot recognition problem. Hence we also a new algorithm the knot recognition problem . This knot recognition algorithm may be used for previously proposed cryptosystem that uses knots. 1 Attack On the Markov Problem 1.1 The Markov Problem The goal of this paper, is to show that the suggested hard problem [2] is solvable, for certain parameters, and we describe probabilistic practical implementation of this algorithm that may give a practical solution to it. There is no known, polynomial complexity, algorithm to solve,for all parameters, the Markov problem. As an aside to solving this problem we get a new knot recognition, algorithm. Every knot can be represented as the closure of a braid. Two di¤erent braids can represent the same knot. We know a knot is ambient isotopic to a closed braid by Alexanders Theorem. A knot is transformed into an equivalent knot by a chain of Reidemeister moves. A knot can be constructed from a braid. Markov in the 1930s discovered the closure of any two braids is equivalent if they undergo a chain of his Markov moves. A full proof of his idea came later. In 1961 [6] the rst algorithm given to compare knots was given by Haken. A cryptosystem based on knots was proposed in [5]. Our knot algorithm, given in the section below, may be used with protocol based on knots, for example, possibly with scheme in [5],or a variant of [5]. The Markov problem as stated in [2] is the following (and using the notation of [2]): Instance: y 2 Bn such that y is conjugate to a braid of the form w 1 n 1 for w 2 Bn 1 Objective: Find (z; w) 2 (Bn; Bn 1) such that we have the equation one. zyz 1 = w n 1 where e = 1 or e = 1 (1)
منابع مشابه
Markov Chain Anticipation for the Online Traveling Salesman Problem by Simulated Annealing Algorithm
The arc costs are assumed to be online parameters of the network and decisions should be made while the costs of arcs are not known. The policies determine the permitted nodes and arcs to traverse and they are generally defined according to the departure nodes of the current policy nodes. In on-line created tours arc costs are not available for decision makers. The on-line traversed nodes are f...
متن کاملAlert correlation and prediction using data mining and HMM
Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...
متن کاملVacation model for Markov machine repair problem with two heterogeneous unreliable servers and threshold recovery
Markov model of multi-component machining system comprising two unreliable heterogeneous servers and mixed type of standby support has been studied. The repair job of broken down machines is done on the basis of bi-level threshold policy for the activation of the servers. The server returns back to render repair job when the pre-specified workload of failed machines is build up. The first (seco...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملAn Adaptive Approach to Increase Accuracy of Forward Algorithm for Solving Evaluation Problems on Unstable Statistical Data Set
Nowadays, Hidden Markov models are extensively utilized for modeling stochastic processes. These models help researchers establish and implement the desired theoretical foundations using Markov algorithms such as Forward one. however, Using Stability hypothesis and the mean statistic for determining the values of Markov functions on unstable statistical data set has led to a significant reducti...
متن کاملA particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014