Another Look at Normal Approximations in Cryptanalysis
|
|
- Francine Lee
- 5 years ago
- Views:
Transcription
1 Another Look at Normal Approximations in Cryptanalysis Palash Sarkar (Based on joint work with Subhabrata Samajder) Indian Statistical Institute INDOCRYPT 2015 IISc Bengaluru 8 th December 2015 (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
2 Symmetric Key Ciphers Block Ciphers: DES, Idea, AES, RC6, PRESENT,... Stream Ciphers: RC4, SNOW, Salsa, Trivium,... Design goals: Compact and efficient in hardware and/or software. Secure. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
3 Analysis of Block Ciphers Cryptanalytic techniques: Differential cryptanalysis. Linear cryptanalysis.... Known/chosen plaintext attacks: The cipher is instantiated with a secret key. (P 1, C 1 ),..., (P N, C N ): C i is the output of the cipher on input P i. Goal: Obtain the secret key. Weaker goal: build a distinguisher. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
4 Key Recovery Attacks: A Top-Level View Structural analysis: A detailed study of the target algorithm to obtain a measureable deviation from randomness. Identify a target sub-key. Statistical analysis: Obtain a tractable (closed form) relation between the following three quantities: N: data complexity. P S : (lower bound on the) success probability. a: the (expected) number of false alarms is (at most) a fraction 2 a of the number of all possible choices of the target sub-key. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
5 Random Variables and their Distributions P 1,..., P N are assumed to be independent and uniformly distributed. The key is unknown but fixed. Test statistic: T T (P 1, C 1,..., P N, C N ). Distribution of the test statistic: The exact distribution is hard to obtain. The test statistic often arises as a sum of random variables; use of the Central Limit Theorem to approximate the distribution of T by a suitable normal distribution. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
6 (Normal) Assumptions Galore Distribution of order statistics by normal. Binomial to normal; multinomial to multi-variate normal. (Non-central) Chi-squared to normal. Assumptions involved in Taylor series expansion.... (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
7 Goal Validity and interpretation of assumptions: Assumptions hold in an asymptotic sense. Cryptanalytic context requires a concrete setting. Surprises galore! (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
8 Linear Cryptanalysis Background (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
9 Block Cipher: Structure and Analysis n Γ P k (0) k (1) K (r) = k (0)... k (r 1) Γ K k (r 1) Γ B k (r) P B κ Random variable L = <,P> <,B> Γ P Inner key bit: z=< Γ (r) K,K > Γ B Linear approximation: L=z p Pr P [L=z] = { 1/2 if κ is correct; if κ is incorrect. n C m (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
10 Multiple Linear Approximations ( Γ (1) P, Γ(1) B ) ( ), Γ(1) K,..., Γ (l) P, Γ(l) B, Γ(l) K L i = Γ (i) P, P Γ(i) B, B, i = 1,..., l. X = (L 1,..., L l ). Inner key bit: z i = Γ (i) K, K (r). Joint distribution: for z = (z 1,..., z l ) and η = (η 1,..., η l ) p z (η) = Pr[L 1 z 1 = η 1,..., L l z l = η l ] = 1 2 l + ɛ η(z); p z β (η) = p z (η β). For any incorrect choice of κ: ɛ η (z) = 0 for all η; For the correct choice of κ there is an imbalance. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
11 Capacity of Joint Distribution Define p z = (pz (0),..., p z (2 l 1)). Let p = p 0 l so that p(η) = 1/2 l + ɛ η for η {0, 1} l ; 1/2 l ɛ η 1 1/2 l. Capacity C( p): C( p) = 2 l η {0,1} l ɛ 2 η. Note C( p) = C( p z ). (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
12 Key Recovery Attack Data: (P 1, C 1 ),..., (P N, C N ), where P 1,..., P N are independent and uniform random n-bit strings. C 1,..., C N are determined by κ ( ) (the actual target sub-key); B κ,1,..., B κ,n are determined by the choice of κ. Test statistics: T κ T (X κ,1,..., X κ,n ) For each choice of κ {0, 1} m, sort the keys in the order of T κ ; Test values one by one from the ordered list. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
13 Statistical Analysis Ranked list: T (0),..., T (2 m 1 ). Advantage a: κ is within the top 2 m a portion of the ranked list. Success: T κ T (2 m q); where q = 1 2 a ; Probability of success: P S = Pr[T κ T (2 m q)]. Data complexity: N. Goal: Express N in terms a and P S. Often P S and a are lower bounds on the success probability and the advantage respectively. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
14 Statistical Analysis Order statistics: T (2 m q) approximately follows N (ξ q, q(1 q)/(2 m 1)f 2 (ξ q ))), where ξ q = F 1 (q), F() and f () are respectively the distribution and the density functions of the T i s. Use approximations to ensure that T κ follows a normal distribution. Then T κ T (q2 m ) follows a normal distribution and it is possible to express P S in terms of the cdf Φ of the standard normal distribution. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
15 Test Statistic Single linear cryptanalysis: l = 1; T κ = W κ where W κ = (L κ,1 + + L κ,n )/N 1/2. L κ,j follows a Bernoulli distribution; W κ follows binomial which can be approximated by a normal distribution. κ incorrect: T κ approximately follows half normal; T (2 m q) approximately follows normal. κ correct: T κ approximately follows folded normal. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
