-
USSR is in P/poly
Authors:
Nikhil Balaji,
Samir Datta
Abstract:
The Sum of Square Roots (SSR) problem is the following computational problem: Given positive integers $a_1, \dots, a_k$, and signs $δ_1, \dots, δ_k \in \{-1, 1\}$, check if $\sum_{i=1}^k δ_i \sqrt{a_i} > 0$. The problem is known to have a polynomial time algorithm on the real RAM model of computation, however no sub-exponential time algorithm is known in the bit or Turing model of computation. The…
▽ More
The Sum of Square Roots (SSR) problem is the following computational problem: Given positive integers $a_1, \dots, a_k$, and signs $δ_1, \dots, δ_k \in \{-1, 1\}$, check if $\sum_{i=1}^k δ_i \sqrt{a_i} > 0$. The problem is known to have a polynomial time algorithm on the real RAM model of computation, however no sub-exponential time algorithm is known in the bit or Turing model of computation. The precise computational complexity of SSR has been a notorious open problem \cite{ggj} over the last four decades. The problem is known to admit an upper bound in the third level of the \emph{Counting Hierarchy}, i.e., $\CHtwo$ and no non-trivial lower bounds are known. Even when the input numbers are \emph{small}, i.e., given in \emph{unary}, no better complexity bound was known prior to our work. In this paper, we show that the unary variant (USSR) of the sum of square roots problem is considerably easier by giving a $P/poly$ upper bound.
△ Less
Submitted 1 November, 2023; v1 submitted 30 October, 2023;
originally announced October 2023.
-
Multiplicity Problems on Algebraic Series and Context-Free Grammars
Authors:
Nikhil Balaji,
Lorenzo Clemente,
Klara Nosan,
Mahsa Shirmohammadi,
James Worrell
Abstract:
In this paper we obtain complexity bounds for computational problems on algebraic power series over several commuting variables. The power series are specified by systems of polynomial equations: a formalism closely related to weighted context-free grammars. We focus on three problems -- decide whether a given algebraic series is identically zero, determine whether all but finitely many coefficien…
▽ More
In this paper we obtain complexity bounds for computational problems on algebraic power series over several commuting variables. The power series are specified by systems of polynomial equations: a formalism closely related to weighted context-free grammars. We focus on three problems -- decide whether a given algebraic series is identically zero, determine whether all but finitely many coefficients are zero, and compute the coefficient of a specific monomial. We relate these questions to well-known computational problems on arithmetic circuits and thereby show that all three problems lie in the counting hierarchy. Our main result improves the best known complexity bound on deciding zeroness of an algebraic series. This problem is known to lie in PSPACE by reduction to the decision problem for the existential fragment of the theory of real closed fields. Here we show that the problem lies in the counting hierarchy by reduction to the problem of computing the degree of a polynomial given by an arithmetic circuit. As a corollary we obtain new complexity bounds on multiplicity equivalence of context-free grammars restricted to a bounded language, language inclusion of a nondeterministic finite automaton in an unambiguous context-free grammar, and language inclusion of a non-deterministic context-free grammar in an unambiguous finite automaton.
△ Less
Submitted 28 April, 2023; v1 submitted 27 April, 2023;
originally announced April 2023.
-
Terms of Lucas sequences having a large smooth divisor
Authors:
Nikhil Balaji,
Florian Luca
Abstract:
We show that the $Kn$--smooth part of $a^n-1$ for an integer $a>1$ is $a^{o(n)}$ for most positive integers $n$.
We show that the $Kn$--smooth part of $a^n-1$ for an integer $a>1$ is $a^{o(n)}$ for most positive integers $n$.
△ Less
Submitted 23 March, 2022;
originally announced March 2022.
