Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University

Size: px
Start display at page:

Download "Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University"

Transcription

1 Key Establishment Potocols Cyptogaphy CS 507 Ekay Savas Sabanci Univesity

2 Key distibution poblem Secuity of the keys Even if the cyptogaphic algoithms & potocols ae cyptogaphically ulta-secue, a possible compomise of secet keys o pat of them will have gave consequences. How two (o moe) paties will exchange (agee on) keys fo secet communication if they ae unable to meet. Main poblem is to shae secet infomation fo symmetic cyptogaphy. Public key cyptogaphy keys ae stoed on public databases. 12/27/2002 Ekay Savas 2

3 Key Ageement Potocols Type of potocol wheeby a key is established by exchanging infomation between two paties. Each paty deives the secet key fom the infomation that is exchanged. Key exchange is best done using public key cyptogaphy. Diffie-Hellman potocol establishes a key with tansfe of two messages. Howeve, DH does not povide authentication. Station-to-Station potocol is authenticated vesion of DH potocol. 12/27/2002 Ekay Savas 3

4 DH Key Exchange (EC vesion) A basepoint P on E:y 2 x 3 + ax +b (mod p). Alice Bob s A s B pivate keys Q A = s A P Q B = s B P public keys Q B Q A s A Q B. s B Q A. R = (x, y ) = s A Q B = s B Q A = s A s B P K = Hash(x paam). (key deivation, IEEE P1363) 12/27/2002 Ekay Savas 4

5 The Intude-in-the-Middle Attack Alice Eve Bob s A s E s B Q A = s A P Q E = s E P Q B = s B P Q A, Q B Q E s A Q E = s A s E P K 1 =s E Q A =s A s E P K 2 = s E Q B = s B s E P Q E s B Q E =s B s E P 12/27/2002 Ekay Savas 5

6 Station-to-Station Potocol Authenticated key ageement potocol. Alice and Bob wants to shae a secet key to use in encyption function E K (.) Alice and Bob use thei pivate keys to sign the exchanged messages. Sign function : Sign pivatekey () Veify function : Veify publickey () Public keys ae obtained fom a public tusted data base Alice Bob s A s B pivate keys Q A = s A P Q B = s B P public keys 12/27/2002 Ekay Savas 6

7 Station-to-Station Potocol Alice Bob R = (x, y ) = s B Q A, K = Hash(x paam). E K (Sign sb (Q A, Q B )) R = s A Q B K = Hash(x paam) D K (Sign sb (Q A, Q B )) Veify QB (Sign sb (Q A, Q B )) E K (Sign sa (Q A, Q B )) D K (Sign sa (Q A, Q B )) Veify QA (Sign sa (Q A, Q B )) 12/27/2002 Ekay Savas 7

8 Confeence Keying SetupLage pime p and a geneato α in Z P *. Key Geneation Use U i selects a andom intege i 1 i p-2. Computes z i α i mod p and sends z i to each of the othe t-1 goup membes. Computation of key Each use U i,afte eceiving z i-1 and z i+1 computes i zi i i i x + 1 i i mod p + 1 = α 1 zi 1 and sends x i to othe membes 12/27/2002 Ekay Savas 8

9 Confeence Keying Afte eceiving x j fo 1 j t and j i, U i computes K t t 1 t i 1 i i+ 1 i+ ( t 3) xi+ ( t 2) = K = ( z ) i x x mx i mod p Example: Uses U 1, U 2, U 3 and U 4 selects 1, 2, 3 and 4 at andom z 1 α 1 mod p z 2 α 2 mod p z 3 α 3 mod p z 4 α 4 mod p 12/27/2002 Ekay Savas 9

10 12/27/2002 Ekay Savas 10 Confeence Keying x 1 α mod p x 2 α mod p x 3 α mod p x 4 α mod p mod ) ( p x x x z K = α mod ) ( p x x x z K = α

11 Key Pe-distibution Alice and Bob have to meet in advance to exchange secets in ode to geneate keys. When the shaed secet is compomised, they have to meet again. Eveything will be diffeent with a tusted thid paty, Tent. Tent will poduce a secet key K AB fo evey pai of uses, say (A, B), that will be used as a secet key. Tent is poweful enough to maintain a secue channel with eveyone. Tent will have to poduce n(n-1)/2 keys fo a goup of n use. 12/27/2002 Ekay Savas 11

12 Blom Key Pe-distibution Scheme This method educes the amount of infomation sent by the tusted authoity. Thee ae n uses. Select a lage pime p and let eveyone know it. 1. Each use U in the netwok is assigned a distinct numbe U (mod p). 2. Tent chooses thee secet andom numbes a, b, c (mod p). 3. Fo each use, Tent calculates the numbes a U a + b U (mod p), b U b + c U (mod p). 12/27/2002 Ekay Savas 12

13 Blom Key Pe-distibution Scheme 4. Tent sends a U, b U via his secue channel to U. 5. Each use U foms the linea polynomial g U (x) = a U + b U x 6. If Alice (A) wants to communicate with Bob (B), then Alice computes K AB = g A ( B ) while Bob computes K BA = g B ( A ) 7. It can be shown that K AB = K BA. So they can stat the secue communication. 12/27/2002 Ekay Savas 13

14 Example Conside a netwok consisting of Alice (A), Bob (B), and Chalie (C). Let p = 23 and let A = 11, B = 3, C = 2. Suppose Tent chooses the numbes a = 8, b = 3, c = 1. The coesponding linea polynomials of each use g A (x) = x g B (x) =17 + 6x g C (x) =14 + 5x 12/27/2002 Ekay Savas 14

15 Example It is now possible to calculate the keys K AB = g A ( B ) = 14 o K BA = g B ( A ) = 14 K AC = g A ( C ) = 0 o K CA = g C ( A ) = 0 K BC = g A ( C ) = 6 o K CB = g C ( B ) = 6 If two uses (Eve and Osca) shae thei secets (a E,b E ) and (a O, b O ) they can detemine a, b, c; theefoe they find all the pais of a U, b U O E 0 O a b c b a b E O O (mod p) 12/27/2002 Ekay Savas 15

