Estimating the φ(n) of Upper/Lower Bound in its RSA Cryptosystem
|
|
- Jack Craig
- 6 years ago
- Views:
Transcription
1 Estimatig the φ() of Upper/Lower Boud i its RSA Cryptosystem Cheglia Liu 1 ad Ziwei Ye 2 1 Departmet of Electrical Egieerig, Natioal Tsig-Hua Uiversity, Taiwa cheglia.liu@gmail.com 2 Departmet of Computer Sciece ad Techology, Tsig-Hua Uiversity, Beijig, Chia @QQ.COM Abstract. The RSA-768 (270 decimal digits) was factored by Kleijug et al. o December , ad the RSA-70 (212 decimal digits) was factored by Bai et al. o July 2, Ad the RSA-200 (663 bits) was factored by Bahr et al. o May 9, Util right ow, there is o body successful to break the RSA- 210 (696 bits) curretly. I this paper, we would discuss a estimatio method to approach lower/upper boud of φ() i the RSA parameters. Our cotributio may help researchers lock the φ() ad the challege RSA shortly. Keywords: RSA cryptosystem; Euler s totiet fuctio; Factorig; 1 Itroductio Challege RSA [12] is a iterestig ad difficult work. Recetly, most scietists ad researchers [1,, 8] usig geeral umber field sieve (GNFS) algorithm to factor RSA modulus. I practical eviromet, it looks like if you to wat to break the RSA, you may have best choice to choose GNFS whe you already factor the modulus. I theoretical, Wieer [17] first proposed a cryptaalysis of short secret expoets where the d < N 0.5 i Boeh [3] preseted Twety years of attacks o RSA cryptosystem i He classified ad described varieties attack. Followed by Boeh ad Durfee [2], they suggested the provate key d should be greater tha N for the security problem. Eve though, some bodies focus o secret key d or factor composite umber. Their purpose are clearly. We ca ot help but thik, does it exist a geeral estimatio way without factor to challege RSA? I this article, we would itroduce a ew methodology where approach the lower boud ad the upper boud of φ(). For this geeralize coceptio, it may match ay bit legth composite umber. 2 Review of RSA Coceptio The siger prepares the prerequisite of a RSA sigature: Two distict large prime p ad q, = pq, Let e be a public key so that gcd(e, φ()) = 1, where φ() = (p 1)(q 1), the calculate the private key d such that ed 1 (mod φ()). The siger publishes (e, ) ad keeps (p, q, d) secretly. The otatio as same i [12].
2 2 Cheglia Liu ad Ziwei Ye 2.1 RSA Ecryptio ad Decryptio I RSA public-key ecryptio, Alice ecrypts a plaitext M for Bob usig Bob s public key (, e) by computig the ciphertext C M e (mod ) (1) where, the modulus, is the product of two or more large primes, ad e, the public expoet, is a (odd) iteger e 3 that is relatively prime to φ(), the order of the multiplicative group Z. 2.2 RSA Digital Sigature s M d (mod ) (2) where (, d) is the siger s RSA private key. The sigature is verified by recoverig the message M with the siger s RSA public key (, e): M s e (mod ) (3) 3 Our Methodology I this sectio, we would calculate the upper boud ad the lower boud of φ() i RSA scheme. The detail described as below. Notatio: l: meas lower boud. u: meas upper boud. ε: a decimal expasio umber (e.g 99/100 = 0.99 ). 3.1 Approachig φ() If is composite, hece φ(), () Sierpiski [15] metioed it i 196. It is kow that if equatio () is a good upper boud for φ(). Is there a good lower boud for φ()? This questio also be discussed by a ewsgroup dialog betwee Ray Steier ad Bob Silverma i 1999 [16]. For > 30, the φ() > 2/3, Kemdall ad Osbor proved it [7]; for 3, the φ() > log 2 2 log give by Hatalova ad Salat [6] Estimate upper boud Does the equatio () a good upper boud? I follows, we would estimate a ew value where its smaller tha previous ad optimize. Theorem 1. Assume p, q are large prime umbers, where = pq, the φ() = k, k Z where 1 k 2 +1.