-
Identity Testing for Radical Expressions
Authors:
Nikhil Balaji,
Klara Nosan,
Mahsa Shirmohammadi,
James Worrell
Abstract:
We study the Radical Identity Testing problem (RIT): Given an algebraic circuit representing a polynomial $f\in \mathbb{Z}[x_1, \ldots, x_k]$ and nonnegative integers $a_1, \ldots, a_k$ and $d_1, \ldots,$ $d_k$, written in binary, test whether the polynomial vanishes at the real radicals $\sqrt[d_1]{a_1}, \ldots,\sqrt[d_k]{a_k}$, i.e., test whether $f(\sqrt[d_1]{a_1}, \ldots,\sqrt[d_k]{a_k}) = 0$.…
▽ More
We study the Radical Identity Testing problem (RIT): Given an algebraic circuit representing a polynomial $f\in \mathbb{Z}[x_1, \ldots, x_k]$ and nonnegative integers $a_1, \ldots, a_k$ and $d_1, \ldots,$ $d_k$, written in binary, test whether the polynomial vanishes at the real radicals $\sqrt[d_1]{a_1}, \ldots,\sqrt[d_k]{a_k}$, i.e., test whether $f(\sqrt[d_1]{a_1}, \ldots,\sqrt[d_k]{a_k}) = 0$. We place the problem in coNP assuming the Generalised Riemann Hypothesis (GRH), improving on the straightforward PSPACE upper bound obtained by reduction to the existential theory of reals. Next we consider a restricted version, called $2$-RIT, where the radicals are square roots of prime numbers, written in binary. It was known since the work of Chen and Kao that $2$-RIT is at least as hard as the polynomial identity testing problem, however no better upper bound than PSPACE was known prior to our work. We show that $2$-RIT is in coRP assuming GRH and in coNP unconditionally. Our proof relies on theorems from algebraic and analytic number theory, such as the Chebotarev density theorem and quadratic reciprocity.
△ Less
Submitted 1 June, 2022; v1 submitted 16 February, 2022;
originally announced February 2022.
-
The Leading Edge Problem in Fluid Mechanics
Authors:
U S Naveen Balaji,
Sujan Kumar S,
T Vignesh,
Kankanhally N Seetharamu,
T R Seetharam,
Babu Rao Ponangi,
Rammohan B
Abstract:
The self-similar momentum ordinary differential equation (MODE) and the self-similar partial differential equation (MPDE) have been derived and the investigation of the integrability of the MODE and the MPDE has been done by performing Painlevé test. A detailed discussion of the leading order behavior of the MODE and the MPDE has been presented with the latter being analyzed for the cases in which…
▽ More
The self-similar momentum ordinary differential equation (MODE) and the self-similar partial differential equation (MPDE) have been derived and the investigation of the integrability of the MODE and the MPDE has been done by performing Painlevé test. A detailed discussion of the leading order behavior of the MODE and the MPDE has been presented with the latter being analyzed for the cases in which terms of increasing orders of Reynolds number have been considered. We have provided a brief introduction to Lie point symmetries and have found the Lie infinitesimal operator which when acts on the MPDE to order $\mathcal{O}(R)$ satisfies the Lie symmetry condition. Explicit calculations and expressions for the Lie prolongation terms have been presented. We have also investigated the integrability of various self-similar equations that arise from the generalized self-similar equation for different values of constants $α_{1,2,3}$. Foundational work on transitional boundary solutions has been presented and transition solutions have been found via application of a junction condition at the leading edge-trailing edge boundary domain. A detailed discussion of semi-analytical solutions via the homotopy perturbation method is presented. We find semi-analytical solutions to the Falkner-Skan equation and the MODE by considering a Taylor series expansion as the initial approximation. An algorithmic scheme that involves consideration of a multi-dimensional Taylor expansion as the initial approximation to the MPDE has been presented.
△ Less
Submitted 3 August, 2020;
originally announced August 2020.
-
Cyclotomic Identity Testing and Applications
Authors:
Nikhil Balaji,
Sylvain Perifel,
Mahsa Shirmohammadi,
James Worrell
Abstract:
We consider the cyclotomic identity testing (CIT) problem: given a polynomial $f(x_1,\ldots,x_k)$, decide whether $f(ζ_n^{e_1},\ldots,ζ_n^{e_k})$ is zero, where $ζ_n = e^{2πi/n}$ is a primitive complex $n$-th root of unity and $e_1,\ldots,e_k$ are integers, represented in binary. When $f$ is given by an algebraic circuit, we give a randomized polynomial-time algorithm for CIT assuming the generali…
▽ More
We consider the cyclotomic identity testing (CIT) problem: given a polynomial $f(x_1,\ldots,x_k)$, decide whether $f(ζ_n^{e_1},\ldots,ζ_n^{e_k})$ is zero, where $ζ_n = e^{2πi/n}$ is a primitive complex $n$-th root of unity and $e_1,\ldots,e_k$ are integers, represented in binary. When $f$ is given by an algebraic circuit, we give a randomized polynomial-time algorithm for CIT assuming the generalised Riemann hypothesis (GRH), and show that the problem is in coNP unconditionally. When $f$ is given by a circuit of polynomially bounded degree, we give a randomized NC algorithm. In case $f$ is a linear form we show that the problem lies in NC. Towards understanding when CIT can be solved in deterministic polynomial-time, we consider so-called diagonal depth-3 circuits, i.e., polynomials $f=\sum_{i=1}^m g_i^{d_i}$, where $g_i$ is a linear form and $d_i$ a positive integer given in unary. We observe that a polynomial-time algorithm for CIT on this class would yield a sub-exponential-time algorithm for polynomial identity testing. However, assuming GRH, we show that if the linear forms~$g_i$ are all identical then CIT can be solved in polynomial time. Finally, we use our results to give a new proof that equality of compressed strings, i.e., strings presented using context-free grammars, can be decided in randomized NC.
