Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University
|
|
- Shonda Rogers
- 6 years ago
- Views:
Transcription
1 Key Establishment Potocols Cyptogaphy CS 507 Ekay Savas Sabanci Univesity
2 Key distibution poblem Secuity of the keys Even if the cyptogaphic algoithms & potocols ae cyptogaphically ulta-secue, a possible compomise of secet keys o pat of them will have gave consequences. How two (o moe) paties will exchange (agee on) keys fo secet communication if they ae unable to meet. Main poblem is to shae secet infomation fo symmetic cyptogaphy. Public key cyptogaphy keys ae stoed on public databases. 12/27/2002 Ekay Savas 2
3 Key Ageement Potocols Type of potocol wheeby a key is established by exchanging infomation between two paties. Each paty deives the secet key fom the infomation that is exchanged. Key exchange is best done using public key cyptogaphy. Diffie-Hellman potocol establishes a key with tansfe of two messages. Howeve, DH does not povide authentication. Station-to-Station potocol is authenticated vesion of DH potocol. 12/27/2002 Ekay Savas 3
4 DH Key Exchange (EC vesion) A basepoint P on E:y 2 x 3 + ax +b (mod p). Alice Bob s A s B pivate keys Q A = s A P Q B = s B P public keys Q B Q A s A Q B. s B Q A. R = (x, y ) = s A Q B = s B Q A = s A s B P K = Hash(x paam). (key deivation, IEEE P1363) 12/27/2002 Ekay Savas 4
5 The Intude-in-the-Middle Attack Alice Eve Bob s A s E s B Q A = s A P Q E = s E P Q B = s B P Q A, Q B Q E s A Q E = s A s E P K 1 =s E Q A =s A s E P K 2 = s E Q B = s B s E P Q E s B Q E =s B s E P 12/27/2002 Ekay Savas 5
6 Station-to-Station Potocol Authenticated key ageement potocol. Alice and Bob wants to shae a secet key to use in encyption function E K (.) Alice and Bob use thei pivate keys to sign the exchanged messages. Sign function : Sign pivatekey () Veify function : Veify publickey () Public keys ae obtained fom a public tusted data base Alice Bob s A s B pivate keys Q A = s A P Q B = s B P public keys 12/27/2002 Ekay Savas 6
7 Station-to-Station Potocol Alice Bob R = (x, y ) = s B Q A, K = Hash(x paam). E K (Sign sb (Q A, Q B )) R = s A Q B K = Hash(x paam) D K (Sign sb (Q A, Q B )) Veify QB (Sign sb (Q A, Q B )) E K (Sign sa (Q A, Q B )) D K (Sign sa (Q A, Q B )) Veify QA (Sign sa (Q A, Q B )) 12/27/2002 Ekay Savas 7
8 Confeence Keying SetupLage pime p and a geneato α in Z P *. Key Geneation Use U i selects a andom intege i 1 i p-2. Computes z i α i mod p and sends z i to each of the othe t-1 goup membes. Computation of key Each use U i,afte eceiving z i-1 and z i+1 computes i zi i i i x + 1 i i mod p + 1 = α 1 zi 1 and sends x i to othe membes 12/27/2002 Ekay Savas 8
9 Confeence Keying Afte eceiving x j fo 1 j t and j i, U i computes K t t 1 t i 1 i i+ 1 i+ ( t 3) xi+ ( t 2) = K = ( z ) i x x mx i mod p Example: Uses U 1, U 2, U 3 and U 4 selects 1, 2, 3 and 4 at andom z 1 α 1 mod p z 2 α 2 mod p z 3 α 3 mod p z 4 α 4 mod p 12/27/2002 Ekay Savas 9
10 12/27/2002 Ekay Savas 10 Confeence Keying x 1 α mod p x 2 α mod p x 3 α mod p x 4 α mod p mod ) ( p x x x z K = α mod ) ( p x x x z K = α
11 Key Pe-distibution Alice and Bob have to meet in advance to exchange secets in ode to geneate keys. When the shaed secet is compomised, they have to meet again. Eveything will be diffeent with a tusted thid paty, Tent. Tent will poduce a secet key K AB fo evey pai of uses, say (A, B), that will be used as a secet key. Tent is poweful enough to maintain a secue channel with eveyone. Tent will have to poduce n(n-1)/2 keys fo a goup of n use. 12/27/2002 Ekay Savas 11
12 Blom Key Pe-distibution Scheme This method educes the amount of infomation sent by the tusted authoity. Thee ae n uses. Select a lage pime p and let eveyone know it. 1. Each use U in the netwok is assigned a distinct numbe U (mod p). 2. Tent chooses thee secet andom numbes a, b, c (mod p). 3. Fo each use, Tent calculates the numbes a U a + b U (mod p), b U b + c U (mod p). 12/27/2002 Ekay Savas 12
13 Blom Key Pe-distibution Scheme 4. Tent sends a U, b U via his secue channel to U. 5. Each use U foms the linea polynomial g U (x) = a U + b U x 6. If Alice (A) wants to communicate with Bob (B), then Alice computes K AB = g A ( B ) while Bob computes K BA = g B ( A ) 7. It can be shown that K AB = K BA. So they can stat the secue communication. 12/27/2002 Ekay Savas 13