3 Estimatig the φ() of Upper/Lower Boud i its RSA Cryptosystem p q l φ() u Cetral Approachig Lower Boud Upper Boud Fig. 1. The lower/upper boud of φ() i RSA scheme. Proof. As kow two variat p ad q are large prime umbers, ad p, q > 2, sice 2 p, 2 q, therefore 2 p 1, 2 q 1. (p 1)(q 1), φ(). φ() = k, k Z +. We will discuss how calculate the rage of value k. Ad φ() = (p 1)(q 1) = pq (p + q) + 1 = (p + q) + 1. (5) p + q 2, p + q Z +, 2 p + q. p + q 2. φ() φ() = k, k Z +. φ() (6) Here, we kow the maximum value (limit superior) for k 2 +1, we call boudary value. Cosequetly, accordig to above iferece, we obtai a best upper boud u of φ() where φ() Theorem 2. Assume p, q are large prime umbers, ad p, q > 2, = pq, where φ() t, t Z. The t = φ() x 2 ( + 1 t)x + = 0 have two positive iteger solutios. Proof. We describe two properties, ecessary ad sufficiet coditios as follow: Necessary coditio: If t = φ() = (p 1)(q 1) = pq (p+q)+1 = (p+q)+1, the +1 t = p+q,
4 Cheglia Liu ad Ziwei Ye i the same time, the formula be x 2 (p + q)x + pq = 0. It is clearly, the equatio of the two roots p ad q are eeded to set up. Sufficiet coditio: If equatio x 2 ( + 1 t)x + = 0 have two iteger solutios. Assume x 1, x 2 be the equatio of the two roots, where x 1, x 2 Z +. The equatio could be trasformed to (x x 1 )(x x 2 ) = 0. Promptly, x 2 (x 1 + x 2 )x + x 1 x 2 = 0. The = x 1 x 2, accordig to s structure, there are two choice: 1) x 1 = 1 ad x 2 = (or x 1 = ad x 2 = 1). 2) x 1 = p ad x 2 = q (or x 2 = q ad x 2 = p). If x 1, x 2 oe for 1 ad. Now, x 1 + x 2 = + 1, because x 1 + x 2 = + 1 t, hece t = 0. However, i our assumptio, the coditio is t > 0, so this iferece cotradictio. The equatio have two itegers p ad q where x 1 + x 2 = p + q, (7) the Promptly, ad p + q = + 1 t. (8) t = + 1 (p + q), (9) t = φ(). (10) Thus, for the sufficiet coditio is settig up. Theorem 3. Assume p, q are large prime umbers, ad p, q > 2, = pq, t = k where φ() t, t Z. If ( + 1 t) 2 is a iteger umber, the equatio x 2 ( + 1 t)x + = 0 has two iteger solutios. Proof. Sice p, q are both prime umbers where = pq, 2, but Suppose t = k, ad 2 t. Thus t. If ( + 1 t) 2 Z, so 2 ( + 1 t) 2. The equatio x 2 ( + 1 t)x = 0 of the two solutios are: x = +1 t± (+1 t) 2 2. Because t, ad while ( + 1 t) 2 Z, it exists 2 ( + 1 t) 2. Whe ( + 1 t) 2 Z, t ± ( + 1 t) 2. Due to ( + 1 t) 2 Z, the x is also Z. Here, the two solutios of equatio x 2 ( + 1 t)x + = 0 are both itegers Estimate lower boud Loomis et al. [10] thought the Shapiro s [13] lower boud φ() > (log 2) /(log 3) as a (aive) lower boud for E, they ca determie whe all members of a give E have bee foud. Powell [11] poited out that Koyagi ad Shparliksi s lower boud N 1 (, p) > (p 1)/2 p 3/2 / where > 1 is a
5 Estimatig the φ() of Upper/Lower Boud i its RSA Cryptosystem 5 q prime q positive iteger ad that p is a odd prime umber with p 1 (mod ); that is a good boud if p is a small compared to, ad establishes that N 1 (, p) ( φ()( q 1/(q 1) )/)p 1 1/φ(). Powell also discussed a improvemet the upper ad lower bouds i [11]. What is the optimal lower boud? The other discuss i followig: Theorem. For all 3 we have φ() e γ log log + Ø( (log log ) ), where γ 2 is the Euler-Mascheroe Costat, ad the above holds with equality ifiitely ofte. Remark:ote i particular that sice loglog as grows large, we see that the result m < φ() ca ot hold for ay fixed iteger m. Proof. Cosider R, set of all such that m < implies φ() m. This set is the all of the record breakig. If R has k prime factors, let be the product of the first k prime factors. If ad φ() φ(), which is impossible. Hece, R cosist etirely of of the form = p y p for some y. Now for R, we ca choose y so that log = p y log p = θ(y). The usig oe of Mertes estimates we see that φ() = p y (1 1 p ) = e γ log y +O( 1 (log y) ). Sice log log = log(θ(y)) = log y+ø(1) 2 by Mertes estimates agai, we have for R, φ() = e r log log + O( 1 (log log ). 2 < φ(m) Fig. 2. The same digits of φ() ad modulus parameters i RSA. From above, it seems so complexity. Does it exist a simple computatio method? We observed the modulus with φ(), there have some characteristics. A example for RSA-200, the modulus ad the φ() are 200 decimal digits. We compared ad φ() each other, there are the same digits from left to right 110 digits. The example showed i Figure 2. Discuss o RSA modulus umber with haft of the bit prescribed, be itroduced some literatures i [5, 9, 1]. To RSA-70, the ad φ() had same Table 1. Compariso of some types i RSA parameters. Uit: decimal digits type Modulus legth φ() legth p legth q legth same digits & φ() same digits φ() &u RSA RSA ?? RSA RSA
6 6 Cheglia Liu ad Ziwei Ye digits 106, it amouts same legth with p or q. We computed the upper boud value accordig to Theorem 1, this upper boud had same 108 digits with its φ(). Ad aalyzed the RSA-768, the had 115 digits same with φ(); the φ() had 120 digits same with its upper boud u. Please see Table 1 We observed the relatioship of φ() ad its boudary value k, whe φ() divided by k, we obtaied this quotiet are very approachig to umber, these lower bouders are very close to multiples of umber. We say 3.999, ad have 106 s 9 after decimal poit for case of RSA-210 type. The lower boud approximatio figure diagram be show i figure ad i Table 2. As Fig. 3. The lower boud approximatio curve status. Table 2. The relatioship of φ() ad its boudary value k. type φ()/k statemet RSA RSA RSA RSA s there have 99 s 9 after the decimal poit 106 s Estimatig have 106 s 9 after decimal poit 107 s there have 107 s 9 after decimal poit 117 s there have 117 s 9 after decimal poit kow as the modulus umber of RSA-210, we re-estimated its lower/upper bouds. We assume: (3 + ε) φ() 2 + 1, (11)
