Solving Generalized Small Inverse Problems

Size: px
Start display at page:

Download "Solving Generalized Small Inverse Problems"

Transcription

1 Solving Generalized Small Inverse Problems Noboru Kuniiro Te University of Tokyo, Japan Abstract. We introduce a generalized small inverse problem (GSIP) and present an algoritm for solving tis problem. GSIP is formulated as finding small solutions of f(x 0, x 1,..., x n ) = x 0 (x 1,..., x n ) + C = 0(mod M) for an n-variate polynomial, non-zero integers C and M. Our algoritm is based on lattice-based Coppersmit tecnique. We provide a strategy for construction of a lattice basis for solving f = 0, wic are systematically transformed from a lattice basis for solving = 0. Ten, we derive an upper bound suc tat te target problem can be solved in polynomial time in log M in an explicit form. Since GSIPs include some RSA-related problems, our algoritm is applicable to tem. For example, te small key attacks by Bone and Durfee are re-found automatically. Tis is a full version of [13]. Keywords: LLL algoritm, small inverse problem, RSA. lattice-based cryptanalysis 1 Introduction Since te seminal work of Coppersmit [3 5], many cryptanalysis ave been proposed by using is tecnique wic is based on LLL algoritm. Te first typical application is a small secret exponent attack on RSA proposed by Bone and Durfee [2]. Te second is a proof of deterministic polynomial time equivalence between computing te RSA secret key and factoring [6, 16]. In RSA [18], te small secret exponent d is commonly used to speed up te decryption or signature generation. In 1990, Wiener sowed tat wen d 1 3 N 1/4, te RSA moduli N can be factored in polynomial time [20]. Ten, in 1999, Bone and Durfee [2] improved te Wiener s bound to d N Furtermore, tey proved tat N can be factored in polynomial time wen d N In teir attack, lattice reduction algoritms suc as LLL algoritm [14] play an important role. Let us briefly describe teir attack. First, tey reduce small secret exponent attack to solving a bivariate modular equation: x(a + y) = 1 (mod e),

2 were A is a given integer and te solution (x, y) = ( x, ȳ) satisfies x < e δ and ȳ < e 1/2. Tey referred tis problem as small inverse problem. Ten, tey proposed a polynomial time algoritm for solving tis problem. Tey obtained te condition on δ suc tat te algoritm outputs te solution. Tis leads to te weaker bound: d N and te stronger bound: d N By extending teir (weaker) algoritm, Durfee and Nguyen sowed cryptanalysis on some variants of RSA wit sort secret exponent [7]. Tey proposed an algoritm for solving trivariate modular equation f(x, y, z) = x(a + y + z) + 1 = 0 (mod e) wit constraint yz = N in teir analysis. It is crucial in teir algoritm ow to andle te constraint yz = N. To do so, tey introduced so-called Durfee-Nguyen tecnique. May (and Coron-May) proved tat if te RSA secret key d is revealed, te RSA moduli N can be factored in deterministic polynomial time [6, 16]. We will focus on te Coron-May s proof [6] rater tan May s original proof [16]. Consider a univariate modular equation: (y) A + y = 0 (mod S), were S is an unknown divisor of a known positive integer U and A is a known positive integer. Tey sowed a deterministic polynomial time algoritm wic solves te equation for S U 1/2 to prove tat (balanced) RSA moduli N can be factored deterministically wen d is revealed. Tey extended teir result to te unbalanced RSA case [6]. Tey sowed te condition tat te bivariate modular equation: (y, z) A + y + z = 0 (mod S) wit constraint yz = N, were S and U are in te same setting as te balanced RSA. 1.1 Our Contribution In tis paper, we introduce generalized small inverse problem (GSIP) for an n + 1-variate equation. Let f be an n + 1-variate polynomial by f(x 0, x 1,..., x n ) = x 0 (x 1,..., x n ) + C for an n-variate polynomial and a non-zero integer C. Let M be a positive integer wose prime factors are unknown. Suppose tat te solution of f = 0 (mod M) satisfies x 0 < X 0, x 1 < X 1,..., x n < X n for fixed positive integers X 0, X 1,..., X n. Ten, one wants to find te solution: (x 0, x 1,..., x n ) = ( x 0, x 1,..., x n ). Some cases may ave constraints between variables x 1,..., x n. Wen C = 1, te problem can be viewed as follows: given a function (x 1, x 2,..., x n ), find small elements ( x 1,..., x n ) suc tat te inverse of ( x 1, x 2,..., x n ) modulo M is small. So, we call tis problem as generalized small inverse problem. Classical small 2

3 inverse problem [2] corresponds to n = 1, (x 1 ) = A + x 1 and C = 1, were A is a given integer. GSIP is not only a natural extension of classical small inverse problem, but also is applicable to many RSA-related cryptanalysis. In our paper, we are concerned wit only modular equations not integer equations. Second, we propose a polynomial time algoritm for solving tis problem. Our algoritm is based on Coppersmit s approac [3] and as te following property in te lattice basis construction: 1. First, construct a lattice basis for solving (x 1,..., x n ) = 0 (mod p), were p is an unknown divisor of known integer N. 2. Ten, construct a lattice basis for f(x 0,..., x n ) = 0 (mod M) by employing a lattice basis for. We introduce 4 restrictions for a lattice in solving = 0. Since many metods in te literature old tese restrictions, tey are not too strong restrictions. Ten, we propose a simple but effective compiler wic transforms a lattice basis for = 0 to tat for f = x 0 + C = 0 (Compiler). Our compiler works if a lattice for = 0 olds te 4 restrictions. It gives a good insigt in construction of a lattice basis for f. Our compiler is applicable to many kinds of cryptanalysis. For example, we can re-find Bone-Durfee s small secret exponent attack on RSA [2] by using our compiler and te lattice employed in te proof for deterministic polynomial time equivalence [6]. Tat is, our compiler builds a bridge between tese two works. It is te first time to point out tis kind of connection as far as we know. Our compiler is especially effective wen one needs to construct a special type of lattice. Suppose tat some variables ave constraint, ex. yz = N. In tis case, it is well known tat Durfee-Nguyen tecnique is effective [7]. If one can construct a good lattice for n-variate equation: = 0 built Durfee-Nguyen tecnique into, one as also a good lattice for n + 1-variate equation: f built Durfee- Nguyen tecnique into. In general, te more variables are involved, te arder te construction of a good lattice is. If one uses our compiler, one just constructs a lattice basis for not for f. Hence, one can more easily construct a good lattice basis for f. Next, we obtain te upper bound of te solution suc tat te equation: f(x 0, x 1,..., x n ) = 0 (mod M) is solvable in polynomial time in log M (but not in n) (Lemma 5 and Teorem 2). Tat means, letting te solution be ( x 0,..., x n ) and positive integers X 0,..., X n, wen x i < X i for eac i, one can solve te problem in polynomial time. In deriving X i, one needs not tedious computation. In particular, wen X 1,..., X n are fixed, one can easily obtain te upper bound of solution X 0. 3

4 In Bone-Durfee s [2] and Durfee-Nguyen s analyses [7], tedious computations are needed. Furtermore, teir computations are not applicable to te oter kind of attacks. We generalize tis kind of calculation to obtain te evaluation formula, wic is easy to use and covers many kind of cryptanalysis including Bone-Durfee s. Hence, we provide anoter type of toolkit for (especially RSA-related) cryptanalysis from tat of Blömer-May [1]. Our Strategies vs. General Strategies for Construction of Lattice Basis It is well known tat te sape of Newton polytope of a polynomial to be solved is important. Tis is suggested by Coppersmit [4] and fully explained by Blömer and May in te case of bivariate integer equation [1]. For general polynomials, Jocemsz and May proposed general metods for construction of optimal lattice basis [11]. Altoug teir metod is general and effective, it cannot andle constrained variables case. Actually, wen Durfee-Nguyen tecnique is involved, teir metod could not generate a good lattice. Using our compiler, Durfee-Nguyen tecnique is automatically involved in constructing te lattice for f if it is involved in te lattice for. Our compiler is especially effective for specific type of equations and is applicable to many kinds of RSA-related cryptanalysis. 1.2 Organization Section 2 gives preliminaries. In Section 3, we sow ow to solve te generalized small inverse problems. First, we introduce 4 restrictions for a lattice in solving = 0. Ten, we give a compiler wic transforms a lattice basis for (x 1,..., x n ) = 0 into tat for f(x 0, x 1,..., x n ) = x 0 (x 1,..., x n ) + C = 0. In Section 4, we evaluate te volume of lattice for f and derive te condition among upper bounds of solutions. In Section 5, we argue application of our compiler to GSIP and give details of an application: te small secret exponent attack to RSA, wic sows te effectiveness of our compiler. Section 6 concludes te paper. Some of proofs are given in Appendix A. Some of examples are given in Appendix B. 2 Preliminaries 2.1 Small Secret Exponent Attack on RSA [2] Let (N, e) be a public key in RSA cryptosystem, were N = pq is te product of two distinct primes. For simplicity, we assume tat gcd(p 4

