Average Time Fast SVP and CVP Algorithms for Low Density Lattices and the Factorization of Integers. Claus P. SCHNORR

Size: px
Start display at page:

Download "Average Time Fast SVP and CVP Algorithms for Low Density Lattices and the Factorization of Integers. Claus P. SCHNORR"

Transcription

1 Average Time Fast SVP and CVP Algorithms for Low Density Lattices and the Factorization of Integers Claus P. SCHNORR Fachbereich Informatik und Mathematik Goethe-Universität Frankfurt am Main Numbers, Sequences, Lattices: Dynamical Analysis of Algorithms. Birthday of Brigitte Vallée Caen, June 3-4, 2010

2 Road map 2 I Outline of the new SVP / CVP algorithm II III IV Time bound of SVP/CVP algorithm for low density lattices Factoring integers via "easy" CVP solutions Partial analysis of the new SVP / CVP algorithm References A technical report is available at We focus on novel proof elements that are not covered by published work and outline sensible heuristics towards polynomial time factoring of integers.

3 I: Lattices, QR-decomposition, LLL-bases 3 lattice basis B = [b 1,..., b n ] Z m n lattice L(B) = {Bx x Z n } norm x 2 = x, x = m i=1 x i 2 SV-length λ 1 (L) = min{ b b L\{0}} QR-decomposition B = QR R m n such that the GNF geom. normal form R = [r i,j ] R n n is uppertriangular, r i,j = 0 for j < i and r i,i > 0, ( r i,i = b i ) Q R m n isometric: Q t Q = I n. LLL-basis B = QR for δ ( 1 4, 1] (Lenstra, Lenstra, Lovasz 82): 1. r i,j 1 2 r i,i for all j > i (size-reduced) ( r i,j /r i,i = µ j,i ) 2. δ ri,i 2 ri,i r i+1,i+1 2 for i = 1,..., n 1 3. α i+1 b i 2 λ 2 i α n 1 for i = 1,..., n 4. b 1 2 α n 1 2 (det L) 2/n, where α = 1/(δ 1/4).

4 I: Recall ENUM 1994/95 4 Let L t = L(b 1,..., b t 1 ) and π t : span(l) span(l t ) for t = 1,..., n denote the orthogonal projection. Stage (u t,..., u n ) of ENUM. b := n i=t u ib i L and u t,..., u n Z are given. The stage searches exhaustively for all t 1 i=1 u ib i L such that n i=1 u ib i 2 A holds for some A λ 2 1. Obviously n i=1 u ib i 2 = ζ t + t 1 i=1 u ib i 2 + π t (b) 2, goal: A to be minimized spent where ζ t := b π t (b) span L t is the orthogonal projection of the given b = n i=t u ib i. Stage (u t,..., u n ) exhausts B t 1 (ζ t, ρ t ) L t where B t 1 (ζ t, ρ t ) span L t is the sphere of dimension t 1 with center ζ t and radius ρ t := (A π t (b) 2 ) 1/2.

5 I: The success rate β t of stages 5 The GAUSSIAN volume heuristics estimates B t 1 (ζ t, ρ t ) L t to β t = def vol B t 1 (ζ t, ρ t )/ det L t. Here vol B t 1 (ζ t, ρ t ) = ρ t 1 t 1 V t 1, V t = π t 2 /( t 2eπ 2 )! ( t ) t 2 / πt is the volume of the unit sphere of dimension t, det L t = t 1 i=1 r i,i, ρ 2 t := A π t ( n i=t u ib i ) 2. We call β t the success rate of stage (u t,..., u n ). If ζ t mod L t is uniformly distributed over the parallelepiped P t := { t 1 i=1 r ib i 0 r 1,..., r t 1 < 1} then E ζt [ B t 1 (ζ t, ρ t ) L t ] = β t for ζ t R P t, because 1/ det L t is the number of points per volume in L t. The center ζ t = b π t (b) span L t changes continuously. If ζ t mod L t P t distributes uniformly the estimate B t 1 (ζ t, ρ t ) L t vol B t 1 (ζ t, ρ t )/ det L t of the vol. heur. holds on the average.

6 I: Outline of New Enum for SVP 6 INPUT LLL-basis B = QR Z m n, R R n n, A := n 4 (det Bt B) 2/n, OUTPUT a sequence of b L(B) of decreasing length b 2 A terminating with b = λ s := 1, L :=, (we call s the level) 2. Perform algorithm ENUM [SE94] pruned to stages with β t n s : Upon entry of stage (u t,..., u n ) compute β t. If β t < n s delay this stage and store (β t, u t,..., u n ) in the list L of delayed stages. Otherwise perform stage (u t,..., u n ) on level s, and as soon as some b L of length 0 < b 2 A has been found give out b and set A := b 2 1. Recompute the stored β t 3. Perform the stages (u t,..., u n ) of L with β t n s 1 in increasing order of t and for fixed t in order of decreasing β t. Collect the appearing substages (u t,..., u t,..., u n ) with β t < n s 1 in L. IF L = THEN terminate by exhaustion. 4. s := s + 1, GO TO 3

7 II: Optimizing the implementation 7 We efficiently approximate β t using floating point arithmetic. The space reservations for the list L are quite expensive compared to the modest arithmetic costs per stage. The condition β t < n s has been tested in practice. It replaces the original condition β t < 2 s. This reduces list L and the number of the list operations. Saving space is a main problem. For the final exhaustive search that proves b = λ 1 the success rate and the list operations can be suppressed, they merely slow down the computation. The start of the final exhaustion can be guessed. If no shorter vector comes up for an extended period then most likely the last output b has length λ 1.