7 Estimatig the φ() of Upper/Lower Boud i its RSA Cryptosystem s 9 where ε = We therefore compute the upper boud u ad lower boud l; those show result i Figure. Fig.. The lower/upper boud parameters of φ() i RSA-210. Coclusio I this paper, we re-estimated a ew lower/upper boud values of φ() i RSA-210, our methodology are easily, simply, clearly, o itricately ad ituitive. It may be useful to researchers who would quickly reduce the searchig rages. Lookig back, more researchers focus o secret d or modulus, such as well kow short expoet attack, side chael attack, or commo modulus ad cyclic attacks. Our method is differ to previous literatures. Fially, We preseted what we claimed actually. Refereces 1. Bai, S., Thomé, E., Zimmerma, P.: Factorisatio of RSA-70 with cado-fs. IACR Cryptology eprit Archive p. 369 (2012) 2. Boeh, D., Durfee, G.: Cryptaalysis of RSA with private key d less tha N IEEE Trasactios o Iformatio Theory 6(), (July 2000) 3. Boeh, D.: Twety years of attacks o the RSA cryptosystem. Notices of the AMS 6, (1999). F. Bahr, M. Boehm, J.F., Kleijug, T.: RSA-200 is factored. Website (2005), Graham, S.W., Shparliski, I.E.: O RSA moduli with almost half of the bits prescribed. Discrete Applied Mathematics 156(16), (2008) 6. Hatalova, H., Salat, T.: Remarks o two results i thelemetary theory of umbers. Acta. FacRer. Natur Uiv Comeia. Math. (20), (1969) 7. Kedall, D.G., Osbor, H.B.: Two Simple Lower Bouds for Euler s Fuctio, vol. 17. Texas Joural of Sciece (1965) 8. Kleijug, T., Aoki, K., Frake, J., Lestra, A.K., Thomé, E., Bos, J.W., Gaudry, P., Kruppa, A., Motgomery, P.L., Osvik, D.A., Te Riele, H., Timofeev, A., Zimmerma, P.: Factorizatio of a 768-bit RSA modulus. I: Proceedigs of the 30th aual coferece o Advaces i cryptology. CRYPTO 10 (2010)
8 8 Cheglia Liu ad Ziwei Ye 9. Meg, X.: O RSA moduli with half of the bits prescribed. Joural of Number Theory 133(1), (2013), article/pii/s002231x Paul Loomis, M.P., Polhill, J.: Summig up the Euler φ fuctio. The College Mathematics Joural 39(1), 3 2 (2008) 11. Powell, C.: Bouds for multiplicative cosets over fields of prime order. Mathematics of Computatio 66(218), (April 1997) 12. Rivest, R., Shamir, A., Adlema, L.: A method for obtaiig digital sigatures ad publickey cryptosystems. Commuicatios of the ACM 21, (1978) 13. Shapiro, H.: A arithmetic fuctio arisig from the φ fuctio. The America Mathematical Mothly 50, (193) 1. Shparliski, I.: O RSA moduli with prescribed bit patters. Desigs, Codes ad Cryptography 39 (2006) 15. Sierpiski, W.F.: Elemetary Theory of Numbers. North-Hollad PWN-Polish Scietific Publishers, Warsawa (196) 16. Silverma, B.: Euler s phi fuctios. Website (2012), rusi/kow-math/99/mi_phi 17. Wieer, M.J.: Cryptaalysis of short RSA secret expoets. IEEE Trasatios o Iformatio Theory
Factoring Algorithms and Other Attacks on the RSA 1/12
Factorig Algorithms ad Other Attacks o the RSA T-79550 Cryptology Lecture 8 April 8, 008 Kaisa Nyberg Factorig Algorithms ad Other Attacks o the RSA / The Pollard p Algorithm Let B be a positive iteger
More informationA Block Cipher Using Linear Congruences
Joural of Computer Sciece 3 (7): 556-560, 2007 ISSN 1549-3636 2007 Sciece Publicatios A Block Cipher Usig Liear Cogrueces 1 V.U.K. Sastry ad 2 V. Jaaki 1 Academic Affairs, Sreeidhi Istitute of Sciece &
More informationSolutions to Math 347 Practice Problems for the final
Solutios to Math 347 Practice Problems for the fial 1) True or False: a) There exist itegers x,y such that 50x + 76y = 6. True: the gcd of 50 ad 76 is, ad 6 is a multiple of. b) The ifiimum of a set is
More informationSome Explicit Formulae of NAF and its Left-to-Right. Analogue Based on Booth Encoding
Vol.7, No.6 (01, pp.69-74 http://dx.doi.org/10.1457/ijsia.01.7.6.7 Some Explicit Formulae of NAF ad its Left-to-Right Aalogue Based o Booth Ecodig Dog-Guk Ha, Okyeo Yi, ad Tsuyoshi Takagi Kookmi Uiversity,
More informationSeed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers
IOSR Joural of Mathematics (IOSR-JM) e-issn: 78-578, p-issn: 319-75X. Volume 1, Issue 5 Ver. VIII (Sep. - Oct.01), PP 01-07 www.iosrjourals.org Seed ad Sieve of Odd Composite Numbers with Applicatios i
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 11, November 2012 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com A Digital Sigature Algorim
More information6.3 Testing Series With Positive Terms
6.3. TESTING SERIES WITH POSITIVE TERMS 307 6.3 Testig Series With Positive Terms 6.3. Review of what is kow up to ow I theory, testig a series a i for covergece amouts to fidig the i= sequece of partial
More informationBertrand s Postulate
Bertrad s Postulate Lola Thompso Ross Program July 3, 2009 Lola Thompso (Ross Program Bertrad s Postulate July 3, 2009 1 / 33 Bertrad s Postulate I ve said it oce ad I ll say it agai: There s always a
More informationComparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series
Applied Mathematical Scieces, Vol. 7, 03, o. 6, 3-337 HIKARI Ltd, www.m-hikari.com http://d.doi.org/0.988/ams.03.3430 Compariso Study of Series Approimatio ad Covergece betwee Chebyshev ad Legedre Series
More informationON THE LEHMER CONSTANT OF FINITE CYCLIC GROUPS
ON THE LEHMER CONSTANT OF FINITE CYCLIC GROUPS NORBERT KAIBLINGER Abstract. Results of Lid o Lehmer s problem iclude the value of the Lehmer costat of the fiite cyclic group Z/Z, for 5 ad all odd. By complemetary
More informationThe picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled
1 Lecture : Area Area ad distace traveled Approximatig area by rectagles Summatio The area uder a parabola 1.1 Area ad distace Suppose we have the followig iformatio about the velocity of a particle, how
More informationOn a Smarandache problem concerning the prime gaps
O a Smaradache problem cocerig the prime gaps Felice Russo Via A. Ifate 7 6705 Avezzao (Aq) Italy felice.russo@katamail.com Abstract I this paper, a problem posed i [] by Smaradache cocerig the prime gaps
More informationThe value of Banach limits on a certain sequence of all rational numbers in the interval (0,1) Bao Qi Feng
The value of Baach limits o a certai sequece of all ratioal umbers i the iterval 0, Bao Qi Feg Departmet of Mathematical Scieces, Ket State Uiversity, Tuscarawas, 330 Uiversity Dr. NE, New Philadelphia,
More informationAnalysis of Deutsch-Jozsa Quantum Algorithm
Aalysis of Deutsch-Jozsa Quatum Algorithm Zhegju Cao Jeffrey Uhlma Lihua Liu 3 Abstract. Deutsch-Jozsa quatum algorithm is of great importace to quatum computatio. It directly ispired Shor s factorig algorithm.
