Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm

Size: px
Start display at page:

Download "Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm"

Transcription

1 110 Cryptanalyss of a Publc-key Cryptosystem Usng Lattce Bass Reducton Algorthm Roohallah Rastagh 1, Hamd R. Dall Oskoue 2 1,2 Department of Electrcal Engneerng, Aeronautcal Unversty of Snce & Technology, Tehran, Iran Abstract In ths paper, we proposed a new attack aganst Hwang et al. s cryptosystem. Ths cryptosystem uses a super-ncreasng sequence as prvate key and the authors nvestgate a new algorthm called permutaton combnaton algorthm to enhance densty of knapsack to avod the low-densty attack. Sattar J. Aboud [Aboud j. Sattar, An mproved knapsack publc key cryptography system, Internatonal Journal of Internet Technology and Secured Transactons, Vol.3 (3), pp , 2011] used Shamr s attack on the basc Merkle-Hellman cryptosystem to break ths cryptosystem. Due to use of Lenstera s nteger programmng, Lagaras showed that Shamr s attack s neffcent n practce; So, Aboud s attack s mpractcal too. In ths paper, we ntroduce a drect attack aganst Hwang et al. s cryptosystem based on Lattce bass reducton algorthms. By computng complexty of propose attack, we show that unlke Aboud s cryptanalyss, our cryptanalyss s more effcent and practcable. Key words: Knapsack-type cryptosystem, LLL-lattce bass reducton algorthm, smultaneous Dophantne approxmaton, Cryptanalyss. 1. Introducton The frst knapsack-type publc key cryptosystem (PKC) was ntroduced by Merkle and Hellman[12]. Snce ts proposal, knapsack-type PKC had been wdely studed and many knapsack PKCs were developed. However, almost all knapsack cryptosystems were shown nsecure n that they are vulnerable to some known attacks, such as low densty attack [2,8], orthogonal lattce attack [15],.... Nowadays, we reconsder knapsack publc key cryptography because Shor [17] showed that nteger factorzaton and dscrete logarthm problems can be easly solved by usng quantum computers. Therefore, tradtonal publc key cryptosystem based on the two problems cannot be used to provde prvacy protectons any longer and publc key cryptosystems secure n quantum computng envronments are needed to be developed. The knapsack problem s NP-complete [14]. Hence, we can desgn cryptosystems based on the knapsack problem n order to resst quantum attacks. On the other hand, although the underlyng problem s NP-complete, but some of the knapsack cryptosystems such as Merkle-Hellman [16], Chor-Rvest [18], was broken due to the specal structure of the prvate key and the mathematcal way that publc key (publc knapsack) was bult from the prvate key. M. S. Hwang et al. [6] ntroduced a new knapsack type publc key cryptosystem n Ths cryptosystem s based on basc Merkel-Hellman knapsack cryptosystem [12] and uses a super-ncreasng sequence as prvate key. They nvestgate a new algorthm called permutaton combnaton algorthm. By explotng ths algorthm, the authors attempted to enhance densty of knapsack to avod the low-densty attack. Hwang et al. knapsack-type cryptosystem was attacked by Aboud [1]. Aboud s attack s based on Shamr s attack [16] on the basc Merkle- Hellman cryptosystem. Lagaras [9] showed due to use of Lenstera s nteger programmng, Shamr s attack s neffcent n practce, so, Aboud s attack s not practcable. In ths paper, we use LLL-lattce bass reducton algorthm for analyss Hwang et al. s knapsack-type cryptosystem. The LLL-lattce bass reducton algorthm s a crucal component n many number-theoretc algorthms. It s useful for solvng certan knapsack (subset sum) problems, and has been used for cryptanalyzeng publc-key encrypton schemes whch are based on the subset sum problem. We show that because of the specal structure n the key generaton stage, we can use the LLL-lattce bass reducton algorthm for cryptanalyzeng Hwang et al. s cryptosystem and obtan equvalent prvate keys (superncreasng sequences). The rest of ths paper s organzed as follows: In the followng secton, we brefly explan some mathematcal background. These concepts are useful for understandng the securty analyss of the Hwang et al. s cryptosystem. Then, n Secton 3, we revew Hwang et al. s knapsack cryptosystem. New cryptanalyss of ths cryptosystem wll be dscussed n Secton 4 and n secton 5, we compute the computatonal complexty of the proposed attack.

