Introduction. Asymmetric ciphers. Online Trusted Third Party (TTP) Online Trusted Third Party (TTP)

Size: px
Start display at page:

Download "Introduction. Asymmetric ciphers. Online Trusted Third Party (TTP) Online Trusted Third Party (TTP)"

Transcription

1 Intoduction Asymmetic ciphes Myto Aapinis School of Infomatics Univesity of Edinugh Januay 29, 2015 So fa: how two uses can potect data using a shaed secet key One shaed secet key pe pai of uses that want to communicate Ou goal now: how to estalish a shaed secet key to egin with? Tusted Thid Paty (TTP) Diffie-Hellman (DH) potocol RSA ElGamal (EG) 1 / 36 2 / 36 Online Tusted Thid Paty (TTP) Uses U 1, U 2, U 3,..., U n,... Each use U i has a shaed secet key K i with the TTP ex: using Paulson s vaiant of the Yahalom potocol Online Tusted Thid Paty (TTP) Uses U 1, U 2, U 3,..., U n,... Each use U i has a shaed secet key K i with the TTP ex: using Paulson s vaiant of the Yahalom potocol k AS k BS k AS, k BS k AS k BS k AS, k BS new N A A, N A 3 / 36 4 / 36

2 Online Tusted Thid Paty (TTP) Uses U 1, U 2, U 3,..., U n,... Each use U i has a shaed secet key K i with the TTP ex: using Paulson s vaiant of the Yahalom potocol Online Tusted Thid Paty (TTP) Uses U 1, U 2, U 3,..., U n,... Each use U i has a shaed secet key K i with the TTP ex: using Paulson s vaiant of the Yahalom potocol k AS k BS k AS, k BS k AS k BS k AS, k BS new N A A, N A new N A A, N A new N B new N B B, N B,{A, N A } k BS B, N B,{A, N A } k BS N B,{B, k AB, N A } k AS, {A,B, k AB, N B } k BS new k AB 5 / 36 6 / 36 Online Tusted Thid Paty (TTP) Uses U 1, U 2, U 3,..., U n,... Each use U i has a shaed secet key K i with the TTP ex: using Paulson s vaiant of the Yahalom potocol Pulic-key encyption in pictues k AS k BS k AS, k BS new N A A, N A new N B B, N B,{A, N A } k BS N B,{B, k AB, N A } k AS, {A,B, k AB, N B } k BS new k AB {A,B, k AB, N B } k BS, {NB} k AB Question: can we estalish a shaed secet key without a TTP? Answe: Yes! 7 / 36 8 / 36

3 Pulic-key encyption in pictues Pulic-key encyption in pictues Fom : I want to send you a secet Fom : I want to send you a secet 9 / 36 Pulic-key encyption in pictues 10 / 36 Pulic-key encyption in pictues Fom : I want to send you a secet Fom : I want to send you a secet 11 / / 36

4 Pulic-key encyption in pictues Fom : I want to send you a secet Pulic-key encyption key geneation algoithm: G : K K encyption algoithm E : K M C decyption algoithm D : K C M st. (sk, pk) G, and m M, D(sk, E(pk, m)) = m E D m c c m pk sk the decyption key sk is secet (only known to ). The encyption key pk is known to eveyone. And sk pk 13 / / 36 Pimes We need a it of nume theoy now Definition p N is a pime if its only divisos ae 1 and p Ex: 2, 3, 5, 7, 11, 13, 17, 19, 23, 29 Theoem Evey n N has a unique factoization as a poduct of pime numes (which ae called its factos) Ex: = / / 36

5 Relative pimes Z n Let n N. We define Z n = {0,... n-1} Definition a and in Z ae elative pimes if they have no common factos a Z, Z n, a (mod n) k N. a = + k n Definition The Eule function φ(n) is the nume of elements that ae elative pimes with n: φ(n) = {m gcd(m, n) = 1} Fo p pime: φ(p) = {1,..., p-1} Fo p and q pimes: φ(p q) = (p-1)(q-1) Modula invesion: the invese of x Z n is y Z n s.t. x y 1 (mod n). We denote x -1 the invese of x mod n Ex: 7-1 in Z 12 : in Z 12 : 4 has no invese in Z 12 Theoem a Z, Z n, a (mod n) k N. a = + k n Let n N. Let x Z n. x has a invese in Z n iff gcd(x, n) = 1 17 / / 36 (Z N ) Let n N. We define (Z n ) = {x Z n gcd(x, n) = 1} Ex: Z 12 = {1, 5, 7, 11} Theoem (Eule) n N, x (Z n ), x φ(n) 1 (mod n) Theoem (Eule) p pime, (Z p ) is a cyclic goup, i.e. g (Z p ), {g, g 2, g 3,..., g p 2 } = (Z p ) Intactale polems Factoing: input: n N output: p 1,..., p m pimes st. n = p 1 p m RSAP input: n st. n = p q with 2 p, q pimes e st. gcd(e, φ(n)) = 1 m e output: m Discete Log: input: pime p, geneato g of (Z p ), g x output: x DHP: input: pime p, geneato g of (Z p ), g a (mod p), g (mod p) output: g a (mod p) 19 / / 36