More informationSimon Blackburn. Sean Murphy. Jacques Stern. Laboratoire d'informatique, Ecole Normale Superieure, Abstract
The Cryptaalysis of a Public Key Implemetatio of Fiite Group Mappigs Simo Blackbur Sea Murphy Iformatio Security Group, Royal Holloway ad Bedford New College, Uiversity of Lodo, Egham, Surrey TW20 0EX,
More informationThe 4-Nicol Numbers Having Five Different Prime Divisors
1 2 3 47 6 23 11 Joural of Iteger Sequeces, Vol. 14 (2011), Article 11.7.2 The 4-Nicol Numbers Havig Five Differet Prime Divisors Qiao-Xiao Ji ad Mi Tag 1 Departmet of Mathematics Ahui Normal Uiversity
More informationCSE 1400 Applied Discrete Mathematics Number Theory and Proofs
CSE 1400 Applied Discrete Mathematics Number Theory ad Proofs Departmet of Computer Scieces College of Egieerig Florida Tech Sprig 01 Problems for Number Theory Backgroud Number theory is the brach of
More informationON SOME DIOPHANTINE EQUATIONS RELATED TO SQUARE TRIANGULAR AND BALANCING NUMBERS
Joural of Algebra, Number Theory: Advaces ad Applicatios Volume, Number, 00, Pages 7-89 ON SOME DIOPHANTINE EQUATIONS RELATED TO SQUARE TRIANGULAR AND BALANCING NUMBERS OLCAY KARAATLI ad REFİK KESKİN Departmet
More information62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 +
62. Power series Defiitio 16. (Power series) Give a sequece {c }, the series c x = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + is called a power series i the variable x. The umbers c are called the coefficiets of
More informationMerkle-Hellman Knapsack Cryptosystem in Undergraduate Computer Science Curriculum
Merkle-Hellma Kapsack Cryptosystem i Udergraduate Computer Sciece Curriculum Y. Kortsarts, Y. Kemper 2 Computer Sciece Departmet, Wideer Uiversity, Chester, PA, USA 2 Computer Sciece Departmet, Holo Istitute
More informationSeunghee Ye Ma 8: Week 5 Oct 28
Week 5 Summary I Sectio, we go over the Mea Value Theorem ad its applicatios. I Sectio 2, we will recap what we have covered so far this term. Topics Page Mea Value Theorem. Applicatios of the Mea Value
More informationChapter 4. Fourier Series
Chapter 4. Fourier Series At this poit we are ready to ow cosider the caoical equatios. Cosider, for eample the heat equatio u t = u, < (4.) subject to u(, ) = si, u(, t) = u(, t) =. (4.) Here,
More informationReview of Elementary Cryptography. For more material, see my notes of CSE 5351, available on my webpage
Review of Elemetary Cryptography For more material, see my otes of CSE 5351, available o my webpage Outlie Security (CPA, CCA, sematic security, idistiguishability) RSA ElGamal Homomorphic ecryptio 2 Two
More informationOblivious Transfer using Elliptic Curves
Oblivious Trasfer usig Elliptic Curves bhishek Parakh Louisiaa State Uiversity, ato Rouge, L May 4, 006 bstract: This paper proposes a algorithm for oblivious trasfer usig elliptic curves lso, we preset
More informationProof of Fermat s Last Theorem by Algebra Identities and Linear Algebra
Proof of Fermat s Last Theorem by Algebra Idetities ad Liear Algebra Javad Babaee Ragai Youg Researchers ad Elite Club, Qaemshahr Brach, Islamic Azad Uiversity, Qaemshahr, Ira Departmet of Civil Egieerig,
More informationSigma notation. 2.1 Introduction
Sigma otatio. Itroductio We use sigma otatio to idicate the summatio process whe we have several (or ifiitely may) terms to add up. You may have see sigma otatio i earlier courses. It is used to idicate
More informationFermat s Little Theorem. mod 13 = 0, = }{{} mod 13 = 0. = a a a }{{} mod 13 = a 12 mod 13 = 1, mod 13 = a 13 mod 13 = a.
