International Journal of Engineering Science Invention Research & Development; Vol. II Issue VIII February e-issn:
|
|
- Meryl Bridges
- 5 years ago
- Views:
Transcription
1 Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February eissn: 236 MULTIPLE ENCRYPTIONS OF VARIOUS CIPHERS A. ChadraSekhar*,1, B.Ravi Kumar 2, Ch.Pragathi 3 ad Ashok Kumar 1 Professor, 2 Assistat Professor, 3 Associate Professor, Research Scholar, Egieerig Mathematics, GITAM Uiversity, Visakhapatam, Idia 1 acs@gitam.edu, 2 ravikumarbrk6@gmail.com, 3 ch.prgathi1@gmail.com, saiashok.8@gmail.com ABSTRACT The multiple ecryptios of symmetric cryptosystems provide additioal security rather tha ormal ecryptio. Desigiig of idepedet ciphers usig mathematical models is vital i this process. I this paper we proposed two idepedet ciphers Keywords Fiboacci marix, Affie, Vigere trasformatios. I. INTRODUCTION If the th is expressed i terms of its precedig umbers (ot ecessarily all) is the recurrece relatio. Geeratig matrices out of these recurrece relatios refers to the recurrece relatio. Further such matrices order ca be exteded cosequetly. A. FIBONACCI MATRIX The Fiboacci Qmatrix [7] [8][] is the 2 1 matrix defied by Q Where Q F F 1 F F 1 1 F F 1 1 F is a Fiboacci umber. The F F 1 Iverse of 2 2, Fiboacci matrix is N Q Q B. EXTENSION OF FIBONACCI MATRIX The Q1 matrix is so formed such that its determiat is ivariat without loss of geerality to the Cassii formula which is oe of the most importat theorems of the Fiboacci umbers theory[7]. 2 Q F 1 F 1 F ( 1). Also similarly it ca be exteded to a matrix matrix ad ay order square matrix. The extesio of 3 3 Fiboacci matrix is as follows Q Q a. Affie Cipher A affie ecipherig trasformatiois C ap b mod N where the pair (a, b) is the ecryptig key ad gcd(a,n)1. If y E(x) (axb)mod26,[1]the we ca solve for x i terms of y ad so E 1 ( y) that is, if y ax b mod26 the y b axmod26 ax y b or equivaletly mod26. b. Vigere ciphere The Vigeere cipher was geerated by Giova Batista Belaso i 13[1]. This cipher uses a secret keyword to ecrypt the plaitext. First, each letter i the plaitext is coverted ito a umber.the this umerical value for each letter of the plaitext is added to theumerical value of each letter of a secret keyword to get the ciphertext.the Vigeereciphers are more powerful tha substitutio ciphers. C. PROPOSED WORK A Algorithm for multi ecryptio usig Fiboacci matrix as the first layer of ecryptio A. ChadraSekhar, B.Ravi Kumar, Ch.Pragathi ad Ashok Kumar ijesird, Vol. II Issue VIII February 216/82
2 Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February eissn: 236 ad the affie trasformatio for super ecryptio [1][8][1] II. MULTIPLE ENCRYPTION A. ENCRYPTION ALGORITHM: Step1: Alice creates plaitexts P p 1 p 2, p 3 p m Step2: Alice computes C 1 P Q ad get 1 sr ciphertext Step3:Alice computes C 2 C 1 F i for i1,2,3, m where C 2 is the compute first cipher text. Step: Alice perform super ecryptio with the Affie trasformatio E(x) (axb) mod 26, Gcd(a,N)1 ad take a ad b are secrete, from the first level ecryptio message. Step: Alice seds super ecrypted message to Bob. B. DECRYPTION ALGORITHM: Step1: Bob receives the super ecrypted message. Step2: Bob decrypts the super ecrypted 1 E y a 1 y b mod26 message by usig (P 1 ) Step3: Bob computes PP 1 1 origial plaitext message. Q to get the III. SUPER ENCYPTION OF VIGENERE CIPHER A. ENCRYPTION ALGORITHM: Step1: Alice creates plaitexts P p 1 p 2, p 3 p m Step2: Alice computes C 1 P Q ad get 1 sr ciphertext ad get 1 sr ciphertext Step3:Alice computes C 2 C 1 F i for i1,2,3, m where C 2 is the compute first cipher text. Step: Alice apply super ecryptio of vigeere trasformatio use off set rule with to the umerical value of each letter of a secret keyword to first level ecryptio message. Step: Alice seds super ecryptio message to Bob. B. DECRYPTION ALGORITHM: Step1: Bob receives the super ecryptio message. Step2: Bob decrypts with the iverse vigeere trasformatio to super ecrypted message. It is the first decryptio message P 1 Step3: Bob computes PP 1 1 origial plaitext message. Q to get the A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Fiboacci 3 3 matix Case1: For 1 F2 F1 1 we get Q F1 F Ecryptio algorithm: P R O 1 1 Step1: Let the Plai text be P S O R 1 Step2: Alice computes C 1 P Q 1 A. ChadraSekhar, B.Ravi Kumar, Ch.Pragathi ad Ashok Kumar ijesird, Vol. II Issue VIII February 216/83
3 Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February eissn: Step3: applyig affie trasformatio E(x)(axb) mod 26 for a & b X 1 1 x (x) mod Secod Ecrypted message is Y V J L K D J V Y Step: Ecrypted message C 2 is YVJLKDJVY Decryptio algorithm: Step1: First Decrypted Message is YVJLKDJVY Step2: Compute Iverse of Affie trasformatio P 1 1 E y a 1 y b mod26 Message Y V J L K D J V Y Y y (y) (y)mod First Decrypted text R G O E J S O G R R G O 6 1 First decrypted text P 1 E J S O G R 1 6 Step3: Compute PP 1 (Q 1 ) 1 to get origial message Mod Secod Decrypted message is P R O S O R Case2: For 2 F3 F we get Q F2 F Ecryptio algorithm: P R O 1 1 Step1: Let the Plai text be P S O R 1 A. ChadraSekhar, B.Ravi Kumar, Ch.Pragathi ad Ashok Kumar ijesird, Vol. II Issue VIII February 216/8