6 The Diffie-Hellman (DH) potocol We can now go ack and see how to estalish a key without a TTP Assumption: the DHP is had in (Z p ) Fix a vey lage pime p, and g {1,..., p-1} a 21 / / 36 The Diffie-Hellman (DH) potocol The Diffie-Hellman (DH) potocol Assumption: the DHP is had in (Z p ) Fix a vey lage pime p, and g {1,..., p-1} Assumption: the DHP is had in (Z p ) Fix a vey lage pime p, and g {1,..., p-1} a, g (mod p) a, g (mod p), g a (mod p) 23 / / 36

7 The Diffie-Hellman (DH) potocol Assumption: the DHP is had in (Z p ) Fix a vey lage pime p, and g {1,..., p-1} a, g (mod p) a A*acke, g a (mod p) k AB = (g ) a [mod p] = g a (mod p) k AB = (g a ) [mod p] = g a (mod p) 25 / / 36 a A*acke, g (mod p) a A*acke, g (mod p), g (mod p) 27 / / 36

8 a, g (mod p) A+acke, g (mod p) a, g (mod p) A*acke, g (mod p) æ, g a (mod p), g a (mod p), g (mod p) 29 / / 36 a, g (mod p), g a (mod p) A*acke, g (mod p), g (mod p) k AB = g (mod p) k B = (g ) = g k AB = g a (mod p) k A = (g ) = g 31 / 36 RSA tapdoo pemutation G RSA () = (pk, sk) whee pk = (N, e) and sk = (N, d) and N = p q with p, q andom pimes and e, d Z st. e d 1 (mod φ(n)) M = C = (Z N ) RSA(pk, x) = x e (mod N) whee pk = (N, e) RSA -1 (sk, x) = x d (mod N) whee sk = (N, d) Consistency: (pk, sk) = G RSA (), x, RSA -1 (sk, RSA(pk, x)) = x Poof: Let pk = (N, e) and sk = (N, d) RSA -1 (sk, RSA(pk, x)) = (x e ) d (mod N) = x e d (mod N) = x 1+kφ(N) (mod N) = x x kφ(n) (mod N) = x (x φ(n) ) k (mod N) Eule = x (mod N) 32 / 36

9 How NOT to use RSA ISO standad Goal: uild a CPA secue asymmetic ciphe using (G RSA, RSA, RSA -1 ) (G RSA, RSA, RSA -1 ) is called aw RSA. Do not use aw RSAdiectly as an asymmetic ciphe! RSA is deteministic not secue against chosen plaintext attacks (Details on the oad) Let (E s, D s ) e a symmetic encyption scheme ove (M, C, K) Let H : (Z N ) K Build (G RSA, E RSA, D RSA ) as follows G RSA () as descied aove E RSA (pk, m): pick andom x (Z N ) y RSA(pk, x)(= x e ) k H(x) ERSA (pk, m) = y E s (k, m) D RSA (pk, y c) = D s (H(RSA -1 (sk, y)), c) 33 / / 36 PKCS1 v2.0: RSA-OAEP Goal: uild a CPA secue asymmetic ciphe using (G RSA, RSA, RSA -1 ) ElGamal (EG) Fix pime p, and geneato g (Z p ) M = {0,..., p-1} and C = M M m and G EG () = (pk, sk) whee pk = g d (mod p) and sk = d and d {1,..., p-2} + H E EG (pk, x) = (g (mod p), m (g d ) (mod p)) whee pk = g d (mod p) and Z G + D EG (sk, x) = e -d c (mod p) whee x = (e, c) Consistency: (pk, sk) = G EG (), x, D EG (sk, E EG (pk, x)) = x Poof: Let pk = g d (mod p) and sk = d Plaintext to encypt with RSA {0,1} N-1 D EG (sk, E EG (pk, x)) = (g ) -d m (g d ) (mod p) = m (mod p) 35 / / 36

L29&30 - RSA Cryptography

L29&30 - RSA Cryptography L29&30 - RSA Cryptography CSci/Math 2112 20&22 July 2015 1 / 13 Notation We write a mod n for the integer b such that 0 b < n and a b (mod n). 2 / 13 Calculating Large Powers Modulo n Example 1 What is

More information

Data security (Cryptography) exercise book

Data security (Cryptography) exercise book University of Debrecen Faculty of Informatics Data security (Cryptography) exercise book 1 Contents 1 RSA 4 1.1 RSA in general.................................. 4 1.2 RSA background.................................

More information

GRADE 6 FLORIDA. Division WORKSHEETS

GRADE 6 FLORIDA. Division WORKSHEETS GRADE 6 FLORIDA Division WORKSHEETS Mental division stategies invese opeations As we know, multiplication and division ae invese opeations. 8 9 = 7 This means they do the evese of each othe: 7 9 = 8 We

More information

Introduction to Cryptography CS 355

Introduction to Cryptography CS 355 Introduction to Cryptography CS 355 Lecture 25 Mental Poker And Semantic Security CS 355 Fall 2005 / Lecture 25 1 Lecture Outline Review of number theory The Mental Poker Protocol Semantic security Semantic

More information

10! !. 3. Find the probability that a five-card poker hand (i.e. 5 cards out of a 52-card deck) will be:

10! !. 3. Find the probability that a five-card poker hand (i.e. 5 cards out of a 52-card deck) will be: MATH 0(001 Fall 2018 Homewok 2 Solutions Please infom you instucto if you find any eos in the solutions 1 Suppose that thee ae duck huntes, each with a pefect shot A flock of ducks fly ove, and each hunte

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 5: Cryptographic Algorithms Common Encryption Algorithms RSA