8 II: Time Bound for the SVP algorithm 8 Def. The relative density of L: rd(l) := λ 1 γ 1/2 n (det L) 1/n rd(l) = λ 1 (L)/ max λ 1 (L ) holds for the maximum of λ 1 (L ) over all lattices L of dim L = n and det L = det L. The HERMITE constant γ n = max{λ 2 1 / det(l)2/n dim L = n}. We always have λ 2 1 = rd(l)2 γ n (det L) 2/n. Theorem 1 Given a lattice basis satisfying GSA and b 1 eπ n b λ 1, b 0, NEW ENUM solves SVP in time 2 O(n) (n 1/2+b rd(l)) n/4, i.e. in time 2 O(n) ( n/rd(l)) n/4 for b = 0. The 2 O(n) factor disappears under the volume heuristics. GSA : Let B = QR = Q[r i,j ] satisfy: (for r i,i = b i ) ri,i 2 /r i 1,i 1 2 = q for i = 2,..., n and some q > 0. W.l.o.g. let q < 1, otherwise b 1 = λ 1. The condition b 1 eπ n b λ 1 can" easily" be met for CVP.

9 II: Polynomial Time bound under the vol. heuristics 9 Finding an unproved shortest vector b is easier than proving b = λ 1. We study the time to find an SVP-solution b without proving λ 1 = b under the assumption: SA π t (b ) 2 n t+1 n λ 2 1 holds for all t and NEW ENUM s SVP-solution b, where π t (b ) span(b 1,..., b t 1 ). Proposition 1. Let a lattice basis be given that satisfies GSA, b 1 eπ/2 n b λ 1 and rd(l) n 1+2b 4. If NEW ENUM finds a shortest lattice vector b satisfying SA it finds b, without proving b = λ 1, under the volume heur. in polynomial time. Polynomial time holds for b = 0, rd(l) n 1/4. But the time to prove b = λ 1 is under the volume heur. Θ(n 1/2 rd(l)) n/4.

10 II: Polynomial CVP time under the volume heur. 10 Corollary 1. Given t R n and B for L(B) satisfying GSA, b 1 = λ 1 and rd(l) n 1/2 then NEW ENUM solves the CVP t b = t L under the volume heuristics in poly-time. We adjust the assumption SA from SVP to CVP: CA Let π t (t b) 2 n t+1 n t L 2 hold for all t and NEW ENUM s CVP-solution b. Corollary 2. Let B = [b 1,..., b n ] in Z m n satisfy GSA, b 1 = O(λ 1 ) and let b satisfy CA for B, t. If rd(l) = o(n 1/4 ) and t L = O(λ 1 ) then NEW ENUM finds the CVP- solution b L under the volume heuristics in polynomial time, but without proving t b = t L. All requirements of Cor. 2 can easily be satisfied for the CVP s of the prime number lattice for factoring integers.

11 III: Factoring integers via CVP solutions 11 Let N be a positive integer that is not a prime power. Let p 1 < < p n enumerate all primes less than (ln N) α. Then n = (ln N) α /(α ln ln N + O(1)). Let the prime factors p of N satisfy p > p n. We show how to factor N by solving "easy" CVP s for the prime number lattice L(B), basis matrix B = [b 1,..., b n ] R (n+1) n : ln p B = ln pn, N =. 0, N c ln p 1 N c ln p n N c ln N and the target vector N R n+1, where either N = N or N = Np n+j for one of the next n primes p n+j > p n, j n. Lemma 5.3 [MG02] λ 2 1 2c ln N. rd(l) = o(n 1/4 ) for c = (ln N) β, suitable α > 2β + 2 > 2.

12 III: Outline of the factoring method 12 We identify the vector b = n i=1 e ib i L(B) with the pair (u, v) of integers u = e j >0 pe j j, v = e j <0 p e j j N. Then u, v are free of primes larger than p n and gcd(u, v) = 1. We compute vectors b = n i=1 e ib i L(B) close to N such that u vn < p n. The prime factorizations u vn = n i=1 pe i i and u = e j >0 pe j j yield a non-trivial relation e i >0 pe i i = ± n i=1 pe i i mod N. (7.1) Given n + 1 independent relations (7.1) we write these relations n i=0 pe i,j e i,j with p 0 = 1 and e i,j, e i,j N as i = 1 mod N for j = 1,..., n + 1. Any non-trivial solution z 1,..., z n+1 Z of n+1 j=1 z j(e i,j e i,j ) = 0 mod 2, i = 0,..., n solves X 2 = 1 mod N by X = n 2 i mod N. Hence gcd(x ± 1, N) factors N if X ±1 mod N. i=0 p 1 P n+1 j=1 z j (e i,j e i,j )

13 III: Vectors b L closest to N yield relations (7.1) 13 An integer z is called y-smooth, if all prime factors p of z satisfy p y. Let N be either N or Np n+j for one of the next n primes p n+j > p n. We denote M α,c,n = {(u, v) N 2 u N c, u vn = 1, N c 1 /2 < v < N c 1 u, v are squarefree and (ln N) α smooth Theorem 4 [S93/91] If the equation u u/n N = 1 is for random u of order N c nearly statistically independent of the event that u, u/n are squarefree and (ln N) α -smooth then α M α,c,n holds if α 2β 2 < c (ln N)β and α > 2β + 2. Theorem 4 extends the result of [S93/91] from a constant c > 0 to c = (ln N) β, required for rd(l)) = o(n 1/4 ). Theorem 5 The vector b = n i=1 e ib i L(B) closest to N provides a non-trivial relation (7.1) provided that M α,c,n. }.