5 1, q 1) = 2. A secret key d satisfies tat ed = 1 mod (p 1)(q 1)/2. Hence, tere exists an integer k suc tat ed+k((n +1)/2 (p+q)/2) = 1. Writing s = (p+q)/2 and A = (N +1)/2, we ave k(a+s) = 1 ( mod e). We set f(x, y) = x(a + y) + 1. If one can solve a bivariate modular equation: f(x, y) = x(a+y)+1 = 0 ( mod e), one as k and s and knows te prime factors p and q of N. Suppose tat te secret key satisfies d N δ. Furter assume tat e N. To summarize, te secret key will be recovered by finding te solution (x, y) = ( x, ȳ) of te equation: x(a + y) = 1 (mod e), were x e δ and y e 1/2. Tey referred tis as te small inverse problem. Bone and Durfee gave an algoritm for solving tis problem and obtained te condition on δ so tat te algoritm works in polynomial time. Concretely, tey sowed tat if d N 0.284, N can be factored in polynomial time. Furtermore, tey improved te bound to d N LLL Algoritm and Howgrave-Graam s Lemma For a vector b, b denotes te Euclidean norm of b. For a n-variate polynomial (x 1,..., x n ) = j1,...,j n x j 1 1 x jn n, define te norm of a polynomial as (x 1,..., x n ) = 2 j1,...,j n. Tat is, (x 1,..., x n ) denotes te Euclidean norm of te vector wic consists of coefficients of (x 1,..., x n ). Let B = {a ij } be a w w matrix of integers. Te rows of B generate a lattice L, a collection of vectors closed under addition and subtraction; in fact te rows forms a basis of L. Te lattice L is also represented as follows. Letting a i = (a i1, a i2,..., a iw ), te lattice L spanned by a 1,..., a w consists of all integral linear combinations of a 1,..., a w, tat is: L = { w i=1 n i a i n i ZZ}. Te volume of lattice is defined by vol (L) = det(b t B), were t B is a transposed matrix of B. In particular, vol (L) = det(b) if B is full-rank. LLL algoritm outputs sort vectors in te lattice L. Proposition 1 (LLL). Let B = {a ij } be a non-singular w w matrix of integers. Te rows of B generates a lattice L. Given B, te LLL algoritm outputs a reduced basis {b 1,..., b w } wit b i 2 w(w 1)/(4(w+1 i)) (vol (L)) 1/(w+1 i) in time polynomial in (w, max log 2 a ij ). Te following lemma is used wen a modular equation is reduced into integer equation. 5

6 Lemma 1 (Howgrave-Graam [8]). Let ĥ(x 1,..., x n ) ZZ[x 1,..., x n ] be a polynomial, wic is a sum of at most w monomials. Let m and φ be positive integers and X 1,..., X n be some positive integers. Suppose tat 1. ĥ( x 1,..., x n ) = 0 mod φ m, were x 1 < X 1,... x n < X n and 2. ĥ(x 1X 1,..., x n X n ) < φ m / w. Ten ĥ( x 1,..., x n ) = 0 olds over integers. 3 How to Solve Generalized Small Inverse Problem For a polynomial (x 1,..., x n ), consider te following two problems: (I) Given N(= pq), find a small solution of (x 1,..., x n ) = 0(mod p). (II) Given M, find a small solution of x 0 (x 1,..., x n ) + C = 0(mod M). Problem (II) corresponds to a generalized small inverse problem. We will sow a compiler wic transforms a lattice basis for (I) to tat for (II). 3.1 Lattice-Based Algoritm for (I) Te problem (I) can be solved by combining te LLL algoritm and Lemma 1 as follows. Let X 1,..., X n be positive integers of Lemma 1. Define a polynomial as [j1,...,j n,k](x 1,..., x n ) := x j 1 1 x jn n (x 1,..., x n ) k for non-negative integers j 1,..., j n, k. Let u be a non-negative integer. Using [j1,...,j n,k], we define a sift-polynomial (u) [j 1,...,j n,k] (x 1,..., x n ) := [j1,...,j n,k](x 1,..., x n )N u k. (1) Let a solution of = 0 (mod p) be (x 1,..., x n ) = ( x 1,..., x n ). It is easy to see tat (u) [j 1,...,j n,k] ( x 1,..., x n ) = 0 (mod p u ) for any (j 1,..., j n, k). Fix a set H (u) of [j 1,..., j n, k] for eac u. We construct a lattice L (u) spanned by a set of te coefficient vector of (u) [j 1,...,j n,k] (x 1X 1,..., x n X n ) for [j 1,..., j n, k] H (u). Ten, we apply te LLL algoritm to tis lattice. Te LLL algoritm yields small vectors of tis lattice. Finally, we can obtain polynomial ĥ satisfying te condition of Lemma 1 from tis small vector. How to coose H (u) for eac u depends on (x 1,..., x n ). 6

7 First, we define te set M( [j1,...,j n,k]) of monomials M( [j1,...,j n,k]) {x i 1 1 x i n n x i 1 1 x i n n is a monomial of [j1,...,j n,k](x 1,..., x n )}. Next, we define te set M(H (u) ) of monomials M(H (u) ) [j 1,...,j n,k] H (u) M( [j1,...,j n,k]). We will introduce 4 restrictions for a lattice in solving = 0 and consider only a set H (u) of [j 1,..., j n, k] for eac u wic olds 4 restrictions. Restriction 1 For any positive integer u, tere exist two sets A = {[j 1i,..., j ni ]} 1 i #A and B = {[j 1i,..., j ni ]} 1 i #B suc tat A B and H (u) is given by H (u) = u 1 k=0 {[j 1i,..., j ni, k]} 1 i #A {[j 1i,..., j ni, u]} 1 i #B. (2) We call (A, B) a generator. Restriction 2 For any u, L (u) is full rank. Restriction 3 A generator B is parametrized by some optimizing parameters t = (t 1,..., t k ). If needed, we use notation: B(t). Restriction 4 Te volume of L (u) does not depend on coefficients of. Tat is, it is given by vol L (u) = N γ U X γ 1 1 Xγ 2 2 Xγ n n. (3) Let w be te dimension of te lattice. Here, γ U, γ 1,..., γ n and w are functions of u and t. Moreover, eac total degree of γ U, γ 1,..., γ n and uw is 2. If needed, we use vol L (u;t), γ U (u; t), γ i (u; t) for 1 i n. Lattices derived in many previous metod [6, 9, 12, 17] olds Restrictions 1 4 as described in Table 1. Restriction 1 implies tat if [j 1,..., j n, k] H (u) and k 1, ten [j 1,..., j n, k 1] H (u 1), wic is crucial for our compiler. For convenience, we use te following notation: for a set A and k ZZ 0, a set [A, k] is defined by {[j 1,..., j n, k] [j 1,..., j n ] A}. If tis notation is used, we can rewrite Eq. (2) as H (u) = u 1 k=0 [A, k] [B, u]. 7

8 Restriction 2 implies tat #H (u) = #M(H (u) ). Te polynomial order of H (u) and monomial order of M(H (u) ) sould be adequately defined so as to be linearly ordered. Let B (u) (A, B) denote a #H(u) #H (u) square matrix, were eac row of B (u) (A, B) is te coefficient vector of (u) [j 1,...,j n,k] (x 1X 1,..., x n X n ) wen A and B is used as a generator. If A and B are clear from te context, we often omit A, B and simply write B (u). Since L(u) is full-rank, vol L (u) = det B (u). 3.2 How to Solve (II) We sow ow to solve te problem (II). First, we overview our algoritm and ten focus on Step 1-2. Input: n + 1-variate equation f(x 0, x 1,..., x n ) = x 0 (x 1,..., x n ) + C = 0 (mod M) wit small roots Output: All small roots ( x 0,..., x n ) of f(x 0, x 1,..., x n ) = 0 (mod M) Step1 Construct a lattice for f. Step1-1 Construct a lattice L (u) for or coose a generator A and B for. Step1-2 Construct a lattice L f for f by employing te lattice for L (u) or A and B. Step2 Run LLL algoritm for input L f to obtain n + 1 polynomials r 1, r 2,..., r n+1 ZZ[x 0, x 1,..., x n ] over te integers, were tey are non-zero integer combination of f [i,j1,...,j n,k](x 0 X 0, x 1 X 1,..., x n X n ) wit small coefficients. Step3 Compute a resultant for r i to obtain a univariate integer equation. Ten, solve te equation by using standard tecnique. We point out some remarks. Our algoritm cannot always guarantee to output correct solutions. So, our algoritm is euristic. We assume te following as same as [11]. Assumption 1 Te resultant computations for polynomials r i yield nonzero polynomials. Experiments are needed for specific cases to justify te assumption. We move on to te discussion of Step 1-2. Letting m be a positive integer, we define sift-polynomials for f(x 0, x 1,..., x n ) as f [i,j1,...,j n,k](x 0, x 1,..., x n ) := x i 0x j 1 1 x j n n f(x 0, x 1,..., x n ) k M m k. 8

9 Let a solution of f = 0 (mod M) be (x 0,..., x n ) = ( x 0,..., x n ). It is easy to see tat f [i,j1,...,j n,k]( x 0,..., x n ) = 0 (mod M m ) for any (i, j 1,..., j n, k). Let F be a set of indexes [i, j 1,..., j n, k]. We construct te lattice L f spanned by te coefficient vectors of f [i,j1,...,j n,k](x 0 X 0,..., x n X n ) wit [i, j 1,..., j n, k] F. How does one coose a set of indexes F? Tis is a difficult problem. Te coice of F determines te performance of te algoritm. Indeed, te volume of te lattice derived by F sould be small. Moreover, one must calculate or estimate te volume of lattice. If F is badly cosen, it migt be difficult to calculate (or even toug estimate) its volume. So, one must coose in a clever way te set F. We overcome tis problem by employing a lattice basis for solving = 0. We propose te following compiler, wic transforms a set of sift-polynomial for = 0 into tat for f = 0. In explanation, we use a notation: a set [k 1, A, k 2 ] is defined by [k 1, A, k 2 ] = {[k 1, j 1,..., j n, k 2 ] [j 1,..., j n ] A}. Compiler Fix a positive integer m. By using generators A and B for = 0, we construct a set F of sift-polynomials as follows. First, we set Ten, we set F (u) u 1 k=0 [u k, A, k] [0, B, u]. { m m u 1 } F F (u) = [u k, A, k] [0, B, u]. u=0 u=0 k=0 F is explicitly given by { m u 1 } F = {[u k, j 1i,..., j ni, k]} 1 i #A {[0, j1i,..., jni, u]} 1 i #B. u=0 k=0 Obviously, #F (u) = #H (u). If we define polynomial and monomial orders as follows, te polynomial set F and te monomial order are linearly ordered. monomial order: We define as x u 0 xj 1 1 x j n n x u 0 xj 1 1 x j n n if { u < u or u = u and x j 1 1 x j n n x j 1 1 x j n n in M(H (u) ). 9