14 Example Conside a netwok consisting of Alice (A), Bob (B), and Chalie (C). Let p = 23 and let A = 11, B = 3, C = 2. Suppose Tent chooses the numbes a = 8, b = 3, c = 1. The coesponding linea polynomials of each use g A (x) = x g B (x) =17 + 6x g C (x) =14 + 5x 12/27/2002 Ekay Savas 14
15 Example It is now possible to calculate the keys K AB = g A ( B ) = 14 o K BA = g B ( A ) = 14 K AC = g A ( C ) = 0 o K CA = g C ( A ) = 0 K BC = g A ( C ) = 6 o K CB = g C ( B ) = 6 If two uses (Eve and Osca) shae thei secets (a E,b E ) and (a O, b O ) they can detemine a, b, c; theefoe they find all the pais of a U, b U O E 0 O a b c b a b E O O (mod p) 12/27/2002 Ekay Savas 15
16 Secuity of Blom s Scheme Since the deteminant of the matix is E O and U s is chosen to be distinct, the deteminant is nonzeo mod p, and theefoe the system has a solution. Without Eve s help, Osca has only 2 3 matix and he cannot find a, b, c. Suppose he wants to calculate the key K AB. Since K AB a + b A + b B + c A B (mod p). 12/27/2002 Ekay Savas 16
17 12/27/2002 Ekay Savas 17 Secuity of Blom s Scheme Osca has the following matix The deteminant is ( O A ) ( O B ) 0 (mod p). Then, thee is a solution a, b, c fo evey possible value of K AB. Thee ae Blom schemes that ae secue against a coalitions of at most k uses, but which succumb to conspiacies of k+1 uses. ) (mod p b a K c b a O O AB O O B A B A +
18 Key Distibution In key pe-distibution schemes, keys ae pedetemined and that thee is no easy way to change them. Keys must be changed afte cetain time. A class of key establishment potocols, known as tanspot potocols, povide two appoaches: 1. One paty to decide on a key and tansmit it to othe, Alice employs a secue potocol to tansmit the key 2. A tusted authoity, Tent, will act as a key seve. Alice equests a key fom Tent that is good fo a single session Tent sends this key to both Alice and Bob via a secue channel. 12/27/2002 Ekay Savas 18
19 Kebeos Kebeos is a eal-wold implementation of a symmetic key cyptogaphy potocol which povides secuity and authentication in key exchange between uses in a netwok. Suppots both entity authentication and key establishment. Kebeos oiginated fom a lage poject in M.I.T., called Athena. Athena was oiginally designed fo integating a huge netwok of wokstations so that students can secuely access thei files fom anywhee in the net. 12/27/2002 Ekay Savas 19
20 Kebeos Kebeos is based on a client-seve achitectue. A client is eithe a use o some softwae that has some tasks to accomplish. Send an , pint documents, mount devices, etc. Seves ae lage entities whose function is to povide sevices to the clients. The basic Kebeos model has the following paticipants 1. Cliff: a client 2. Simon: a seve 3. Tent: a tusted authoity (a.k.a authentication seve) 4. Gant: ticket-ganting seve. 12/27/2002 Ekay Savas 20
21 Kebeos Potocol Cliff equests a sevice fom Simon, But, they do not have any shaed infomation fo a secue tansmission. Kebeos give them a secet infomation secuely so that they can inteact secetly. The potocol begins with Cliff equesting cedentials (ticket) fom Tent so that he can authenticate himself to Simon. Tent shae a secet infomation (e.g. a passwod) with each use in the system. Tent plays the ole of Key Distibution Cente (KDC). They can use any secet ciphe algoithm. 12/27/2002 Ekay Savas 21
22 Simplified Kebeos Potocol Tent 2 1 Cliff 3 4 Simon 12/27/2002 Ekay Savas 22
23 Kebeos: Notation Cliff and Tent shae K TC Simon and Tent shae K TS E: encyption algoithm N C : a nonce chosen by Cliff T C : a timestamp chosen by Cliff k : a session key chosen by Tent. L: Validity peiod of the ticket (lifetime) Ticket S = E KST (k, C, L) Authenticato = E k (C, T C, C subkey ) 12/27/2002 Ekay Savas 23
24 Kebeos: Steps Step 1 Cliff geneates a nonce N C and sends the following message to Tent (C, S, N C ) Step 2 Tent geneates a new session key k, and defines the validity peiod (i.e. L) fo the ticket. He calculates Ticket S = E KST (k, C, L) and E KCT (k, N C, L, S) Step 3 Cliff decypts the non-ticket pat of the message using K CT and obtains k, N C, L, and S; saves L fo efeence and compaes N C and S against those in message sent in Step 1. 12/27/2002 Ekay Savas 24