16 Statistical Aspects of Linear Cryptanalysis Some important references: Matsui (1993, 1994): proposed linear cryptanalysis; idea of the key ranking algorithm. Baignéres, Junod, Vaudenay (2004): distinguishing attacks using linear approximations; LLR test statistics. Biryukov et al (2004): multiple linear cryptanalysis. Selçuk (2008): order statistics based approach. Hermelin, Cho and Nyberg (2009): multiple linear cryptanalysis without independence assumption. Followed the order statistics based approach of Selçuk. Used LLR and Chi-Squared test statistics. There is a parallel line of work on differential cryptanalysis. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
17 From Asymptotic to Concrete Analysis (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
18 Berry-Esséen Theorem Theorem: Suppose V 1,..., V λ are independent and identically distribution random variables with E[V i ] = 0, E[V 2 i ] = σ 2 and E[ V i 3 ] = ρ < ; Let D λ = (V V λ )/( λσ); Φ() be the distribution function of the standard normal distribution; Then there is a positive constant C such that for all real x and positive integer λ Pr [D λ x] Φ(x) Cρ σ 3 λ. The value of C is known to be between and (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
19 Order Statistics Theorem (Asymptotic Version) Let T 1,..., T λ be iid random variables following a distribution F(x) which is continuous and strictly increasing for 0 < F(x) < 1. Let T (1) T (2)... T (λ) be the order statistics of T 1,..., T λ. Let q (0, 1), ξ q = F 1 (q) and suppose that F (ξ q ) = f (ξ q ) exists and is positive. Let {r (λ)} be an integer sequence with lim λ λ 1 2 (r (λ) λq) = 0. Let W λ = λ 1 2 (T (r(λ)) ξ q ). Then{W λ } converges in distribution to N (0, q(1 q)/f 2 (ξ q )). (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
20 Order Statistics Theorem (Concrete Version) Hypothesis: same as before. Consequent: For each real number z ( ) Pr[W zf (ξ q ) λ z] Φ + (ζ λ λ 1/2 (r(λ) λq)) σ λ σ λ Here q λ = F ( ) ξ q + z λf (ξq), ζ λ = z + λ(q λ q), Λ q λ λ 1/2. Λ qλ = C (1 q λ) 2 + q 2 λ (q λ (1 q λ )) 1/2 and Φ() is the standard normal distribution function. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
21 Order Statistics Based Cryptanalysis λ = 2 m 1. λ: length of the random variable sequence in the order statistics result. m: the size of the target sub-key. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
22 Order Statistics Based Cryptanalysis: Shortcoming 1 Requirement: q λ = q + 1 λ (z + ζ q ) converges to q as λ. Rate of convergence: determined by λ. For the error in approximation to be about 2 ε, 2 m should be about 2 2ε : if ε = 10 (i.e., 2 ε = ), then m should be about 20. Lesson: if the size of the target subkey is small, then the applicability of the order statistics based analysis is doubtful. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
23 Order Statistics Based Cryptanalysis: Shortcoming 2 With q = 1 2 a and λ = 2 m 1, the upper bound on the error in normal approximation becomes C 2 2a + (1 2 a ) 2 (2 m a (1 2 a )) 1/2. For the error in approximation to be about 2 ε we must have 2 m a 2 2ε C 2 (2 2a + (1 2 a ) 2 ) 2 } 1 {{ 2 a. } small for a 1 Lesson: for error 2 ε, it is required for m a to be around 2ε. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
24 Order Statistics Based Cryptanalysis: Shortcoming 2 a = 1: eliminates only half the keys. a = m: determines the key uniquely. So, closer the value of a to m, the better the attack; But: for the normal approximation to be meaningful, m a must be large; Lesson: the method is not applicable for attacks with high advantage. This conclusion does not depend on the value of m. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
25 Key Recovery via Hypothesis Testing (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
26 Hypothesis Testing Set-Up H 0 : κ is correct; versus H 1 : κ is incorrect. Decision rule: Reject H 0 if T κ t. Pr[Type-I error] = Pr[κ is rejected H 0 holds ] = Pr[T t H 0 holds ] α; Pr[Type-II error] = Pr[κ is accepted H 1 holds ] = Pr[T > t H 1 holds ] β; Pr[succ] = 1 Pr[Type-I error] 1 α = P S. Requirement: Obtain the distributions of T κ under H 0 and H 1. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
27 Data Complexity via Hypothesis Testing Obtaining an expression for the data complexity: Expressions for P S and β involve N and t. Eliminating t provides an expression for N in terms of P S and β. Relating to the advantage: Each Type-II error causes a false positive. There are a total of 2 m hypothesis tests of which 2 m 1 are with incorrect κ. So, the expected number of false positives is β(2 m 1) β2 m. Advantage a implies that the size of false alarm list is 2 m a. Equating to β2 m gives β = 2 a. Substituting β = 2 a in the expression for N provides the data complexity in terms of P S and a. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
28 Applying Hypothesis Testing to Multiple Linear Cryptanalysis (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
29 Log-Likelihood Ratio Test Statistic For κ {0, 1} m, z {0, 1} l and 1 j N define: X κ,z,j = (L κ,j,1 z 1,..., L κ,j,l z l ); Q κ,z,η = #{1 j N : X κ,z,j = η}, for η = 0,..., 2 l 1; LLR κ,z = p z (η) Q κ,z,η ln 2 l. η {0,1} l LLR κ,z approximately follows N (Nµ, Nσ 2 ), where σ 2 C( p) and µ = { µ0 = D ( p p $ ) if H 0 holds; µ 1 = D ( p $ p) if H 1 holds. Decision rule: Reject H 0 if LLR κ,z t for all z {0, 1} l. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
30 Multiple Linear Cryptanalysis: LLR Test Statistics Pr[Type-I error] = Pr[LLR κ,z t for all z {0, 1} l H 0 holds] Pr[LLR κ,z t H 0 holds] ( ) t Nµ0 = Φ = α = 1 P S. Nσ0 Pr[Type-II error] = Pr[LLR κ,z > t for some z H 1 holds] Pr[LLR κ,z > t H 1 holds] z {0,1} l ( )) t = 2 (1 l Nµ1 Φ = β = 2 a. Nσ1 This gives N = { σ1 Φ 1 ( 1 2 l a) + σ 0 Φ 1 (P S ) } 2 (µ 0 µ 1 ) 2. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
