Average Time Fast SVP and CVP Algorithms for Low Density Lattices and the Factorization of Integers. Claus P. SCHNORR
|
|
|
- Ann Henderson
- 10 years ago
- Views:
Transcription
1 Average Time Fast SVP and CVP Algorithms for Low Density Lattices and the Factorization of Integers Claus P. SCHNORR Fachbereich Informatik und Mathematik Goethe-Universität Frankfurt am Main Numbers, Sequences, Lattices: Dynamical Analysis of Algorithms. Birthday of Brigitte Vallée Caen, June 3-4, 2010
2 Road map 2 I Outline of the new SVP / CVP algorithm II III IV Time bound of SVP/CVP algorithm for low density lattices Factoring integers via "easy" CVP solutions Partial analysis of the new SVP / CVP algorithm References A technical report is available at We focus on novel proof elements that are not covered by published work and outline sensible heuristics towards polynomial time factoring of integers.
3 I: Lattices, QR-decomposition, LLL-bases 3 lattice basis B = [b 1,..., b n ] Z m n lattice L(B) = {Bx x Z n } norm x 2 = x, x = m i=1 x i 2 SV-length λ 1 (L) = min{ b b L\{0}} QR-decomposition B = QR R m n such that the GNF geom. normal form R = [r i,j ] R n n is uppertriangular, r i,j = 0 for j < i and r i,i > 0, ( r i,i = b i ) Q R m n isometric: Q t Q = I n. LLL-basis B = QR for δ ( 1 4, 1] (Lenstra, Lenstra, Lovasz 82): 1. r i,j 1 2 r i,i for all j > i (size-reduced) ( r i,j /r i,i = µ j,i ) 2. δ ri,i 2 ri,i r i+1,i+1 2 for i = 1,..., n 1 3. α i+1 b i 2 λ 2 i α n 1 for i = 1,..., n 4. b 1 2 α n 1 2 (det L) 2/n, where α = 1/(δ 1/4).
4 I: Recall ENUM 1994/95 4 Let L t = L(b 1,..., b t 1 ) and π t : span(l) span(l t ) for t = 1,..., n denote the orthogonal projection. Stage (u t,..., u n ) of ENUM. b := n i=t u ib i L and u t,..., u n Z are given. The stage searches exhaustively for all t 1 i=1 u ib i L such that n i=1 u ib i 2 A holds for some A λ 2 1. Obviously n i=1 u ib i 2 = ζ t + t 1 i=1 u ib i 2 + π t (b) 2, goal: A to be minimized spent where ζ t := b π t (b) span L t is the orthogonal projection of the given b = n i=t u ib i. Stage (u t,..., u n ) exhausts B t 1 (ζ t, ρ t ) L t where B t 1 (ζ t, ρ t ) span L t is the sphere of dimension t 1 with center ζ t and radius ρ t := (A π t (b) 2 ) 1/2.
5 I: The success rate β t of stages 5 The GAUSSIAN volume heuristics estimates B t 1 (ζ t, ρ t ) L t to β t = def vol B t 1 (ζ t, ρ t )/ det L t. Here vol B t 1 (ζ t, ρ t ) = ρ t 1 t 1 V t 1, V t = π t 2 /( t 2eπ 2 )! ( t ) t 2 / πt is the volume of the unit sphere of dimension t, det L t = t 1 i=1 r i,i, ρ 2 t := A π t ( n i=t u ib i ) 2. We call β t the success rate of stage (u t,..., u n ). If ζ t mod L t is uniformly distributed over the parallelepiped P t := { t 1 i=1 r ib i 0 r 1,..., r t 1 < 1} then E ζt [ B t 1 (ζ t, ρ t ) L t ] = β t for ζ t R P t, because 1/ det L t is the number of points per volume in L t. The center ζ t = b π t (b) span L t changes continuously. If ζ t mod L t P t distributes uniformly the estimate B t 1 (ζ t, ρ t ) L t vol B t 1 (ζ t, ρ t )/ det L t of the vol. heur. holds on the average.
6 I: Outline of New Enum for SVP 6 INPUT LLL-basis B = QR Z m n, R R n n, A := n 4 (det Bt B) 2/n, OUTPUT a sequence of b L(B) of decreasing length b 2 A terminating with b = λ s := 1, L :=, (we call s the level) 2. Perform algorithm ENUM [SE94] pruned to stages with β t n s : Upon entry of stage (u t,..., u n ) compute β t. If β t < n s delay this stage and store (β t, u t,..., u n ) in the list L of delayed stages. Otherwise perform stage (u t,..., u n ) on level s, and as soon as some b L of length 0 < b 2 A has been found give out b and set A := b 2 1. Recompute the stored β t 3. Perform the stages (u t,..., u n ) of L with β t n s 1 in increasing order of t and for fixed t in order of decreasing β t. Collect the appearing substages (u t,..., u t,..., u n ) with β t < n s 1 in L. IF L = THEN terminate by exhaustion. 4. s := s + 1, GO TO 3
7 II: Optimizing the implementation 7 We efficiently approximate β t using floating point arithmetic. The space reservations for the list L are quite expensive compared to the modest arithmetic costs per stage. The condition β t < n s has been tested in practice. It replaces the original condition β t < 2 s. This reduces list L and the number of the list operations. Saving space is a main problem. For the final exhaustive search that proves b = λ 1 the success rate and the list operations can be suppressed, they merely slow down the computation. The start of the final exhaustion can be guessed. If no shorter vector comes up for an extended period then most likely the last output b has length λ 1.
