Post-quantum Key Exchange Protocol Using High Dimensional Matrix
|
|
- Darrell Dean
- 5 years ago
- Views:
Transcription
1 Post-quantum Key Exchange Protocol Usng Hgh Dmensonal Matrx Rchard Megrelshvl I. J. Tbls State Unversty Melksadeg Jnkhadze Akak Tseretel State Unversty Kutas, Georga Maksm Iavch Caucasus Unversty Avtandl Gagndze Geora Unversty Gorg Iashvl Geora Unversty Abstract Actve work s beng done to create and develop quantum computers. Google Corporaton, NASA and the Unverstes Space Research Assocaton USRA have teamed up wth DWAFE, the manufacturer of quantum processors. D-Wave X s a quantum processor that contans,8 physcal qubts. qubts from the whole number of qubts are used to perform the calculatons. As we see, quantum computers can easly solve the problem of calculatng the dscrete logarthm used n Dffe- Hellman algorthm. So t can break Dffe-Hellman algorthm. When quantum computers are released all exstng crypto systems wll be useless, because there wll be no way to transfer the key securely. In the artcle s proposed the new key exchange method usng hgh dmensonal matrx, ths method s safe aganst attacks mplemented usng quantum computers. The case concerns the matrx functon and algorthm for cryptographc keys exchange wth open channel. For the algorthm s offered the method of buldng a hgh dmensonal matrx multplcatve group. The arsng of ths goal s that tradtonal key exchange methods are vulnerable to quantum computer attacks. Keywords post-quantum cryptography, attacks, a matrx oneway functon, Abelan multplcatve group, asymmetrc cryptography, hgh dmensonal matrx fnte feld I. INTRODUCTION One of the fundamental problems of cryptography s the safe communcaton over the lstenng channel. Messages need to be encrypted and decrypted, but for ths, both partes need to have a common key. If ths key s transmtted va the same channel, then the lstenng sde wll also receve t, and the meanng of the encrypton wll dsappear. Dffe-Hellman algorthm allows the two partes to obtan a common secret key usng an unprotected, but spoofed, communcaton channel. The receved key can be used to exchange messages usng symmetrc encrypton. The securty of formng a common key n the Dffe-Hellman algorthm follows from the fact that, although t s relatvely easy to calculate exponents modulo a prme number, t s very dffcult to calculate dscrete logarthms. For large prme numbers of hundreds and thousands of bts, the task s consdered unsolvable, snce t requres a tremendous amount of computatonal resources. But ths problem can easly be solved by quantum computers usng Shor algorthm [,]. The securty of RSA algorthm reles on factorzaton problem, but ths problem can be easly solved usng quantum computers []. Actve work s beng done to create and develop quantum computers. Google Corporaton, NASA and the Unverstes Space Research Assocaton USRA have teamed up wth DWAFE, the manufacturer of quantum processors. D-Wave X s a quantum processor that contans,8 physcal qubts. qubts from the whole number of qubts are used to perform the calculatons. As we see, quantum computers can easly solve the problem of calculatng the dscrete logarthm used n Dffe- Hellman algorthm. So t can break Dffe-Hellman algorthm. When quantum computers are released all exstng crypto systems wll be useless, because there wll be no way to transfer the key securely [,]. In the artcle s proposed the new key exchange algorthm usng hgh dmensonal matrx. Ths algorthm s safe aganst quantum computer attacks. The case concerns the matrx functon and algorthm for cryptographc keys exchange wth open channel. For ths s offered the method buldng a hgh dmensonal matrx multplcatve group. The arsng of ths goal s that tradtonal key exchange methods are vulnerable to quantum computer attacks. One-way functon OWF s a functon whose value s easy to calculate for any argument, but t s dffcult to fnd an argument for the gven value of the functon. The word "dffcult" s to understand the complexty of the computaton. In other words, fndng the relevant argument of the gven functon n real tme s dffcult even wth the modern computng technques. The rreversblty of functon does not mean that the functon s one-way [,7]. The exstence of one-way functons s the bass for the dea of asymmetrc cryptography. It one-way functon s the foundaton of asymmetrc cryptography, personal dentfcaton, authentcaton, and other felds of nformaton protecton. Although there s no theoretcal proof of the exstence of one-way functons n general, there are several Copyrght held by the authors. 8