4 Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February eissn: 236 Step2: Alice computes C 1 P Q Step3: applyig affie trasformatio E(x)(axb) mod 26 for a & b 16 X x (x16) mod Secod Ecrypted message is U B I J D C U M X Step: Ecrypted message C 2 is UBIJDCUMX Decryptio algorithm: Step1: First Decrypted Message is UBIJDCUMX Step2: Compute Iverse of Affie trasformatio P 1 1 E y a 1 y b mod26 Message Y y16 21(y16) 21(y16) mod26 First Decrypted text U B I J D C U M X G W O J N S G U R G W O First decrypted text P 1 J N S 13 G U R 6 2 Step3: Compute PP 1 (Q 2 ) 1 to get origial message Mod Secod Decrypted message is P R O S O R IV. A. FIBONACCI 3 3 MATIX Case1: For 1 F2 F1 1 1 we get Q F1 F VIGENERE CIPHER B. ENCRYPTION ALGORITHM: A. ChadraSekhar, B.Ravi Kumar, Ch.Pragathi ad Ashok Kumar ijesird, Vol. II Issue VIII February 216/8
5 Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February eissn: 236 P R O 1 1 Step1: Let the Plai text be P S O R 1 Step2: Alice computes C 1 P Q Usig vigeere ciphers take key F A L S E Step3: Offset rule with the first decrypted message 1 1 Offset rule with key Mod Secod Ecryptio message is W H Z W N X O R J Step: Ecrypted message C 2 is WHZWNXORJ C. DECRYPTION ALGORITHM: Step1: First Decrypted Message is WHZWNXORJ Step2: Decrypts with the iverse of vigeere trasformatio is P Offset rule with key Mod First Decrypted text R G O E J S O G R R G O 6 1 First decrypted text P 1 E J S O V Z Step3: Compute PP 1 (Q 1 ) 1 to get origial message Mod Secod Decrypted message is P R O S O R A. ChadraSekhar, B.Ravi Kumar, Ch.Pragathi ad Ashok Kumar ijesird, Vol. II Issue VIII February 216/86
6 Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February eissn: 236 Case2: For 2 F3 F2 1 we get Q F2 F D. ENCRYPTION ALGORITHM: P R O 1 1 Step1: Let the Plai text be P S O R 1 Step2: Compute C 1 P Q Usig vigeere ciphers take key Step3: Offset rule with the first decrypted message Offset rule with key Step: Ecrypted message C 2 is LXZBRXGFJ F A L S E E. DECRYPTION ALGORITHM: Step1: First Decrypted Message is LXZBRXGFJ Step2: Decrypts with the iverse of vigeere trasformatio is P Reverse offset rule with key Mod First Decrypted text G X O J N S G U R G X O First decrypted text P 1 J N S 13 G U R 6 2 Step3: Compute P 1 (Q 2 ) 1 to get origial message P Mod Secod Ecryptio message is L X Z B R X G F J A. ChadraSekhar, B.Ravi Kumar, Ch.Pragathi ad Ashok Kumar ijesird, Vol. II Issue VIII February 216/87
7 Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February eissn: Mod Secod Decrypted message is P R O S O R V. RESULT ANALYSIS S.No First ecryptio Time for first ecryptio Super ecryptio Time for super ecryptio 1 Fiboacci matrix MILLI SEC Affie or vigeere 12 MILLI SEC VI. CONCLUSIONS The Fiboacci matrixes stads more secure, i terms of the time ad difficulty i ecodig ad decodig the message compared to the usual umber systems such as Fiboacci Lucas ad PellLucas. All the Fiboacci, Lucas ad Pell umber systems are desiged with characters i the order of additios. Whereas the Fiboacci matrix is developed with 3 multiplicatios ad additios by the order of. I view of all these reasos, this particular system is applied i this paper. REFERENCES [8] Fiboacci ad lucas umbers with applicatios thomas Khoshy ISBN: [] K.R.Sudha, A. Chadra Sekhar, P.V.G.D, Prasad Reddy, "Cryptographic Protectio Of Digital Sigal Usig some Recurrece Relatios" IJCNS, May 27, PP27. [1] Liear idepedet spaig sets ad liear trasformatios for multilevel ecryptio, A.ChadraSekhar, V.Ausha, B.Ravi Kumar, S.Ashok Kumar Vol36(21), No., PP;38. [1] A. ChadraSekhar, D. Chaya Kumari, S. Ashok Kumar "Symmetric Key Cryptosystem for Multiple Ecryptios",Iteratioal Joural of Mathematics Treds ad Techology (IJMTT). V2 (2):11 Jauary 216. ISSN: [1] A. Chadra Sekhar, Prasad Reddy. P.V.G.D, A.S.N.Murty, B.Krisha Gadhi "SelfEcryptig Data Streams Usig Graph Structures" IETECH Iteratioal Joural Of Advaced Computatios PP 7, 28, vol 2. [2] A.P.Stakhov The Golde matrices ad a ew kid of cryptography chaos, solutios ad Fractals (27) pp386. [3] A.P.Stakhov The Golde sectio ad moder harmoy mathematics. Applicatios of Fiboacci umbers,kluwer Academic publishers (18). pp333 [] A. Chadra Sekhar, K.R. Sudha ad Prasad Reddy. P.V.G.D "Data Ecryptio Techique Usig Radom Geerator" IEEE Iteratioal Coferece o Graular Computig GrC7, Nov 2, 27, Silico Valley, USA, PP 767. [] B.Krisha Gadhi, A. Chadra Sekhar ad Prasad Reddy P.V.G.D: Cryptographic Scheme for Digital sigals" INTECH Iteratioal Joural Of Advaced Computatios", Vol:2 No:, PP12,28. [6] E.H.Lock Wood, A siglelight o pascal's triagle, Math, Gazette 1(167), PP 2. [7] Fiboacci, Lucas ad Pell umbers adpascal's triagle, Thomas Khoshy, Applied Probability Trust, PP 121. A. ChadraSekhar, B.Ravi Kumar, Ch.Pragathi ad Ashok Kumar ijesird, Vol. II Issue VIII February 216/88
A Block Cipher Using Linear Congruences
