Factoring RSA moduli with weak prime factors

Size: px
Start display at page:

Download "Factoring RSA moduli with weak prime factors"

Transcription

1 Fctoring RSA moduli with we prime fctors Abderrhmne Nitj 1 nd Tjjeeddine Rchidi 2 1 Lbortoire de Mthémtiques Nicols Oresme Université de Cen Bsse Normndie, Frnce bderrhmne.nitj@unicen.fr 2 School of Science nd Engineering Alhwyn University in Ifrne, Morocco T.Rchidi@ui.m Abstrct. In this pper, we study the problem of fctoring n RSA modulus N = pq in polynomil time, when p is we prime, tht is, p cn be expressed s p = u 0 + M 1u M u for some integers M 1,..., M nd + 2 suitbly smll prmeters, u 0,... u. We further compute lower bound for the set of we moduli, tht is, moduli mde of t lest one we prime, in the intervl [2 2n, 2 2n+1 ] nd show tht this number is much lrger thn the set of RSA prime fctors stisfying Coppersmith s conditions, effectively extending the lielihood for fctoring RSA moduli. We lso prolong our findings to moduli composed of two we primes. Keywords: RSA, Cryptnlysis, Fctoriztion, LLL lgorithm, We primes 1 Introduction The RSA cryptosystem, invented in 1978 by Rivest, Shmir nd Adlemn [17] is undoubtedly one of the most populr public ey cryptosystems. In the stndrd RSA [17], the modulus N = pq is the product of two lrge primes of the sme bit-size. The public exponent e is n integer such tht 1 e < φn nd gcde, φn = 1 where φn = p 1q 1 is the Euler totient function. The corresponding privte exponent is the integer d such tht ed 1 mod φn. In RSA, the encryption, decryption, signture genertion, nd signture verifiction require substntil CPU cycles becuse the time to perform these opertions is proportionl to the number of bits in public or secret exponents [17]. To reduce CPU time necessry for encryption nd signture verifiction, one my be tempted to use smll public exponent e. This sitution hs been proven to be insecure ginst some smll public exponent ttcs see [8] nd [9]. To reduce the decryption nd signture genertion time, one my lso be tempted to use smll privte exponent d. Unfortuntely, RSA is lso vulnerble to vrious powerful short secret exponent ttcs such s, the ttc of Wiener [20], Prtilly supported by the French SIMPATIC SIM nd PAiring Theory for Informtion nd Communictions security.

2 2 Abderrhmne Nitj nd Tjjeeddine Rchidi nd the ttc of Boneh nd Durfee [4] see lso [3]. An lternte wy for incresing the performnce of encryption, decryption, signture genertion, nd signture verifiction, without reverting to smll exponents, is to use the multiprime vrint of RSA. The multi-prime RSA is generliztion of the stndrd RSA cryptosystem in which the modulus is in the form N = p 1 p 2 p where 3 nd the p i s re distinct prime numbers. Combined with the Chinese Reminder Theorem, multi-prime RSA is much more efficient thn the stndrd RSA see [5]. In Section of the X stndrd for public ey cryptogrphy [1], some recommendtions re presented regrding the genertion of the prime fctors of n RSA modulus. For exmple, it is recommended tht the modulus should hve x bits for x 0. This requirement deters some fctoriztion ttcs, such s the Number Field Sieve NFS [12] nd the Elliptic Curve Method ECM [11]. Another recommendtion is tht the prime difference p q should be lrge, nd p q should not be ner the rtio of two smll integers. These requirements gurd ginst Fermt fctoring lgorithm [19], s well s Coppersmith s fctoring ttc on RSA [6] when one nows hlf of the bits of p. For exmple, [ if N = pq nd p, q re of the sme bit-size with p q < N 1/4, then N ] [ N ] p < N 1/4 see [16] where is the nerest integer to N, which mens tht hlf of the bits of p re those of [ N] which leds to the fctoriztion of N see [6] nd [19]. Observe tht the fctoriztion ttc of Coppersmith pplies provided tht one nows hlf of the bits of p, tht is p is in one of the forms { M 1 + u 0 with nown M 1 nd unnown u 0 N 1 4, p = M 1 u 1 + M 0 with nown M 1, M 0 nd unnown u 1 N 1 4. Such primes re clled Coppersmith s we primes. In the cse of p = M 1 u 1 +M 0 with nown M 1 nd M 0, the Eucliden division of q by M 1 is in the form q = M 1 v 1 +v 0. Hence N = pq = M 1 u 1 +M 0 M 1 v 1 +v 0 which gives M 0 v 0 N mod M 1. Hence, since gcdm 0, M 1 = 1, then v 0 NM0 1 mod M 1. This mens tht when p is in the form p = M 1 u 1 + M 0 with nown M nd u 0, then q is necessrily in the form q = M 1 v 1 + v 0 with nown v 0. Coppersmith s ttc is therefore pplicble only when smll enough prmeters M 0 nd v 0 cn be found such tht p = M 1 u 1 + M 0 nd q = M 1 v 1 + v 0. This reduces the pplicbility of the ttc to the set of moduli such tht p nd q re of the form defined bove. In this pper, we consider the generliztion of Coppersmith s ttc by considering more stisfible decomposition of ny of the multipliers of p or q, i.e., p or q not just p or q, effectively leding to n incresed set of moduli tht cn be fctored. We describe two new ttcs on RSA with modulus N = pq. The first ttc pplies in the sitution tht, for given positive integers M 1,..., M, one of the prime fctors, p sy, stisfies liner eqution p = u 0 + M 1 u M u with suitbly smll integers nd u 0,..., u. We cll such prime fctors we primes for the integers M 1,..., M. The second ttc pplies when both fctors p nd q re we for the integers M 1,..., M. We note