Departmet of Mathematical Scieces Istructor: Daiva Puciskaite Discrete Mathematics Fermat s Little Theorem 43.. For all a Z 3, calculate a 2 ad a 3. Case a = 0. 0 0 2-times Case a 0. 0 0 3-times a a 2-times
More informationThe multiplicative structure of finite field and a construction of LRC
IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio
More informationEstimation of Backward Perturbation Bounds For Linear Least Squares Problem
dvaced Sciece ad Techology Letters Vol.53 (ITS 4), pp.47-476 http://dx.doi.org/.457/astl.4.53.96 Estimatio of Bacward Perturbatio Bouds For Liear Least Squares Problem Xixiu Li School of Natural Scieces,
More informationStatistical Properties of the Square Map Modulo a Power of Two
Statistical Properties of the Square Map Modulo a Power of Two S. M. Dehavi, A. Mahmoodi Rishakai, M. R. Mirzee Shamsabad 3, Hamidreza Maimai, Eiollah Pasha Kharazmi Uiversity, Faculty of Mathematical
More informationZeros of Polynomials
Math 160 www.timetodare.com 4.5 4.6 Zeros of Polyomials I these sectios we will study polyomials algebraically. Most of our work will be cocered with fidig the solutios of polyomial equatios of ay degree
More informationROSE WONG. f(1) f(n) where L the average value of f(n). In this paper, we will examine averages of several different arithmetic functions.
AVERAGE VALUES OF ARITHMETIC FUNCTIONS ROSE WONG Abstract. I this paper, we will preset problems ivolvig average values of arithmetic fuctios. The arithmetic fuctios we discuss are: (1)the umber of represetatios
More informationNew Approximations to the Mathematical Constant e
Joural of Mathematics Research September, 009 New Approximatios to the Mathematical Costat e Sajay Kumar Khattri Correspodig author) Stord Haugesud Uiversity College Bjørsosgate 45 PO box 558, Haugesud,
More informationOn Some Properties of Digital Roots
Advaces i Pure Mathematics, 04, 4, 95-30 Published Olie Jue 04 i SciRes. http://www.scirp.org/joural/apm http://dx.doi.org/0.436/apm.04.46039 O Some Properties of Digital Roots Ilha M. Izmirli Departmet
More informationCOMPUTING SUMS AND THE AVERAGE VALUE OF THE DIVISOR FUNCTION (x 1) + x = n = n.
COMPUTING SUMS AND THE AVERAGE VALUE OF THE DIVISOR FUNCTION Abstract. We itroduce a method for computig sums of the form f( where f( is ice. We apply this method to study the average value of d(, where
More informationPlease do NOT write in this box. Multiple Choice. Total
Istructor: Math 0560, Worksheet Alteratig Series Jauary, 3000 For realistic exam practice solve these problems without lookig at your book ad without usig a calculator. Multiple choice questios should
More informationOn a Conjecture of Dris Regarding Odd Perfect Numbers
O a Cojecture of Dris Regardig Odd Perfect Numbers Jose Araldo B. Dris Departmet of Mathematics, Far Easter Uiversity Maila, Philippies e-mail: jadris@feu.edu.ph,josearaldobdris@gmail.com arxiv:1312.6001v9
More informationMAT1026 Calculus II Basic Convergence Tests for Series
MAT026 Calculus II Basic Covergece Tests for Series Egi MERMUT 202.03.08 Dokuz Eylül Uiversity Faculty of Sciece Departmet of Mathematics İzmir/TURKEY Cotets Mootoe Covergece Theorem 2 2 Series of Real
More informationUnit 4: Polynomial and Rational Functions
48 Uit 4: Polyomial ad Ratioal Fuctios Polyomial Fuctios A polyomial fuctio y px ( ) is a fuctio of the form p( x) ax + a x + a x +... + ax + ax+ a 1 1 1 0 where a, a 1,..., a, a1, a0are real costats ad
More informationThe Local Harmonious Chromatic Problem
The 7th Workshop o Combiatorial Mathematics ad Computatio Theory The Local Harmoious Chromatic Problem Yue Li Wag 1,, Tsog Wuu Li ad Li Yua Wag 1 Departmet of Iformatio Maagemet, Natioal Taiwa Uiversity
More informationCommutativity in Permutation Groups
Commutativity i Permutatio Groups Richard Wito, PhD Abstract I the group Sym(S) of permutatios o a oempty set S, fixed poits ad trasiet poits are defied Prelimiary results o fixed ad trasiet poits are
More informationQuantum Computing Lecture 7. Quantum Factoring
Quatum Computig Lecture 7 Quatum Factorig Maris Ozols Quatum factorig A polyomial time quatum algorithm for factorig umbers was published by Peter Shor i 1994. Polyomial time meas that the umber of gates
More informationMath 113 Exam 3 Practice
Math Exam Practice Exam will cover.-.9. This sheet has three sectios. The first sectio will remid you about techiques ad formulas that you should kow. The secod gives a umber of practice questios for you
More informationProperties and Tests of Zeros of Polynomial Functions
Properties ad Tests of Zeros of Polyomial Fuctios The Remaider ad Factor Theorems: Sythetic divisio ca be used to fid the values of polyomials i a sometimes easier way tha substitutio. This is show by
More informationSome remarks for codes and lattices over imaginary quadratic
Some remarks for codes ad lattices over imagiary quadratic fields Toy Shaska Oaklad Uiversity, Rochester, MI, USA. Caleb Shor Wester New Eglad Uiversity, Sprigfield, MA, USA. shaska@oaklad.edu Abstract
More information3.2 Properties of Division 3.3 Zeros of Polynomials 3.4 Complex and Rational Zeros of Polynomials
Math 60 www.timetodare.com 3. Properties of Divisio 3.3 Zeros of Polyomials 3.4 Complex ad Ratioal Zeros of Polyomials I these sectios we will study polyomials algebraically. Most of our work will be cocered
More information4.3 Growth Rates of Solutions to Recurrences
4.3. GROWTH RATES OF SOLUTIONS TO RECURRENCES 81 4.3 Growth Rates of Solutios to Recurreces 4.3.1 Divide ad Coquer Algorithms Oe of the most basic ad powerful algorithmic techiques is divide ad coquer.