2 Mathematcal Background In ths secton, we recall some concepts about the subsetsum problem and lattce theory. These concepts are useful to understand the securty analyss of the Hwang et al. s cryptosystem. The subset sum problem s stated as follows: Defnton1. (Subset sum problem (SSP)). A set of postve ntegers ( a1, a2,, a n ) and postve nteger s s gven. Whether there s a subset of the a s that ther sum equal to s. That s equvalent to determne whether there are varables x {0,1}, 1 n such that n x. a = s = 1 The Subset sum problem s a partcular case of the 0-1 knapsack problem. The subset sum problem has been proven to be NP-complete. The computatonal verson of the subset sum problem s NP-hard [13]. Defnton2. (super-ncreasng sequence). ) The sequence ( a1, a2,, a n ) of postve ntegers s a super-ncreasng 1 sequence, f a > j= 1 a j for all 2. There s an effcent greedy algorthm to solve the subset sum problem f the a are a super-ncreasng sequence: Just subtract the largest possble value from s and repeat. Algorthm1 effcently solves the subset sum problem for super-ncreasng sequences n the polynomal tme. Algorthm1:Solvng a super-ncreasng subset sum problem INPUT: super-ncreasng sequence ( a1, a2,, a n ) and an nteger s whch s the sum of a subset of the a s. OUTPUT: ( x1, x2,, x n ) where x {0,1}, such that n = 1 a. x s =. 1. n 2. Whle 1 do the followng: 2.2. If s a then x 1 and s s a Otherwse x Return( ( x1, x2,, x n ) ). Knapsack publc-key encrypton schemes are based on the subset sum problem, whch s NP-complete. The basc dea s to select an nstance of the subset sum problem that s easy to solve, and then to dsguse t as an nstance of the general subset sum problem whch s hopefully dffcult to solve. The orgnal knapsack set can serve as the prvate key, whle the transformed knapsack set serves as the publc key. Defnton3. Let =(,,..., ) and =(,,..., ) be two vectors n R. The nner product of and s the real number <,> = Defnton4. Let =(,,..., ) be a vector n R. The l norm (or Eucld norm) of s the real number y = < y, y > = y + y + + y n The sup norm, maxmum norm or l norm s: We can show that = max,,, Defnton5. Let {,,, } be a set of lnearly ndependent vectors n R ( ). The set of all nteger lnear combnatons of,,, s called a lattce of dmenson; that s m L = l f : l Z. = 1 The vectors,,, are called a bass for the lattce. Defnton6. (Gram-Schmdt orthogonalzaton). Let {,,, } be an arbtrary bass of R. Defne the vectors,1 nductvely by =, Where, =,, for 1. In partcular =. We wll call,,, the Gram-Schmdt orthogonal bass of {,,, } and the together, form the Gram-Schmdt orthogonalzaton of {,,, }. A lattce can have many dfferent bases. A bass consstng of vectors of relatvely small lengths s called reduced. The followng defnton provdes a useful noton of a reduced bass, and s based on the Gram-Schmdt orthogonalzaton procedure.

3 112 Defnton7. Let,,, R be lnearly ndependent and,,, the correspondng Gram-Schmdt orthogonal bass. Then {,,, } s reduced f for 1 <. So we have 2 = The bass {,,, } s sad to be reduced (more precsely, Lovász-reduced) f, 1 2, 1 < (where, denotes the absolute value of, ), and, 1<<. The LLL-lattce bass reducton algorthm s a crucal component n many number-theoretc algorthms such as smultaneous Dophantne approxmaton Problem. It s useful for solvng certan subset sum problems, and has been used for cryptanalyzeng publc-key encrypton schemes whch are based on the subset sum problem. Algorthm2[13]: LLL-lattce bass reducton algorthm INPUT: a bass{,,, } for a lattce n R,. OUTPUT: a reduced bass for. 1., <, >. 2. For from 2 to do the followng: For from 1 to 1, set, <, >/ and,. 2.3 <, > Execute subroutne (, 1) to possbly update some,. 5. If <(,) then do the followng: 5.1 Set μ μ,, +,, /, / and. 5.2 Exchange and. 5.3 If >2 then exchange, and, for =1,2,, For =+1,+2,,: Set,,,,, and, t+μ, μ,. 5.5 (2, 1). 5.6 Go to step 4. Otherwse, for = 2, 3,,1, execute (,), and fnally set If then go to step 4. Otherwse, return {,,, }. (,): If, >1/2 then do the followng: ,,. 2. For from 1 to 1, set,,,. 3.,,. The LLL-lattce bass reducton algorthm s a polynomaltme algorthm for fndng a reduced bass, gven a bass for a lattce. Theorem1. Let Z be a lattce wth bass {,,, }, and let R, 2 be such that for =1,2,...,. Then the number of arthmetc operatons needed by Algorthm2 s ( ), on ntegers of sze ( ) bts, whch s polynomal tme. Proof: see [11]. Lemma 1. Let,,, be a LLL reduced bass of a ratonal lattce Q and,,, be ts Gram- Schmdt orthogonalzaton. Then Proof: see [5]. ()=. Defnton8. (Smultaneous Dophantne Approxmaton Problem). Let,,, R and let >0. Let N be an nteger such that. The smultaneous dophantne approxmaton problem s to fnd (,,, ) Z such that 0< and / / for all 1. A major applcaton of algorthm2 s to gve an algorthm to compute the ntegers (,,, ) n Defnton8. In practce, the real numbers,,, are gven to some decmal precson (and so are ratonal numbers wth coeffcents of some sze). The sze of an nstance of the smultaneous Dophantne approxmaton s the sum of the bt lengths of the numerator and denomnator of the gven approxmatons to the, together wth the bt length of the representaton of and. Let be a bound on the absolute value of all numerators and denomnators of the.the computatonal task s to fnd a soluton (,,, ) n tme whch s polynomal n, log(), log(1/) and logq.