3 Fctoring RSA moduli with we prime fctors 3 tht, for = 1, the we primes re such tht p = u 0 + M 1 u 1. This includes the clss of Coppersmith s we primes. For both ttcs, we give n estimtion of the RSA moduli N = pq with prime fctor p [ 2 n, 2 n+1] which is we for the integers M, M 2,..., M where M = 2 n 2. We show tht the number of moduli with we prime fctor is much lrger thn the number of moduli with Coppersmith s we prime fctor. The rest of the pper is orgnized s follows. In Section 2, we give some bsic concepts on integer fctoriztion nd lttice reduction s well s n overview of Coppersmith s method. In Section 3, we present n ttc on n RSA modulus N = pq with one we prime fctor. In Section 4, we present the second ttc n RSA modulus N = pq with two we prime fctors. We conclude the pper in Section 5. 2 Preliminries In this section we give the definitions nd results tht we need to perform our ttcs. These preliminries include bsic concepts on integer fctoriztion nd lttice reduction techniques. 2.1 Integer fctoriztion: the stte of the rt Currently, the most powerful lgorithm for fctorizing lrge integers is the Number Field Sieve NFS [12]. The heuristic expected time T NF S N of the NFS depends on the bitsize of the integer N to be fctored: T NF S N = exp o1log N 1/3 log log N 2/3. If the integer N hs smll fctors, the Elliptic Curve Method ECM [11] for fctoring is substntilly fster thn the NFS. It cn compute non-trivil fctor p of composite integer N in n expected runtime T ECM : T ECM p = exp 2 + o1 log p 1/2 log log p 1/2, which is sub-exponentil in the bitsize of the fctor p. The lrgest fctor found so fr with the ECM is 83 deciml digits 275 bits prime fctor of the specil number see [18]. 2.2 Lttice reduction Let m nd n be positive integers with m n. Let u 1,..., u m R n be m linerly independent vectors. The lttice L spnned by u 1,..., u m is the set { m } L = i u i i Z. i=1

4 4 Abderrhmne Nitj nd Tjjeeddine Rchidi The set {u 1,..., u m } is clled lttice bsis for L. The dimension or rn of the lttice L is diml = m, nd L is clled full rn if m = n. It is often useful to represent the lttice L by the m n mtrix M whose rows re the coefficients of the vectors u 1,..., u m. The determinnt or volume of L is defined s detl = M M t. When L is full rn, the determinnt reduces to detl = detm. The Eucliden norm of vector v = m i=1 iu i L is defined s v = m i=1 2 i. As lttice hs infinitely mny bses, some bses re better thn others, nd very importnt ts is to find bsis with smll vectors {b 1,..., b m } clled the reduced bsis. This ts is very hrd in generl, however, the LLL lgorithm proposed by Lenstr, Lenstr, nd Lovász [13] finds bsis of lttice with reltively smll vectors in polynimil time. The following theorem determines the sizes of the reduced bsis vectors obtined with LLL see [15] for more detils. Theorem 1. Let L be lttice spnned by bsis {u 1,..., u m }. The LLL lgorithm pplied to L outputs reduced bsis {b 1,..., b m } with b 1 b 2... b i 2 mm 1 4m i+1 detl 1 m+i 1, for i = 1, 2,..., m. The existence of short nonzero vector in lttice is gurnteed by result of Minowsi stting tht every m-dimensionl lttice L contins non-zero vector v with v m detl 1 m. On the other hnd, the Gussin Heuristic sserts tht the norm γ 1 of the shortest vector of rndom lttice stisfies diml 1 γ 1 detl diml. 2πe Herefter, we will use this result s n estimtion for the expected minimum norm of non-zero vector in lttice. 2.3 Coppersmith s Method In 1996, Coppersmith [6] presented two techniques bsed on LLL to find smll integer roots of univrite modulr polynomils or of bivrite integer polynomils. Coppersmith showed how to pply his technique to fctorize n RSA modulus N = pq with q < p < 2q when hlf of the lest or the most significnt bits of p is nown. Theorem 2. Let N = pq be n RSA modulus with q < p < 2q. Let M 0 nd M 1 be two positif integers. If p = M 1 + u 0 with u 0 < N 1 4 or if p = M 1 u 1 + M 0 with u 1 < N 1 4, then N cn be fctored in time polynomil in log N. Coppersmith s technique extends to polynomils in more vribles, but the method becomes heuristic. The problem of finding smll roots of liner modulr polynomils fx 1,..., x n = 1 x x n x n + n+1 mod p for some unnown p tht divides the nown modulus N hs been studied using Coppersmith s technique by Herrmnn nd My [10]. The following result, due to Lu, Zhng nd Lin [14] gives sufficient condition under which modulr roots cn be found efficiently.

5 Fctoring RSA moduli with we prime fctors 5 Theorem 3 Lu, Zhng, Lin. Let N be composite integer with divisor p u such tht p N β. Let fx 1,..., x n Z[x 1,..., x n ] be homogenous liner polynomil. Then one cn find ll the solutions y 1,..., y n of the eqution fx 1,..., x n = 0 mod p v, v u with gcdy 1,..., y n = 1 nd y 1 < N δ1,..., y n < N δn if n δ i u 1 1 u n v v β n 1 n 1 n 1 1 u v β 1 u v β. i=1 The time complexity of the lgorithm for finding such sulution y 1,..., y n is polynomil in log N. 3 The Attc with One We Prime Fctor 3.1 The Attc In this section, we present n ttc to fctor n RSA modulus N = pq when p stisfies liner eqution in the form p = u 0 + M 1 u M u for suitbly smll positive integer nd suitbly smll integers u 0, u 1,..., u where M 1,..., M re given positive integers. Such prime fctor p is clled we prime for the integers M 1,..., M. Theorem 4. Let N = pq be n RSA modulus such tht p > N β nd M 1,..., M be positive integers with M 1 < M 2 <... < M. Suppose tht there exists positive integer, nd + 1 integers u i, i = 0,..., such tht p = u 0 +M 1 u M u with mxu i < N δ nd δ < β Then one cn fctor N in polynomil time. 1 1 β 1 β. Proof. Let M 1,..., M be positive integers such tht M 1 < M 2 <... < M. Suppose tht p = u 0 + M 1 u M u, tht is u 0,..., u is solution of the modulr polynomil eqution x 0 + M 1 x M x = 0 mod p. 1 Suppose tht u i < N δ for i = 0,...,. Using n = + 1, u = 1 nd v = 1 in Theorem 3, mens tht the eqution 1 cn be solved in polynomil time, i.e., finding u 0,..., u if + 1δ < 1 1 β β 1 β, which gives the bound δ < This termintes the proof. 1 1 β β 1 β.