10 polynomial order We define as [i, j 1,..., j n, k] [i, j 1,..., j n, k ] if { i + k < i + k or i + k = i + k and [j 1,..., j n, k] [j 1,..., j n, k ] in H (i+k) Informally, letting f F (u ) and f F (u ), f f if u < u. Teorem 1. Suppose tat F is set by our Compiler and H (u) olding 4 restrictions. Let B be a matrix, were eac row of B is te coefficient vectors of f [u k,j1,...,j n,k](x 0 X 0,..., x n X n ) according to te order of F. Ten, te matrix B is square and blocked lower triangular. For Teorem 1, B is written as B 0 0 B 1 B =...., * B m were eac B u is a #H (u) #H (u) matrix for 0 u m. Note tat B u corresponds to #H (u) polynomials {f [i,j1,...,j n,k] [i, j 1,..., j n, k] F (u) } and #H (u) monomials wic are divisible by x u 0. Te determinant of B is simply given by det B = det B 0 det B 1 det B m. Te application to small secret exponent attack will be given in Section 5.1. Oter examples are given in Section 5 and Appendix B. 3.3 Proof of Teorem 1 We define te set of monomials as M(f [u k,j1,...,j n,k]) {x i 0 0 x i 1 1 x i n n x i 0 0 x i 1 1 x i n n and M(F (u) ) J F (u) M(f J ). is a monomial of f [u k,j1,...,j n,k]} We use te notation: x i 0 0 M {x i 0 0 x i 1 1 x in n x i 1 1 x in n M} for M = {x i 1 1 x in n }. First, we sow te following two lemmas. Lemma 2. If [u k, j 1,..., j n, k] F for k 1,it olds tat M(f [u k,j1,...,j n,k 1]) M(f [u k,j1,...,j n,k]). Furtermore, it olds tat for k 1, M(f [u k,j1,...,j n,k])\m(f [u k,j1,...,j n,k 1]) = x u 0 {xi 1 1 x i n n x i 1 1 x i n n is a monomial of [j1,...,j n,k]}. 10

11 Lemma 3. It olds tat Furtermore, it olds tat M(F (0) ) M(F (1) ) M(F (m) ). M(F (u) ) \ M(F (u 1) ) = x u 0M(H (u) ). Proof (of Lemma 2). For k 1, if [u k, j 1,..., j n, k] F (u), ten [u k, j 1,..., j n, k 1] F (u 1). Te expansion of f [u k,j1,...,j n,k](x 0, x 1,..., x n ) is given by f [u k,j1,...,j n,k](x 0, x 1,..., x n ) = x u k ( ) k k = x u 0 [j1,...,j n,k]m m k + i i=1 0 x j 1 1 x j n n (x 0 + C) k M m k C i M m k x u i 0 [j1,...,j n,k i]. Te expansion of f [u k,j1,...,j n,k 1](x 0, x 1,..., x n ) is given by f [u k,j1,...,j n,k 1](x 0, x 1,..., x n ) = x u k+1 Ten, we ave te lemma. = 0 x j 1 ) k i=1 ( k 1 i 1 1 x j n n (x 0 + C) k 1 M m k+1 C i 1 M m k+1 x u i 0 [j1,...,j n,k i]. For Lemma 3, te number of monomials firstly appearing in F (u) is #(M(F (u) )\M(F (u 1) )) = #M(H (u) ). For te construction of our Compiler, te number of polynomials in F (u) is #F (u) = #H (u). Restriction 2 implies tat #H (u) = #M(H (u) ). Ten, #(M(F (u) ) \ M(F (u 1) )) = #F (u). Tis implies tat B is blocked lower triangular. 3.4 Small Example of our Compiler We sow a small example wic sows ow our Compiler works. Let (y) be a univariate monic polynomial wit degree 1: (y) = A+y. In tis case, a target equation is f(x, y) = x(y) + C = x(a + y) + C = 0 (mod M). Let (u) [j,k] (y) := yj (y) k N u k. Suppose tat we use a generator A = {[0]} and B = {[0], [1], [2]}. Ten, H (0) = {[0, 0], [1, 0], [2, 0]} and H (1) = {[0, 0], [0, 1], [1, 1], [2, 1]}. Corresponding matrixes B (0) and B (1) are given as follows. B (0) = 1 y y 2 (0) (= 1) [0,0] (0), B (= Y y) 0 Y 0 [1,0] (0) [2,0] (= Y 2 y 2 ) 0 0 Y 2 (1) = 11 1 y y 2 y 3 (1) (= N) [0,0] N (= A + Y y) A Y 0 0 (1) [0,1] (1) [1,1] (= AY y + Y 2 y 2 ) 0 AY Y 2 0 (1) [2,1] (= AY 2 y 2 + Y 3 y 3 ) 0 0 AY 2 Y 3

12 For example, M( [1,1] ) = {y, y 2 } and M(H (1) ) = {1, y, y 2, y 3 }. For a positive integer m, let f [i,j,k] (x, y) := x i y j f(x, y) k M m k. In te example, we fix m = 1. Applying our compiler, we obtain F of f [i,j,k] for solving f(x, y) = x(y) + C = 0 (mod M) as follows: F = {[0, 0, 0], [0, 1, 0], [0, 2, 0], [1, 0, 0], [0, 0, 1], [0, 1, 1], [0, 2, 1]}. A matrix B generated by F is given as follows. B = 1 y y 2 x xy xy 2 xy 3 f [0,0,0] (= M) M f [0,1,0] (= Y My) 0 Y M f [0,2,0] (= Y 2 My 2 ) 0 0 Y 2 M f [1,0,0] (= XMx) XM f [0,0,1] (= C + AXx + XY xy) C 0 0 AX XY 0 0 f [0,1,1] (= CY y + AXY xy + XY 2 xy 2 ) 0 CY 0 0 AXY XY 2 0 f [0,2,1] (= CY 2 y 2 + AXY 2 xy 2 + XY 3 xy 3 ) 0 0 CY AXY 2 XY 3 Columns and rows are ordered by polynomial and monomial orders in F. Te determinant of B is given by te product of diagonal elements. So, det B = M 4 X 4 Y 9. 4 Deriving a Condition for Solving GSIP In te previous section, we sow ow to coose a set F. Te next ting to do is evaluation of a volume of te lattice L f or te determinant of te corresponding matrix B. Ten, we will derive te condition for solving te problem by combining te value of determinant and Lemma 1. First, we derive a determinant of matrix B (or a volume of L f ) obtained by our compiler. Lemma 4. Let B (u;t) be te corresponding matrix for and w(u; t) be te dimension of te lattice. Ten, te determinant of B derived by our Compiler is given by ( ) m det B = M mw X0 u=0 uw(u;t) m det B (u;t) (M), (4) M u=0 were W (= m u=0 w(u; t)) is te rank of B. Next, we derive a condition tat we can find all solutions of f = 0 (mod M). 12

13 Lemma 5. Suppose tat te determinant of B (u;t) is given as te same as Lemma 4. Under Assumption 1, we can find all solutions of te equation f = 0 (mod M) wit x 0 < X 0, x 1 < X 1,..., x n < X n if m u=0 ( ) det B (u;t) M uw(u;t) (M) < = X0 m u=0 ( M X 0 Te time complexity is polynomial in log M and 2 n. ) uw(u;t). (5) In case of Maximizing X 0 In many cryptanalysis, all te task is to maximize X 0 for fixed X 1, X 2,..., X n. Hereafter, we focus on tis situation. We introduce an operator: I : m k 1 k+1 mk+1. Obviously, te operator I is omomorpic. Hence, we can write m u=0 uw(u; t) = I(mw(m; t)) and m u=0 γ i (u; t) = I(γ i (m; t)). We rewrite Eq. (5) by using te operator I as: (X 0 /M) I(mw(m;t)) < M I(γ U (m;t)) X I(γ 1(m;t) 1 X I(γ n(m;t)) n. Hence, we ave X 0 < M/(M I(γ U (m;t)) X I(γ 1(m;t) 1 X I(γ n(m;t)) n ) 1/I(mw(m;t)). Let A i be a fixed positive number suc tat X i = M A i for 1 i n. We can simplify te above as X 0 < M/M (I(γ n U (m;t))+ Setting l(m; t) I(γ U(m; t)) + n i=1 A i I(γ i (m; t)) I(mw(m; t)) i=1 A ii(γ i (m;t)))/i(mw(m;t)). = I(γ U(m; t) + n i=1 A i γ i (m; t)), (6) I(mw(m; t)) we ave X 0 < M 1 l(m;t). Te next ting to do is to obtain t minimizing l(m; t) for fixed m. Te values t minimizing l(m; t) is given by solving simultaneous equations: l(m; t) l(m; t) l(m; t) = = = = 0. t 1 t 2 t k Let t be te solution of te above equations if it exists. If we ignore small terms 1, eac I(γ U (m; t)), I(γ 1 (m; t)),... I(γ n (m; t)), I(mw(m; t))) consists of one term wit te same total degree 3. Hence, eac element 1 If we don t ignore te small term, we can obtain te optimal value of m. But, we need tedious computation in general. For small secret exponent attack case, Bone-Durfee gave te details analysis [2]. 13

14 t i of t is represented by t i = τ i m for positive integers τ i s. Letting τ = (τ 1,..., τ n), we ave te condition for X 0 : X 0 max M 1 l(m;t) = M 1 min t l(m;t) = M 1 l(m;mτ ), (7) t wic does not depend on m. Next, we will analyze te most simple case, tat is, B is parametrized by one parameter. In tis case, we ave an explicit formula of te upper bound of X 0. Teorem 2. Suppose tat a lattice for = 0 olds Restrictions 1 4 olds and B is parametrized by one parameter t. For given positive integers A 1,..., A n, we set a 2 m 2 + a 1 mt + a 0 t 2 γ U (m; t) + n i=1 A i γ i (m; t) and w(m; t) = b 2 m + b 1 t. Suppose tat a 1 b 2 < a 2 b 1. Under Assumption 1, we can find all solutions of equation: f = 0 (mod M) wit x 0 < X 0, x 1 < M A 1,..., x n < M A n if X 0 < M 1 4a 0 c b a 1 1 b 1, were c = ( 4a 2 0 b2 2 3a 0a 1 b 1 b 2 + 3a 0 a 2 b 2 1 2a 0b 2 )/(3a 0 b 1 ). In particular, if b 1 = b 2, we simply ave te condition as X 0 < M 1 4 4a 2 0 3a 0 a 1 +3a 0 a 2 8a 0 +3a 1 3b 1. (8) Time complexity is in polynomial in log M and 2 n. Remark 1. Eqs. (5) and (8) do not depend on te constant C. 5 Application of our Compiler to RSA-Related Cryptanalysis We sow several examples of GSIP and argue applications of our compiler to tem. Table 1 summarizes some example of GSIP in te literature. Constraint sows wat kind of constraint variables ave in bot of solving f = 0 and = 0. A and B sow wat kind of generators we use in bot of solving f = 0 and = 0. We give more explanation for eac cases and give details of Case 1. More examples are given in Appendix B. Case 1 Consider te small secret exponent attack on RSA by Bone and Durfee [2]. In teir attack, tey andled f(x, y) = x(y + A) + 1 = 0 (mod e). Hence, tis problem corresponds to (y) = y + A and C = 1. By using our compiler, te lattice basis for f(x) = 0 is automatically obtained. Ten, one can easily obtain te bound: d N We ll discuss te details later. 14