31 Comparison to Previous Data Complexity Hermelin, Cho and Nyberg (2009): ( {Φ 1 (P 12 ) + Φ 1 2 l a)} N =. C( p) P 12 can be taken to be P S. Approximations used in HCN (2009): 2 l 1 2 a 1 2 a l. D( p p $ ) 1 2 C( p). Using these show the two expressions for N to be the same. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
32 LLR Statistics and Normal Approximation (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
33 LLR Statistics Rewrite the LLR test statistics: T κ,z = N j=1 Y κ,z,j where ( ( ) ) Y κ,z,j = ln p z Xκ,z,j /2 l. Let µ = E[Y j ], σ 2 = E[(Y j µ) 2 ] and ρ = E[ Y j µ 3 ]. Let µ 0, σ 0, ρ 0 correspond to H 0. Let µ 1, σ 1, ρ 1 correspond to H 1. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
34 LLR Statistics and Normal Approximation The distribution of T κ,z is approximated using a normal distribution. For the error in the normal approximation to be at most 2 ε, it is required that ( ρ N C 2 2 2ε 2 max 0 σ0 6, ρ2 1 σ1 6 ). Approximate expressions for µ i and σi 2 can be derived, but, deriving an approximation of ρ i seems to be difficult. Difficult to determine N for which the error in approximation can be bounded above. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
35 LLR Statistics and Capacity (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
36 LLR Statistics: Mean and Variance µ = σ 2 C( p). { µ0 = D( p p $ ) 1 2 C( p) if H 0 holds; µ 1 = D( p $ p) 1 2 C( p) if H 1 holds; How does one obtain D( p p $ ) 1 2 C( p)? (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
37 Kullback-Leibler Divergence: Taylor Series Expansion D( p p $ ) = η {0,1} m p(η) ln p(η) p $ (η) = η {0,1} m p(η) ln For each η, consider the Taylor series expansion of ( ln 1 + ɛ ) η 2 l. ( 1 + ɛ η 2 l ). Up to quadratic terms are retained while cubic and higher order terms are discarded. From this a routine calculation shows the approximation of µ 0 = C( p)/2. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
38 Validity of the Taylor Series Expansion The expansions are valid only if for each ɛ η the following holds. ɛ η < 1. 2 l This in particular means that ɛ η < 2 l for all η. So, even if for one η it happens that 2 l ɛ η 1 2 l the Taylor series expansion cannot be performed for this ɛ η and so the overall approximations of the means and the variances in terms of the capacity do not hold. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
39 Restricted Applicability Suppose that for some η, ɛ η = 2 l. Then the corresponding probability is 2 l+1 which is twice the probability that would be expected if the distribution were uniform. Such a situation can indeed occur in practice. Mantin-Shamir: Probability the second output byte of RC4 is 0 is twice that of the uniform distribution. This is a stream cipher example; this may also arise for block ciphers. The capacity based expression for the data complexity using the LLR test statistic does not hold. A large bias invalidates the data complexity expression! (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
40 Other Results Hypothesis testing based framework: Single linear and differential cryptanalysis: recover expressions for data complexity obtained by Selçuk. Multiple linear cryptanalysis based on the Chi-squared test statistic: recover expressions for data complexity obtained by Blondeau, Gérard and Nyberg (2012). Multiple differential cryptanalysis based on the LLR and the Chi-squared test statistics: recover expressions for data complexities obtained by Blondeau, Gérard and Nyberg. Normal approximations for the Chi-squared test statistics: Several counter-intuitive results. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
41 Message Be careful about asymptotic assumptions! S. Samajder and P. Sarkar. Another Look at Normal Approximations in Cryptanalysis. Also available at the Another Look page: http: //cacr.uwaterloo.ca/~ajmeneze/anotherlook/na.shtml. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
42 Further Work Rigorous statistical analysis: A close look at the analysis shows that the requirement is to obtain bounds on tail probabilities. Single linear and differential cryptanalysis: Chernoff bound applies. Multiple linear and differential cryptanalysis: Application of the Azuma-Hoeffding bound for martingales. (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
43 Thank you for your kind attention! (ISI, Kolkata) Normal Approximations Revisited INDOCRYPT / 43
Another Look at Success Probability in Linear Cryptanalysis
Another Look at uccess Probability in Linear Cryptanalysis ubhabrata amajder and Palash arkar Applied tatistics Unit Indian tatistical Institute 03, B.T.Road, Kolkata, India - 70008. subhabrata.samajder@gmail.com,
More informationSuccess Probability of Multiple/Multidimensional Linear Cryptanalysis Under General Key Randomisation Hypotheses
uccess Probability of Multiple/Multidimensional Linear Cryptanalysis Under General Key Randomisation Hypotheses ubhabrata amajder and Palash arkar Applied tatistics Unit Indian tatistical Institute 03,
More informationTwo hours. To be supplied by the Examinations Office: Mathematical Formula Tables and Statistical Tables THE UNIVERSITY OF MANCHESTER
Two hours MATH20802 To be supplied by the Examinations Office: Mathematical Formula Tables and Statistical Tables THE UNIVERSITY OF MANCHESTER STATISTICAL METHODS Answer any FOUR of the SIX questions.