△ Less
Submitted 4 May, 2021; v1 submitted 26 July, 2020;
originally announced July 2020.
-
Synchronous Robotic Framework
Authors:
Nagarathna Hema Balaji,
Jyothsna Kilaru,
Oscar Morales-Ponce
Abstract:
We present a synchronous robotic testbed called SyROF that allows fast implementation of robotic swarms. Our main goal is to lower the entry barriers to cooperative-robot systems for undergraduate and graduate students. The testbed provides a high-level programming environment that allows the implementation of Timed Input/Output Automata (TIOA). SyROF offers the following unique characteristics: 1…
▽ More
We present a synchronous robotic testbed called SyROF that allows fast implementation of robotic swarms. Our main goal is to lower the entry barriers to cooperative-robot systems for undergraduate and graduate students. The testbed provides a high-level programming environment that allows the implementation of Timed Input/Output Automata (TIOA). SyROF offers the following unique characteristics: 1) a transparent mechanism to synchronize robot maneuvers, 2) a membership service with a failure detector, and 3) a transparent service to provide common knowledge in every round. These characteristics are fundamental to simplifying the implementation of robotic swarms. The software is organized in five layers: The lower layer consists of a real-time publish-subscribe system that allows efficient communication between tasks. The next layer is an implementation of a Kalman filter to estimate the position, orientation, and speed of the robot. The third layer consists of a synchronizer that synchronously executes the robot maneuvers, provides common knowledge to all the active participants, and handles failures. The fifth layer consists of the programming environment.
△ Less
Submitted 8 June, 2020;
originally announced June 2020.
-
On Recent Developments in the Leading Edge Problem: Self-Similar Solutions to Momentum and Energy Equations of a Flat Plate
Authors:
U S Naveen Balaji,
Sujan Kumar S,
Kankanhally N Seetharamu,
T R Seetharam,
Babu Rao Ponangi,
Rammohan B
Abstract:
We provide an overview of the leading edge problem in this paper. We have used a self-similar function having a dependence on both the self-similar variable $η$ and Reynold's number R to covert the momentum and energy equations into a fourth-order, non-linear partial differential equation (PDE) and a second-order, non-linear PDE respectively. Attempts have been made to solve the energy equation in…
▽ More
We provide an overview of the leading edge problem in this paper. We have used a self-similar function having a dependence on both the self-similar variable $η$ and Reynold's number R to covert the momentum and energy equations into a fourth-order, non-linear partial differential equation (PDE) and a second-order, non-linear PDE respectively. Attempts have been made to solve the energy equation in a variety of ways, which include solving the PDE approximating the terms of the order $\mathcal{O}(R^{2})$ and solving the PDE via the method of characteristics, but mostly being able to solve the energy PDE sans solving the momentum PDE. The complexities involved in solving the momentum PDE have been discussed and plausible approximate solutions have been given. The importance of boundary conditions and how they influence the solution to the energy PDE has been discussed. We have also shown how the energy PDE can be defined as a well-posed hyperbolic initial-boundary value problem in the leading edge. We conclude the paper by showing an approximate solution to the heat transfer coefficient and plot its characteristic behavior.
△ Less
Submitted 9 October, 2019; v1 submitted 30 September, 2019;
originally announced October 2019.