15 Table 1. Examples of GSIP Case 1 Case 1 Case 2 Case 3 Bone-Durfee [2] May [15] Durfee-Nguyen [7] Ito et al. [10] f = x + C x(a + y) + 1 x(y N) + N x(a + y + z) + 1 x(y 1)(z 1) + 1 Constraint - - yz = N y r z = N Howgrave-Graam [9] Coron-May [6] Kuniiro-Kurosawa [12] y + A y N A + y + z (y 1)(z 1) A {[0]} {[0, 0], [1, 0]} {[0, 0], [1, 0]} r 1 {[i, 1]} i=1 B t i=0{[i]} t 1 i=0 {[i, 0]} t 2 j=1 t 1 i=0 {[i, 0]} r 1 t2 {[k, j]} k=0 j=1 Case 1 Consider te small CRT exponent attack on unbalanced RSA by May [15]. In is attack, e andled f(x, y) = x(y N) + N = 0 (mod e). Hence, tis problem corresponds to (y) = y N and C = N. By using our compiler, te lattice basis for f(x) = 0 is automatically obtained. Furtermore, one can easily obtain te bound d p e 1 2( β 2 +3β+β)/3, were q < e β. Case 2 Consider cryptanalysis on some variants of RSA wit small secret exponent by Durfee-Nguyen [7]. In teir attack, tey andled te trivariate modular equation: f(x, y, z) = x(a+y +z)+1 = 0 ( mod e) wit constraint yz = N. Hence, tis problem corresponds to (y, z) = A + y + z and C = 1. By using our compiler, te lattice basis for Durfee-Nguyen s attack is automatically obtained. Case 3 Consider te small secret exponent attacks on Takagi s variant of RSA [19] by Ito et al. [10]. Tis attack can be obtained by our compiler and a lattice basis used in proving a deterministic polynomial equivalence between factoring and computing te secret exponent in tat sceme [12]. Note tat since Durfee-Nguyen tecnique is adequately involved in a lattice basis for, we can easily obtain tat for f. One can easily obtain te bound: d < N (7 2 7)/3(r+1). 5.1 Case 1: Transforming Howgrave-Graam s Lattice Basis to Bone-Durfee s Lattice Basis Next, we move on to an actual cryptanalysis. We sow tat our compiler builds a bridge between a lattice basis in [9] and tat in [2]. We simply write x, y, X, Y instead of x 0, x 1, X 0 and X 1. 15

16 Howgrave-Graam [9] provided an algoritm 2 for solving (y) = A + y = 0 (mod S) for integers A and S, wic is an unknown divisor of an known integer U. Set sift-polynomials as (u) [j,k] (y) := [j,k]n u k = y j (y) k N u k. In is paper, e cose te set of te indexes of siftpolynomials as H (u) = u 1 k=0 {[0, k]} t i=0 {[i, u]}. We set a polynomial order by tis. Note tat a generator is given by A = {[0]} and B = t i=0 {[i]}. Hence, H (u) olds Restrictions 1 3. Let f(x, y) = x(a + y) + 1. We argue a lattice basis construction for f. Since f(x, y) = x(y) + 1, we can employ our Compiler to construct a lattice basis for f. For a positive integer m, we define sift-polynomials for f as f [i,j,k] (x, y) = x i y j f(x, y) k M m k. By our Compiler and Howgrave- Graam s lattice basis, we ave a set F as { m u 1 } t F = {[u k, 0, k]} {[0, i, u]} u=0 k=0 i=0 for fixed t. We ave explicitly F = {[0, 0, 0], [0, 1, 0],..., [0, t, 0], [1, 0, 0], [0, 0, 1], [0, 1, 1],..., [0, t, 1], [m, 0, 0], [m 1, 0, 1],..., [0, 0, m], [0, 1, m], [0, 2, m],..., [0, t, m]}. As you can easily verify, Bone-Durfee s set of sift-polynomials [2] and ours are completely te same as a set (but, a polynomial order is different). Ten, tey are te same as a lattice basis. So, we obtain te same lattice wit Bone-Durfee s by using our compiler and Howgrave-Graam s lattice basis [9]. Next, according to te discussion in Section 4, we will re-derive te bound of te secret key d. In [6], γ U and γ Y are given as γ U (u; t) = u(u+1)/2 and γ Y (u; t) = (u+t)(u+t+1)/2. And, te dimension is given by w(u; t) = u + t + 1 and A Y = log e Y = 1/2. In tis case, we can obtain te same bound very easily. Since deg(γ U (u; t)) = deg(γ Y (u; t)) = 2 and deg(w(u; t)) = 1, Restriction 4 olds. Ten, we can use Teorem 2. By ignoring small terms, we ave a 0 = 1/4, a 1 = 1/2, a 2 = 3/4, b 1 = b 2 = 1. By plugging tese values into Eq. (8), one can easily obtain te bound X < e = e (7 2 7)/6 N 0.284, wic is exactly same as te Bone-Durfee s weaker bound. 2 By employing is algoritm, Coron and May gave te deterministic polynomial time algoritm for factoring te RSA modulus under te condition tat te secret key d is given [6]. 16

17 5.2 Case 1 By using te same lattice basis as Case1, we re-derive te small CRTexponent attack [15]. By just replacing A Y = β, we can derive te condition: d p < e 1 2( β 2 +3β+β)/3, were q < e β. 6 Concluding Remarks and Open Problems We note tat our conversion is not enoug. As sown in Sec. 5.1, our approac just acieves te Bone-Durfee s weaker bound. We need more analysis to acieve te stronger bound: d N Actually, Bone and Durfee [2] deleted some bad lattice bases and introduced te concept Geometrically Progressive Matrix to evaluate te upper bound of te determinant of te lattice. By tese efforts, tey acieved te stronger bound d N We need to develop a general teory including suc an improvement. Acknowledgement Te autor tanks Kaoru Kurosawa for elpful discussions. References 1. J. Blömer and A. May, A Tool Kit for Finding Small Roots of Bivariate Polynomials over te Integers, in Proc. of Eurocrypt2005, LNCS 3494, pp , D.Bone and G.Durfee, Cryptanalysis of RSA wit private key d less tan N 0.292, IEEE Transactions on Information Teory 46(4): 1339 (2000). (Firstly appeared in Eurocrypt 99). 3. D. Coppersmit, Finding a Small Root of a Univariate Modular Equation, in Proc. of Eurocrypt 96, LNCS 1070, pp , D. Coppersmit, Finding a Small Root of a Bivariate Integer Equation; Factoring wit Hig Bits Known, in Proc. of Eurocrypt 96, LNCS 1070, pp , D. Coppersmit, Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities, J. Cryptology 10(4): , J.S. Coron and A.May, Deterministic Polynomial Time Equivalence of Computing te RSA Secret Key and Factoring, Journal of Cryptology, Vol. 20, No. 1, pp , (IACR eprint Arcive: Report 2004/208, 2004.) 7. G. Durfee and P. Nguyen, Cryptanalysis of te RSA Scemes wit Sort Secret Exponent from Asiacrypt 99, in Proc. of Asiacrypt2000, LNCS 1976, pp , N. Howgrave-Graam, Finding Small Roots of Univariate Modular Equations Revisited, IMA Int. Conf., pp (1997) 9. N. Howgrave-Graam, Approximate Integer Common Divisors, in Proc. of Cryptograpy and Lattice Conference (CaLC2001), LNCS 2146, pp ,

18 10. K. Ito, N. Kuniiro and K. Kurosawa, Small Secret Key Attack on a Variant of RSA (due to Takagi), In Proc. of CT-RSA2008, LNCS4964, pp , E. Jocemsz and A. May, A Strategy for Finding Roots of Multivariate Polynomials wit New Applications in Attacking RSA Variants, In Proc. of Asiacrypt2006, LNCS4284, pp , N. Kuniiro and K. Kurosawa, Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi s RSA, In Proc. of PKC2007, LNCS4450, pp , N. Kuniiro, Solving Generalized Small Inverse Problems, to appear in Proc. of ACISP A.K. Lenstra, H.W. Lenstra, L. Lovász, Factoring polynomials wit rational coefficients, Matematisce Annalen 261, pp , A. May, Cryptanalysis of Unbalanced RSA wit Small CRT-Exponent, in Proc. of Crypto2002, LNCS 2442, pp , A. May, Computing te RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring, in Proc. of Crypto2004, LNCS 3152, pp , A. May, Capter3.2 Te univariate case, in New RSA Vulnerabilities Using Lattice Reduction Metods, P.D tesis, University of Paderborn, R. Rivest, A. Samir and L. Adleman, A Metod for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of te ACM, vol. 21(2), pp , T. Takagi, Fast RSA-Type Cryptosystem Modulo p k q, in Proc. of Crypto 98, LNCS 1462, pp , M. Wiener, Cryptanalysis of Sort RSA Secret Exponents, IEEE Transactions on Information Teory, Vol. 36, pp , A Proofs A.1 Proof of Lemma 4 Te determinant of te submatrix B u is given by ( ) uw det B u = M (m u)w X0 uw det B (u) (M) = M mw X0 det B (u) M (M). Since te determinant det B for f is given by det B = m u=0 det B u, we ave te lemma. A.2 Proof of Lemma 5 For Lemma 1, if te norm of b n+1 is less tan M m / w, we can reduce te modular equations into integer equations. Combining Proposition 1, tis condition can be transformed into det B < M mw /γ, (9) 18