More informationTutorial 11: Limit Theorems. Baoxiang Wang & Yihan Zhang bxwang, April 10, 2017
Tutorial 11: Limit Theorems Baoxiang Wang & Yihan Zhang bxwang, yhzhang@cse.cuhk.edu.hk April 10, 2017 1 Outline The Central Limit Theorem (CLT) Normal Approximation Based on CLT De Moivre-Laplace Approximation
More informationWeek 2 Quantitative Analysis of Financial Markets Hypothesis Testing and Confidence Intervals
Week 2 Quantitative Analysis of Financial Markets Hypothesis Testing and Confidence Intervals Christopher Ting http://www.mysmu.edu/faculty/christophert/ Christopher Ting : christopherting@smu.edu.sg :
More informationINDIAN INSTITUTE OF SCIENCE STOCHASTIC HYDROLOGY. Lecture -5 Course Instructor : Prof. P. P. MUJUMDAR Department of Civil Engg., IISc.
INDIAN INSTITUTE OF SCIENCE STOCHASTIC HYDROLOGY Lecture -5 Course Instructor : Prof. P. P. MUJUMDAR Department of Civil Engg., IISc. Summary of the previous lecture Moments of a distribubon Measures of
More informationLecture 17: More on Markov Decision Processes. Reinforcement learning
Lecture 17: More on Markov Decision Processes. Reinforcement learning Learning a model: maximum likelihood Learning a value function directly Monte Carlo Temporal-difference (TD) learning COMP-424, Lecture
More informationProbability. An intro for calculus students P= Figure 1: A normal integral
Probability An intro for calculus students.8.6.4.2 P=.87 2 3 4 Figure : A normal integral Suppose we flip a coin 2 times; what is the probability that we get more than 2 heads? Suppose we roll a six-sided
More informationUnit 5: Sampling Distributions of Statistics
Unit 5: Sampling Distributions of Statistics Statistics 571: Statistical Methods Ramón V. León 6/12/2004 Unit 5 - Stat 571 - Ramon V. Leon 1 Definitions and Key Concepts A sample statistic used to estimate
More informationUnit 5: Sampling Distributions of Statistics
Unit 5: Sampling Distributions of Statistics Statistics 571: Statistical Methods Ramón V. León 6/12/2004 Unit 5 - Stat 571 - Ramon V. Leon 1 Definitions and Key Concepts A sample statistic used to estimate
More informationResults of the block cipher design contest
Results of the block cipher design contest The table below contains a summary of the best attacks on the ciphers you designed. 13 of the 17 ciphers were successfully attacked in HW2, and as you can see
More informationWeek 1 Quantitative Analysis of Financial Markets Distributions B
Week 1 Quantitative Analysis of Financial Markets Distributions B Christopher Ting http://www.mysmu.edu/faculty/christophert/ Christopher Ting : christopherting@smu.edu.sg : 6828 0364 : LKCSB 5036 October
More informationChapter 4: Commonly Used Distributions. Statistics for Engineers and Scientists Fourth Edition William Navidi
Chapter 4: Commonly Used Distributions Statistics for Engineers and Scientists Fourth Edition William Navidi 2014 by Education. This is proprietary material solely for authorized instructor use. Not authorized
More informationStrategies for Improving the Efficiency of Monte-Carlo Methods
Strategies for Improving the Efficiency of Monte-Carlo Methods Paul J. Atzberger General comments or corrections should be sent to: paulatz@cims.nyu.edu Introduction The Monte-Carlo method is a useful
More informationMath489/889 Stochastic Processes and Advanced Mathematical Finance Homework 5
Math489/889 Stochastic Processes and Advanced Mathematical Finance Homework 5 Steve Dunbar Due Fri, October 9, 7. Calculate the m.g.f. of the random variable with uniform distribution on [, ] and then
More informationSTATE UNIVERSITY OF NEW YORK AT ALBANY Department of Economics. Ph. D. Comprehensive Examination: Macroeconomics Fall, 2010
STATE UNIVERSITY OF NEW YORK AT ALBANY Department of Economics Ph. D. Comprehensive Examination: Macroeconomics Fall, 2010 Section 1. (Suggested Time: 45 Minutes) For 3 of the following 6 statements, state
More informationVersion A. Problem 1. Let X be the continuous random variable defined by the following pdf: 1 x/2 when 0 x 2, f(x) = 0 otherwise.
Math 224 Q Exam 3A Fall 217 Tues Dec 12 Version A Problem 1. Let X be the continuous random variable defined by the following pdf: { 1 x/2 when x 2, f(x) otherwise. (a) Compute the mean µ E[X]. E[X] x
More informationCHOICE THEORY, UTILITY FUNCTIONS AND RISK AVERSION
CHOICE THEORY, UTILITY FUNCTIONS AND RISK AVERSION Szabolcs Sebestyén szabolcs.sebestyen@iscte.pt Master in Finance INVESTMENTS Sebestyén (ISCTE-IUL) Choice Theory Investments 1 / 65 Outline 1 An Introduction
More informationMultiple Modular Additions and Crossword Puzzle Attack on NLSv2
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 Joo Yeon Cho and Josef Pieprzyk Centre for Advanced Computing Algorithms and Cryptography, Department of Computing, Macquarie University,
More informationFinancial Risk Forecasting Chapter 9 Extreme Value Theory
Financial Risk Forecasting Chapter 9 Extreme Value Theory Jon Danielsson 2017 London School of Economics To accompany Financial Risk Forecasting www.financialriskforecasting.com Published by Wiley 2011
More informationMultiple Modular Additions and Crossword Puzzle Attack on NLSv2
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 Joo Yeon Cho and Josef Pieprzyk Centre for Advanced Computing Algorithms and Cryptography, Department of Computing, Macquarie University,
More informationEVA Tutorial #1 BLOCK MAXIMA APPROACH IN HYDROLOGIC/CLIMATE APPLICATIONS. Rick Katz
1 EVA Tutorial #1 BLOCK MAXIMA APPROACH IN HYDROLOGIC/CLIMATE APPLICATIONS Rick Katz Institute for Mathematics Applied to Geosciences National Center for Atmospheric Research Boulder, CO USA email: rwk@ucar.edu
More informationInformation Processing and Limited Liability