-
Cyclic Symmetry of Riemann Tensor in Fuzzy Graph Theory
Authors:
U S Naveen Balaji,
S Sivasankar,
Sujan Kumar S,
Vignesh Tamilmani
Abstract:
In this paper, we define a graph-theoretic analog for the Riemann tensor and analyze properties of the cyclic symmetry. We have developed a fuzzy graph-theoretic analog of the Riemann tensor and have analyzed its properties. We have also shown how the fuzzy analog satisfies the properties of the 6X6 matrix of the Riemann tensor by expressing it as a union of the fuzzy complete graph formed by the…
▽ More
In this paper, we define a graph-theoretic analog for the Riemann tensor and analyze properties of the cyclic symmetry. We have developed a fuzzy graph-theoretic analog of the Riemann tensor and have analyzed its properties. We have also shown how the fuzzy analog satisfies the properties of the 6X6 matrix of the Riemann tensor by expressing it as a union of the fuzzy complete graph formed by the permuting vertex set and a Levi-Civita graph analog. We have concluded the paper with a brief discussion on the similarities between the properties of the fuzzy graphical analog and the Riemann tensor and how it can be a plausible analogous model for the Petrov-Penrose classification.
△ Less
Submitted 23 August, 2019;
originally announced September 2019.
-
On the Complexity of Value Iteration
Authors:
Nikhil Balaji,
Stefan Kiefer,
Petr Novotný,
Guillermo A. Pérez,
Mahsa Shirmohammadi
Abstract:
Value iteration is a fundamental algorithm for solving Markov Decision Processes (MDPs). It computes the maximal $n$-step payoff by iterating $n$ times a recurrence equation which is naturally associated to the MDP. At the same time, value iteration provides a policy for the MDP that is optimal on a given finite horizon $n$. In this paper, we settle the computational complexity of value iteration.…
▽ More
Value iteration is a fundamental algorithm for solving Markov Decision Processes (MDPs). It computes the maximal $n$-step payoff by iterating $n$ times a recurrence equation which is naturally associated to the MDP. At the same time, value iteration provides a policy for the MDP that is optimal on a given finite horizon $n$. In this paper, we settle the computational complexity of value iteration. We show that, given a horizon $n$ in binary and an MDP, computing an optimal policy is EXP-complete, thus resolving an open problem that goes back to the seminal 1987 paper on the complexity of MDPs by Papadimitriou and Tsitsiklis. As a step** stone, we show that it is EXP-complete to compute the $n$-fold iteration (with $n$ in binary) of a function given by a straight-line program over the integers with $\max$ and $+$ as operators.
△ Less
Submitted 27 April, 2019; v1 submitted 13 July, 2018;
originally announced July 2018.
-
500+ Times Faster Than Deep Learning (A Case Study Exploring Faster Methods for Text Mining StackOverflow)
Authors:
Suvodeep Majumder,
Nikhila Balaji,
Katie Brey,
Wei Fu,
Tim Menzies
Abstract:
Deep learning methods are useful for high-dimensional data and are becoming widely used in many areas of software engineering. Deep learners utilizes extensive computational power and can take a long time to train-- making it difficult to widely validate and repeat and improve their results. Further, they are not the best solution in all domains. For example, recent results show that for finding r…
▽ More
Deep learning methods are useful for high-dimensional data and are becoming widely used in many areas of software engineering. Deep learners utilizes extensive computational power and can take a long time to train-- making it difficult to widely validate and repeat and improve their results. Further, they are not the best solution in all domains. For example, recent results show that for finding related Stack Overflow posts, a tuned SVM performs similarly to a deep learner, but is significantly faster to train. This paper extends that recent result by clustering the dataset, then tuning very learners within each cluster. This approach is over 500 times faster than deep learning (and over 900 times faster if we use all the cores on a standard laptop computer). Significantly, this faster approach generates classifiers nearly as good (within 2\% F1 Score) as the much slower deep learning method. Hence we recommend this faster methods since it is much easier to reproduce and utilizes far fewer CPU resources. More generally, we recommend that before researchers release research results, that they compare their supposedly sophisticated methods against simpler alternatives (e.g applying simpler learners to build local models).
△ Less
Submitted 14 February, 2018;
originally announced February 2018.
-
Graph properties in node-query setting: effect of breaking symmetry
Authors:
Nikhil Balaji,
Samir Datta,
Raghav Kulkarni,
Supartha Podder
Abstract:
The query complexity of graph properties is well-studied when queries are on edges. We investigate the same when queries are on nodes. In this setting a graph $G = (V, E)$ on $n$ vertices and a property $\mathcal{P}$ are given. A black-box access to an unknown subset $S \subseteq V$ is provided via queries of the form `Does $i \in S$?'. We are interested in the minimum number of queries needed in…
▽ More
The query complexity of graph properties is well-studied when queries are on edges. We investigate the same when queries are on nodes. In this setting a graph $G = (V, E)$ on $n$ vertices and a property $\mathcal{P}$ are given. A black-box access to an unknown subset $S \subseteq V$ is provided via queries of the form `Does $i \in S$?'. We are interested in the minimum number of queries needed in worst case in order to determine whether $G[S]$, the subgraph of $G$ induced on $S$, satisfies $\mathcal{P}$.