19 were γ is a constant. Since tis term is negligible compared to M mw, we can ignore tis term. By substituting Eq. (4) into Eq. (9), we ave m (X 0 /M) uw(u) < (det B (u) (M)) 1. (10) u=0 It is important tat M mw in bot and sides are canceled. By transforming tis inequality, we ave te above condition. A.3 Proof of Teorem 2 Te function l(m; t) is given by By replacing x = t/m, we ave l(m; t) = a 0mt 2 + a 1 m 2 t/2 + a 2 m 3 /3 b 1 m 2 t/2 + b 2 m 3. (11) /3 l(x) l(m; mx) = 6a 0x 2 + 3a 1 x + 2a 2 3b 1 x + 2b 2. Te value x minimizing l(x) satisfies 3a 0 b 1 x 2 +4a 0 b 2 x+(a 1 b 2 a 2 b 1 ) = 0. If a 1 b 2 a 2 b 1 < 0, tis equation as a positive solution. By solving te above equation, we ave 4a 2 0 x = b2 2 3a 0a 1 b 1 b 2 + 3a 0 a 2 b 2 1 2a 0b 2. 3a 0 b 1 Letting tis value c and plugging c into Eq. (7), we ave te following condition for X 0 : log M X 0 < 1 4a 0 c a 1. b 1 b 1 In particular, if b 1 = b 2, we ave simply 4a 2 c 0 = 3a 0a 1 + 3a 0 a 2 2 3a 0 3. B More Examples B.1 Application to Coron-May s Lattice Basis to Durfee-Nguyen s Lattice basis In tis subsection, we simply write x, y, z, X, Y, Z instead of x 0, x 1, x 2, X 0, X 1 and X 2. 19

20 Coron and May gave te deterministic polynomial time algoritm for factoring te unbalanced RSA modulus under te condition tat te secret key d is given [6]. In te proof, tey provided an algoritm for solving (y, z) = A + y + z = 0 (mod S) for integers A and S, wic is an unknown divisor of an known integer U. Note tat y and z ave relation: yz = N. Set sift-polynomials as (u) [j,k,l] (y, z) := [j,k,l]n u l = y j z k (y, z) l N u l. In teir paper, tey cose te set of te indexes of sift-polynomials as H (u) = u 1 k=0 {[0, 0, k] [1, 0, k]} Note tat a generator is given by t 1 i 1 =0 {[i 1, 0, u]} A = {[0, 0], [1, 0]} and B = t 1 i1 =0 {[i 1, 0]} t 2 i 2 =0 t 2 i 2 =1 {[0, i 2, u]}. {[0, i 2 ]}. Hence, H (u) olds Restrictions 1 3. Let f(x, y, z) = x(a+y+z)+1 wit constraint yz = N. We argue a lattice basis construction for f. Since f(x, y, z) = x(y, z)+1, we can employ our Compiler to construct a lattice basis for f. For a positive integer m, we define sift-polynomials for f as f [i,j,k,l] (x, y) := x i y j z l f(x, y, z) l M m l. By our Compiler and Coron-May s lattice basis, we ave a set F as m u 1 t 1 t 2 F = {[u k, 0, 0, k] [u k, 1, 0, k]} {[0, i 1, 0, u]} {[0, 0, i 2, u]} u=0 k=0 i 1 =0 i 2 =0 for fixed t 1 and t 2. As you can easily verify, Durfee-Nguyen s set of siftpolynomials [7] and ours are completely te same as a set. Ten, tey are te same as a lattice basis. So, we obtain te same lattice wit Bone- Durfee s by using our compiler and Coron-May s lattice basis [6]. B.2 Application to Kuniiro-Kurosawa s Lattice Basis to Ito et al. s Lattice basis In tis subsection, we simply write x, y, z, X, Y, Z instead of x 0, x 1, x 2, X 0, X 1 and X 2. Kuniiro and Kurosawa gave te deterministic polynomial time algoritm for factoring te RSA modulus for te Takagi s variant of RSA under te condition tat te secret key d is given [12]. In te proof, tey provided an algoritm for solving (y, z) = (y 1)(z 1) = 0 (mod S) 20

21 for an integers, wic is an unknown divisor of an known integer U. Note tat y and z ave relation: y r z = N. Set sift-polynomials as (u) [j,k,l] (y, z) := [j,k,l]n u l = y j z k (y, z) l N u l. In teir paper, tey cose te set of te indexes of sift-polynomials as H (u) = u 1 k=0 t 1 { } r 1 [0, 0, k] [1, 0, k] {[i, 1, k]} i 1 =0 {[i 1, 0, u]} Note tat a generator is given by r 1 i=1 t 2 i 3 =0 i 2 =1 {[i 3, i 2, u]}. r 1 A = {[0, 0], [1, 0]} {[i, 1]} and B = t 1 i1 =0 {[i 1, 0]} i=1 r 1 t 2 i 3 =0 i 2 =1 {[i 3, i 2 ]}. Hence, H (u) olds Restrictions 1 3. Let f(x, y, z) = x(y 1)(z 1) + 1 wit constraint y r z = N. We argue a lattice basis construction for f. Since f(x, y, z) = x(y, z) + 1, we can employ our Compiler to construct a lattice basis for f. For a positive integer m, we define sift-polynomials for f as f [i,j,k,l] (x, y) := x i y j z l f(x, y, z) l M m l. By our Compiler and Kuniiro-Kurosawa s lattice basis, we ave a set F as F (u) = u 1 k=0 t 1 { } r 1 [u k, 0, 0, k] [u k, 1, 0, k] {[u k, i, 1, k]} i 1 =0 {[0, i 1, 0, u]} r 1 t 2 i 3 =0 i 2 =1 i=1 {[0, i 3, i 2, u]}. and m F = F (u) u=0 for fixed t 1 and t 2. As you can easily verify, Ito et. al s set of siftpolynomials [10] for weaker bound: d N (0.568/(r+1)) and ours are completely te same as a set. Ten, tey are te same as a lattice basis. So, we obtain te same lattice wit Ito et al. s by using our compiler and Kuniiro-Kurosawa s lattice basis [12]. 21

22 B.3 Analysis for Non-linear (y) May [17] extended te Howgrave-Graam s result [9] to analyze te case for univariate polynomial wit iger-degree. By using May s lattice basis, we analyze te case for te equation f(x, y) = x(y) + C = 0 (mod M), were is a univariate monic polynomial wit degree κ 1 and C is a non-zero integer. May [17] gave te set of indexes in te explicit form. A generator for is given by A = i=0 κ 1 {[i]} and B = t i=1 {[i]}. Te determinant of B (u) by det B (u) = N κu(u+1)/2 Y w(w 1)/2, were w = κu + t. By te similar analysis in Section 4, we ave X < M 1 2 (βκ) 2 +3βκ βκ 3, were β = log M Y. Letting M = e, β = 1/2 and κ = 1, one as again te Bone-Durfee s weaker bound: δ < (7 2 7)/6. 22

Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi s RSA

Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi s RSA Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi s RSA Noboru Kunihiro 1 and Kaoru Kurosawa 2 1 The University of Electro-Communications, Japan kunihiro@iceuecacjp

More information

A Unified Framework for Small Secret Exponent Attack on RSA

A Unified Framework for Small Secret Exponent Attack on RSA A Unified Framework for Small Secret Exponent Attack on RSA Noboru Kunihiro 1, Naoyuki Shinohara 2, and Tetsuya Izu 3 1 The University of Tokyo, Japan kunihiro@k.u-tokyo.ac.jp 2 NICT, Japan 3 Fujitsu Labs,

More information

A new attack on RSA with a composed decryption exponent

A new attack on RSA with a composed decryption exponent A new attack on RSA with a composed decryption exponent Abderrahmane Nitaj and Mohamed Ould Douh,2 Laboratoire de Mathématiques Nicolas Oresme Université de Caen, Basse Normandie, France abderrahmane.nitaj@unicaen.fr

More information

Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring

Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring Jean-Sébastien Coron and Alexander May Gemplus Card International 34 rue Guynemer, 92447 Issy-les-Moulineaux, France

More information

A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT

A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT Abderrahmane Nitaj 1 and Mohamed Ould Douh 1,2 1 Laboratoire de Mathématiques Nicolas Oresme, Université de Caen, Basse Normandie, France Université

More information

New attacks on RSA with Moduli N = p r q

New attacks on RSA with Moduli N = p r q New attacks on RSA with Moduli N = p r q Abderrahmane Nitaj 1 and Tajjeeddine Rachidi 2 1 Laboratoire de Mathématiques Nicolas Oresme Université de Caen Basse Normandie, France abderrahmane.nitaj@unicaen.fr

More information

How to Generalize RSA Cryptanalyses

How to Generalize RSA Cryptanalyses How to Generalize RSA Cryptanalyses Atsushi Takayasu and Noboru Kunihiro The University of Tokyo, Japan AIST, Japan {a-takayasu@it., kunihiro@}k.u-tokyo.ac.jp Abstract. Recently, the security of RSA variants

More information

Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring

Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring Alexander May Faculty of Computer Science, Electrical Engineering and Mathematics University of Paderborn 33102 Paderborn,

More information

Cryptanalysis of Unbalanced RSA with Small CRT-Exponent

Cryptanalysis of Unbalanced RSA with Small CRT-Exponent Cryptanalysis of Unbalanced RSA with Small CRT-Exponent Alexander May Department of Mathematics and Computer Science University of Paderborn 3310 Paderborn, Germany alexx@uni-paderborn.de Abstract. We

More information

Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?

Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? Alexander May, Maike Ritzenhofen Faculty of Mathematics Ruhr-Universität Bochum, 44780 Bochum,

More information

Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound

Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound Atsushi Takayasu and Noboru Kunihiro May 25, 2018 Abstract Thus far, several lattice-based algorithms for partial key exposure attacks

More information

Cryptanalysis of RSA with Small Multiplicative Inverse of (p 1) or (q 1) Modulo e

Cryptanalysis of RSA with Small Multiplicative Inverse of (p 1) or (q 1) Modulo e Cryptanalysis of RSA with Small Multiplicative Inverse of (p 1) or (q 1) Modulo e P Anuradha Kameswari, L Jyotsna Department of Mathematics, Andhra University, Visakhapatnam - 5000, Andhra Pradesh, India

More information

On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring

On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring Subhamoy Maitra and Santanu Sarkar Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata

More information

New Partial Key Exposure Attacks on RSA

New Partial Key Exposure Attacks on RSA New Partial Key Exposure Attacks on RSA Johannes Blömer, Alexander May Faculty of Computer Science, Electrical Engineering and Mathematics Paderborn University 33102 Paderborn, Germany {bloemer,alexx}@uni-paderborn.de

More information

A New Attack on RSA with Two or Three Decryption Exponents

A New Attack on RSA with Two or Three Decryption Exponents A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Mathématiques Nicolas Oresme Université de Caen, France nitaj@math.unicaen.fr http://www.math.unicaen.fr/~nitaj

More information

New Partial Key Exposure Attacks on RSA Revisited

New Partial Key Exposure Attacks on RSA Revisited New Partial Key Exposure Attacks on RSA Revisited M. Jason Hinek School of Computer Science, University of Waterloo Waterloo, Ontario, N2L-3G, Canada mjhinek@alumni.uwaterloo.ca March 7, 2004 Abstract

More information

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques Preprints (wwwpreprintsorg) NOT PEER-REVIEWED Posted: 20 July 208 doi:020944/preprints208070379v An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice

More information

New Partial Key Exposure Attacks on RSA

New Partial Key Exposure Attacks on RSA New Partial Key Exposure Attacks on RSA Johannes Blömer, Alexander May Faculty of Computer Science, Electrical Engineering and Mathematics Paderborn University 33102 Paderborn, Germany {bloemer,alexx}@uni-paderborn.de

More information

Finding Small Solutions of the Equation Bx Ay = z and Its Applications to Cryptanalysis of the RSA Cryptosystem

Finding Small Solutions of the Equation Bx Ay = z and Its Applications to Cryptanalysis of the RSA Cryptosystem Finding Small Solutions of the Equation Bx Ay = z and Its Applications to Cryptanalysis of the RSA Cryptosystem Shixiong Wang 1, Longjiang Qu 2,3, Chao Li 1,3, and Shaojing Fu 1,2 1 College of Computer,

More information

A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073

A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073 A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073 Ellen Jochemsz 1 and Alexander May 2 1 Department of Mathematics and Computer Science, TU Eindhoven, 5600 MB Eindhoven, the

More information

Generic maximum nullity of a graph

Generic maximum nullity of a graph Generic maximum nullity of a grap Leslie Hogben Bryan Sader Marc 5, 2008 Abstract For a grap G of order n, te maximum nullity of G is defined to be te largest possible nullity over all real symmetric n

More information

Differentiation in higher dimensions

Differentiation in higher dimensions Capter 2 Differentiation in iger dimensions 2.1 Te Total Derivative Recall tat if f : R R is a 1-variable function, and a R, we say tat f is differentiable at x = a if and only if te ratio f(a+) f(a) tends

More information

A new lattice construction for partial key exposure attack for RSA

A new lattice construction for partial key exposure attack for RSA A new lattice construction for partial key exposure attack for RSA Yoshinori Aono Dept. of Mathematical and Computing Sciences Tokyo Institute of Technology, Tokyo, Japan aono5@is.titech.ac.jp Abstract.

More information

Partial Key Exposure Attacks on RSA Up to Full Size Exponents

Partial Key Exposure Attacks on RSA Up to Full Size Exponents Partial Key Exposure Attacks on RSA Up to Full Size Exponents Matthias Ernst, Ellen Jochemsz 2,, Alexander May,, and Benne de Weger 2, Faculty of Computer Science, Electrical Engineering and Mathematics,

More information

Consider a function f we ll specify which assumptions we need to make about it in a minute. Let us reformulate the integral. 1 f(x) dx.

Consider a function f we ll specify which assumptions we need to make about it in a minute. Let us reformulate the integral. 1 f(x) dx. Capter 2 Integrals as sums and derivatives as differences We now switc to te simplest metods for integrating or differentiating a function from its function samples. A careful study of Taylor expansions

More information

Symmetry Labeling of Molecular Energies

Symmetry Labeling of Molecular Energies Capter 7. Symmetry Labeling of Molecular Energies Notes: Most of te material presented in tis capter is taken from Bunker and Jensen 1998, Cap. 6, and Bunker and Jensen 2005, Cap. 7. 7.1 Hamiltonian Symmetry

More information

Copyright c 2008 Kevin Long

Copyright c 2008 Kevin Long Lecture 4 Numerical solution of initial value problems Te metods you ve learned so far ave obtained closed-form solutions to initial value problems. A closedform solution is an explicit algebriac formula

More information

Effect of the Dependent Paths in Linear Hull

Effect of the Dependent Paths in Linear Hull 1 Effect of te Dependent Pats in Linear Hull Zenli Dai, Meiqin Wang, Yue Sun Scool of Matematics, Sandong University, Jinan, 250100, Cina Key Laboratory of Cryptologic Tecnology and Information Security,

More information

Chapter 1D - Rational Expressions

Chapter 1D - Rational Expressions - Capter 1D Capter 1D - Rational Expressions Definition of a Rational Expression A rational expression is te quotient of two polynomials. (Recall: A function px is a polynomial in x of degree n, if tere

More information

Polynomial Interpolation

Polynomial Interpolation Capter 4 Polynomial Interpolation In tis capter, we consider te important problem of approximating a function f(x, wose values at a set of distinct points x, x, x 2,,x n are known, by a polynomial P (x

More information

A = h w (1) Error Analysis Physics 141

A = h w (1) Error Analysis Physics 141 Introduction In all brances of pysical science and engineering one deals constantly wit numbers wic results more or less directly from experimental observations. Experimental observations always ave inaccuracies.

More information

Function Composition and Chain Rules

Function Composition and Chain Rules Function Composition and s James K. Peterson Department of Biological Sciences and Department of Matematical Sciences Clemson University Marc 8, 2017 Outline 1 Function Composition and Continuity 2 Function

More information

Polynomial Interpolation

Polynomial Interpolation Capter 4 Polynomial Interpolation In tis capter, we consider te important problem of approximatinga function fx, wose values at a set of distinct points x, x, x,, x n are known, by a polynomial P x suc

More information

Chapter 5 FINITE DIFFERENCE METHOD (FDM)

Chapter 5 FINITE DIFFERENCE METHOD (FDM) MEE7 Computer Modeling Tecniques in Engineering Capter 5 FINITE DIFFERENCE METHOD (FDM) 5. Introduction to FDM Te finite difference tecniques are based upon approximations wic permit replacing differential

More information

CS522 - Partial Di erential Equations

CS522 - Partial Di erential Equations CS5 - Partial Di erential Equations Tibor Jánosi April 5, 5 Numerical Di erentiation In principle, di erentiation is a simple operation. Indeed, given a function speci ed as a closed-form formula, its

More information

5 Ordinary Differential Equations: Finite Difference Methods for Boundary Problems

5 Ordinary Differential Equations: Finite Difference Methods for Boundary Problems 5 Ordinary Differential Equations: Finite Difference Metods for Boundary Problems Read sections 10.1, 10.2, 10.4 Review questions 10.1 10.4, 10.8 10.9, 10.13 5.1 Introduction In te previous capters we

More information

Lecture 15. Interpolation II. 2 Piecewise polynomial interpolation Hermite splines

Lecture 15. Interpolation II. 2 Piecewise polynomial interpolation Hermite splines Lecture 5 Interpolation II Introduction In te previous lecture we focused primarily on polynomial interpolation of a set of n points. A difficulty we observed is tat wen n is large, our polynomial as to

More information

SECTION 1.10: DIFFERENCE QUOTIENTS LEARNING OBJECTIVES

SECTION 1.10: DIFFERENCE QUOTIENTS LEARNING OBJECTIVES (Section.0: Difference Quotients).0. SECTION.0: DIFFERENCE QUOTIENTS LEARNING OBJECTIVES Define average rate of cange (and average velocity) algebraically and grapically. Be able to identify, construct,

More information

Numerical Differentiation

Numerical Differentiation Numerical Differentiation Finite Difference Formulas for te first derivative (Using Taylor Expansion tecnique) (section 8.3.) Suppose tat f() = g() is a function of te variable, and tat as 0 te function

More information

MATH745 Fall MATH745 Fall

MATH745 Fall MATH745 Fall MATH745 Fall 5 MATH745 Fall 5 INTRODUCTION WELCOME TO MATH 745 TOPICS IN NUMERICAL ANALYSIS Instructor: Dr Bartosz Protas Department of Matematics & Statistics Email: bprotas@mcmasterca Office HH 36, Ext

More information

Exercises for numerical differentiation. Øyvind Ryan

Exercises for numerical differentiation. Øyvind Ryan Exercises for numerical differentiation Øyvind Ryan February 25, 2013 1. Mark eac of te following statements as true or false. a. Wen we use te approximation f (a) (f (a +) f (a))/ on a computer, we can

More information

Math 212-Lecture 9. For a single-variable function z = f(x), the derivative is f (x) = lim h 0

Math 212-Lecture 9. For a single-variable function z = f(x), the derivative is f (x) = lim h 0 3.4: Partial Derivatives Definition Mat 22-Lecture 9 For a single-variable function z = f(x), te derivative is f (x) = lim 0 f(x+) f(x). For a function z = f(x, y) of two variables, to define te derivatives,

More information

Finite Difference Method

Finite Difference Method Capter 8 Finite Difference Metod 81 2nd order linear pde in two variables General 2nd order linear pde in two variables is given in te following form: L[u] = Au xx +2Bu xy +Cu yy +Du x +Eu y +Fu = G According

More information

Volume 29, Issue 3. Existence of competitive equilibrium in economies with multi-member households

Volume 29, Issue 3. Existence of competitive equilibrium in economies with multi-member households Volume 29, Issue 3 Existence of competitive equilibrium in economies wit multi-member ouseolds Noriisa Sato Graduate Scool of Economics, Waseda University Abstract Tis paper focuses on te existence of

More information

3.4 Worksheet: Proof of the Chain Rule NAME

3.4 Worksheet: Proof of the Chain Rule NAME Mat 1170 3.4 Workseet: Proof of te Cain Rule NAME Te Cain Rule So far we are able to differentiate all types of functions. For example: polynomials, rational, root, and trigonometric functions. We are

More information

Further Results on Implicit Factoring in Polynomial Time

Further Results on Implicit Factoring in Polynomial Time Further Results on Implicit Factoring in Polynomial Time Santanu Sarkar and Subhamoy Maitra Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India {santanu r, subho}@isical.ac.in Abstract.

