Factoring RSA moduli with weak prime factors
|
|
- Linda Stafford
- 8 years ago
- Views:
Transcription
1 Fctoring RSA moduli with we prime fctors Abderrhmne Nitj 1 nd Tjjeeddine Rchidi 2 1 Lbortoire de Mthémtiques Nicols Oresme Université de Cen Bsse Normndie, Frnce bderrhmne.nitj@unicen.fr 2 School of Science nd Engineering Alhwyn University in Ifrne, Morocco T.Rchidi@ui.m Abstrct. In this pper, we study the problem of fctoring n RSA modulus N = pq in polynomil time, when p is we prime, tht is, p cn be expressed s p = u 0 + M 1u M u for some integers M 1,..., M nd + 2 suitbly smll prmeters, u 0,... u. We further compute lower bound for the set of we moduli, tht is, moduli mde of t lest one we prime, in the intervl [2 2n, 2 2n+1 ] nd show tht this number is much lrger thn the set of RSA prime fctors stisfying Coppersmith s conditions, effectively extending the lielihood for fctoring RSA moduli. We lso prolong our findings to moduli composed of two we primes. Keywords: RSA, Cryptnlysis, Fctoriztion, LLL lgorithm, We primes 1 Introduction The RSA cryptosystem, invented in 1978 by Rivest, Shmir nd Adlemn [17] is undoubtedly one of the most populr public ey cryptosystems. In the stndrd RSA [17], the modulus N = pq is the product of two lrge primes of the sme bit-size. The public exponent e is n integer such tht 1 e < φn nd gcde, φn = 1 where φn = p 1q 1 is the Euler totient function. The corresponding privte exponent is the integer d such tht ed 1 mod φn. In RSA, the encryption, decryption, signture genertion, nd signture verifiction require substntil CPU cycles becuse the time to perform these opertions is proportionl to the number of bits in public or secret exponents [17]. To reduce CPU time necessry for encryption nd signture verifiction, one my be tempted to use smll public exponent e. This sitution hs been proven to be insecure ginst some smll public exponent ttcs see [8] nd [9]. To reduce the decryption nd signture genertion time, one my lso be tempted to use smll privte exponent d. Unfortuntely, RSA is lso vulnerble to vrious powerful short secret exponent ttcs such s, the ttc of Wiener [20], Prtilly supported by the French SIMPATIC SIM nd PAiring Theory for Informtion nd Communictions security.
2 2 Abderrhmne Nitj nd Tjjeeddine Rchidi nd the ttc of Boneh nd Durfee [4] see lso [3]. An lternte wy for incresing the performnce of encryption, decryption, signture genertion, nd signture verifiction, without reverting to smll exponents, is to use the multiprime vrint of RSA. The multi-prime RSA is generliztion of the stndrd RSA cryptosystem in which the modulus is in the form N = p 1 p 2 p where 3 nd the p i s re distinct prime numbers. Combined with the Chinese Reminder Theorem, multi-prime RSA is much more efficient thn the stndrd RSA see [5]. In Section of the X stndrd for public ey cryptogrphy [1], some recommendtions re presented regrding the genertion of the prime fctors of n RSA modulus. For exmple, it is recommended tht the modulus should hve x bits for x 0. This requirement deters some fctoriztion ttcs, such s the Number Field Sieve NFS [12] nd the Elliptic Curve Method ECM [11]. Another recommendtion is tht the prime difference p q should be lrge, nd p q should not be ner the rtio of two smll integers. These requirements gurd ginst Fermt fctoring lgorithm [19], s well s Coppersmith s fctoring ttc on RSA [6] when one nows hlf of the bits of p. For exmple, [ if N = pq nd p, q re of the sme bit-size with p q < N 1/4, then N ] [ N ] p < N 1/4 see [16] where is the nerest integer to N, which mens tht hlf of the bits of p re those of [ N] which leds to the fctoriztion of N see [6] nd [19]. Observe tht the fctoriztion ttc of Coppersmith pplies provided tht one nows hlf of the bits of p, tht is p is in one of the forms { M 1 + u 0 with nown M 1 nd unnown u 0 N 1 4, p = M 1 u 1 + M 0 with nown M 1, M 0 nd unnown u 1 N 1 4. Such primes re clled Coppersmith s we primes. In the cse of p = M 1 u 1 +M 0 with nown M 1 nd M 0, the Eucliden division of q by M 1 is in the form q = M 1 v 1 +v 0. Hence N = pq = M 1 u 1 +M 0 M 1 v 1 +v 0 which gives M 0 v 0 N mod M 1. Hence, since gcdm 0, M 1 = 1, then v 0 NM0 1 mod M 1. This mens tht when p is in the form p = M 1 u 1 + M 0 with nown M nd u 0, then q is necessrily in the form q = M 1 v 1 + v 0 with nown v 0. Coppersmith s ttc is therefore pplicble only when smll enough prmeters M 0 nd v 0 cn be found such tht p = M 1 u 1 + M 0 nd q = M 1 v 1 + v 0. This reduces the pplicbility of the ttc to the set of moduli such tht p nd q re of the form defined bove. In this pper, we consider the generliztion of Coppersmith s ttc by considering more stisfible decomposition of ny of the multipliers of p or q, i.e., p or q not just p or q, effectively leding to n incresed set of moduli tht cn be fctored. We describe two new ttcs on RSA with modulus N = pq. The first ttc pplies in the sitution tht, for given positive integers M 1,..., M, one of the prime fctors, p sy, stisfies liner eqution p = u 0 + M 1 u M u with suitbly smll integers nd u 0,..., u. We cll such prime fctors we primes for the integers M 1,..., M. The second ttc pplies when both fctors p nd q re we for the integers M 1,..., M. We note
