Lecture 8. Public Key Cryptography (Diffie-Hellman and RSA)
|
|
- Leslie Johnston
- 5 years ago
- Views:
Transcription
1 Lecture 8 Pulic Key Crytogrhy (Diffie-Hellmn nd RSA) 1
2 Pulic Key Crytogrhy Asymmetric crytogrhy Inented in (Diffie-Hellmn nd Riest-Shmir- Adlemn) To keys: rite (SK), ulic (PK) Encrytion: ith ulic key; Decrytion: ith rite key Digitl Signtures: Signing y rite key; Verifiction y ulic key. i.e., encryt messge digest/hsh -- h(m) -- ith rite key Authorshi (uthentiction) Integrity: Similr to MAC Non-reudition: cn t do ith secret key crytogrhy Much sloer thn conentionl crytogrhy Often used together ith conentionl crytogrhy, e.g., to encryt session keys 2
3 Pulic Key Crytogrhy Bo s ulic key PK B Bo s rite key SK B lintext messge, m encrytion lgorithm cihertext PK (m) B decrytion lgorithm lintext messge m = SK (PK (m)) B B 3
4 Key Pre-distriution: Diffie-Hellmn Ne Directions in Crytogrhy 1976 System ide rmeters : lrge rime, genertor in Z Alice's secret:, ulic: Bo's secret:, ulic: Alice hs: Bo hs: * y = mod y = mod y = mod y = mod K = ( y ) mod = K = ( y ) mod 4
5 Pulic Key Pre-distriution: Diffie-Hellmn Alice comutes K Secure communiction ith K Bo comutes K = K Ee knos:,, y nd y 5
6 Pulic Key Pre-distriution: Diffie-Hellmn Diffie Hellmn Prolem: lrge rime, genertor in Z Gien : y = mod nd y = mod FIND : mod * Discrete Log Prolem: Gien : y = mod FIND : 6
7 Pulic Key Pre-distriution: Diffie-Hellmn Decision DH Prolem: lrge rime, genertor Gien : y = mod, y = mod Distinguish : K = mod from rndom numer! DH Assumtion: DH rolem is HARD (not P) DL Assumtion: DL rolem is HARD (not P) DDH Assumtion: soling DDH rolem is HARD (not P) 7
8 Choose rndom Interctie (Pulic) Key Exchnge: Diffie-Hellmn y = mod Comute K = ( y ) mod y = mod Choose Secure communiction ith K rndom, Comute K = ( y ) mod Ee is ssie 8
9 The Mn-in-the-Middle (MitM) Attck (ssume Ee is n ctie dersry!) Choose rndom y = mod Comute K = ( y ) mod y = mod Secure communiction ith K Choose rndom, Comute K = ( y ) mod 9
10 RSA (1976-8) Let n = q here,q lrge rimes e,d R Z n nd ed 1 mod Φ(n) here : Φ(n) = ( 1)(q 1) = q q 1 Secrets :,q,d Pulics : n,e Encrytion : messge = m < n E(x) = y = m e mod n Decrytion : cihertext = y D( y) = x' = y d mod n 10
11 Why does it ll ork? x Z * n x ed = x 1modΦ(n) mod n = x c*φ(n)+1 mod n = x But, recll tht: g Φ(n) =1 mod n (Lgrnge) 11
12 Ho does it ll ork? Exmle: =5 q=7 n=35 (-1)(q-1)=24=3*2 3 ick e=11, d=11 x=2, E(x)=2048 mod 35 =18=y y=18, D(y)= e+13 mod 35 = 2 Exmle: =17 q=13 n=221 (-1)(q-1)=192=3 4 *2 ick e=5, d=77 Cn e ick 16? 9? 27? 185? x=5, E(x)=3125 mod 221 = 31 D(y)=31 77 = e+114 mod 221 = 5 12
13 Why is it Secure? Conjecture: reking RSA is olynomilly equilent to fctoring n Recll tht n is ery, ery lrge! Why: n hs unique fctors, q Gien nd q, comuting (-1)(q-1) is esy: ed 1mod Φ( n) Use extended Euclidin! 13
14 Exonentition Costs Integer multiliction -- O( 2 ) here is it-size of the se Modulr reduction -- O( 2 ) Thus, modulr multiliction -- O( 2 ) Modulr exonentition (s in RSA) -- m e mod n Nïe method: e-1 modulr roducts -- O( 2 *e) BUT ht if e is lrge, (lmost) s lrge s n? Let L= e (e.g., l=1024 for 1024-it RSA exonent) We cn ssume nd l re ery close, lmost the sme Squre-nd-multily method orks in O( 3 ) time O( 2 *2l) 14
15 Squre-nd-Multily gol : comute l = sizeof ( n); tem = 1; for ( i = l 1; i >= 0; i ) { tem* = tem; tem % = n; if ( e[i] ) { tem* m = m; tem% = n; } } e mod n From left to right in e Exmle 1: e=100 Exmle 2: e= Exmle 3: e=
16 Seeding u RSA Decrytion Let : C - RSA cihertext d = d mod( 1) d = d mod( q 1) q comute: M = C mod q M = C mod q q nd sole: M = M mod M = M mod q d d q M = [ M + M q ( q( q 1 1 mod ) mod q)]mod( q) 16