6 6 Abderrhmne Nitj nd Tjjeeddine Rchidi Remr 1. For blnced RSA modulus, the prime fctors p nd q re of the sme bit size. Then p > N β with β = 1 2. Hence, the condition on δ becomes δ < In Tble 1, we give the bound for δ for given β nd = 1 = 2 = 3 = 4 = 5 = 6 = 7 = 8 = 9 = 10 β = β = β = Tble 1. Upper bounds for δ by Theorem 4. Remr 2. We note tht Coppersmith s we primes correspond to moduli N = pq with q < p < 2q where one of the prime fctors is of the form p = M 1 + u 0 or p = M 1 u 1 + M 0 with u 0, u 1 < N 0.25 s mentioned in Theorem 2. This specil cse of the eqution of Theorem 4. Indeed, we cn solve the equtions p = M 1 +u 0 nd p = M 1 u 1 + M 0 when u 0, u 1 < N 1 4. Alterntively, Coppersmith s we primes correspond to the cell, 2β = 1, 0.25 in Tble Numericl Exmples Exmple 1. Let N = , be 412-bit RSA modulus with N = pq where q < p < 2q. Then p nd q re blnced nd p N Hence for β = 0.5, we hve p > N β. Suppose tht p stisfies n eqution of the form p = u 0 + Mu 1 + M 2 u 2. Typiclly, M 2 N 1 2, tht is M N 1 4. So let M = For β = 0.5 nd = 2, Tble 1 gives the bound δ < Assume therefore tht the prmeters u i stisfy u i < N for i = 0, 1, 2. By pplying Theorem 4 we should find u 0, u 1 nd u 2 s long s u 0, u 1, u 2 < We pply the method of Lu et l. [14] with m = 4 nd t = 1. This gives 35-dimensionl lttice. Applying the LLL lgorithm [13], we find reduced bsis with multivrite polynomils f i x 1, x 2, x 3 Z[x 1, x 2, x 3 ], i = 1,..., 3. Applying the Gröbner bsis technique for solving system of polynomil equtions, we get u 0 = 9005, u 1 = 7123,

7 Fctoring RSA moduli with we prime fctors 7 u 2 = Using these vlues, we cn compute p = u 0 + Mu 1 + M 2 u 2 from which we deduce p = gcdu 0 + Mu 1 + M 2 u 2, N, tht is p = Finlly, we cn compute q = N p, tht is q = Note here tht there is no liner decomposition of p in the form p = M 1 + u 0 nor p = M 1 u 1 + M 0 with u 0, u 1 < N 0.25 tht mes p vulnerble to the ttc of Coppersmith. This shows tht the modulus N is vulnerble to our ttc, while it is not vulnerble to Coppersmith s ttc. Finlly, the overll recorded execution time for our ttc using n off-the-shelf computer ws 17 seconds. Exmple 2. In [2], Bernstein et l. discovered mny prime fctors with specil forms. Mny of these primes were found by computing the gretest common divisor of collection of RSA moduli. Others were found by pplying Coppersmith s technique. We show below tht our ttc cn find some primes mong the list of Bernstein et l. One of these primes is p =0xc f 9, = Using M = 2 510, we get p = 3M = Mu 1 + u 0 where u 1 = 3 nd u 0 = 761. We hve u 1, u 0 < N δ with δ which is less thn the bound in Tble 1 for 1024 bit-size RSA modulus N with β = 0.5, nd = 1. This implies tht the conditions for Theorem 4 re stisfied nd our method finds p when used in ny RSA modulus. Exmple 3. Now, consider this other exmple from the list of Bernstein et l. [2] p =0xc000b = Then p hs the form p = M M = M 7 u 7 + M 3 u 3 + u 0 where M = The coefficients u 7, u 3 nd u 0 stisfy u 7, u 3, u 0 < N δ with δ while the bound of Theorem 4 is see Tble 1 for = 7 nd β = 0.5. Agin, this shows tht our method will find the fctoriztion of ny RSA modulus tht is multiple of p.

8 8 Abderrhmne Nitj nd Tjjeeddine Rchidi 3.3 The Number of Single We Primes in n Intervl In this section, we consider two positive integers n nd M nd present study of the we primes with M, tht is the primes p [ 2 n, 2 n+1] such tht there exists positive integer tht gives the decomposition p = M i u i where u i < N δ nd δ stisfies Theorem 4. We show tht the number of the RSA moduli N in the intervl [2 2n, 2 2n+1 ] with we prime fctor p [ 2 n, 2 n+1] is polynomil in 2 n. Tht is, this number is lower bounded by 2 η where η > 1 2. We cll such clss we RSA Moduli in the intervl [2 2n, 2 2n+1 ]. Theorem 5. Let n be positive integer. For 1, define M = 2 n. Let N be the set of the we RSA moduli N [ 2 2n, 2 2n+1] such tht N = pq, p nd q re of the sme bitsize, p > q, nd p = + b [ 2 n, 2 n+1] for some M i u i smll integers b, < N δ nd u i < N δ for i = 0,..., with δ = Then the crdinlity of N stisfies #N 2 η where n 1 η = δn + log 2. nn + 1 log2 Proof. Let N be n RSA moduli. Suppose tht N [ 2 2n, 2 2n+1] with N = pq where p nd q re of the sme bitsize. Since p N 1 2, then p [ 2 n, 2 n+1]. Suppose further tht for some positive integer, we hve p = M i u i. Then M = p 1 M i u i p, u u which implies M p 1 N 1 2. Now, define M = N 1 2 = 2 n, where x is the integer greter or equl to x. This yields 2 n M 2 n+1. Consider the set { P = p = M i u i + b, p is prime, p [ } 2 n, 2 n+1], < N δ, u i < N δ, where δ stisfies 2. Here b is s smll s possible so tht M i u i + b is prime. Also, since M is the leding term, then observe tht M i u i M = u M i=1 + M i u i.