3 Fctoring RSA moduli with we prime fctors 3 tht, for = 1, the we primes re such tht p = u 0 + M 1 u 1. This includes the clss of Coppersmith s we primes. For both ttcs, we give n estimtion of the RSA moduli N = pq with prime fctor p [ 2 n, 2 n+1] which is we for the integers M, M 2,..., M where M = 2 n 2. We show tht the number of moduli with we prime fctor is much lrger thn the number of moduli with Coppersmith s we prime fctor. The rest of the pper is orgnized s follows. In Section 2, we give some bsic concepts on integer fctoriztion nd lttice reduction s well s n overview of Coppersmith s method. In Section 3, we present n ttc on n RSA modulus N = pq with one we prime fctor. In Section 4, we present the second ttc n RSA modulus N = pq with two we prime fctors. We conclude the pper in Section 5. 2 Preliminries In this section we give the definitions nd results tht we need to perform our ttcs. These preliminries include bsic concepts on integer fctoriztion nd lttice reduction techniques. 2.1 Integer fctoriztion: the stte of the rt Currently, the most powerful lgorithm for fctorizing lrge integers is the Number Field Sieve NFS [12]. The heuristic expected time T NF S N of the NFS depends on the bitsize of the integer N to be fctored: T NF S N = exp o1log N 1/3 log log N 2/3. If the integer N hs smll fctors, the Elliptic Curve Method ECM [11] for fctoring is substntilly fster thn the NFS. It cn compute non-trivil fctor p of composite integer N in n expected runtime T ECM : T ECM p = exp 2 + o1 log p 1/2 log log p 1/2, which is sub-exponentil in the bitsize of the fctor p. The lrgest fctor found so fr with the ECM is 83 deciml digits 275 bits prime fctor of the specil number see [18]. 2.2 Lttice reduction Let m nd n be positive integers with m n. Let u 1,..., u m R n be m linerly independent vectors. The lttice L spnned by u 1,..., u m is the set { m } L = i u i i Z. i=1
4 4 Abderrhmne Nitj nd Tjjeeddine Rchidi The set {u 1,..., u m } is clled lttice bsis for L. The dimension or rn of the lttice L is diml = m, nd L is clled full rn if m = n. It is often useful to represent the lttice L by the m n mtrix M whose rows re the coefficients of the vectors u 1,..., u m. The determinnt or volume of L is defined s detl = M M t. When L is full rn, the determinnt reduces to detl = detm. The Eucliden norm of vector v = m i=1 iu i L is defined s v = m i=1 2 i. As lttice hs infinitely mny bses, some bses re better thn others, nd very importnt ts is to find bsis with smll vectors {b 1,..., b m } clled the reduced bsis. This ts is very hrd in generl, however, the LLL lgorithm proposed by Lenstr, Lenstr, nd Lovász [13] finds bsis of lttice with reltively smll vectors in polynimil time. The following theorem determines the sizes of the reduced bsis vectors obtined with LLL see [15] for more detils. Theorem 1. Let L be lttice spnned by bsis {u 1,..., u m }. The LLL lgorithm pplied to L outputs reduced bsis {b 1,..., b m } with b 1 b 2... b i 2 mm 1 4m i+1 detl 1 m+i 1, for i = 1, 2,..., m. The existence of short nonzero vector in lttice is gurnteed by result of Minowsi stting tht every m-dimensionl lttice L contins non-zero vector v with v m detl 1 m. On the other hnd, the Gussin Heuristic sserts tht the norm γ 1 of the shortest vector of rndom lttice stisfies diml 1 γ 1 detl diml. 2πe Herefter, we will use this result s n estimtion for the expected minimum norm of non-zero vector in lttice. 2.3 Coppersmith s Method In 1996, Coppersmith [6] presented two techniques bsed on LLL to find smll integer roots of univrite modulr polynomils or of bivrite integer polynomils. Coppersmith showed how to pply his technique to fctorize n RSA modulus N = pq with q < p < 2q when hlf of the lest or the most significnt bits of p is nown. Theorem 2. Let N = pq be n RSA modulus with q < p < 2q. Let M 0 nd M 1 be two positif integers. If p = M 1 + u 0 with u 0 < N 1 4 or if p = M 1 u 1 + M 0 with u 1 < N 1 4, then N cn be fctored in time polynomil in log N. Coppersmith s technique extends to polynomils in more vribles, but the method becomes heuristic. The problem of finding smll roots of liner modulr polynomils fx 1,..., x n = 1 x x n x n + n+1 mod p for some unnown p tht divides the nown modulus N hs been studied using Coppersmith s technique by Herrmnn nd My [10]. The following result, due to Lu, Zhng nd Lin [14] gives sufficient condition under which modulr roots cn be found efficiently.
5 Fctoring RSA moduli with we prime fctors 5 Theorem 3 Lu, Zhng, Lin. Let N be composite integer with divisor p u such tht p N β. Let fx 1,..., x n Z[x 1,..., x n ] be homogenous liner polynomil. Then one cn find ll the solutions y 1,..., y n of the eqution fx 1,..., x n = 0 mod p v, v u with gcdy 1,..., y n = 1 nd y 1 < N δ1,..., y n < N δn if n δ i u 1 1 u n v v β n 1 n 1 n 1 1 u v β 1 u v β. i=1 The time complexity of the lgorithm for finding such sulution y 1,..., y n is polynomil in log N. 3 The Attc with One We Prime Fctor 3.1 The Attc In this section, we present n ttc to fctor n RSA modulus N = pq when p stisfies liner eqution in the form p = u 0 + M 1 u M u for suitbly smll positive integer nd suitbly smll integers u 0, u 1,..., u where M 1,..., M re given positive integers. Such prime fctor p is clled we prime for the integers M 1,..., M. Theorem 4. Let N = pq be n RSA modulus such tht p > N β nd M 1,..., M be positive integers with M 1 < M 2 <... < M. Suppose tht there exists positive integer, nd + 1 integers u i, i = 0,..., such tht p = u 0 +M 1 u M u with mxu i < N δ nd δ < β Then one cn fctor N in polynomil time. 1 1 β 1 β. Proof. Let M 1,..., M be positive integers such tht M 1 < M 2 <... < M. Suppose tht p = u 0 + M 1 u M u, tht is u 0,..., u is solution of the modulr polynomil eqution x 0 + M 1 x M x = 0 mod p. 1 Suppose tht u i < N δ for i = 0,...,. Using n = + 1, u = 1 nd v = 1 in Theorem 3, mens tht the eqution 1 cn be solved in polynomil time, i.e., finding u 0,..., u if + 1δ < 1 1 β β 1 β, which gives the bound δ < This termintes the proof. 1 1 β β 1 β.