2 possble pretendents eg, multplcaton and factorzaton, squarng and module rootng, dscreet exponent and logarthmzaton, whose one-wayty e the dffculty of fndng the argument for the value of functon at ths tme real and s actvely used n nformaton exchange protocols. As we have mentoned, one-way functons are actvely used n the algorthms for developng a cryptographc open key. The ntal dea 97 belongs to Whtfeld Duffe and Martn Helman. Based of ther dea was establshed the frst practcal wel-known Dffe-Helman-Merkel method, whch enabled the development of a common cryptographc key usng the open unprotected channel. A year later, the frst RSA algorthm of asymmetrc encrypton was formed. The RSA n fact, resolved the problem of exchange nformaton wth open channel. Both algorthms are not safe aganst quantum computers attacks. Are proposed quantum key exchange protocols, but quantum computers are needed to mplement them [8,9]. II. ONE-WAY MATRIX FUNCTION The new one-way functon for the development of common cryptographc keys s based on hgh order cyclc matrx groups, wth the power e = n, where the n s row dmenson of the square matrx. Let's assume that "A" s the above matrx group, whle A s the ntal n n matrx, then "A" = A={A, A, A,, A n = I} where I represents an dentty matrx. One-way functon and algorthm for common key development are as follows: The sender chooses A A secret matrx to send to the recevng party va open channel the uu = va vector where v V n vector s known V n s a vector space on GF feld; The recevng party shall, on the other hand, choose A A secret matrx and send to the sender u = va vector; Sender calculates k = u A vector; Recever calculates k = u A where k and k are secret keys; Obvously, k = k = k, because k = va A = va A because of the commutatveness of the "A" group. The va = u 7 s one-way fast functon. Let v = v, v, v,, v n V n 8 and u = u, u, u,, u n V n are non-secret vectors from the above algorthm and a a n A = A 9 a n a nn s a secret matrx. Then, accordng to algorthm the followng system s formed: v a + v a + + v n a n u v va = a + v a + + v n a n u = v a n + v a n + + v a n u n The number of unknowns n the system of lnear equatons s the square of number of equatons. Obvously, the system can not be solved n lmted tme, f the sze of the matrx s large enough. Sze of the matrx must be chosen consderng Grover s algorthm. Classcally, searchng requres a lnear search, whch s ON n tme. Grover's algorthm needs ON / tme, t s consdered as fastest quantum algorthm for searchng an unsorted nformaton. Ths algorthm provdes a quadratc speedup [,]. One fact must be taken nto consderaton f the A matrx contans the nternal recurrence, or f each of ts rows are n a certan recurrence wth the prevous row, then the task of solvng the system wll be replaced by a smpler task that s easy to solve. It s so mportant that t puts tself n doubt the oneway character of our functon and requres the exstence of Abelan multplcatve matrx group wth a hgh order, that s free from the recurrence of the nsde. III. FINITE MATRIX GROUPS CONSTRUCTION Let's consder + α, where =,,,, and α represents the root of prmtve polynomal n the GF n feld odule wth the module p x. + α = + α = + α + α = + α + α = + α + α + α + α = + α + α = + α + α + α The polynomal coeffcents generated the structure known as Serpnsky Trangle. The derved structure contans a number of sub-structures that can be used as a generator generatng matrx for multplcatve groups, e prmtve elements. Such s, for example, = 9, P = And many more. Ther natural powers create Abelan multplcatve cyclc group. For example: P =, P =, =, P =, P =, P =, P 7 = P = It s easy to confrm that P, P, P,, P, P, 8
3 s an Abelan multplcatve group. Lets keep the structure of matrx and extend t by elements of set as follows:, =, where,=... Fore example, when = and =, we have, = = When = and =, we have pc. : Pc.:, and,, = = Consder P = [,] = = If we take nto consderaton that the set,,,,,,, s a feld, t s easy to assure that each sub-matrx of the P matrx s n the the same set: P, = + + =, P, = + + =, P, = + + =, P, = + + =, P, = + + =, P, = + + =,, = + + =,, = P P + P + P = P,, = P P + P + = P. or P = see pc.. pc.: P = [,] Usng the software package we have developed t has been confrmed that the, matrx s a prmtve element. Its natural powers generate Abelan multlplcatve group, whose power s. The elements of [,] k when k = 7,, 9, 9,, 8, are dagonal matrces see pc. :,,,,,, Pc. : [,] k, k = 7,, 9, 9,, 8, Also, matrx s a prmtve element, and elements of the set [,] k, when k=7,, 9, 9,, 8,, are dagonal matrcespc :,,,,, pc.: [,] k, k = 7,, 9, 9,, 8, 8