4 113 Theorem2. (Solvng the smultaneous Dophantne approxmaton problem). Let,,, Q be gven as ratonal numbers wth numerator and denomnator bounded n absolute value by. Let 0<<1. One can compute n polynomal tme ntegers (,,, ) such that 0<<2 ()/ () and / / for all 1. Proof: A general proof of ths theorem s gven n [7] but we ntroduce dfferent and smple proof. Let = 2 ()/ and Q be the lattce by the rows,, Q of the matrx / The dmenson s +1 and the determnant s /= 2 ()/. The entres of the lattce are ratos of ntegers wth absolute value bounded by {, ()/ }. Note that the lattce does not have a bass wth entres n Z, but rather n Q. The LLL algorthm appled to, outputs a non-zero vector =(,, )=(/,,,, ). If s the smallest vector found by the LLL-algorthm, then from defnton7, we have By multplyng together the +1 above nequalty, we have Hence, () ()/ 2 / ( ) /() From lemma 1, we know that ()= and so 2 / () /() =2 / 2 / =<1. If =0 then =(0,,,, ) wth some 0 and so 1, hence 0. Wthout loss of generalty, >0. Snce and <<1 t follows that /<<1 (where =/= ) and so 0<</=2 ()/ (). Smlarly, for other, 2 we have and so / / for 1. Theorem3. If we use LLL algorthm for solvng Smultaneous Dophantne Approxmaton Problem, then the computatonal complexty of the problem s ( { (), + (1/)} ), whch s polynomal tme. Proof: See [7]. 3. Hwang Et Al. s Cryptosystem Hwang et al. s cryptosystem s based on the basc Merkle- Hellman knapsack cryptosystem. 3.1 Key Generaton: Each user chooses a super-ncreasng sequence (,,, ) as secret key..e. > (=1,2,,1360). Choose a large prme as modulus such that >, two modular multplers and such that (,)=1, and. =1. Each user transfers super-ncreasng sequence =(,,, ) nto a pseudorandom sequence =(,,, ) as follows: =., (1 1360) (1) The publc key s (,,, ) and the prvate key s {(,,, ),,,}. They presented a permutaton combnaton algorthm and used ths algorthm to ensure the securty of the cryptosystem. By explotng ths algorthm, they attempted to enhance densty of knapsack to avod the low-densty attack [2, 8]. The permutaton algorthm s as follows: 1. Defne an orgnal sequence ={,,,,,,,, }. 2. Recombne all the elements of the orgnal sequence whch obtan (! 1) sequences,..., (!). The sequences (=1,2,,! 1) are defned as follows: ={,,,,,,,, } ={,,,,,,,, }! ={,,,,,, } 3. Suppose we can compute for 1! 1. can be wrtten as = ( )!, 0. Each sequence has an own correspondng value called the

5 114 factoral carry value, {,,.,, }. Usng the factoral carry value, we can effcently obtan any sequence wth the followng algorthm. Algorthm 3: permutaton combnaton algorthm INPUT: =(,,, ) and ntegers. OUTPUT: =(,,, ). = ( )!. For 1 do f = 0 then = ; else { for (1 ) do = }; Return (,,, ). For nstance, generate the orgnal vector 0 = (,,,,,). Fnd the result of : 100=0 5!+4 4!+0 3!+2 2!+0 1!+0 then = (,,,,,). 3.2 Encrypton: For encrypt the message, the sender executes the followng steps: 1. Select a hash functon whose dgest s 1024 bts and compute the dgest of as = (). 2. Compute = 170! 3. Compute the factoral carry value ={,,, } of where = 169!+ 168!+ + 0! 4. Dvde the publc key vector =(,,, ) nto 8 subset publc key vectors. Each subset publc key vector has 170 elements. ={(,,, ),...,(,,, )}. 5. Recombne each subset publc key vector usng ={,,, } by means of the permutaton combnaton Algorthm. Then chooses the frst 128 elements n each subset publc key vector. Thus, the sender obtan 1024 elements = (,,, ). 6. The message s dvded nto {,,, }. Each (=1,2,,) s a 1024-bt message: ={,,,, } 7. The correspondng cphertext s gven as the product of =(,,, ) and (= 1,2,,). =,, 1. The cphertext s ={,..., } and sends (, ) to the recever. 3.3 Decrypton: Recever after recevng (, ), executes the followng steps to derve from and : 1. Compute the factoral carry value ={,,, } of where = 169!+ 168!+, Dvde hs/her secret key vector =(,,, ) nto 8 subset publc key vectors. Each key vector has 170 elements. = {(,,, ),...,(,,, )}. 3. Recombne each subset publc key vector usng ={,,, } by means of the Permutaton Combnaton Algorthm. Then chooses the frst 128 elements n each subset publc key vector. The recever obtan 1024 elements =(,,, ). However =(,,, ) s stll a superncreasng sequence. 5. Dvde nto ={,..., }. Each (=1,2,,) s a 1024-bt cphertext. 6. Compute = = ( = ( =, ), ), for =1,2,,. So we have =,. Snce > we have =,. Hence, the recever can solves these super-ncreasng knapsack problems wth algorthm1 and obtans, for and 1. Therefore, we can recover orgnal message ={,,, } where ={,,,, }. Aboud attacked ths cryptosystem by usng Shamr s attack [16] on the basc Merkle-Hellman cryptosystem. As we sad, Lagaras n [9] showed Shamr s attack s neffcent n practce, so Aboud s attack s not practcable.