8 II: Time Bound for the SVP algorithm 8 Def. The relative density of L: rd(l) := λ 1 γ 1/2 n (det L) 1/n rd(l) = λ 1 (L)/ max λ 1 (L ) holds for the maximum of λ 1 (L ) over all lattices L of dim L = n and det L = det L. The HERMITE constant γ n = max{λ 2 1 / det(l)2/n dim L = n}. We always have λ 2 1 = rd(l)2 γ n (det L) 2/n. Theorem 1 Given a lattice basis satisfying GSA and b 1 eπ n b λ 1, b 0, NEW ENUM solves SVP in time 2 O(n) (n 1/2+b rd(l)) n/4, i.e. in time 2 O(n) ( n/rd(l)) n/4 for b = 0. The 2 O(n) factor disappears under the volume heuristics. GSA : Let B = QR = Q[r i,j ] satisfy: (for r i,i = b i ) ri,i 2 /r i 1,i 1 2 = q for i = 2,..., n and some q > 0. W.l.o.g. let q < 1, otherwise b 1 = λ 1. The condition b 1 eπ n b λ 1 can" easily" be met for CVP.
9 II: Polynomial Time bound under the vol. heuristics 9 Finding an unproved shortest vector b is easier than proving b = λ 1. We study the time to find an SVP-solution b without proving λ 1 = b under the assumption: SA π t (b ) 2 n t+1 n λ 2 1 holds for all t and NEW ENUM s SVP-solution b, where π t (b ) span(b 1,..., b t 1 ). Proposition 1. Let a lattice basis be given that satisfies GSA, b 1 eπ/2 n b λ 1 and rd(l) n 1+2b 4. If NEW ENUM finds a shortest lattice vector b satisfying SA it finds b, without proving b = λ 1, under the volume heur. in polynomial time. Polynomial time holds for b = 0, rd(l) n 1/4. But the time to prove b = λ 1 is under the volume heur. Θ(n 1/2 rd(l)) n/4.
10 II: Polynomial CVP time under the volume heur. 10 Corollary 1. Given t R n and B for L(B) satisfying GSA, b 1 = λ 1 and rd(l) n 1/2 then NEW ENUM solves the CVP t b = t L under the volume heuristics in poly-time. We adjust the assumption SA from SVP to CVP: CA Let π t (t b) 2 n t+1 n t L 2 hold for all t and NEW ENUM s CVP-solution b. Corollary 2. Let B = [b 1,..., b n ] in Z m n satisfy GSA, b 1 = O(λ 1 ) and let b satisfy CA for B, t. If rd(l) = o(n 1/4 ) and t L = O(λ 1 ) then NEW ENUM finds the CVP- solution b L under the volume heuristics in polynomial time, but without proving t b = t L. All requirements of Cor. 2 can easily be satisfied for the CVP s of the prime number lattice for factoring integers.
11 III: Factoring integers via CVP solutions 11 Let N be a positive integer that is not a prime power. Let p 1 < < p n enumerate all primes less than (ln N) α. Then n = (ln N) α /(α ln ln N + O(1)). Let the prime factors p of N satisfy p > p n. We show how to factor N by solving "easy" CVP s for the prime number lattice L(B), basis matrix B = [b 1,..., b n ] R (n+1) n : ln p B = ln pn, N =. 0, N c ln p 1 N c ln p n N c ln N and the target vector N R n+1, where either N = N or N = Np n+j for one of the next n primes p n+j > p n, j n. Lemma 5.3 [MG02] λ 2 1 2c ln N. rd(l) = o(n 1/4 ) for c = (ln N) β, suitable α > 2β + 2 > 2.
