Advanced Cryptography Midterm Exam
|
|
- Marcia Octavia Daniel
- 5 years ago
- Views:
Transcription
1 Advanced Crytograhy Midterm Exam Solution Serge Vaudenay duration: 3h00 any document is allowed a ocket calculator is allowed communication devices are not allowed the exam invigilators will not answer any technical uestion during the exam the answers to each exercise must be rovided on searate sheets readability and style of writing will be art of the grade do not forget to ut your name on every sheet! 1 Circular RSA Encrytion Let n and d e 1 mod ϕn define an RSA key air. For some reason, we need to encryt with the lain RSA crytosystem. Q.1 If y decryts to, show that an adversary who has only the ublic key at disosal can decryt y. Hint: think modulo. If y e mod n, then y mod 0 and y mod is in Z since and are different rime numbers, is corime with so is invertible modulo, so y as well. Hence, gcdy,n so the adversary recovers easily. 2 The Goldwasser-Micali Crytosystem Consider the grou Z n. We recall that if m is an odd factor of n, then the Jacobi symbol x x m is a grou homomorhism from Z n to { 1,+1}. I.e., xy mod n m x y m m. It further has the roerty that x mm x x m m. We consider that multilication in Zn and the comutation of the above Jacobi symbol can each be done in Ologn 2. Let s be a security arameter. We consider the following ublic-key crytosystem. Key Generation. Generate two different odd rime numbers and of bit size s, comute n, and find some z Z n such that z z 1. The ublic key is n,z and the secret key is. Encrytion. To encryt a bit b {0,1}, ick r U Z n and comute c r 2 z b mod n. The cihertext is c. Decrytion. To decryt c, comute c and find b such that it euals 1 b. The laintext is b. This crytosystem is known as the Goldwasser-Micali crytosystem.
2 Q.1 Show that the crytosystem is correct. I.e., if the key generation gives n,z and, if b is any bit, if the encrytion of b with the key n,z roduces c, then the decrytion of c with the key roduces b. y construction, we have n, z 1, and c r 2 z b mod n. We have c r 2 z b since divides n. Thus, c So, the decrytion of c roduces b. r 2 z b z b 1 b Q.2 Analyze the comlexity of the three algorithms in terms of s. Key generation: to generate the rimes and of bit size s reuires Os 4 by using Miller- Rabin rimality testing, suare-and-multily exonentiation, and schoolbook multilication. The Legendre symbol reuires Os 2 which is negligible, as well as comuting n. So, key generation works in Os 4. Encrytion: this reuires a constant number of multilications which are Os 2. Decrytion: this reuires a Legendre symbol, so Os 2 as well. Q.3 Let N be the set of all n s which could be generated by the key generation algorithm. Let Fact be the roblem in which an instance is secified by n N and the solution is the factoring of n. Q.3a Define the key recovery roblem KR related to the crytosystem. For this, secify clearly what is its set of instances and what is the solution of a given instance. z 1 where In the KR roblem, an instance is a air n,z such that n N and z n is the factoring of n. The solution to the roblem is. Or, euivalently, which lays a symmetric role. Q.3b Show that the KR roblem is euivalent to the Fact roblem. Give the actual Turing reduction in both directions. Clearly, factoring n solves the roblem: by submitting n to an oracle solving Fact, we get and so we can yield. Conversely, with an oracle solving the KR roblem, we can define an algorithm to factor n. For this, we just need to find one z satisfying z solving KR. y construction, we have z z n z z 1 1 and feed n,z to the oracle If we ick a random z satisfying z n 1, we have z z but this can be 1 or 1. If this is 1 which haens with robability 1 2, feeding n,z to the KR oracle yield. We can check that solve the Fact roblem and sto. If it is +1, it is bad luck as we have a bad z and we don t know. Thus, feeding n,z to the KR oracle may give anything. However, if it gives something which solves the Fact oracle, we are hay anyway and we can sto. Otherwise, we can start again with a new z. Eventually, we find a good z and the solution to Fact. So, KR and Fact are euivalent. 2