Apart from being combinatorially rich, this setting allows us to initiate a systematic study of breaking symmetry in the context of query complexity of graph properties. In particular, we focus on hereditary graph properties. The monotone functions in the node-query setting translate precisely to the hereditary graph properties. The famous Evasiveness Conjecture asserts that even with a minimal symmetry assumption on $G$, namely that of vertex-transitivity, the query complexity for any hereditary graph property in our setting is the worst possible, i.e., $n$.
We show that in the absence of any symmetry on $G$ it can fall as low as $O(n^{1/(d + 1) })$ where $d$ denotes the minimum possible degree of a minimal forbidden sub-graph for $\mathcal{P}$. In particular, every hereditary property benefits at least quadratically. The main question left open is: can it go exponentially low for some hereditary property?
We show that the answer is no for any hereditary property with {finitely many} forbidden subgraphs by exhibiting a bound of $Ω(n^{1/k})$ for some constant $k$ depending only on the property. For general ones we rule out the possibility of the query complexity falling down to constant by showing $Ω(\log n/ \log \log n)$ bound. Interestingly, our lower bound proofs rely on the famous Sunflower Lemma due to Erdös and Rado.
△ Less
Submitted 28 October, 2015;
originally announced October 2015.
-
Counting Euler Tours in Undirected Bounded Treewidth Graphs
Authors:
Nikhil Balaji,
Samir Datta,
Venkatesh Ganesan
Abstract:
We show that counting Euler tours in undirected bounded tree-width graphs is tractable even in parallel - by proving a $\#SAC^1$ upper bound. This is in stark contrast to #P-completeness of the same problem in general graphs.
Our main technical contribution is to show how (an instance of) dynamic programming on bounded \emph{clique-width} graphs can be performed efficiently in parallel. Thus we…
▽ More
We show that counting Euler tours in undirected bounded tree-width graphs is tractable even in parallel - by proving a $\#SAC^1$ upper bound. This is in stark contrast to #P-completeness of the same problem in general graphs.
Our main technical contribution is to show how (an instance of) dynamic programming on bounded \emph{clique-width} graphs can be performed efficiently in parallel. Thus we show that the sequential result of Espelage, Gurski and Wanke for efficiently computing Hamiltonian paths in bounded clique-width graphs can be adapted in the parallel setting to count the number of Hamiltonian paths which in turn is a tool for counting the number of Euler tours in bounded tree-width graphs. Our technique also yields parallel algorithms for counting longest paths and bipartite perfect matchings in bounded-clique width graphs.
While establishing that counting Euler tours in bounded tree-width graphs can be computed by non-uniform monotone arithmetic circuits of polynomial degree (which characterize $\#SAC^1$) is relatively easy, establishing a uniform $\#SAC^1$ bound needs a careful use of polynomial interpolation.
△ Less
Submitted 12 December, 2015; v1 submitted 14 October, 2015;
originally announced October 2015.
-
Bounded Treewidth and Space-Efficient Linear Algebra
Authors:
Nikhil Balaji,
Samir Datta
Abstract:
Motivated by a recent result of Elberfeld, Jakoby and Tantau showing that $\mathsf{MSO}$ properties are Logspace computable on graphs of bounded tree-width, we consider the complexity of computing the determinant of the adjacency matrix of a bounded tree-width graph and as our main result prove that it is in Logspace. It is important to notice that the determinant is neither an $\mathsf{MSO}$-prop…
▽ More
Motivated by a recent result of Elberfeld, Jakoby and Tantau showing that $\mathsf{MSO}$ properties are Logspace computable on graphs of bounded tree-width, we consider the complexity of computing the determinant of the adjacency matrix of a bounded tree-width graph and as our main result prove that it is in Logspace. It is important to notice that the determinant is neither an $\mathsf{MSO}$-property nor counts the number of solutions of an $\mathsf{MSO}$-predicate. This technique yields Logspace algorithms for counting the number of spanning arborescences and directed Euler tours in bounded tree-width digraphs.