16 Secuity of Blom s Scheme Since the deteminant of the matix is E O and U s is chosen to be distinct, the deteminant is nonzeo mod p, and theefoe the system has a solution. Without Eve s help, Osca has only 2 3 matix and he cannot find a, b, c. Suppose he wants to calculate the key K AB. Since K AB a + b A + b B + c A B (mod p). 12/27/2002 Ekay Savas 16

17 12/27/2002 Ekay Savas 17 Secuity of Blom s Scheme Osca has the following matix The deteminant is ( O A ) ( O B ) 0 (mod p). Then, thee is a solution a, b, c fo evey possible value of K AB. Thee ae Blom schemes that ae secue against a coalitions of at most k uses, but which succumb to conspiacies of k+1 uses. ) (mod p b a K c b a O O AB O O B A B A +

18 Key Distibution In key pe-distibution schemes, keys ae pedetemined and that thee is no easy way to change them. Keys must be changed afte cetain time. A class of key establishment potocols, known as tanspot potocols, povide two appoaches: 1. One paty to decide on a key and tansmit it to othe, Alice employs a secue potocol to tansmit the key 2. A tusted authoity, Tent, will act as a key seve. Alice equests a key fom Tent that is good fo a single session Tent sends this key to both Alice and Bob via a secue channel. 12/27/2002 Ekay Savas 18

19 Kebeos Kebeos is a eal-wold implementation of a symmetic key cyptogaphy potocol which povides secuity and authentication in key exchange between uses in a netwok. Suppots both entity authentication and key establishment. Kebeos oiginated fom a lage poject in M.I.T., called Athena. Athena was oiginally designed fo integating a huge netwok of wokstations so that students can secuely access thei files fom anywhee in the net. 12/27/2002 Ekay Savas 19

20 Kebeos Kebeos is based on a client-seve achitectue. A client is eithe a use o some softwae that has some tasks to accomplish. Send an , pint documents, mount devices, etc. Seves ae lage entities whose function is to povide sevices to the clients. The basic Kebeos model has the following paticipants 1. Cliff: a client 2. Simon: a seve 3. Tent: a tusted authoity (a.k.a authentication seve) 4. Gant: ticket-ganting seve. 12/27/2002 Ekay Savas 20

21 Kebeos Potocol Cliff equests a sevice fom Simon, But, they do not have any shaed infomation fo a secue tansmission. Kebeos give them a secet infomation secuely so that they can inteact secetly. The potocol begins with Cliff equesting cedentials (ticket) fom Tent so that he can authenticate himself to Simon. Tent shae a secet infomation (e.g. a passwod) with each use in the system. Tent plays the ole of Key Distibution Cente (KDC). They can use any secet ciphe algoithm. 12/27/2002 Ekay Savas 21

22 Simplified Kebeos Potocol Tent 2 1 Cliff 3 4 Simon 12/27/2002 Ekay Savas 22

23 Kebeos: Notation Cliff and Tent shae K TC Simon and Tent shae K TS E: encyption algoithm N C : a nonce chosen by Cliff T C : a timestamp chosen by Cliff k : a session key chosen by Tent. L: Validity peiod of the ticket (lifetime) Ticket S = E KST (k, C, L) Authenticato = E k (C, T C, C subkey ) 12/27/2002 Ekay Savas 23

24 Kebeos: Steps Step 1 Cliff geneates a nonce N C and sends the following message to Tent (C, S, N C ) Step 2 Tent geneates a new session key k, and defines the validity peiod (i.e. L) fo the ticket. He calculates Ticket S = E KST (k, C, L) and E KCT (k, N C, L, S) Step 3 Cliff decypts the non-ticket pat of the message using K CT and obtains k, N C, L, and S; saves L fo efeence and compaes N C and S against those in message sent in Step 1. 12/27/2002 Ekay Savas 24

25 Kebeos: Steps (cont.) Step 3 Cliff chooses a fesh T C and calculates Authenticato = E k (C, T C, C subkey ) and sends it along with Ticket S to Simon. Step 4 Simon eceives these messages, decypts Ticket S = E KST (k, C, L) using K ST.He obtains k which he uses to decypt Authenticato = E k (C, T C, C subkey ). Simon checks that The identifie fields in Authenticato and Ticket match. The timestamp T C in Authenticato is valid. Simon s local time is within the lifetime L specified in the ticket. 12/27/2002 Ekay Savas 25

26 Kebeos: Steps (cont.) If all the checks pass in Step 4, Simon declaes the authentication of Cliff successful. Step 5 (optional) Simon authenticates himself to Cliff. He calculates E k (T C, S subkey ) and sends it to Cliff (He needs to exclude C fom the calculations since the new value must be diffeent fom Authenticato = E k (C, T C, C subkey )) Step 6 (optional) Cliff decypts E k (T C, S subkey ). If the time stamps match which he sent in Step 3, he then declaes the authentication of Simon successful. 12/27/2002 Ekay Savas 26

27 Secuity and options in Kebeos Since timestamps ae used, the hosts on which this potocol uns must povide both secue and synchonized clocks. If the shaed keys btw Tent, and Cliff and Simon ae passwods, the potocol is no moe secue than the stength of the passwods. Optional keys C subkey and S subkey allow tansfe of a key fom Cliff to Simon o vice vesa. They can combine these keys to deive anothe key, f (C subkey, S subkey ). The lifetime within the ticket allows Cliff to e-use the ticket ove a limited peiod fo multiple inteactions to Simon without additional inteactions with Tent. 12/27/2002 Ekay Savas 27

28 Public Key Infastuctue (PKI) A famewok consisting of policies defining the ules unde which the cyptogaphic systems opeate and pocedues fo geneating and publishing keys and cetificates. A cetificate binds one s identity to its public key. A cetificate contains infomation signed by its publishe, who is commonly efeed as the Cetification Authoity (CA). Thee ae diffeent types of cetificates 12/27/2002 Ekay Savas 28