3 Q.4 Let QR be the roblem in which an instance is secified by a air n,c in which n N and c n 1. The roblem is to decide whether or not c is a uadratic residue in Z n. Q.4a Define the decrytion roblem DP related to the crytosystem. For this, secify clearly what is its set of instances and what is the solution of a given instance. In the DP roblem, an instance is defined by a trilet n,z,c where n N let write n, z Z n is a non-uadratic residue with z n 1, and c r 2 z b mod n for some r Z n and a bit b. The roblem is to find b. Q.4b Show that the DP roblem is euivalent to the QR roblem. Give the actual Turing reduction in both directions. Clearly, with an oracle solving QR, we can solve DP: we just submit n,c to the QR oracle and obtain b. Indeed, r 2 z b mod n is a uadratic residue if and only if b 0. To show the converse, we assume an oracle O solving the DP roblem and construct an algorithm to solve the QR one. Given a QR instance n,c, we ick z Z n such that z n 1 and consider the function f z : y On,z,y. If z is a uadratic residue, we observe that for any b, r 2 z b mod n is uniformly distributed in the set of uadratic residues modulo n. So, this is indeendent from b. Thus, f z r 2 z b mod n is a random bit indeendent from b. If now z is a non-uadratic residue, f z r 2 z b mod n b. y taking b uniformly distributed, we can easily identify in which case we are. We can thus iterate until we have a good z which is a non-uadratic residue. Then, we can comute f z c and get the solution to the QR roblem. So, DP and QR are euivalent. 3 Faulty Multilier Let be a basis. Given some integers x 0,...,x n 1, we say that the seuence [x n 1,...,x 0 ] reresents x if n 1 x i0 We say that [x n 1,...,x 0 ] is a reduced seuence if 0 x i 1 for all i 0,...,n 1. We say that a number x contains a block a if there exists n and a reduced seuence [x n 1,...,x 0 ] reresenting x, and some i such that a x i. We consider the schoolbook algorithms for addition and multilication. These are the methods that children learn at school for 10 and reduced seuences. We extend them to any value. We work with a microrocessor using a built-in bit to 64-bit hardware multilication. Each bit to 64-bit multilication is called an elementary multilication. So, in the next we let We assume that there is a bug such that the result is always correct excet when the first oerand is a secial a 0 value and the second one is a secial b 0 value in which case the result is a constant c 0 which is not eual to a 0 b 0. Q.1 Let a,b,c,u,v be five 32-bit blocks. Let x be reresented by [a,b,c] and y be reresented by [u,v]. Using the schoolbook multilication algorithm in basis to multily x by y, give the list of elementary multilications which are reuired to comute xy. x i i The schoolbook algorithm makes u [a,b,c,0] + v [a,b,c]. So, it erforms av, bv, cv as in xv and also au, bu, cu as in xu. It obtains [au,bu,cu,0] + [av,bv,cv] [au,bu + av,cu + bv,cv]. It then erforms a reduction to obtain a reduced seuence reresenting xy. 3
4 Q.2 Let w b0 3 a 0 and y be reresented by [w,a 0 ]. Assume that b Deduce that y contains the block a 0 and that y 2 contains the block b 0. Hint: first show that b0 + 1 b 0 1 then show that b a 0 and deduce that b > y b 0 3. > w b0 3 a 0 Since [w,a 0 ] is a reduced seuence reresenting y, a 0 is trivially in y. We have b0 + 1 b 0 b b 0 If b 0 4 1, the denominator is uer bounded by. So, b0 + 1 b0 + 1 b 0 3 a 0 b0 3 a 0 1 Since w is the ceiling of b0 3 a 0, we obtain b a 0 > w b0 3 a 0 Now, y w + a 0. So, b 0 3 y 2 < b from which we deduce that y 2 starts with the 32-bit block b 0. Clearly, y ends with the 32-bit block a 0. It is unlikely that b 0 aears in y, nor that a 0 aears in y 2. In what follows, we assume that y does not contain the block b 0 and that y 2 does not contain the block a 0. Q.3 Assume we want to raise y to some ower k modulo n using the suare-and-multily with scanning of the bits of the exonent from left to right. The leading bit of the exonent k being 1, let b denote the second leading bit of k. Q.3a Give the list of all multilications this algorithm does when scanning these two bits in the two cases: i.e., for b 0 and b 1. When scanning the first bit, it multilies y by 1. The accumulator become eual to y. Then, it suares the accumulator and looks at the second bit. If it is 0, it does nothing more. Otherwise, it multilies the accumulator by y. So, for b 0, it comutes 1 y, y 2, and that s it. For b 1, it comutes 1 y, y 2, and y 2 y. Q.3b Show that for the y from Q.2, this algorithm is likely to comute y k mod n correctly when b 0 whereas it does a comutation error when b 1. In the b 1 case, it multilies y containing a 0 by y 2 containing b 0. Due to the schoolbook algorithm, this reuires the bogus a 0 b 0 elementary oeration so it makes an error. In the b 0 case, it never needs to multily y by y 2. So, it is unlikely that the bogus a 0 b 0 oeration occurs. 4