More information

Channel Modelling ETIM10. Fading Statistical description of the wireless channel

Channel Modelling ETIM10. Fading Statistical description of the wireless channel Channel Modelling ETIM10 Lectue no: 3 Fading Statistical desciption of the wieless channel Ghassan Dahman \ Fedik Tufvesson Depatment of Electical and Infomation Technology Lund Univesity, Sweden 013-01-8

More information

Chapter 4 Integers and Number Theory

Chapter 4 Integers and Number Theory Chapte 4 Answes 15 Chapte 4 Intees and Nume Theo Suestions: Althouh it is possile to daw pictues fo the models used in the followin activities, encouae students to use two diffeent coloed squaes to epesent

More information

Analysis of Occurrence of Digit 0 in Natural Numbers Less Than 10 n

Analysis of Occurrence of Digit 0 in Natural Numbers Less Than 10 n meican Intenational Jounal of Reseach in Fomal, pplied & Natual Sciences vailable online at http://www.iasi.net ISSN (Pint): 2328-3777, ISSN (Online): 2328-3785, ISSN (CD-ROM): 2328-3793 IJRFNS is a efeeed,

More information

IEEE Broadband Wireless Access Working Group < Modifications to the Feedback Methodologies in UL Sounding

IEEE Broadband Wireless Access Working Group <  Modifications to the Feedback Methodologies in UL Sounding Poject Title Date Submitted IEEE 802.16 Boadband Wieless Access Woking Goup Modifications to the Feedback Methodologies in UL Sounding 2008-01-14 Souce(s) Fed Vook, Jeff Zhuang,

More information

Parameterized Complexity of Connected Even/Odd Subgraph Problems

Parameterized Complexity of Connected Even/Odd Subgraph Problems Paameteized Complexity of Connected Even/Odd Subgaph Poblems Fedo V. Fomin 1 and Pet A. Golovach 2 1 Depatment of Infomatics, Univesity of Begen PB 7803, 5020 Begen, Noway fedo.fomin@ii.uib.no 2 School

More information

CHAPTER 2. Modular Arithmetic

CHAPTER 2. Modular Arithmetic CHAPTER 2 Modular Arithmetic In studying the integers we have seen that is useful to write a = qb + r. Often we can solve problems by considering only the remainder, r. This throws away some of the information,

More information

ElGamal Public-Key Encryption and Signature

ElGamal Public-Key Encryption and Signature ElGamal Public-Key Encryption and Signature Çetin Kaya Koç koc@cs.ucsb.edu Çetin Kaya Koç http://koclab.org Winter 2017 1 / 10 ElGamal Cryptosystem and Signature Scheme Taher ElGamal, originally from Egypt,

More information

Foundations of Cryptography

Foundations of Cryptography Foundations of Cryptography Ville Junnila viljun@utu.fi Department of Mathematics and Statistics University of Turku 2015 Ville Junnila viljun@utu.fi Lecture 10 1 of 17 The order of a number (mod n) Definition

More information

DES Data Encryption standard

DES Data Encryption standard DES Data Encryption standard DES was developed by IBM as a modification of an earlier system Lucifer DES was adopted as a standard in 1977 Was replaced only in 2001 with AES (Advanced Encryption Standard)

More information

Variance? which variance? R squared effect size measures in simple mediation models

Variance? which variance? R squared effect size measures in simple mediation models Vaiance? which vaiance? squaed effect size measues in simple mediation models M This is it? med di X de Heus, P. (01). squaed effect size measues and ovelap between diect and indiect effect in mediation

More information

Discussion #7 Example Problem This problem illustrates how Fourier series are helpful tools for analyzing electronic circuits. Often in electronic

Discussion #7 Example Problem This problem illustrates how Fourier series are helpful tools for analyzing electronic circuits. Often in electronic Discussion #7 Example Poblem This poblem illustates how Fouie seies ae helpful tools fo analyzing electonic cicuits. Often in electonic cicuits we need sinusoids of vaious fequencies But we may aleady

More information

EE 418: Network Security and Cryptography

EE 418: Network Security and Cryptography EE 418: Network Security and Cryptography Homework 3 Solutions Assigned: Wednesday, November 2, 2016, Due: Thursday, November 10, 2016 Instructor: Tamara Bonaci Department of Electrical Engineering University

More information

Diffie-Hellman key-exchange protocol

Diffie-Hellman key-exchange protocol Diffie-Hellman key-exchange protocol This protocol allows two users to choose a common secret key, for DES or AES, say, while communicating over an insecure channel (with eavesdroppers). The two users

More information

CCSDS Coding&Synchronization Working Group March Washington DC, USA SLS-C&S_08-CNES02

CCSDS Coding&Synchronization Working Group March Washington DC, USA SLS-C&S_08-CNES02 CCSDS Coding&Synchonization Woking Goup Mach 2008 1 Washington DC, USA DVB-S2 like fame constuction and LDPC codes ate o/and size extension fo use of Vaiable Coding & Modulation suitable fo X and Ka bands

More information

1 Trigonometric Functions

1 Trigonometric Functions Tigonometic Functions. Geomet: Cicles and Radians cicumf. = π θ Aea = π An angle of adian is defined to be the angle which makes an ac on the cicle of length. Thus, thee ae π adians in a cicle, so π ad

More information

Steve Alpern, Thomas Lidbetter, Alec Morton, and Katerina Papadaki Patrolling a pipeline

