摘要:
When processing a data conversion function of a MISTY structure, such as the FO function of MISTY1, the logical calculation result t3 of the exclusive OR 614 of the process result of the FI function 602 of the MISTY structure in the second stage and a logical calculation result t1 of an exclusive OR 612 of the MISTY structure in the first stage is not stored in a register. The logical calculation result t3 and the logical calculation result of respective exclusive OR 642 and 643 are subject to a direct exclusive OR with the respective exclusive OR 642 and 643.
摘要:
An information processing program that causes at least one computer to execute a process, the process includes executing a prediction process on prediction target data input, by using a trained model; acquiring a plurality of prediction candidates for the prediction target data, and confidence of each of the prediction candidates; storing confidence ranking sequences which each of the plurality of the prediction candidates for the prediction target data are arranged in an order of the confidence, in a storage device; and detecting an adversarial example generation activity by the prediction target data, based on the confidence ranking sequences.
摘要:
When processing a data conversion function of a MISTY structure, such as the FO function of MISTY1, the logical calculation result t3 of the exclusive OR 614 of the process result of the FI function 602 of the MISTY structure in the second stage and a logical calculation result t1 of an exclusive OR 612 of the MISTY structure in the first stage is not stored in a register. The logical calculation result t3 and the logical calculation result of respective exclusive OR 642 and 643 are subject to a direct exclusive OR with the respective exclusive OR 642 and 643.
摘要:
Provided are a generation method, a generation program, and an information processing device that improve security of a machine learning system. Tree structure information representing a structure of an attack tree including a first node associated with information indicating an attack to be established and second nodes associated with conditions to establish the attack, difficulty level information indicating difficulty of response to make the conditions associated with the respective second nodes unsatisfied, and condition matching status information that indicates whether the second nodes are satisfied are received, and, for each non-establishment condition candidate being a combination by which the attack is not established among combinations of the conditions associated with the respective second nodes, provision information that indicates a priority of adoption of the non-establishment condition candidate is generated based on the tree structure information, the difficulty level information, and the condition matching status information.
摘要:
In a MISTY1 FI function, an exclusive OR 102 to which a round key KIij2 is inputted is arranged between an exclusive OR 101 arranged on a 9-bit critical path 100a in a first MISTY structure and a zero-extend conversion 120U connected to the branching point 301 of a 7-bit right system data path 110a. Then, a 9-bit round key KIij1 is truncate-converted to seven bits, the exclusive OR of the seven bits and the round key KIij1 is calculated by an exclusive OR 113 and the calculation result is inputted to an exclusive OR 112 arranged on the right system data path 110a in the second stage MISTY structure.