More informationPolynomial Functions and Their Graphs
Polyomial Fuctios ad Their Graphs I this sectio we begi the study of fuctios defied by polyomial expressios. Polyomial ad ratioal fuctios are the most commo fuctios used to model data, ad are used extesively
More informationsin(n) + 2 cos(2n) n 3/2 3 sin(n) 2cos(2n) n 3/2 a n =
60. Ratio ad root tests 60.1. Absolutely coverget series. Defiitio 13. (Absolute covergece) A series a is called absolutely coverget if the series of absolute values a is coverget. The absolute covergece
More informationIntroduction to Extreme Value Theory Laurens de Haan, ISM Japan, Erasmus University Rotterdam, NL University of Lisbon, PT
Itroductio to Extreme Value Theory Laures de Haa, ISM Japa, 202 Itroductio to Extreme Value Theory Laures de Haa Erasmus Uiversity Rotterdam, NL Uiversity of Lisbo, PT Itroductio to Extreme Value Theory
More informationBINOMIAL PREDICTORS. + 2 j 1. Then n + 1 = The row of the binomial coefficients { ( n
BINOMIAL PREDICTORS VLADIMIR SHEVELEV arxiv:0907.3302v2 [math.nt] 22 Jul 2009 Abstract. For oegative itegers, k, cosider the set A,k = { [0, 1,..., ] : 2 k ( ). Let the biary epasio of + 1 be: + 1 = 2
More informationA 2nTH ORDER LINEAR DIFFERENCE EQUATION
A 2TH ORDER LINEAR DIFFERENCE EQUATION Doug Aderso Departmet of Mathematics ad Computer Sciece, Cocordia College Moorhead, MN 56562, USA ABSTRACT: We give a formulatio of geeralized zeros ad (, )-discojugacy
More informationarxiv: v1 [math.nt] 5 Jan 2017 IBRAHIM M. ALABDULMOHSIN
FRACTIONAL PARTS AND THEIR RELATIONS TO THE VALUES OF THE RIEMANN ZETA FUNCTION arxiv:70.04883v [math.nt 5 Ja 07 IBRAHIM M. ALABDULMOHSIN Kig Abdullah Uiversity of Sciece ad Techology (KAUST, Computer,
More informationUniversal Subsets of Z n, Linear Integer Optimization, and Integer Factorization
DIMACS Techical Report 005-9 Jauary 006 Uiversal Subsets of Z, Liear Iteger Optimizatio, ad Iteger Factorizatio by Zhivko Nedev 1 1 Uiv. of Victoria, zedev@math.uvic.ca. Part of the work was doe while
More informationand each factor on the right is clearly greater than 1. which is a contradiction, so n must be prime.
MATH 324 Summer 200 Elemetary Number Theory Solutios to Assigmet 2 Due: Wedesday July 2, 200 Questio [p 74 #6] Show that o iteger of the form 3 + is a prime, other tha 2 = 3 + Solutio: If 3 + is a prime,
More informationThe Paillier Cryptosystem
E-Votig Semiar The Paillier Cryptosystem Adreas Steffe Hochschule für Techik Rapperswil adreas.steffe@hsr.ch Adreas Steffe, 17.1.010, Paillier.pptx 1 Ageda Some mathematical properties Ecryptio ad decryptio
More informationDiscrete Orthogonal Moment Features Using Chebyshev Polynomials
Discrete Orthogoal Momet Features Usig Chebyshev Polyomials R. Mukuda, 1 S.H.Og ad P.A. Lee 3 1 Faculty of Iformatio Sciece ad Techology, Multimedia Uiversity 75450 Malacca, Malaysia. Istitute of Mathematical
More informationSequences, Mathematical Induction, and Recursion. CSE 2353 Discrete Computational Structures Spring 2018
CSE 353 Discrete Computatioal Structures Sprig 08 Sequeces, Mathematical Iductio, ad Recursio (Chapter 5, Epp) Note: some course slides adopted from publisher-provided material Overview May mathematical
More informationMath 116 Second Midterm November 13, 2017
Math 6 Secod Midterm November 3, 7 EXAM SOLUTIONS. Do ot ope this exam util you are told to do so.. Do ot write your ame aywhere o this exam. 3. This exam has pages icludig this cover. There are problems.