4 Set of non-zero elements of the dagonal matrces represents the perturbaton of the group P, P, P,, P, P, called as prmary group and one of the elements s P. Fnally, we can conclude that emprcally we proved the followng fact: The second order, + expanson, +, =.., of the matrx s a prmtve element and creates the Abelan multplcatve fnte group F, +, wth the power. Below we can see other prmtve elements that are results of expanson of matrx:, =,, =,, =, =, =, =, = 7 In order to get hgher order prmtve elements, we stll retan the structure of matrx and put nto the elements of the group F, +. We get order matrx call t a thrd order expanson. For example, f we use the elements of group F, for the frst and second expansons of the matrx of, respectvely [,] [,] matrces, we get the followng matrx pc. : pc.., P P P, = = = 8 Let's consder [,] k set. It has the same basc structure as the prmary group, as well as the frst and second expanson matrces taken from the prmary group. It s expected that ths set s characterzed by the same propertes as the prmary group has. Indeed, expermentally, t also has dagonal matrces, whose dagonal elements represent one of the perturbatons of the prmary group. For the set [,] k dagonal matrces are [,] + +, =,,,,. When =, we get the fnal element of the set [,] k : [,] + + = [,] = [,] = [,] 9 [,] We see that ths s an Identty matrx. Therefore, s a prmtve element and creates the Abelan multplcatve fnte group wth power. Defnton: We call the followng matrx k, + = k + k + k + k + k + k where k F k, +, as the k th order, + expanson of the matrx. Theorem: k, + s a prmtve element and creates the abelan multplcatve fnte group F k, + wth power k. In general matrces [ k, + ] k + k +, where =,,,, k are dagonal matrces and dagonal elements are one of the permutatons of the elements of the prmary group. 8
5 When = k, we get [ k, + ] k + k += = [ k, + ] k k + k += = [ k, + ] k = [ k, + ] [ k, + ] [ k, + ] Ths means that the structure s a prmtve matrx. The prmtve matrces obtaned have an nterestng fractal structure see pc.. Abelan multplcatve groups adopted by the above mentoned method represent suffcent sets for realzng our one-way matrx functons pc.., IV. CONCLUSION Basc matrx k, + expansons are prmtve matrces they generate abelan multplcatve matrx groups. An nterestng trend of research results n the dea: use the elements of the prmary feld as the frst and second expandng matrces wth the same characterstc polynom. It s also mportant the use of other baselne matrces, whch enlarges a new type of prmtve structures. Elements of abelan multplcatve matrx groups can be used n mplementaton of one way functon, that we offer. So the key exchange method s got and t s secure aganst quantum computers attacks. ACKNOWLEDGEMENT The Work Was Conducted as a Part of Research Grant of Jont Proect of Shota Rustavel Natonal Scence Foundaton and Scence & Technology Center n Ukrane [ STCU--8] REFERENCES []. Shor, P. Polynomal-tme algorthms for prme factorzaton and dscrete logarthms on a quantum computer. SIAM J. Comput., []. Jones, J. A. NMR quantum computaton. Prog. NMR Spectrosc. 8, []. Ekert, A. & Jozsa, R. Quantum computaton and Shor's factorng algorthm. Rev. Mod. Phys. 8, []. Avtandl Gagndze, Maksm Iavch, Gorg Iashvl// Novel Verson of Merkle Cryptosystem// BULLETIN OF THE GEORGIAN NATIONAL ACADEMY OF SCIENCES, vol., no., 7, p. 8- []. Avtandl Gagndze & Maksm Iavch & Gorg Iashvl, 7. "Some Aspects Of Post-Quantum Cryptosystems," Eurasan Journal of Busness and Management, Eurasan Publcatons, vol., pages - []. Werner Alex, Benny Chor, Oded Goldrech, Claus P. Schnorr, RSA and Rabn functons: certan parts are as hard as the whole, SIAM Journal on Computng, v.7 n., p.9-9, Aprl 988 [do>.7/7] [7]. R. P. Megrelshvl, Analyss of the matrx one-way functon and two varants of ts mplementaton, Internatonal J. of Multdscplnary Research And Advances In Engneerng IJMRAE, v., n. IV October, pp [8]. G. L. Long, X. S. Lu, Theoretcally effcent hgh-capacty quantum-key-dstrbuton scheme, Phys. Rev. A, [9]. W. Shor, John Preskll, Smple Proof of Securty of the BB8 Quantum Key Dstrbuton Protocol Peter Phys. Rev. Lett. 8,, []. Shu-Shen L, Gu-Lu Long, Feng-Shan Ba, Song-Ln Feng and Hou-Zh Zheng, Quantum computng, PNAS October, []. Marlan O. Scully and M. S. Zubary, Quantum optcal mplementaton of Grover's algorthm, PNAS August,
Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction
Attacks on RSA The Rabn Cryptosystem Semantc Securty of RSA Cryptology, Tuesday, February 27th, 2007 Nls Andersen Square Roots modulo n Complexty Theoretc Reducton Factorng Algorthms Pollard s p 1 Pollard
More informationCryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm
www.ijcsi.org 110 Cryptanalyss of a Publc-key Cryptosystem Usng Lattce Bass Reducton Algorthm Roohallah Rastagh 1, Hamd R. Dall Oskoue 2 1,2 Department of Electrcal Engneerng, Aeronautcal Unversty of Snce
More informationCryptanalysis of pairing-free certificateless authenticated key agreement protocol
Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen
More informationDifference Equations
Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1
More informationThe Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL
The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp
More informationFinding Primitive Roots Pseudo-Deterministically
Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms
More informationDISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization
DISCRIMINANTS AND RAMIFIED PRIMES KEITH CONRAD 1. Introducton A prme number p s sad to be ramfed n a number feld K f the prme deal factorzaton (1.1) (p) = po K = p e 1 1 peg g has some e greater than 1.
More informationPRIME NUMBER GENERATION BASED ON POCKLINGTON S THEOREM
PRIME NUMBER GENERATION BASED ON POCKLINGTON S THEOREM Alexandros Papankolaou and Song Y. Yan Department of Computer Scence, Aston Unversty, Brmngham B4 7ET, UK 24 October 2000, Receved 26 June 2001 Abstract
More information2 More examples with details
Physcs 129b Lecture 3 Caltech, 01/15/19 2 More examples wth detals 2.3 The permutaton group n = 4 S 4 contans 4! = 24 elements. One s the dentty e. Sx of them are exchange of two objects (, j) ( to j and
More informationSpeeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence
More informationSL n (F ) Equals its Own Derived Group
Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu
More informationApplication of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations
Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More informationRemarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence
Remarks on the Propertes of a Quas-Fbonacc-lke Polynomal Sequence Brce Merwne LIU Brooklyn Ilan Wenschelbaum Wesleyan Unversty Abstract Consder the Quas-Fbonacc-lke Polynomal Sequence gven by F 0 = 1,
More informationDETERMINATION OF TEMPERATURE DISTRIBUTION FOR ANNULAR FINS WITH TEMPERATURE DEPENDENT THERMAL CONDUCTIVITY BY HPM
Ganj, Z. Z., et al.: Determnaton of Temperature Dstrbuton for S111 DETERMINATION OF TEMPERATURE DISTRIBUTION FOR ANNULAR FINS WITH TEMPERATURE DEPENDENT THERMAL CONDUCTIVITY BY HPM by Davood Domr GANJI
More informationHongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)
ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of
More informationA Hybrid Variational Iteration Method for Blasius Equation
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationQuantum Mechanics for Scientists and Engineers. David Miller
Quantum Mechancs for Scentsts and Engneers Davd Mller Types of lnear operators Types of lnear operators Blnear expanson of operators Blnear expanson of lnear operators We know that we can expand functons
More informationAlgorithms for factoring
CSA E0 235: Crytograhy Arl 9,2015 Instructor: Arta Patra Algorthms for factorng Submtted by: Jay Oza, Nranjan Sngh Introducton Factorsaton of large ntegers has been a wdely studed toc manly because of
More informationLecture 3. Ax x i a i. i i
18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest
More informationLecture 5 Decoding Binary BCH Codes
Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture
More informationA New Refinement of Jacobi Method for Solution of Linear System Equations AX=b