12 III: Outline of the factoring method 12 We identify the vector b = n i=1 e ib i L(B) with the pair (u, v) of integers u = e j >0 pe j j, v = e j <0 p e j j N. Then u, v are free of primes larger than p n and gcd(u, v) = 1. We compute vectors b = n i=1 e ib i L(B) close to N such that u vn < p n. The prime factorizations u vn = n i=1 pe i i and u = e j >0 pe j j yield a non-trivial relation e i >0 pe i i = ± n i=1 pe i i mod N. (7.1) Given n + 1 independent relations (7.1) we write these relations n i=0 pe i,j e i,j with p 0 = 1 and e i,j, e i,j N as i = 1 mod N for j = 1,..., n + 1. Any non-trivial solution z 1,..., z n+1 Z of n+1 j=1 z j(e i,j e i,j ) = 0 mod 2, i = 0,..., n solves X 2 = 1 mod N by X = n 2 i mod N. Hence gcd(x ± 1, N) factors N if X ±1 mod N. i=0 p 1 P n+1 j=1 z j (e i,j e i,j )
13 III: Vectors b L closest to N yield relations (7.1) 13 An integer z is called y-smooth, if all prime factors p of z satisfy p y. Let N be either N or Np n+j for one of the next n primes p n+j > p n. We denote M α,c,n = {(u, v) N 2 u N c, u vn = 1, N c 1 /2 < v < N c 1 u, v are squarefree and (ln N) α smooth Theorem 4 [S93/91] If the equation u u/n N = 1 is for random u of order N c nearly statistically independent of the event that u, u/n are squarefree and (ln N) α -smooth then α M α,c,n holds if α 2β 2 < c (ln N)β and α > 2β + 2. Theorem 4 extends the result of [S93/91] from a constant c > 0 to c = (ln N) β, required for rd(l)) = o(n 1/4 ). Theorem 5 The vector b = n i=1 e ib i L(B) closest to N provides a non-trivial relation (7.1) provided that M α,c,n. }.
14 III: Vectors b L closest to N yield relations (7.1) 14 Theorem 6 If b 1 = O(λ 1 ) and M α,c,n for c = (ln N) β, α > 2β + 2 we can minimize L(B) N in polynomial time under GSA, CA and the volume heuristics. It follows from M α,c,n for N {N, Np n+j } that L N 2 (2c 1) ln N + 1 = (2c 1 + o(1)) ln N. Lemma 5.3 of [MG02] proves that λ 2 1 2c ln N Θ(1) [ λ 2 1 = 2c ln N + O(1) holds if 0 < α α 2β 2 < c (ln N)β. ] rd(l) = λ 1 /( γ n (det L) 1 n ) ( ) 1 2eπ 2c ln N (ln N) α 2 = O(c ln N) (1 α)/2 = O((ln N) 1 α ). We have for c = (ln N) β 2c ln N, α > 2β + 2 that (ln N) = o(n 1/2 ) α Hence rd(l) = o(n 1/4 ).
15 III: Providing a nearly shortest vector for L(B) 15 For solving t b = t L heuristically in polynomial time we need that b 1 = O(λ 1 ) holds for the prime number lattice. We extend the prime number basis B and L(B) by a nearly shortest lattice vector for the extended lattice, preserving rd(l), det(l) and the structure of the lattice. We extend the prime base by a prime p n+1 of order Θ(N c ) such that u p n+1 = O(1) holds for a squarefree (ln N) α -smooth u. Then i e ib i b n+1 2 = 2c ln N + O(1) holds for u = i pe i i and the additional basis vector b n+1 corresponding to p n+1. i e ib i b n+1 is a nearly shortest vector of L(b 1,..., b n+1 ). Efficient construction of p n+1. Generate random u = i p i and test the nearby p for primality. p n+1 and b n+1 can be found in probabilistic polynomial time if the density of primes near the u is not exceptionally small. A single p n+1 can be used to solve all CVP s for the factorization of all integers of order Θ(N).
16 IV: Proof of Theorem 1 16 Theorem 1 Given a lattice basis satisfying GSA and b 1 eπ n b λ 1, b 0, NEW ENUM solves SVP in time 2 O(n) (n 1/2+b rd(l)) n/4. NEW ENUM essentially performs stages in decreasing order of the success rate β t. Let b = n i=1 u i b i L denote the unique vector of length λ 1 that is found by NEW ENUM. Let β t be the success rate of stage (u t,..., u n). NEW ENUM performs stage (u t,..., u n) prior to all stages (u t,..., u n ) of success rate β t 1 4 β t Simplifying assumption. We assume that NEW ENUM performs stage (u t,..., u n) prior to all stages of success rate β t < β t, ( i.e., ρ t < ρ t ). By definition ρ 2 t = A π t (b) 2 and ρ t 2 = A π t (b ) 2. Without using the simplifying assumption, the proven time bound of Theorem 4.1 increases at most by the factor n.