14 III: Vectors b L closest to N yield relations (7.1) 14 Theorem 6 If b 1 = O(λ 1 ) and M α,c,n for c = (ln N) β, α > 2β + 2 we can minimize L(B) N in polynomial time under GSA, CA and the volume heuristics. It follows from M α,c,n for N {N, Np n+j } that L N 2 (2c 1) ln N + 1 = (2c 1 + o(1)) ln N. Lemma 5.3 of [MG02] proves that λ 2 1 2c ln N Θ(1) [ λ 2 1 = 2c ln N + O(1) holds if 0 < α α 2β 2 < c (ln N)β. ] rd(l) = λ 1 /( γ n (det L) 1 n ) ( ) 1 2eπ 2c ln N (ln N) α 2 = O(c ln N) (1 α)/2 = O((ln N) 1 α ). We have for c = (ln N) β 2c ln N, α > 2β + 2 that (ln N) = o(n 1/2 ) α Hence rd(l) = o(n 1/4 ).

15 III: Providing a nearly shortest vector for L(B) 15 For solving t b = t L heuristically in polynomial time we need that b 1 = O(λ 1 ) holds for the prime number lattice. We extend the prime number basis B and L(B) by a nearly shortest lattice vector for the extended lattice, preserving rd(l), det(l) and the structure of the lattice. We extend the prime base by a prime p n+1 of order Θ(N c ) such that u p n+1 = O(1) holds for a squarefree (ln N) α -smooth u. Then i e ib i b n+1 2 = 2c ln N + O(1) holds for u = i pe i i and the additional basis vector b n+1 corresponding to p n+1. i e ib i b n+1 is a nearly shortest vector of L(b 1,..., b n+1 ). Efficient construction of p n+1. Generate random u = i p i and test the nearby p for primality. p n+1 and b n+1 can be found in probabilistic polynomial time if the density of primes near the u is not exceptionally small. A single p n+1 can be used to solve all CVP s for the factorization of all integers of order Θ(N).

16 IV: Proof of Theorem 1 16 Theorem 1 Given a lattice basis satisfying GSA and b 1 eπ n b λ 1, b 0, NEW ENUM solves SVP in time 2 O(n) (n 1/2+b rd(l)) n/4. NEW ENUM essentially performs stages in decreasing order of the success rate β t. Let b = n i=1 u i b i L denote the unique vector of length λ 1 that is found by NEW ENUM. Let β t be the success rate of stage (u t,..., u n). NEW ENUM performs stage (u t,..., u n) prior to all stages (u t,..., u n ) of success rate β t 1 4 β t Simplifying assumption. We assume that NEW ENUM performs stage (u t,..., u n) prior to all stages of success rate β t < β t, ( i.e., ρ t < ρ t ). By definition ρ 2 t = A π t (b) 2 and ρ t 2 = A π t (b ) 2. Without using the simplifying assumption, the proven time bound of Theorem 4.1 increases at most by the factor n.

17 IV: A proven version of the volume heuristics 17 Consider the number M t of stages (u t,..., u n ) with π t ( n i=t u ib i ) λ 1 : M t := # ( B n t+1 (0, λ 1 ) π t (L) ). Modulo the heuristic simplifications M t covers the stages that precede (u t,..., u n) and those that finally prove b = λ 1. Lemma 1 M t e n t+1 2 n i=t (1 + n t+1 8π λ1 ri,i ). The proof uses the method of Lemma 1 of MAZO, ODLYZKO [MO90] and follows the adjusted proof of inequality (2) in section 4.1 of HANROT, STEHLÉ [HS07]. For details see the TR Now ri,i 2 = b 1 2 q i 1, λ 2 1 /(γ n rd(l) 2 ) = (det L) 2 n = b 1 2 q n 1 2 hold by GSA and thus γ n n 2 eπ directly imply for i = t,..., n n t + 1 ri,i 2eπ rd(l) 1 λ 1 q (2i n 1)/4. By Lemma 1 M t n e π rd(l) 1 λ 1 q (2i n 1)/4 + 8eπ λ n t+1 1 i=t ri,i (4.0)

18 IV: Proof of Theorem 1 continued 18 For the remainder of the proof let t := n c and m(q, c) := [if c > 0 then q 1 c2 4 else 1]. Then M t m(q, c) ( (2+ e) 2eπ λ 1 n t+1 rd(l) ) n t+1/ det πt (L), (4.1) where m(q, c) = q 1 c2 4 = q 1 4 P c i=0 (2i 1) covers in (4.0) the factors q 2i n 1 4 > 1 for t < i < n We see from (4.1) and det π t (L) = b 1 n t+1 q P n i=t M t m(q, c) ( (2+ e) 2eπ n t+1 λ 1 b 1 rd(l) (n+o(n)) 2eπ i 1 2 that ) n t+1/q P n 1 i=t 1 i/2 (4.2) The [KL78] bound γ n eπ for n n 0 and 1 n 1 n 1 i=t 1 i = n 2 (t 1)(t 2) 2(n 1) and q n 1 2 = λ 2 1 /( b 2 γ n rd(l) 2 ) show M t m(q, c) ( (2+ e) 2eπ λ n t+1 1 n t+1 ( rd(l) b1 ) n rd(l) b 1 ) (t 1)(t 2) n n 1. n eπ λ1