Int J Contemp Math Scences, Vol 3, 28, no 17, 819-827 A New Refnement of Jacob Method for Soluton of Lnear System Equatons AX=b F Naem Dafchah Department of Mathematcs, Faculty of Scences Unversty of Gulan,
More informationSmarandache-Zero Divisors in Group Rings
Smarandache-Zero Dvsors n Group Rngs W.B. Vasantha and Moon K. Chetry Department of Mathematcs I.I.T Madras, Chenna The study of zero-dvsors n group rngs had become nterestng problem snce 1940 wth the
More informationThe Jacobsthal and Jacobsthal-Lucas Numbers via Square Roots of Matrices
Internatonal Mathematcal Forum, Vol 11, 2016, no 11, 513-520 HIKARI Ltd, wwwm-hkarcom http://dxdoorg/1012988/mf20166442 The Jacobsthal and Jacobsthal-Lucas Numbers va Square Roots of Matrces Saadet Arslan
More informationLecture 12: Discrete Laplacian
Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly
More informationSome Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM
Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s
More informationOn the correction of the h-index for career length
1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat
More informationStatistical Energy Analysis for High Frequency Acoustic Analysis with LS-DYNA
14 th Internatonal Users Conference Sesson: ALE-FSI Statstcal Energy Analyss for Hgh Frequency Acoustc Analyss wth Zhe Cu 1, Yun Huang 1, Mhamed Soul 2, Tayeb Zeguar 3 1 Lvermore Software Technology Corporaton
More informationNumerical Heat and Mass Transfer
Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and
More informationFormulas for the Determinant
page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use
More informationA Local Variational Problem of Second Order for a Class of Optimal Control Problems with Nonsmooth Objective Function
A Local Varatonal Problem of Second Order for a Class of Optmal Control Problems wth Nonsmooth Objectve Functon Alexander P. Afanasev Insttute for Informaton Transmsson Problems, Russan Academy of Scences,
More informationMin Cut, Fast Cut, Polynomial Identities
Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.
More informationDynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence)
/24/27 Prevew Fbonacc Sequence Longest Common Subsequence Dynamc programmng s a method for solvng complex problems by breakng them down nto smpler sub-problems. It s applcable to problems exhbtng the propertes
More informationExample: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,
The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson
More information8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars
More informationThe Exact Formulation of the Inverse of the Tridiagonal Matrix for Solving the 1D Poisson Equation with the Finite Difference Method
Journal of Electromagnetc Analyss and Applcatons, 04, 6, 0-08 Publshed Onlne September 04 n ScRes. http://www.scrp.org/journal/jemaa http://dx.do.org/0.46/jemaa.04.6000 The Exact Formulaton of the Inverse
More informationThe internal structure of natural numbers and one method for the definition of large prime numbers
The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013
ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run
More informationALGEBRA HW 7 CLAY SHONKWILER
ALGEBRA HW 7 CLAY SHONKWILER 1 Whch of the followng rngs R are dscrete valuaton rngs? For those that are, fnd the fracton feld K = frac R, the resdue feld k = R/m (where m) s the maxmal deal), and a unformzer
More informationLeast squares cubic splines without B-splines S.K. Lucas
Least squares cubc splnes wthout B-splnes S.K. Lucas School of Mathematcs and Statstcs, Unversty of South Australa, Mawson Lakes SA 595 e-mal: stephen.lucas@unsa.edu.au Submtted to the Gazette of the Australan
More informationFactoring Using Shor's Quantum Algorithm
Factorng Usng Shor's uantum Algorthm Frank Rou Emertus Professor of Chemstry CSB SJU Ths tutoral presents a toy calculaton dealng wth quantum factorzaton usng Shor's algorthm. Before begnnng that task,
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More informationarxiv: v1 [cs.cr] 22 Oct 2018
CRYPTOGRAPHIC ANALYSIS OF THE MODIFIED MATRIX MODULAR CRYPTOSYSTEM arxv:181109876v1 [cscr] 22 Oct 2018 VITALIĬ ROMAN KOV Abstract We show that the Modfed Matrx Modular Cryptosystem proposed by SK Rososhek
More informationGrover s Algorithm + Quantum Zeno Effect + Vaidman
Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the