Information Processing and Limited Liability Bartosz Maćkowiak European Central Bank and CEPR Mirko Wiederholt Northwestern University January 2012 Abstract Decision-makers often face limited liability
More informationChapter 5. Continuous Random Variables and Probability Distributions. 5.1 Continuous Random Variables
Chapter 5 Continuous Random Variables and Probability Distributions 5.1 Continuous Random Variables 1 2CHAPTER 5. CONTINUOUS RANDOM VARIABLES AND PROBABILITY DISTRIBUTIONS Probability Distributions Probability
More informationCentral Limit Theorem, Joint Distributions Spring 2018
Central Limit Theorem, Joint Distributions 18.5 Spring 218.5.4.3.2.1-4 -3-2 -1 1 2 3 4 Exam next Wednesday Exam 1 on Wednesday March 7, regular room and time. Designed for 1 hour. You will have the full
More informationPoint Estimators. STATISTICS Lecture no. 10. Department of Econometrics FEM UO Brno office 69a, tel
STATISTICS Lecture no. 10 Department of Econometrics FEM UO Brno office 69a, tel. 973 442029 email:jiri.neubauer@unob.cz 8. 12. 2009 Introduction Suppose that we manufacture lightbulbs and we want to state
More informationcontinuous rv Note for a legitimate pdf, we have f (x) 0 and f (x)dx = 1. For a continuous rv, P(X = c) = c f (x)dx = 0, hence
continuous rv Let X be a continuous rv. Then a probability distribution or probability density function (pdf) of X is a function f(x) such that for any two numbers a and b with a b, P(a X b) = b a f (x)dx.
More informationThe Bernoulli distribution
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License. Your use of this material constitutes acceptance of that license and the conditions of use of materials on this
More information4-1. Chapter 4. Commonly Used Distributions by The McGraw-Hill Companies, Inc. All rights reserved.
4-1 Chapter 4 Commonly Used Distributions 2014 by The Companies, Inc. All rights reserved. Section 4.1: The Bernoulli Distribution 4-2 We use the Bernoulli distribution when we have an experiment which
More informationPosterior Inference. , where should we start? Consider the following computational procedure: 1. draw samples. 2. convert. 3. compute properties
Posterior Inference Example. Consider a binomial model where we have a posterior distribution for the probability term, θ. Suppose we want to make inferences about the log-odds γ = log ( θ 1 θ), where
More informationAsymptotic results discrete time martingales and stochastic algorithms
Asymptotic results discrete time martingales and stochastic algorithms Bernard Bercu Bordeaux University, France IFCAM Summer School Bangalore, India, July 2015 Bernard Bercu Asymptotic results for discrete
More informationLecture Notes 6. Assume F belongs to a family of distributions, (e.g. F is Normal), indexed by some parameter θ.
Sufficient Statistics Lecture Notes 6 Sufficiency Data reduction in terms of a particular statistic can be thought of as a partition of the sample space X. Definition T is sufficient for θ if the conditional
More informationStatistical Tables Compiled by Alan J. Terry
Statistical Tables Compiled by Alan J. Terry School of Science and Sport University of the West of Scotland Paisley, Scotland Contents Table 1: Cumulative binomial probabilities Page 1 Table 2: Cumulative
More informationCommonly Used Distributions
Chapter 4: Commonly Used Distributions 1 Introduction Statistical inference involves drawing a sample from a population and analyzing the sample data to learn about the population. We often have some knowledge
More information1. You are given the following information about a stationary AR(2) model:
Fall 2003 Society of Actuaries **BEGINNING OF EXAMINATION** 1. You are given the following information about a stationary AR(2) model: (i) ρ 1 = 05. (ii) ρ 2 = 01. Determine φ 2. (A) 0.2 (B) 0.1 (C) 0.4
More informationCentral Limit Theorem (cont d) 7/28/2006
Central Limit Theorem (cont d) 7/28/2006 Central Limit Theorem for Binomial Distributions Theorem. For the binomial distribution b(n, p, j) we have lim npq b(n, p, np + x npq ) = φ(x), n where φ(x) is
More informationIEOR E4602: Quantitative Risk Management
IEOR E4602: Quantitative Risk Management Basic Concepts and Techniques of Risk Management Martin Haugh Department of Industrial Engineering and Operations Research Columbia University Email: martin.b.haugh@gmail.com
More informationSTAT 830 Convergence in Distribution
STAT 830 Convergence in Distribution Richard Lockhart Simon Fraser University STAT 830 Fall 2013 Richard Lockhart (Simon Fraser University) STAT 830 Convergence in Distribution STAT 830 Fall 2013 1 / 31
More informationStatistics for Business and Economics
Statistics for Business and Economics Chapter 5 Continuous Random Variables and Probability Distributions Ch. 5-1 Probability Distributions Probability Distributions Ch. 4 Discrete Continuous Ch. 5 Probability
More informationAre stylized facts irrelevant in option-pricing?
Are stylized facts irrelevant in option-pricing? Kyiv, June 19-23, 2006 Tommi Sottinen, University of Helsinki Based on a joint work No-arbitrage pricing beyond semimartingales with C. Bender, Weierstrass
More informationTwo Hours. Mathematical formula books and statistical tables are to be provided THE UNIVERSITY OF MANCHESTER. 22 January :00 16:00
Two Hours MATH38191 Mathematical formula books and statistical tables are to be provided THE UNIVERSITY OF MANCHESTER STATISTICAL MODELLING IN FINANCE 22 January 2015 14:00 16:00 Answer ALL TWO questions
More informationMuch of what appears here comes from ideas presented in the book:
Chapter 11 Robust statistical methods Much of what appears here comes from ideas presented in the book: Huber, Peter J. (1981), Robust statistics, John Wiley & Sons (New York; Chichester). There are many
More informationPractice Exercises for Midterm Exam ST Statistical Theory - II The ACTUAL exam will consists of less number of problems.