17 IV: A proven version of the volume heuristics 17 Consider the number M t of stages (u t,..., u n ) with π t ( n i=t u ib i ) λ 1 : M t := # ( B n t+1 (0, λ 1 ) π t (L) ). Modulo the heuristic simplifications M t covers the stages that precede (u t,..., u n) and those that finally prove b = λ 1. Lemma 1 M t e n t+1 2 n i=t (1 + n t+1 8π λ1 ri,i ). The proof uses the method of Lemma 1 of MAZO, ODLYZKO [MO90] and follows the adjusted proof of inequality (2) in section 4.1 of HANROT, STEHLÉ [HS07]. For details see the TR Now ri,i 2 = b 1 2 q i 1, λ 2 1 /(γ n rd(l) 2 ) = (det L) 2 n = b 1 2 q n 1 2 hold by GSA and thus γ n n 2 eπ directly imply for i = t,..., n n t + 1 ri,i 2eπ rd(l) 1 λ 1 q (2i n 1)/4. By Lemma 1 M t n e π rd(l) 1 λ 1 q (2i n 1)/4 + 8eπ λ n t+1 1 i=t ri,i (4.0)
18 IV: Proof of Theorem 1 continued 18 For the remainder of the proof let t := n c and m(q, c) := [if c > 0 then q 1 c2 4 else 1]. Then M t m(q, c) ( (2+ e) 2eπ λ 1 n t+1 rd(l) ) n t+1/ det πt (L), (4.1) where m(q, c) = q 1 c2 4 = q 1 4 P c i=0 (2i 1) covers in (4.0) the factors q 2i n 1 4 > 1 for t < i < n We see from (4.1) and det π t (L) = b 1 n t+1 q P n i=t M t m(q, c) ( (2+ e) 2eπ n t+1 λ 1 b 1 rd(l) (n+o(n)) 2eπ i 1 2 that ) n t+1/q P n 1 i=t 1 i/2 (4.2) The [KL78] bound γ n eπ for n n 0 and 1 n 1 n 1 i=t 1 i = n 2 (t 1)(t 2) 2(n 1) and q n 1 2 = λ 2 1 /( b 2 γ n rd(l) 2 ) show M t m(q, c) ( (2+ e) 2eπ λ n t+1 1 n t+1 ( rd(l) b1 ) n rd(l) b 1 ) (t 1)(t 2) n n 1. n eπ λ1
19 IV: End of Proof of Theorem 1 19 The difference of the exponents de(t) = n (t 1)(t 2) n 1 n + t 1 = (t 1)(1 t 2 n 1. Hence for for t n and de( n c) = n2 /4 c 2 n 1 b 1 eπ n b λ 1 and all t n : ) is positive M t m(q, c) ( ( 8 + 2e) n n t+1 )n t+1 ( n 1 2 +b rd(l) ) n For c > 0, t n 2 we have m(q, c) = q 1 c2 4 = ( b 1 γ n rd(l) thus : λ 1 ) c 2 1 n 1 M t (4 + 2 e) n t+1 ( n 1 2 +b rd(l) ) n 2 O(n)( n 1 2 +b rd(l) ) n+1 4, where n2 /4 1 For c 0, t > n 2 we have M t ( ( 8 + 2e) n n t+1 n 1 n /4 c 2 n 1 (n 1 2 +b rd(l)) c2 1 n 1, and 2 /4 1 n 1 = ) n t+1 ( 1 n 2 +b rd(l) ) n 2 /4 n 1 = 2 O(n)( n 1 2 +b rd(l) ) n+2 4 where n2 /4 n 1 n+2 4.
20 V: Failings of the volume heuristics 20 MAZO, ODLYZKO [MO90] show for the lattice L = Z n : #{x Z n x 2 an} = 2 Θ(n) for a 0 a 1 2eπ and any a 0 > 0, whereas the volume heur. estimates this cardinality to O(1). The center ζ = 0 of the sphere is bad for the vol. heuristics. It can nearly maximize B n (ζ, ρ) L. NEW ENUM for SVP keeps the center ζ t = b π t (b) close to 0. The analysis of NEW ENUM for CVP uses for center the vector b t π t (b t). For random π t (t) this may better justify the volume heuristics in the analysis of NEW ENUM for CVP than for SVP.
21 V: Ajtai s worst case / average case equivalence 21 n c -unique-svp lattices: every lattice vector that is linearly independent of a shortest nonzero lattice vector has at least length λ 1 n c for some c > 1, i.e., λ 2 λ 1 n c. Proposition 1 shows that all n c -unique-svp s can be solved under GSA and the volume heuristics in polynomial time given a very short lattice vector. Ajtai s worst case / average case equivalence. AJTAI [Aj96, Thm 1] solves every n c -unique-svp using an oracle that solves SVP for a particular random lattice. However, all n c -unique-svp s are somewhat easy. This makes the worst case / average case equivalence suspicious. [MR07] reduces n c in Ajtai s reduction to n ln O(1) n.
22 Refences 22 Ad95 L.A. Adleman, Factoring and lattice reduction. Manuscript, AEVZ02 E. Agrell, T. Eriksson, A. Vardy and K. Zeger, Closest point search in lattices. IEEE Trans. on Inform. Theory, 48 (8), pp , Aj96 M. Ajtai, Generating hard instances of lattice problems. In Proc. 28th Annual ACM Symposium on Theory of Computing, pp , AD97 M. Ajtai and C. Dwork, A public-key cryptosystem with worst-case / average-case equivalence. In Proc 29-th STOC, ACM, pp , AKS01 M. Ajtai, R. Kumar and D. Sivakumar, A sieve algorithm for the shortest lattice vector problem. In Proc. 33th STOC, ACM, pp , Ba86 L. Babai, On Lovasz lattice reduction and the nearest lattice point problem. Combinatorica 6 (1), pp.1 13, 1986.