More information

Dedicated to the 70th birthday of Professor Lin Qun

Dedicated to the 70th birthday of Professor Lin Qun Journal of Computational Matematics, Vol.4, No.3, 6, 4 44. ACCELERATION METHODS OF NONLINEAR ITERATION FOR NONLINEAR PARABOLIC EQUATIONS Guang-wei Yuan Xu-deng Hang Laboratory of Computational Pysics,

More information

SECTION 3.2: DERIVATIVE FUNCTIONS and DIFFERENTIABILITY

SECTION 3.2: DERIVATIVE FUNCTIONS and DIFFERENTIABILITY (Section 3.2: Derivative Functions and Differentiability) 3.2.1 SECTION 3.2: DERIVATIVE FUNCTIONS and DIFFERENTIABILITY LEARNING OBJECTIVES Know, understand, and apply te Limit Definition of te Derivative

More information

HOMEWORK HELP 2 FOR MATH 151

HOMEWORK HELP 2 FOR MATH 151 HOMEWORK HELP 2 FOR MATH 151 Here we go; te second round of omework elp. If tere are oters you would like to see, let me know! 2.4, 43 and 44 At wat points are te functions f(x) and g(x) = xf(x)continuous,

More information

On convexity of polynomial paths and generalized majorizations

On convexity of polynomial paths and generalized majorizations On convexity of polynomial pats and generalized majorizations Marija Dodig Centro de Estruturas Lineares e Combinatórias, CELC, Universidade de Lisboa, Av. Prof. Gama Pinto 2, 1649-003 Lisboa, Portugal

More information

lecture 26: Richardson extrapolation

lecture 26: Richardson extrapolation 43 lecture 26: Ricardson extrapolation 35 Ricardson extrapolation, Romberg integration Trougout numerical analysis, one encounters procedures tat apply some simple approximation (eg, linear interpolation)

More information

Small Private Exponent Partial Key-Exposure Attacks on Multiprime RSA

Small Private Exponent Partial Key-Exposure Attacks on Multiprime RSA Small Private Exponent Partial Key-Exposure Attacks on Multiprime RSA M. Jason Hinek School of Computer Science, University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada. mjhinek@alumni.uwaterloo.ca

More information

1 The concept of limits (p.217 p.229, p.242 p.249, p.255 p.256) 1.1 Limits Consider the function determined by the formula 3. x since at this point

1 The concept of limits (p.217 p.229, p.242 p.249, p.255 p.256) 1.1 Limits Consider the function determined by the formula 3. x since at this point MA00 Capter 6 Calculus and Basic Linear Algebra I Limits, Continuity and Differentiability Te concept of its (p.7 p.9, p.4 p.49, p.55 p.56). Limits Consider te function determined by te formula f Note

More information

Preface. Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Preface. Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my course tat I teac ere at Lamar University. Despite te fact tat tese are my class notes, tey sould be accessible to anyone wanting to learn or needing a refreser

More information

Pre-Calculus Review Preemptive Strike

Pre-Calculus Review Preemptive Strike Pre-Calculus Review Preemptive Strike Attaced are some notes and one assignment wit tree parts. Tese are due on te day tat we start te pre-calculus review. I strongly suggest reading troug te notes torougly

More information

NUMERICAL DIFFERENTIATION. James T. Smith San Francisco State University. In calculus classes, you compute derivatives algebraically: for example,

NUMERICAL DIFFERENTIATION. James T. Smith San Francisco State University. In calculus classes, you compute derivatives algebraically: for example, NUMERICAL DIFFERENTIATION James T Smit San Francisco State University In calculus classes, you compute derivatives algebraically: for example, f( x) = x + x f ( x) = x x Tis tecnique requires your knowing

More information

On the Security of Multi-prime RSA

On the Security of Multi-prime RSA On the Security of Multi-prime RSA M. Jason Hinek David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G, Canada mjhinek@alumni.uwaterloo.ca June 3, 2006 Abstract.

More information

Complexity of Decoding Positive-Rate Reed-Solomon Codes

Complexity of Decoding Positive-Rate Reed-Solomon Codes Complexity of Decoding Positive-Rate Reed-Solomon Codes Qi Ceng 1 and Daqing Wan 1 Scool of Computer Science Te University of Oklaoma Norman, OK73019 Email: qceng@cs.ou.edu Department of Matematics University

More information

Provable Security Against a Dierential Attack? Aarhus University, DK-8000 Aarhus C.

Provable Security Against a Dierential Attack? Aarhus University, DK-8000 Aarhus C. Provable Security Against a Dierential Attack Kaisa Nyberg and Lars Ramkilde Knudsen Aarus University, DK-8000 Aarus C. Abstract. Te purpose of tis paper is to sow tat tere exist DESlike iterated cipers,

More information

Partial Key Exposure: Generalized Framework to Attack RSA

Partial Key Exposure: Generalized Framework to Attack RSA Partial Key Exposure: Generalized Framework to Attack RSA Cryptology Research Group Indian Statistical Institute, Kolkata 12 December 2011 Outline of the Talk 1 RSA - A brief overview 2 Partial Key Exposure

More information

AMS 147 Computational Methods and Applications Lecture 09 Copyright by Hongyun Wang, UCSC. Exact value. Effect of round-off error.

AMS 147 Computational Methods and Applications Lecture 09 Copyright by Hongyun Wang, UCSC. Exact value. Effect of round-off error. Lecture 09 Copyrigt by Hongyun Wang, UCSC Recap: Te total error in numerical differentiation fl( f ( x + fl( f ( x E T ( = f ( x Numerical result from a computer Exact value = e + f x+ Discretization error

More information

A MONTE CARLO ANALYSIS OF THE EFFECTS OF COVARIANCE ON PROPAGATED UNCERTAINTIES

A MONTE CARLO ANALYSIS OF THE EFFECTS OF COVARIANCE ON PROPAGATED UNCERTAINTIES A MONTE CARLO ANALYSIS OF THE EFFECTS OF COVARIANCE ON PROPAGATED UNCERTAINTIES Ronald Ainswort Hart Scientific, American Fork UT, USA ABSTRACT Reports of calibration typically provide total combined uncertainties

More information

Exam 1 Review Solutions

Exam 1 Review Solutions Exam Review Solutions Please also review te old quizzes, and be sure tat you understand te omework problems. General notes: () Always give an algebraic reason for your answer (graps are not sufficient),

More information

Excursions in Computing Science: Week v Milli-micro-nano-..math Part II

Excursions in Computing Science: Week v Milli-micro-nano-..math Part II Excursions in Computing Science: Week v Milli-micro-nano-..mat Part II T. H. Merrett McGill University, Montreal, Canada June, 5 I. Prefatory Notes. Cube root of 8. Almost every calculator as a square-root

More information

THE IDEA OF DIFFERENTIABILITY FOR FUNCTIONS OF SEVERAL VARIABLES Math 225

THE IDEA OF DIFFERENTIABILITY FOR FUNCTIONS OF SEVERAL VARIABLES Math 225 THE IDEA OF DIFFERENTIABILITY FOR FUNCTIONS OF SEVERAL VARIABLES Mat 225 As we ave seen, te definition of derivative for a Mat 111 function g : R R and for acurveγ : R E n are te same, except for interpretation:

More information

7.1 Using Antiderivatives to find Area

7.1 Using Antiderivatives to find Area 7.1 Using Antiderivatives to find Area Introduction finding te area under te grap of a nonnegative, continuous function f In tis section a formula is obtained for finding te area of te region bounded between

More information

More on generalized inverses of partitioned matrices with Banachiewicz-Schur forms

More on generalized inverses of partitioned matrices with Banachiewicz-Schur forms More on generalized inverses of partitioned matrices wit anaciewicz-scur forms Yongge Tian a,, Yosio Takane b a Cina Economics and Management cademy, Central University of Finance and Economics, eijing,

More information

The Verlet Algorithm for Molecular Dynamics Simulations

The Verlet Algorithm for Molecular Dynamics Simulations Cemistry 380.37 Fall 2015 Dr. Jean M. Standard November 9, 2015 Te Verlet Algoritm for Molecular Dynamics Simulations Equations of motion For a many-body system consisting of N particles, Newton's classical

More information

Another Generalization of Wiener s Attack on RSA

Another Generalization of Wiener s Attack on RSA Another Generalization of Wiener s Attack on RSA Abderrahmane Nitaj Laboratoire de Mathématiques Nicolas Oresme Université de Caen, France BP 586, 4032 Caen Cedex, France http://www.math.unicaen.fr/~nitaj

More information

Complexity of Decoding Positive-Rate Primitive Reed-Solomon Codes

Complexity of Decoding Positive-Rate Primitive Reed-Solomon Codes 1 Complexity of Decoding Positive-Rate Primitive Reed-Solomon Codes Qi Ceng and Daqing Wan Abstract It as been proved tat te maximum likeliood decoding problem of Reed-Solomon codes is NP-ard. However,

More information

Analytic Functions. Differentiable Functions of a Complex Variable

Analytic Functions. Differentiable Functions of a Complex Variable Analytic Functions Differentiable Functions of a Complex Variable In tis capter, we sall generalize te ideas for polynomials power series of a complex variable we developed in te previous capter to general

More information

CRYPTANALYSIS OF RSA WITH LATTICE ATTACKS ANDREW HOON SUK

CRYPTANALYSIS OF RSA WITH LATTICE ATTACKS ANDREW HOON SUK c Copyright by Andrew Hoon Suk, 2003 CRYPTANALYSIS OF RSA WITH LATTICE ATTACKS BY ANDREW HOON SUK B.S., University of Illinois at Urbana-Champaign, 2001 THESIS Submitted in partial fulfillment of the requirements

More information

Solutions to the Multivariable Calculus and Linear Algebra problems on the Comprehensive Examination of January 31, 2014

Solutions to the Multivariable Calculus and Linear Algebra problems on the Comprehensive Examination of January 31, 2014 Solutions to te Multivariable Calculus and Linear Algebra problems on te Compreensive Examination of January 3, 24 Tere are 9 problems ( points eac, totaling 9 points) on tis portion of te examination.