6 Our Proposed Attack In ths secton, we present our attack aganst the Hwang et al. s knapsack cryptosystem. The frst step n the attack s notcng that the gven knapsack problem = (wth publc weghts (,,..., ) and target ) can be transformed nto nfntely many dfferent easy knapsack problems wth super-ncreasng weghts (,,..., ) and target. Ths was ndependently observed by Eer-Lagger [4] and Desmedt-Vanderwalle-Govaerts [3]. Ther result can be summarzed n the followng lemma. Let (,,, ) be the prvate super-ncreasng sequence, (,,..., ) be the Correspondng publc key such that =. and, be defned as n secton 3. Let =, so we have =.. Lemma 2. There exsts an >0 such that f s ratonal wth <, then the weghts (,,..., ) where = for =1,..., are super-ncreasng. Our attack conssts of three steps: n step1, we can use LLL-lattce bass reducton algorthm for fndng a superncreasng sequence =(,,, ) that s very close to super-ncreasng sequence =(,,, ). In step2 and step3 we use super-ncreasng sequence = (,,, ) and publc cphertext (, ) for recover the plantext. Step1: In the general form, equaton (1) can be wrtten as follows: =., 1. Where (,,, ) s the publc key and (,,, ) s the prvate key. Let = where 1 <. We have =. =.,1 (2) Ths means that for 1, there exsts some ntegers such that and 0 <. Hence, = 0 / / = /. (3) Snce (,,, ) s a super-ncreasng sequence, so 2 and wth > we have 0 </2 Hence 0 / / <1/ 2. In partcular, the rght sde of / / <1/( 2 ) s very small. Hence, we can assume / /. (4) From equaton (4), If we take = and =, then / s very close to / and from lemma 2, the postve ntegers = for 1 are a superncreasng sequence (note that s are publc and obvous). Subtractng the case =1 of equaton (3) from the -th gves and so, for 2, = = = < =2 < (5) Snce s publc, It remans to compute the nteger such that equaton (5) holds, gven only the ntegers,,...,. Another way to wrte equaton (5) s <,2. (6) and one sees that the problem s precsely smultaneous Dophantne approxmaton. From theorem2, We can solve the smultaneous Dophantne approxmaton n the polynomal tme and fnd a value for. We now set = and = (note that s publc) and computes = for 1 to obtan the sequence (,,..., ), as we sad ths s a super-ncreasng sequence. We then compute = ( ) for any challenge cphertext. Snce (,,..., ) s super-ncreasng sequence, we can solve an easy knapsack problem = wth algorthm1 and therefore the orgnal message bts,1 are recovered. Let =2 ()/ and =/. We can use LLL-lattce bass reducton for solve equaton (5) (smultaneous Dophantne approxmaton) and hence, the value of = s determnd. Consder the lattce () wth dmenson +1 and bass matrx 0 0 =