Practice Exercises for Midterm Exam ST 522 - Statistical Theory - II The ACTUAL exam will consists of less number of problems. 1. Suppose X i F ( ) for i = 1,..., n, where F ( ) is a strictly increasing
More informationSTATE UNIVERSITY OF NEW YORK AT ALBANY Department of Economics. Ph. D. Preliminary Examination: Macroeconomics Fall, 2009
STATE UNIVERSITY OF NEW YORK AT ALBANY Department of Economics Ph. D. Preliminary Examination: Macroeconomics Fall, 2009 Instructions: Read the questions carefully and make sure to show your work. You
More informationChapter 5. Statistical inference for Parametric Models
Chapter 5. Statistical inference for Parametric Models Outline Overview Parameter estimation Method of moments How good are method of moments estimates? Interval estimation Statistical Inference for Parametric
More informationExam 2 Spring 2015 Statistics for Applications 4/9/2015
18.443 Exam 2 Spring 2015 Statistics for Applications 4/9/2015 1. True or False (and state why). (a). The significance level of a statistical test is not equal to the probability that the null hypothesis
More informationOptimal reinsurance for variance related premium calculation principles
Optimal reinsurance for variance related premium calculation principles Guerra, M. and Centeno, M.L. CEOC and ISEG, TULisbon CEMAPRE, ISEG, TULisbon ASTIN 2007 Guerra and Centeno (ISEG, TULisbon) Optimal
More informationA Differential Fault Attack on MICKEY 2.0
A Differential Fault Attack on MICKEY 2.0 Subhadeep Banik and Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute Kolkata, 203, B.T. Road, Kolkata-108. s.banik r@isical.ac.in, subho@isical.ac.in
More informationModelling Returns: the CER and the CAPM
Modelling Returns: the CER and the CAPM Carlo Favero Favero () Modelling Returns: the CER and the CAPM 1 / 20 Econometric Modelling of Financial Returns Financial data are mostly observational data: they
More information5.3 Statistics and Their Distributions
Chapter 5 Joint Probability Distributions and Random Samples Instructor: Lingsong Zhang 1 Statistics and Their Distributions 5.3 Statistics and Their Distributions Statistics and Their Distributions Consider
More informationSampling Distribution
MAT 2379 (Spring 2012) Sampling Distribution Definition : Let X 1,..., X n be a collection of random variables. We say that they are identically distributed if they have a common distribution. Definition
More informationBusiness Statistics 41000: Probability 3
Business Statistics 41000: Probability 3 Drew D. Creal University of Chicago, Booth School of Business February 7 and 8, 2014 1 Class information Drew D. Creal Email: dcreal@chicagobooth.edu Office: 404
More informationLecture 23. STAT 225 Introduction to Probability Models April 4, Whitney Huang Purdue University. Normal approximation to Binomial
Lecture 23 STAT 225 Introduction to Probability Models April 4, 2014 approximation Whitney Huang Purdue University 23.1 Agenda 1 approximation 2 approximation 23.2 Characteristics of the random variable:
More information1 The continuous time limit
Derivative Securities, Courant Institute, Fall 2008 http://www.math.nyu.edu/faculty/goodman/teaching/derivsec08/index.html Jonathan Goodman and Keith Lewis Supplementary notes and comments, Section 3 1
More informationSTA2601. Tutorial letter 105/2/2018. Applied Statistics II. Semester 2. Department of Statistics STA2601/105/2/2018 TRIAL EXAMINATION PAPER
STA2601/105/2/2018 Tutorial letter 105/2/2018 Applied Statistics II STA2601 Semester 2 Department of Statistics TRIAL EXAMINATION PAPER Define tomorrow. university of south africa Dear Student Congratulations
More informationBIO5312 Biostatistics Lecture 5: Estimations
BIO5312 Biostatistics Lecture 5: Estimations Yujin Chung September 27th, 2016 Fall 2016 Yujin Chung Lec5: Estimations Fall 2016 1/34 Recap Yujin Chung Lec5: Estimations Fall 2016 2/34 Today s lecture and
More informationNormal distribution Approximating binomial distribution by normal 2.10 Central Limit Theorem
1.1.2 Normal distribution 1.1.3 Approimating binomial distribution by normal 2.1 Central Limit Theorem Prof. Tesler Math 283 Fall 216 Prof. Tesler 1.1.2-3, 2.1 Normal distribution Math 283 / Fall 216 1
More informationNon-informative Priors Multiparameter Models
Non-informative Priors Multiparameter Models Statistics 220 Spring 2005 Copyright c 2005 by Mark E. Irwin Prior Types Informative vs Non-informative There has been a desire for a prior distributions that
More informationOptimally Thresholded Realized Power Variations for Lévy Jump Diffusion Models
Optimally Thresholded Realized Power Variations for Lévy Jump Diffusion Models José E. Figueroa-López 1 1 Department of Statistics Purdue University University of Missouri-Kansas City Department of Mathematics
More informationFinancial Mathematics III Theory summary
Financial Mathematics III Theory summary Table of Contents Lecture 1... 7 1. State the objective of modern portfolio theory... 7 2. Define the return of an asset... 7 3. How is expected return defined?...