More informationC/CS/Phy191 Problem Set 3 Solutions Out: Oct 1, 2008., where ( 00. ), so the overall state of the system is ) ( ( ( ( 00 ± 11 ), Φ ± = 1
C/CS/Phy9 Problem Set 3 Solutons Out: Oct, 8 Suppose you have two qubts n some arbtrary entangled state ψ You apply the teleportaton protocol to each of the qubts separately What s the resultng state obtaned
More informationNUMERICAL DIFFERENTIATION
NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the
More informationQuantum secure circuit evaluation
Scence n Chna Ser. F Informaton Scences 2004 Vol.47 No.6 717 727 717 Quantum secure crcut evaluaton CHEN Huanhuan, LI Bn & ZHUANG Zhenquan Department of Electronc Scence and Technology, Unversty of Scence
More informationDeterminants Containing Powers of Generalized Fibonacci Numbers
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol 19 (2016), Artcle 1671 Determnants Contanng Powers of Generalzed Fbonacc Numbers Aram Tangboonduangjt and Thotsaporn Thanatpanonda Mahdol Unversty Internatonal
More informationAn Improved multiple fractal algorithm
Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton
More informationU.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016
U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and
More information2.3 Nilpotent endomorphisms
s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms
More informationMEM 255 Introduction to Control Systems Review: Basics of Linear Algebra
MEM 255 Introducton to Control Systems Revew: Bascs of Lnear Algebra Harry G. Kwatny Department of Mechancal Engneerng & Mechancs Drexel Unversty Outlne Vectors Matrces MATLAB Advanced Topcs Vectors A
More informationA Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition
(IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer
More informationLOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin
Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence
More informationQuantum and Classical Information Theory with Disentropy
Quantum and Classcal Informaton Theory wth Dsentropy R V Ramos rubensramos@ufcbr Lab of Quantum Informaton Technology, Department of Telenformatc Engneerng Federal Unversty of Ceara - DETI/UFC, CP 6007
More information7. Products and matrix elements
7. Products and matrx elements 1 7. Products and matrx elements Based on the propertes of group representatons, a number of useful results can be derved. Consder a vector space V wth an nner product ψ
More informationSalmon: Lectures on partial differential equations. Consider the general linear, second-order PDE in the form. ,x 2
Salmon: Lectures on partal dfferental equatons 5. Classfcaton of second-order equatons There are general methods for classfyng hgher-order partal dfferental equatons. One s very general (applyng even to
More informationHardening the ElGamal Cryptosystem in the Setting of the Second Group of Units
54 The Internatonal Arab Journal of Informaton Technology, Vol., o. 5, September 204 Hardenng the ElGamal Cryptosystem n the Settng of the Second Group of Unts Ramz Haraty, Abdulasser ElKassar, and Suzan
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationBinomial transforms of the modified k-fibonacci-like sequence
Internatonal Journal of Mathematcs and Computer Scence, 14(2019, no. 1, 47 59 M CS Bnomal transforms of the modfed k-fbonacc-lke sequence Youngwoo Kwon Department of mathematcs Korea Unversty Seoul, Republc
More informationLectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More informationA MORE SECURE MFE MULTIVARIATE PUBLIC KEY ENCRYPTION SCHEME *
Internatonal Journal of Computer Scence and Applcatons Vol No pp - 00 Technomathematcs Research Foundaton A ORE SECURE FE ULTIVARIATE PUBLIC KE ENCRPTION SCHEE n Wang School of Telecommuncatons Engneerng
More information9 Characteristic classes
THEODORE VORONOV DIFFERENTIAL GEOMETRY. Sprng 2009 [under constructon] 9 Characterstc classes 9.1 The frst Chern class of a lne bundle Consder a complex vector bundle E B of rank p. We shall construct
More informationarxiv: v1 [math.ho] 18 May 2008
Recurrence Formulas for Fbonacc Sums Adlson J. V. Brandão, João L. Martns 2 arxv:0805.2707v [math.ho] 8 May 2008 Abstract. In ths artcle we present a new recurrence formula for a fnte sum nvolvng the Fbonacc
More information763622S ADVANCED QUANTUM MECHANICS Solution Set 1 Spring c n a n. c n 2 = 1.