7 IJCSI Internatonal Journal of Computer Scence Issues, Vol. 9, Issue 5, No 1, September where 0<<1 and 1<<. LLL-lattce bass reducton algorthm can be appled to the lattce () to output a relatvely short vector =( 1, 2,, ), whch can be used to approxmate the smultaneous Dophantne approxmaton problem. Snce (), there exst ntegers,,, such that =(,,, ) =(,,,, ) where (,,, ) s the publc key. After computng =(,,, ) wth LLL-lattce bass reducton algorthm, we can compute from equaton =. Wth the par (, )=(, ), we now compute ntegers =., 1 n whch form lemma 2, ths s a super-ncreasng sequence. We can use ths sequence n place of to prvate key (,,, ). Step2: We can eavesdrop publc cphertext (, ) from nsecure channel and hence we can compute factoral carry value ={,,, } of where = 169!+ 168!+ + 0! wth the followng algorthm. Algorthm4: compute the factoral carry value of nteger INPUT: ntegers, such that <!. OUTPUT: {,,..., } such that 0 and = ( )! for =1 to do ()! (+1 )! 3. Return "{,,..., }" Step3: We dvde super-ncreasng sequence (,,, ) (whch s computed n step1) nto 8 subset publc key vectors: = {(,,, ), (,,, ), (,,, )}. and recombne each subset publc key vector usng factoral carry value =(,,, ) (whch s computed n step2) by means of the permutaton combnaton algorthm. Smlar Hwang et al. s cryptosystem, we can choose frst 128 elements n each subset publc key vector. Then, we wll obtan 1024 elements (,,, ). Wth computed par (, ) from step1, frst compute = and then dvde nto ={,..., }. Each,1 s a 1024-bt message. Now, snce (,,, ) s super-ncreasng sequence, we can use algorthm1 for solve the followng superncreasng subset sum problems: =, =, (7) =, and recover message bts ={,,,, },1 to obtan the orgnal message ={,,, } for any challenge cphertext (, ). 5. Performance Analyss of Attack As we see n secton 4, n step1, we need to fnd a par of ntegers (, ) such that / s very close to / (where = ( ) and are parts of the prvate key and (,,, ) s publc key). As we showed, we can take = where s publc. So we need to fnd a value for =. In step2, we can use algorthm4 for fnd the factoral carry value ={,,, } of the publc value. In step3, we need one modular multplcaton for compute and (1024 ) subtracton to solve equaton (7) wth algorthm1 for recover the orgnal message = {,,, } from any challenge cphertext (, ). Hence, the more dffcult and mportant part of attack s step1. In step1, we used smultaneous Dophantne approxmaton problem for fndng the value of =. So we need to compute the computatonal complexty of smultaneous Dophantne approxmaton problem. complexty of ths problem s gven n theorem3 where take ( { (), + (1/)} ) bt operatons, whch s polynomal tme. Consequently, the proposed attack s polynomal tme and practcable.

8 Concluson We consdered cryptanalyss of a knapsack-type publc key cryptosystem. Ths cryptosystem uses a combnaton permutaton algorthm n the encrypton phase to avod the low densty attack by keepng the densty hgh. Ths cryptosystem s vulnerable to LLL-lattce bass reducton algorthm, snce t uses a super-ncreasng sequence as a prvate key and attempt to hde ths sequence wth modular multplcaton for constructng the publc key. But as we showed, the modular multplcaton cannot hde the superncreasng sequence. To avod ths attack we can choose another easy knapsack problem that s not a superncreasng sequence or we do not use modular multplcaton for producng the publc key from the prvate key. References [1] Aboud j. Sattar, An mproved knapsack publc key cryptography system, Internatonal Journal of Internet Technology and Secured Transactons, Vol.3 (3), pp , [2] M. J. Coster, B. A. LaMaccha, A. M. Odlyzko, and C. P. Schnorr, An mproved low-densty subset sum algorthm, n Advances n Cryptology, EUROCRYPT 91, Lecture Notes n Computer Scence, vol. 547, pp , [3] Y. G. Desmedt, J. P. Vandewalle, and R. J. M. Govaerts, A crtcal analyss of the securty of knapsack publc-key algorthms, IEEE Transactons on Informaton Theory, vol.it-30(4), pp , July [4] R. Eer and H. Lagger, Trapdoors n knapsack cryptosystems, (In T. Beth, edtor), Advances n Cryptology Proceedngs of CRYPTO 82, Lecture Notes n Computer Scence, vol.149, pp , Sprnger- Verlag, [5] S. Galbrath, Mathematcs of Publc Key Cryptography, verson 0.2. Avalable n: [6] M. S. Hwang, C. C. Lee, and S. F. Tzeng, A New Knapsack Publc-Key Cryptosystem Based on Permutaton Combnaton Algorthm, Internatonal Journal of Appled Mathematcs and Computer Scences vol. 5; 1, pp , Wnter [7] J.C. Lagaras, The computatonal complexty of smultaneous dophantne approxmaton problems, SIAM Journal of Computng vol.14, pp , [8] J. C. Lagaras and A. M. Odlyzko, Solvng low-densty subset sum problems, J. Ass. Comput. Much. vol. 32, no. 1, pp Jan [9] J. C. Lagaras, Performance Analyss of Shamr s Attack on the Basc Merkle-Hellman Knapsack Publc Key Cryptosystem, Proc. 11th Intern. Colloquum on Automata, Languages and Programmng (ICALP), Lecture Notes n Computer Scence, vol. 172, pp , Sprnger-Verlag, Berln, [10] H. W. Lenstra, Jr, Integer programmng wth a fxed number of varables, Report (Second verson), Unversty of Amsterdam, November [11] K. Lenstra, H. W. Lenstra Jr., and L. Lovász, Factorng Polynomals wth ratonal coeffcents, Math. Ann., vol.261, pp , [12] R. Merkle and M. E. Hellman, Hdng nformaton and sgnatures n trapdoor knapsack, IEEE Trans. Inform. Theory, vol. IT-24, pp , Sept [13] Menezes, P. van Oorschot and S. Vanstone, Handbook of Appled Cryptography. CRC Press, [14] R. Mchael, and S. Davd, Computers and Intractablty: A gude to the theory of NP-completeness. W. H. Freeman & Co., San Francsco, [15] P. Nguyen, J. Stern, Merkle-Hellman revsted: A cryptanalyss of the Qu-Vanstone cryptosystem based on group factorzatons, n: Proceedngs of Crypto'97, LNCS, vol. 1294, pp , Sprnger-Verlag, [16] Shamr, A Polynomal-tme Algorthm for Breakng the Basc Merkle-Hellman Cryptosystem, Proceedngs of the IEEE Symposum on Foundatons of Computer Scence, New York, pp , [17] P.W. Shor, Polynomal-tme algorthms for prme factorzaton and dscrete logarthms on a quantum computer, SIAM Journal of Computng, vol. 26, pp , [18] S. Vaudenay, Cryptanalyss of the Chor-Rvest cryptosystem, Advances n Cryptology CRYPTO 98, LNCSe, vol. 1462, pp , Sprnger- Verlag, Berln, Roohallah Rastagh has receved hs BSc degree n electrcal engneerng and MSc degrees n secure communcaton from the Aeronautcal Unversty of snce and Technology, Iran n 2003 and 2010, respectvely. Hs research nterests nclude cryptology especally desgn and analyze of publckey cryptography. Hamd Reza Dall Oskoue receved hs BSc and MSc degrees n electrcal engneerng from the Unversty of Aeronautcal Scence & Technology and the Trabat Modares Unversty, Iran n 2002 and 2004, respectvely. He obtaned hs PhD degree n electrcal engneerng from Trabat Modares Unversty, Tehran, Iran. He then joned the Unversty of Aeronautcal Scence & Technology, Tehran, Iran, as an assstant professor n 2006, hs research areas are Communcaton, Radar,Mcrowave component, Antenna and wave propagaton. Dr. Oskoue has served as a revewer for a number of journals and conferences.