23 References 23 BL05 J. Buchmann and C. Ludwig, Practical lattice basis sampling reduction. eprint.iacr.org, TR 072, Ca98 Y.Cai, A new transference theorem and applications to Ajtai s connection factor. ECCC, Report No. 5, CEP83 E.R. Canfield, P. Erdös and C. Pomerance, On a problem of Oppenheim concerning "Factorisatio Numerorum". J. of Number Theory, 17, pp. 1 28, CS93 J.H. Conway and N.J.A. Sloane, Sphere Packings, Lattices and Groups. third edition, Springer-Verlag1998. FP85 U. Fincke and M. Pohst, Improved methods for calculating vectors of short length in a lattice, including a complexity analysis. Math. of Comput., 44, pp , 1985.
24 Refences 24 GN08 N. Gama and P.Q. Nguyen, Predicting lattice reduction, in Proc. EUROCRYPT 2008, LNCS 4965, Springer-Verlag, pp , HHHW09 P.Hirschhorn, J. Hoffstein, N. Howgrave-Graham, W. Whyte, Choosing NTRUEncrypt parameters in light of combined lattice reduction and MITM approaches. In Proc. ACNS 2009, LNCS 5536, Springer-Verlag,pp , HPS98 J. Hoffstein, J. Pipher and J. Silverman, NTRU: A ring-based public key cryptosystem. In Proc. ANTS III, LNCS 1423, Springer-Verlag, pp , H07 N. Howgrave-Graham, A hybrid lattice reduction and meet-in-the-middle attiack against NTRU. In Proc, CRYPTO 2007, LNCS 4622, Springer-Verlag, pp , 2007.
25 Refences 25 HS07 G. Hanrot and D. Stehlé, Improved analysis of Kannan s shortest lattice vector algorithm. In Proc. CRYPTO 2007, LNCS 4622, Springer-Verlag,pp , HS08 G. Hanrot and D. Stehlé, Worst-case Hermite-Korkine-Zolotarev reduced lattice bases. CoRR, abs/ , Ka87 R. Kannan, Minkowski s convex body theorem and integer programming. Math. Oper. Res., 12, pp , KL78 G.A.Kabatiansky and V.I. Levenshtein, Bounds for packing on a sphere and in space. Problems of Information Transmission, 14, pp. 1 17, LLL82 H. W. Lenstra Jr.,, A. K. Lenstra, and L. Lovász, Factoring polynomials with rational coefficients, Mathematische Annalen 261, pp , 1982.
26 Refences 26 L86 L. Lovász, An Algorithmic Theory of Numbers, Graphs and Convexity, SIAM, LM09 V. Lubashevsky and D. Micciancio, On bounded distance decoding, unique shortest vectors and the minimum distance problem. In Proc. CRYPTO 2009, LNCS 5677, Springer-Verlag, pp , MO90 J. Mazo and A. Odlydzko, Lattice points in high-dimensional spheres. Monatsh. Math. 110, pp , MG02 D. Micciancio and S. Goldwasser, Complexity of Lattice Problems: A Cryptographic Perspective. Kluwer Academic Publishers, Boston, London, MR07 D. Micciancio and O. Regev, Worst-case to average-case reduction based on gaussian measures. SIAM J. on Computing, 37(1), 2007.
27 Refences 27 NS06 P.Q. Nguyen and D. Stehlé, LLL on the average. In Proc. of ANTS-VII, LNCS 4076, Springer-Verlag, N10 P.Q. Nguyen, Hermite s Constant and Lattice Algorithms. in The LLL Algorithm, Eds. P.Q. Nguyen, B. Vallée, Springer-Verlag, Jan S87 C.P. Schnorr, A hierarchy of polynomial time lattice basis reduction algorithms. Theoret. Comput. Sci., 53, pp , S93 C.P.Schnorr, Factoring integers and computing discrete logarithms via Diophantine approximation. In Advances in Computational Complexity, AMS, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 13, pp , Preliminary version Proc. EUROCRYPT 91, LNCS 547, Springer-Verlag, pp , //
28 Refences 28 SE94 C.P. Schnorr and M. Euchner, Lattce basis reduction: Improved practical algorithms and solving subset sum problems. Mathematical Programming 66, pp , S03 C.P. Schnorr, Lattice reduction by sampling and birthday methods. Proc. STACS 2003: 20th Annual Symposium on Theoretical Aspects of Computer Science, LNCS 2007, Springer-Verlag, pp , S06 C.P. Schnorr, Fast LLL-type lattice reduction. Information and Computation, 204, pp. 1 25, S07 C.P. Schnorr, Progress on LLL and lattice reduction, Proc. LLL+25, Caen, France, 2007, Final version in: The LLL Algorithm, Survey and Applications, Eds. P.Q.Nguyen and B. Vallée, Springer 2010.
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Primality - Factorization
Primality - Factorization Christophe Ritzenthaler November 9, 2009 1 Prime and factorization Definition 1.1. An integer p > 1 is called a prime number (nombre premier) if it has only 1 and p as divisors.