Joural of Computer Sciece 3 (7): 556-560, 2007 ISSN 1549-3636 2007 Sciece Publicatios A Block Cipher Usig Liear Cogrueces 1 V.U.K. Sastry ad 2 V. Jaaki 1 Academic Affairs, Sreeidhi Istitute of Sciece &
More informationORTHOGONAL MATRIX IN CRYPTOGRAPHY
Orthogoal Matrix i Cryptography ORTHOGONAL MATRIX IN CRYPTOGRAPHY Yeray Cachó Sataa Member of CriptoRed (U.P.M.) ABSTRACT I this work is proposed a method usig orthogoal matrix trasform properties to ecrypt
More informationON THE HADAMARD PRODUCT OF BALANCING Q n B AND BALANCING Q n
TWMS J App Eg Math V5, N, 015, pp 01-07 ON THE HADAMARD PRODUCT OF ALANCING Q AND ALANCING Q MATRIX MATRIX PRASANTA KUMAR RAY 1, SUJATA SWAIN, Abstract I this paper, the matrix Q Q which is the Hadamard
More informationApplied Mathematics Letters. On the properties of Lucas numbers with binomial coefficients
Applied Mathematics Letters 3 (1 68 7 Cotets lists available at ScieceDirect Applied Mathematics Letters joural homepage: wwwelseviercom/locate/aml O the properties of Lucas umbers with biomial coefficiets
More information7. Modern Techniques. Data Encryption Standard (DES)
7. Moder Techiques. Data Ecryptio Stadard (DES) The objective of this chapter is to illustrate the priciples of moder covetioal ecryptio. For this purpose, we focus o the most widely used covetioal ecryptio
More informationCOMPLEX FACTORIZATIONS OF THE GENERALIZED FIBONACCI SEQUENCES {q n } Sang Pyo Jun
Korea J. Math. 23 2015) No. 3 pp. 371 377 http://dx.doi.org/10.11568/kjm.2015.23.3.371 COMPLEX FACTORIZATIONS OF THE GENERALIZED FIBONACCI SEQUENCES {q } Sag Pyo Ju Abstract. I this ote we cosider a geeralized
More informationSolution of Differential Equation from the Transform Technique
Iteratioal Joural of Computatioal Sciece ad Mathematics ISSN 0974-3189 Volume 3, Number 1 (2011), pp 121-125 Iteratioal Research Publicatio House http://wwwirphousecom Solutio of Differetial Equatio from
More informationOn Second Order Additive Coupled Fibonacci Sequences
MAYFEB Joural of Mathematics O Secod Order Additive Coupled Fiboacci Sequeces Shikha Bhatagar School of Studies i Mathematics Vikram Uiversity Ujjai (M P) Idia suhai_bhatagar@rediffmailcom Omprakash Sikhwal
More informationMatrix representations of Fibonacci-like sequences
NTMSCI 6, No. 4, 03-0 08 03 New Treds i Mathematical Scieces http://dx.doi.org/0.085/tmsci.09.33 Matrix represetatios of Fiboacci-like sequeces Yasemi Tasyurdu Departmet of Mathematics, Faculty of Sciece
More informationGLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES A STUDY ON THE HYPERBOLA x 9 0 S. Vidhyalakshmi, M.A. Gopala & T. Mahalakshmi*, Professor, Departmet of Mathematics, Shrimati Idira Gadhi College, Trichy-60
More informationFuzzy Shortest Path with α- Cuts
Iteratioal Joural of Mathematics Treds ad Techology (IJMTT) Volume 58 Issue 3 Jue 2018 Fuzzy Shortest Path with α- Cuts P. Sadhya Assistat Professor, Deptt. Of Mathematics, AIMAN College of Arts ad Sciece
More informationPAijpam.eu ON TENSOR PRODUCT DECOMPOSITION
Iteratioal Joural of Pure ad Applied Mathematics Volume 103 No 3 2015, 537-545 ISSN: 1311-8080 (prited versio); ISSN: 1314-3395 (o-lie versio) url: http://wwwijpameu doi: http://dxdoiorg/1012732/ijpamv103i314
More informationRecurrence Relations
Recurrece Relatios Aalysis of recursive algorithms, such as: it factorial (it ) { if (==0) retur ; else retur ( * factorial(-)); } Let t be the umber of multiplicatios eeded to calculate factorial(). The
More informationThe Binet formula, sums and representations of generalized Fibonacci p-numbers
Europea Joural of Combiatorics 9 (008) 70 7 wwwelseviercom/locate/ec The Biet formula, sums ad represetatios of geeralized Fiboacci p-umbers Emrah Kilic TOBB ETU Uiversity of Ecoomics ad Techology, Mathematics
More informationA GENERALIZATION OF THE SYMMETRY BETWEEN COMPLETE AND ELEMENTARY SYMMETRIC FUNCTIONS. Mircea Merca
Idia J Pure Appl Math 45): 75-89 February 204 c Idia Natioal Sciece Academy A GENERALIZATION OF THE SYMMETRY BETWEEN COMPLETE AND ELEMENTARY SYMMETRIC FUNCTIONS Mircea Merca Departmet of Mathematics Uiversity
More informationThe Paillier Cryptosystem
E-Votig Semiar The Paillier Cryptosystem Adreas Steffe Hochschule für Techik Rapperswil adreas.steffe@hsr.ch Adreas Steffe, 17.1.010, Paillier.pptx 1 Ageda Some mathematical properties Ecryptio ad decryptio
More informationOblivious Transfer using Elliptic Curves
Oblivious Trasfer usig Elliptic Curves bhishek Parakh Louisiaa State Uiversity, ato Rouge, L May 4, 006 bstract: This paper proposes a algorithm for oblivious trasfer usig elliptic curves lso, we preset
More informationGentry s ideal-lattice based encryption scheme. Gentry s STOC 09 paper - Part III
Getry s ideal-lattice based ecryptio scheme Getry s STOC 09 paper - Part 1 From Micciacio's paper Why ideal lattices --- as opposed to just ideals or lattices? We described a ideal-based ecryptio scheme
More informationThe Phi Power Series
The Phi Power Series I did this work i about 0 years while poderig the relatioship betwee the golde mea ad the Madelbrot set. I have fially decided to make it available from my blog at http://semresearch.wordpress.com/.