19 IV: End of Proof of Theorem 1 19 The difference of the exponents de(t) = n (t 1)(t 2) n 1 n + t 1 = (t 1)(1 t 2 n 1. Hence for for t n and de( n c) = n2 /4 c 2 n 1 b 1 eπ n b λ 1 and all t n : ) is positive M t m(q, c) ( ( 8 + 2e) n n t+1 )n t+1 ( n 1 2 +b rd(l) ) n For c > 0, t n 2 we have m(q, c) = q 1 c2 4 = ( b 1 γ n rd(l) thus : λ 1 ) c 2 1 n 1 M t (4 + 2 e) n t+1 ( n 1 2 +b rd(l) ) n 2 O(n)( n 1 2 +b rd(l) ) n+1 4, where n2 /4 1 For c 0, t > n 2 we have M t ( ( 8 + 2e) n n t+1 n 1 n /4 c 2 n 1 (n 1 2 +b rd(l)) c2 1 n 1, and 2 /4 1 n 1 = ) n t+1 ( 1 n 2 +b rd(l) ) n 2 /4 n 1 = 2 O(n)( n 1 2 +b rd(l) ) n+2 4 where n2 /4 n 1 n+2 4.

20 V: Failings of the volume heuristics 20 MAZO, ODLYZKO [MO90] show for the lattice L = Z n : #{x Z n x 2 an} = 2 Θ(n) for a 0 a 1 2eπ and any a 0 > 0, whereas the volume heur. estimates this cardinality to O(1). The center ζ = 0 of the sphere is bad for the vol. heuristics. It can nearly maximize B n (ζ, ρ) L. NEW ENUM for SVP keeps the center ζ t = b π t (b) close to 0. The analysis of NEW ENUM for CVP uses for center the vector b t π t (b t). For random π t (t) this may better justify the volume heuristics in the analysis of NEW ENUM for CVP than for SVP.

21 V: Ajtai s worst case / average case equivalence 21 n c -unique-svp lattices: every lattice vector that is linearly independent of a shortest nonzero lattice vector has at least length λ 1 n c for some c > 1, i.e., λ 2 λ 1 n c. Proposition 1 shows that all n c -unique-svp s can be solved under GSA and the volume heuristics in polynomial time given a very short lattice vector. Ajtai s worst case / average case equivalence. AJTAI [Aj96, Thm 1] solves every n c -unique-svp using an oracle that solves SVP for a particular random lattice. However, all n c -unique-svp s are somewhat easy. This makes the worst case / average case equivalence suspicious. [MR07] reduces n c in Ajtai s reduction to n ln O(1) n.

22 Refences 22 Ad95 L.A. Adleman, Factoring and lattice reduction. Manuscript, AEVZ02 E. Agrell, T. Eriksson, A. Vardy and K. Zeger, Closest point search in lattices. IEEE Trans. on Inform. Theory, 48 (8), pp , Aj96 M. Ajtai, Generating hard instances of lattice problems. In Proc. 28th Annual ACM Symposium on Theory of Computing, pp , AD97 M. Ajtai and C. Dwork, A public-key cryptosystem with worst-case / average-case equivalence. In Proc 29-th STOC, ACM, pp , AKS01 M. Ajtai, R. Kumar and D. Sivakumar, A sieve algorithm for the shortest lattice vector problem. In Proc. 33th STOC, ACM, pp , Ba86 L. Babai, On Lovasz lattice reduction and the nearest lattice point problem. Combinatorica 6 (1), pp.1 13, 1986.

23 References 23 BL05 J. Buchmann and C. Ludwig, Practical lattice basis sampling reduction. eprint.iacr.org, TR 072, Ca98 Y.Cai, A new transference theorem and applications to Ajtai s connection factor. ECCC, Report No. 5, CEP83 E.R. Canfield, P. Erdös and C. Pomerance, On a problem of Oppenheim concerning "Factorisatio Numerorum". J. of Number Theory, 17, pp. 1 28, CS93 J.H. Conway and N.J.A. Sloane, Sphere Packings, Lattices and Groups. third edition, Springer-Verlag1998. FP85 U. Fincke and M. Pohst, Improved methods for calculating vectors of short length in a lattice, including a complexity analysis. Math. of Comput., 44, pp , 1985.

24 Refences 24 GN08 N. Gama and P.Q. Nguyen, Predicting lattice reduction, in Proc. EUROCRYPT 2008, LNCS 4965, Springer-Verlag, pp , HHHW09 P.Hirschhorn, J. Hoffstein, N. Howgrave-Graham, W. Whyte, Choosing NTRUEncrypt parameters in light of combined lattice reduction and MITM approaches. In Proc. ACNS 2009, LNCS 5536, Springer-Verlag,pp , HPS98 J. Hoffstein, J. Pipher and J. Silverman, NTRU: A ring-based public key cryptosystem. In Proc. ANTS III, LNCS 1423, Springer-Verlag, pp , H07 N. Howgrave-Graham, A hybrid lattice reduction and meet-in-the-middle attiack against NTRU. In Proc, CRYPTO 2007, LNCS 4622, Springer-Verlag, pp , 2007.

25 Refences 25 HS07 G. Hanrot and D. Stehlé, Improved analysis of Kannan s shortest lattice vector algorithm. In Proc. CRYPTO 2007, LNCS 4622, Springer-Verlag,pp , HS08 G. Hanrot and D. Stehlé, Worst-case Hermite-Korkine-Zolotarev reduced lattice bases. CoRR, abs/ , Ka87 R. Kannan, Minkowski s convex body theorem and integer programming. Math. Oper. Res., 12, pp , KL78 G.A.Kabatiansky and V.I. Levenshtein, Bounds for packing on a sphere and in space. Problems of Information Transmission, 14, pp. 1 17, LLL82 H. W. Lenstra Jr.,, A. K. Lenstra, and L. Lovász, Factoring polynomials with rational coefficients, Mathematische Annalen 261, pp , 1982.