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
Cryptosystem. Diploma Thesis. Mol Petros. July 17, 2006. Supervisor: Stathis Zachos
s and s and Diploma Thesis Department of Electrical and Computer Engineering, National Technical University of Athens July 17, 2006 Supervisor: Stathis Zachos ol Petros (Department of Electrical and Computer
Factoring N = p r q for Large r
Factoring N = p r q for Large r Dan Boneh 1,GlennDurfee 1, and Nick Howgrave-Graham 2 1 Computer Science Department, Stanford University, Stanford, CA 94305-9045 {dabo,gdurf}@cs.stanford.edu 2 Mathematical
Arithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28
Arithmetic algorithms for cryptology 5 October 2015, Paris Sieves Razvan Barbulescu CNRS and IMJ-PRG R. Barbulescu Sieves 0 / 28 Starting point Notations q prime g a generator of (F q ) X a (secret) integer
Integer Factorization using the Quadratic Sieve
Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 [email protected] March 16, 2011 Abstract We give
Generalized compact knapsacks, cyclic lattices, and efficient one-way functions
Generalized compact knapsacks, cyclic lattices, and efficient one-way functions Daniele Micciancio University of California, San Diego 9500 Gilman Drive La Jolla, CA 92093-0404, USA [email protected]
The van Hoeij Algorithm for Factoring Polynomials
The van Hoeij Algorithm for Factoring Polynomials Jürgen Klüners Abstract In this survey we report about a new algorithm for factoring polynomials due to Mark van Hoeij. The main idea is that the combinatorial
IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction
IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL R. DRNOVŠEK, T. KOŠIR Dedicated to Prof. Heydar Radjavi on the occasion of his seventieth birthday. Abstract. Let S be an irreducible
A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers
A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers Johannes Blömer, Alexander May Faculty of Computer Science, Electrical Engineering and Mathematics University of Paderborn
Factoring & Primality
Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount
Factoring Algorithms
Factoring Algorithms The p 1 Method and Quadratic Sieve November 17, 2008 () Factoring Algorithms November 17, 2008 1 / 12 Fermat s factoring method Fermat made the observation that if n has two factors
Integer factorization is in P
Integer factorization is in P Yuly Shipilevsky Toronto, Ontario, Canada E-mail address: [email protected] Abstract A polynomial-time algorithm for integer factorization, wherein integer factorization
How To Prove The Dirichlet Unit Theorem
Chapter 6 The Dirichlet Unit Theorem As usual, we will be working in the ring B of algebraic integers of a number field L. Two factorizations of an element of B are regarded as essentially the same if
On the representability of the bi-uniform matroid
On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 3, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large
Some applications of LLL
Some applications of LLL a. Factorization of polynomials As the title Factoring polynomials with rational coefficients of the original paper in which the LLL algorithm was first published (Mathematische
Post-Quantum Cryptography #4
Post-Quantum Cryptography #4 Prof. Claude Crépeau McGill University http://crypto.cs.mcgill.ca/~crepeau/waterloo 185 ( 186 Attack scenarios Ciphertext-only attack: This is the most basic type of attack
Improved Online/Offline Signature Schemes
Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion
FACTORING. n = 2 25 + 1. fall in the arithmetic sequence
FACTORING The claim that factorization is harder than primality testing (or primality certification) is not currently substantiated rigorously. As some sort of backward evidence that factoring is hard,
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Appears in Cryptography and Coding: 10th IMA International Conference, Lecture Notes in Computer Science 3796 (2005) 355 375. Springer-Verlag. Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
The Quadratic Sieve Factoring Algorithm
The Quadratic Sieve Factoring Algorithm Eric Landquist MATH 488: Cryptographic Algorithms December 14, 2001 1 Introduction Mathematicians have been attempting to find better and faster ways to factor composite
Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs
Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute
Primality Testing and Factorization Methods
Primality Testing and Factorization Methods Eli Howey May 27, 2014 Abstract Since the days of Euclid and Eratosthenes, mathematicians have taken a keen interest in finding the nontrivial factors of integers,
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited Jean-Sébastien Coron Gemplus Card International 34 rue Guynemer, 92447 Issy-les-Moulineaux, France [email protected]
I. Introduction. MPRI Cours 2-12-2. Lecture IV: Integer factorization. What is the factorization of a random number? II. Smoothness testing. F.