17 More on RSA Modulus n is unique er user à 2 or more rties cnnot shre the sme n Wht hens if Alice nd Bo shre the sme modulus? Alice hs (e,d,n) nd Bo (e,d,n) Alice nts to comute d (Bo s rite key) She knos tht: e * d = 1 mod hi(n) So: e * d = k * hi(n) + 1 nd: e * d - 1 = k * hi(n) Alice just needs to comute inerse of e mod X here X = e * d 1 = k * hi(n) let s cll this inerse d nd rememer tht: d * e = k * k * hi(n) + 1 cn e e sure tht: d = d? Is it ossile tht e hs no inerse mod X? Yes, if e =hi(n) or gcd(e,k)>1 ut this is ery, ery UNLIKELY! For ll decrytion uroses, d is EQUIVALENT to d Suose Ee encryted for Bo: C = (m) e mod n Alice comutes: C d mod n = m e d mod n = (m) k * k * hi(n) + 1 mod n = m 17
QUADRATIC RESIDUES MATH 372. FALL INSTRUCTOR: PROFESSOR AITKEN
QUADRATIC RESIDUES MATH 37 FALL 005 INSTRUCTOR: PROFESSOR AITKEN When is n integer sure modulo? When does udrtic eution hve roots modulo? These re the uestions tht will concern us in this hndout 1 The
More informationQuadratic reciprocity
Qudrtic recirocity Frncisc Bozgn Los Angeles Mth Circle Octoer 8, 01 1 Qudrtic Recirocity nd Legendre Symol In the eginning of this lecture, we recll some sic knowledge out modulr rithmetic: Definition
More informationCDH/DDH-Based Encryption. K&L Sections , 11.4.
CDH/DDH-Based Encrytion K&L Sections 8.3.1-8.3.3, 11.4. 1 Cyclic grous A finite grou G of order q is cyclic if it has an element g of q. { 0 1 2 q 1} In this case, G = g = g, g, g,, g ; G is said to be
More informationPublic Key Cryptosystems RSA
Public Key Crytosystems RSA 57 17 Receiver Sender 41 19 and rime 53 Attacker 47 Public Key Crytosystems RSA Comute numbers n = * 2337 323 57 17 Receiver Sender 41 19 and rime 53 Attacker 2491 47 Public
More informationLecture 7. Public Key Cryptography (Diffie-Hellman and RSA)
Lectue 7 Pulic Key Cytogahy (Diffie-Hellman and RSA) 1 Pulic Key Cytogahy Asymmetic cytogahy Invented in 1974-1978 (Diffie-Hellman and Rivest-Shami- Adleman) Two keys: ivate (SK), ulic (PK) Encytion: with
More informationPRIMES AND QUADRATIC RECIPROCITY
PRIMES AND QUADRATIC RECIPROCITY ANGELICA WONG Abstrct We discuss number theory with the ultimte gol of understnding udrtic recirocity We begin by discussing Fermt s Little Theorem, the Chinese Reminder
More information302 CHAPTER 17 ~ NUMBER THEORY AND CRYPTOLOGY
302 CHAPTER 17 ~ NUMBER THEORY AND CRYPTOLOGY A slightly different tke on this proof relies on the fct tht ny non-empty set of positive integers hs smllest number (This fct is equivlent to mth induction)
More informationWeakness of Shim s New ID-based Tripartite. Multiple-key Agreement Protocol
Wekness of Shim s New ID-bsed Triprtite Multiple-key greement Protocol Jue-Sm hou* hu-hsing Lin** nd hi-hung hiu** jschou@mil.nhu.edu.tw chlin@thu.edu.tw hdilwy@islb.csie.thu.edu.tw *Deprtment of Informtion
More informationSupplement 4 Permutations, Legendre symbol and quadratic reciprocity
Sulement 4 Permuttions, Legendre symbol nd qudrtic recirocity 1. Permuttions. If S is nite set contining n elements then ermuttion of S is one to one ming of S onto S. Usully S is the set f1; ; :::; ng
More informationCompact and Unforgeable Key Establishment over an ATM Network
Compct nd Unforgeble Key Estblishment over n ATM Networ Yuling Zheng (Monsh University, Austrli) Hidei Imi (University of Toyo, Jpn) 1 Outline of the tl Motivtion of this reserch Introduction to signcryption
More informationDuke Math Meet
Duke Mth Meet 01-14 Power Round Qudrtic Residues nd Prime Numers For integers nd, we write to indicte tht evenly divides, nd to indicte tht does not divide For exmle, 4 nd 4 Let e rime numer An integer
More informationA Public-Key Cryptosystem Based on Lucas Sequences