25 Kebeos: Steps (cont.) Step 3 Cliff chooses a fesh T C and calculates Authenticato = E k (C, T C, C subkey ) and sends it along with Ticket S to Simon. Step 4 Simon eceives these messages, decypts Ticket S = E KST (k, C, L) using K ST.He obtains k which he uses to decypt Authenticato = E k (C, T C, C subkey ). Simon checks that The identifie fields in Authenticato and Ticket match. The timestamp T C in Authenticato is valid. Simon s local time is within the lifetime L specified in the ticket. 12/27/2002 Ekay Savas 25
26 Kebeos: Steps (cont.) If all the checks pass in Step 4, Simon declaes the authentication of Cliff successful. Step 5 (optional) Simon authenticates himself to Cliff. He calculates E k (T C, S subkey ) and sends it to Cliff (He needs to exclude C fom the calculations since the new value must be diffeent fom Authenticato = E k (C, T C, C subkey )) Step 6 (optional) Cliff decypts E k (T C, S subkey ). If the time stamps match which he sent in Step 3, he then declaes the authentication of Simon successful. 12/27/2002 Ekay Savas 26
27 Secuity and options in Kebeos Since timestamps ae used, the hosts on which this potocol uns must povide both secue and synchonized clocks. If the shaed keys btw Tent, and Cliff and Simon ae passwods, the potocol is no moe secue than the stength of the passwods. Optional keys C subkey and S subkey allow tansfe of a key fom Cliff to Simon o vice vesa. They can combine these keys to deive anothe key, f (C subkey, S subkey ). The lifetime within the ticket allows Cliff to e-use the ticket ove a limited peiod fo multiple inteactions to Simon without additional inteactions with Tent. 12/27/2002 Ekay Savas 27
28 Public Key Infastuctue (PKI) A famewok consisting of policies defining the ules unde which the cyptogaphic systems opeate and pocedues fo geneating and publishing keys and cetificates. A cetificate binds one s identity to its public key. A cetificate contains infomation signed by its publishe, who is commonly efeed as the Cetification Authoity (CA). Thee ae diffeent types of cetificates 12/27/2002 Ekay Savas 28
29 Cetificates Identity cetificates contains entity s identity infomation such as addess, and a list of public keys fo the entity. Cedential cetificates contain infomation descibing access ights. Data in cetificates is encypted (signed) using CA s pivate key. If Alice knows the public key of the CA, she can extact Bob s identity and his public keys fom his cetificate issued by the CA. 12/27/2002 Ekay Savas 29
30 Tust in PKI Alice might not tust Bob, She has to tust the CA. PKI consists of many CAs. A CA can cetify anothe CA if the fome is moe tusted. Diffeent levels of tust Alice and Bob may have diffeent CAs Alice s CA may only tust Bob s CA to cetify Bob and but not cetify othes. Tust elationships become vey elaboate. It may be difficult to detemine how much Alice can tust a cetificate she eceives. 12/27/2002 Ekay Savas 30
31 Petty Good Pivacy (PGP) A pogam to encypt and sign messages. Uses a combination of public and pivate keys Each use maintains a public-key ing, which consists of the public keys of people with whom the use exchanges . Alice, fo example, signs the keys in he key ing with he pivate key to potect them. PGP allows use to exchange key ings. Key evocation is a poblem. 12/27/2002 Ekay Savas 31
32 Petty Good Pivacy (PGP) When Alice eceives Bob s keying, she gives it one of the fou diffeent tust level: Complete tust: she will tust any key in bob s keying Patial tust: She has some confidence on the keys; but pefes to see that the key has been signed by othe uses befoe she tusts a cetain key in the keying. No tust: She does not tust Bob s cetification of any keys. Unknown: She is not sue. Typically, teated the same as no tust. As uses exchange keyings, a web of tust is built between uses. 12/27/2002 Ekay Savas 32
33 X.509 PGP is good fo secuity. But moe seious applications, such as e-commoce, equies moe sophisticated PKIs. X.509 is an intenational standad that is designed to povide authentication fo diectoy sevices on lage compute netwoks. X.509 is used in Visa and Mastecad s SET standad. X.509 cetificates contains fields descibing tust policies. It is possible to designate that a public key is suitable fo secue but not suitable fo e-commece applications. 12/27/2002 Ekay Savas 33
Lecture 25: Pairing Based Cryptography
6.897 Special Topics in Cyptogaphy Instucto: Ran Canetti May 5, 2004 Lectue 25: Paiing Based Cyptogaphy Scibe: Ben Adida 1 Intoduction The field of Paiing Based Cyptogaphy has exploded ove the past 3 yeas
More information10/04/18. P [P(x)] 1 negl(n).
Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the
More informationA more efficient secure event signature protocol for massively multiplayer online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng Chu1,c
Intenational Foum on Mechanical, Contol and Automation (IFMCA 2016) A moe efficient secue event signatue potocol fo massively multiplaye online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng
More informationA Simple Model of Communication APIs Application to Dynamic Partial-order Reduction
Simple Model of Communication PIs pplication to Dynamic Patial-ode Reduction Cistian Rosa Stephan Mez Matin Quinson VOCS 2010 22/09/2010 1 / 18 Motivation Distibuted lgoithms ae had to get ight: lack of
More informationComputer Security Laboratory Concordia Institute for Information Systems Engineering Concordia University, Montreal (QC), Canada
2005 Intenational Confeence on Wieless Netwoks, Communications and Mobile Computing Impoving the Diffie-Heliman Secue Key Exchange P. Bhattachaya, M. Debbabi and H. Otok Compute Secuity Laboatoy Concodia
More informationExperiment I Voltage Variation and Control
ELE303 Electicity Netwoks Expeiment I oltage aiation and ontol Objective To demonstate that the voltage diffeence between the sending end of a tansmission line and the load o eceiving end depends mainly
More informationNon-Transferable Proxy Re-Encryption Scheme
Title Non-Tansfeable Poxy Re-Encyption Scheme Autho(s) He, Y; Chim, TW; Hui, CK; Yiu, SM Citation The 5th IFIP Intenational Confeence on New Technologies, Mobility and Secuity (NTMS 12), Istanbul, Tukey,
More informationRadha Poovendran Network Security Lab University of Washington
A Gaph Theoetic Famewok fo Peventing the Womhole Attack in Wieless Senso Netwoks Radha Poovendan Netwok Secuity Lab Univesity of Washington Womholes Hope fo time tavel Womhole: A space-time distotion that
More informationStanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012
Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,
More informationCryptography. Primitives and Protocols. Aggelos Kiayias
P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by G. Panagiotakos, S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction
More informationCALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL
U.P.B. Sci. Bull. Seies A, Vol. 80, Iss.3, 018 ISSN 13-707 CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL Sasengali ABDYMANAPOV 1,
More informationE E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Based on notes by S. Pehlivanoglu, J. Todd, K. Samari, T. Zacharias and H.S.
P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction 4 1.1 Flipping
More informationLifting Private Information Retrieval from Two to any Number of Messages
Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu
More informationASTR415: Problem Set #6
ASTR45: Poblem Set #6 Cuan D. Muhlbege Univesity of Mayland (Dated: May 7, 27) Using existing implementations of the leapfog and Runge-Kutta methods fo solving coupled odinay diffeential equations, seveal
More informationAnonymous return route information for onion based mix-nets
Anonymous etun oute infomation fo onion based mix-nets ABSTRACT Yoshifumi Manabe NTT Communication Science Laboatoies NTT Copoation Atsugi Kanagawa 239-0198 Japan manabeyoshifumi@labnttcojp This pape poposes
More informationCHARIOT: Cloud-Assisted Access Control for the Internet of Things
CHARIOT: Cloud-Assisted Access Contol fo the Intenet of Things Clémentine Gitti Euecom Sophia Antipolis, Fance gitti@euecom.f Melek Önen Euecom Sophia Antipolis, Fance onen@euecom.f Refik Molva Euecom
More informationAnonymity-enhanced Pseudonym System
JAIST Reposi https://dspace.j Title Anonymity-enhanced Pseudonym System Autho(s)Tamua, Yuko; Miyaji, Atsuko Citation Lectue Notes in Compute Science, 2 47 Issue Date 2003 Type Jounal Aticle Text vesion
More informationConspiracy and Information Flow in the Take-Grant Protection Model
Conspiacy and Infomation Flow in the Take-Gant Potection Model Matt Bishop Depatment of Compute Science Univesity of Califonia at Davis Davis, CA 95616-8562 ABSTRACT The Take Gant Potection Model is a
More informationInformation-Theoretic
Infomation-Theoetic Key Ageement fom Close Secets Leonid Reyzin Januay 5, 2018 IISc 1 Infomation-Theoetic Key Ageement fom Close Secets: A Suvey 0 1 assume these ae close and patially secet 2 Infomation-Theoetic
More informationarxiv: v1 [math.co] 1 Apr 2011
Weight enumeation of codes fom finite spaces Relinde Juius Octobe 23, 2018 axiv:1104.0172v1 [math.co] 1 Ap 2011 Abstact We study the genealized and extended weight enumeato of the - ay Simplex code and
More informationAppraisal of Logistics Enterprise Competitiveness on the Basis of Fuzzy Analysis Algorithm
Appaisal of Logistics Entepise Competitiveness on the Basis of Fuzzy Analysis Algoithm Yan Zhao, Fengge Yao, Minming She Habin Univesity of Commece, Habin, Heilongjiang 150028, China, zhaoyan2000@yahoo.com.cn
More informationMultiple Criteria Secretary Problem: A New Approach
J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and
More informationQIP Course 10: Quantum Factorization Algorithm (Part 3)
QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse
More informationDesign and Analysis of Password-Based Key Derivation Functions
Design and Analysis of Passwod-Based Key Deivation Functions 245 Fances F. Yao 1 and Yiqun Lisa Yin 2 1 Depatment of Compute Science, City Univesity of Hong Kong, Kowloon, Hong Kong csfyao@cityu.edu.hk
More informationANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE
THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the
More informationConcurrent Blind Signatures without Random Oracles
Concuent Blind Signatues without Random Oacles Aggelos Kiayias Hong-Sheng Zhou Abstact We pesent a blind signatue scheme that is efficient and povably secue without andom oacles unde concuent attacks utilizing
More informationLecture 7. Public Key Cryptography (Diffie-Hellman and RSA)
Lectue 7 Pulic Key Cytogahy (Diffie-Hellman and RSA) 1 Pulic Key Cytogahy Asymmetic cytogahy Invented in 1974-1978 (Diffie-Hellman and Rivest-Shami- Adleman) Two keys: ivate (SK), ulic (PK) Encytion: with
More informationDesign and Analysis of Password-Based Key Derivation Functions
Design and Analysis of Passwod-Based Key Deivation Functions Fances F. Yao 1 and Yiqun Lisa Yin 2 1 Depatment of Compute Science City Univesity of Hong Kong Kowloon, Hong Kong Email: csfyao@cityu.edu.hk
More informationQuantum Fourier Transform
Chapte 5 Quantum Fouie Tansfom Many poblems in physics and mathematics ae solved by tansfoming a poblem into some othe poblem with a known solution. Some notable examples ae Laplace tansfom, Legende tansfom,
More information3.1 Random variables
3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated
More informationChapter 10 Mechanism Design and Postcontractual Hidden Knowledge
Chapte 10 Mechanism Design and Postcontactual Hidden Knowledge 10.1 Mechanisms, Unavelling, Coss Checking, and the Revelation Pinciple A mechanism is a set of ules that one playe constucts and anothe feely
More informationChapter 3: Theory of Modular Arithmetic 38
Chapte 3: Theoy of Modula Aithmetic 38 Section D Chinese Remainde Theoem By the end of this section you will be able to pove the Chinese Remainde Theoem apply this theoem to solve simultaneous linea conguences
More informationAn Application of Fuzzy Linear System of Equations in Economic Sciences
Austalian Jounal of Basic and Applied Sciences, 5(7): 7-14, 2011 ISSN 1991-8178 An Application of Fuzzy Linea System of Equations in Economic Sciences 1 S.H. Nassei, 2 M. Abdi and 3 B. Khabii 1 Depatment
More informationWhen two numbers are written as the product of their prime factors, they are in factored form.