5 Q.4 We assume a tamer-roof device imlementing the RSA decrytion with CRT acceleration, suare-and-multily with scanning of the bits of the exonent from left to right, and the schoolbook multilication algorithm. Q.4a Assuming that the second leading bits of d mod 1 and d mod 1 are different, using the y of Q.2, give an algorithm roducing x such that x e mod n is eual to y modulo either or but not modulo both. The CRT exonentiation comutes y mod d mod 1 mod and y mod d mod 1 mod. Since y is small, y mod y mod y. So, it comutes y d mod 1 mod and y d mod 1 mod. If the second leading bits of d mod 1 and d mod 1 are different, one error will occur in exactly one of these oerations. So, after CRT reconstruction, the result x will be eual to y d modulo either or but not both. So, x e mod n will be eual to y modulo either or but not both. Q.4b Deduce a factoring attack on RSA using this device. After getting x, we comute gcdx e y mod n,n which is a non-trivial factor of n. 4 Tradoor Sbox Let n be an integer. We consider the set Z n 2 as a vector sace. Given a vector x, x k denotes its k-th comonent which is a bit. Additions are imlicitly takes modulo 2. Product of bits are also imlicitly taken modulo 2. The dot roduct α x between two vectors means n k1 α kx k. We also multily a bit by a vector by multilying the bit to each comonent. Let α,β,γ Z n 2. Let i and j be two fixed indices such that α i β j 1 and γ j 0. Let w be the total number of bits set to 1 in γ. Let A be the subset of Z n 2 of all tules in which the i-th comonent is zero. Let be the subset of Z n 2 of all tules in which the j-th comonent is zero. Let ϕ be a bijection from A to. Let be a function from Z n 2 to A defined by x k x k for all k i and x i 0. Let v 0,...,0,1,0,...,0 Z n 2 be a constant vector, where v j 1. We construct a function S on Z n 2 as follows. Sx ϕx + α x + β ϕx + ϕx k v Q.1 Show that S is a ermutation. Hint: show that Sx Sx imlies x x for any x and x and show that Sx+u Sx+v for a constant vector u and any x. Let be a function from Z n 2 to defined by v k v k for all k j and v j 0. Since is linear, since v 0, and since v v for v, we have Sx ϕx. So, Sx Sx imlies ϕx ϕx. Since ϕ is a bijection, this imlies x x. So, either x x, or x and x only differ by their i-th bit. Let u Z n 2 such that u i 1 and u is the null vector. Since x x + u, we have Sx + u Sx + v. So, x and x + u do not have the same S-image. Finally, Sx Sx imlies x x. That is, S is a ermutation. 5
6 Q.2 Comute LP S α,β. Hint: first give a simle exression of α x + β Sx. We have β Sx β ϕx + α x + β ϕx + ϕx k β v Since β j 1 and v j is the only comonent of v set to 1, we have β v 1. So, β Sx β ϕx + α x + β ϕx + ϕx k α x + ϕx k Thus, α x + β Sx ϕx k Since ϕx is uniformly distributed in when x is uniformly distributed in Z n 2, and since γ j 0, we have Pr[α x + β Sx] 2 w where w is the number of comonents of γ set to 1. Finally, we obtain LP S α,β w 2 Q.3 Deduce a way to construct an Sbox with a given high LP S α,β. We select i, j such that α i β j 1. Then, we ick γ such that γ j 0 and with many comonents set to 1 the more 1 s, the larger LP. Then, we ick a ermutation ϕ from A to. The roosed construction for S is a ermutation over Z n 2 which has a large LP Sα,β. 6
Public Key Cryptosystems RSA
Public Key Crytosystems RSA 57 17 Receiver Sender 41 19 and rime 53 Attacker 47 Public Key Crytosystems RSA Comute numbers n = * 2337 323 57 17 Receiver Sender 41 19 and rime 53 Attacker 2491 47 Public
More informationCS 6260 Some number theory. Groups
Let Z = {..., 2, 1, 0, 1, 2,...} denote the set of integers. Let Z+ = {1, 2,...} denote the set of ositive integers and = {0, 1, 2,...} the set of non-negative integers. If a, are integers with > 0 then
More informationCryptography Assignment 3
Crytograhy Assignment Michael Orlov orlovm@cs.bgu.ac.il) Yanik Gleyzer yanik@cs.bgu.ac.il) Aril 9, 00 Abstract Solution for Assignment. The terms in this assignment are used as defined in [1]. In some
More informationJacobi symbols and application to primality
Jacobi symbols and alication to rimality Setember 19, 018 1 The grou Z/Z We review the structure of the abelian grou Z/Z. Using Chinese remainder theorem, we can restrict to the case when = k is a rime
More informationCryptanalysis of Pseudorandom Generators
CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we
More informationEfficient Cryptosystems From 2 k -th Power Residue Symbols
Efficient Crytosystems From k -th Power Residue Symbols Fabrice Benhamouda, Javier Herranz, Marc Joye 3, and Benoît Libert 4, ENS Paris, CNRS, INRIA, and PSL 45 rue d Ulm, 7530 Paris Cedex 06, France fabrice.benhamouda@ens.fr
More informationCDH/DDH-Based Encryption. K&L Sections , 11.4.