Palestine Journal of Mathematics Vol. 1(2) (2012), 148 152 Palestine Polytechnic University-PPU 2012 A Public-Key Crytosystem Based on Lucas Sequences Lhoussain El Fadil Communicated by Ayman Badawi MSC2010
More informationKronecker-Jacobi symbol and Quadratic Reciprocity. Q b /Q p
Kronecker-Jcoi symol nd Qudrtic Recirocity Let Q e the field of rtionl numers, nd let Q, 0. For ositive rime integer, the Artin symol Q /Q hs the vlue 1 if Q is the slitting field of in Q, 0 if is rmified
More informationarxiv: v6 [math.nt] 20 Jan 2016
EXPONENTIALLY S-NUMBERS rxiv:50.0594v6 [mth.nt] 20 Jn 206 VLADIMIR SHEVELEV Abstrct. Let S be the set of ll finite or infinite incresing sequences of ositive integers. For sequence S = {sn)},n, from S,
More informationPrimitive. that ak=1 with K < 4cm ). mod 7. working. then, smaller than 6 will do. m ) =/ odm ) is called. modulo m ( 4) =3. ordz.
R Section 0 Primitive Roots lerned th if ( im cm \ @ odm Hover its ossible th k with K < cm For exmle working 7 so if ( 7 L mod 7 know th I ( mod 7 But often n exonent smller thn will do mod 7 : l s 5
More informationAdvanced Cryptography Midterm Exam
Advanced Crytograhy Midterm Exam Solution Serge Vaudenay 17.4.2012 duration: 3h00 any document is allowed a ocket calculator is allowed communication devices are not allowed the exam invigilators will
More informationNow we use what we learn to enter a world of secrecy.
Now we use wht we lern to enter world of secrecy. Trnsmitting messges secretly nd conveniently is business s old s our lnguges. Julius Cesr (~400BC), for instnce, encoded messges by shifting ech letter
More information1 Structural induction
Discrete Structures Prelim 2 smple questions Solutions CS2800 Questions selected for Spring 2018 1 Structurl induction 1. We define set S of functions from Z to Z inductively s follows: Rule 1. For ny
More informationFinite state automata
Finite stte utomt Lecture 2 Model-Checking Finite-Stte Systems (untimed systems) Finite grhs with lels on edges/nodes set of nodes (sttes) set of edges (trnsitions) set of lels (lhet) Finite Automt, CTL,
More informationLECTURE 10: JACOBI SYMBOL
LECTURE 0: JACOBI SYMBOL The Jcobi symbol We wish to generlise the Legendre symbol to ccomodte comosite moduli Definition Let be n odd ositive integer, nd suose tht s, where the i re rime numbers not necessrily
More informationCryptography Assignment 3
Crytograhy Assignment Michael Orlov orlovm@cs.bgu.ac.il) Yanik Gleyzer yanik@cs.bgu.ac.il) Aril 9, 00 Abstract Solution for Assignment. The terms in this assignment are used as defined in [1]. In some
More informationQuadratic Residues. Chapter Quadratic residues
Chter 8 Qudrtic Residues 8. Qudrtic residues Let n>be given ositive integer, nd gcd, n. We sy tht Z n is qudrtic residue mod n if the congruence x mod n is solvble. Otherwise, is clled qudrtic nonresidue
More informationENEE 457: Computer Systems Security 10/3/16. Lecture 9 RSA Encryption and Diffie-Helmann Key Exchange
ENEE 457: Computer Systems Security 10/3/16 Lecture 9 RSA Encryption and Diffie-Helmann Key Exchange Charalampos (Babis) Papamanthou Department of Electrical and Computer Engineering University of Maryland,
More informationLecture 3 Gaussian Probability Distribution
Introduction Lecture 3 Gussin Probbility Distribution Gussin probbility distribution is perhps the most used distribution in ll of science. lso clled bell shped curve or norml distribution Unlike the binomil
More informationTanja Lange Technische Universiteit Eindhoven
Crytanalysis Course Part I Tanja Lange Technische Universiteit Eindhoven 28 Nov 2016 with some slides by Daniel J. Bernstein Main goal of this course: We are the attackers. We want to break ECC and RSA.