10 1 Study Guide Pages 420 425 Factos Because 3 4 12, we say that 3 and 4 ae factos of 12. In othe wods, factos ae the numbes you multiply to get a poduct. Since 2 6 12, 2 and 6 ae also factos of 12. The
More informationPAPER 39 STOCHASTIC NETWORKS
MATHEMATICAL TRIPOS Pat III Tuesday, 2 June, 2015 1:30 pm to 4:30 pm PAPER 39 STOCHASTIC NETWORKS Attempt no moe than FOUR questions. Thee ae FIVE questions in total. The questions cay equal weight. STATIONERY
More informationI. Introduction to ecological populations, life tables, and population growth models
3-1 Population ecology Lab 3: Population life tables I. Intoduction to ecological populations, life tables, and population gowth models This week we begin a new unit on population ecology. A population
More informationTwo Attacks on a White-Box AES Implementation
Two Attacks on a White-Box AES Implementation Tancède Lepoint,, Matthieu Rivain, Yoni De Mulde, Pete Roelse 4, and Bat Peneel CyptoExpets, Fance {tancede.lepoint,matthieu.ivain}@cyptoexpets.com École Nomale
More informationE E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou
P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou CONTENTS 1 Contents 2 1 Intoduction To begin discussing the basic popeties
More informationUnobserved Correlation in Ascending Auctions: Example And Extensions
Unobseved Coelation in Ascending Auctions: Example And Extensions Daniel Quint Univesity of Wisconsin Novembe 2009 Intoduction In pivate-value ascending auctions, the winning bidde s willingness to pay
More informationCircular Orbits. and g =
using analyse planetay and satellite motion modelled as unifom cicula motion in a univesal gavitation field, a = v = 4π and g = T GM1 GM and F = 1M SATELLITES IN OBIT A satellite is any object that is
More informationInternational Journal of Mathematical Archive-3(12), 2012, Available online through ISSN
Intenational Jounal of Mathematical Achive-3(), 0, 480-4805 Available online though www.ijma.info ISSN 9 504 STATISTICAL QUALITY CONTROL OF MULTI-ITEM EOQ MOEL WITH VARYING LEAING TIME VIA LAGRANGE METHO
More informationAMC 10 Contest B. Solutions Pamphlet. Wednesday, FEBRUARY 21, American Mathematics Competitions
The MATHEMATICAL ASSOCIATION of AMERICA Ameican Mathematics Competitions 8 th Annual Ameican Mathematics Contest 10 AMC 10 Contest B Solutions Pamphlet Wednesday, FEBRUARY 21, 2007 This Pamphlet gives
More informationEM Boundary Value Problems
EM Bounday Value Poblems 10/ 9 11/ By Ilekta chistidi & Lee, Seung-Hyun A. Geneal Desciption : Maxwell Equations & Loentz Foce We want to find the equations of motion of chaged paticles. The way to do
More informationThe Chromatic Villainy of Complete Multipartite Graphs
Rocheste Institute of Technology RIT Schola Wos Theses Thesis/Dissetation Collections 8--08 The Chomatic Villainy of Complete Multipatite Gaphs Anna Raleigh an9@it.edu Follow this and additional wos at:
More informationChapter 5 Force and Motion
Chapte 5 Foce and Motion In Chaptes 2 and 4 we have studied kinematics, i.e., we descibed the motion of objects using paametes such as the position vecto, velocity, and acceleation without any insights
More informationRelated Rates - the Basics
Related Rates - the Basics In this section we exploe the way we can use deivatives to find the velocity at which things ae changing ove time. Up to now we have been finding the deivative to compae the
More informationA Bijective Approach to the Permutational Power of a Priority Queue
A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation
More informationGoodness-of-fit for composite hypotheses.