Steve Alpern, Thomas Lidbetter, Alec Morton, and Katerina Papadaki Patrolling a pipeline Steve Alpen, Thomas Lidbette, Alec Moton, and Kateina Papadaki Patolling a pipeline Book section Oiginal citation: Oiginally published in Alpen, Steven, Lidbette, Thomas, Moton, Alec and Papadaki, Kateina

More information

Efficient Power Control for Broadcast in Wireless Communication Systems

Efficient Power Control for Broadcast in Wireless Communication Systems Efficient Powe Contol fo Boadcast in Wieless Communication Systems A. T. Chonopoulos Compute Science Depatment Univesity of Texas at San Antonio San Antonio, TX Email:atc@cs.utsa.edu P. Cotae Depatment

More information

Public-Key Cryptosystem Based on Composite Degree Residuosity Classes. Paillier Cryptosystem. Harmeet Singh

Public-Key Cryptosystem Based on Composite Degree Residuosity Classes. Paillier Cryptosystem. Harmeet Singh Public-Key Cryptosystem Based on Composite Degree Residuosity Classes aka Paillier Cryptosystem Harmeet Singh Harmeet Singh Winter 2018 1 / 26 Background s Background Foundation of public-key encryption

More information

Multiagent Reinforcement Learning Dynamic Spectrum Access in Cognitive Radios

Multiagent Reinforcement Learning Dynamic Spectrum Access in Cognitive Radios Sensos & Tansduces 204 by IFSA Publishing, S L http://wwwsensospotalcom Multiagent Reinfocement Leaning Dynamic Spectum Access in Cognitive Radios Wu Chun, 2 Yin Mingyong, 2 Ma Shaoliang, Jiang Hong School

More information

Real-time Self Compensating AC/DC Digitally Controlled Power Supply

Real-time Self Compensating AC/DC Digitally Controlled Power Supply Real-time Self Compensating AC/DC Digitally Contolled Powe Supply Dave Feeman, Mak Hagen Texas Instuments Digital Powe Goup Digital Contol Poblem: Detemining optimal loop compensation given uncetainties

More information

Optimal Strategies in Jamming Resistant Uncoordinated Frequency Hopping Systems. Bingwen Zhang

Optimal Strategies in Jamming Resistant Uncoordinated Frequency Hopping Systems. Bingwen Zhang Optimal Stategies in Jamming Resistant Uncoodinated Fequency Hopping Systems by Bingwen Zhang A Thesis Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in patial fulfillment of the equiements

More information

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1 Cryptography CS 555 Topic 20: Other Public Key Encryption Schemes Topic 20 1 Outline and Readings Outline Quadratic Residue Rabin encryption Goldwasser-Micali Commutative encryption Homomorphic encryption

More information

On Local-Time Dependent Deviations in the Ionospheric Density Profiles Retrieved From the Radio Occultation Dada

On Local-Time Dependent Deviations in the Ionospheric Density Profiles Retrieved From the Radio Occultation Dada On Local-Time Dependent Deviations in the Ionospheic Density Pofiles Retieved Fom the Radio Occultation Dada S.-Y. Su 1, S. Tulasi Ram,3, and C. H. Liu 1. National Cental Univesity, Chung-Li, Taiwan..

More information

Statement of Works Data Template Version: 4.0 Date:

Statement of Works Data Template Version: 4.0 Date: Statement of Woks Data Template Vesion: 4.0 Date: 16.08.17 This Statement of Woks (SoW) Data Template is to be completed by Distibution Netwok Opeatos (DNOs) in ode to povide National Gid the equied data

More information

Discrepancies Between Euclidean and Spherical Trigonometry. David Eigen

Discrepancies Between Euclidean and Spherical Trigonometry. David Eigen Discepancies Between Euclidean and Spheical Tigonomety David Eigen 1 Non-Euclidean geomety is geomety that is not based on the postulates of Euclidean geomety. The five postulates of Euclidean geomety

More information

4 Trigonometric and Inverse Trigonometric Functions

4 Trigonometric and Inverse Trigonometric Functions MATH983/954 Mathematics 0C/C. Geneal infomation fo the academic yea 0-03: Lectue: D Theodoe Voonov, Room.09, School of Mathematics, Alan Tuing Building, email: theodoe.voonov@mancheste.ac.uk. Lectues:

More information

1 Performance and Cost

1 Performance and Cost Pefomance and Cost Analysis and Reseach of Ai-Cooled Using Small Diamete Coppe Tubes Wu Yang, Li Changsheng and Deng Bin Abstact Replacing coppe tubes with aluminum tubes and using coppe tubes with smalle

More information

Public Key Encryption

Public Key Encryption Math 210 Jerry L. Kazdan Public Key Encryption The essence of this procedure is that as far as we currently know, it is difficult to factor a number that is the product of two primes each having many,

More information

5.2 Trigonometric Ratios of Any Angle

5.2 Trigonometric Ratios of Any Angle 5. Tigonometic Ratios of An Angle The use of canes to lift heav objects is an essential pat of the constuction and shipping industies. Thee ae man diffeent designs of cane, but the usuall include some

More information

ECEN326: Electronic Circuits Fall 2017

ECEN326: Electronic Circuits Fall 2017 ECEN36: Electonic Cicuits Fall 07 Lectue 4: Cascode Stages and Cuent Mios Sam Palemo Analog & Mixed-Signal Cente Texas A&M Univesity Announcements HW3 due 0/4 Exam 0/9 9:0-0:0 (0 exta minutes) Closed book