CDH/DDH-Based Encrytion K&L Sections 8.3.1-8.3.3, 11.4. 1 Cyclic grous A finite grou G of order q is cyclic if it has an element g of q. { 0 1 2 q 1} In this case, G = g = g, g, g,, g ; G is said to be
More informationEfficient Cryptosystems From 2 k -th Power Residue Symbols
Published in Journal of Crytology, 30(2:519 549, 2017. Efficient Crytosystems From 2 k -th Power Residue Symbols Fabrice Benhamouda 1, Javier Herranz 2, Marc Joye 3, and Benoît Libert 4, 1 ES Paris, CRS,
More informationCryptography and Security Midterm Exam
Cryptography and Security Midterm Exam Serge Vaudenay 23.11.2017 duration: 1h45 no documents allowed, except one 2-sided sheet of handwritten notes a pocket calculator is allowed communication devices
More informationElliptic Curves and Cryptography
Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a
More informationRECIPROCITY LAWS JEREMY BOOHER
RECIPROCITY LAWS JEREMY BOOHER 1 Introduction The law of uadratic recirocity gives a beautiful descrition of which rimes are suares modulo Secial cases of this law going back to Fermat, and Euler and Legendre
More informationLattice Attacks on the DGHV Homomorphic Encryption Scheme
Lattice Attacks on the DGHV Homomorhic Encrytion Scheme Abderrahmane Nitaj 1 and Tajjeeddine Rachidi 2 1 Laboratoire de Mathématiques Nicolas Oresme Université de Caen Basse Normandie, France abderrahmanenitaj@unicaenfr
More informationCryptography. Lecture 8. Arpita Patra
Crytograhy Lecture 8 Arita Patra Quick Recall and Today s Roadma >> Hash Functions- stands in between ublic and rivate key world >> Key Agreement >> Assumtions in Finite Cyclic grous - DL, CDH, DDH Grous
More informationMATH342 Practice Exam
MATH342 Practice Exam This exam is intended to be in a similar style to the examination in May/June 2012. It is not imlied that all questions on the real examination will follow the content of the ractice
More informationMath 261 Exam 2. November 7, The use of notes and books is NOT allowed.
Math 261 Eam 2 ovember 7, 2018 The use of notes and books is OT allowed Eercise 1: Polynomials mod 691 (30 ts In this eercise, you may freely use the fact that 691 is rime Consider the olynomials f( 4
More informationImproved Hidden Vector Encryption with Short Ciphertexts and Tokens
Imroved Hidden Vector Encrytion with Short Cihertexts and Tokens Kwangsu Lee Dong Hoon Lee Abstract Hidden vector encrytion HVE) is a articular kind of redicate encrytion that is an imortant crytograhic
More informationPythagorean triples and sums of squares
Pythagorean triles and sums of squares Robin Chaman 16 January 2004 1 Pythagorean triles A Pythagorean trile (x, y, z) is a trile of ositive integers satisfying z 2 + y 2 = z 2. If g = gcd(x, y, z) then
More informationCryptography and Security Midterm Exam
Cryptography and Security Midterm Exam Solution Serge Vaudenay 25.11.2015 duration: 1h45 no documents allowed, except one 2-sided sheet of handwritten notes a pocket calculator is allowed communication
More informationSQUARES IN Z/NZ. q = ( 1) (p 1)(q 1)
SQUARES I Z/Z We study squares in the ring Z/Z from a theoretical and comutational oint of view. We resent two related crytograhic schemes. 1. SQUARES I Z/Z Consider for eamle the rime = 13. Write the
More informationBilinear Entropy Expansion from the Decisional Linear Assumption
Bilinear Entroy Exansion from the Decisional Linear Assumtion Lucas Kowalczyk Columbia University luke@cs.columbia.edu Allison Bisho Lewko Columbia University alewko@cs.columbia.edu Abstract We develo
More informationTanja Lange Technische Universiteit Eindhoven
Crytanalysis Course Part I Tanja Lange Technische Universiteit Eindhoven 28 Nov 2016 with some slides by Daniel J. Bernstein Main goal of this course: We are the attackers. We want to break ECC and RSA.