6 6 Abderrhmne Nitj nd Tjjeeddine Rchidi Remr 1. For blnced RSA modulus, the prime fctors p nd q re of the sme bit size. Then p > N β with β = 1 2. Hence, the condition on δ becomes δ < In Tble 1, we give the bound for δ for given β nd = 1 = 2 = 3 = 4 = 5 = 6 = 7 = 8 = 9 = 10 β = β = β = Tble 1. Upper bounds for δ by Theorem 4. Remr 2. We note tht Coppersmith s we primes correspond to moduli N = pq with q < p < 2q where one of the prime fctors is of the form p = M 1 + u 0 or p = M 1 u 1 + M 0 with u 0, u 1 < N 0.25 s mentioned in Theorem 2. This specil cse of the eqution of Theorem 4. Indeed, we cn solve the equtions p = M 1 +u 0 nd p = M 1 u 1 + M 0 when u 0, u 1 < N 1 4. Alterntively, Coppersmith s we primes correspond to the cell, 2β = 1, 0.25 in Tble Numericl Exmples Exmple 1. Let N = , be 412-bit RSA modulus with N = pq where q < p < 2q. Then p nd q re blnced nd p N Hence for β = 0.5, we hve p > N β. Suppose tht p stisfies n eqution of the form p = u 0 + Mu 1 + M 2 u 2. Typiclly, M 2 N 1 2, tht is M N 1 4. So let M = For β = 0.5 nd = 2, Tble 1 gives the bound δ < Assume therefore tht the prmeters u i stisfy u i < N for i = 0, 1, 2. By pplying Theorem 4 we should find u 0, u 1 nd u 2 s long s u 0, u 1, u 2 < We pply the method of Lu et l. [14] with m = 4 nd t = 1. This gives 35-dimensionl lttice. Applying the LLL lgorithm [13], we find reduced bsis with multivrite polynomils f i x 1, x 2, x 3 Z[x 1, x 2, x 3 ], i = 1,..., 3. Applying the Gröbner bsis technique for solving system of polynomil equtions, we get u 0 = 9005, u 1 = 7123,
7 Fctoring RSA moduli with we prime fctors 7 u 2 = Using these vlues, we cn compute p = u 0 + Mu 1 + M 2 u 2 from which we deduce p = gcdu 0 + Mu 1 + M 2 u 2, N, tht is p = Finlly, we cn compute q = N p, tht is q = Note here tht there is no liner decomposition of p in the form p = M 1 + u 0 nor p = M 1 u 1 + M 0 with u 0, u 1 < N 0.25 tht mes p vulnerble to the ttc of Coppersmith. This shows tht the modulus N is vulnerble to our ttc, while it is not vulnerble to Coppersmith s ttc. Finlly, the overll recorded execution time for our ttc using n off-the-shelf computer ws 17 seconds. Exmple 2. In [2], Bernstein et l. discovered mny prime fctors with specil forms. Mny of these primes were found by computing the gretest common divisor of collection of RSA moduli. Others were found by pplying Coppersmith s technique. We show below tht our ttc cn find some primes mong the list of Bernstein et l. One of these primes is p =0xc f 9, = Using M = 2 510, we get p = 3M = Mu 1 + u 0 where u 1 = 3 nd u 0 = 761. We hve u 1, u 0 < N δ with δ which is less thn the bound in Tble 1 for 1024 bit-size RSA modulus N with β = 0.5, nd = 1. This implies tht the conditions for Theorem 4 re stisfied nd our method finds p when used in ny RSA modulus. Exmple 3. Now, consider this other exmple from the list of Bernstein et l. [2] p =0xc000b = Then p hs the form p = M M = M 7 u 7 + M 3 u 3 + u 0 where M = The coefficients u 7, u 3 nd u 0 stisfy u 7, u 3, u 0 < N δ with δ while the bound of Theorem 4 is see Tble 1 for = 7 nd β = 0.5. Agin, this shows tht our method will find the fctoriztion of ny RSA modulus tht is multiple of p.
8 8 Abderrhmne Nitj nd Tjjeeddine Rchidi 3.3 The Number of Single We Primes in n Intervl In this section, we consider two positive integers n nd M nd present study of the we primes with M, tht is the primes p [ 2 n, 2 n+1] such tht there exists positive integer tht gives the decomposition p = M i u i where u i < N δ nd δ stisfies Theorem 4. We show tht the number of the RSA moduli N in the intervl [2 2n, 2 2n+1 ] with we prime fctor p [ 2 n, 2 n+1] is polynomil in 2 n. Tht is, this number is lower bounded by 2 η where η > 1 2. We cll such clss we RSA Moduli in the intervl [2 2n, 2 2n+1 ]. Theorem 5. Let n be positive integer. For 1, define M = 2 n. Let N be the set of the we RSA moduli N [ 2 2n, 2 2n+1] such tht N = pq, p nd q re of the sme bitsize, p > q, nd p = + b [ 2 n, 2 n+1] for some M i u i smll integers b, < N δ nd u i < N δ for i = 0,..., with δ = Then the crdinlity of N stisfies #N 2 η where n 1 η = δn + log 2. nn + 1 log2 Proof. Let N be n RSA moduli. Suppose tht N [ 2 2n, 2 2n+1] with N = pq where p nd q re of the sme bitsize. Since p N 1 2, then p [ 2 n, 2 n+1]. Suppose further tht for some positive integer, we hve p = M i u i. Then M = p 1 M i u i p, u u which implies M p 1 N 1 2. Now, define M = N 1 2 = 2 n, where x is the integer greter or equl to x. This yields 2 n M 2 n+1. Consider the set { P = p = M i u i + b, p is prime, p [ } 2 n, 2 n+1], < N δ, u i < N δ, where δ stisfies 2. Here b is s smll s possible so tht M i u i + b is prime. Also, since M is the leding term, then observe tht M i u i M = u M i=1 + M i u i.