More information

Combining functions: algebraic methods

Combining functions: algebraic methods Combining functions: algebraic metods Functions can be added, subtracted, multiplied, divided, and raised to a power, just like numbers or algebra expressions. If f(x) = x 2 and g(x) = x + 2, clearly f(x)

More information

5.1 We will begin this section with the definition of a rational expression. We

5.1 We will begin this section with the definition of a rational expression. We Basic Properties and Reducing to Lowest Terms 5.1 We will begin tis section wit te definition of a rational epression. We will ten state te two basic properties associated wit rational epressions and go

More information

232 Calculus and Structures

232 Calculus and Structures 3 Calculus and Structures CHAPTER 17 JUSTIFICATION OF THE AREA AND SLOPE METHODS FOR EVALUATING BEAMS Calculus and Structures 33 Copyrigt Capter 17 JUSTIFICATION OF THE AREA AND SLOPE METHODS 17.1 THE

More information

How to Find the Derivative of a Function: Calculus 1

How to Find the Derivative of a Function: Calculus 1 Introduction How to Find te Derivative of a Function: Calculus 1 Calculus is not an easy matematics course Te fact tat you ave enrolled in suc a difficult subject indicates tat you are interested in te

More information

Material for Difference Quotient

Material for Difference Quotient Material for Difference Quotient Prepared by Stepanie Quintal, graduate student and Marvin Stick, professor Dept. of Matematical Sciences, UMass Lowell Summer 05 Preface Te following difference quotient

More information

2.1 THE DEFINITION OF DERIVATIVE

2.1 THE DEFINITION OF DERIVATIVE 2.1 Te Derivative Contemporary Calculus 2.1 THE DEFINITION OF DERIVATIVE 1 Te grapical idea of a slope of a tangent line is very useful, but for some uses we need a more algebraic definition of te derivative

More information

Partial Key Exposure Attack on RSA Improvements for Limited Lattice Dimensions

Partial Key Exposure Attack on RSA Improvements for Limited Lattice Dimensions Partial Key Exposure Attack on RSA Improvements for Limited Lattice Dimensions Santanu Sarkar, Sourav Sen Gupta, and Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road,

More information

Math 312 Lecture Notes Modeling

Math 312 Lecture Notes Modeling Mat 3 Lecture Notes Modeling Warren Weckesser Department of Matematics Colgate University 5 7 January 006 Classifying Matematical Models An Example We consider te following scenario. During a storm, a

More information

IEOR 165 Lecture 10 Distribution Estimation

IEOR 165 Lecture 10 Distribution Estimation IEOR 165 Lecture 10 Distribution Estimation 1 Motivating Problem Consider a situation were we ave iid data x i from some unknown distribution. One problem of interest is estimating te distribution tat

More information

MVT and Rolle s Theorem

MVT and Rolle s Theorem AP Calculus CHAPTER 4 WORKSHEET APPLICATIONS OF DIFFERENTIATION MVT and Rolle s Teorem Name Seat # Date UNLESS INDICATED, DO NOT USE YOUR CALCULATOR FOR ANY OF THESE QUESTIONS In problems 1 and, state

More information

2.3 Product and Quotient Rules

2.3 Product and Quotient Rules .3. PRODUCT AND QUOTIENT RULES 75.3 Product and Quotient Rules.3.1 Product rule Suppose tat f and g are two di erentiable functions. Ten ( g (x)) 0 = f 0 (x) g (x) + g 0 (x) See.3.5 on page 77 for a proof.

More information

Notes on wavefunctions II: momentum wavefunctions

Notes on wavefunctions II: momentum wavefunctions Notes on wavefunctions II: momentum wavefunctions and uncertainty Te state of a particle at any time is described by a wavefunction ψ(x). Tese wavefunction must cange wit time, since we know tat particles

More information

one eciently recover the entire key? There is no known method for doing so. Furthermore, the common belief is that no such ecient algorithm exists. Th

one eciently recover the entire key? There is no known method for doing so. Furthermore, the common belief is that no such ecient algorithm exists. Th Exposing an RSA Private Key Given a Small Fraction of its Bits Dan Boneh Glenn Durfee y Yair Frankel dabo@cs.stanford.edu gdurf@cs.stanford.edu yfrankel@cs.columbia.edu Stanford University Stanford University

More information

Near-Optimal conversion of Hardness into Pseudo-Randomness

Near-Optimal conversion of Hardness into Pseudo-Randomness Near-Optimal conversion of Hardness into Pseudo-Randomness Russell Impagliazzo Computer Science and Engineering UC, San Diego 9500 Gilman Drive La Jolla, CA 92093-0114 russell@cs.ucsd.edu Ronen Saltiel

More information

Robotic manipulation project

Robotic manipulation project Robotic manipulation project Bin Nguyen December 5, 2006 Abstract Tis is te draft report for Robotic Manipulation s class project. Te cosen project aims to understand and implement Kevin Egan s non-convex

More information

ch (for some fixed positive number c) reaching c

ch (for some fixed positive number c) reaching c GSTF Journal of Matematics Statistics and Operations Researc (JMSOR) Vol. No. September 05 DOI 0.60/s4086-05-000-z Nonlinear Piecewise-defined Difference Equations wit Reciprocal and Cubic Terms Ramadan

More information

Mathematics 5 Worksheet 11 Geometry, Tangency, and the Derivative

Mathematics 5 Worksheet 11 Geometry, Tangency, and the Derivative Matematics 5 Workseet 11 Geometry, Tangency, and te Derivative Problem 1. Find te equation of a line wit slope m tat intersects te point (3, 9). Solution. Te equation for a line passing troug a point (x

More information

5.1 introduction problem : Given a function f(x), find a polynomial approximation p n (x).

5.1 introduction problem : Given a function f(x), find a polynomial approximation p n (x). capter 5 : polynomial approximation and interpolation 5 introduction problem : Given a function f(x), find a polynomial approximation p n (x) Z b Z application : f(x)dx b p n(x)dx, a a one solution : Te

More information

The derivative function

The derivative function Roberto s Notes on Differential Calculus Capter : Definition of derivative Section Te derivative function Wat you need to know already: f is at a point on its grap and ow to compute it. Wat te derivative

More information

Section 3: The Derivative Definition of the Derivative

Section 3: The Derivative Definition of the Derivative Capter 2 Te Derivative Business Calculus 85 Section 3: Te Derivative Definition of te Derivative Returning to te tangent slope problem from te first section, let's look at te problem of finding te slope

More information

Quaternion Dynamics, Part 1 Functions, Derivatives, and Integrals. Gary D. Simpson. rev 01 Aug 08, 2016.

Quaternion Dynamics, Part 1 Functions, Derivatives, and Integrals. Gary D. Simpson. rev 01 Aug 08, 2016. Quaternion Dynamics, Part 1 Functions, Derivatives, and Integrals Gary D. Simpson gsim1887@aol.com rev 1 Aug 8, 216 Summary Definitions are presented for "quaternion functions" of a quaternion. Polynomial

More information

Taylor Series and the Mean Value Theorem of Derivatives

Taylor Series and the Mean Value Theorem of Derivatives 1 - Taylor Series and te Mean Value Teorem o Derivatives Te numerical solution o engineering and scientiic problems described by matematical models oten requires solving dierential equations. Dierential

More information

Approximate Integer Common Divisor Problem relates to Implicit Factorization

Approximate Integer Common Divisor Problem relates to Implicit Factorization Approximate Integer Common Divisor Problem relates to Implicit Factorization Santanu Sarar and Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolata 700 108, India

More information

1 Calculus. 1.1 Gradients and the Derivative. Q f(x+h) f(x)

1 Calculus. 1.1 Gradients and the Derivative. Q f(x+h) f(x) Calculus. Gradients and te Derivative Q f(x+) δy P T δx R f(x) 0 x x+ Let P (x, f(x)) and Q(x+, f(x+)) denote two points on te curve of te function y = f(x) and let R denote te point of intersection of

More information

1. Questions (a) through (e) refer to the graph of the function f given below. (A) 0 (B) 1 (C) 2 (D) 4 (E) does not exist

1. Questions (a) through (e) refer to the graph of the function f given below. (A) 0 (B) 1 (C) 2 (D) 4 (E) does not exist Mat 1120 Calculus Test 2. October 18, 2001 Your name Te multiple coice problems count 4 points eac. In te multiple coice section, circle te correct coice (or coices). You must sow your work on te oter

More information

3.4 Algebraic Limits. Ex 1) lim. Ex 2)

3.4 Algebraic Limits. Ex 1) lim. Ex 2) Calculus Maimus.4 Algebraic Limits At tis point, you sould be very comfortable finding its bot grapically and numerically wit te elp of your graping calculator. Now it s time to practice finding its witout

More information

ERROR BOUNDS FOR THE METHODS OF GLIMM, GODUNOV AND LEVEQUE BRADLEY J. LUCIER*

ERROR BOUNDS FOR THE METHODS OF GLIMM, GODUNOV AND LEVEQUE BRADLEY J. LUCIER* EO BOUNDS FO THE METHODS OF GLIMM, GODUNOV AND LEVEQUE BADLEY J. LUCIE* Abstract. Te expected error in L ) attimet for Glimm s sceme wen applied to a scalar conservation law is bounded by + 2 ) ) /2 T

More information