More informationA Remark on Relationship between Pell Triangle and Zeckendorf Triangle
Iteratioal Joural of Pure a Applie Mathematics Volume 9 No. 5 8 3357-3364 ISSN: 34-3395 (o-lie versio) url: http://www.acapubl.eu/hub/ http://www.acapubl.eu/hub/ A Remark o Relatioship betwee Pell Triagle
More informationON SOME DIOPHANTINE EQUATIONS RELATED TO SQUARE TRIANGULAR AND BALANCING NUMBERS
Joural of Algebra, Number Theory: Advaces ad Applicatios Volume, Number, 00, Pages 7-89 ON SOME DIOPHANTINE EQUATIONS RELATED TO SQUARE TRIANGULAR AND BALANCING NUMBERS OLCAY KARAATLI ad REFİK KESKİN Departmet
More informationOn the Jacobsthal-Lucas Numbers by Matrix Method 1
It J Cotemp Math Scieces, Vol 3, 2008, o 33, 1629-1633 O the Jacobsthal-Lucas Numbers by Matrix Method 1 Fikri Köke ad Durmuş Bozkurt Selçuk Uiversity, Faculty of Art ad Sciece Departmet of Mathematics,
More informationRecursive Algorithms. Recurrences. Recursive Algorithms Analysis
Recursive Algorithms Recurreces Computer Sciece & Egieerig 35: Discrete Mathematics Christopher M Bourke cbourke@cseuledu A recursive algorithm is oe i which objects are defied i terms of other objects
More informationOn the Number of 1-factors of Bipartite Graphs
Math Sci Lett 2 No 3 181-187 (2013) 181 Mathematical Scieces Letters A Iteratioal Joural http://dxdoiorg/1012785/msl/020306 O the Number of 1-factors of Bipartite Graphs Mehmet Akbulak 1 ad Ahmet Öteleş
More informationSolutions to Math 347 Practice Problems for the final
Solutios to Math 347 Practice Problems for the fial 1) True or False: a) There exist itegers x,y such that 50x + 76y = 6. True: the gcd of 50 ad 76 is, ad 6 is a multiple of. b) The ifiimum of a set is
More informationReview of Elementary Cryptography. For more material, see my notes of CSE 5351, available on my webpage
Review of Elemetary Cryptography For more material, see my otes of CSE 5351, available o my webpage Outlie Security (CPA, CCA, sematic security, idistiguishability) RSA ElGamal Homomorphic ecryptio 2 Two
More informationOn the Linear Complexity of Feedback Registers
O the Liear Complexity of Feedback Registers A. H. Cha M. Goresky A. Klapper Northeaster Uiversity Abstract I this paper, we study sequeces geerated by arbitrary feedback registers (ot ecessarily feedback
More informationFactoring Algorithms and Other Attacks on the RSA 1/12
Factorig Algorithms ad Other Attacks o the RSA T-79550 Cryptology Lecture 8 April 8, 008 Kaisa Nyberg Factorig Algorithms ad Other Attacks o the RSA / The Pollard p Algorithm Let B be a positive iteger
More informationTwo-step Extrapolated Newton s Method with High Efficiency Index
Jour of Adv Research i Damical & Cotrol Systems Vol. 9 No. 017 Two-step Etrapolated Newto s Method with High Efficiecy Ide V.B. Kumar Vatti Dept. of Egieerig Mathematics Adhra Uiversity Visakhapatam Idia.
More informationGAMALIEL CERDA-MORALES 1. Blanco Viel 596, Valparaíso, Chile. s: /
THE GELIN-CESÀRO IDENTITY IN SOME THIRD-ORDER JACOBSTHAL SEQUENCES arxiv:1810.08863v1 [math.co] 20 Oct 2018 GAMALIEL CERDA-MORALES 1 1 Istituto de Matemáticas Potificia Uiversidad Católica de Valparaíso
More informationVolume 3, Number 2, 2017 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):
JJEE Volume 3, Number, 07 Pages 50-58 Jorda Joural of Electrical Egieerig ISSN (Prit: 409-9600, ISSN (Olie: 409-969 Liftig Based S-Box for Scalable Bloc Cipher Desig Based o Filter Bas Saleh S. Saraireh
More informationANOTHER GENERALIZED FIBONACCI SEQUENCE 1. INTRODUCTION
ANOTHER GENERALIZED FIBONACCI SEQUENCE MARCELLUS E. WADDILL A N D LOUIS SACKS Wake Forest College, Wisto Salem, N. C., ad Uiversity of ittsburgh, ittsburgh, a. 1. INTRODUCTION Recet issues of umerous periodicals
More informationModified Logistic Maps for Cryptographic Application
Applied Mathematics, 25, 6, 773-782 Published Olie May 25 i SciRes. http://www.scirp.org/joural/am http://dx.doi.org/.4236/am.25.6573 Modified Logistic Maps for Cryptographic Applicatio Shahram Etemadi
More informationPellian sequence relationships among π, e, 2
otes o umber Theory ad Discrete Mathematics Vol. 8, 0, o., 58 6 Pellia sequece relatioships amog π, e, J. V. Leyedekkers ad A. G. Shao Faculty of Sciece, The Uiversity of Sydey Sydey, SW 006, Australia
More informationYou may work in pairs or purely individually for this assignment.