F. Morain École polytechnique MPRI cours 2-12-2 2013-2014 3/22 F. Morain École polytechnique MPRI cours 2-12-2 2013-2014 4/22 MPRI Cours 2-12-2 I. Introduction Input: an integer N; logox F. Morain logocnrs
Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem)
Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem) In order to understand the details of the Fingerprinting Theorem on fingerprints of different texts from Chapter 19 of the
Lattice Attacks in Cryptography: A Partial Overview
Lattice Attacks in Cryptography: A Partial Overview M. Jason Hinek School of Computer Science, University of Waterloo Waterloo, Ontario, N2L-3G1, Canada [email protected] October 22, 2004 Abstract
SECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and
Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study
The Mathematical Cryptography of the RSA Cryptosystem
The Mathematical Cryptography of the RSA Cryptosystem Abderrahmane Nitaj Laboratoire de Mathématiques Nicolas Oresme Université de Caen, France abderrahmanenitaj@unicaenfr http://wwwmathunicaenfr/~nitaj
Sphere Packings, Lattices, and Kissing Configurations in R n
Sphere Packings, Lattices, and Kissing Configurations in R n Stephanie Vance University of Washington April 9, 2009 Stephanie Vance (University of Washington)Sphere Packings, Lattices, and Kissing Configurations
Row Ideals and Fibers of Morphisms
Michigan Math. J. 57 (2008) Row Ideals and Fibers of Morphisms David Eisenbud & Bernd Ulrich Affectionately dedicated to Mel Hochster, who has been an inspiration to us for many years, on the occasion
Factoring Algorithms
Institutionen för Informationsteknologi Lunds Tekniska Högskola Department of Information Technology Lund University Cryptology - Project 1 Factoring Algorithms The purpose of this project is to understand
Lecture 13: Factoring Integers
CS 880: Quantum Information Processing 0/4/0 Lecture 3: Factoring Integers Instructor: Dieter van Melkebeek Scribe: Mark Wellons In this lecture, we review order finding and use this to develop a method
Two classes of ternary codes and their weight distributions
Two classes of ternary codes and their weight distributions Cunsheng Ding, Torleiv Kløve, and Francesco Sica Abstract In this paper we describe two classes of ternary codes, determine their minimum weight
Index Calculation Attacks on RSA Signature and Encryption
Index Calculation Attacks on RSA Signature and Encryption Jean-Sébastien Coron 1, Yvo Desmedt 2, David Naccache 1, Andrew Odlyzko 3, and Julien P. Stern 4 1 Gemplus Card International {jean-sebastien.coron,david.naccache}@gemplus.com
About the inverse football pool problem for 9 games 1
Seventh International Workshop on Optimal Codes and Related Topics September 6-1, 013, Albena, Bulgaria pp. 15-133 About the inverse football pool problem for 9 games 1 Emil Kolev Tsonka Baicheva Institute
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
Ideal Class Group and Units
Chapter 4 Ideal Class Group and Units We are now interested in understanding two aspects of ring of integers of number fields: how principal they are (that is, what is the proportion of principal ideals
Is n a Prime Number? Manindra Agrawal. March 27, 2006, Delft. IIT Kanpur
Is n a Prime Number? Manindra Agrawal IIT Kanpur March 27, 2006, Delft Manindra Agrawal (IIT Kanpur) Is n a Prime Number? March 27, 2006, Delft 1 / 47 Overview 1 The Problem 2 Two Simple, and Slow, Methods
2.1 Complexity Classes
15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look
On the number-theoretic functions ν(n) and Ω(n)
ACTA ARITHMETICA LXXVIII.1 (1996) On the number-theoretic functions ν(n) and Ω(n) by Jiahai Kan (Nanjing) 1. Introduction. Let d(n) denote the divisor function, ν(n) the number of distinct prime factors,
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
Completely Positive Cone and its Dual
On the Computational Complexity of Membership Problems for the Completely Positive Cone and its Dual Peter J.C. Dickinson Luuk Gijben July 3, 2012 Abstract Copositive programming has become a useful tool
Factorization Methods: Very Quick Overview
Factorization Methods: Very Quick Overview Yuval Filmus October 17, 2012 1 Introduction In this lecture we introduce modern factorization methods. We will assume several facts from analytic number theory.
The Ideal Class Group
Chapter 5 The Ideal Class Group We will use Minkowski theory, which belongs to the general area of geometry of numbers, to gain insight into the ideal class group of a number field. We have already mentioned
11 Ideals. 11.1 Revisiting Z
11 Ideals The presentation here is somewhat different than the text. In particular, the sections do not match up. We have seen issues with the failure of unique factorization already, e.g., Z[ 5] = O Q(
Competitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
z 0 and y even had the form
Gaussian Integers The concepts of divisibility, primality and factoring are actually more general than the discussion so far. For the moment, we have been working in the integers, which we denote by Z
FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY
FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY LINDSEY R. BOSKO I would like to acknowledge the assistance of Dr. Michael Singer. His guidance and feedback were instrumental in completing this
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
Modern Factoring Algorithms
Modern Factoring Algorithms Kostas Bimpikis and Ragesh Jaiswal University of California, San Diego... both Gauss and lesser mathematicians may be justified in rejoicing that there is one science [number
Lecture 13 - Basic Number Theory.
Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted
CONTRIBUTIONS TO ZERO SUM PROBLEMS
CONTRIBUTIONS TO ZERO SUM PROBLEMS S. D. ADHIKARI, Y. G. CHEN, J. B. FRIEDLANDER, S. V. KONYAGIN AND F. PAPPALARDI Abstract. A prototype of zero sum theorems, the well known theorem of Erdős, Ginzburg
(67902) Topics in Theory and Complexity Nov 2, 2006. Lecture 7
(67902) Topics in Theory and Complexity Nov 2, 2006 Lecturer: Irit Dinur Lecture 7 Scribe: Rani Lekach 1 Lecture overview This Lecture consists of two parts In the first part we will refresh the definition