More information

where and are polynomials with real coefficients and of degrees m and n, respectively. Assume that and have no zero on axis.

where and are polynomials with real coefficients and of degrees m and n, respectively. Assume that and have no zero on axis. function whee is an unknown constant epesents fo the un-modeled dynamics The pape investigates the position contol of electical moto dives that can be configued as stuctue of Fig 1 This poblem is fomulated

More information

Triple Crown Advantage:

Triple Crown Advantage: Aeoquip Tiple Cown Advantage Hose Poducts GH120 GH663 GH781 GH793 GH493 FC254 Tiple Cown Advantage: Highe Pessues Impoved Tempeatues Impoved Abasion Resistance Raise You Standads with Eaton s Aeoquip MatchMate

More information

Algorithmic Number Theory and Cryptography (CS 303)

Algorithmic Number Theory and Cryptography (CS 303) Algorithmic Number Theory and Cryptography (CS 303) Modular Arithmetic and the RSA Public Key Cryptosystem Jeremy R. Johnson 1 Introduction Objective: To understand what a public key cryptosystem is and

More information

A multichannel Satellite Scheduling Algorithm

A multichannel Satellite Scheduling Algorithm A multichannel Satellite Scheduling Algoithm J.S. Gilmoe and R. Wolhute Depatment of Electonic Engineeing Univesity of Stellenbosch 7600 Stellenbosch, South Afica Email: jgilmoe@dsp.sun.ac.za, wolhute@sun.ac.za

More information

ABSTRACTT FFT FFT-' Proc. of SPIE Vol U-1

ABSTRACTT FFT FFT-' Proc. of SPIE Vol U-1 Phase econstuction stategies in phase-locking system based on multi-apetue wave font sensos P.A. Semenov, S.D. Pol skikh Shvabe-Reseach, Moscow, Russian Fedeation; e-mail: pite@bk.u ABSTRACTT System of

More information

ISSN: [Reddy & Rao* et al., 5(12): December, 2016] Impact Factor: 4.116

ISSN: [Reddy & Rao* et al., 5(12): December, 2016] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY SIMULATION COMPARISONS OF INDUCTION MOTOR DRIVE WITH ESTIMATOR AND PLL V. Nasi Reddy *, S. Kishnajuna Rao*, S.Nagenda Kuma * Assistant

More information

Algorithmic Number Theory and Cryptography (CS 303)

Algorithmic Number Theory and Cryptography (CS 303) Algorithmic Number Theory and Cryptography (CS 303) Modular Arithmetic Jeremy R. Johnson 1 Introduction Objective: To become familiar with modular arithmetic and some key algorithmic constructions that

More information

The Mean and Variance of the Numbers of r-pronged Nodes and r-caterpillars in Yule-Generated Genealogical

The Mean and Variance of the Numbers of r-pronged Nodes and r-caterpillars in Yule-Generated Genealogical Annals of Combinatoics 10 (2006 129-146 0218-0006/06/010129-18 DOI 10.1007/s00026-006-0278-6 c Bikhäuse Velag, Basel, 2006 Annals of Combinatoics The Mean and Vaiance of the Numbes of -Ponged Nodes and

More information

Primitive Roots. Chapter Orders and Primitive Roots

Primitive Roots. Chapter Orders and Primitive Roots Chapter 5 Primitive Roots The name primitive root applies to a number a whose powers can be used to represent a reduced residue system modulo n. Primitive roots are therefore generators in that sense,

More information

TECHNICAL DATA. JIS (Japanese Industrial Standard) Screw Thread. Specifications

TECHNICAL DATA. JIS (Japanese Industrial Standard) Screw Thread. Specifications JIS (Japanese Industial Standad) Scew Thead Specifications TECNICAL DATA Note: Although these specifications ae based on JIS they also apply to and DIN s. Some comments added by Mayland Metics Coutesy

More information

THE UNIVERSITY OF NEW SOUTH WALES. School of Electrical Engineering & Telecommunications

THE UNIVERSITY OF NEW SOUTH WALES. School of Electrical Engineering & Telecommunications THE UNIESITY OF NEW SOUTH WAES School of Electical Engineeing & Telecommunications EE97 POWE EETONIS FO ENEWABE AND DISTIBUTED GENEATION EXAMINATION Session (Supplementay Exam) TIME AOWED: 3 hous TOTA

More information

Optic Cable Tracking and Positioning Method Based on Distributed Optical Fiber Vibration Sensing

Optic Cable Tracking and Positioning Method Based on Distributed Optical Fiber Vibration Sensing 08 5th Intenational Confeence on Electical & Electonics Engineeing and Compute Science (ICEEECS 08) Optic Cable Tacking and Positioning Method Based on Distibuted Optical Fibe Vibation Sensing Zhang Chao,

More information

Internet Engineering Task Force (IETF) ISSN: May 2013

Internet Engineering Task Force (IETF) ISSN: May 2013 Internet Engineering Task Force (IETF) J. Schaad Request for Comments: 6955 Soaring Hawk Consulting Obsoletes: 2875 H. Prafullchandra Category: Standards Track HyTrust, Inc. ISSN: 2070-1721 May 2013 Abstract