9 Fctoring RSA moduli with we prime fctors 9 To ensure p [ 2 n, 2 n+1], we consider only the sitution where u. Hence, using the bounds < N δ nd u i < N δ for i = 0,..., 1, we get lower bound for the number of possibilities for nd for u i, which themselves set lower bound for the crdinlity of P s follows: #P N δ N δ N +1δ 2 2+1nδ. 3 On the other hnd, the prime number theorem sserts tht the number πx of the primes less thn x is πx x logx. Hence, the number of primes in the intervl [ 2 n, 2 n+1] is pproximtely π 2 n+1 π 2 n 2n+1 log 2 n+1 2n n 12n log 2 n = nn + 1 log2. 4 It follows tht the number of RSA moduli N = pq [ 2 2n, 2 2n+1] with we fctor p P nd q [ 2 n, 2 n+1] is t lest #N #P π 2 n+1 π 2 n. Using 3 nd 4, we get #N 2 2+1nδ n 12n nn + 1 log2 n 1 = nn + 1 log δn = 2 η, where n 1 η = δn + log 2. nn + 1 log2 This termintes the proof. Tble 2 presents list of vlues of the bound η in terms of nd n. In Tble 2, = 1 = 2 = 3 = 4 = 5 = 6 = 7 n = 1 log 2 2 N = n = 1 2 log 2N = n = 1 2 log 2N = Tble 2. Lower bounds for η under Theorem 5. we see tht in the sitution β, = 0.5, 1, the number #N of 1024-bits RSA moduli N = pq [ , ] with we fctor p is t lest #N This is much lrger thn the number of RSA moduli with we Coppersmith prime fctor in the sme intervl, which is ctully N This remr is lso vlid for 2048-bits nd 4096-bits RSA moduli.

10 10 Abderrhmne Nitj nd Tjjeeddine Rchidi 4 The Attc with Two We Prime fctors 4.1 The Attc In this section, we present n ttc on RSA with modulus N = pq when both the prime fctors p nd q re we primes. Theorem 6. Let N = pq be n RSA modulus nd M be positive integer. Let 1. Suppose tht there exist integers, b, u i nd v i, i = 1,..., such tht p = M i u i nd bq = M i v i with u i, v i < N δ nd δ < log logn Then one cn fctor N in polynomil time. + log2 + 1 log2πe 4 logn log logn. Proof. Suppose tht p = M i u i nd bq = M i v i. Then multiplying p nd bq, we get bn = 2 M i w i, with w i = This cn be trnsformed into the eqution i u j v i j. M 2 x 2 + M 2 1 x Mx 1 yn = x 0, 5 with the solution x 2, x 2 1,..., x 1, y, x 0 = w 2, w 2,..., w 1, b, u 0 v 0. For i = 0,...,, suppose tht u i, v i < N δ. Since for i = 0,..., 2, the mximl number of terms in w i is, we get x i = w i mx j j=0 u j mx v j < N 2δ. 6 Let C be constnt to be fixed lter. Consider the lttice L generted by the row vectors of the mtrix CM CM 2 1 ML = CM CN The dimension of the lttice L is diml = 2+1 nd its determinnt is detl = CN. According to the Gussin Heuristic, the length of the shortest non-zero vector of the lttice L is pproximtely σl with diml 1 σl detl diml = 2πe 2πe CN j

11 Fctoring RSA moduli with we prime fctors 11 Consider the vector v = x 2, x 2 1,..., x 1, Cx 0. Then, using 5, we get x 2, x 2 1,..., x 1, Cx 0 = x 2, x 1,..., x 1, y ML. This mens tht v L. Consequently, if C stisfies v σl, then, by the Gussin Heuristic, v is the shortest vector of L. Using the bound 6, the length of the vector v stisfies v 2 = C 2 x i=1 x 2 i C i=1 2 N 4δ = C N 4δ. Let C be positive integer stisfying C 2 3. Then the norm of the vector v stisfies v 2 < 4 3 N 4δ. Hence, using the Gussin pproximtion σl, the inequlity v σl is stisfied if N 2δ πe N. Solving for δ, we get δ < log 2 3 log2 + 1 log2πe + log logn 4 logn 4 logn. If δ stisfies the former bound, then the LLL lgorithm, pplied to the lttice L will output the vector v = x 2, x 2 1,..., x 1, Cx 0 from which, we deduce w 2 = x 2, w 2 1 = x 2 1,..., w 1 = x 1, w 0 = Cx 0. C Using the coefficients w i, i = 1,..., 2, we construct the polynomil P X = w 2 X 2 + w 2 1 X w 1 X + w 0. Fctoring P X, we get P X = M i u i M i v i from which we deduce ll the vlues u i nd v i for i = 1,...,. Using ech u i nd v i for i = 1,...,, we get p = M i u i nd finlly obtin p = gcd M i u i, N which in turn gives q = N q. This termintes the proof. In Tble 3, we give the bound for δ for given nd given size of the RSA modulus., 4.2 Exmples Exmple 4. Consider the 234 bits RSA modulus N =

12 12 Abderrhmne Nitj nd Tjjeeddine Rchidi = 1 = 2 = 3 = 4 = 5 log 2 N = log 2 N = Tble 3. Upper bounds for δ with Theorem 6. Let M = Suppose further tht the prime fctors p nd q re such tht p = M 2 u 2 + Mu 1 + u 0 nd bq = M 2 v 2 + Mv 1 + v 0, tht is = 2 with the nottion of Theorem 6. We built the mtrix 7 with C = 2 3 = 4 nd pplied the LLL lgorithm [13]. We got new bsis, where the lst row is: w 4, w 3, w 2, w 1, Cw 0 = , , , , From this, we form the polynomil P X = w 4 X 4 +w 3 X 3 +w 2 X 2 +w 1 X 1 +w 0. which fctors s: P X = X X X X From this, we deduce Using these vlues, we compute u 2 = , u 1 = , u 0 = , v 2 = , v 1 = , v 0 = p = M 2 u 2 + Mu 1 + u 0 = , bq = M 2 v 2 + Mv 1 + v 0 = nd obtin p = gcdp, N = , q = gcdbq, N = This leds to the fctoriztion of N = pq. We note tht the first ttc described in Section 3 does not succeed to fctor N. Indeed, we hve logmxi vi log N which is lrger thn the vlue δ = for = 2 nd β = 0.5 in Tble 1. Finlly, the overll recorded execution time for our ttc using n off-the-shelf computer ws 12 seconds. 4.3 The Number of Double We Primes in n Intervl In this section, we consider two positive integers n nd M nd present study of the double we primes with M, tht is the primes p, q [ 2 n, 2 n+1] such tht there exists positive integer nd b tht give the decompositions: p = M i u i, bq = M i v i