More informationOnline Appendix to Grouped Coefficients to Reduce Bias in Heterogeneous Dynamic Panel Models with Small T
Online Appendix to Grouped Coefficients to Reduce Bias in Heterogeneous Dynamic Panel Models with Small T Nathan P. Hendricks and Aaron Smith October 2014 A1 Bias Formulas for Large T The heterogeneous
More informationReview for Final Exam Spring 2014 Jeremy Orloff and Jonathan Bloom
Review for Final Exam 18.05 Spring 2014 Jeremy Orloff and Jonathan Bloom THANK YOU!!!! JON!! PETER!! RUTHI!! ERIKA!! ALL OF YOU!!!! Probability Counting Sets Inclusion-exclusion principle Rule of product
More informationThe Irrevocable Multi-Armed Bandit Problem
The Irrevocable Multi-Armed Bandit Problem Ritesh Madan Qualcomm-Flarion Technologies May 27, 2009 Joint work with Vivek Farias (MIT) 2 Multi-Armed Bandit Problem n arms, where each arm i is a Markov Decision
More informationMTH6154 Financial Mathematics I Stochastic Interest Rates
MTH6154 Financial Mathematics I Stochastic Interest Rates Contents 4 Stochastic Interest Rates 45 4.1 Fixed Interest Rate Model............................ 45 4.2 Varying Interest Rate Model...........................
More information10/1/2012. PSY 511: Advanced Statistics for Psychological and Behavioral Research 1
PSY 511: Advanced Statistics for Psychological and Behavioral Research 1 Pivotal subject: distributions of statistics. Foundation linchpin important crucial You need sampling distributions to make inferences:
More informationChapter 7. Sampling Distributions and the Central Limit Theorem
Chapter 7. Sampling Distributions and the Central Limit Theorem 1 Introduction 2 Sampling Distributions related to the normal distribution 3 The central limit theorem 4 The normal approximation to binomial
More informationEstimation after Model Selection
Estimation after Model Selection Vanja M. Dukić Department of Health Studies University of Chicago E-Mail: vanja@uchicago.edu Edsel A. Peña* Department of Statistics University of South Carolina E-Mail:
More informationLecture 10: Point Estimation
Lecture 10: Point Estimation MSU-STT-351-Sum-17B (P. Vellaisamy: MSU-STT-351-Sum-17B) Probability & Statistics for Engineers 1 / 31 Basic Concepts of Point Estimation A point estimate of a parameter θ,
More informationThe rth moment of a real-valued random variable X with density f(x) is. x r f(x) dx
1 Cumulants 1.1 Definition The rth moment of a real-valued random variable X with density f(x) is µ r = E(X r ) = x r f(x) dx for integer r = 0, 1,.... The value is assumed to be finite. Provided that
More informationChapter 8: Sampling distributions of estimators Sections
Chapter 8 continued Chapter 8: Sampling distributions of estimators Sections 8.1 Sampling distribution of a statistic 8.2 The Chi-square distributions 8.3 Joint Distribution of the sample mean and sample
More informationLog-Robust Portfolio Management
Log-Robust Portfolio Management Dr. Aurélie Thiele Lehigh University Joint work with Elcin Cetinkaya and Ban Kawas Research partially supported by the National Science Foundation Grant CMMI-0757983 Dr.
More informationDr. Maddah ENMG 625 Financial Eng g II 10/16/06
Dr. Maddah ENMG 65 Financial Eng g II 10/16/06 Chapter 11 Models of Asset Dynamics () Random Walk A random process, z, is an additive process defined over times t 0, t 1,, t k, t k+1,, such that z( t )
More informationBivariate Birnbaum-Saunders Distribution
Department of Mathematics & Statistics Indian Institute of Technology Kanpur January 2nd. 2013 Outline 1 Collaborators 2 3 Birnbaum-Saunders Distribution: Introduction & Properties 4 5 Outline 1 Collaborators
More informationSYSM 6304 Risk and Decision Analysis Lecture 2: Fitting Distributions to Data
SYSM 6304 Risk and Decision Analysis Lecture 2: Fitting Distributions to Data M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: M.Vidyasagar@utdallas.edu September 5, 2015
More informationContinuous random variables
Continuous random variables probability density function (f(x)) the probability distribution function of a continuous random variable (analogous to the probability mass function for a discrete random variable),
More informationDefinition 9.1 A point estimate is any function T (X 1,..., X n ) of a random sample. We often write an estimator of the parameter θ as ˆθ.
9 Point estimation 9.1 Rationale behind point estimation When sampling from a population described by a pdf f(x θ) or probability function P [X = x θ] knowledge of θ gives knowledge of the entire population.
More information4.3 Normal distribution
43 Normal distribution Prof Tesler Math 186 Winter 216 Prof Tesler 43 Normal distribution Math 186 / Winter 216 1 / 4 Normal distribution aka Bell curve and Gaussian distribution The normal distribution
More informationWhat was in the last lecture?
What was in the last lecture? Normal distribution A continuous rv with bell-shaped density curve The pdf is given by f(x) = 1 2πσ e (x µ)2 2σ 2, < x < If X N(µ, σ 2 ), E(X) = µ and V (X) = σ 2 Standard
More informationCourse information FN3142 Quantitative finance
Course information 015 16 FN314 Quantitative finance This course is aimed at students interested in obtaining a thorough grounding in market finance and related empirical methods. Prerequisite If taken
More informationFinancial Econometrics Jeffrey R. Russell. Midterm 2014 Suggested Solutions. TA: B. B. Deng
Financial Econometrics Jeffrey R. Russell Midterm 2014 Suggested Solutions TA: B. B. Deng Unless otherwise stated, e t is iid N(0,s 2 ) 1. (12 points) Consider the three series y1, y2, y3, and y4. Match
More informationProbability without Measure!
