SlideShare a Scribd company logo
1 of 11
Analysis of birthday paradox
bounds
&
Generalization
[U-5:6.2]
Mohammed Abdul Lateef
Cryptanalysis
• 22011DA802
• M.tech CFIS
1. Reentrancy
2. Unchecked External​
3. Call Integer Overflow​
4. Uninitialized State Variable​
5. Access Control​
Smart contract vulnerabilities​​
Smart
Contract
Vulnerabilities
Blockchain platforms and smart contracts are vulnerable to
security breaches.
Security breaches of smart contracts have led to huge
financial losses in terms of cryptocurrencies and tokens
Birthday Paradox Overview:
1.Addresses likelihood of shared birthdays in a group.
2.Applies to various scenarios, including cryptography.
Where and what collisions are
1.Probability of collisions in cryptographic hash functions.
2.Collisions: Two inputs producing the same hash output.
3.Implications for security and system integrity.
Birthday Paradox:
The birthday paradox is about how likely it is for two or more people in a
group to share the same birthday.
Applies to Various Scenarios, Including Cryptography:
This concept applies to different situations, and one of them is
cryptography. It helps us understand how likely it is for two different
inputs to produce the same output in a cryptographic hash function.
Collisions: Two Inputs Producing the Same Hash Output:
In cryptography, a collision happens when two different pieces of
information create the same output after being processed by hash
function.
Probability Approximations:
• Probability approximations are ways to estimate the chance of
something happening without doing complex calculations.
In the case of the birthday paradox, there are formulas that
approximate when the probability of a collision becomes significant.
Simple Approximation: P = (N^2) / (2 * M):
This is a formula used to estimate the probability of a collision in the
context of hash functions.
• "P" is the probability, "N" is the number of possible hash values, and
• "M" is the number of different inputs (or messages) being hashed.
Generalizations
In cryptographic
scenarios, generalizing
the analysis beyond basic
collisions is valuable.
Addressing collisions
between different sets.
Uniform Statistical
distributions
•Collisions Between
Different Sets
Multicollisions
Non - Uniform
Statistical
distributions
Collisions Between Different Sets​
• Focusing on collisions between distinct subsets drawn from a larger set.
1. Subset Characteristics:
• Two separate subsets are considered.
• First subset: N1 elements.
• Second subset: N2 elements.
• Larger set: N total elements
2. No Collisions Within Subsets:
• No collisions within individual subsets.
• Focus on collisions between 1st and 2nd subsets.
3. Estimating Expected Collisions:
• Formula introduced to estimate expected collisions between
subsets.
• Estimation: (N1 * N2) / N.
• Formula captures possible collision pairs.
• The formula reflects the number of possible pairs that can lead to
collisions.
Uniform Statistical Distribution: In a
uniform distribution, all outcomes are
equally likely, like drawing candies from a
bag with each candy having the same
chance of being picked.
Multi-collisions:
Multiple Elements
Sharing Values
• Involves multiple elements having the same value.
Subcase Distinctions:
• Analysis of multi-collisions has two main subcases,
similar to collision analysis.
• First Subcase: Within a single subset, finding
different elements with the same value.
• Second Subcase: Across distinct subsets,
identifying an element shared by all.
Alternatively, with L subsets, finding an
element common to all. This is called an L-
multicollision.
Non-Uniform Statistical
Distribution: In a non-
uniform distribution,
outcomes have varying
likelihoods, where some
are more probable than
others, as if certain candies
are more likely to be drawn
from the bag.
The expected number of L -
multicollisions in a subset of size N
chosen among M elements is
Multi Collision- [Contd.]
Thank you

More Related Content

Similar to Analysis of birthday paradox bounds & Generalization.pptx

You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...
You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...
You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...
Priyanka Aash
 
Surreptitiously weakening cryptographic systems
Surreptitiously weakening cryptographic systemsSurreptitiously weakening cryptographic systems
Surreptitiously weakening cryptographic systems
Yael Ziv
 

Similar to Analysis of birthday paradox bounds & Generalization.pptx (20)

Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Map
 
Nt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm PaperNt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm Paper
 
Computational Frameworks for Higher-order Network Data Analysis
Computational Frameworks for Higher-order Network Data AnalysisComputational Frameworks for Higher-order Network Data Analysis
Computational Frameworks for Higher-order Network Data Analysis
 
Data-driven Studies on Social Networks: Privacy and Simulation
Data-driven Studies on Social Networks: Privacy and SimulationData-driven Studies on Social Networks: Privacy and Simulation
Data-driven Studies on Social Networks: Privacy and Simulation
 
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc NetworksSurvey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
 
Constructing New Collective Signature Schemes Base on Two Hard Problems Facto...
Constructing New Collective Signature Schemes Base on Two Hard Problems Facto...Constructing New Collective Signature Schemes Base on Two Hard Problems Facto...
Constructing New Collective Signature Schemes Base on Two Hard Problems Facto...
 
CONSTRUCTING NEW COLLECTIVE SIGNATURE SCHEMES BASE ON TWO HARD PROBLEMS FACTO...
CONSTRUCTING NEW COLLECTIVE SIGNATURE SCHEMES BASE ON TWO HARD PROBLEMS FACTO...CONSTRUCTING NEW COLLECTIVE SIGNATURE SCHEMES BASE ON TWO HARD PROBLEMS FACTO...
CONSTRUCTING NEW COLLECTIVE SIGNATURE SCHEMES BASE ON TWO HARD PROBLEMS FACTO...
 