More informationA Public-Key Cryptosystem Based on Lucas Sequences
Palestine Journal of Mathematics Vol. 1(2) (2012), 148 152 Palestine Polytechnic University-PPU 2012 A Public-Key Crytosystem Based on Lucas Sequences Lhoussain El Fadil Communicated by Ayman Badawi MSC2010
More informationEfficient Cryptosystems From 2 k -th Power Residue Symbols
Efficient Crytosystems From 2 k -th Power Residue Symbols Marc Joye and Benoît Libert Technicolor 975 avenue des Chams Blancs, 35576 Cesson-Sévigné Cedex, France {marc.joye,benoit.libert}@technicolor.com
More informationIntroduction to Arithmetic Geometry Fall 2013 Lecture #10 10/8/2013
18.782 Introduction to Arithmetic Geometry Fall 2013 Lecture #10 10/8/2013 In this lecture we lay the groundwork needed to rove the Hasse-Minkowski theorem for Q, which states that a quadratic form over
More informationQuadratic Reciprocity
Quadratic Recirocity 5-7-011 Quadratic recirocity relates solutions to x = (mod to solutions to x = (mod, where and are distinct odd rimes. The euations are oth solvale or oth unsolvale if either or has
More informationMATH 361: NUMBER THEORY EIGHTH LECTURE
MATH 361: NUMBER THEORY EIGHTH LECTURE 1. Quadratic Recirocity: Introduction Quadratic recirocity is the first result of modern number theory. Lagrange conjectured it in the late 1700 s, but it was first
More informationx 2 a mod m. has a solution. Theorem 13.2 (Euler s Criterion). Let p be an odd prime. The congruence x 2 1 mod p,
13. Quadratic Residues We now turn to the question of when a quadratic equation has a solution modulo m. The general quadratic equation looks like ax + bx + c 0 mod m. Assuming that m is odd or that b
More informationMATH 371 Class notes/outline October 15, 2013
MATH 371 Class notes/outline October 15, 2013 More on olynomials We now consider olynomials with coefficients in rings (not just fields) other than R and C. (Our rings continue to be commutative and have
More informationQUADRATIC RECIPROCITY
QUADRATIC RECIPROCIT POOJA PATEL Abstract. This aer is an self-contained exosition of the law of uadratic recirocity. We will give two roofs of the Chinese remainder theorem and a roof of uadratic recirocity.
More informationProbabilistic Algorithms
Probabilistic Algorithms Klaus Sutner Carnegie Mellon University Fall 2017 1 Some Probabilistic Algorithms Probabilistic Primality Testing RP and BPP Where Are We? 3 Examle 1: Order Statistics 4 We have
More informationMA3H1 TOPICS IN NUMBER THEORY PART III
MA3H1 TOPICS IN NUMBER THEORY PART III SAMIR SIKSEK 1. Congruences Modulo m In quadratic recirocity we studied congruences of the form x 2 a (mod ). We now turn our attention to situations where is relaced
More informationOutline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding
Outline EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Error detection using arity Hamming code for error detection/correction Linear Feedback Shift
More information.4. Congruences. We say that a is congruent to b modulo N i.e. a b mod N i N divides a b or equivalently i a%n = b%n. So a is congruent modulo N to an
. Modular arithmetic.. Divisibility. Given ositive numbers a; b, if a 6= 0 we can write b = aq + r for aroriate integers q; r such that 0 r a. The number r is the remainder. We say that a divides b (or
More informationON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS
#A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,
More informationMAS 4203 Number Theory. M. Yotov
MAS 4203 Number Theory M. Yotov June 15, 2017 These Notes were comiled by the author with the intent to be used by his students as a main text for the course MAS 4203 Number Theory taught at the Deartment
More informationPseudorandom Sequence Generation
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Crytograhy and Comuter Security Handout #21 Professor M. J. Fischer November 29, 2005 Pseudorandom Seuence Generation 1 Distinguishability and
More informationt s (p). An Introduction
Notes 6. Quadratic Gauss Sums Definition. Let a, b Z. Then we denote a b if a divides b. Definition. Let a and b be elements of Z. Then c Z s.t. a, b c, where c gcda, b max{x Z x a and x b }. 5, Chater1
More informationComputer arithmetic. Intensive Computation. Annalisa Massini 2017/2018
Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3
More informationδ(xy) = φ(x)δ(y) + y p δ(x). (1)
LECTURE II: δ-rings Fix a rime. In this lecture, we discuss some asects of the theory of δ-rings. This theory rovides a good language to talk about rings with a lift of Frobenius modulo. Some of the material
More informationarxiv:math/ v2 [math.nt] 21 Oct 2004
SUMS OF THE FORM 1/x k 1 + +1/x k n MODULO A PRIME arxiv:math/0403360v2 [math.nt] 21 Oct 2004 Ernie Croot 1 Deartment of Mathematics, Georgia Institute of Technology, Atlanta, GA 30332 ecroot@math.gatech.edu
More informationSQUAREFREE VALUES OF QUADRATIC POLYNOMIALS COURSE NOTES, 2015
SQUAREFREE VALUES OF QUADRATIC POLYNOMIALS COURSE NOTES, 2015 1. Squarefree values of olynomials: History In this section we study the roblem of reresenting square-free integers by integer olynomials.