Lecture 2: Gram-Schmidt Vectors and the LLL Algorithm

Lecture 2: Gram-Schmidt Vectors and the LLL Algorithm NYU, Fall 2016 Lattces Mn Course Lecture 2: Gram-Schmdt Vectors and the LLL Algorthm Lecturer: Noah Stephens-Davdowtz 2.1 The Shortest Vector Problem In our last lecture, we consdered short solutons to

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction Attacks on RSA The Rabn Cryptosystem Semantc Securty of RSA Cryptology, Tuesday, February 27th, 2007 Nls Andersen Square Roots modulo n Complexty Theoretc Reducton Factorng Algorthms Pollard s p 1 Pollard

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

The internal structure of natural numbers and one method for the definition of large prime numbers

The internal structure of natural numbers and one method for the definition of large prime numbers The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Math 261 Exercise sheet 2

Math 261 Exercise sheet 2 Math 261 Exercse sheet 2 http://staff.aub.edu.lb/~nm116/teachng/2017/math261/ndex.html Verson: September 25, 2017 Answers are due for Monday 25 September, 11AM. The use of calculators s allowed. Exercse

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41, The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

A new Approach for Solving Linear Ordinary Differential Equations

A new Approach for Solving Linear Ordinary Differential Equations , ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of

More information

The L(2, 1)-Labeling on -Product of Graphs

The L(2, 1)-Labeling on -Product of Graphs Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016 U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

An efficient algorithm for multivariate Maclaurin Newton transformation

An efficient algorithm for multivariate Maclaurin Newton transformation Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,

More information

Computing Correlated Equilibria in Multi-Player Games

Computing Correlated Equilibria in Multi-Player Games Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Cryptanalysis of Threshold Proxy Signature Schemes 1)

Cryptanalysis of Threshold Proxy Signature Schemes 1) MM Research Preprnts, 226 233 MMRC, AMSS, Academa Snca No. 23, December 24 Cryptanalyss of Threshold Proxy Sgnature Schemes 1) Zuo-Wen Tan and Zhuo-Jun Lu Key Laboratory of Mathematcs Mechanzaton Insttute

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Lecture 3. Ax x i a i. i i

Lecture 3. Ax x i a i. i i 18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest

More information

Section 3.6 Complex Zeros

Section 3.6 Complex Zeros 04 Chapter Secton 6 Comple Zeros When fndng the zeros of polynomals, at some pont you're faced wth the problem Whle there are clearly no real numbers that are solutons to ths equaton, leavng thngs there

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

The Expectation-Maximization Algorithm

The Expectation-Maximization Algorithm The Expectaton-Maxmaton Algorthm Charles Elan elan@cs.ucsd.edu November 16, 2007 Ths chapter explans the EM algorthm at multple levels of generalty. Secton 1 gves the standard hgh-level verson of the algorthm.