13 Fctoring RSA moduli with we prime fctors 13 where u i < N δ, v i < N δ nd δ stisfies Theorem 6. We show tht the number of the RSA moduli N in the intervl [2 2n, 2 2n+1 ] with we prime fctors p, q [ 2 n, 2 n+1] is lower bounded by 2 η2 where η 2 > 1 2. Theorem 7. Let n be positive integer. For 1, define M = 2 n. Let N be the set of the we RSA moduli N [ 2 2n, 2 2n+1] such tht N = pq with p = + u, q = + v, p, q [ 2 n, 2 n+1] for some smll M i u i M i v i b integers u, v, < N δ, b < N δ, u i < N δ nd v i < N δ for i = 0,..., with δ = Then the crdinlity of N is t lest #N 2 η2 where η 2 = 4 + 1nδ. Proof. As in the proof of Theorem 5, the number of prime numbers p [ 2 n, 2 n+1] such tht p = M i u i + u with u i < 2 2nδ is #P 2 2+1nδ. Then, the number N 2 of RSA modulus N [ 2 2n, 2 2n+1] with N = pq, where both p nd q re we primes is t lest #N nδ = 2 η2, where η 2 = 4 + 1nδ. This termintes the proof. In Tble 3, we present list of vlues of the bound η 2 in terms of nd n. = 1 = 2 = 3 = 4 = 5 = 6 = 7 n = n = n = Tble 4. Lower bounds for η 2 under Theorem 7. 5 Conclusions In this pper we presented nd illustrted two ttcs bsed on fctoring RSA moduli with we primes. We further computed lower bounds for the sets of we moduli -tht is, moduli mde of t lest one or two we prime respectively- in the intervl [2 2n, 2 2n+1 ] nd showed tht these sets re much lrger thn the set of RSA prime fctors stisfying Coppersmith s conditions, which effectively extending the lielihood for fctoring RSA moduli.

14 14 Abderrhmne Nitj nd Tjjeeddine Rchidi References 1. ANSI Stndrd X , Digitl Signtures Using Reversible Public Key Cryptogrphy for the Finncil Services Industry rdsa. 2. Bernstein, D.J., Chng, Y.A., Cheng, C.M., Chou, L.P., Heninger, N., Lnge, T., vn Someren, N.: Fctoring RSA eys from certified smrt crds: Coppersmith in the wild. In Advnces in Cryptology-ASIACRYPT Springer, 2013, pp Boneh, D.: Twenty yers of ttcs on the RSA cryptosystem, Notices Amer. Mth. Soc. 46 2, pp , Boneh, D., Durfee, G.: Cryptnlysis of RSA with privte ey d less thn N 0.292, Advnces in Cryptology-Eurocrypt 99, Lecture Notes in Computer Science Vol. 1592, Springer-Verlg, pp Compq Computer Corpertion. Cryptogrphy using Compq multiprime technology in prllel processing environment, Avilbe online t ftp://ftp.compq.com/pub/solutions/compqmultiprimewp.pdf 6. Coppersmith, D.: Smll solutions to polynomil equtions, nd low exponent RSA vulnerbilities. Journl of Cryptology, 104, pp Hrdy, G.H., Wright, E.M.: An Introduction to the Theory of Numbers. Oxford University Press, London Hstd, J.: On Using RSA with Low Exponent in Public Key Networ, in Proceedings of CRYPTO 85, Springer-Verlg, pp Hstd, J.: Solving simultneous modulr equtions of low degree, SIAM J. of Computing, Vol. 17, pp Herrmnn, M., My, A.: Solving liner equtions modulo divisors: On fctoring given ny bits. In Advnces in Cryptology-ASIACRYPT Springer, 2008, pp Lenstr, H.: Fctoring integers with elliptic curves, Annls of Mthemtics, Vol. 126, pp Lenstr, A.K., Lenstr, H.W. Jr. eds.: The Development of the Number Field Sieve, Lecture Notes in Mthemtics, vol. 1554, Berlin, Springer-Verlg, Lenstr, A.K., Lenstr, H.W., Lovász, L.: Fctoring polynomils with rtionl coefficients, Mthemtische Annlen, Vol. 261, pp , Y. Lu, Y., Zhng, R., Lin, D.: New Results on Solving Liner Equtions Modulo Unnown Divisors nd its Applictions, Cryptology eprint Archive, Report 2014/343, My, A.: New RSA Vulnerbilities Using Lttice Reduction Methods. PhD thesis, University of Pderborn Nitj, A.: Another generliztion of Wieners ttc on RSA, In: Vudeny, S. ed. Africcrypt LNCS, vol. 5023, pp Springer, Heidelberg Rivest, R., Shmir, A., Adlemn, L.: A Method for Obtining digitl signtures nd public-ey cryptosystems, Communictions of the ACM, Vol. 21 2, pp Zimmermnn, P.: 50 lrgest fctors found by ECM, de Weger, B.: Cryptnlysis of RSA with smll prime difference, Applicble Algebr in Engineering, Communiction nd Computing,Vol. 131, pp Wiener, M.: Cryptnlysis of short RSA secret exponents, IEEE Trnsctions on Informtion Theory, Vol. 36, pp

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

SPECIAL PRODUCTS AND FACTORIZATION

SPECIAL PRODUCTS AND FACTORIZATION MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come

More information

Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm

Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm Bibhudendr chry, Girij Snkr Rth, Srt Kumr Ptr, nd Sroj Kumr Pnigrhy Novel Methods of Generting Self-Invertible Mtrix for Hill Cipher lgorithm Bibhudendr chry Deprtment of Electronics & Communiction Engineering

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

and thus, they are similar. If k = 3 then the Jordan form of both matrices is

and thus, they are similar. If k = 3 then the Jordan form of both matrices is Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If