29 Cetificates Identity cetificates contains entity s identity infomation such as addess, and a list of public keys fo the entity. Cedential cetificates contain infomation descibing access ights. Data in cetificates is encypted (signed) using CA s pivate key. If Alice knows the public key of the CA, she can extact Bob s identity and his public keys fom his cetificate issued by the CA. 12/27/2002 Ekay Savas 29

30 Tust in PKI Alice might not tust Bob, She has to tust the CA. PKI consists of many CAs. A CA can cetify anothe CA if the fome is moe tusted. Diffeent levels of tust Alice and Bob may have diffeent CAs Alice s CA may only tust Bob s CA to cetify Bob and but not cetify othes. Tust elationships become vey elaboate. It may be difficult to detemine how much Alice can tust a cetificate she eceives. 12/27/2002 Ekay Savas 30

31 Petty Good Pivacy (PGP) A pogam to encypt and sign messages. Uses a combination of public and pivate keys Each use maintains a public-key ing, which consists of the public keys of people with whom the use exchanges . Alice, fo example, signs the keys in he key ing with he pivate key to potect them. PGP allows use to exchange key ings. Key evocation is a poblem. 12/27/2002 Ekay Savas 31

32 Petty Good Pivacy (PGP) When Alice eceives Bob s keying, she gives it one of the fou diffeent tust level: Complete tust: she will tust any key in bob s keying Patial tust: She has some confidence on the keys; but pefes to see that the key has been signed by othe uses befoe she tusts a cetain key in the keying. No tust: She does not tust Bob s cetification of any keys. Unknown: She is not sue. Typically, teated the same as no tust. As uses exchange keyings, a web of tust is built between uses. 12/27/2002 Ekay Savas 32

33 X.509 PGP is good fo secuity. But moe seious applications, such as e-commoce, equies moe sophisticated PKIs. X.509 is an intenational standad that is designed to povide authentication fo diectoy sevices on lage compute netwoks. X.509 is used in Visa and Mastecad s SET standad. X.509 cetificates contains fields descibing tust policies. It is possible to designate that a public key is suitable fo secue but not suitable fo e-commece applications. 12/27/2002 Ekay Savas 33

Lecture 25: Pairing Based Cryptography

Lecture 25: Pairing Based Cryptography 6.897 Special Topics in Cyptogaphy Instucto: Ran Canetti May 5, 2004 Lectue 25: Paiing Based Cyptogaphy Scibe: Ben Adida 1 Intoduction The field of Paiing Based Cyptogaphy has exploded ove the past 3 yeas

More information

10/04/18. P [P(x)] 1 negl(n).

10/04/18. P [P(x)] 1 negl(n). Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the

More information

A more efficient secure event signature protocol for massively multiplayer online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng Chu1,c

A more efficient secure event signature protocol for massively multiplayer online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng Chu1,c Intenational Foum on Mechanical, Contol and Automation (IFMCA 2016) A moe efficient secue event signatue potocol fo massively multiplaye online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng

More information

A Simple Model of Communication APIs Application to Dynamic Partial-order Reduction

A Simple Model of Communication APIs Application to Dynamic Partial-order Reduction Simple Model of Communication PIs pplication to Dynamic Patial-ode Reduction Cistian Rosa Stephan Mez Matin Quinson VOCS 2010 22/09/2010 1 / 18 Motivation Distibuted lgoithms ae had to get ight: lack of

More information

Computer Security Laboratory Concordia Institute for Information Systems Engineering Concordia University, Montreal (QC), Canada

Computer Security Laboratory Concordia Institute for Information Systems Engineering Concordia University, Montreal (QC), Canada 2005 Intenational Confeence on Wieless Netwoks, Communications and Mobile Computing Impoving the Diffie-Heliman Secue Key Exchange P. Bhattachaya, M. Debbabi and H. Otok Compute Secuity Laboatoy Concodia

More information

Experiment I Voltage Variation and Control

Experiment I Voltage Variation and Control ELE303 Electicity Netwoks Expeiment I oltage aiation and ontol Objective To demonstate that the voltage diffeence between the sending end of a tansmission line and the load o eceiving end depends mainly

More information

Non-Transferable Proxy Re-Encryption Scheme

Non-Transferable Proxy Re-Encryption Scheme Title Non-Tansfeable Poxy Re-Encyption Scheme Autho(s) He, Y; Chim, TW; Hui, CK; Yiu, SM Citation The 5th IFIP Intenational Confeence on New Technologies, Mobility and Secuity (NTMS 12), Istanbul, Tukey,

More information

Radha Poovendran Network Security Lab University of Washington

Radha Poovendran Network Security Lab University of Washington A Gaph Theoetic Famewok fo Peventing the Womhole Attack in Wieless Senso Netwoks Radha Poovendan Netwok Secuity Lab Univesity of Washington Womholes Hope fo time tavel Womhole: A space-time distotion that

More information

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

Cryptography. Primitives and Protocols. Aggelos Kiayias

Cryptography. Primitives and Protocols. Aggelos Kiayias P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by G. Panagiotakos, S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction

More information

CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL

CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL U.P.B. Sci. Bull. Seies A, Vol. 80, Iss.3, 018 ISSN 13-707 CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL Sasengali ABDYMANAPOV 1,

More information

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Based on notes by S. Pehlivanoglu, J. Todd, K. Samari, T. Zacharias and H.S.