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

MEM 255 Introduction to Control Systems Review: Basics of Linear Algebra

MEM 255 Introduction to Control Systems Review: Basics of Linear Algebra MEM 255 Introducton to Control Systems Revew: Bascs of Lnear Algebra Harry G. Kwatny Department of Mechancal Engneerng & Mechancs Drexel Unversty Outlne Vectors Matrces MATLAB Advanced Topcs Vectors A

More information

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

Convexity preserving interpolation by splines of arbitrary degree

Convexity preserving interpolation by splines of arbitrary degree Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

Lecture 10: May 6, 2013

Lecture 10: May 6, 2013 TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,

More information

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 )

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 ) Kangweon-Kyungk Math. Jour. 4 1996), No. 1, pp. 7 16 AN ITERATIVE ROW-ACTION METHOD FOR MULTICOMMODITY TRANSPORTATION PROBLEMS Yong Joon Ryang Abstract. The optmzaton problems wth quadratc constrants often

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

Feature Selection: Part 1

Feature Selection: Part 1 CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?

More information

Improved Integral Cryptanalysis of FOX Block Cipher 1

Improved Integral Cryptanalysis of FOX Block Cipher 1 Improved Integral Cryptanalyss of FOX Block Cpher 1 Wu Wenlng, Zhang Wentao, and Feng Dengguo State Key Laboratory of Informaton Securty, Insttute of Software, Chnese Academy of Scences, Bejng 100080,

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

= = = (a) Use the MATLAB command rref to solve the system. (b) Let A be the coefficient matrix and B be the right-hand side of the system.

= = = (a) Use the MATLAB command rref to solve the system. (b) Let A be the coefficient matrix and B be the right-hand side of the system. Chapter Matlab Exercses Chapter Matlab Exercses. Consder the lnear system of Example n Secton.. x x x y z y y z (a) Use the MATLAB command rref to solve the system. (b) Let A be the coeffcent matrx and

More information

Post-quantum Key Exchange Protocol Using High Dimensional Matrix

Post-quantum Key Exchange Protocol Using High Dimensional Matrix Post-quantum Key Exchange Protocol Usng Hgh Dmensonal Matrx Rchard Megrelshvl I. J. Tbls State Unversty rchard.megrelshvl@tsu.ge Melksadeg Jnkhadze Akak Tseretel State Unversty Kutas, Georga mn@yahoo.com

More information

Linear Approximation with Regularization and Moving Least Squares

Linear Approximation with Regularization and Moving Least Squares Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...

More information

Provable Security Signatures

Provable Security Signatures Provable Securty Sgnatures UCL - Louvan-la-Neuve Wednesday, July 10th, 2002 LIENS-CNRS Ecole normale supéreure Summary Introducton Sgnature FD PSS Forkng Lemma Generc Model Concluson Provable Securty -

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

Lecture 10 Support Vector Machines II

Lecture 10 Support Vector Machines II Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed

More information

SL n (F ) Equals its Own Derived Group

SL n (F ) Equals its Own Derived Group Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Section 8.3 Polar Form of Complex Numbers

Section 8.3 Polar Form of Complex Numbers 80 Chapter 8 Secton 8 Polar Form of Complex Numbers From prevous classes, you may have encountered magnary numbers the square roots of negatve numbers and, more generally, complex numbers whch are the

More information

Recover plaintext attack to block ciphers

Recover plaintext attack to block ciphers Recover plantext attac to bloc cphers L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Abstract In ths paper, we wll present an estmaton for the upper-bound of the amount of 16-bytes plantexts for Englsh

More information

Time-Varying Systems and Computations Lecture 6

Time-Varying Systems and Computations Lecture 6 Tme-Varyng Systems and Computatons Lecture 6 Klaus Depold 14. Januar 2014 The Kalman Flter The Kalman estmaton flter attempts to estmate the actual state of an unknown dscrete dynamcal system, gven nosy

More information

Singular Value Decomposition: Theory and Applications

Singular Value Decomposition: Theory and Applications Sngular Value Decomposton: Theory and Applcatons Danel Khashab Sprng 2015 Last Update: March 2, 2015 1 Introducton A = UDV where columns of U and V are orthonormal and matrx D s dagonal wth postve real

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

A New Refinement of Jacobi Method for Solution of Linear System Equations AX=b

A New Refinement of Jacobi Method for Solution of Linear System Equations AX=b Int J Contemp Math Scences, Vol 3, 28, no 17, 819-827 A New Refnement of Jacob Method for Soluton of Lnear System Equatons AX=b F Naem Dafchah Department of Mathematcs, Faculty of Scences Unversty of Gulan,

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

arxiv: v1 [cs.cr] 22 Oct 2018

arxiv: v1 [cs.cr] 22 Oct 2018 CRYPTOGRAPHIC ANALYSIS OF THE MODIFIED MATRIX MODULAR CRYPTOSYSTEM arxv:181109876v1 [cscr] 22 Oct 2018 VITALIĬ ROMAN KOV Abstract We show that the Modfed Matrx Modular Cryptosystem proposed by SK Rososhek

More information

LECTURE 9 CANONICAL CORRELATION ANALYSIS

LECTURE 9 CANONICAL CORRELATION ANALYSIS LECURE 9 CANONICAL CORRELAION ANALYSIS Introducton he concept of canoncal correlaton arses when we want to quantfy the assocatons between two sets of varables. For example, suppose that the frst set of