9 Fctoring RSA moduli with we prime fctors 9 To ensure p [ 2 n, 2 n+1], we consider only the sitution where u. Hence, using the bounds < N δ nd u i < N δ for i = 0,..., 1, we get lower bound for the number of possibilities for nd for u i, which themselves set lower bound for the crdinlity of P s follows: #P N δ N δ N +1δ 2 2+1nδ. 3 On the other hnd, the prime number theorem sserts tht the number πx of the primes less thn x is πx x logx. Hence, the number of primes in the intervl [ 2 n, 2 n+1] is pproximtely π 2 n+1 π 2 n 2n+1 log 2 n+1 2n n 12n log 2 n = nn + 1 log2. 4 It follows tht the number of RSA moduli N = pq [ 2 2n, 2 2n+1] with we fctor p P nd q [ 2 n, 2 n+1] is t lest #N #P π 2 n+1 π 2 n. Using 3 nd 4, we get #N 2 2+1nδ n 12n nn + 1 log2 n 1 = nn + 1 log δn = 2 η, where n 1 η = δn + log 2. nn + 1 log2 This termintes the proof. Tble 2 presents list of vlues of the bound η in terms of nd n. In Tble 2, = 1 = 2 = 3 = 4 = 5 = 6 = 7 n = 1 log 2 2 N = n = 1 2 log 2N = n = 1 2 log 2N = Tble 2. Lower bounds for η under Theorem 5. we see tht in the sitution β, = 0.5, 1, the number #N of 1024-bits RSA moduli N = pq [ , ] with we fctor p is t lest #N This is much lrger thn the number of RSA moduli with we Coppersmith prime fctor in the sme intervl, which is ctully N This remr is lso vlid for 2048-bits nd 4096-bits RSA moduli.
10 10 Abderrhmne Nitj nd Tjjeeddine Rchidi 4 The Attc with Two We Prime fctors 4.1 The Attc In this section, we present n ttc on RSA with modulus N = pq when both the prime fctors p nd q re we primes. Theorem 6. Let N = pq be n RSA modulus nd M be positive integer. Let 1. Suppose tht there exist integers, b, u i nd v i, i = 1,..., such tht p = M i u i nd bq = M i v i with u i, v i < N δ nd δ < log logn Then one cn fctor N in polynomil time. + log2 + 1 log2πe 4 logn log logn. Proof. Suppose tht p = M i u i nd bq = M i v i. Then multiplying p nd bq, we get bn = 2 M i w i, with w i = This cn be trnsformed into the eqution i u j v i j. M 2 x 2 + M 2 1 x Mx 1 yn = x 0, 5 with the solution x 2, x 2 1,..., x 1, y, x 0 = w 2, w 2,..., w 1, b, u 0 v 0. For i = 0,...,, suppose tht u i, v i < N δ. Since for i = 0,..., 2, the mximl number of terms in w i is, we get x i = w i mx j j=0 u j mx v j < N 2δ. 6 Let C be constnt to be fixed lter. Consider the lttice L generted by the row vectors of the mtrix CM CM 2 1 ML = CM CN The dimension of the lttice L is diml = 2+1 nd its determinnt is detl = CN. According to the Gussin Heuristic, the length of the shortest non-zero vector of the lttice L is pproximtely σl with diml 1 σl detl diml = 2πe 2πe CN j
11 Fctoring RSA moduli with we prime fctors 11 Consider the vector v = x 2, x 2 1,..., x 1, Cx 0. Then, using 5, we get x 2, x 2 1,..., x 1, Cx 0 = x 2, x 1,..., x 1, y ML. This mens tht v L. Consequently, if C stisfies v σl, then, by the Gussin Heuristic, v is the shortest vector of L. Using the bound 6, the length of the vector v stisfies v 2 = C 2 x i=1 x 2 i C i=1 2 N 4δ = C N 4δ. Let C be positive integer stisfying C 2 3. Then the norm of the vector v stisfies v 2 < 4 3 N 4δ. Hence, using the Gussin pproximtion σl, the inequlity v σl is stisfied if N 2δ πe N. Solving for δ, we get δ < log 2 3 log2 + 1 log2πe + log logn 4 logn 4 logn. If δ stisfies the former bound, then the LLL lgorithm, pplied to the lttice L will output the vector v = x 2, x 2 1,..., x 1, Cx 0 from which, we deduce w 2 = x 2, w 2 1 = x 2 1,..., w 1 = x 1, w 0 = Cx 0. C Using the coefficients w i, i = 1,..., 2, we construct the polynomil P X = w 2 X 2 + w 2 1 X w 1 X + w 0. Fctoring P X, we get P X = M i u i M i v i from which we deduce ll the vlues u i nd v i for i = 1,...,. Using ech u i nd v i for i = 1,...,, we get p = M i u i nd finlly obtin p = gcd M i u i, N which in turn gives q = N q. This termintes the proof. In Tble 3, we give the bound for δ for given nd given size of the RSA modulus., 4.2 Exmples Exmple 4. Consider the 234 bits RSA modulus N =
12 12 Abderrhmne Nitj nd Tjjeeddine Rchidi = 1 = 2 = 3 = 4 = 5 log 2 N = log 2 N = Tble 3. Upper bounds for δ with Theorem 6. Let M = Suppose further tht the prime fctors p nd q re such tht p = M 2 u 2 + Mu 1 + u 0 nd bq = M 2 v 2 + Mv 1 + v 0, tht is = 2 with the nottion of Theorem 6. We built the mtrix 7 with C = 2 3 = 4 nd pplied the LLL lgorithm [13]. We got new bsis, where the lst row is: w 4, w 3, w 2, w 1, Cw 0 = , , , , From this, we form the polynomil P X = w 4 X 4 +w 3 X 3 +w 2 X 2 +w 1 X 1 +w 0. which fctors s: P X = X X X X From this, we deduce Using these vlues, we compute u 2 = , u 1 = , u 0 = , v 2 = , v 1 = , v 0 = p = M 2 u 2 + Mu 1 + u 0 = , bq = M 2 v 2 + Mv 1 + v 0 = nd obtin p = gcdp, N = , q = gcdbq, N = This leds to the fctoriztion of N = pq. We note tht the first ttc described in Section 3 does not succeed to fctor N. Indeed, we hve logmxi vi log N which is lrger thn the vlue δ = for = 2 nd β = 0.5 in Tble 1. Finlly, the overll recorded execution time for our ttc using n off-the-shelf computer ws 12 seconds. 4.3 The Number of Double We Primes in n Intervl In this section, we consider two positive integers n nd M nd present study of the double we primes with M, tht is the primes p, q [ 2 n, 2 n+1] such tht there exists positive integer nd b tht give the decompositions: p = M i u i, bq = M i v i