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Based on notes by S. Pehlivanoglu, J. Todd, K. Samari, T. Zacharias and H.S. P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction 4 1.1 Flipping

More information

Lifting Private Information Retrieval from Two to any Number of Messages

Lifting Private Information Retrieval from Two to any Number of Messages Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu

More information

ASTR415: Problem Set #6

ASTR415: Problem Set #6 ASTR45: Poblem Set #6 Cuan D. Muhlbege Univesity of Mayland (Dated: May 7, 27) Using existing implementations of the leapfog and Runge-Kutta methods fo solving coupled odinay diffeential equations, seveal

More information

Anonymous return route information for onion based mix-nets

Anonymous return route information for onion based mix-nets Anonymous etun oute infomation fo onion based mix-nets ABSTRACT Yoshifumi Manabe NTT Communication Science Laboatoies NTT Copoation Atsugi Kanagawa 239-0198 Japan manabeyoshifumi@labnttcojp This pape poposes

More information

CHARIOT: Cloud-Assisted Access Control for the Internet of Things

CHARIOT: Cloud-Assisted Access Control for the Internet of Things CHARIOT: Cloud-Assisted Access Contol fo the Intenet of Things Clémentine Gitti Euecom Sophia Antipolis, Fance gitti@euecom.f Melek Önen Euecom Sophia Antipolis, Fance onen@euecom.f Refik Molva Euecom

More information

Anonymity-enhanced Pseudonym System

Anonymity-enhanced Pseudonym System JAIST Reposi https://dspace.j Title Anonymity-enhanced Pseudonym System Autho(s)Tamua, Yuko; Miyaji, Atsuko Citation Lectue Notes in Compute Science, 2 47 Issue Date 2003 Type Jounal Aticle Text vesion

More information

Conspiracy and Information Flow in the Take-Grant Protection Model

Conspiracy and Information Flow in the Take-Grant Protection Model Conspiacy and Infomation Flow in the Take-Gant Potection Model Matt Bishop Depatment of Compute Science Univesity of Califonia at Davis Davis, CA 95616-8562 ABSTRACT The Take Gant Potection Model is a

More information

Information-Theoretic

Information-Theoretic Infomation-Theoetic Key Ageement fom Close Secets Leonid Reyzin Januay 5, 2018 IISc 1 Infomation-Theoetic Key Ageement fom Close Secets: A Suvey 0 1 assume these ae close and patially secet 2 Infomation-Theoetic

More information

arxiv: v1 [math.co] 1 Apr 2011

arxiv: v1 [math.co] 1 Apr 2011 Weight enumeation of codes fom finite spaces Relinde Juius Octobe 23, 2018 axiv:1104.0172v1 [math.co] 1 Ap 2011 Abstact We study the genealized and extended weight enumeato of the - ay Simplex code and

More information

Appraisal of Logistics Enterprise Competitiveness on the Basis of Fuzzy Analysis Algorithm

Appraisal of Logistics Enterprise Competitiveness on the Basis of Fuzzy Analysis Algorithm Appaisal of Logistics Entepise Competitiveness on the Basis of Fuzzy Analysis Algoithm Yan Zhao, Fengge Yao, Minming She Habin Univesity of Commece, Habin, Heilongjiang 150028, China, zhaoyan2000@yahoo.com.cn

More information

Multiple Criteria Secretary Problem: A New Approach

Multiple Criteria Secretary Problem: A New Approach J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and

More information

QIP Course 10: Quantum Factorization Algorithm (Part 3)

QIP Course 10: Quantum Factorization Algorithm (Part 3) QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse

More information

Design and Analysis of Password-Based Key Derivation Functions

Design and Analysis of Password-Based Key Derivation Functions Design and Analysis of Passwod-Based Key Deivation Functions 245 Fances F. Yao 1 and Yiqun Lisa Yin 2 1 Depatment of Compute Science, City Univesity of Hong Kong, Kowloon, Hong Kong csfyao@cityu.edu.hk

More information

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the

More information

Concurrent Blind Signatures without Random Oracles

Concurrent Blind Signatures without Random Oracles Concuent Blind Signatues without Random Oacles Aggelos Kiayias Hong-Sheng Zhou Abstact We pesent a blind signatue scheme that is efficient and povably secue without andom oacles unde concuent attacks utilizing

More information

Lecture 7. Public Key Cryptography (Diffie-Hellman and RSA)

Lecture 7. Public Key Cryptography (Diffie-Hellman and RSA) Lectue 7 Pulic Key Cytogahy (Diffie-Hellman and RSA) 1 Pulic Key Cytogahy Asymmetic cytogahy Invented in 1974-1978 (Diffie-Hellman and Rivest-Shami- Adleman) Two keys: ivate (SK), ulic (PK) Encytion: with

More information

Design and Analysis of Password-Based Key Derivation Functions

Design and Analysis of Password-Based Key Derivation Functions Design and Analysis of Passwod-Based Key Deivation Functions Fances F. Yao 1 and Yiqun Lisa Yin 2 1 Depatment of Compute Science City Univesity of Hong Kong Kowloon, Hong Kong Email: csfyao@cityu.edu.hk

More information

Quantum Fourier Transform

Quantum Fourier Transform Chapte 5 Quantum Fouie Tansfom Many poblems in physics and mathematics ae solved by tansfoming a poblem into some othe poblem with a known solution. Some notable examples ae Laplace tansfom, Legende tansfom,

More information

3.1 Random variables

3.1 Random variables 3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated

More information

Chapter 10 Mechanism Design and Postcontractual Hidden Knowledge

Chapter 10 Mechanism Design and Postcontractual Hidden Knowledge Chapte 10 Mechanism Design and Postcontactual Hidden Knowledge 10.1 Mechanisms, Unavelling, Coss Checking, and the Revelation Pinciple A mechanism is a set of ules that one playe constucts and anothe feely

More information

Chapter 3: Theory of Modular Arithmetic 38

Chapter 3: Theory of Modular Arithmetic 38 Chapte 3: Theoy of Modula Aithmetic 38 Section D Chinese Remainde Theoem By the end of this section you will be able to pove the Chinese Remainde Theoem apply this theoem to solve simultaneous linea conguences

More information

An Application of Fuzzy Linear System of Equations in Economic Sciences

An Application of Fuzzy Linear System of Equations in Economic Sciences Austalian Jounal of Basic and Applied Sciences, 5(7): 7-14, 2011 ISSN 1991-8178 An Application of Fuzzy Linea System of Equations in Economic Sciences 1 S.H. Nassei, 2 M. Abdi and 3 B. Khabii 1 Depatment

More information

When two numbers are written as the product of their prime factors, they are in factored form.