CS 04 Problem Solvig i Computer Sciece OOC Assigmet 6: Recurreces You may work i pairs or purely idividually for this assigmet. Prepare your aswers to the followig questios i a plai ASCII text file or
More informationOn Infinite Series Involving Fibonacci Numbers
Iteratioal Joural of Cotemporary Mathematical Scieces Vol. 10, 015, o. 8, 363-379 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.1988/ijcms.015.594 O Ifiite Series Ivolvig Fiboacci Numbers Robert Frotczak
More informationEnd-of-Year Contest. ERHS Math Club. May 5, 2009
Ed-of-Year Cotest ERHS Math Club May 5, 009 Problem 1: There are 9 cois. Oe is fake ad weighs a little less tha the others. Fid the fake coi by weighigs. Solutio: Separate the 9 cois ito 3 groups (A, B,
More informationPell and Lucas primes
Notes o Number Theory ad Discrete Mathematics ISSN 30 532 Vol. 2, 205, No. 3, 64 69 Pell ad Lucas primes J. V. Leyedekkers ad A. G. Shao 2 Faculty of Sciece, The Uiversity of Sydey NSW 2006, Australia
More informationComparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series
Applied Mathematical Scieces, Vol. 7, 03, o. 6, 3-337 HIKARI Ltd, www.m-hikari.com http://d.doi.org/0.988/ams.03.3430 Compariso Study of Series Approimatio ad Covergece betwee Chebyshev ad Legedre Series
More informationDefinition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University
Number Theory, Public Key Cryptography, RSA Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr The Euler Phi Function For a positive integer n, if 0
More informationReview Article Incomplete Bivariate Fibonacci and Lucas p-polynomials
Discrete Dyamics i Nature ad Society Volume 2012, Article ID 840345, 11 pages doi:10.1155/2012/840345 Review Article Icomplete Bivariate Fiboacci ad Lucas p-polyomials Dursu Tasci, 1 Mirac Ceti Firegiz,
More informationWarped, Chirp Z-Transform: Radar Signal Processing
arped, Chirp Z-Trasform: Radar Sigal Processig by Garimella Ramamurthy Report o: IIIT/TR// Cetre for Commuicatios Iteratioal Istitute of Iformatio Techology Hyderabad - 5 3, IDIA Jauary ARPED, CHIRP Z
More informationMerkle-Hellman Knapsack Cryptosystem in Undergraduate Computer Science Curriculum
Merkle-Hellma Kapsack Cryptosystem i Udergraduate Computer Sciece Curriculum Y. Kortsarts, Y. Kemper 2 Computer Sciece Departmet, Wideer Uiversity, Chester, PA, USA 2 Computer Sciece Departmet, Holo Istitute
More informationAccepted in Fibonacci Quarterly (2007) Archived in SEQUENCE BALANCING AND COBALANCING NUMBERS
Accepted i Fiboacci Quarterly (007) Archived i http://dspace.itrl.ac.i/dspace SEQUENCE BALANCING AND COBALANCING NUMBERS G. K. Pada Departmet of Mathematics Natioal Istitute of Techology Rourela 769 008
More information1/(1 -x n ) = \YJ k=0
ADVANCED PROBLEMS AND SOLUTIONS Edited by RAYMOND E.WHITNEY Lock Have State College, Lock Have, Pesylvaia Sed all commuicatios cocerig Advaced Problems ad Solutios to Eaymod E. Whitey, Mathematics Departmet,
More informationSome Trigonometric Identities Involving Fibonacci and Lucas Numbers
1 2 3 47 6 23 11 Joural of Iteger Sequeces, Vol. 12 (2009), Article 09.8.4 Some Trigoometric Idetities Ivolvig Fiboacci ad Lucas Numbers Kh. Bibak ad M. H. Shirdareh Haghighi Departmet of Mathematics Shiraz
More informationNumber of Spanning Trees of Circulant Graphs C 6n and their Applications
Joural of Mathematics ad Statistics 8 (): 4-3, 0 ISSN 549-3644 0 Sciece Publicatios Number of Spaig Trees of Circulat Graphs C ad their Applicatios Daoud, S.N. Departmet of Mathematics, Faculty of Sciece,
More informationExact Solutions for a Class of Nonlinear Singular Two-Point Boundary Value Problems: The Decomposition Method
Exact Solutios for a Class of Noliear Sigular Two-Poit Boudary Value Problems: The Decompositio Method Abd Elhalim Ebaid Departmet of Mathematics, Faculty of Sciece, Tabuk Uiversity, P O Box 741, Tabuki