26 Refences 26 L86 L. Lovász, An Algorithmic Theory of Numbers, Graphs and Convexity, SIAM, LM09 V. Lubashevsky and D. Micciancio, On bounded distance decoding, unique shortest vectors and the minimum distance problem. In Proc. CRYPTO 2009, LNCS 5677, Springer-Verlag, pp , MO90 J. Mazo and A. Odlydzko, Lattice points in high-dimensional spheres. Monatsh. Math. 110, pp , MG02 D. Micciancio and S. Goldwasser, Complexity of Lattice Problems: A Cryptographic Perspective. Kluwer Academic Publishers, Boston, London, MR07 D. Micciancio and O. Regev, Worst-case to average-case reduction based on gaussian measures. SIAM J. on Computing, 37(1), 2007.

27 Refences 27 NS06 P.Q. Nguyen and D. Stehlé, LLL on the average. In Proc. of ANTS-VII, LNCS 4076, Springer-Verlag, N10 P.Q. Nguyen, Hermite s Constant and Lattice Algorithms. in The LLL Algorithm, Eds. P.Q. Nguyen, B. Vallée, Springer-Verlag, Jan S87 C.P. Schnorr, A hierarchy of polynomial time lattice basis reduction algorithms. Theoret. Comput. Sci., 53, pp , S93 C.P.Schnorr, Factoring integers and computing discrete logarithms via Diophantine approximation. In Advances in Computational Complexity, AMS, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 13, pp , Preliminary version Proc. EUROCRYPT 91, LNCS 547, Springer-Verlag, pp , //

28 Refences 28 SE94 C.P. Schnorr and M. Euchner, Lattce basis reduction: Improved practical algorithms and solving subset sum problems. Mathematical Programming 66, pp , S03 C.P. Schnorr, Lattice reduction by sampling and birthday methods. Proc. STACS 2003: 20th Annual Symposium on Theoretical Aspects of Computer Science, LNCS 2007, Springer-Verlag, pp , S06 C.P. Schnorr, Fast LLL-type lattice reduction. Information and Computation, 204, pp. 1 25, S07 C.P. Schnorr, Progress on LLL and lattice reduction, Proc. LLL+25, Caen, France, 2007, Final version in: The LLL Algorithm, Survey and Applications, Eds. P.Q.Nguyen and B. Vallée, Springer 2010.

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

Primality - Factorization

Primality - Factorization Primality - Factorization Christophe Ritzenthaler November 9, 2009 1 Prime and factorization Definition 1.1. An integer p > 1 is called a prime number (nombre premier) if it has only 1 and p as divisors.

More information

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2

More information

Cryptosystem. Diploma Thesis. Mol Petros. July 17, 2006. Supervisor: Stathis Zachos

Cryptosystem. Diploma Thesis. Mol Petros. July 17, 2006. Supervisor: Stathis Zachos s and s and Diploma Thesis Department of Electrical and Computer Engineering, National Technical University of Athens July 17, 2006 Supervisor: Stathis Zachos ol Petros (Department of Electrical and Computer

More information

Factoring N = p r q for Large r

Factoring N = p r q for Large r Factoring N = p r q for Large r Dan Boneh 1,GlennDurfee 1, and Nick Howgrave-Graham 2 1 Computer Science Department, Stanford University, Stanford, CA 94305-9045 {dabo,gdurf}@cs.stanford.edu 2 Mathematical

More information

Arithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28

Arithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28 Arithmetic algorithms for cryptology 5 October 2015, Paris Sieves Razvan Barbulescu CNRS and IMJ-PRG R. Barbulescu Sieves 0 / 28 Starting point Notations q prime g a generator of (F q ) X a (secret) integer

More information

Integer Factorization using the Quadratic Sieve

Integer Factorization using the Quadratic Sieve Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 [email protected] March 16, 2011 Abstract We give

More information

Generalized compact knapsacks, cyclic lattices, and efficient one-way functions

Generalized compact knapsacks, cyclic lattices, and efficient one-way functions Generalized compact knapsacks, cyclic lattices, and efficient one-way functions Daniele Micciancio University of California, San Diego 9500 Gilman Drive La Jolla, CA 92093-0404, USA [email protected]

More information

The van Hoeij Algorithm for Factoring Polynomials

The van Hoeij Algorithm for Factoring Polynomials The van Hoeij Algorithm for Factoring Polynomials Jürgen Klüners Abstract In this survey we report about a new algorithm for factoring polynomials due to Mark van Hoeij. The main idea is that the combinatorial

More information

IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction

IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL R. DRNOVŠEK, T. KOŠIR Dedicated to Prof. Heydar Radjavi on the occasion of his seventieth birthday. Abstract. Let S be an irreducible

More information

A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers

A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers Johannes Blömer, Alexander May Faculty of Computer Science, Electrical Engineering and Mathematics University of Paderborn

More information

Factoring & Primality

Factoring & Primality Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount

More information

Factoring Algorithms

Factoring Algorithms Factoring Algorithms The p 1 Method and Quadratic Sieve November 17, 2008 () Factoring Algorithms November 17, 2008 1 / 12 Fermat s factoring method Fermat made the observation that if n has two factors

More information

Integer factorization is in P

Integer factorization is in P Integer factorization is in P Yuly Shipilevsky Toronto, Ontario, Canada E-mail address: [email protected] Abstract A polynomial-time algorithm for integer factorization, wherein integer factorization

More information

How To Prove The Dirichlet Unit Theorem

How To Prove The Dirichlet Unit Theorem Chapter 6 The Dirichlet Unit Theorem As usual, we will be working in the ring B of algebraic integers of a number field L. Two factorizations of an element of B are regarded as essentially the same if