When two numbers are written as the product of their prime factors, they are in factored form. 10 1 Study Guide Pages 420 425 Factos Because 3 4 12, we say that 3 and 4 ae factos of 12. In othe wods, factos ae the numbes you multiply to get a poduct. Since 2 6 12, 2 and 6 ae also factos of 12. The

More information

PAPER 39 STOCHASTIC NETWORKS

PAPER 39 STOCHASTIC NETWORKS MATHEMATICAL TRIPOS Pat III Tuesday, 2 June, 2015 1:30 pm to 4:30 pm PAPER 39 STOCHASTIC NETWORKS Attempt no moe than FOUR questions. Thee ae FIVE questions in total. The questions cay equal weight. STATIONERY

More information

I. Introduction to ecological populations, life tables, and population growth models

I. Introduction to ecological populations, life tables, and population growth models 3-1 Population ecology Lab 3: Population life tables I. Intoduction to ecological populations, life tables, and population gowth models This week we begin a new unit on population ecology. A population

More information

Two Attacks on a White-Box AES Implementation

Two Attacks on a White-Box AES Implementation Two Attacks on a White-Box AES Implementation Tancède Lepoint,, Matthieu Rivain, Yoni De Mulde, Pete Roelse 4, and Bat Peneel CyptoExpets, Fance {tancede.lepoint,matthieu.ivain}@cyptoexpets.com École Nomale

More information

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou CONTENTS 1 Contents 2 1 Intoduction To begin discussing the basic popeties

More information

Unobserved Correlation in Ascending Auctions: Example And Extensions

Unobserved Correlation in Ascending Auctions: Example And Extensions Unobseved Coelation in Ascending Auctions: Example And Extensions Daniel Quint Univesity of Wisconsin Novembe 2009 Intoduction In pivate-value ascending auctions, the winning bidde s willingness to pay

More information

Circular Orbits. and g =

Circular Orbits. and g = using analyse planetay and satellite motion modelled as unifom cicula motion in a univesal gavitation field, a = v = 4π and g = T GM1 GM and F = 1M SATELLITES IN OBIT A satellite is any object that is

More information

International Journal of Mathematical Archive-3(12), 2012, Available online through ISSN

International Journal of Mathematical Archive-3(12), 2012, Available online through  ISSN Intenational Jounal of Mathematical Achive-3(), 0, 480-4805 Available online though www.ijma.info ISSN 9 504 STATISTICAL QUALITY CONTROL OF MULTI-ITEM EOQ MOEL WITH VARYING LEAING TIME VIA LAGRANGE METHO

More information

AMC 10 Contest B. Solutions Pamphlet. Wednesday, FEBRUARY 21, American Mathematics Competitions

AMC 10 Contest B. Solutions Pamphlet. Wednesday, FEBRUARY 21, American Mathematics Competitions The MATHEMATICAL ASSOCIATION of AMERICA Ameican Mathematics Competitions 8 th Annual Ameican Mathematics Contest 10 AMC 10 Contest B Solutions Pamphlet Wednesday, FEBRUARY 21, 2007 This Pamphlet gives

More information

EM Boundary Value Problems

EM Boundary Value Problems EM Bounday Value Poblems 10/ 9 11/ By Ilekta chistidi & Lee, Seung-Hyun A. Geneal Desciption : Maxwell Equations & Loentz Foce We want to find the equations of motion of chaged paticles. The way to do

More information

The Chromatic Villainy of Complete Multipartite Graphs

The Chromatic Villainy of Complete Multipartite Graphs Rocheste Institute of Technology RIT Schola Wos Theses Thesis/Dissetation Collections 8--08 The Chomatic Villainy of Complete Multipatite Gaphs Anna Raleigh an9@it.edu Follow this and additional wos at:

More information

Chapter 5 Force and Motion

Chapter 5 Force and Motion Chapte 5 Foce and Motion In Chaptes 2 and 4 we have studied kinematics, i.e., we descibed the motion of objects using paametes such as the position vecto, velocity, and acceleation without any insights

More information

Related Rates - the Basics

Related Rates - the Basics Related Rates - the Basics In this section we exploe the way we can use deivatives to find the velocity at which things ae changing ove time. Up to now we have been finding the deivative to compae the

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

Goodness-of-fit for composite hypotheses.

Goodness-of-fit for composite hypotheses. Section 11 Goodness-of-fit fo composite hypotheses. Example. Let us conside a Matlab example. Let us geneate 50 obsevations fom N(1, 2): X=nomnd(1,2,50,1); Then, unning a chi-squaed goodness-of-fit test

More information

APPLICATION OF MAC IN THE FREQUENCY DOMAIN

APPLICATION OF MAC IN THE FREQUENCY DOMAIN PPLICION OF MC IN HE FREQUENCY DOMIN D. Fotsch and D. J. Ewins Dynamics Section, Mechanical Engineeing Depatment Impeial College of Science, echnology and Medicine London SW7 2B, United Kingdom BSRC he

More information

Notes on McCall s Model of Job Search. Timothy J. Kehoe March if job offer has been accepted. b if searching

Notes on McCall s Model of Job Search. Timothy J. Kehoe March if job offer has been accepted. b if searching Notes on McCall s Model of Job Seach Timothy J Kehoe Mach Fv ( ) pob( v), [, ] Choice: accept age offe o eceive b and seach again next peiod An unemployed oke solves hee max E t t y t y t if job offe has

More information

Provable Security in Cryptography

Provable Security in Cryptography Povable Secuity in Cyptogaphy Thomas Baignèes EPFL http://lasecwww.epfl.ch May 29, 2007 (ve. 25) These lectue notes ae a compilation of some of my eadings while I was pepaing two lectues given at EPFL