More informationUSA Mathematical Talent Search Round 1 Solutions Year 25 Academic Year
1/1/5. Alex is trying to oen lock whose code is sequence tht is three letters long, with ech of the letters being one of A, B or C, ossibly reeted. The lock hs three buttons, lbeled A, B nd C. When the
More informationGeometric Sequences. Geometric Sequence a sequence whose consecutive terms have a common ratio.
Geometric Sequences Geometric Sequence sequence whose consecutive terms hve common rtio. Geometric Sequence A sequence is geometric if the rtios of consecutive terms re the sme. 2 3 4... 2 3 The number
More informationPractice Assignment 2 Discussion 24/02/ /02/2018
German University in Cairo Faculty of MET (CSEN 1001 Computer and Network Security Course) Dr. Amr El Mougy 1 RSA 1.1 RSA Encryption Practice Assignment 2 Discussion 24/02/2018-29/02/2018 Perform encryption
More informationMath 4310 Solutions to homework 1 Due 9/1/16
Mth 4310 Solutions to homework 1 Due 9/1/16 1. Use the Eucliden lgorithm to find the following gretest common divisors. () gcd(252, 180) = 36 (b) gcd(513, 187) = 1 (c) gcd(7684, 4148) = 68 252 = 180 1
More informationThe graphs of Rational Functions
Lecture 4 5A: The its of Rtionl Functions s x nd s x + The grphs of Rtionl Functions The grphs of rtionl functions hve severl differences compred to power functions. One of the differences is the behvior
More informationAlgorithm Design and Analysis
Algorithm Design nd Anlysis LECTURE 12 Solving Recurrences Mster Theorem Adm Smith Review Question: Exponentition Problem: Compute b, where b N is n bits long. Question: How mny multiplictions? Nive lgorithm:
More information(9) P (x)u + Q(x)u + R(x)u =0
STURM-LIOUVILLE THEORY 7 2. Second order liner ordinry differentil equtions 2.1. Recll some sic results. A second order liner ordinry differentil eqution (ODE) hs the form (9) P (x)u + Q(x)u + R(x)u =0
More informationFor the percentage of full time students at RCC the symbols would be:
Mth 17/171 Chpter 7- ypothesis Testing with One Smple This chpter is s simple s the previous one, except it is more interesting In this chpter we will test clims concerning the sme prmeters tht we worked
More informationLecture 11: Key Agreement
Introduction to Cryptography 02/22/2018 Lecture 11: Key Agreement Instructor: Vipul Goyal Scribe: Francisco Maturana 1 Hardness Assumptions In order to prove the security of cryptographic primitives, we
More informationElliptic Curves and Cryptography
Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a
More informationIntroduction to Cybersecurity Cryptography (Part 4)
Introduction to Cybersecurity Cryptography (Part 4) Review of Last Lecture Blockciphers Review of DES Attacks on Blockciphers Advanced Encryption Standard (AES) Modes of Operation MACs and Hashes Message
More informationA proof of the strong twin prime conjecture
A roof of the strong twin rime conjecture Men-Jw Ho # (retired), Chou-Jung Hsu, *, Wi-Jne Ho b Dertment of Industril Mngement # Nn Ki University of Technology Nn-Tou 54, Tiwn b Dertment of Medicinl Botnicl
More informationImage Encryption Using Advanced Hill Cipher Algorithm
AEEE Interntionl Journl on Signl nd Imge Processing Vol, No., Jn 00 Imge Encrytion Using Advnced Hill iher Algorithm Bibhudendr Achry, Sroj umr Pnigrhy, Srt umr Ptr, nd Gnti Pnd Dertment of E & T, NIT
More informationQuantum Nonlocality Pt. 2: No-Signaling and Local Hidden Variables May 1, / 16
Quntum Nonloclity Pt. 2: No-Signling nd Locl Hidden Vriles My 1, 2018 Quntum Nonloclity Pt. 2: No-Signling nd Locl Hidden Vriles My 1, 2018 1 / 16 Non-Signling Boxes The primry lesson from lst lecture
More informationIntroduction to Cybersecurity Cryptography (Part 4)
Introduction to Cybersecurity Cryptography (Part 4) Review of Last Lecture Blockciphers Review of DES Attacks on Blockciphers Advanced Encryption Standard (AES) Modes of Operation MACs and Hashes Message
More informationRegular Language. Nonregular Languages The Pumping Lemma. The pumping lemma. Regular Language. The pumping lemma. Infinitely long words 3/17/15
Regulr Lnguge Nonregulr Lnguges The Pumping Lemm Models of Comput=on Chpter 10 Recll, tht ny lnguge tht cn e descried y regulr expression is clled regulr lnguge In this lecture we will prove tht not ll
More informationUSA Mathematical Talent Search Round 1 Solutions Year 21 Academic Year
1/1/21. Fill in the circles in the picture t right with the digits 1-8, one digit in ech circle with no digit repeted, so tht no two circles tht re connected by line segment contin consecutive digits.