More information

On the representability of the bi-uniform matroid

On the representability of the bi-uniform matroid On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 3, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large

More information

Some applications of LLL

Some applications of LLL Some applications of LLL a. Factorization of polynomials As the title Factoring polynomials with rational coefficients of the original paper in which the LLL algorithm was first published (Mathematische

More information

Post-Quantum Cryptography #4

Post-Quantum Cryptography #4 Post-Quantum Cryptography #4 Prof. Claude Crépeau McGill University http://crypto.cs.mcgill.ca/~crepeau/waterloo 185 ( 186 Attack scenarios Ciphertext-only attack: This is the most basic type of attack

More information

Improved Online/Offline Signature Schemes

Improved Online/Offline Signature Schemes Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion

More information

FACTORING. n = 2 25 + 1. fall in the arithmetic sequence

FACTORING. n = 2 25 + 1. fall in the arithmetic sequence FACTORING The claim that factorization is harder than primality testing (or primality certification) is not currently substantiated rigorously. As some sort of backward evidence that factoring is hard,

More information

Concrete Security of the Blum-Blum-Shub Pseudorandom Generator

Concrete Security of the Blum-Blum-Shub Pseudorandom Generator Appears in Cryptography and Coding: 10th IMA International Conference, Lecture Notes in Computer Science 3796 (2005) 355 375. Springer-Verlag. Concrete Security of the Blum-Blum-Shub Pseudorandom Generator

More information

The Quadratic Sieve Factoring Algorithm

The Quadratic Sieve Factoring Algorithm The Quadratic Sieve Factoring Algorithm Eric Landquist MATH 488: Cryptographic Algorithms December 14, 2001 1 Introduction Mathematicians have been attempting to find better and faster ways to factor composite

More information

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute

More information

Primality Testing and Factorization Methods

Primality Testing and Factorization Methods Primality Testing and Factorization Methods Eli Howey May 27, 2014 Abstract Since the days of Euclid and Eratosthenes, mathematicians have taken a keen interest in finding the nontrivial factors of integers,

More information

Finding Small Roots of Bivariate Integer Polynomial Equations Revisited

Finding Small Roots of Bivariate Integer Polynomial Equations Revisited Finding Small Roots of Bivariate Integer Polynomial Equations Revisited Jean-Sébastien Coron Gemplus Card International 34 rue Guynemer, 92447 Issy-les-Moulineaux, France [email protected]

More information

I. Introduction. MPRI Cours 2-12-2. Lecture IV: Integer factorization. What is the factorization of a random number? II. Smoothness testing. F.

I. Introduction. MPRI Cours 2-12-2. Lecture IV: Integer factorization. What is the factorization of a random number? II. Smoothness testing. F. F. Morain École polytechnique MPRI cours 2-12-2 2013-2014 3/22 F. Morain École polytechnique MPRI cours 2-12-2 2013-2014 4/22 MPRI Cours 2-12-2 I. Introduction Input: an integer N; logox F. Morain logocnrs

More information

Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem)

Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem) Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem) In order to understand the details of the Fingerprinting Theorem on fingerprints of different texts from Chapter 19 of the

More information

Lattice Attacks in Cryptography: A Partial Overview

Lattice Attacks in Cryptography: A Partial Overview Lattice Attacks in Cryptography: A Partial Overview M. Jason Hinek School of Computer Science, University of Waterloo Waterloo, Ontario, N2L-3G1, Canada [email protected] October 22, 2004 Abstract

More information

SECRET sharing schemes were introduced by Blakley [5]

SECRET sharing schemes were introduced by Blakley [5] 206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has

More information

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study

More information

The Mathematical Cryptography of the RSA Cryptosystem

The Mathematical Cryptography of the RSA Cryptosystem The Mathematical Cryptography of the RSA Cryptosystem Abderrahmane Nitaj Laboratoire de Mathématiques Nicolas Oresme Université de Caen, France abderrahmanenitaj@unicaenfr http://wwwmathunicaenfr/~nitaj

More information

Sphere Packings, Lattices, and Kissing Configurations in R n

Sphere Packings, Lattices, and Kissing Configurations in R n Sphere Packings, Lattices, and Kissing Configurations in R n Stephanie Vance University of Washington April 9, 2009 Stephanie Vance (University of Washington)Sphere Packings, Lattices, and Kissing Configurations

More information

Row Ideals and Fibers of Morphisms

Row Ideals and Fibers of Morphisms Michigan Math. J. 57 (2008) Row Ideals and Fibers of Morphisms David Eisenbud & Bernd Ulrich Affectionately dedicated to Mel Hochster, who has been an inspiration to us for many years, on the occasion

More information

Factoring Algorithms

Factoring Algorithms Institutionen för Informationsteknologi Lunds Tekniska Högskola Department of Information Technology Lund University Cryptology - Project 1 Factoring Algorithms The purpose of this project is to understand

More information

Lecture 13: Factoring Integers

Lecture 13: Factoring Integers CS 880: Quantum Information Processing 0/4/0 Lecture 3: Factoring Integers Instructor: Dieter van Melkebeek Scribe: Mark Wellons In this lecture, we review order finding and use this to develop a method

More information

Two classes of ternary codes and their weight distributions

Two classes of ternary codes and their weight distributions Two classes of ternary codes and their weight distributions Cunsheng Ding, Torleiv Kløve, and Francesco Sica Abstract In this paper we describe two classes of ternary codes, determine their minimum weight