More information

Rigid Body Dynamics 2. CSE169: Computer Animation Instructor: Steve Rotenberg UCSD, Winter 2018

Rigid Body Dynamics 2. CSE169: Computer Animation Instructor: Steve Rotenberg UCSD, Winter 2018 Rigid Body Dynamics 2 CSE169: Compute Animation nstucto: Steve Rotenbeg UCSD, Winte 2018 Coss Poduct & Hat Opeato Deivative of a Rotating Vecto Let s say that vecto is otating aound the oigin, maintaining

More information

MATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE. We consider second order constant coefficient scalar linear PDEs on R n. These have the form

MATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE. We consider second order constant coefficient scalar linear PDEs on R n. These have the form MATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE ANDRAS VASY We conside second ode constant coefficient scala linea PDEs on R n. These have the fom Lu = f L = a ij xi xj + b i xi + c i whee a ij b i and

More information

OLYMON. Produced by the Canadian Mathematical Society and the Department of Mathematics of the University of Toronto. Issue 9:2.

OLYMON. Produced by the Canadian Mathematical Society and the Department of Mathematics of the University of Toronto. Issue 9:2. OLYMON Poduced by the Canadian Mathematical Society and the Depatment of Mathematics of the Univesity of Toonto Please send you solution to Pofesso EJ Babeau Depatment of Mathematics Univesity of Toonto

More information

Between any two masses, there exists a mutual attractive force.

Between any two masses, there exists a mutual attractive force. YEAR 12 PHYSICS: GRAVITATION PAST EXAM QUESTIONS Name: QUESTION 1 (1995 EXAM) (a) State Newton s Univesal Law of Gavitation in wods Between any two masses, thee exists a mutual attactive foce. This foce

More information

Physics 2A Chapter 10 - Moment of Inertia Fall 2018

Physics 2A Chapter 10 - Moment of Inertia Fall 2018 Physics Chapte 0 - oment of netia Fall 08 The moment of inetia of a otating object is a measue of its otational inetia in the same way that the mass of an object is a measue of its inetia fo linea motion.

More information

Chapter 3 Optical Systems with Annular Pupils

Chapter 3 Optical Systems with Annular Pupils Chapte 3 Optical Systems with Annula Pupils 3 INTRODUCTION In this chapte, we discuss the imaging popeties of a system with an annula pupil in a manne simila to those fo a system with a cicula pupil The

More information

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES AGU Intenational Jounal of Science and Technology A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES Ritu Ahuja Depatment of Mathematics Khalsa College fo Women, Civil Lines, Ludhiana-141001, Punjab, (India)

More information

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries Moe Efficient Oblivious Tansfe Extensions with Secuity fo Malicious Advesaies Gilad Ashaov Yehuda Lindell Thomas Schneide Michael Zohne Hebew Univesity Ba-Ilan Univesity Damstadt Damstadt EUROCRYPT 2015

More information

Hydroelastic Analysis of a 1900 TEU Container Ship Using Finite Element and Boundary Element Methods

Hydroelastic Analysis of a 1900 TEU Container Ship Using Finite Element and Boundary Element Methods TEAM 2007, Sept. 10-13, 2007,Yokohama, Japan Hydoelastic Analysis of a 1900 TEU Containe Ship Using Finite Element and Bounday Element Methods Ahmet Egin 1)*, Levent Kaydıhan 2) and Bahadı Uğulu 3) 1)

More information

ac p Answers to questions for The New Introduction to Geographical Economics, 2 nd edition Chapter 3 The core model of geographical economics

ac p Answers to questions for The New Introduction to Geographical Economics, 2 nd edition Chapter 3 The core model of geographical economics Answes to questions fo The New ntoduction to Geogaphical Economics, nd edition Chapte 3 The coe model of geogaphical economics Question 3. Fom intoductoy mico-economics we know that the condition fo pofit

More information

High precision computer simulation of cyclotrons KARAMYSHEVA T., AMIRKHANOV I. MALININ V., POPOV D.

High precision computer simulation of cyclotrons KARAMYSHEVA T., AMIRKHANOV I. MALININ V., POPOV D. High pecision compute simulation of cyclotons KARAMYSHEVA T., AMIRKHANOV I. MALININ V., POPOV D. Abstact Effective and accuate compute simulations ae highly impotant in acceleatos design and poduction.

More information

DonnishJournals

DonnishJournals DonnishJounals 041-1189 Donnish Jounal of Educational Reseach and Reviews. Vol 1(1) pp. 01-017 Novembe, 014. http:///dje Copyight 014 Donnish Jounals Oiginal Reseach Pape Vecto Analysis Using MAXIMA Savaş

More information

Three-dimensional Quantum Cellular Neural Network and Its Application to Image Processing *

Three-dimensional Quantum Cellular Neural Network and Its Application to Image Processing * Thee-dimensional Quantum Cellula Neual Netwok and Its Application to Image Pocessing * Sen Wang, Li Cai, Huanqing Cui, Chaowen Feng, Xiaokuo Yang Science College, Ai Foce Engineeing Univesity Xi an 701,

More information

Chapter 5 Force and Motion

Chapter 5 Force and Motion Chapte 5 Foce and Motion In chaptes 2 and 4 we have studied kinematics i.e. descibed the motion of objects using paametes such as the position vecto, velocity and acceleation without any insights as to

More information

Lecture 14. Protocols. Key Distribution Center (KDC) or Trusted Third Party (TTP) KDC generates R1

Lecture 14. Protocols. Key Distribution Center (KDC) or Trusted Third Party (TTP) KDC generates R1 Lectue 14 Potocols 1 Key Distiution Cente (KDC) o Tusted Thid Pty (TTP) KDC genetes R1 lice otins R1 Msg1: K () Msg2: K (R1 K (R1) ) Msg3: K (R1) o otins R1 nd knows to use s key fo communicting with lice