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
New Security Threats and Protection Techniques in Mobile Ad Hoc NetworksNew Security Threats and Protection Techniques in Mobile Ad Hoc Networks
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
 
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT SolverBreaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
 
You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...
You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...
You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...
 
a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...
 
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKSREVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
 
Review on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networksReview on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networks
 
Surreptitiously weakening cryptographic systems
Surreptitiously weakening cryptographic systemsSurreptitiously weakening cryptographic systems
Surreptitiously weakening cryptographic systems
 
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSA METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
 
Detecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSSDetecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSS
 
Quantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic ModulesQuantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic Modules
 
Comprehensive Study of Counter-acting Security Threats in Mobile Ad Hoc Networks
Comprehensive Study of Counter-acting Security Threats in Mobile Ad Hoc NetworksComprehensive Study of Counter-acting Security Threats in Mobile Ad Hoc Networks
Comprehensive Study of Counter-acting Security Threats in Mobile Ad Hoc Networks
 

More from Mohammed Abdul Lateef

Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Mohammed Abdul Lateef
 

More from Mohammed Abdul Lateef (8)

Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
 
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
 
Blockchain Smart Contract Fortification presentation.pptx
Blockchain Smart Contract Fortification presentation.pptxBlockchain Smart Contract Fortification presentation.pptx
Blockchain Smart Contract Fortification presentation.pptx
 
SECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxSECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptx
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
 
Bio filters/ Biofilteration
Bio filters/ BiofilterationBio filters/ Biofilteration
Bio filters/ Biofilteration
 
Calorific Values
Calorific ValuesCalorific Values
Calorific Values
 
Indian Mathematician
Indian MathematicianIndian Mathematician
Indian Mathematician
 

Recently uploaded

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Recently uploaded (20)

PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

Analysis of birthday paradox bounds & Generalization.pptx

  • 1. Analysis of birthday paradox bounds & Generalization [U-5:6.2] Mohammed Abdul Lateef Cryptanalysis • 22011DA802 • M.tech CFIS
  • 2. 1. Reentrancy 2. Unchecked External​ 3. Call Integer Overflow​ 4. Uninitialized State Variable​ 5. Access Control​ Smart contract vulnerabilities​​
  • 3. Smart Contract Vulnerabilities Blockchain platforms and smart contracts are vulnerable to security breaches. Security breaches of smart contracts have led to huge financial losses in terms of cryptocurrencies and tokens
  • 4. Birthday Paradox Overview: 1.Addresses likelihood of shared birthdays in a group. 2.Applies to various scenarios, including cryptography. Where and what collisions are 1.Probability of collisions in cryptographic hash functions. 2.Collisions: Two inputs producing the same hash output. 3.Implications for security and system integrity.
  • 5. Birthday Paradox: The birthday paradox is about how likely it is for two or more people in a group to share the same birthday. Applies to Various Scenarios, Including Cryptography: This concept applies to different situations, and one of them is cryptography. It helps us understand how likely it is for two different inputs to produce the same output in a cryptographic hash function. Collisions: Two Inputs Producing the Same Hash Output: In cryptography, a collision happens when two different pieces of information create the same output after being processed by hash function.
  • 6. Probability Approximations: • Probability approximations are ways to estimate the chance of something happening without doing complex calculations. In the case of the birthday paradox, there are formulas that approximate when the probability of a collision becomes significant. Simple Approximation: P = (N^2) / (2 * M): This is a formula used to estimate the probability of a collision in the context of hash functions. • "P" is the probability, "N" is the number of possible hash values, and • "M" is the number of different inputs (or messages) being hashed.
  • 7. Generalizations In cryptographic scenarios, generalizing the analysis beyond basic collisions is valuable. Addressing collisions between different sets. Uniform Statistical distributions •Collisions Between Different Sets Multicollisions Non - Uniform Statistical distributions
  • 8. Collisions Between Different Sets​ • Focusing on collisions between distinct subsets drawn from a larger set. 1. Subset Characteristics: • Two separate subsets are considered. • First subset: N1 elements. • Second subset: N2 elements. • Larger set: N total elements 2. No Collisions Within Subsets: • No collisions within individual subsets. • Focus on collisions between 1st and 2nd subsets. 3. Estimating Expected Collisions: • Formula introduced to estimate expected collisions between subsets. • Estimation: (N1 * N2) / N. • Formula captures possible collision pairs. • The formula reflects the number of possible pairs that can lead to collisions. Uniform Statistical Distribution: In a uniform distribution, all outcomes are equally likely, like drawing candies from a bag with each candy having the same chance of being picked.
  • 9. Multi-collisions: Multiple Elements Sharing Values • Involves multiple elements having the same value. Subcase Distinctions: • Analysis of multi-collisions has two main subcases, similar to collision analysis. • First Subcase: Within a single subset, finding different elements with the same value. • Second Subcase: Across distinct subsets, identifying an element shared by all. Alternatively, with L subsets, finding an element common to all. This is called an L- multicollision. Non-Uniform Statistical Distribution: In a non- uniform distribution, outcomes have varying likelihoods, where some are more probable than others, as if certain candies are more likely to be drawn from the bag.
  • 10. The expected number of L - multicollisions in a subset of size N chosen among M elements is Multi Collision- [Contd.]