More informationAlgebraic number theory LTCC Solutions to Problem Sheet 2
Algebraic number theory LTCC 008 Solutions to Problem Sheet ) Let m be a square-free integer and K = Q m). The embeddings K C are given by σ a + b m) = a + b m and σ a + b m) = a b m. If m mod 4) then
More informationA New and Optimal Chosen-message Attack on RSA-type Cryptosystems
Published in Y. Han, T. Okamoto, and S. Qing, eds, Information and Communications Security (ICICS 97), vol. 1334 of Lecture Notes in Comer Science,. 30-313, Sringer-Verlag, 1997. A New and Otimal Chosen-message
More informationISOSCELES TRIANGLES IN Q 3. Matt Noble Department of Mathematics, Middle Georgia State University, Macon, Georgia
#A9 INTEGERS 18 (2018) ISOSCELES TRIANGLES IN Q Matt Noble Deartment of Mathematics, Middle Georgia State University, Macon, Georgia matthew.noble@mga.edu Received: 7/2/17, Acceted: 2//18, Published: 2/19/18
More informationMATH 2710: NOTES FOR ANALYSIS
MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite
More informationBy Evan Chen OTIS, Internal Use
Solutions Notes for DNY-NTCONSTRUCT Evan Chen January 17, 018 1 Solution Notes to TSTST 015/5 Let ϕ(n) denote the number of ositive integers less than n that are relatively rime to n. Prove that there
More informationMATH 361: NUMBER THEORY ELEVENTH LECTURE
MATH 361: NUMBER THEORY ELEVENTH LECTURE The subjects of this lecture are characters, Gauss sums, Jacobi sums, and counting formulas for olynomial equations over finite fields. 1. Definitions, Basic Proerties
More informationMultiplicative group law on the folium of Descartes
Multilicative grou law on the folium of Descartes Steluţa Pricoie and Constantin Udrişte Abstract. The folium of Descartes is still studied and understood today. Not only did it rovide for the roof of
More informationPredicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Predicate Encrytion Suorting Disjunctions, Polynomial Equations, and Inner Products Jonathan Katz jkatz@cs.umd.edu Amit Sahai sahai@cs.ucla.edu Brent Waters bwaters@csl.sri.com Abstract Predicate encrytion
More informationMAT 311 Solutions to Final Exam Practice
MAT 311 Solutions to Final Exam Practice Remark. If you are comfortable with all of the following roblems, you will be very well reared for the midterm. Some of the roblems below are more difficult than
More informationMath 4400/6400 Homework #8 solutions. 1. Let P be an odd integer (not necessarily prime). Show that modulo 2,
MATH 4400 roblems. Math 4400/6400 Homework # solutions 1. Let P be an odd integer not necessarily rime. Show that modulo, { P 1 0 if P 1, 7 mod, 1 if P 3, mod. Proof. Suose that P 1 mod. Then we can write
More informationAn Overview of Witt Vectors
An Overview of Witt Vectors Daniel Finkel December 7, 2007 Abstract This aer offers a brief overview of the basics of Witt vectors. As an alication, we summarize work of Bartolo and Falcone to rove that
More informationElliptic Curves Spring 2015 Problem Set #1 Due: 02/13/2015
18.783 Ellitic Curves Sring 2015 Problem Set #1 Due: 02/13/2015 Descrition These roblems are related to the material covered in Lectures 1-2. Some of them require the use of Sage, and you will need to
More informationANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM
ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM JOHN BINDER Abstract. In this aer, we rove Dirichlet s theorem that, given any air h, k with h, k) =, there are infinitely many rime numbers congruent to
More informationChapter 3. Number Theory. Part of G12ALN. Contents
Chater 3 Number Theory Part of G12ALN Contents 0 Review of basic concets and theorems The contents of this first section well zeroth section, really is mostly reetition of material from last year. Notations:
More informationDiophantine Equations
Diohantine Equations Winter Semester 018/019 University of Bayreuth Michael Stoll Contents 1. Introduction and Examles 3. Aetizers 8 3. The Law of Quadratic Recirocity 1 Print version of October 5, 018,
More informationSection 0.10: Complex Numbers from Precalculus Prerequisites a.k.a. Chapter 0 by Carl Stitz, PhD, and Jeff Zeager, PhD, is available under a Creative
Section 0.0: Comlex Numbers from Precalculus Prerequisites a.k.a. Chater 0 by Carl Stitz, PhD, and Jeff Zeager, PhD, is available under a Creative Commons Attribution-NonCommercial-ShareAlike.0 license.