More information

Spectrum Sharing between Public Safety and Commercial Users in 4G-LTE

Spectrum Sharing between Public Safety and Commercial Users in 4G-LTE 1 Spectum Shaing between Public Safety and Commecial Uses in 4G-LTE Haya Shajaiah, Ahmed Abdel-Hadi and Chales Clancy Badley Depatment of Electical and Compute Engineeing Viginia Tech, Alington, VA, 22203,

More information

Analysis of influence of the ionosphere onto GNSS positioning. WP 4.4 Real Time positioning related issues

Analysis of influence of the ionosphere onto GNSS positioning. WP 4.4 Real Time positioning related issues WP 4.4 Real Time poitioning elated iue Kinga Wezka (ESR8) Techniche Univeitat Belin Depatment fo Geodey and Geoinfomation Science Nottingham 20-21. Mach, 2012 Intoduction abolute poitioning elative poitioning

More information

STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM

STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM H PRASHANTHA KUMAR et. al.: STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM DOI:.297/ijct.22.69 STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL

More information

Microwave Finite Element Modeling Applications to Coupled Electromagnetic-Thermal Problems and Characterization of Dielectric Materials

Microwave Finite Element Modeling Applications to Coupled Electromagnetic-Thermal Problems and Characterization of Dielectric Materials Micowave Finite Element Modeling Applications to Coupled Electomagnetic-Themal Poblems and Chaacteization of Dielectic Mateials Hulusi Acikgoz, Yann Le Bihan, Olivie Meye, and Lionel Pichon Laboatoie de

More information

2D Coding for Future Perpendicular and Probe Recording

2D Coding for Future Perpendicular and Probe Recording 2D Coding fo Futue Pependicula and Pobe Recoding Joseph A. O Sullivan Naveen Singla Ronald S. Indec Washington Univesity Saint Louis, Missoui s Outline: 2D Coding fo 2D ISI Motivation: 2D Intesymbol Intefeence

More information

6.1 Reciprocal, Quotient, and Pythagorean Identities

6.1 Reciprocal, Quotient, and Pythagorean Identities Chapte 6 Tigonometic Identities 1 6.1 Recipocal, Quotient, and Pthagoean Identities Wam-up Wite each epession with a common denominato. Detemine the estictions. a c a a) b d b) b c d c) a 1 c b c b a Definition

More information

Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits

Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits Secuity in Distibuted Stoage Systems by Communicating a Logaithmic Numbe of Bits Theodoos K. Dikaliotis Depatment of lectical ngineeing Alexandos G. Dimakis Depatment of lectical ngineeing Tacey Ho Depatment

More information

Cryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017

Cryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017 Name: Cryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017 INSTRUCTIONS Read Carefully Time: 50 minutes There are 5 problems. Write your name legibly at the top of this page. No calculators

More information

Assignment 0/0 2 /0 8 /0 16 Version: 3.2a Last Updated: 9/20/ :29 PM Binary Ones Comp Twos Comp

Assignment 0/0 2 /0 8 /0 16 Version: 3.2a Last Updated: 9/20/ :29 PM Binary Ones Comp Twos Comp * Dynamic Memoy *Big O Notation*Stacks *Exteme Pogamming*Selection Sot*Insetion Sot*Watefall Model Sting*Aays*AayList*Client Seve*Atificial Intelligence*Inheitance*Files*Video Games*Shot cicuit evaluation*

More information

ICAN meeting, Palaiseau, 11/10/2012 Some temporal aspects of Passive cavity-dumped enhancement for ICAN

ICAN meeting, Palaiseau, 11/10/2012 Some temporal aspects of Passive cavity-dumped enhancement for ICAN ICAN meeting, Palaiseau, // Some tempoal aspects of Passive ity-dumped enhancement fo ICAN Laboatoie Chales Faby, Institut d Optique, Palaiseau Passive ity-dumped enhancement pinciple Repetition ate convete

More information

Small Loop Antenna and Duality Theorem

Small Loop Antenna and Duality Theorem Small Loop Antenna and Duality Theoem Page 1 Small Loop Antenna and Duality Theoem Having studied the ideal electic dipole we now tun ou attention to an inteesting antenna closely elated to the electic

More information

Tiling Layouts with Dominoes

Tiling Layouts with Dominoes +, 16th Canadian Confeence on Computational Geomety, 2004 Tiling Layouts with Dominoes Mak Watson Chis Woman c 1 We exploe the complexity of tiling finite subsets of the plane, which we call layouts, with

More information

FreeSpace ZA 2120-HZA Zone Amplifier

FreeSpace ZA 2120-HZA Zone Amplifier Poduct Desciption The Bose zone amplifie is designed to povide basic amplification and sound system expansion when using font-end Bose poducts such as FeeSpace integated zone amplifies and ContolSpace

More information

ERROR ESTIMATIONS IN CYLINDRICAL NEAR FIELD SYSTEM FOR LARGE RADAR ANTENNAS

ERROR ESTIMATIONS IN CYLINDRICAL NEAR FIELD SYSTEM FOR LARGE RADAR ANTENNAS ERROR ESTIMATIONS IN CYLINDRICAL NEAR FIELD SYSTEM FOR LARGE RADAR ANTENNAS S. Bugos (), F. Matín (), M. Siea-Castañe () and J.L.Besada () () Gupo de Radiación. Dpto. de Señales, Sistemas y Radiocomunicaciones.