7636S ADVANCED QUANTUM MECHANICS Soluton Set 1 Sprng 013 1 Warm-up Show that the egenvalues of a Hermtan operator  are real and that the egenkets correspondng to dfferent egenvalues are orthogonal (b)
More informationZeros and Zero Dynamics for Linear, Time-delay System
UNIVERSITA POLITECNICA DELLE MARCHE - FACOLTA DI INGEGNERIA Dpartmento d Ingegnerua Informatca, Gestonale e dell Automazone LabMACS Laboratory of Modelng, Analyss and Control of Dynamcal System Zeros and
More informationCHARACTERISTICS OF COMPLEX SEPARATION SCHEMES AND AN ERROR OF SEPARATION PRODUCTS OUTPUT DETERMINATION
Górnctwo Geonżynera Rok 0 Zeszyt / 006 Igor Konstantnovch Mladetskj * Petr Ivanovch Plov * Ekaterna Nkolaevna Kobets * Tasya Igorevna Markova * CHARACTERISTICS OF COMPLEX SEPARATION SCHEMES AND AN ERROR
More informationarxiv:cs.cv/ Jun 2000
Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São
More informationCHAPTER IV RESEARCH FINDING AND ANALYSIS
CHAPTER IV REEARCH FINDING AND ANALYI A. Descrpton of Research Fndngs To fnd out the dfference between the students who were taught by usng Mme Game and the students who were not taught by usng Mme Game
More informationCHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE
CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng
More informationFrom the Euclidean Algorithm for Solving a Key Equation for Dual Reed Solomon Codes to the Berlekamp-Massey Algorithm
1 / 32 From the Eucldean Algorthm for Solvng a Key Equaton for Dual Reed Solomon Codes to the Berlekamp-Massey Algorthm Mara Bras-Amorós, Mchael E O Sullvan The Claude Shannon Insttute Workshop on Codng
More informationA CLASS OF RECURSIVE SETS. Florentin Smarandache University of New Mexico 200 College Road Gallup, NM 87301, USA
A CLASS OF RECURSIVE SETS Florentn Smarandache Unversty of New Mexco 200 College Road Gallup, NM 87301, USA E-mal: smarand@unmedu In ths artcle one bulds a class of recursve sets, one establshes propertes
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationPower law and dimension of the maximum value for belief distribution with the max Deng entropy
Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng
More informationMMA and GCMMA two methods for nonlinear optimization
MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons
More informationHyper-Sums of Powers of Integers and the Akiyama-Tanigawa Matrix
6 Journal of Integer Sequences, Vol 8 (00), Artcle 0 Hyper-Sums of Powers of Integers and the Ayama-Tangawa Matrx Yoshnar Inaba Toba Senor Hgh School Nshujo, Mnam-u Kyoto 60-89 Japan nava@yoto-benejp Abstract
More informationApplied Mathematics Letters
Appled Matheatcs Letters 2 (2) 46 5 Contents lsts avalable at ScenceDrect Appled Matheatcs Letters journal hoepage: wwwelseverco/locate/al Calculaton of coeffcents of a cardnal B-splne Gradr V Mlovanovć
More informationSome Comments on Accelerating Convergence of Iterative Sequences Using Direct Inversion of the Iterative Subspace (DIIS)
Some Comments on Acceleratng Convergence of Iteratve Sequences Usng Drect Inverson of the Iteratve Subspace (DIIS) C. Davd Sherrll School of Chemstry and Bochemstry Georga Insttute of Technology May 1998
More informationInternational Journal of Pure and Applied Sciences and Technology
Int. J. Pure Appl. Sc. Technol., 4() (03), pp. 5-30 Internatonal Journal of Pure and Appled Scences and Technology ISSN 9-607 Avalable onlne at www.jopaasat.n Research Paper Schrödnger State Space Matrx
More informationCHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00
CHALMERS GÖTEBORGS UNIVERSITET CRYPTOGRAPHY TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00 No extra materal s allowed durng the exam except for pens and a smple calculator (not smartphones).