More informationCSE 1400 Applied Discrete Mathematics Number Theory and Proofs
CSE 1400 Applied Discrete Mathematics Number Theory ad Proofs Departmet of Computer Scieces College of Egieerig Florida Tech Sprig 01 Problems for Number Theory Backgroud Number theory is the brach of
More information, then cv V. Differential Equations Elements of Lineaer Algebra Name: Consider the differential equation. and y2 cos( kx)
Cosider the differetial equatio y '' k y 0 has particular solutios y1 si( kx) ad y cos( kx) I geeral, ay liear combiatio of y1 ad y, cy 1 1 cy where c1, c is also a solutio to the equatio above The reaso
More informationOn the Determinants and Inverses of Skew Circulant and Skew Left Circulant Matrices with Fibonacci and Lucas Numbers
WSEAS TRANSACTIONS o MATHEMATICS Yu Gao Zhaoli Jiag Yapeg Gog O the Determiats ad Iverses of Skew Circulat ad Skew Left Circulat Matrices with Fiboacci ad Lucas Numbers YUN GAO Liyi Uiversity Departmet
More informationThe log-concavity and log-convexity properties associated to hyperpell and hyperpell-lucas sequences
Aales Mathematicae et Iformaticae 43 2014 pp. 3 12 http://ami.etf.hu The log-cocavity ad log-covexity properties associated to hyperpell ad hyperpell-lucas sequeces Moussa Ahmia ab, Hacèe Belbachir b,
More informationA generalization of Fibonacci and Lucas matrices
Discrete Applied Mathematics 56 28) 266 269 wwwelseviercom/locate/dam A geeralizatio of Fioacci ad Lucas matrices Predrag Staimirović, Jovaa Nikolov, Iva Staimirović Uiversity of Niš, Departmet of Mathematics,
More informationTRACES OF HADAMARD AND KRONECKER PRODUCTS OF MATRICES. 1. Introduction
Math Appl 6 2017, 143 150 DOI: 1013164/ma201709 TRACES OF HADAMARD AND KRONECKER PRODUCTS OF MATRICES PANKAJ KUMAR DAS ad LALIT K VASHISHT Abstract We preset some iequality/equality for traces of Hadamard
More informationBHW #13 1/ Cooper. ENGR 323 Probabilistic Analysis Beautiful Homework # 13
BHW # /5 ENGR Probabilistic Aalysis Beautiful Homework # Three differet roads feed ito a particular freeway etrace. Suppose that durig a fixed time period, the umber of cars comig from each road oto the
More informationASYMMETRIC CIPHER PROTOCOL USING DECOMPOSITION PROBLEM
Iteratioal ook Series "Iformatio Sciece ad Computig" 7 ASYETIC CIPHE POTOCO USING DECOPOSITION POE Adrius aulyaitis, Saulius Japertas Abstract: The asymmetric cipher protocol based o decompositio problem
More informationChapter 2 The Monte Carlo Method
Chapter 2 The Mote Carlo Method The Mote Carlo Method stads for a broad class of computatioal algorithms that rely o radom sampligs. It is ofte used i physical ad mathematical problems ad is most useful
More informationSOME RELATIONS ON HERMITE MATRIX POLYNOMIALS. Levent Kargin and Veli Kurt
Mathematical ad Computatioal Applicatios, Vol. 18, No. 3, pp. 33-39, 013 SOME RELATIONS ON HERMITE MATRIX POLYNOMIALS Levet Kargi ad Veli Kurt Departmet of Mathematics, Faculty Sciece, Uiversity of Adeiz
More informationApplications of Two Dimensional Fractional Mellin Transform
Iteratioal Joural of Scietific ad Iovative Mathematical Research (IJSIMR) Volume 2 Issue 9 September 2014 PP 794-799 ISSN 2347-307X (Prit) & ISSN 2347-3142 (Olie) www.arcjourals.org Applicatios of Two
More informationDECOMPOSITION METHOD FOR SOLVING A SYSTEM OF THIRD-ORDER BOUNDARY VALUE PROBLEMS. Park Road, Islamabad, Pakistan
Mathematical ad Computatioal Applicatios, Vol. 9, No. 3, pp. 30-40, 04 DECOMPOSITION METHOD FOR SOLVING A SYSTEM OF THIRD-ORDER BOUNDARY VALUE PROBLEMS Muhammad Aslam Noor, Khalida Iayat Noor ad Asif Waheed
More informationChimica Inorganica 3
himica Iorgaica Irreducible Represetatios ad haracter Tables Rather tha usig geometrical operatios, it is ofte much more coveiet to employ a ew set of group elemets which are matrices ad to make the rule
More informationFinal Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.