13 Fctoring RSA moduli with we prime fctors 13 where u i < N δ, v i < N δ nd δ stisfies Theorem 6. We show tht the number of the RSA moduli N in the intervl [2 2n, 2 2n+1 ] with we prime fctors p, q [ 2 n, 2 n+1] is lower bounded by 2 η2 where η 2 > 1 2. Theorem 7. Let n be positive integer. For 1, define M = 2 n. Let N be the set of the we RSA moduli N [ 2 2n, 2 2n+1] such tht N = pq with p = + u, q = + v, p, q [ 2 n, 2 n+1] for some smll M i u i M i v i b integers u, v, < N δ, b < N δ, u i < N δ nd v i < N δ for i = 0,..., with δ = Then the crdinlity of N is t lest #N 2 η2 where η 2 = 4 + 1nδ. Proof. As in the proof of Theorem 5, the number of prime numbers p [ 2 n, 2 n+1] such tht p = M i u i + u with u i < 2 2nδ is #P 2 2+1nδ. Then, the number N 2 of RSA modulus N [ 2 2n, 2 2n+1] with N = pq, where both p nd q re we primes is t lest #N nδ = 2 η2, where η 2 = 4 + 1nδ. This termintes the proof. In Tble 3, we present list of vlues of the bound η 2 in terms of nd n. = 1 = 2 = 3 = 4 = 5 = 6 = 7 n = n = n = Tble 4. Lower bounds for η 2 under Theorem 7. 5 Conclusions In this pper we presented nd illustrted two ttcs bsed on fctoring RSA moduli with we primes. We further computed lower bounds for the sets of we moduli -tht is, moduli mde of t lest one or two we prime respectively- in the intervl [2 2n, 2 2n+1 ] nd showed tht these sets re much lrger thn the set of RSA prime fctors stisfying Coppersmith s conditions, which effectively extending the lielihood for fctoring RSA moduli.
14 14 Abderrhmne Nitj nd Tjjeeddine Rchidi References 1. ANSI Stndrd X , Digitl Signtures Using Reversible Public Key Cryptogrphy for the Finncil Services Industry rdsa. 2. Bernstein, D.J., Chng, Y.A., Cheng, C.M., Chou, L.P., Heninger, N., Lnge, T., vn Someren, N.: Fctoring RSA eys from certified smrt crds: Coppersmith in the wild. In Advnces in Cryptology-ASIACRYPT Springer, 2013, pp Boneh, D.: Twenty yers of ttcs on the RSA cryptosystem, Notices Amer. Mth. Soc. 46 2, pp , Boneh, D., Durfee, G.: Cryptnlysis of RSA with privte ey d less thn N 0.292, Advnces in Cryptology-Eurocrypt 99, Lecture Notes in Computer Science Vol. 1592, Springer-Verlg, pp Compq Computer Corpertion. Cryptogrphy using Compq multiprime technology in prllel processing environment, Avilbe online t ftp://ftp.compq.com/pub/solutions/compqmultiprimewp.pdf 6. Coppersmith, D.: Smll solutions to polynomil equtions, nd low exponent RSA vulnerbilities. Journl of Cryptology, 104, pp Hrdy, G.H., Wright, E.M.: An Introduction to the Theory of Numbers. Oxford University Press, London Hstd, J.: On Using RSA with Low Exponent in Public Key Networ, in Proceedings of CRYPTO 85, Springer-Verlg, pp Hstd, J.: Solving simultneous modulr equtions of low degree, SIAM J. of Computing, Vol. 17, pp Herrmnn, M., My, A.: Solving liner equtions modulo divisors: On fctoring given ny bits. In Advnces in Cryptology-ASIACRYPT Springer, 2008, pp Lenstr, H.: Fctoring integers with elliptic curves, Annls of Mthemtics, Vol. 126, pp Lenstr, A.K., Lenstr, H.W. Jr. eds.: The Development of the Number Field Sieve, Lecture Notes in Mthemtics, vol. 1554, Berlin, Springer-Verlg, Lenstr, A.K., Lenstr, H.W., Lovász, L.: Fctoring polynomils with rtionl coefficients, Mthemtische Annlen, Vol. 261, pp , Y. Lu, Y., Zhng, R., Lin, D.: New Results on Solving Liner Equtions Modulo Unnown Divisors nd its Applictions, Cryptology eprint Archive, Report 2014/343, My, A.: New RSA Vulnerbilities Using Lttice Reduction Methods. PhD thesis, University of Pderborn Nitj, A.: Another generliztion of Wieners ttc on RSA, In: Vudeny, S. ed. Africcrypt LNCS, vol. 5023, pp Springer, Heidelberg Rivest, R., Shmir, A., Adlemn, L.: A Method for Obtining digitl signtures nd public-ey cryptosystems, Communictions of the ACM, Vol. 21 2, pp Zimmermnn, P.: 50 lrgest fctors found by ECM, de Weger, B.: Cryptnlysis of RSA with smll prime difference, Applicble Algebr in Engineering, Communiction nd Computing,Vol. 131, pp Wiener, M.: Cryptnlysis of short RSA secret exponents, IEEE Trnsctions on Informtion Theory, Vol. 36, pp
Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )
Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +
More informationFactoring Polynomials
Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles
More informationSPECIAL PRODUCTS AND FACTORIZATION
MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come
More informationNovel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm
Bibhudendr chry, Girij Snkr Rth, Srt Kumr Ptr, nd Sroj Kumr Pnigrhy Novel Methods of Generting Self-Invertible Mtrix for Hill Cipher lgorithm Bibhudendr chry Deprtment of Electronics & Communiction Engineering
More informationExample 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.