More information19th Bay Area Mathematical Olympiad. Problems and Solutions. February 28, 2017
th Bay Area Mathematical Olymiad February, 07 Problems and Solutions BAMO- and BAMO- are each 5-question essay-roof exams, for middle- and high-school students, resectively. The roblems in each exam are
More informationPOINTS ON CONICS MODULO p
POINTS ON CONICS MODULO TEAM 2: JONGMIN BAEK, ANAND DEOPURKAR, AND KATHERINE REDFIELD Abstract. We comute the number of integer oints on conics modulo, where is an odd rime. We extend our results to conics
More informationLinear diophantine equations for discrete tomography
Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,
More informationMobius Functions, Legendre Symbols, and Discriminants
Mobius Functions, Legendre Symbols, and Discriminants 1 Introduction Zev Chonoles, Erick Knight, Tim Kunisky Over the integers, there are two key number-theoretic functions that take on values of 1, 1,
More information3 Properties of Dedekind domains
18.785 Number theory I Fall 2016 Lecture #3 09/15/2016 3 Proerties of Dedekind domains In the revious lecture we defined a Dedekind domain as a noetherian domain A that satisfies either of the following
More informationCryptography and Security Final Exam
Cryptography and Security Final Exam Serge Vaudenay 29.1.2018 duration: 3h no documents allowed, except one 2-sided sheet of handwritten notes a pocket calculator is allowed communication devices are not
More information2 Asymptotic density and Dirichlet density
8.785: Analytic Number Theory, MIT, sring 2007 (K.S. Kedlaya) Primes in arithmetic rogressions In this unit, we first rove Dirichlet s theorem on rimes in arithmetic rogressions. We then rove the rime
More information1-way quantum finite automata: strengths, weaknesses and generalizations
1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum
More informationHotelling s Two- Sample T 2
Chater 600 Hotelling s Two- Samle T Introduction This module calculates ower for the Hotelling s two-grou, T-squared (T) test statistic. Hotelling s T is an extension of the univariate two-samle t-test
More informationPredicate Privacy in Encryption Systems
Predicate Privacy in Encrytion Systems Emily Shen MIT eshen@csail.mit.edu Elaine Shi CMU/PARC eshi@arc.com December 24, 2008 Brent Waters UT Austin bwaters@cs.utexas.edu Abstract Predicate encrytion is
More informationAn Attack on a Fully Homomorphic Encryption Scheme
An Attack on a Fully Homomorhic Encrytion Scheme Yuu Hu 1 and Fenghe Wang 2 1 Telecommunication School, Xidian University, 710071 Xi an, China 2 Deartment of Mathematics and Physics Shandong Jianzhu University,
More informationPractice Final Solutions
Practice Final Solutions 1. True or false: (a) If a is a sum of three squares, and b is a sum of three squares, then so is ab. False: Consider a 14, b 2. (b) No number of the form 4 m (8n + 7) can be written
More information2 Asymptotic density and Dirichlet density
8.785: Analytic Number Theory, MIT, sring 2007 (K.S. Kedlaya) Primes in arithmetic rogressions In this unit, we first rove Dirichlet s theorem on rimes in arithmetic rogressions. We then rove the rime
More informationA Modified Menezes-Vanstone Elliptic Curve Multi-Keys Cryptosystem
A Modified Menezes-Vanstone Ellitic Curve Multi-Keys Crytosystem By K.H. Rahouma Electrical Technology Deartment Technical College in Riyadh Riyadh, Kingdom of Saudi Arabia E-mail: kamel_rahouma@yahoo.com
More informationMA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES 2018
MA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES 2018 J. E. CREMONA Contents 0. Introduction: What is Number Theory? 2 Basic Notation 3 1. Factorization 4 1.1. Divisibility in Z 4 1.2. Greatest Common
More informationIntroduction to Group Theory Note 1
Introduction to Grou Theory Note July 7, 009 Contents INTRODUCTION. Examles OF Symmetry Grous in Physics................................. ELEMENT OF GROUP THEORY. De nition of Grou................................................
More informationCERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education
CERIAS Tech Reort 2010-01 The eriod of the Bell numbers modulo a rime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education and Research Information Assurance and Security Purdue University,
More informationDedekind sums and continued fractions
ACTA ARITHMETICA LXIII.1 (1993 edekind sums and continued fractions by R. R. Hall (York and M. N. Huxley (Cardiff Let ϱ(t denote the row-of-teeth function ϱ(t = [t] t + 1/2. Let a b c... r be ositive integers.