More informationFingerprint idea. Assume:
Fingerprint ide Assume: We cn compute fingerprint f(p) of P in O(m) time. If f(p) f(t[s.. s+m 1]), then P T[s.. s+m 1] We cn compre fingerprints in O(1) We cn compute f = f(t[s+1.. s+m]) from f(t[s.. s+m
More informationPolynomial Approximations for the Natural Logarithm and Arctangent Functions. Math 230
Polynomil Approimtions for the Nturl Logrithm nd Arctngent Functions Mth 23 You recll from first semester clculus how one cn use the derivtive to find n eqution for the tngent line to function t given
More informationChapter 8 Public-key Cryptography and Digital Signatures
Chapter 8 Public-key Cryptography and Digital Signatures v 1. Introduction to Public-key Cryptography 2. Example of Public-key Algorithm: Diffie- Hellman Key Exchange Scheme 3. RSA Encryption and Digital
More information( ) Same as above but m = f x = f x - symmetric to y-axis. find where f ( x) Relative: Find where f ( x) x a + lim exists ( lim f exists.
AP Clculus Finl Review Sheet solutions When you see the words This is wht you think of doing Find the zeros Set function =, fctor or use qudrtic eqution if qudrtic, grph to find zeros on clcultor Find
More informationLecture 14. Protocols. Key Distribution Center (KDC) or Trusted Third Party (TTP) KDC generates R1
Lectue 14 Potocols 1 Key Distiution Cente (KDC) o Tusted Thid Pty (TTP) KDC genetes R1 lice otins R1 Msg1: K () Msg2: K (R1 K (R1) ) Msg3: K (R1) o otins R1 nd knows to use s key fo communicting with lice
More informationMATH 573 FINAL EXAM. May 30, 2007
MATH 573 FINAL EXAM My 30, 007 NAME: Solutions 1. This exm is due Wednesdy, June 6 efore the 1:30 pm. After 1:30 pm I will NOT ccept the exm.. This exm hs 1 pges including this cover. There re 10 prolems.
More informationp-adic Egyptian Fractions
p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction
More informationDesign and Implementation of Fast Multiplication Algorithms in Public Key Cryptosystems for Smart Cards
Design nd Implementtion of Fst Multipliction lgorithms in Public Key Cryptosystems for Smrt Crds G. Joseph nd W.T. Penzhorn bstrct Most prcticl public-ey cryptosystems re bsed on modulr exponentition.
More informationImproved Hidden Vector Encryption with Short Ciphertexts and Tokens
Imroved Hidden Vector Encrytion with Short Cihertexts and Tokens Kwangsu Lee Dong Hoon Lee Abstract Hidden vector encrytion HVE) is a articular kind of redicate encrytion that is an imortant crytograhic
More informationWorking with Powers and Exponents
Working ith Poer nd Eponent Nme: September. 00 Repeted Multipliction Remember multipliction i y to rite repeted ddition. To y +++ e rite. Sometime multipliction i done over nd over nd over. To rite e rite.
More informationExpectation and Variance
Expecttion nd Vrince : sum of two die rolls P(= P(= = 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12 P(=2) = 1/36 P(=3) = 1/18 P(=4) = 1/12 P(=5) = 1/9 P(=7) = 1/6 P(=13) =? 2 1/36 3 1/18 4 1/12 5 1/9 6 5/36 7 1/6
More informationHomework Solution - Set 5 Due: Friday 10/03/08
CE 96 Introduction to the Theory of Computtion ll 2008 Homework olution - et 5 Due: ridy 10/0/08 1. Textook, Pge 86, Exercise 1.21. () 1 2 Add new strt stte nd finl stte. Mke originl finl stte non-finl.
More informationIntroduction to Cryptography. Lecture 8
Introduction to Cryptography Lecture 8 Benny Pinkas page 1 1 Groups we will use Multiplication modulo a prime number p (G, ) = ({1,2,,p-1}, ) E.g., Z 7* = ( {1,2,3,4,5,6}, ) Z p * Z N * Multiplication
More informationset is not closed under matrix [ multiplication, ] and does not form a group.