More information

Analysis of a Fractal Microstrip Patch Antenna

Analysis of a Fractal Microstrip Patch Antenna 124 Analysis of a Factal Micostip Patch Antenna Vibha Rani Gupta and Nisha Gupta* Bila Institute of Technology, Mesa, Ranchi-835215, Jhakhand, India. vgupta@bitmesa.ac.in, ngupta@bitmesa.ac.in Abstact-

More information

The number theory behind cryptography

The number theory behind cryptography The University of Vermont May 16, 2017 What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of adverse third parties. What is cryptography?

More information

TECHNICAL REPORT: CVEL Maximum Radiated Emission Calculator: Power Bus EMI Algorithm. Chentian Zhu and Dr. Todd Hubing. Clemson University

TECHNICAL REPORT: CVEL Maximum Radiated Emission Calculator: Power Bus EMI Algorithm. Chentian Zhu and Dr. Todd Hubing. Clemson University TECHNICAL REPORT: CVEL-13-053 Maximum Radiated Emission Calculato: Powe Bus EMI Algoithm Chentian Zhu and D. Todd Hubing Clemson Univesity Octobe 12, 2013 Abstact The Maximum Radiated Electomagnetic Emissions

More information

AMERICAN NATIONAL STANDARD

AMERICAN NATIONAL STANDARD ENGINEERING COMMITTEE Inteface Pactices Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 48-1 2015 Test Method fo Measuing Shielding Effectiveness of Passive and Active Devices Using a GTEM Cell NOTICE

More information

Cyclic Constellation Mapping Method for PAPR Reduction in OFDM system

Cyclic Constellation Mapping Method for PAPR Reduction in OFDM system 2013 8th Intenational Confeence on Communications and Netwoking in China (CHINACOM) Cyclic Constellation Mapping Method fo PAPR Reduction in OFDM system Yong Cheng, Jianhua Ge, Jun Hou, and Fengkui Gong

More information

School of Electrical and Computer Engineering, Cornell University. ECE 303: Electromagnetic Fields and Waves. Fall 2007

School of Electrical and Computer Engineering, Cornell University. ECE 303: Electromagnetic Fields and Waves. Fall 2007 School of Electical and Compute Engineeing, Conell Univesity ECE 303: Electomagnetic Fields and Waves Fall 007 Homewok 1 Due on Nov. 8, 007 by 5:00 PM Reading Assignments: i) Review the lectue notes. ii)

More information

Derangements. Brian Conrey and Tom Davis and March 23, 2000

Derangements. Brian Conrey and Tom Davis and   March 23, 2000 Deangements Bian Coney and Tom Davis coney@aimath.og and tomdavis@eathlink.net http://www.geomete.og/mathcicles Mach 23, 2000 Seating Mixup Imagine that Yankee Stadium is completely sold out, but when

More information

A Transmission Scheme for Continuous ARQ Protocols over Underwater Acoustic Channels

A Transmission Scheme for Continuous ARQ Protocols over Underwater Acoustic Channels A Tansmission Scheme fo Continuous ARQ Potocols ove Undewate Acoustic Channels Mingsheng Gao 1, Wee-Seng Soh 1 and Meixia Tao 2 1 Dept. of Electical & Compute Engineeing, National Univesity of Singapoe,

More information

Chapter 5: Trigonometric Functions of Angles

Chapter 5: Trigonometric Functions of Angles Chapte 5: Tigonometic Functions of Angles In the pevious chaptes we have exploed a vaiety of functions which could be combined to fom a vaiety of shapes. In this discussion, one common shape has been missing:

More information

Assignment 2. Due: Monday Oct. 15, :59pm

Assignment 2. Due: Monday Oct. 15, :59pm Introduction To Discrete Math Due: Monday Oct. 15, 2012. 11:59pm Assignment 2 Instructor: Mohamed Omar Math 6a For all problems on assignments, you are allowed to use the textbook, class notes, and other

More information

Number Theory/Cryptography (part 1 of CSC 282)

Number Theory/Cryptography (part 1 of CSC 282) Number Theory/Cryptography (part 1 of CSC 282) http://www.cs.rochester.edu/~stefanko/teaching/11cs282 1 Schedule The homework is due Sep 8 Graded homework will be available at noon Sep 9, noon. EXAM #1

More information

Theoretical Analysis of the Multi-agent Patrolling Problem

Theoretical Analysis of the Multi-agent Patrolling Problem Theoetical Analysis of the Multi-agent Patolling Poblem Yann Chevaleye Lamsade - univesity pais 9, place du Machal de Latte de Tassigny 75775 PARIS CEDEX 16 yann.chevaleye@lamsade.dauphine.f Abstact A

More information

Distributed Spectrum Allocation via Local Bargaining

Distributed Spectrum Allocation via Local Bargaining Distibuted Spectum Allocation via Local Bagaining Lili Cao Shanghai Jiaotong Univesity, Shanghai, P.R. China Email: cao li li@yahoo.com Haitao Zheng Micosoft Reseach Asia, Beijing, P.R. China Email: htzheng@ieee.og

More information

DTTF/NB479: Dszquphsbqiz Day 30

DTTF/NB479: Dszquphsbqiz Day 30 DTTF/NB479: Dszquphsbqiz Day 30 Announcements: Questions? This week: Digital signatures, DSA Coin flipping over the phone RSA Signatures allow you to recover the message from the signature; ElGamal signatures

More information

The phenomenon of incoherent signal interference

The phenomenon of incoherent signal interference The phenomenon of incoheent signal intefeence.. Goshenkov #, Y.N. Klikushin #, K.T. Koshekov *3 # Depatment "Technology of electonics", Omsk tate Technical Univesity, OmGTU, Omsk, Russia goshenkov@omgtu.u

More information

Study and Design of Dual Frequency High Gain and Conformal Microstrip Patch Antenna

Study and Design of Dual Frequency High Gain and Conformal Microstrip Patch Antenna , pp.236-243 http://dx.doi.og/10.14257/astl.2017.147.33 Study and Design of Dual Fequency High Gain and Confomal Micostip Patch Antenna S. Auna 1, K. Sinivasa Naik 2, J. Ramesh 2 and D. Madhu 2 1 Andha

More information

Antenna fundamentals: With answers to questions and problems (See also Chapter 9 in the textbook.)