More information

Index Calculation Attacks on RSA Signature and Encryption

Index Calculation Attacks on RSA Signature and Encryption Index Calculation Attacks on RSA Signature and Encryption Jean-Sébastien Coron 1, Yvo Desmedt 2, David Naccache 1, Andrew Odlyzko 3, and Julien P. Stern 4 1 Gemplus Card International {jean-sebastien.coron,david.naccache}@gemplus.com

More information

About the inverse football pool problem for 9 games 1

About the inverse football pool problem for 9 games 1 Seventh International Workshop on Optimal Codes and Related Topics September 6-1, 013, Albena, Bulgaria pp. 15-133 About the inverse football pool problem for 9 games 1 Emil Kolev Tsonka Baicheva Institute

More information

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are

More information

Ideal Class Group and Units

Ideal Class Group and Units Chapter 4 Ideal Class Group and Units We are now interested in understanding two aspects of ring of integers of number fields: how principal they are (that is, what is the proportion of principal ideals

More information

Is n a Prime Number? Manindra Agrawal. March 27, 2006, Delft. IIT Kanpur

Is n a Prime Number? Manindra Agrawal. March 27, 2006, Delft. IIT Kanpur Is n a Prime Number? Manindra Agrawal IIT Kanpur March 27, 2006, Delft Manindra Agrawal (IIT Kanpur) Is n a Prime Number? March 27, 2006, Delft 1 / 47 Overview 1 The Problem 2 Two Simple, and Slow, Methods

More information

2.1 Complexity Classes

2.1 Complexity Classes 15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look

More information

On the number-theoretic functions ν(n) and Ω(n)

On the number-theoretic functions ν(n) and Ω(n) ACTA ARITHMETICA LXXVIII.1 (1996) On the number-theoretic functions ν(n) and Ω(n) by Jiahai Kan (Nanjing) 1. Introduction. Let d(n) denote the divisor function, ν(n) the number of distinct prime factors,

More information

A Factoring and Discrete Logarithm based Cryptosystem

A Factoring and Discrete Logarithm based Cryptosystem Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques

More information

Completely Positive Cone and its Dual

Completely Positive Cone and its Dual On the Computational Complexity of Membership Problems for the Completely Positive Cone and its Dual Peter J.C. Dickinson Luuk Gijben July 3, 2012 Abstract Copositive programming has become a useful tool

More information

Factorization Methods: Very Quick Overview

Factorization Methods: Very Quick Overview Factorization Methods: Very Quick Overview Yuval Filmus October 17, 2012 1 Introduction In this lecture we introduce modern factorization methods. We will assume several facts from analytic number theory.

More information

The Ideal Class Group

The Ideal Class Group Chapter 5 The Ideal Class Group We will use Minkowski theory, which belongs to the general area of geometry of numbers, to gain insight into the ideal class group of a number field. We have already mentioned

More information

11 Ideals. 11.1 Revisiting Z

11 Ideals. 11.1 Revisiting Z 11 Ideals The presentation here is somewhat different than the text. In particular, the sections do not match up. We have seen issues with the failure of unique factorization already, e.g., Z[ 5] = O Q(

More information

Competitive Analysis of On line Randomized Call Control in Cellular Networks

Competitive Analysis of On line Randomized Call Control in Cellular Networks Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising

More information

z 0 and y even had the form

z 0 and y even had the form Gaussian Integers The concepts of divisibility, primality and factoring are actually more general than the discussion so far. For the moment, we have been working in the integers, which we denote by Z

More information

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY LINDSEY R. BOSKO I would like to acknowledge the assistance of Dr. Michael Singer. His guidance and feedback were instrumental in completing this

More information

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory

More information

Modern Factoring Algorithms

Modern Factoring Algorithms Modern Factoring Algorithms Kostas Bimpikis and Ragesh Jaiswal University of California, San Diego... both Gauss and lesser mathematicians may be justified in rejoicing that there is one science [number

More information

Lecture 13 - Basic Number Theory.

Lecture 13 - Basic Number Theory. Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted

More information

CONTRIBUTIONS TO ZERO SUM PROBLEMS

CONTRIBUTIONS TO ZERO SUM PROBLEMS CONTRIBUTIONS TO ZERO SUM PROBLEMS S. D. ADHIKARI, Y. G. CHEN, J. B. FRIEDLANDER, S. V. KONYAGIN AND F. PAPPALARDI Abstract. A prototype of zero sum theorems, the well known theorem of Erdős, Ginzburg

More information

(67902) Topics in Theory and Complexity Nov 2, 2006. Lecture 7

(67902) Topics in Theory and Complexity Nov 2, 2006. Lecture 7 (67902) Topics in Theory and Complexity Nov 2, 2006 Lecturer: Irit Dinur Lecture 7 Scribe: Rani Lekach 1 Lecture overview This Lecture consists of two parts In the first part we will refresh the definition

More information

Notes on Factoring. MA 206 Kurt Bryan

Notes on Factoring. MA 206 Kurt Bryan The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

MATH10040 Chapter 2: Prime and relatively prime numbers

MATH10040 Chapter 2: Prime and relatively prime numbers MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive

More information

1 Sets and Set Notation.

1 Sets and Set Notation. LINEAR ALGEBRA MATH 27.6 SPRING 23 (COHEN) LECTURE NOTES Sets and Set Notation. Definition (Naive Definition of a Set). A set is any collection of objects, called the elements of that set. We will most

More information

Practical polynomial factoring in polynomial time

Practical polynomial factoring in polynomial time Practical polynomial factoring in polynomial time William Hart University of Warwick Mathematics Institute Coventry CV4 7AL, UK [email protected] Mark van Hoeij Florida State University Tallahassee,