2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this
More informationand thus, they are similar. If k = 3 then the Jordan form of both matrices is
Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If
More informationMath 135 Circles and Completing the Square Examples
Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for
More informationLecture 3 Gaussian Probability Distribution
Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike
More informationGraphs on Logarithmic and Semilogarithmic Paper
0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl
More informationMATH 150 HOMEWORK 4 SOLUTIONS
MATH 150 HOMEWORK 4 SOLUTIONS Section 1.8 Show tht the product of two of the numbers 65 1000 8 2001 + 3 177, 79 1212 9 2399 + 2 2001, nd 24 4493 5 8192 + 7 1777 is nonnegtive. Is your proof constructive
More information19. The Fermat-Euler Prime Number Theorem
19. The Fermt-Euler Prime Number Theorem Every prime number of the form 4n 1 cn be written s sum of two squres in only one wy (side from the order of the summnds). This fmous theorem ws discovered bout
More informationLINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES
LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of
More informationVectors 2. 1. Recap of vectors
Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms
More information4.11 Inner Product Spaces
314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces
More informationInternational Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
More informationReasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
More information9 CONTINUOUS DISTRIBUTIONS
9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete
More informationMathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100
hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by
More informationBabylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity
Bbylonin Method of Computing the Squre Root: Justifictions Bsed on Fuzzy Techniques nd on Computtionl Complexity Olg Koshelev Deprtment of Mthemtics Eduction University of Texs t El Pso 500 W. University
More informationLecture 5. Inner Product
Lecture 5 Inner Product Let us strt with the following problem. Given point P R nd line L R, how cn we find the point on the line closest to P? Answer: Drw line segment from P meeting the line in right
More informationEQUATIONS OF LINES AND PLANES
EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint
More informationBinary Representation of Numbers Autar Kaw
Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy
More information5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.
5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued
More informationUse Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.
Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd
More informationOperations with Polynomials
38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply
More informationPHY 140A: Solid State Physics. Solution to Homework #2
PHY 140A: Solid Stte Physics Solution to Homework # TA: Xun Ji 1 October 14, 006 1 Emil: jixun@physics.ucl.edu Problem #1 Prove tht the reciprocl lttice for the reciprocl lttice is the originl lttice.
More informationThe Mathematical Cryptography of the RSA Cryptosystem
The Mathematical Cryptography of the RSA Cryptosystem Abderrahmane Nitaj Laboratoire de Mathématiques Nicolas Oresme Université de Caen, France abderrahmanenitaj@unicaenfr http://wwwmathunicaenfr/~nitaj
More informationExample A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding
1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde
More information#A12 INTEGERS 13 (2013) THE DISTRIBUTION OF SOLUTIONS TO XY = N (MOD A) WITH AN APPLICATION TO FACTORING INTEGERS
#A1 INTEGERS 13 (013) THE DISTRIBUTION OF SOLUTIONS TO XY = N (MOD A) WITH AN APPLICATION TO FACTORING INTEGERS Michel O. Rubinstein 1 Pure Mthemtics, University of Wterloo, Wterloo, Ontrio, Cnd mrubinst@uwterloo.c
More informationHelicopter Theme and Variations
Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the
More informationEcon 4721 Money and Banking Problem Set 2 Answer Key
Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in
More informationSection 7-4 Translation of Axes
62 7 ADDITIONAL TOPICS IN ANALYTIC GEOMETRY Section 7-4 Trnsltion of Aes Trnsltion of Aes Stndrd Equtions of Trnslted Conics Grphing Equtions of the Form A 2 C 2 D E F 0 Finding Equtions of Conics In the
More information4 Approximations. 4.1 Background. D. Levy
D. Levy 4 Approximtions 4.1 Bckground In this chpter we re interested in pproximtion problems. Generlly speking, strting from function f(x) we would like to find different function g(x) tht belongs to
More informationg(y(a), y(b)) = o, B a y(a)+b b y(b)=c, Boundary Value Problems Lecture Notes to Accompany
Lecture Notes to Accompny Scientific Computing An Introductory Survey Second Edition by Michel T Heth Boundry Vlue Problems Side conditions prescribing solution or derivtive vlues t specified points required
More informationMODULE 3. 0, y = 0 for all y
Topics: Inner products MOULE 3 The inner product of two vectors: The inner product of two vectors x, y V, denoted by x, y is (in generl) complex vlued function which hs the following four properties: i)
More informationHow To Understand The Theory Of Inequlities
Ostrowski Type Inequlities nd Applictions in Numericl Integrtion Edited By: Sever S Drgomir nd Themistocles M Rssis SS Drgomir) School nd Communictions nd Informtics, Victori University of Technology,
More informationFactoring N = p r q for Large r
Factoring N = p r q for Large r Dan Boneh 1,GlennDurfee 1, and Nick Howgrave-Graham 2 1 Computer Science Department, Stanford University, Stanford, CA 94305-9045 {dabo,gdurf}@cs.stanford.edu 2 Mathematical
More informationEconomics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999
Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,
More informationThe Velocity Factor of an Insulated Two-Wire Transmission Line
The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationRegular Sets and Expressions
Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite
More informationTreatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.