Probability without Measure! Mark Saroufim University of California San Diego msaroufi@cs.ucsd.edu February 18, 2014 Mark Saroufim (UCSD) It s only a Game! February 18, 2014 1 / 25 Overview 1 History of
More informationChapter 4: Asymptotic Properties of MLE (Part 3)
Chapter 4: Asymptotic Properties of MLE (Part 3) Daniel O. Scharfstein 09/30/13 1 / 1 Breakdown of Assumptions Non-Existence of the MLE Multiple Solutions to Maximization Problem Multiple Solutions to
More informationELEMENTS OF MONTE CARLO SIMULATION
APPENDIX B ELEMENTS OF MONTE CARLO SIMULATION B. GENERAL CONCEPT The basic idea of Monte Carlo simulation is to create a series of experimental samples using a random number sequence. According to the
More informationFinancial Econometrics
Financial Econometrics Volatility Gerald P. Dwyer Trinity College, Dublin January 2013 GPD (TCD) Volatility 01/13 1 / 37 Squared log returns for CRSP daily GPD (TCD) Volatility 01/13 2 / 37 Absolute value
More informationHomework Assignments
Homework Assignments Week 1 (p. 57) #4.1, 4., 4.3 Week (pp 58 6) #4.5, 4.6, 4.8(a), 4.13, 4.0, 4.6(b), 4.8, 4.31, 4.34 Week 3 (pp 15 19) #1.9, 1.1, 1.13, 1.15, 1.18 (pp 9 31) #.,.6,.9 Week 4 (pp 36 37)
More information**BEGINNING OF EXAMINATION** A random sample of five observations from a population is:
**BEGINNING OF EXAMINATION** 1. You are given: (i) A random sample of five observations from a population is: 0.2 0.7 0.9 1.1 1.3 (ii) You use the Kolmogorov-Smirnov test for testing the null hypothesis,
More informationChapter 7. Sampling Distributions and the Central Limit Theorem
Chapter 7. Sampling Distributions and the Central Limit Theorem 1 Introduction 2 Sampling Distributions related to the normal distribution 3 The central limit theorem 4 The normal approximation to binomial
More information12 The Bootstrap and why it works
12 he Bootstrap and why it works For a review of many applications of bootstrap see Efron and ibshirani (1994). For the theory behind the bootstrap see the books by Hall (1992), van der Waart (2000), Lahiri
More informationLECTURE NOTES 3 ARIEL M. VIALE
LECTURE NOTES 3 ARIEL M VIALE I Markowitz-Tobin Mean-Variance Portfolio Analysis Assumption Mean-Variance preferences Markowitz 95 Quadratic utility function E [ w b w ] { = E [ w] b V ar w + E [ w] }
More informationMonte Carlo Methods for Uncertainty Quantification
Monte Carlo Methods for Uncertainty Quantification Abdul-Lateef Haji-Ali Based on slides by: Mike Giles Mathematical Institute, University of Oxford Contemporary Numerical Techniques Haji-Ali (Oxford)
More informationBusiness Statistics 41000: Probability 4
Business Statistics 41000: Probability 4 Drew D. Creal University of Chicago, Booth School of Business February 14 and 15, 2014 1 Class information Drew D. Creal Email: dcreal@chicagobooth.edu Office:
More informationLESSON 7 INTERVAL ESTIMATION SAMIE L.S. LY
LESSON 7 INTERVAL ESTIMATION SAMIE L.S. LY 1 THIS WEEK S PLAN Part I: Theory + Practice ( Interval Estimation ) Part II: Theory + Practice ( Interval Estimation ) z-based Confidence Intervals for a Population
More informationEco504 Spring 2010 C. Sims FINAL EXAM. β t 1 2 φτ2 t subject to (1)
Eco54 Spring 21 C. Sims FINAL EXAM There are three questions that will be equally weighted in grading. Since you may find some questions take longer to answer than others, and partial credit will be given
More informationAlgorithmic and High-Frequency Trading
LOBSTER June 2 nd 2016 Algorithmic and High-Frequency Trading Julia Schmidt Overview Introduction Market Making Grossman-Miller Market Making Model Trading Costs Measuring Liquidity Market Making using
More informationAsymptotic Methods in Financial Mathematics
Asymptotic Methods in Financial Mathematics José E. Figueroa-López 1 1 Department of Mathematics Washington University in St. Louis Statistics Seminar Washington University in St. Louis February 17, 2017
More informationMath 489/Math 889 Stochastic Processes and Advanced Mathematical Finance Dunbar, Fall 2007
Steven R. Dunbar Department of Mathematics 203 Avery Hall University of Nebraska-Lincoln Lincoln, NE 68588-0130 http://www.math.unl.edu Voice: 402-472-3731 Fax: 402-472-8466 Math 489/Math 889 Stochastic
More informationApplications of Good s Generalized Diversity Index. A. J. Baczkowski Department of Statistics, University of Leeds Leeds LS2 9JT, UK
Applications of Good s Generalized Diversity Index A. J. Baczkowski Department of Statistics, University of Leeds Leeds LS2 9JT, UK Internal Report STAT 98/11 September 1998 Applications of Good s Generalized
More informationSTRESS-STRENGTH RELIABILITY ESTIMATION
CHAPTER 5 STRESS-STRENGTH RELIABILITY ESTIMATION 5. Introduction There are appliances (every physical component possess an inherent strength) which survive due to their strength. These appliances receive
More informationVolatility. Roberto Renò. 2 March 2010 / Scuola Normale Superiore. Dipartimento di Economia Politica Università di Siena
Dipartimento di Economia Politica Università di Siena 2 March 2010 / Scuola Normale Superiore What is? The definition of volatility may vary wildly around the idea of the standard deviation of price movements
More informationNumerical valuation for option pricing under jump-diffusion models by finite differences
Numerical valuation for option pricing under jump-diffusion models by finite differences YongHoon Kwon Younhee Lee Department of Mathematics Pohang University of Science and Technology June 23, 2010 Table
More information