Prolem 2.3: Which of the following collections of 2 2 mtrices with rel entries form groups under [ mtrix ] multipliction? i) Those of the form for which c d 2 Answer: The set of such mtrices is not closed
More informationSolution for Assignment 1 : Intro to Probability and Statistics, PAC learning
Solution for Assignment 1 : Intro to Probbility nd Sttistics, PAC lerning 10-701/15-781: Mchine Lerning (Fll 004) Due: Sept. 30th 004, Thursdy, Strt of clss Question 1. Bsic Probbility ( 18 pts) 1.1 (
More informationUniversitaireWiskundeCompetitie. Problem 2005/4-A We have k=1. Show that for every q Q satisfying 0 < q < 1, there exists a finite subset K N so that
Problemen/UWC NAW 5/7 nr juni 006 47 Problemen/UWC UniversitireWiskundeCompetitie Edition 005/4 For Session 005/4 we received submissions from Peter Vndendriessche, Vldislv Frnk, Arne Smeets, Jn vn de
More informationIs there an easy way to find examples of such triples? Why yes! Just look at an ordinary multiplication table to find them!
PUSHING PYTHAGORAS 009 Jmes Tnton A triple of integers ( bc,, ) is clled Pythgoren triple if exmple, some clssic triples re ( 3,4,5 ), ( 5,1,13 ), ( ) fond of ( 0,1,9 ) nd ( 119,10,169 ). + b = c. For
More informationWorksheet #2 Math 285 Name: 1. Solve the following systems of linear equations. The prove that the solutions forms a subspace of
Worsheet # th Nme:. Sole the folloing sstems of liner equtions. he proe tht the solutions forms suspe of ) ). Find the neessr nd suffiient onditions of ll onstnts for the eistene of solution to the sstem:.
More informationCryptography. Lecture 8. Arpita Patra
Crytograhy Lecture 8 Arita Patra Quick Recall and Today s Roadma >> Hash Functions- stands in between ublic and rivate key world >> Key Agreement >> Assumtions in Finite Cyclic grous - DL, CDH, DDH Grous
More informationTHE QUADRATIC RECIPROCITY LAW OF DUKE-HOPKINS. Circa 1870, G. Zolotarev observed that the Legendre symbol ( a p
THE QUADRATIC RECIPROCITY LAW OF DUKE-HOPKINS PETE L CLARK Circ 1870, Zolotrev observed tht the Legendre symbol ( p ) cn be interpreted s the sign of multipliction by viewed s permuttion of the set Z/pZ
More informationk and v = v 1 j + u 3 i + v 2
ORTHOGONAL FUNCTIONS AND FOURIER SERIES Orthogonl functions A function cn e considered to e generliztion of vector. Thus the vector concets like the inner roduct nd orthogonlity of vectors cn e extended
More informationMATH362 Fundamentals of Mathematical Finance
MATH362 Fundmentls of Mthemticl Finnce Solution to Homework Three Fll, 2007 Course Instructor: Prof. Y.K. Kwok. If outcome j occurs, then the gin is given by G j = g ij α i, + d where α i = i + d i We
More information1 ELEMENTARY ALGEBRA and GEOMETRY READINESS DIAGNOSTIC TEST PRACTICE
ELEMENTARY ALGEBRA nd GEOMETRY READINESS DIAGNOSTIC TEST PRACTICE Directions: Study the exmples, work the prolems, then check your nswers t the end of ech topic. If you don t get the nswer given, check
More informationExamples for 2.4, 2.5
STAT 400 Exmles for 2.4, 2. Fll 207 A. Stenov Binomil Distribution:. The number of trils, n, is fixed. 2. Ech tril hs two ossible outcomes: success nd filure. 3. The robbility of success,, is the sme from
More informationCMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014
CMPSCI 250: Introduction to Computtion Lecture #31: Wht DFA s Cn nd Cn t Do Dvid Mix Brrington 9 April 2014 Wht DFA s Cn nd Cn t Do Deterministic Finite Automt Forml Definition of DFA s Exmples of DFA
More information1 Probability Density Functions
Lis Yn CS 9 Continuous Distributions Lecture Notes #9 July 6, 28 Bsed on chpter by Chris Piech So fr, ll rndom vribles we hve seen hve been discrete. In ll the cses we hve seen in CS 9, this ment tht our
More information1. For each of the following theorems, give a two or three sentence sketch of how the proof goes or why it is not true.