The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only
More informationCOMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT
COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE Skndz, Stockholm ABSTRACT Three methods for fitting multiplictive models to observed, cross-clssified
More informationCHAPTER 11 Numerical Differentiation and Integration
CHAPTER 11 Numericl Differentition nd Integrtion Differentition nd integrtion re bsic mthemticl opertions with wide rnge of pplictions in mny res of science. It is therefore importnt to hve good methods
More informationQUADRATURE METHODS. July 19, 2011. Kenneth L. Judd. Hoover Institution
QUADRATURE METHODS Kenneth L. Judd Hoover Institution July 19, 2011 1 Integrtion Most integrls cnnot be evluted nlyticlly Integrls frequently rise in economics Expected utility Discounted utility nd profits
More informationRSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
More informationUnit 6: Exponents and Radicals
Eponents nd Rdicls -: The Rel Numer Sstem Unit : Eponents nd Rdicls Pure Mth 0 Notes Nturl Numers (N): - counting numers. {,,,,, } Whole Numers (W): - counting numers with 0. {0,,,,,, } Integers (I): -
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationAll pay auctions with certain and uncertain prizes a comment
CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin
More informationA Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers
A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers Johannes Blömer, Alexander May Faculty of Computer Science, Electrical Engineering and Mathematics University of Paderborn
More informationDistributions. (corresponding to the cumulative distribution function for the discrete case).
Distributions Recll tht n integrble function f : R [,] such tht R f()d = is clled probbility density function (pdf). The distribution function for the pdf is given by F() = (corresponding to the cumultive
More informationPrimality Testing and Factorization Methods
Primality Testing and Factorization Methods Eli Howey May 27, 2014 Abstract Since the days of Euclid and Eratosthenes, mathematicians have taken a keen interest in finding the nontrivial factors of integers,
More informationRIGHT TRIANGLES AND THE PYTHAGOREAN TRIPLETS
RIGHT TRIANGLES AND THE PYTHAGOREAN TRIPLETS Known for over 500 yers is the fct tht the sum of the squres of the legs of right tringle equls the squre of the hypotenuse. Tht is +b c. A simple proof is
More informationPROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY
MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive
More informationFUNCTIONS AND EQUATIONS. xεs. The simplest way to represent a set is by listing its members. We use the notation
FUNCTIONS AND EQUATIONS. SETS AND SUBSETS.. Definition of set. A set is ny collection of objects which re clled its elements. If x is n element of the set S, we sy tht x belongs to S nd write If y does
More informationBasic Analysis of Autarky and Free Trade Models
Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently
More informationCryptosystem. Diploma Thesis. Mol Petros. July 17, 2006. Supervisor: Stathis Zachos
s and s and Diploma Thesis Department of Electrical and Computer Engineering, National Technical University of Athens July 17, 2006 Supervisor: Stathis Zachos ol Petros (Department of Electrical and Computer
More information2005-06 Second Term MAT2060B 1. Supplementary Notes 3 Interchange of Differentiation and Integration
Source: http://www.mth.cuhk.edu.hk/~mt26/mt26b/notes/notes3.pdf 25-6 Second Term MAT26B 1 Supplementry Notes 3 Interchnge of Differentition nd Integrtion The theme of this course is bout vrious limiting
More informationSpace Vector Pulse Width Modulation Based Induction Motor with V/F Control
Interntionl Journl of Science nd Reserch (IJSR) Spce Vector Pulse Width Modultion Bsed Induction Motor with V/F Control Vikrmrjn Jmbulingm Electricl nd Electronics Engineering, VIT University, Indi Abstrct:
More informationHow To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationPhysics 43 Homework Set 9 Chapter 40 Key
Physics 43 Homework Set 9 Chpter 4 Key. The wve function for n electron tht is confined to x nm is. Find the normliztion constnt. b. Wht is the probbility of finding the electron in. nm-wide region t x
More informationWarm-up for Differential Calculus
Summer Assignment Wrm-up for Differentil Clculus Who should complete this pcket? Students who hve completed Functions or Honors Functions nd will be tking Differentil Clculus in the fll of 015. Due Dte:
More informationIntegration by Substitution
Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationLectures 8 and 9 1 Rectangular waveguides
1 Lectures 8 nd 9 1 Rectngulr wveguides y b x z Consider rectngulr wveguide with 0 < x b. There re two types of wves in hollow wveguide with only one conductor; Trnsverse electric wves
More information6.2 Volumes of Revolution: The Disk Method
mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of
More informationAppendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:
Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you
More informationAREA OF A SURFACE OF REVOLUTION
AREA OF A SURFACE OF REVOLUTION h cut r πr h A surfce of revolution is formed when curve is rotted bout line. Such surfce is the lterl boundr of solid of revolution of the tpe discussed in Sections 7.