Section 11 Goodness-of-fit fo composite hypotheses. Example. Let us conside a Matlab example. Let us geneate 50 obsevations fom N(1, 2): X=nomnd(1,2,50,1); Then, unning a chi-squaed goodness-of-fit test
More informationAPPLICATION OF MAC IN THE FREQUENCY DOMAIN
PPLICION OF MC IN HE FREQUENCY DOMIN D. Fotsch and D. J. Ewins Dynamics Section, Mechanical Engineeing Depatment Impeial College of Science, echnology and Medicine London SW7 2B, United Kingdom BSRC he
More informationNotes on McCall s Model of Job Search. Timothy J. Kehoe March if job offer has been accepted. b if searching
Notes on McCall s Model of Job Seach Timothy J Kehoe Mach Fv ( ) pob( v), [, ] Choice: accept age offe o eceive b and seach again next peiod An unemployed oke solves hee max E t t y t y t if job offe has
More informationProvable Security in Cryptography
Povable Secuity in Cyptogaphy Thomas Baignèes EPFL http://lasecwww.epfl.ch May 29, 2007 (ve. 25) These lectue notes ae a compilation of some of my eadings while I was pepaing two lectues given at EPFL
More informationRigid Body Dynamics 2. CSE169: Computer Animation Instructor: Steve Rotenberg UCSD, Winter 2018
Rigid Body Dynamics 2 CSE169: Compute Animation nstucto: Steve Rotenbeg UCSD, Winte 2018 Coss Poduct & Hat Opeato Deivative of a Rotating Vecto Let s say that vecto is otating aound the oigin, maintaining
More informationMATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE. We consider second order constant coefficient scalar linear PDEs on R n. These have the form
MATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE ANDRAS VASY We conside second ode constant coefficient scala linea PDEs on R n. These have the fom Lu = f L = a ij xi xj + b i xi + c i whee a ij b i and
More informationOLYMON. Produced by the Canadian Mathematical Society and the Department of Mathematics of the University of Toronto. Issue 9:2.
OLYMON Poduced by the Canadian Mathematical Society and the Depatment of Mathematics of the Univesity of Toonto Please send you solution to Pofesso EJ Babeau Depatment of Mathematics Univesity of Toonto
More informationBetween any two masses, there exists a mutual attractive force.
YEAR 12 PHYSICS: GRAVITATION PAST EXAM QUESTIONS Name: QUESTION 1 (1995 EXAM) (a) State Newton s Univesal Law of Gavitation in wods Between any two masses, thee exists a mutual attactive foce. This foce
More informationPhysics 2A Chapter 10 - Moment of Inertia Fall 2018
Physics Chapte 0 - oment of netia Fall 08 The moment of inetia of a otating object is a measue of its otational inetia in the same way that the mass of an object is a measue of its inetia fo linea motion.
More informationChapter 3 Optical Systems with Annular Pupils
Chapte 3 Optical Systems with Annula Pupils 3 INTRODUCTION In this chapte, we discuss the imaging popeties of a system with an annula pupil in a manne simila to those fo a system with a cicula pupil The
More informationA STUDY OF HAMMING CODES AS ERROR CORRECTING CODES
AGU Intenational Jounal of Science and Technology A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES Ritu Ahuja Depatment of Mathematics Khalsa College fo Women, Civil Lines, Ludhiana-141001, Punjab, (India)
More informationMore Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
Moe Efficient Oblivious Tansfe Extensions with Secuity fo Malicious Advesaies Gilad Ashaov Yehuda Lindell Thomas Schneide Michael Zohne Hebew Univesity Ba-Ilan Univesity Damstadt Damstadt EUROCRYPT 2015
More informationHydroelastic Analysis of a 1900 TEU Container Ship Using Finite Element and Boundary Element Methods
TEAM 2007, Sept. 10-13, 2007,Yokohama, Japan Hydoelastic Analysis of a 1900 TEU Containe Ship Using Finite Element and Bounday Element Methods Ahmet Egin 1)*, Levent Kaydıhan 2) and Bahadı Uğulu 3) 1)
More informationac p Answers to questions for The New Introduction to Geographical Economics, 2 nd edition Chapter 3 The core model of geographical economics
Answes to questions fo The New ntoduction to Geogaphical Economics, nd edition Chapte 3 The coe model of geogaphical economics Question 3. Fom intoductoy mico-economics we know that the condition fo pofit
More informationHigh precision computer simulation of cyclotrons KARAMYSHEVA T., AMIRKHANOV I. MALININ V., POPOV D.
High pecision compute simulation of cyclotons KARAMYSHEVA T., AMIRKHANOV I. MALININ V., POPOV D. Abstact Effective and accuate compute simulations ae highly impotant in acceleatos design and poduction.