More information

Math 135 Circles and Completing the Square Examples

Math 135 Circles and Completing the Square Examples Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

MATH 150 HOMEWORK 4 SOLUTIONS

MATH 150 HOMEWORK 4 SOLUTIONS MATH 150 HOMEWORK 4 SOLUTIONS Section 1.8 Show tht the product of two of the numbers 65 1000 8 2001 + 3 177, 79 1212 9 2399 + 2 2001, nd 24 4493 5 8192 + 7 1777 is nonnegtive. Is your proof constructive

More information

19. The Fermat-Euler Prime Number Theorem

19. The Fermat-Euler Prime Number Theorem 19. The Fermt-Euler Prime Number Theorem Every prime number of the form 4n 1 cn be written s sum of two squres in only one wy (side from the order of the summnds). This fmous theorem ws discovered bout

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

Vectors 2. 1. Recap of vectors

Vectors 2. 1. Recap of vectors Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms

More information

4.11 Inner Product Spaces

4.11 Inner Product Spaces 314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100 hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by

More information

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity Bbylonin Method of Computing the Squre Root: Justifictions Bsed on Fuzzy Techniques nd on Computtionl Complexity Olg Koshelev Deprtment of Mthemtics Eduction University of Texs t El Pso 500 W. University

More information

Lecture 5. Inner Product

Lecture 5. Inner Product Lecture 5 Inner Product Let us strt with the following problem. Given point P R nd line L R, how cn we find the point on the line closest to P? Answer: Drw line segment from P meeting the line in right

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

Binary Representation of Numbers Autar Kaw

Binary Representation of Numbers Autar Kaw Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy

More information

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one. 5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

PHY 140A: Solid State Physics. Solution to Homework #2

PHY 140A: Solid State Physics. Solution to Homework #2 PHY 140A: Solid Stte Physics Solution to Homework # TA: Xun Ji 1 October 14, 006 1 Emil: jixun@physics.ucl.edu Problem #1 Prove tht the reciprocl lttice for the reciprocl lttice is the originl lttice.

More information

The Mathematical Cryptography of the RSA Cryptosystem

The Mathematical Cryptography of the RSA Cryptosystem The Mathematical Cryptography of the RSA Cryptosystem Abderrahmane Nitaj Laboratoire de Mathématiques Nicolas Oresme Université de Caen, France abderrahmanenitaj@unicaenfr http://wwwmathunicaenfr/~nitaj

More information

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding 1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde

More information

#A12 INTEGERS 13 (2013) THE DISTRIBUTION OF SOLUTIONS TO XY = N (MOD A) WITH AN APPLICATION TO FACTORING INTEGERS

#A12 INTEGERS 13 (2013) THE DISTRIBUTION OF SOLUTIONS TO XY = N (MOD A) WITH AN APPLICATION TO FACTORING INTEGERS #A1 INTEGERS 13 (013) THE DISTRIBUTION OF SOLUTIONS TO XY = N (MOD A) WITH AN APPLICATION TO FACTORING INTEGERS Michel O. Rubinstein 1 Pure Mthemtics, University of Wterloo, Wterloo, Ontrio, Cnd mrubinst@uwterloo.c

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

Section 7-4 Translation of Axes

Section 7-4 Translation of Axes 62 7 ADDITIONAL TOPICS IN ANALYTIC GEOMETRY Section 7-4 Trnsltion of Aes Trnsltion of Aes Stndrd Equtions of Trnslted Conics Grphing Equtions of the Form A 2 C 2 D E F 0 Finding Equtions of Conics In the

More information

4 Approximations. 4.1 Background. D. Levy

4 Approximations. 4.1 Background. D. Levy D. Levy 4 Approximtions 4.1 Bckground In this chpter we re interested in pproximtion problems. Generlly speking, strting from function f(x) we would like to find different function g(x) tht belongs to

More information

g(y(a), y(b)) = o, B a y(a)+b b y(b)=c, Boundary Value Problems Lecture Notes to Accompany

g(y(a), y(b)) = o, B a y(a)+b b y(b)=c, Boundary Value Problems Lecture Notes to Accompany Lecture Notes to Accompny Scientific Computing An Introductory Survey Second Edition by Michel T Heth Boundry Vlue Problems Side conditions prescribing solution or derivtive vlues t specified points required

More information

MODULE 3. 0, y = 0 for all y

MODULE 3. 0, y = 0 for all y Topics: Inner products MOULE 3 The inner product of two vectors: The inner product of two vectors x, y V, denoted by x, y is (in generl) complex vlued function which hs the following four properties: i)

More information

How To Understand The Theory Of Inequlities

How To Understand The Theory Of Inequlities Ostrowski Type Inequlities nd Applictions in Numericl Integrtion Edited By: Sever S Drgomir nd Themistocles M Rssis SS Drgomir) School nd Communictions nd Informtics, Victori University of Technology,

More information

Factoring N = p r q for Large r

Factoring N = p r q for Large r Factoring N = p r q for Large r Dan Boneh 1,GlennDurfee 1, and Nick Howgrave-Graham 2 1 Computer Science Department, Stanford University, Stanford, CA 94305-9045 {dabo,gdurf}@cs.stanford.edu 2 Mathematical

More information

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999 Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,

More information

The Velocity Factor of an Insulated Two-Wire Transmission Line

The Velocity Factor of an Insulated Two-Wire Transmission Line The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3. The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only

More information

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE Skndz, Stockholm ABSTRACT Three methods for fitting multiplictive models to observed, cross-clssified

More information

CHAPTER 11 Numerical Differentiation and Integration

CHAPTER 11 Numerical Differentiation and Integration CHAPTER 11 Numericl Differentition nd Integrtion Differentition nd integrtion re bsic mthemticl opertions with wide rnge of pplictions in mny res of science. It is therefore importnt to hve good methods

More information

QUADRATURE METHODS. July 19, 2011. Kenneth L. Judd. Hoover Institution

QUADRATURE METHODS. July 19, 2011. Kenneth L. Judd. Hoover Institution QUADRATURE METHODS Kenneth L. Judd Hoover Institution July 19, 2011 1 Integrtion Most integrls cnnot be evluted nlyticlly Integrls frequently rise in economics Expected utility Discounted utility nd profits

More information

RSA Attacks. By Abdulaziz Alrasheed and Fatima

RSA Attacks. By Abdulaziz Alrasheed and Fatima RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.