More information

1D2G - Numerical solution of the neutron diffusion equation

1D2G - Numerical solution of the neutron diffusion equation DG - Numeical solution of the neuton diffusion equation Y. Danon Daft: /6/09 Oveview A simple numeical solution of the neuton diffusion equation in one dimension and two enegy goups was implemented. Both

More information

Long-range stress re-distribution resulting from damage in heterogeneous media

Long-range stress re-distribution resulting from damage in heterogeneous media Long-ange stess e-distibution esulting fom damage in heteogeneous media Y.L.Bai (1), F.J.Ke (1,2), M.F.Xia (1,3) X.H.Zhang (1) and Z.K. Jia (1) (1) State Key Laboatoy fo Non-linea Mechanics (LNM), Institute

More information

Internet Appendix for A Bayesian Approach to Real Options: The Case of Distinguishing Between Temporary and Permanent Shocks

Internet Appendix for A Bayesian Approach to Real Options: The Case of Distinguishing Between Temporary and Permanent Shocks Intenet Appendix fo A Bayesian Appoach to Real Options: The Case of Distinguishing Between Tempoay and Pemanent Shocks Steven R. Genadie Gaduate School of Business, Stanfod Univesity Andey Malenko Gaduate

More information

An Actuarial Approach for Aggregate Loss Assessment of the Critical Infrastructure Due to Natural Disasters

An Actuarial Approach for Aggregate Loss Assessment of the Critical Infrastructure Due to Natural Disasters 0 Intenational Confeence on Education and anagement Innovation IPEDR vol30 (0 (0 IACSIT Pess, Singapoe An Actuaial Appoach fo Aggegate Loss Assessment of the Citical Infastuctue Due to atual Disastes Plamena

More information

ITI Introduction to Computing II

ITI Introduction to Computing II ITI 1121. Intoduction to Computing II Macel Tucotte School of Electical Engineeing and Compute Science Abstact data type: Stack Stack-based algoithms Vesion of Febuay 2, 2013 Abstact These lectue notes

More information

Absolute Specifications: A typical absolute specification of a lowpass filter is shown in figure 1 where:

Absolute Specifications: A typical absolute specification of a lowpass filter is shown in figure 1 where: FIR FILTER DESIGN The design of an digital filte is caied out in thee steps: ) Specification: Befoe we can design a filte we must have some specifications. These ae detemined by the application. ) Appoximations

More information

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM Poceedings of the ASME 2010 Intenational Design Engineeing Technical Confeences & Computes and Infomation in Engineeing Confeence IDETC/CIE 2010 August 15-18, 2010, Monteal, Quebec, Canada DETC2010-28496

More information

Physics 211: Newton s Second Law

Physics 211: Newton s Second Law Physics 211: Newton s Second Law Reading Assignment: Chapte 5, Sections 5-9 Chapte 6, Section 2-3 Si Isaac Newton Bon: Januay 4, 1643 Died: Mach 31, 1727 Intoduction: Kinematics is the study of how objects

More information

Universal Gravitation

Universal Gravitation Chapte 1 Univesal Gavitation Pactice Poblem Solutions Student Textbook page 580 1. Conceptualize the Poblem - The law of univesal gavitation applies to this poblem. The gavitational foce, F g, between

More information

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de

More information

7.2. Coulomb s Law. The Electric Force

7.2. Coulomb s Law. The Electric Force Coulomb s aw Recall that chaged objects attact some objects and epel othes at a distance, without making any contact with those objects Electic foce,, o the foce acting between two chaged objects, is somewhat

More information

Multiple Experts with Binary Features

Multiple Experts with Binary Features Multiple Expets with Binay Featues Ye Jin & Lingen Zhang Decembe 9, 2010 1 Intoduction Ou intuition fo the poect comes fom the pape Supevised Leaning fom Multiple Expets: Whom to tust when eveyone lies

More information

PROBLEM SET #1 SOLUTIONS by Robert A. DiStasio Jr.

PROBLEM SET #1 SOLUTIONS by Robert A. DiStasio Jr. POBLM S # SOLUIONS by obet A. DiStasio J. Q. he Bon-Oppenheime appoximation is the standad way of appoximating the gound state of a molecula system. Wite down the conditions that detemine the tonic and

More information

Hidden Identity-Based Signatures

Hidden Identity-Based Signatures Hidden Identity-Based Signatues ggelos Kiayias Hong-Sheng Zhou bstact This pape intoduces Hidden Identity-based Signatues (Hidden-IBS), a type of digital signatues that povide mediated signe-anonymity

More information

Value of Traveler Information for Adaptive Routing in Stochastic Time-Dependent Networks

Value of Traveler Information for Adaptive Routing in Stochastic Time-Dependent Networks Univesity of Massachusetts Amhest ScholaWoks@UMass Amhest Mastes Theses 1911 - Febuay 2014 2009 Value of Tavele Infomation fo Adaptive Routing in Stochastic Time-Dependent Netwoks He Huang Univesity of

More information

Fixed Argument Pairing Inversion on Elliptic Curves

Fixed Argument Pairing Inversion on Elliptic Curves Fixed Agument Paiing Invesion on Elliptic Cuves Sungwook Kim and Jung Hee Cheon ISaC & Dept. of Mathematical Sciences Seoul National Univesity Seoul, Koea {avell7,jhcheon}@snu.ac.k Abstact. Let E be an

More information

A DETAILED DESCRIPTION OF THE DISCREPANCY IN FORMULAS FOR THE STANDARD ERROR OF THE DIFFERENCE BETWEEN A RAW AND PARTIAL CORRELATION: A TYPOGRAPHICAL

A DETAILED DESCRIPTION OF THE DISCREPANCY IN FORMULAS FOR THE STANDARD ERROR OF THE DIFFERENCE BETWEEN A RAW AND PARTIAL CORRELATION: A TYPOGRAPHICAL Olkin and Finn Discepancy A DETAILED DESCRIPTION OF THE DISCREPANCY IN FORMULAS FOR THE STANDARD ERROR OF THE DIFFERENCE BETWEEN A RAW AND PARTIAL CORRELATION: A TYPOGRAPHICAL ERROR IN OLKIN AND FINN (995

More information

AP-C WEP. h. Students should be able to recognize and solve problems that call for application both of conservation of energy and Newton s Laws.