More informationDonnishJournals
DonnishJounals 041-1189 Donnish Jounal of Educational Reseach and Reviews. Vol 1(1) pp. 01-017 Novembe, 014. http:///dje Copyight 014 Donnish Jounals Oiginal Reseach Pape Vecto Analysis Using MAXIMA Savaş
More informationThree-dimensional Quantum Cellular Neural Network and Its Application to Image Processing *
Thee-dimensional Quantum Cellula Neual Netwok and Its Application to Image Pocessing * Sen Wang, Li Cai, Huanqing Cui, Chaowen Feng, Xiaokuo Yang Science College, Ai Foce Engineeing Univesity Xi an 701,
More informationChapter 5 Force and Motion
Chapte 5 Foce and Motion In chaptes 2 and 4 we have studied kinematics i.e. descibed the motion of objects using paametes such as the position vecto, velocity and acceleation without any insights as to
More informationLecture 14. Protocols. Key Distribution Center (KDC) or Trusted Third Party (TTP) KDC generates R1
Lectue 14 Potocols 1 Key Distiution Cente (KDC) o Tusted Thid Pty (TTP) KDC genetes R1 lice otins R1 Msg1: K () Msg2: K (R1 K (R1) ) Msg3: K (R1) o otins R1 nd knows to use s key fo communicting with lice
More information1D2G - Numerical solution of the neutron diffusion equation
DG - Numeical solution of the neuton diffusion equation Y. Danon Daft: /6/09 Oveview A simple numeical solution of the neuton diffusion equation in one dimension and two enegy goups was implemented. Both
More informationLong-range stress re-distribution resulting from damage in heterogeneous media
Long-ange stess e-distibution esulting fom damage in heteogeneous media Y.L.Bai (1), F.J.Ke (1,2), M.F.Xia (1,3) X.H.Zhang (1) and Z.K. Jia (1) (1) State Key Laboatoy fo Non-linea Mechanics (LNM), Institute
More informationInternet Appendix for A Bayesian Approach to Real Options: The Case of Distinguishing Between Temporary and Permanent Shocks
Intenet Appendix fo A Bayesian Appoach to Real Options: The Case of Distinguishing Between Tempoay and Pemanent Shocks Steven R. Genadie Gaduate School of Business, Stanfod Univesity Andey Malenko Gaduate
More informationAn Actuarial Approach for Aggregate Loss Assessment of the Critical Infrastructure Due to Natural Disasters
0 Intenational Confeence on Education and anagement Innovation IPEDR vol30 (0 (0 IACSIT Pess, Singapoe An Actuaial Appoach fo Aggegate Loss Assessment of the Citical Infastuctue Due to atual Disastes Plamena
More informationITI Introduction to Computing II
ITI 1121. Intoduction to Computing II Macel Tucotte School of Electical Engineeing and Compute Science Abstact data type: Stack Stack-based algoithms Vesion of Febuay 2, 2013 Abstact These lectue notes
More informationAbsolute Specifications: A typical absolute specification of a lowpass filter is shown in figure 1 where:
FIR FILTER DESIGN The design of an digital filte is caied out in thee steps: ) Specification: Befoe we can design a filte we must have some specifications. These ae detemined by the application. ) Appoximations
More informationA NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM
Poceedings of the ASME 2010 Intenational Design Engineeing Technical Confeences & Computes and Infomation in Engineeing Confeence IDETC/CIE 2010 August 15-18, 2010, Monteal, Quebec, Canada DETC2010-28496
More informationPhysics 211: Newton s Second Law
Physics 211: Newton s Second Law Reading Assignment: Chapte 5, Sections 5-9 Chapte 6, Section 2-3 Si Isaac Newton Bon: Januay 4, 1643 Died: Mach 31, 1727 Intoduction: Kinematics is the study of how objects
More informationUniversal Gravitation
Chapte 1 Univesal Gavitation Pactice Poblem Solutions Student Textbook page 580 1. Conceptualize the Poblem - The law of univesal gavitation applies to this poblem. The gavitational foce, F g, between
More informationSecret Exponent Attacks on RSA-type Schemes with Moduli N = p r q
Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de
More information7.2. Coulomb s Law. The Electric Force
Coulomb s aw Recall that chaged objects attact some objects and epel othes at a distance, without making any contact with those objects Electic foce,, o the foce acting between two chaged objects, is somewhat
More informationMultiple Experts with Binary Features
Multiple Expets with Binay Featues Ye Jin & Lingen Zhang Decembe 9, 2010 1 Intoduction Ou intuition fo the poect comes fom the pape Supevised Leaning fom Multiple Expets: Whom to tust when eveyone lies
More informationPROBLEM SET #1 SOLUTIONS by Robert A. DiStasio Jr.
POBLM S # SOLUIONS by obet A. DiStasio J. Q. he Bon-Oppenheime appoximation is the standad way of appoximating the gound state of a molecula system. Wite down the conditions that detemine the tonic and
More informationHidden Identity-Based Signatures
Hidden Identity-Based Signatues ggelos Kiayias Hong-Sheng Zhou bstact This pape intoduces Hidden Identity-based Signatues (Hidden-IBS), a type of digital signatues that povide mediated signe-anonymity
More informationValue of Traveler Information for Adaptive Routing in Stochastic Time-Dependent Networks
Univesity of Massachusetts Amhest ScholaWoks@UMass Amhest Mastes Theses 1911 - Febuay 2014 2009 Value of Tavele Infomation fo Adaptive Routing in Stochastic Time-Dependent Netwoks He Huang Univesity of
More informationFixed Argument Pairing Inversion on Elliptic Curves
Fixed Agument Paiing Invesion on Elliptic Cuves Sungwook Kim and Jung Hee Cheon ISaC & Dept. of Mathematical Sciences Seoul National Univesity Seoul, Koea {avell7,jhcheon}@snu.ac.k Abstact. Let E be an
More informationA DETAILED DESCRIPTION OF THE DISCREPANCY IN FORMULAS FOR THE STANDARD ERROR OF THE DIFFERENCE BETWEEN A RAW AND PARTIAL CORRELATION: A TYPOGRAPHICAL
Olkin and Finn Discepancy A DETAILED DESCRIPTION OF THE DISCREPANCY IN FORMULAS FOR THE STANDARD ERROR OF THE DIFFERENCE BETWEEN A RAW AND PARTIAL CORRELATION: A TYPOGRAPHICAL ERROR IN OLKIN AND FINN (995
More informationAP-C WEP. h. Students should be able to recognize and solve problems that call for application both of conservation of energy and Newton s Laws.