More informationThe Degrees of Nilpotency of Nilpotent Derivations on the Ring of Matrices
Internatonal Mathematcal Forum, Vol. 6, 2011, no. 15, 713-721 The Degrees of Nlpotency of Nlpotent Dervatons on the Rng of Matrces Homera Pajoohesh Department of of Mathematcs Medgar Evers College of CUNY
More informationHigh resolution entropy stable scheme for shallow water equations
Internatonal Symposum on Computers & Informatcs (ISCI 05) Hgh resoluton entropy stable scheme for shallow water equatons Xaohan Cheng,a, Yufeng Ne,b, Department of Appled Mathematcs, Northwestern Polytechncal
More informationAn Introduction to Morita Theory
An Introducton to Morta Theory Matt Booth October 2015 Nov. 2017: made a few revsons. Thanks to Nng Shan for catchng a typo. My man reference for these notes was Chapter II of Bass s book Algebrac K-Theory
More informationTransfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system
Transfer Functons Convenent representaton of a lnear, dynamc model. A transfer functon (TF) relates one nput and one output: x t X s y t system Y s The followng termnology s used: x y nput output forcng
More informationFeb 14: Spatial analysis of data fields
Feb 4: Spatal analyss of data felds Mappng rregularly sampled data onto a regular grd Many analyss technques for geophyscal data requre the data be located at regular ntervals n space and/or tme. hs s
More informationMA 323 Geometric Modelling Course Notes: Day 13 Bezier Curves & Bernstein Polynomials
MA 323 Geometrc Modellng Course Notes: Day 13 Bezer Curves & Bernsten Polynomals Davd L. Fnn Over the past few days, we have looked at de Casteljau s algorthm for generatng a polynomal curve, and we have
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More informationAlgebraic properties of polynomial iterates
Algebrac propertes of polynomal terates Alna Ostafe Department of Computng Macquare Unversty 1 Motvaton 1. Better and cryptographcally stronger pseudorandom number generators (PRNG) as lnear constructons
More informationREGULAR POSITIVE TERNARY QUADRATIC FORMS. 1. Introduction
REGULAR POSITIVE TERNARY QUADRATIC FORMS BYEONG-KWEON OH Abstract. A postve defnte quadratc form f s sad to be regular f t globally represents all ntegers that are represented by the genus of f. In 997
More informationA new Approach for Solving Linear Ordinary Differential Equations
, ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of
More informationA PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS
HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,
More informationAppendix B. The Finite Difference Scheme
140 APPENDIXES Appendx B. The Fnte Dfference Scheme In ths appendx we present numercal technques whch are used to approxmate solutons of system 3.1 3.3. A comprehensve treatment of theoretcal and mplementaton
More informationCONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION
CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala
More informationInner Product. Euclidean Space. Orthonormal Basis. Orthogonal
Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More information1 GSW Iterative Techniques for y = Ax
1 for y = A I m gong to cheat here. here are a lot of teratve technques that can be used to solve the general case of a set of smultaneous equatons (wrtten n the matr form as y = A), but ths chapter sn
More informationConstruction of Serendipity Shape Functions by Geometrical Probability
J. Basc. Appl. Sc. Res., ()56-56, 0 0, TextRoad Publcaton ISS 00-0 Journal of Basc and Appled Scentfc Research www.textroad.com Constructon of Serendpty Shape Functons by Geometrcal Probablty Kamal Al-Dawoud
More informationPauli measurements are universal
QPL 2005 Prelmnary Verson Paul measurements are unversal Vncent Danos 1 CNRS & Unversté Pars 7 Elham Kashef 2 IQC & Unversty of Waterloo Abstract We show that a varant of the one-way model where one only
More information