More informationON POLYNOMIAL SELECTION FOR THE GENERAL NUMBER FIELD SIEVE
MATHEMATICS OF COMPUTATIO Volume 75, umber 256, October 26, Pages 237 247 S 25-5718(6)187-9 Article electronically ublished on June 28, 26 O POLYOMIAL SELECTIO FOR THE GEERAL UMBER FIELD SIEVE THORSTE
More informationThe Arm Prime Factors Decomposition
The Arm Prime Factors Decomosition Arm Boris Nima arm.boris@gmail.com Abstract We introduce the Arm rime factors decomosition which is the equivalent of the Taylor formula for decomosition of integers
More informationQuaternionic Projective Space (Lecture 34)
Quaternionic Projective Sace (Lecture 34) July 11, 2008 The three-shere S 3 can be identified with SU(2), and therefore has the structure of a toological grou. In this lecture, we will address the question
More informationCryptography and Security Final Exam
Cryptography and Security Final Exam Serge Vaudenay 17.1.2017 duration: 3h no documents allowed, except one 2-sided sheet of handwritten notes a pocket calculator is allowed communication devices are not
More informationExercise Sheet Cryptography 1, 2011
Cryptography 1 http://www.cs.ut.ee/~unruh/crypto1-11/ Exercise Sheet Cryptography 1, 2011 Exercise 1 DES The Data Encryption Standard (DES) is a very famous and widely used block cipher. It maps 64-bit
More informationRound-off Errors and Computer Arithmetic - (1.2)
Round-off Errors and Comuter Arithmetic - (.). Round-off Errors: Round-off errors is roduced when a calculator or comuter is used to erform real number calculations. That is because the arithmetic erformed
More informationOn generalizing happy numbers to fractional base number systems
On generalizing hay numbers to fractional base number systems Enriue Treviño, Mikita Zhylinski October 17, 018 Abstract Let n be a ositive integer and S (n) be the sum of the suares of its digits. It is
More informationWeil s Conjecture on Tamagawa Numbers (Lecture 1)
Weil s Conjecture on Tamagawa Numbers (Lecture ) January 30, 204 Let R be a commutative ring and let V be an R-module. A quadratic form on V is a ma q : V R satisfying the following conditions: (a) The
More informationGraph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations
Grah-Decomosition-Based Frameworks for Subset-Cover Broadcast Encrytion and Efficient Instantiations Nuttaong Attraadung and Hideki Imai Imai Laboratory, Institute of Industrial Science, University of
More informationarxiv: v2 [math.nt] 9 Oct 2018
ON AN EXTENSION OF ZOLOTAREV S LEMMA AND SOME PERMUTATIONS LI-YUAN WANG AND HAI-LIANG WU arxiv:1810.03006v [math.nt] 9 Oct 018 Abstract. Let be an odd rime, for each integer a with a, the famous Zolotarev
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationNumber Theory Naoki Sato
Number Theory Naoki Sato 0 Preface This set of notes on number theory was originally written in 1995 for students at the IMO level. It covers the basic background material that an IMO
More informationMath 104B: Number Theory II (Winter 2012)
Math 104B: Number Theory II (Winter 01) Alina Bucur Contents 1 Review 11 Prime numbers 1 Euclidean algorithm 13 Multilicative functions 14 Linear diohantine equations 3 15 Congruences 3 Primes as sums
More informationBayesian System for Differential Cryptanalysis of DES
Available online at www.sciencedirect.com ScienceDirect IERI Procedia 7 (014 ) 15 0 013 International Conference on Alied Comuting, Comuter Science, and Comuter Engineering Bayesian System for Differential
More informationElementary Analysis in Q p
Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some
More informationThe Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001
The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001 The Hasse-Minkowski Theorem rovides a characterization of the rational quadratic forms. What follows is a roof of the Hasse-Minkowski
More informationAMS10 HW1 Grading Rubric
AMS10 HW1 Grading Rubric Problem 1 (16ts- ts/each). Left hand side is shown to equal right hand side using examles with real vectors. A vector sace is a set V on which two oerations, vector addition and
More informationHENSEL S LEMMA KEITH CONRAD
HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar
More informationModeling Chebyshev s Bias in the Gaussian Primes as a Random Walk
Modeling Chebyshev s Bias in the Gaussian Primes as a Random Walk Daniel J. Hutama July 18, 2016 Abstract One asect of Chebyshev s bias is the henomenon that a rime number,, modulo another rime number,,
More informationJohn Weatherwax. Analysis of Parallel Depth First Search Algorithms
Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel
More information#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS
#A47 INTEGERS 15 (015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS Mihai Ciu Simion Stoilow Institute of Mathematics of the Romanian Academy, Research Unit No. 5,
More informationMATH 3240Q Introduction to Number Theory Homework 7
As long as algebra and geometry have been searated, their rogress have been slow and their uses limited; but when these two sciences have been united, they have lent each mutual forces, and have marched
More informationConversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
Conversions among Several Classes of Predicate Encrytion and Alications to ABE with Various Comactness Tradeoffs Nuttaong Attraadung, Goichiro Hanaoka, and Shota Yamada National Institute of Advanced Industrial
More informationDUAL NUMBERS, WEIGHTED QUIVERS, AND EXTENDED SOMOS AND GALE-ROBINSON SEQUENCES. To Alexandre Alexandrovich Kirillov on his 3 4 th anniversary
DUAL NUMBERS, WEIGHTED QUIVERS, AND EXTENDED SOMOS AND GALE-ROBINSON SEQUENCES VALENTIN OVSIENKO AND SERGE TABACHNIKOV Abstract. We investigate a general method that allows one to construct new integer
More information1. Introduction. 2. Background of elliptic curve group. Identity-based Digital Signature Scheme Without Bilinear Pairings
Identity-based Digital Signature Scheme Without Bilinear Pairings He Debiao, Chen Jianhua, Hu Jin School of Mathematics Statistics, Wuhan niversity, Wuhan, Hubei, China, 43007 Abstract: Many identity-based
More information