AP-C WEP. h. Students should be able to recognize and solve problems that call for application both of conservation of energy and Newton s Laws. AP-C WEP 1. Wok a. Calculate the wok done by a specified constant foce on an object that undegoes a specified displacement. b. Relate the wok done by a foce to the aea unde a gaph of foce as a function

More information

18.06 Problem Set 4 Solution

18.06 Problem Set 4 Solution 8.6 Poblem Set 4 Solution Total: points Section 3.5. Poblem 2: (Recommended) Find the lagest possible numbe of independent vectos among ) ) ) v = v 4 = v 5 = v 6 = v 2 = v 3 =. Solution (4 points): Since

More information

AP Physics C: Electricity and Magnetism 2001 Scoring Guidelines

AP Physics C: Electricity and Magnetism 2001 Scoring Guidelines AP Physics C: Electicity and Magnetism 1 Scoing Guidelines The mateials included in these files ae intended fo non-commecial use by AP teaches fo couse and exam pepaation; pemission fo any othe use must

More information

Physics 121 Hour Exam #5 Solution

Physics 121 Hour Exam #5 Solution Physics 2 Hou xam # Solution This exam consists of a five poblems on five pages. Point values ae given with each poblem. They add up to 99 points; you will get fee point to make a total of. In any given

More information

Lab 10: Newton s Second Law in Rotation

Lab 10: Newton s Second Law in Rotation Lab 10: Newton s Second Law in Rotation We can descibe the motion of objects that otate (i.e. spin on an axis, like a popelle o a doo) using the same definitions, adapted fo otational motion, that we have

More information

Merging to ordered sequences. Efficient (Parallel) Sorting. Merging (cont.)

Merging to ordered sequences. Efficient (Parallel) Sorting. Merging (cont.) Efficient (Paae) Soting One of the most fequent opeations pefomed by computes is oganising (soting) data The access to soted data is moe convenient/faste Thee is a constant need fo good soting agoithms

More information

Attribute Based Data Sharing with Attribute Revocation

Attribute Based Data Sharing with Attribute Revocation Attibute Based Data Shaing with Attibute Revocation Shucheng Yu Depatment of ECE Woceste Polytechnic Institute Woceste, MA 01609 yscheng@wpi.edu Cong Wang Depatment of ECE Illinois Institute of Technology

More information

A Multivariate Normal Law for Turing s Formulae

A Multivariate Normal Law for Turing s Formulae A Multivaiate Nomal Law fo Tuing s Fomulae Zhiyi Zhang Depatment of Mathematics and Statistics Univesity of Noth Caolina at Chalotte Chalotte, NC 28223 Abstact This pape establishes a sufficient condition

More information

Handout: IS/LM Model

Handout: IS/LM Model Econ 32 - IS/L odel Notes Handout: IS/L odel IS Cuve Deivation Figue 4-4 in the textbook explains one deivation of the IS cuve. This deivation uses the Induced Savings Function fom Chapte 3. Hee, I descibe

More information

Information Retrieval Advanced IR models. Luca Bondi

Information Retrieval Advanced IR models. Luca Bondi Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the

More information

6 PROBABILITY GENERATING FUNCTIONS

6 PROBABILITY GENERATING FUNCTIONS 6 PROBABILITY GENERATING FUNCTIONS Cetain deivations pesented in this couse have been somewhat heavy on algeba. Fo example, detemining the expectation of the Binomial distibution (page 5.1 tuned out to

More information

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22 C/CS/Phys C9 Sho s ode (peiod) finding algoithm and factoing /2/4 Fall 204 Lectue 22 With a fast algoithm fo the uantum Fouie Tansfom in hand, it is clea that many useful applications should be possible.

More information

The geometric construction of Ewald sphere and Bragg condition:

The geometric construction of Ewald sphere and Bragg condition: The geometic constuction of Ewald sphee and Bagg condition: The constuction of Ewald sphee must be done such that the Bagg condition is satisfied. This can be done as follows: i) Daw a wave vecto k in

More information

Lab #4: Newton s Second Law

Lab #4: Newton s Second Law Lab #4: Newton s Second Law Si Isaac Newton Reading Assignment: bon: Januay 4, 1643 Chapte 5 died: Mach 31, 1727 Chapte 9, Section 9-7 Intoduction: Potait of Isaac Newton by Si Godfey Knelle http://www.newton.cam.ac.uk/at/potait.html

More information

Channel matrix, measurement matrix and collapsed matrix. in teleportation

Channel matrix, measurement matrix and collapsed matrix. in teleportation Channel matix, measuement matix and collapsed matix in telepotation XIN-WEI ZHA, JIAN-XIA QI and HAI-YANG SONG School of Science, Xi an Univesity of Posts and Telecommunications, Xi an, 71011, P R China

More information

Chapter Eight Notes N P U1C8S4-6

Chapter Eight Notes N P U1C8S4-6 Chapte Eight Notes N P UC8S-6 Name Peiod Section 8.: Tigonometic Identities An identit is, b definition, an equation that is alwas tue thoughout its domain. B tue thoughout its domain, that is to sa that

More information

PHYS 301 HOMEWORK #10 (Optional HW)

PHYS 301 HOMEWORK #10 (Optional HW) PHYS 301 HOMEWORK #10 (Optional HW) 1. Conside the Legende diffeential equation : 1 - x 2 y'' - 2xy' + m m + 1 y = 0 Make the substitution x = cos q and show the Legende equation tansfoms into d 2 y 2

More information