More information

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS Journal of Mathematcal Scences: Advances and Applcatons Volume 25, 2014, Pages 1-12 A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS JIA JI, WEN ZHANG and XIAOFEI QI Department of Mathematcs

More information

Week 5: Neural Networks

Week 5: Neural Networks Week 5: Neural Networks Instructor: Sergey Levne Neural Networks Summary In the prevous lecture, we saw how we can construct neural networks by extendng logstc regresson. Neural networks consst of multple

More information

On the Repeating Group Finding Problem

On the Repeating Group Finding Problem The 9th Workshop on Combnatoral Mathematcs and Computaton Theory On the Repeatng Group Fndng Problem Bo-Ren Kung, Wen-Hsen Chen, R.C.T Lee Graduate Insttute of Informaton Technology and Management Takmng

More information

Homework Notes Week 7

Homework Notes Week 7 Homework Notes Week 7 Math 4 Sprng 4 #4 (a Complete the proof n example 5 that s an nner product (the Frobenus nner product on M n n (F In the example propertes (a and (d have already been verfed so we

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

Math 217 Fall 2013 Homework 2 Solutions

Math 217 Fall 2013 Homework 2 Solutions Math 17 Fall 013 Homework Solutons Due Thursday Sept. 6, 013 5pm Ths homework conssts of 6 problems of 5 ponts each. The total s 30. You need to fully justfy your answer prove that your functon ndeed has

More information

VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES

VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES BÂRZĂ, Slvu Faculty of Mathematcs-Informatcs Spru Haret Unversty barza_slvu@yahoo.com Abstract Ths paper wants to contnue

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization DISCRIMINANTS AND RAMIFIED PRIMES KEITH CONRAD 1. Introducton A prme number p s sad to be ramfed n a number feld K f the prme deal factorzaton (1.1) (p) = po K = p e 1 1 peg g has some e greater than 1.

More information

Dynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence)

Dynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence) /24/27 Prevew Fbonacc Sequence Longest Common Subsequence Dynamc programmng s a method for solvng complex problems by breakng them down nto smpler sub-problems. It s applcable to problems exhbtng the propertes

More information

Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-bit Block and n-bit Key

Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-bit Block and n-bit Key Cryptanalyss of Some Double-Block-Length Hash Modes of Block Cphers wth n-bt Block and n-bt Key Deukjo Hong and Daesung Kwon Abstract In ths paper, we make attacks on DBL (Double-Block-Length) hash modes

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

Communication Complexity 16:198: February Lecture 4. x ij y ij

Communication Complexity 16:198: February Lecture 4. x ij y ij Communcaton Complexty 16:198:671 09 February 2010 Lecture 4 Lecturer: Troy Lee Scrbe: Rajat Mttal 1 Homework problem : Trbes We wll solve the thrd queston n the homework. The goal s to show that the nondetermnstc

More information

Norms, Condition Numbers, Eigenvalues and Eigenvectors

Norms, Condition Numbers, Eigenvalues and Eigenvectors Norms, Condton Numbers, Egenvalues and Egenvectors 1 Norms A norm s a measure of the sze of a matrx or a vector For vectors the common norms are: N a 2 = ( x 2 1/2 the Eucldean Norm (1a b 1 = =1 N x (1b

More information

Math Review. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University

Math Review. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University Math Revew CptS 223 dvanced Data Structures Larry Holder School of Electrcal Engneerng and Computer Scence Washngton State Unversty 1 Why do we need math n a data structures course? nalyzng data structures

More information

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong

More information

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com

More information

The Degrees of Nilpotency of Nilpotent Derivations on the Ring of Matrices

The Degrees of Nilpotency of Nilpotent Derivations on the Ring of Matrices Internatonal Mathematcal Forum, Vol. 6, 2011, no. 15, 713-721 The Degrees of Nlpotency of Nlpotent Dervatons on the Rng of Matrces Homera Pajoohesh Department of of Mathematcs Medgar Evers College of CUNY

More information

On quasiperfect numbers

On quasiperfect numbers Notes on Number Theory and Dscrete Mathematcs Prnt ISSN 1310 5132, Onlne ISSN 2367 8275 Vol. 23, 2017, No. 3, 73 78 On quasperfect numbers V. Sva Rama Prasad 1 and C. Suntha 2 1 Nalla Malla Reddy Engneerng

More information

8.6 The Complex Number System

8.6 The Complex Number System 8.6 The Complex Number System Earler n the chapter, we mentoned that we cannot have a negatve under a square root, snce the square of any postve or negatve number s always postve. In ths secton we want

More information

Numerical Properties of the LLL Algorithm

Numerical Properties of the LLL Algorithm Numercal Propertes of the LLL Algorthm Frankln T. Luk a and Sanzheng Qao b a Department of Mathematcs, Hong Kong Baptst Unversty, Kowloon Tong, Hong Kong b Dept. of Computng and Software, McMaster Unv.,

More information