More information

How To Solve The Prime Factorization Of N With A Polynomials

How To Solve The Prime Factorization Of N With A Polynomials THE MATHEMATICS OF PUBLIC KEY CRYPTOGRAPHY. IAN KIMING 1. Forbemærkning. Det kan forekomme idiotisk, at jeg som dansktalende og skrivende i et danskbaseret tidsskrift med en (formentlig) primært dansktalende

More information

Notes from Week 1: Algorithms for sequential prediction

Notes from Week 1: Algorithms for sequential prediction CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking

More information

ON INDUCED SUBGRAPHS WITH ALL DEGREES ODD. 1. Introduction

ON INDUCED SUBGRAPHS WITH ALL DEGREES ODD. 1. Introduction ON INDUCED SUBGRAPHS WITH ALL DEGREES ODD A.D. SCOTT Abstract. Gallai proved that the vertex set of any graph can be partitioned into two sets, each inducing a subgraph with all degrees even. We prove

More information

Weakly Secure Network Coding

Weakly Secure Network Coding Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Smooth numbers and the quadratic sieve

Smooth numbers and the quadratic sieve Algorithmic Number Theory MSRI Publications Volume 44, 2008 Smooth numbers and the quadratic sieve CARL POMERANCE ABSTRACT. This article gives a gentle introduction to factoring large integers via the

More information

Study of algorithms for factoring integers and computing discrete logarithms

Study of algorithms for factoring integers and computing discrete logarithms Study of algorithms for factoring integers and computing discrete logarithms First Indo-French Workshop on Cryptography and Related Topics (IFW 2007) June 11 13, 2007 Paris, France Dr. Abhijit Das Department

More information

2 Primality and Compositeness Tests

2 Primality and Compositeness Tests Int. J. Contemp. Math. Sciences, Vol. 3, 2008, no. 33, 1635-1642 On Factoring R. A. Mollin Department of Mathematics and Statistics University of Calgary, Calgary, Alberta, Canada, T2N 1N4 http://www.math.ucalgary.ca/

More information

Runtime and Implementation of Factoring Algorithms: A Comparison

Runtime and Implementation of Factoring Algorithms: A Comparison Runtime and Implementation of Factoring Algorithms: A Comparison Justin Moore CSC290 Cryptology December 20, 2003 Abstract Factoring composite numbers is not an easy task. It is classified as a hard algorithm,

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

Linear Codes. Chapter 3. 3.1 Basics

Linear Codes. Chapter 3. 3.1 Basics Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length

More information

Generalized Compact Knapsacks are Collision Resistant

Generalized Compact Knapsacks are Collision Resistant Generalized Compact Knapsacks are Collision Resistant Vadim Lyubashevsky Daniele Micciancio University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093-0404, USA {vlyubash,daniele}@cs.ucsd.edu

More information

Short Programs for functions on Curves

Short Programs for functions on Curves Short Programs for functions on Curves Victor S. Miller Exploratory Computer Science IBM, Thomas J. Watson Research Center Yorktown Heights, NY 10598 May 6, 1986 Abstract The problem of deducing a function

More information

A Brief Introduction to Property Testing

A Brief Introduction to Property Testing A Brief Introduction to Property Testing Oded Goldreich Abstract. This short article provides a brief description of the main issues that underly the study of property testing. It is meant to serve as

More information

COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS

COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS Alexander Burstein Department of Mathematics Howard University Washington, DC 259, USA [email protected] Sergey Kitaev Mathematics

More information

On the largest prime factor of x 2 1

On the largest prime factor of x 2 1 On the largest prime factor of x 2 1 Florian Luca and Filip Najman Abstract In this paper, we find all integers x such that x 2 1 has only prime factors smaller than 100. This gives some interesting numerical

More information

The Online Set Cover Problem

The Online Set Cover Problem The Online Set Cover Problem Noga Alon Baruch Awerbuch Yossi Azar Niv Buchbinder Joseph Seffi Naor ABSTRACT Let X = {, 2,..., n} be a ground set of n elements, and let S be a family of subsets of X, S

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)! Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following

More information

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

More information

Portable Bushy Processing Trees for Join Queries

Portable Bushy Processing Trees for Join Queries Reihe Informatik 11 / 1996 Constructing Optimal Bushy Processing Trees for Join Queries is NP-hard Wolfgang Scheufele Guido Moerkotte 1 Constructing Optimal Bushy Processing Trees for Join Queries is NP-hard

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

On an anti-ramsey type result

On an anti-ramsey type result On an anti-ramsey type result Noga Alon, Hanno Lefmann and Vojtĕch Rödl Abstract We consider anti-ramsey type results. For a given coloring of the k-element subsets of an n-element set X, where two k-element

More information

ON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu

ON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ON THE COMPLEXITY OF THE GAME OF SET KAMALIKA CHAUDHURI, BRIGHTEN GODFREY, DAVID RATAJCZAK, AND HOETECK WEE {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ABSTRACT. Set R is a card game played with a

More information

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem

More information

Number Theory Hungarian Style. Cameron Byerley s interpretation of Csaba Szabó s lectures

Number Theory Hungarian Style. Cameron Byerley s interpretation of Csaba Szabó s lectures Number Theory Hungarian Style Cameron Byerley s interpretation of Csaba Szabó s lectures August 20, 2005 2 0.1 introduction Number theory is a beautiful subject and even cooler when you learn about it

More information

Lecture Notes on Polynomials

Lecture Notes on Polynomials Lecture Notes on Polynomials Arne Jensen Department of Mathematical Sciences Aalborg University c 008 Introduction These lecture notes give a very short introduction to polynomials with real and complex

More information