More informationFeedback in Iterative Algorithms
Feedback i Iterative Algorithms Charles Byre (Charles Byre@uml.edu), Departmet of Mathematical Scieces, Uiversity of Massachusetts Lowell, Lowell, MA 01854 October 17, 2005 Abstract Whe the oegative system
More informationMATH 324 Summer 2006 Elementary Number Theory Solutions to Assignment 2 Due: Thursday July 27, 2006
MATH 34 Summer 006 Elemetary Number Theory Solutios to Assigmet Due: Thursday July 7, 006 Departmet of Mathematical ad Statistical Scieces Uiversity of Alberta Questio [p 74 #6] Show that o iteger of the
More information(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3
MATH 337 Sequeces Dr. Neal, WKU Let X be a metric space with distace fuctio d. We shall defie the geeral cocept of sequece ad limit i a metric space, the apply the results i particular to some special
More informationSection 5.5. Infinite Series: The Ratio Test
Differece Equatios to Differetial Equatios Sectio 5.5 Ifiite Series: The Ratio Test I the last sectio we saw that we could demostrate the covergece of a series a, where a 0 for all, by showig that a approaches
More information10.6 ALTERNATING SERIES
0.6 Alteratig Series Cotemporary Calculus 0.6 ALTERNATING SERIES I the last two sectios we cosidered tests for the covergece of series whose terms were all positive. I this sectio we examie series whose
More informationResolvent Estrada Index of Cycles and Paths
SCIENTIFIC PUBLICATIONS OF THE STATE UNIVERSITY OF NOVI PAZAR SER. A: APPL. MATH. INFORM. AND MECH. vol. 8, 1 (216), 1-1. Resolvet Estrada Idex of Cycles ad Paths Bo Deg, Shouzhog Wag, Iva Gutma Abstract:
More informationSecurity Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography
Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography Peter Schwabe October 21 and 28, 2011 So far we assumed that Alice and Bob both have some key, which nobody else has. How
More informationDIVISIBILITY PROPERTIES OF GENERALIZED FIBONACCI POLYNOMIALS
DIVISIBILITY PROPERTIES OF GENERALIZED FIBONACCI POLYNOMIALS VERNER E. HOGGATT, JR. Sa Jose State Uiversity, Sa Jose, Califoria 95192 ad CALVIN T. LONG Washigto State Uiversity, Pullma, Washigto 99163
More informationPell and Lucas primes
Notes o Number Theory ad Discrete Mathematics ISSN 30 532 Vol. 2, 205, No. 3, 64 69 Pell ad Lucas primes J. V. Leyedekkers ad A. G. Shao 2 Faculty of Sciece, The Uiversity of Sydey NSW 2006, Australia
More informationThe z-transform. 7.1 Introduction. 7.2 The z-transform Derivation of the z-transform: x[n] = z n LTI system, h[n] z = re j
The -Trasform 7. Itroductio Geeralie the complex siusoidal represetatio offered by DTFT to a represetatio of complex expoetial sigals. Obtai more geeral characteristics for discrete-time LTI systems. 7.
More informationMa 530 Introduction to Power Series
Ma 530 Itroductio to Power Series Please ote that there is material o power series at Visual Calculus. Some of this material was used as part of the presetatio of the topics that follow. What is a Power
More informationMathematical Induction
Mathematical Iductio Itroductio Mathematical iductio, or just iductio, is a proof techique. Suppose that for every atural umber, P() is a statemet. We wish to show that all statemets P() are true. I a
More informationAn extension of the RSA trapdoor in a KEM/DEM framework
A extesio of the RSA trapdoor i a KEM/DEM framework Bogda Groza Politehica Uiversity of Timisoara Faculty of Automatics ad Computers Bd. Vasile Parva r. 2, 300223 Timisoara, Romaia mail: bogda.groza@aut.upt.ro
More informationCHAPTER 10 INFINITE SEQUENCES AND SERIES
CHAPTER 10 INFINITE SEQUENCES AND SERIES 10.1 Sequeces 10.2 Ifiite Series 10.3 The Itegral Tests 10.4 Compariso Tests 10.5 The Ratio ad Root Tests 10.6 Alteratig Series: Absolute ad Coditioal Covergece
More informationINFINITE SEQUENCES AND SERIES
INFINITE SEQUENCES AND SERIES INFINITE SEQUENCES AND SERIES I geeral, it is difficult to fid the exact sum of a series. We were able to accomplish this for geometric series ad the series /[(+)]. This is
More informationA Simplified Binet Formula for k-generalized Fibonacci Numbers
A Simplified Biet Formula for k-geeralized Fiboacci Numbers Gregory P. B. Dresde Departmet of Mathematics Washigto ad Lee Uiversity Lexigto, VA 440 dresdeg@wlu.edu Zhaohui Du Shaghai, Chia zhao.hui.du@gmail.com
More information3. Z Transform. Recall that the Fourier transform (FT) of a DT signal xn [ ] is ( ) [ ] = In order for the FT to exist in the finite magnitude sense,
3. Z Trasform Referece: Etire Chapter 3 of text. Recall that the Fourier trasform (FT) of a DT sigal x [ ] is ω ( ) [ ] X e = j jω k = xe I order for the FT to exist i the fiite magitude sese, S = x [
More informationProof of a conjecture of Amdeberhan and Moll on a divisibility property of binomial coefficients
Proof of a cojecture of Amdeberha ad Moll o a divisibility property of biomial coefficiets Qua-Hui Yag School of Mathematics ad Statistics Najig Uiversity of Iformatio Sciece ad Techology Najig, PR Chia
More informationHoggatt and King [lo] defined a complete sequence of natural numbers
REPRESENTATIONS OF N AS A SUM OF DISTINCT ELEMENTS FROM SPECIAL SEQUENCES DAVID A. KLARNER, Uiversity of Alberta, Edmoto, Caada 1. INTRODUCTION Let a, I deote a sequece of atural umbers which satisfies
More informationNEW FAST CONVERGENT SEQUENCES OF EULER-MASCHERONI TYPE
UPB Sci Bull, Series A, Vol 79, Iss, 207 ISSN 22-7027 NEW FAST CONVERGENT SEQUENCES OF EULER-MASCHERONI TYPE Gabriel Bercu We itroduce two ew sequeces of Euler-Mascheroi type which have fast covergece
More informationRegent College Maths Department. Further Pure 1. Proof by Induction
Reget College Maths Departmet Further Pure Proof by Iductio Further Pure Proof by Mathematical Iductio Page Further Pure Proof by iductio The Edexcel syllabus says that cadidates should be able to: (a)
More informationEstimation of Population Mean Using Co-Efficient of Variation and Median of an Auxiliary Variable
Iteratioal Joural of Probability ad Statistics 01, 1(4: 111-118 DOI: 10.593/j.ijps.010104.04 Estimatio of Populatio Mea Usig Co-Efficiet of Variatio ad Media of a Auxiliary Variable J. Subramai *, G. Kumarapadiya
More informationis also known as the general term of the sequence
Lesso : Sequeces ad Series Outlie Objectives: I ca determie whether a sequece has a patter. I ca determie whether a sequece ca be geeralized to fid a formula for the geeral term i the sequece. I ca determie
More informationBasics of Probability Theory (for Theory of Computation courses)
Basics of Probability Theory (for Theory of Computatio courses) Oded Goldreich Departmet of Computer Sciece Weizma Istitute of Sciece Rehovot, Israel. oded.goldreich@weizma.ac.il November 24, 2008 Preface.