More information

Unit 6: Exponents and Radicals

Unit 6: Exponents and Radicals Eponents nd Rdicls -: The Rel Numer Sstem Unit : Eponents nd Rdicls Pure Mth 0 Notes Nturl Numers (N): - counting numers. {,,,,, } Whole Numers (W): - counting numers with 0. {0,,,,,, } Integers (I): -

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers

A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers Johannes Blömer, Alexander May Faculty of Computer Science, Electrical Engineering and Mathematics University of Paderborn

More information

Distributions. (corresponding to the cumulative distribution function for the discrete case).

Distributions. (corresponding to the cumulative distribution function for the discrete case). Distributions Recll tht n integrble function f : R [,] such tht R f()d = is clled probbility density function (pdf). The distribution function for the pdf is given by F() = (corresponding to the cumultive

More information

Primality Testing and Factorization Methods

Primality Testing and Factorization Methods Primality Testing and Factorization Methods Eli Howey May 27, 2014 Abstract Since the days of Euclid and Eratosthenes, mathematicians have taken a keen interest in finding the nontrivial factors of integers,

More information

RIGHT TRIANGLES AND THE PYTHAGOREAN TRIPLETS

RIGHT TRIANGLES AND THE PYTHAGOREAN TRIPLETS RIGHT TRIANGLES AND THE PYTHAGOREAN TRIPLETS Known for over 500 yers is the fct tht the sum of the squres of the legs of right tringle equls the squre of the hypotenuse. Tht is +b c. A simple proof is

More information

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive

More information

FUNCTIONS AND EQUATIONS. xεs. The simplest way to represent a set is by listing its members. We use the notation

FUNCTIONS AND EQUATIONS. xεs. The simplest way to represent a set is by listing its members. We use the notation FUNCTIONS AND EQUATIONS. SETS AND SUBSETS.. Definition of set. A set is ny collection of objects which re clled its elements. If x is n element of the set S, we sy tht x belongs to S nd write If y does

More information

Basic Analysis of Autarky and Free Trade Models

Basic Analysis of Autarky and Free Trade Models Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently

More information

Cryptosystem. Diploma Thesis. Mol Petros. July 17, 2006. Supervisor: Stathis Zachos

Cryptosystem. Diploma Thesis. Mol Petros. July 17, 2006. Supervisor: Stathis Zachos s and s and Diploma Thesis Department of Electrical and Computer Engineering, National Technical University of Athens July 17, 2006 Supervisor: Stathis Zachos ol Petros (Department of Electrical and Computer

More information

2005-06 Second Term MAT2060B 1. Supplementary Notes 3 Interchange of Differentiation and Integration

2005-06 Second Term MAT2060B 1. Supplementary Notes 3 Interchange of Differentiation and Integration Source: http://www.mth.cuhk.edu.hk/~mt26/mt26b/notes/notes3.pdf 25-6 Second Term MAT26B 1 Supplementry Notes 3 Interchnge of Differentition nd Integrtion The theme of this course is bout vrious limiting

More information

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control Interntionl Journl of Science nd Reserch (IJSR) Spce Vector Pulse Width Modultion Bsed Induction Motor with V/F Control Vikrmrjn Jmbulingm Electricl nd Electronics Engineering, VIT University, Indi Abstrct:

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Physics 43 Homework Set 9 Chapter 40 Key

Physics 43 Homework Set 9 Chapter 40 Key Physics 43 Homework Set 9 Chpter 4 Key. The wve function for n electron tht is confined to x nm is. Find the normliztion constnt. b. Wht is the probbility of finding the electron in. nm-wide region t x

More information

Warm-up for Differential Calculus

Warm-up for Differential Calculus Summer Assignment Wrm-up for Differentil Clculus Who should complete this pcket? Students who hve completed Functions or Honors Functions nd will be tking Differentil Clculus in the fll of 015. Due Dte:

More information

Integration by Substitution

Integration by Substitution Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Lectures 8 and 9 1 Rectangular waveguides

Lectures 8 and 9 1 Rectangular waveguides 1 Lectures 8 nd 9 1 Rectngulr wveguides y b x z Consider rectngulr wveguide with 0 < x b. There re two types of wves in hollow wveguide with only one conductor; Trnsverse electric wves

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of

More information

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered: Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you

More information

AREA OF A SURFACE OF REVOLUTION

AREA OF A SURFACE OF REVOLUTION AREA OF A SURFACE OF REVOLUTION h cut r πr h A surfce of revolution is formed when curve is rotted bout line. Such surfce is the lterl boundr of solid of revolution of the tpe discussed in Sections 7.

More information

P.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn

P.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn 33337_0P03.qp 2/27/06 24 9:3 AM Chpter P Pge 24 Prerequisites P.3 Polynomils nd Fctoring Wht you should lern Polynomils An lgeric epression is collection of vriles nd rel numers. The most common type of

More information

UNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics STRATEGIC SECOND SOURCING IN A VERTICAL STRUCTURE

UNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics STRATEGIC SECOND SOURCING IN A VERTICAL STRUCTURE UNVERSTY OF NOTTNGHAM Discussion Ppers in Economics Discussion Pper No. 04/15 STRATEGC SECOND SOURCNG N A VERTCAL STRUCTURE By Arijit Mukherjee September 004 DP 04/15 SSN 10-438 UNVERSTY OF NOTTNGHAM Discussion

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

Project 6 Aircraft static stability and control

Project 6 Aircraft static stability and control Project 6 Aircrft sttic stbility nd control The min objective of the project No. 6 is to compute the chrcteristics of the ircrft sttic stbility nd control chrcteristics in the pitch nd roll chnnel. The

More information

Review guide for the final exam in Math 233

Review guide for the final exam in Math 233 Review guide for the finl exm in Mth 33 1 Bsic mteril. This review includes the reminder of the mteril for mth 33. The finl exm will be cumultive exm with mny of the problems coming from the mteril covered