Final Exam Math 10: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 0 April 2002 :0 11:00 a.m. Instructions: Please be as neat as possible (use a pencil), and show
More informationTHE TRANSFORMATION MATRIX OF CHEBYSHEV IV BERNSTEIN POLYNOMIAL BASES
Joural of Mathematical Aalysis ISSN: 17-341, URL: http://iliriascom/ma Volume 7 Issue 4(16, Pages 13-19 THE TRANSFORMATION MATRIX OF CHEBYSHEV IV BERNSTEIN POLYNOMIAL BASES ABEDALLAH RABABAH, AYMAN AL
More informationSome Explicit Formulae of NAF and its Left-to-Right. Analogue Based on Booth Encoding
Vol.7, No.6 (01, pp.69-74 http://dx.doi.org/10.1457/ijsia.01.7.6.7 Some Explicit Formulae of NAF ad its Left-to-Right Aalogue Based o Booth Ecodig Dog-Guk Ha, Okyeo Yi, ad Tsuyoshi Takagi Kookmi Uiversity,
More informationThe Pascal Fibonacci numbers
Notes o Number Theory ad Discrete Mathematics Vol. 19, 013, No. 3, 5 11 The Pascal Fiboacci umbers J. V. Leyedekkers 1 ad A. G. Shao 1 Faculty of Sciece, The Uiversity of Sydey NSW 00, Australia Faculty
More informationRoger Apéry's proof that zeta(3) is irrational
Cliff Bott cliffbott@hotmail.com 11 October 2011 Roger Apéry's proof that zeta(3) is irratioal Roger Apéry developed a method for searchig for cotiued fractio represetatios of umbers that have a form such
More informationGenerating Functions for Laguerre Type Polynomials. Group Theoretic method
It. Joural of Math. Aalysis, Vol. 4, 2010, o. 48, 257-266 Geeratig Fuctios for Laguerre Type Polyomials α of Two Variables L ( xy, ) by Usig Group Theoretic method Ajay K. Shula* ad Sriata K. Meher** *Departmet
More informationPAijpam.eu ON DERIVATION OF RATIONAL SOLUTIONS OF BABBAGE S FUNCTIONAL EQUATION
Iteratioal Joural of Pure ad Applied Mathematics Volume 94 No. 204, 9-20 ISSN: 3-8080 (prited versio); ISSN: 34-3395 (o-lie versio) url: http://www.ijpam.eu doi: http://dx.doi.org/0.2732/ijpam.v94i.2 PAijpam.eu
More informationAverage Number of Real Zeros of Random Fractional Polynomial-II
Average Number of Real Zeros of Radom Fractioal Polyomial-II K Kadambavaam, PG ad Research Departmet of Mathematics, Sri Vasavi College, Erode, Tamiladu, Idia M Sudharai, Departmet of Mathematics, Velalar
More informationSeed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers
IOSR Joural of Mathematics (IOSR-JM) e-issn: 78-578, p-issn: 319-75X. Volume 1, Issue 5 Ver. VIII (Sep. - Oct.01), PP 01-07 www.iosrjourals.org Seed ad Sieve of Odd Composite Numbers with Applicatios i
More informationThomas J. Osler Mathematics Department Rowan University Glassboro, NJ Introduction
Ja 4, 007 USING THEON S LADDER TO FIND ROOTS OF QUADRATIC EQUATIONS Thomas J. Osler Mathematics Departmet Rowa Uiversit Glassboro, NJ 0808 Osler@rowa.edu. Itroductio Theo of Smra (circa 40 A. D.) described
More informationReciprocal Series of K Fibonacci Numbers with Subscripts in Linear Form
IOSR Joural of Mathematics (IOSR-JM) e-issn: 78-578 p-issn: 39-765X Volume Issue 6 Ver IV (Nov - Dec06) PP 39-43 wwwiosrjouralsorg Reciprocal Series of K iboacci Numbers with Subscripts i iear orm Sergio
More informationSolving a Nonlinear Equation Using a New Two-Step Derivative Free Iterative Methods
Applied ad Computatioal Mathematics 07; 6(6): 38-4 http://www.sciecepublishiggroup.com/j/acm doi: 0.648/j.acm.070606. ISSN: 38-5605 (Prit); ISSN: 38-563 (Olie) Solvig a Noliear Equatio Usig a New Two-Step
More informationPOWER SERIES SOLUTION OF FIRST ORDER MATRIX DIFFERENTIAL EQUATIONS
Joural of Applied Mathematics ad Computatioal Mechaics 4 3(3) 3-8 POWER SERIES SOLUION OF FIRS ORDER MARIX DIFFERENIAL EQUAIONS Staisław Kukla Izabela Zamorska Istitute of Mathematics Czestochowa Uiversity
More informationSOME NON-EXTENDABLE DIOPHANTINE TRIPLES IN SPECIAL NUMBER PATTERNS
Iteratioal Joural of Iovative Research ad Review ISSN: 347 444 (Olie A Olie Iteratioal Joural Available at http://www.cibtech.org/jirr.htm 014 Vol. (3 July-September, pp.1-7/gopala et al. SOME NON-ETENDABLE
More informationAlgebraic Solutions to Overdefined Systems with Applications to Cryptanalysis
Rose-Hulma Istitute of Techology Rose-Hulma Scholar Mathematical Scieces Techical Reports (MSTR) Mathematics -0 Algebraic Solutios to Overdefied Systems with Applicatios to Cryptaalysis Eric Crockett Rose-Hulma
More informationFormulas for the Number of Spanning Trees in a Maximal Planar Map
Applied Mathematical Scieces Vol. 5 011 o. 64 3147-3159 Formulas for the Number of Spaig Trees i a Maximal Plaar Map A. Modabish D. Lotfi ad M. El Marraki Departmet of Computer Scieces Faculty of Scieces
More informationDiscrete Orthogonal Moment Features Using Chebyshev Polynomials
Discrete Orthogoal Momet Features Usig Chebyshev Polyomials R. Mukuda, 1 S.H.Og ad P.A. Lee 3 1 Faculty of Iformatio Sciece ad Techology, Multimedia Uiversity 75450 Malacca, Malaysia. Istitute of Mathematical
More informationOn Matrices Over Semirings
Aals of Pure ad Applied Mathematics Vol. 6, No. 1, 14, 1-1 ISSN: 79-87X (P, 79-888(olie Pulished o 16 April 14 www.researchmathsci.org Aals of O Matrices Over Semirigs K. R.Chowdhury 1, Aeda Sultaa, N.K.Mitra
More informationSequences of Definite Integrals, Factorials and Double Factorials
47 6 Joural of Iteger Sequeces, Vol. 8 (5), Article 5.4.6 Sequeces of Defiite Itegrals, Factorials ad Double Factorials Thierry Daa-Picard Departmet of Applied Mathematics Jerusalem College of Techology
More informationSequences, Sums, and Products
CSCE 222 Discrete Structures for Computig Sequeces, Sums, ad Products Dr. Philip C. Ritchey Sequeces A sequece is a fuctio from a subset of the itegers to a set S. A discrete structure used to represet
More informationLecture 11: Pseudorandom functions
COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt
More informationAn Iterative Method for Solving Unsymmetric System of Fuzzy Linear Equations
The SIJ Trasactios o Computer Sciece Egieerig & its Applicatios (CSEA) Vol. No. 5 November-December 03 A Iterative Method for Solvig Usymmetric System of Fuzzy Liear Equatios Majid Hasazadeh* & Hossei
More informationFour-dimensional Vector Matrix Determinant and Inverse
I.J. Egieerig ad Maufacturig 013 30-37 Published Olie Jue 01 i MECS (http://www.mecs-press.et) DOI: 10.5815/iem.01.03.05 vailable olie at http://www.mecs-press.et/iem Four-dimesioal Vector Matrix Determiat
More informationMessage Authentication Codes. Reading: Chapter 4 of Katz & Lindell
Message Autheticatio Codes Readig: Chapter 4 of Katz & Lidell 1 Message autheticatio Bob receives a message m from Alice, he wats to ow (Data origi autheticatio) whether the message was really set by Alice.