York University CSE 2 Unit 3. DFA Clsses Converting etween DFA, NFA, Regulr Expressions, nd Extended Regulr Expressions Instructor: Jeff Edmonds Don t chet y looking t these nswers premturely.. For ech
More informationPublic-Key Encryption: ElGamal, RSA, Rabin
Public-Key Encryption: ElGamal, RSA, Rabin Introduction to Modern Cryptography Benny Applebaum Tel-Aviv University Fall Semester, 2011 12 Public-Key Encryption Syntax Encryption algorithm: E. Decryption
More informationMathematics Number: Logarithms
plce of mind F A C U L T Y O F E D U C A T I O N Deprtment of Curriculum nd Pedgogy Mthemtics Numer: Logrithms Science nd Mthemtics Eduction Reserch Group Supported y UBC Teching nd Lerning Enhncement
More informationData Structures and Algorithms CMPSC 465
Dt Structures nd Algorithms CMPSC 465 LECTURE 10 Solving recurrences Mster theorem Adm Smith S. Rskhodnikov nd A. Smith; bsed on slides by E. Demine nd C. Leiserson Review questions Guess the solution
More informationPractice Exam Winter 2018, CS 485/585 Crypto March 14, 2018
Practice Exam Name: Winter 2018, CS 485/585 Crypto March 14, 2018 Portland State University Prof. Fang Song Instructions This exam contains 8 pages (including this cover page) and 5 questions. Total of
More informationNumerical Integration
Numericl Integrtion Wouter J. Den Hn London School of Economics c 2011 by Wouter J. Den Hn June 3, 2011 Qudrture techniques I = f (x)dx n n w i f (x i ) = w i f i i=1 i=1 Nodes: x i Weights: w i Qudrture
More informationLecture 20: Numerical Integration III
cs4: introduction to numericl nlysis /8/0 Lecture 0: Numericl Integrtion III Instructor: Professor Amos Ron Scribes: Mrk Cowlishw, Yunpeng Li, Nthnel Fillmore For the lst few lectures we hve discussed
More information8 factors of x. For our second example, let s raise a power to a power:
CH 5 THE FIVE LAWS OF EXPONENTS EXPONENTS WITH VARIABLES It s no time for chnge in tctics, in order to give us deeper understnding of eponents. For ech of the folloing five emples, e ill stretch nd squish,
More informationTorsion in Groups of Integral Triangles
Advnces in Pure Mthemtics, 01,, 116-10 http://dxdoiorg/1046/pm011015 Pulished Online Jnury 01 (http://wwwscirporg/journl/pm) Torsion in Groups of Integrl Tringles Will Murry Deprtment of Mthemtics nd Sttistics,
More informationGeneralized Fano and non-fano networks
Generlized Fno nd non-fno networks Nildri Ds nd Brijesh Kumr Ri Deprtment of Electronics nd Electricl Engineering Indin Institute of Technology Guwhti, Guwhti, Assm, Indi Emil: {d.nildri, bkri}@iitg.ernet.in
More informationLecture V : Public Key Cryptography
Lecture V : Public Key Cryptography Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Amir Rezapoor Computer Science Department, National Chiao Tung University 2 Outline Functional
More information12.1 Nondeterminism Nondeterministic Finite Automata. a a b ε. CS125 Lecture 12 Fall 2014
CS125 Lecture 12 Fll 2014 12.1 Nondeterminism The ide of nondeterministic computtions is to llow our lgorithms to mke guesses, nd only require tht they ccept when the guesses re correct. For exmple, simple
More informationSurface maps into free groups
Surfce mps into free groups lden Wlker Novemer 10, 2014 Free groups wedge X of two circles: Set F = π 1 (X ) =,. We write cpitl letters for inverse, so = 1. e.g. () 1 = Commuttors Let x nd y e loops. The
More informationLecture 3. In this lecture, we will discuss algorithms for solving systems of linear equations.