More informationRiemann Sums y = f (x)
Riema Sums Recall that we have previously discussed the area problem I its simplest form we ca state it this way: The Area Problem Let f be a cotiuous, o-egative fuctio o the closed iterval [a, b] Fid
More informationInternal Information Representation and Processing
Iteral Iformatio Represetatio ad Processig CSCE 16 - Fudametals of Computer Sciece Dr. Awad Khalil Computer Sciece & Egieerig Departmet The America Uiversity i Cairo Decimal Number System We are used to
More informationSECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,
More informationMATH 304: MIDTERM EXAM SOLUTIONS
MATH 304: MIDTERM EXAM SOLUTIONS [The problems are each worth five poits, except for problem 8, which is worth 8 poits. Thus there are 43 possible poits.] 1. Use the Euclidea algorithm to fid the greatest
More informationInfinite Sequences and Series
Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet
More informationResearch Article Some E-J Generalized Hausdorff Matrices Not of Type M
Abstract ad Applied Aalysis Volume 2011, Article ID 527360, 5 pages doi:10.1155/2011/527360 Research Article Some E-J Geeralized Hausdorff Matrices Not of Type M T. Selmaogullari, 1 E. Savaş, 2 ad B. E.
More informationA New Method to Order Functions by Asymptotic Growth Rates Charlie Obimbo Dept. of Computing and Information Science University of Guelph
A New Method to Order Fuctios by Asymptotic Growth Rates Charlie Obimbo Dept. of Computig ad Iformatio Sciece Uiversity of Guelph ABSTRACT A ew method is described to determie the complexity classes of
More informationarxiv: v1 [math.co] 3 Feb 2013
Cotiued Fractios of Quadratic Numbers L ubomíra Balková Araka Hrušková arxiv:0.05v [math.co] Feb 0 February 5 0 Abstract I this paper we will first summarize kow results cocerig cotiued fractios. The we
More informationSolutions to Tutorial 3 (Week 4)
The Uiversity of Sydey School of Mathematics ad Statistics Solutios to Tutorial Week 4 MATH2962: Real ad Complex Aalysis Advaced Semester 1, 2017 Web Page: http://www.maths.usyd.edu.au/u/ug/im/math2962/
More informationOn values of d(n!)/m!, φ(n!)/m! and σ(n!)/m!
O values of d!/m!, φ!/m! ad σ!/m! by Daiel Baczkowski, Michael Filaseta, Floria Luca ad Ogia Trifoov 1 Itroductio I [5], the third author established that for a fixed r Q, there are oly a fiite umber of
More informationDirichlet s Theorem on Arithmetic Progressions
Dirichlet s Theorem o Arithmetic Progressios Athoy Várilly Harvard Uiversity, Cambridge, MA 0238 Itroductio Dirichlet s theorem o arithmetic progressios is a gem of umber theory. A great part of its beauty
More informationMath 113 Exam 3 Practice
Math Exam Practice Exam 4 will cover.-., 0. ad 0.. Note that eve though. was tested i exam, questios from that sectios may also be o this exam. For practice problems o., refer to the last review. This
More informationLesson 10: Limits and Continuity
www.scimsacademy.com Lesso 10: Limits ad Cotiuity SCIMS Academy 1 Limit of a fuctio The cocept of limit of a fuctio is cetral to all other cocepts i calculus (like cotiuity, derivative, defiite itegrals
More informationOscillation and Property B for Third Order Difference Equations with Advanced Arguments
Iter atioal Joural of Pure ad Applied Mathematics Volume 3 No. 0 207, 352 360 ISSN: 3-8080 (prited versio); ISSN: 34-3395 (o-lie versio) url: http://www.ijpam.eu ijpam.eu Oscillatio ad Property B for Third
More informationPROPERTIES OF THE POSITIVE INTEGERS
PROPERTIES OF THE POSITIVE ITEGERS The first itroductio to mathematics occurs at the pre-school level ad cosists of essetially coutig out the first te itegers with oe s figers. This allows the idividuals
More informationMath 113, Calculus II Winter 2007 Final Exam Solutions
Math, Calculus II Witer 7 Fial Exam Solutios (5 poits) Use the limit defiitio of the defiite itegral ad the sum formulas to compute x x + dx The check your aswer usig the Evaluatio Theorem Solutio: I this
More informationMath 609/597: Cryptography 1
Math 609/597: Cryptography 1 The Solovay-Strasse Primality Test 12 October, 1993 Burt Roseberg Revised: 6 October, 2000 1 Itroductio We describe the Solovay-Strasse primality test. There is quite a bit
More information