More informationThe Adomian Polynomials and the New Modified Decomposition Method for BVPs of nonlinear ODEs
Mathematical Computatio March 015, Volume, Issue 1, PP.1 6 The Adomia Polyomials ad the New Modified Decompositio Method for BVPs of oliear ODEs Jusheg Dua # School of Scieces, Shaghai Istitute of Techology,
More informationMathematics 3 Outcome 1. Vectors (9/10 pers) Lesson, Outline, Approach etc. This is page number 13. produced for TeeJay Publishers by Tom Strang
Vectors (9/0 pers) Mathematics 3 Outcome / Revise positio vector, PQ = q p, commuicative, associative, zero vector, multiplicatio by a scalar k, compoets, magitude, uit vector, (i, j, ad k) as well as
More informationMonte Carlo Integration
Mote Carlo Itegratio I these otes we first review basic umerical itegratio methods (usig Riema approximatio ad the trapezoidal rule) ad their limitatios for evaluatig multidimesioal itegrals. Next we itroduce
More informationStatistical Properties of the Square Map Modulo a Power of Two
Statistical Properties of the Square Map Modulo a Power of Two S. M. Dehavi, A. Mahmoodi Rishakai, M. R. Mirzee Shamsabad 3, Hamidreza Maimai, Eiollah Pasha Kharazmi Uiversity, Faculty of Mathematical
More informationCALCULATION OF FIBONACCI VECTORS
CALCULATION OF FIBONACCI VECTORS Stuart D. Aderso Departmet of Physics, Ithaca College 953 Daby Road, Ithaca NY 14850, USA email: saderso@ithaca.edu ad Dai Novak Departmet of Mathematics, Ithaca College
More informationEstimation of Population Mean Using Co-Efficient of Variation and Median of an Auxiliary Variable
Iteratioal Joural of Probability ad Statistics 01, 1(4: 111-118 DOI: 10.593/j.ijps.010104.04 Estimatio of Populatio Mea Usig Co-Efficiet of Variatio ad Media of a Auxiliary Variable J. Subramai *, G. Kumarapadiya
More informationThe random version of Dvoretzky s theorem in l n
The radom versio of Dvoretzky s theorem i l Gideo Schechtma Abstract We show that with high probability a sectio of the l ball of dimesio k cε log c > 0 a uiversal costat) is ε close to a multiple of the
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 11, November 2012 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com A Digital Sigature Algorim
More informationInternational Journal of Multidisciplinary Research and Development. M.A. Gopalan, A. Kavitha, G. Thamaraiselvi
Volume:, Issue: 6, -7 Jue 015.allsubjectjoural.com e-issn: 49-418 p-issn: 49-5979 Impact Factor:.76 M.A. Gopala Professor, Departmet of Idira Gadhi College, Trichy-6000, Tamiladu, Idia. A. Kavitha Lecturer,
More informationREPRESENTING MARKOV CHAINS WITH TRANSITION DIAGRAMS
Joural o Mathematics ad Statistics, 9 (3): 49-54, 3 ISSN 549-36 3 Sciece Publicatios doi:.38/jmssp.3.49.54 Published Olie 9 (3) 3 (http://www.thescipub.com/jmss.toc) REPRESENTING MARKOV CHAINS WITH TRANSITION
More informationNumerical Solutions of Second Order Boundary Value Problems by Galerkin Residual Method on Using Legendre Polynomials
IOSR Joural of Mathematics (IOSR-JM) e-issn: 78-578, p-issn: 319-765X. Volume 11, Issue 6 Ver. IV (Nov. - Dec. 15), PP 1-11 www.iosrjourals.org Numerical Solutios of Secod Order Boudary Value Problems
More informationM 340L CS Homew ork Set 6 Solutions
1. Suppose P is ivertible ad M 34L CS Homew ork Set 6 Solutios A PBP 1. Solve for B i terms of P ad A. Sice A PBP 1, w e have 1 1 1 B P PBP P P AP ( ).. Suppose ( B C) D, w here B ad C are m matrices ad
More informationM 340L CS Homew ork Set 6 Solutions
. Suppose P is ivertible ad M 4L CS Homew ork Set 6 Solutios A PBP. Solve for B i terms of P ad A. Sice A PBP, w e have B P PBP P P AP ( ).. Suppose ( B C) D, w here B ad C are m matrices ad D is ivertible.
More informationEstimation of Backward Perturbation Bounds For Linear Least Squares Problem
dvaced Sciece ad Techology Letters Vol.53 (ITS 4), pp.47-476 http://dx.doi.org/.457/astl.4.53.96 Estimatio of Bacward Perturbatio Bouds For Liear Least Squares Problem Xixiu Li School of Natural Scieces,
More informationIn number theory we will generally be working with integers, though occasionally fractions and irrationals will come into play.
Number Theory Math 5840 otes. Sectio 1: Axioms. I umber theory we will geerally be workig with itegers, though occasioally fractios ad irratioals will come ito play. Notatio: Z deotes the set of all itegers
More information