Notes on Factoring. MA 206 Kurt Bryan
The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor
Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
MATH10040 Chapter 2: Prime and relatively prime numbers
MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive
1 Sets and Set Notation.
LINEAR ALGEBRA MATH 27.6 SPRING 23 (COHEN) LECTURE NOTES Sets and Set Notation. Definition (Naive Definition of a Set). A set is any collection of objects, called the elements of that set. We will most
Practical polynomial factoring in polynomial time
Practical polynomial factoring in polynomial time William Hart University of Warwick Mathematics Institute Coventry CV4 7AL, UK [email protected] Mark van Hoeij Florida State University Tallahassee,
How To Solve The Prime Factorization Of N With A Polynomials
THE MATHEMATICS OF PUBLIC KEY CRYPTOGRAPHY. IAN KIMING 1. Forbemærkning. Det kan forekomme idiotisk, at jeg som dansktalende og skrivende i et danskbaseret tidsskrift med en (formentlig) primært dansktalende
Notes from Week 1: Algorithms for sequential prediction
CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking
ON INDUCED SUBGRAPHS WITH ALL DEGREES ODD. 1. Introduction
ON INDUCED SUBGRAPHS WITH ALL DEGREES ODD A.D. SCOTT Abstract. Gallai proved that the vertex set of any graph can be partitioned into two sets, each inducing a subgraph with all degrees even. We prove
Weakly Secure Network Coding
Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this
Applied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
Smooth numbers and the quadratic sieve
Algorithmic Number Theory MSRI Publications Volume 44, 2008 Smooth numbers and the quadratic sieve CARL POMERANCE ABSTRACT. This article gives a gentle introduction to factoring large integers via the
Study of algorithms for factoring integers and computing discrete logarithms
Study of algorithms for factoring integers and computing discrete logarithms First Indo-French Workshop on Cryptography and Related Topics (IFW 2007) June 11 13, 2007 Paris, France Dr. Abhijit Das Department
2 Primality and Compositeness Tests
Int. J. Contemp. Math. Sciences, Vol. 3, 2008, no. 33, 1635-1642 On Factoring R. A. Mollin Department of Mathematics and Statistics University of Calgary, Calgary, Alberta, Canada, T2N 1N4 http://www.math.ucalgary.ca/
Runtime and Implementation of Factoring Algorithms: A Comparison
Runtime and Implementation of Factoring Algorithms: A Comparison Justin Moore CSC290 Cryptology December 20, 2003 Abstract Factoring composite numbers is not an easy task. It is classified as a hard algorithm,
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
Generalized Compact Knapsacks are Collision Resistant
Generalized Compact Knapsacks are Collision Resistant Vadim Lyubashevsky Daniele Micciancio University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093-0404, USA {vlyubash,daniele}@cs.ucsd.edu
Short Programs for functions on Curves
Short Programs for functions on Curves Victor S. Miller Exploratory Computer Science IBM, Thomas J. Watson Research Center Yorktown Heights, NY 10598 May 6, 1986 Abstract The problem of deducing a function
A Brief Introduction to Property Testing
A Brief Introduction to Property Testing Oded Goldreich Abstract. This short article provides a brief description of the main issues that underly the study of property testing. It is meant to serve as
COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS
COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS Alexander Burstein Department of Mathematics Howard University Washington, DC 259, USA [email protected] Sergey Kitaev Mathematics
On the largest prime factor of x 2 1
On the largest prime factor of x 2 1 Florian Luca and Filip Najman Abstract In this paper, we find all integers x such that x 2 1 has only prime factors smaller than 100. This gives some interesting numerical
The Online Set Cover Problem
The Online Set Cover Problem Noga Alon Baruch Awerbuch Yossi Azar Niv Buchbinder Joseph Seffi Naor ABSTRACT Let X = {, 2,..., n} be a ground set of n elements, and let S be a family of subsets of X, S
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!
Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,
Portable Bushy Processing Trees for Join Queries
Reihe Informatik 11 / 1996 Constructing Optimal Bushy Processing Trees for Join Queries is NP-hard Wolfgang Scheufele Guido Moerkotte 1 Constructing Optimal Bushy Processing Trees for Join Queries is NP-hard
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
On an anti-ramsey type result
On an anti-ramsey type result Noga Alon, Hanno Lefmann and Vojtĕch Rödl Abstract We consider anti-ramsey type results. For a given coloring of the k-element subsets of an n-element set X, where two k-element
ON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu
ON THE COMPLEXITY OF THE GAME OF SET KAMALIKA CHAUDHURI, BRIGHTEN GODFREY, DAVID RATAJCZAK, AND HOETECK WEE {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ABSTRACT. Set R is a card game played with a
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
Number Theory Hungarian Style. Cameron Byerley s interpretation of Csaba Szabó s lectures
Number Theory Hungarian Style Cameron Byerley s interpretation of Csaba Szabó s lectures August 20, 2005 2 0.1 introduction Number theory is a beautiful subject and even cooler when you learn about it
Lecture Notes on Polynomials
Lecture Notes on Polynomials Arne Jensen Department of Mathematical Sciences Aalborg University c 008 Introduction These lecture notes give a very short introduction to polynomials with real and complex