More information

Decision Rule Extraction from Trained Neural Networks Using Rough Sets

Decision Rule Extraction from Trained Neural Networks Using Rough Sets Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT

More information

Integration. 148 Chapter 7 Integration

Integration. 148 Chapter 7 Integration 48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but

More information

Online Multicommodity Routing with Time Windows

Online Multicommodity Routing with Time Windows Konrd-Zuse-Zentrum für Informtionstechnik Berlin Tkustrße 7 D-14195 Berlin-Dhlem Germny TOBIAS HARKS 1 STEFAN HEINZ MARC E. PFETSCH TJARK VREDEVELD 2 Online Multicommodity Routing with Time Windows 1 Institute

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Arithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28

Arithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28 Arithmetic algorithms for cryptology 5 October 2015, Paris Sieves Razvan Barbulescu CNRS and IMJ-PRG R. Barbulescu Sieves 0 / 28 Starting point Notations q prime g a generator of (F q ) X a (secret) integer

More information

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey

More information

Index Calculation Attacks on RSA Signature and Encryption

Index Calculation Attacks on RSA Signature and Encryption Index Calculation Attacks on RSA Signature and Encryption Jean-Sébastien Coron 1, Yvo Desmedt 2, David Naccache 1, Andrew Odlyzko 3, and Julien P. Stern 4 1 Gemplus Card International {jean-sebastien.coron,david.naccache}@gemplus.com

More information

Rotating DC Motors Part II

Rotating DC Motors Part II Rotting Motors rt II II.1 Motor Equivlent Circuit The next step in our consiertion of motors is to evelop n equivlent circuit which cn be use to better unerstn motor opertion. The rmtures in rel motors

More information

Probability m odels on horse-race outcomes

Probability m odels on horse-race outcomes Jour nl of Applied Sttistics, Vol. 25, No. 2, 1998, 221± 229 Probbility m odels on horse-rce outcomes M UKHTAR M. ALI, Deprtment of Economics, University of Kentucy, USA SUMMARY A number of models hve

More information

Homework 3 Solutions

Homework 3 Solutions CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING Sung Joon Kim*, Dong-Chul Che Kore Aerospce Reserch Institute, 45 Eoeun-Dong, Youseong-Gu, Dejeon, 35-333, Kore Phone : 82-42-86-231 FAX

More information

Euler Euler Everywhere Using the Euler-Lagrange Equation to Solve Calculus of Variation Problems

Euler Euler Everywhere Using the Euler-Lagrange Equation to Solve Calculus of Variation Problems Euler Euler Everywhere Using the Euler-Lgrnge Eqution to Solve Clculus of Vrition Problems Jenine Smllwood Principles of Anlysis Professor Flschk My 12, 1998 1 1. Introduction Clculus of vritions is brnch

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

Algebra Review. How well do you remember your algebra?

Algebra Review. How well do you remember your algebra? Algebr Review How well do you remember your lgebr? 1 The Order of Opertions Wht do we men when we write + 4? If we multiply we get 6 nd dding 4 gives 10. But, if we dd + 4 = 7 first, then multiply by then

More information

belief Propgtion Lgorithm in Nd Pent Penta

belief Propgtion Lgorithm in Nd Pent Penta IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 375 Itertive Trust nd Reputtion Mngement Using Belief Propgtion Ermn Aydy, Student Member, IEEE, nd Frmrz Feri, Senior

More information

Review Problems for the Final of Math 121, Fall 2014

Review Problems for the Final of Math 121, Fall 2014 Review Problems for the Finl of Mth, Fll The following is collection of vrious types of smple problems covering sections.,.5, nd.7 6.6 of the text which constitute only prt of the common Mth Finl. Since

More information

Pure C4. Revision Notes

Pure C4. Revision Notes Pure C4 Revision Notes Mrch 0 Contents Core 4 Alger Prtil frctions Coordinte Geometry 5 Prmetric equtions 5 Conversion from prmetric to Crtesin form 6 Are under curve given prmetriclly 7 Sequences nd

More information

Brillouin Zones. Physics 3P41 Chris Wiebe

Brillouin Zones. Physics 3P41 Chris Wiebe Brillouin Zones Physics 3P41 Chris Wiebe Direct spce to reciprocl spce * = 2 i j πδ ij Rel (direct) spce Reciprocl spce Note: The rel spce nd reciprocl spce vectors re not necessrily in the sme direction

More information

A Factoring and Discrete Logarithm based Cryptosystem

A Factoring and Discrete Logarithm based Cryptosystem Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques

More information

Dit proefschrift is goedgekeurd door de promotor: prof.dr.ir. H.C.A. van Tilborg Copromotor: dr. B.M.M. de Weger

Dit proefschrift is goedgekeurd door de promotor: prof.dr.ir. H.C.A. van Tilborg Copromotor: dr. B.M.M. de Weger Dit proefschrift is goedgekeurd door de promotor: prof.dr.ir. H.C.A. van Tilborg Copromotor: dr. B.M.M. de Weger CIP-DATA LIBRARY TECHNISCHE UNIVERSITEIT EINDHOVEN Jochemsz, Ellen Cryptanalysis of RSA

More information

Lower Bound for Envy-Free and Truthful Makespan Approximation on Related Machines

Lower Bound for Envy-Free and Truthful Makespan Approximation on Related Machines Lower Bound for Envy-Free nd Truthful Mespn Approximtion on Relted Mchines Lis Fleischer Zhenghui Wng July 14, 211 Abstrct We study problems of scheduling jobs on relted mchines so s to minimize the mespn

More information

Computer and Network Security

Computer and Network Security MIT 6.857 Computer and Networ Security Class Notes 1 File: http://theory.lcs.mit.edu/ rivest/notes/notes.pdf Revision: December 2, 2002 Computer and Networ Security MIT 6.857 Class Notes by Ronald L. Rivest

More information

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors

More information

Section 1: Crystal Structure

Section 1: Crystal Structure Phsics 927 Section 1: Crstl Structure A solid is sid to be crstl if toms re rrnged in such w tht their positions re ectl periodic. This concept is illustrted in Fig.1 using two-dimensionl (2D) structure.

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information