Lecture 3 3 Solving liner equtions In this lecture we will discuss lgorithms for solving systems of liner equtions Multiplictive identity Let us restrict ourselves to considering squre mtrices since one
More informationLecture 22: RSA Encryption. RSA Encryption
Lecture 22: Recall: RSA Assumption We pick two primes uniformly and independently at random p, q $ P n We define N = p q We shall work over the group (Z N, ), where Z N is the set of all natural numbers
More informationSQUARES IN Z/NZ. q = ( 1) (p 1)(q 1)
SQUARES I Z/Z We study squares in the ring Z/Z from a theoretical and comutational oint of view. We resent two related crytograhic schemes. 1. SQUARES I Z/Z Consider for eamle the rime = 13. Write the
More informationLecture 2 : Propositions DRAFT
CS/Mth 240: Introduction to Discrete Mthemtics 1/20/2010 Lecture 2 : Propositions Instructor: Dieter vn Melkeeek Scrie: Dlior Zelený DRAFT Lst time we nlyzed vrious mze solving lgorithms in order to illustrte
More informationLattice Attacks on the DGHV Homomorphic Encryption Scheme
Lattice Attacks on the DGHV Homomorhic Encrytion Scheme Abderrahmane Nitaj 1 and Tajjeeddine Rachidi 2 1 Laboratoire de Mathématiques Nicolas Oresme Université de Caen Basse Normandie, France abderrahmanenitaj@unicaenfr
More informationChapter 1: Logarithmic functions and indices
Chpter : Logrithmic functions nd indices. You cn simplify epressions y using rules of indices m n m n m n m n ( m ) n mn m m m m n m m n Emple Simplify these epressions: 5 r r c 4 4 d 6 5 e ( ) f ( ) 4
More informationFree groups, Lecture 2, part 1
Free groups, Lecture 2, prt 1 Olg Khrlmpovich NYC, Sep. 2 1 / 22 Theorem Every sugroup H F of free group F is free. Given finite numer of genertors of H we cn compute its sis. 2 / 22 Schreir s grph The
More informationImproper Integrals. The First Fundamental Theorem of Calculus, as we ve discussed in class, goes as follows:
Improper Integrls The First Fundmentl Theorem of Clculus, s we ve discussed in clss, goes s follows: If f is continuous on the intervl [, ] nd F is function for which F t = ft, then ftdt = F F. An integrl
More informationFactoring RSA moduli with weak prime factors
Fctoring RSA moduli with we prime fctors Abderrhmne Nitj 1 nd Tjjeeddine Rchidi 2 1 Lbortoire de Mthémtiques Nicols Oresme Université de Cen Bsse Normndie, Frnce bderrhmne.nitj@unicen.fr 2 School of Science
More informationDownloaded from
POLYNOMIALS UNIT- It is not once nor twice but times without number tht the sme ides mke their ppernce in the world.. Find the vlue for K for which x 4 + 0x 3 + 5x + 5x + K exctly divisible by x + 7. Ans:
More informationx 2 a mod m. has a solution. Theorem 13.2 (Euler s Criterion). Let p be an odd prime. The congruence x 2 1 mod p,
13. Quadratic Residues We now turn to the question of when a quadratic equation has a solution modulo m. The general quadratic equation looks like ax + bx + c 0 mod m. Assuming that m is odd or that b
More informationPublic-Key Cryptography. Lecture 10 DDH Assumption El Gamal Encryption Public-Key Encryption from Trapdoor OWP
Public-Key Cryptography Lecture 10 DDH Assumption El Gamal Encryption Public-Key Encryption from Trapdoor OWP Diffie-Hellman Key-exchange Secure under DDH: (g x,g x,g xy ) (g x,g x,g r ) Random x {0,..,
More informationLemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).
1 Background 1.1 The group of units MAT 3343, APPLIED ALGEBRA, FALL 2003 Handout 3: The RSA Cryptosystem Peter Selinger Let (R, +, ) be a ring. Then R forms an abelian group under addition. R does not
More informationChapters Five Notes SN AA U1C5
Chpters Five Notes SN AA U1C5 Nme Period Section 5-: Fctoring Qudrtic Epressions When you took lger, you lerned tht the first thing involved in fctoring is to mke sure to fctor out ny numers or vriles
More informationLet S be a numerical semigroup generated by a generalized arithmetic sequence,
Abstrct We give closed form for the ctenry degree of ny element in numericl monoid generted by generlized rithmetic sequence in embedding dimension three. While it is known in generl tht the lrgest nd
More informationQuadratic Reciprocity
Quadratic Recirocity 5-7-011 Quadratic recirocity relates solutions to x = (mod to solutions to x = (mod, where and are distinct odd rimes. The euations are oth solvale or oth unsolvale if either or has
More informationLecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography
Lecture 19: (Diffie-Hellman Key Exchange & ElGamal Encryption) Recall In private-key cryptography the secret-key sk is always established ahead of time The secrecy of the private-key cryptography relies
More informationI1 = I2 I1 = I2 + I3 I1 + I2 = I3 + I4 I 3
2 The Prllel Circuit Electric Circuits: Figure 2- elow show ttery nd multiple resistors rrnged in prllel. Ech resistor receives portion of the current from the ttery sed on its resistnce. The split is
More information7 - Continuous random variables
7-1 Continuous rndom vribles S. Lll, Stnford 2011.01.25.01 7 - Continuous rndom vribles Continuous rndom vribles The cumultive distribution function The uniform rndom vrible Gussin rndom vribles The Gussin
More information