More informationP.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn
33337_0P03.qp 2/27/06 24 9:3 AM Chpter P Pge 24 Prerequisites P.3 Polynomils nd Fctoring Wht you should lern Polynomils An lgeric epression is collection of vriles nd rel numers. The most common type of
More informationUNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics STRATEGIC SECOND SOURCING IN A VERTICAL STRUCTURE
UNVERSTY OF NOTTNGHAM Discussion Ppers in Economics Discussion Pper No. 04/15 STRATEGC SECOND SOURCNG N A VERTCAL STRUCTURE By Arijit Mukherjee September 004 DP 04/15 SSN 10-438 UNVERSTY OF NOTTNGHAM Discussion
More informationAn Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process
An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct
More informationProject 6 Aircraft static stability and control
Project 6 Aircrft sttic stbility nd control The min objective of the project No. 6 is to compute the chrcteristics of the ircrft sttic stbility nd control chrcteristics in the pitch nd roll chnnel. The
More informationReview guide for the final exam in Math 233
Review guide for the finl exm in Mth 33 1 Bsic mteril. This review includes the reminder of the mteril for mth 33. The finl exm will be cumultive exm with mny of the problems coming from the mteril covered
More informationDecision Rule Extraction from Trained Neural Networks Using Rough Sets
Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT
More informationIntegration. 148 Chapter 7 Integration
48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but
More informationOnline Multicommodity Routing with Time Windows
Konrd-Zuse-Zentrum für Informtionstechnik Berlin Tkustrße 7 D-14195 Berlin-Dhlem Germny TOBIAS HARKS 1 STEFAN HEINZ MARC E. PFETSCH TJARK VREDEVELD 2 Online Multicommodity Routing with Time Windows 1 Institute
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationArithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28
Arithmetic algorithms for cryptology 5 October 2015, Paris Sieves Razvan Barbulescu CNRS and IMJ-PRG R. Barbulescu Sieves 0 / 28 Starting point Notations q prime g a generator of (F q ) X a (secret) integer
More informationWEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER
Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey
More informationIndex Calculation Attacks on RSA Signature and Encryption
Index Calculation Attacks on RSA Signature and Encryption Jean-Sébastien Coron 1, Yvo Desmedt 2, David Naccache 1, Andrew Odlyzko 3, and Julien P. Stern 4 1 Gemplus Card International {jean-sebastien.coron,david.naccache}@gemplus.com
More informationRotating DC Motors Part II
Rotting Motors rt II II.1 Motor Equivlent Circuit The next step in our consiertion of motors is to evelop n equivlent circuit which cn be use to better unerstn motor opertion. The rmtures in rel motors
More informationProbability m odels on horse-race outcomes
Jour nl of Applied Sttistics, Vol. 25, No. 2, 1998, 221± 229 Probbility m odels on horse-rce outcomes M UKHTAR M. ALI, Deprtment of Economics, University of Kentucy, USA SUMMARY A number of models hve
More informationHomework 3 Solutions
CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.
More informationDlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report
DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of
More informationTITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING
TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING Sung Joon Kim*, Dong-Chul Che Kore Aerospce Reserch Institute, 45 Eoeun-Dong, Youseong-Gu, Dejeon, 35-333, Kore Phone : 82-42-86-231 FAX
More informationEuler Euler Everywhere Using the Euler-Lagrange Equation to Solve Calculus of Variation Problems
Euler Euler Everywhere Using the Euler-Lgrnge Eqution to Solve Clculus of Vrition Problems Jenine Smllwood Principles of Anlysis Professor Flschk My 12, 1998 1 1. Introduction Clculus of vritions is brnch
More information2 DIODE CLIPPING and CLAMPING CIRCUITS
2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of
More informationAlgebra Review. How well do you remember your algebra?
Algebr Review How well do you remember your lgebr? 1 The Order of Opertions Wht do we men when we write + 4? If we multiply we get 6 nd dding 4 gives 10. But, if we dd + 4 = 7 first, then multiply by then
More informationbelief Propgtion Lgorithm in Nd Pent Penta
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 375 Itertive Trust nd Reputtion Mngement Using Belief Propgtion Ermn Aydy, Student Member, IEEE, nd Frmrz Feri, Senior
More informationReview Problems for the Final of Math 121, Fall 2014
Review Problems for the Finl of Mth, Fll The following is collection of vrious types of smple problems covering sections.,.5, nd.7 6.6 of the text which constitute only prt of the common Mth Finl. Since
More informationPure C4. Revision Notes
Pure C4 Revision Notes Mrch 0 Contents Core 4 Alger Prtil frctions Coordinte Geometry 5 Prmetric equtions 5 Conversion from prmetric to Crtesin form 6 Are under curve given prmetriclly 7 Sequences nd
More informationBrillouin Zones. Physics 3P41 Chris Wiebe
Brillouin Zones Physics 3P41 Chris Wiebe Direct spce to reciprocl spce * = 2 i j πδ ij Rel (direct) spce Reciprocl spce Note: The rel spce nd reciprocl spce vectors re not necessrily in the sme direction
More informationA Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
More informationDit proefschrift is goedgekeurd door de promotor: prof.dr.ir. H.C.A. van Tilborg Copromotor: dr. B.M.M. de Weger
Dit proefschrift is goedgekeurd door de promotor: prof.dr.ir. H.C.A. van Tilborg Copromotor: dr. B.M.M. de Weger CIP-DATA LIBRARY TECHNISCHE UNIVERSITEIT EINDHOVEN Jochemsz, Ellen Cryptanalysis of RSA
More informationLower Bound for Envy-Free and Truthful Makespan Approximation on Related Machines
Lower Bound for Envy-Free nd Truthful Mespn Approximtion on Relted Mchines Lis Fleischer Zhenghui Wng July 14, 211 Abstrct We study problems of scheduling jobs on relted mchines so s to minimize the mespn
More informationComputer and Network Security
MIT 6.857 Computer and Networ Security Class Notes 1 File: http://theory.lcs.mit.edu/ rivest/notes/notes.pdf Revision: December 2, 2002 Computer and Networ Security MIT 6.857 Class Notes by Ronald L. Rivest
More information9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes
The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors
More informationSection 1: Crystal Structure
Phsics 927 Section 1: Crstl Structure A solid is sid to be crstl if toms re rrnged in such w tht their positions re ectl periodic. This concept is illustrted in Fig.1 using two-dimensionl (2D) structure.
More informationExperiment 6: Friction
Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht
More information