Attack On the Markov Problem

نویسنده

  • James L. Adams
چکیده

In 2000 Ko gave potential hard problem is proposed called the Markov problem. We give an algorithm, for certain parameters, for solution of the Markov problem. The Markov problem is related to the knot recognition problem. Hence we also a new algorithm the knot recognition problem . This knot recognition algorithm may be used for previously proposed cryptosystem that uses knots. 1 Attack On the Markov Problem 1.1 The Markov Problem The goal of this paper, is to show that the suggested hard problem [2] is solvable, for certain parameters, and we describe probabilistic practical implementation of this algorithm that may give a practical solution to it. There is no known, polynomial complexity, algorithm to solve,for all parameters, the Markov problem. As an aside to solving this problem we get a new knot recognition, algorithm. Every knot can be represented as the closure of a braid. Two di¤erent braids can represent the same knot. We know a knot is ambient isotopic to a closed braid by Alexanders Theorem. A knot is transformed into an equivalent knot by a chain of Reidemeister moves. A knot can be constructed from a braid. Markov in the 1930’s discovered the closure of any two braids is equivalent if they undergo a chain of his Markov moves. A full proof of his idea came later. In 1961 [6] the …rst algorithm given to compare knots was given by Haken. A cryptosystem based on knots was proposed in [5]. Our knot algorithm, given in the section below, may be used with protocol based on knots, for example, possibly with scheme in [5],or a variant of [5]. The Markov problem as stated in [2] is the following (and using the notation of [2]): Instance: y 2 Bn such that y is conjugate to a braid of the form w 1 n 1 for w 2 Bn 1 Objective: Find (z; w) 2 (Bn; Bn 1) such that we have the equation one. zyz 1 = w n 1 where e = 1 or e = 1 (1)

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Markov Chain Anticipation for the Online Traveling Salesman Problem by Simulated Annealing Algorithm

The arc costs are assumed to be online parameters of the network and decisions should be made while the costs of arcs are not known. The policies determine the permitted nodes and arcs to traverse and they are generally defined according to the departure nodes of the current policy nodes. In on-line created tours arc costs are not available for decision makers. The on-line traversed nodes are f...

متن کامل

Alert correlation and prediction using data mining and HMM

Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...

متن کامل

Vacation model for Markov machine repair problem with two heterogeneous unreliable servers and threshold recovery

Markov model of multi-component machining system comprising two unreliable heterogeneous servers and mixed type of standby support has been studied. The repair job of broken down machines is done on the basis of bi-level threshold policy for the activation of the servers. The server returns back to render repair job when the pre-specified workload of failed machines is build up. The first (seco...

متن کامل

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

An Adaptive Approach to Increase Accuracy of Forward Algorithm for Solving Evaluation Problems on Unstable Statistical Data Set

Nowadays, Hidden Markov models are extensively utilized for modeling stochastic processes. These models help researchers establish and implement the desired theoretical foundations using Markov algorithms such as Forward one. however, Using Stability hypothesis and the mean statistic for determining the values of Markov functions on unstable statistical data set has led to a significant reducti...

متن کامل

A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014