We demonstrate some linear algebraic applications of the determinant algorithm by describing Logspace procedures for the characteristic polynomial, the powers of a weighted bounded tree-width graph and feasibility of a system of linear equations where the underlying bipartite graph has bounded tree-width.
Finally, we complement our upper bounds by proving $\mathsf{L}$-hardness of the problems of computing the determinant, and of powering a bounded tree-width matrix. We also show the $\mathsf{GapL}$-hardness of Iterated Matrix Multiplication where each matrix has bounded tree-width.
△ Less
Submitted 8 December, 2014;
originally announced December 2014.
-
Scalability and Optimization Strategies for GPU Enhanced Neural Networks (GeNN)
Authors:
Naresh Balaji,
Esin Yavuz,
Thomas Nowotny
Abstract:
Simulation of spiking neural networks has been traditionally done on high-performance supercomputers or large-scale clusters. Utilizing the parallel nature of neural network computation algorithms, GeNN (GPU Enhanced Neural Network) provides a simulation environment that performs on General Purpose NVIDIA GPUs with a code generation based approach. GeNN allows the users to design and simulate neur…
▽ More
Simulation of spiking neural networks has been traditionally done on high-performance supercomputers or large-scale clusters. Utilizing the parallel nature of neural network computation algorithms, GeNN (GPU Enhanced Neural Network) provides a simulation environment that performs on General Purpose NVIDIA GPUs with a code generation based approach. GeNN allows the users to design and simulate neural networks by specifying the populations of neurons at different stages, their synapse connection densities and the model of individual neurons. In this report we describe work on how to scale synaptic weights based on the configuration of the user-defined network to ensure sufficient spiking and subsequent effective learning. We also discuss optimization strategies particular to GPU computing: sparse representation of synapse connections and occupancy based block-size determination.
△ Less
Submitted 1 December, 2014;
originally announced December 2014.
-
Tree-width and Logspace: Determinants and Counting Euler Tours
Authors:
Nikhil Balaji,
Samir Datta
Abstract:
Motivated by the recent result of [EJT10] showing that MSO properties are Logspace computable on graphs of bounded tree-width, we consider the complexity of computing the determinant of the adjacency matrix of a bounded tree-width graph and prove that it is L-complete. It is important to notice that the determinant is neither an MSO-property nor counts the number of solutions of an MSO-predicate.…
▽ More
Motivated by the recent result of [EJT10] showing that MSO properties are Logspace computable on graphs of bounded tree-width, we consider the complexity of computing the determinant of the adjacency matrix of a bounded tree-width graph and prove that it is L-complete. It is important to notice that the determinant is neither an MSO-property nor counts the number of solutions of an MSO-predicate. We extend this technique to count the number of spanning arborescences and directed Euler tours in bounded tree-width digraphs, and further to counting the number of spanning trees and the number of Euler tours in undirected graphs, all in L. Notice that undirected Euler tours are not known to be MSO-expressible and the corresponding counting problem is in fact #P-hard for general graphs. Counting undirected Euler tours in bounded tree-width graphs was not known to be polynomial time computable till very recently Chebolu et al [CCM13] gave a polynomial time algorithm for this problem (concurrently and independently of this work). Finally, we also show some linear algebraic extensions of the determinant algorithm to show how to compute the charcteristic polynomial and trace of the powers of a bounded tree-width graph in L.
△ Less
Submitted 30 December, 2013; v1 submitted 28 December, 2013;
originally announced December 2013.
-
Cryptanalysis of a Chaotic Image Encryption Algorithm
Authors:
Nikhil Balaji,
Nithin Nagaraj
Abstract:
Line map, an invertible, two-dimensional chaotic encryption algorithm was introduced recently. In this paper, we propose several weaknesses of the method based on standard cryptanalytic attacks. We perform a side-channel attack by observing the execution time of the encryption algorithm and successfully reduce the key space by a factor of 10^4 for a key length of 16 digits. We find the existence…
▽ More
Line map, an invertible, two-dimensional chaotic encryption algorithm was introduced recently. In this paper, we propose several weaknesses of the method based on standard cryptanalytic attacks. We perform a side-channel attack by observing the execution time of the encryption algorithm and successfully reduce the key space by a factor of 10^4 for a key length of 16 digits. We find the existence of equivalent keys which reduce the key space by a significant margin, even in the absence of any attack. Also, we find that the ciphertext is not sensitive to small changes in the plaintext due to poor diffusion.
△ Less
Submitted 12 January, 2008; v1 submitted 1 January, 2008;
originally announced January 2008.