AP-C WEP 1. Wok a. Calculate the wok done by a specified constant foce on an object that undegoes a specified displacement. b. Relate the wok done by a foce to the aea unde a gaph of foce as a function
More information18.06 Problem Set 4 Solution
8.6 Poblem Set 4 Solution Total: points Section 3.5. Poblem 2: (Recommended) Find the lagest possible numbe of independent vectos among ) ) ) v = v 4 = v 5 = v 6 = v 2 = v 3 =. Solution (4 points): Since
More informationAP Physics C: Electricity and Magnetism 2001 Scoring Guidelines
AP Physics C: Electicity and Magnetism 1 Scoing Guidelines The mateials included in these files ae intended fo non-commecial use by AP teaches fo couse and exam pepaation; pemission fo any othe use must
More informationPhysics 121 Hour Exam #5 Solution
Physics 2 Hou xam # Solution This exam consists of a five poblems on five pages. Point values ae given with each poblem. They add up to 99 points; you will get fee point to make a total of. In any given
More informationLab 10: Newton s Second Law in Rotation
Lab 10: Newton s Second Law in Rotation We can descibe the motion of objects that otate (i.e. spin on an axis, like a popelle o a doo) using the same definitions, adapted fo otational motion, that we have
More informationMerging to ordered sequences. Efficient (Parallel) Sorting. Merging (cont.)
Efficient (Paae) Soting One of the most fequent opeations pefomed by computes is oganising (soting) data The access to soted data is moe convenient/faste Thee is a constant need fo good soting agoithms
More informationAttribute Based Data Sharing with Attribute Revocation
Attibute Based Data Shaing with Attibute Revocation Shucheng Yu Depatment of ECE Woceste Polytechnic Institute Woceste, MA 01609 yscheng@wpi.edu Cong Wang Depatment of ECE Illinois Institute of Technology
More informationA Multivariate Normal Law for Turing s Formulae
A Multivaiate Nomal Law fo Tuing s Fomulae Zhiyi Zhang Depatment of Mathematics and Statistics Univesity of Noth Caolina at Chalotte Chalotte, NC 28223 Abstact This pape establishes a sufficient condition
More informationHandout: IS/LM Model
Econ 32 - IS/L odel Notes Handout: IS/L odel IS Cuve Deivation Figue 4-4 in the textbook explains one deivation of the IS cuve. This deivation uses the Induced Savings Function fom Chapte 3. Hee, I descibe
More informationInformation Retrieval Advanced IR models. Luca Bondi
Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the
More information6 PROBABILITY GENERATING FUNCTIONS
6 PROBABILITY GENERATING FUNCTIONS Cetain deivations pesented in this couse have been somewhat heavy on algeba. Fo example, detemining the expectation of the Binomial distibution (page 5.1 tuned out to
More informationC/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22
C/CS/Phys C9 Sho s ode (peiod) finding algoithm and factoing /2/4 Fall 204 Lectue 22 With a fast algoithm fo the uantum Fouie Tansfom in hand, it is clea that many useful applications should be possible.
More informationThe geometric construction of Ewald sphere and Bragg condition:
The geometic constuction of Ewald sphee and Bagg condition: The constuction of Ewald sphee must be done such that the Bagg condition is satisfied. This can be done as follows: i) Daw a wave vecto k in
More informationLab #4: Newton s Second Law
Lab #4: Newton s Second Law Si Isaac Newton Reading Assignment: bon: Januay 4, 1643 Chapte 5 died: Mach 31, 1727 Chapte 9, Section 9-7 Intoduction: Potait of Isaac Newton by Si Godfey Knelle http://www.newton.cam.ac.uk/at/potait.html
More informationChannel matrix, measurement matrix and collapsed matrix. in teleportation
Channel matix, measuement matix and collapsed matix in telepotation XIN-WEI ZHA, JIAN-XIA QI and HAI-YANG SONG School of Science, Xi an Univesity of Posts and Telecommunications, Xi an, 71011, P R China
More informationChapter Eight Notes N P U1C8S4-6
Chapte Eight Notes N P UC8S-6 Name Peiod Section 8.: Tigonometic Identities An identit is, b definition, an equation that is alwas tue thoughout its domain. B tue thoughout its domain, that is to sa that
More informationPHYS 301 HOMEWORK #10 (Optional HW)
PHYS 301 HOMEWORK #10 (Optional HW) 1. Conside the Legende diffeential equation : 1 - x 2 y'' - 2xy' + m m + 1 y = 0 Make the substitution x = cos q and show the Legende equation tansfoms into d 2 y 2
More information