Antenna fundamentals: With answers to questions and problems (See also Chapter 9 in the textbook.) adio Technology Metopolia/A. Koivumäki Antenna fundamentals: With answes to questions and poblems (See also Chapte 9 in the textbook.) 1. a) Make up a definition fo the tem "antenna". Answe: One definition:

More information

Development of Corona Ozonizer Using High Voltage Controlling of Produce Ozone Gas for Cleaning in Cage

Development of Corona Ozonizer Using High Voltage Controlling of Produce Ozone Gas for Cleaning in Cage Moden Envionmental Science and Engineeing (ISSN 333-58) July 07, Volume 3, No. 7, pp. 505-509 Doi: 0.534/mese(333-58)/07.03.07/0 Academic Sta Publishing Company, 07 www.academicsta.us Development of Coona

More information

Optimal Design of Smart Mobile Terminal Antennas for Wireless Communication and Computing Systems

Optimal Design of Smart Mobile Terminal Antennas for Wireless Communication and Computing Systems Optimal Design of Smat Mobile Teminal Antennas fo Wieless Communication and Computing Systems Autho Lu, Junwei, Yang, Shiyou Published 2007 Confeence Title 2007 4th Intenational Symposium on Electomagnetic

More information

Low-Complexity Time-Domain SNR Estimation for OFDM Systems

Low-Complexity Time-Domain SNR Estimation for OFDM Systems Low-Complexity Time-Domain SR Estimation fo OFDM Systems A. jaz, A.B. Awoseyila and B.G. Evans A low-complexity SR estimation algoithm fo OFDM systems in fequency-selective fading channels is poposed.

More information

Metal face seals product listings

Metal face seals product listings poduct listings Undestanding key tale elements Designed to e use-fiendly, CR Seals and poduct listings convey a good deal of infomation on evey line. As you familiaize youself with the tales, keep these

More information

Localization Algorithm for a mobile robot using igs

Localization Algorithm for a mobile robot using igs Poceedings of the 17th Wold Congess The Intenational Fedeation of Automatic Contol Seoul, Koea, July 6-11, 008 Localization Algoithm fo a mobile obot using igs DaeGeun Seo *, JangMyung Lee** * Electical

More information

Journal of Applied Science and Agriculture

Journal of Applied Science and Agriculture Jounal of Applied Science and Agicultue, 9(16) Octobe 214, Pages: 1-15 AENSI Jounals Jounal of Applied Science and Agicultue ISSN 1816-9112 Jounal home page: www.aensiweb.com/jasa A Design of New Bluetooth

More information

Voltage Control of a 12/8 Pole Switched Reluctance Generator Using Fuzzy Logic

Voltage Control of a 12/8 Pole Switched Reluctance Generator Using Fuzzy Logic Intenational Jounal of Moden Nonlinea Theoy and Application, 22,, 7-2 http://dx.doi.og/.4236/ijmnta.22.36 Published Online Septembe 22 (http://www.scirp.og/jounal/ijmnta) Voltage ontol of a 2/8 Pole Switched

More information

Sequential Aggregate Signatures from Trapdoor Permutations

Sequential Aggregate Signatures from Trapdoor Permutations Sequential Aggregate Signatures from Trapdoor Permutations Anna Lysyanskaya Silvio Micali Leonid Reyzin Hovav Shacham Abstract An aggregate signature scheme (recently proposed by Boneh, Gentry, Lynn, and

More information

Signal Extraction Technology

Signal Extraction Technology Extaction Technology Intoduction Masimo SET pulse oximety is a new and fundamentally distinct method of acquiing, pocessing and epoting ateial oxygen satuation and pulse ate. As illustated below, Masimo

More information

Realistic Simulation of a Wireless Signal Propagation in an Urban Environment

Realistic Simulation of a Wireless Signal Propagation in an Urban Environment Realistic Simulation of a Wieless Signal Popagation in an Uban Envionment Keyukuma J. Patel Univesity of Southen Queensland Toowoomba, Austalia e-mail: keyupatel@ieee.og Andew Y. J. Lee Nanyang Technological

More information

RSA hybrid encryption schemes

RSA hybrid encryption schemes RSA hybrid encryption schemes Louis Granboulan École Normale Supérieure Louis.Granboulan@ens.fr Abstract. This document compares the two published RSA-based hybrid encryption schemes having linear reduction

More information

Flexible PVDF comb transducers for excitation of axisymmetric guided waves in pipe

Flexible PVDF comb transducers for excitation of axisymmetric guided waves in pipe Sensos and Actuatos A 100 (2002) 18 23 Flexible PVDF comb tansduces fo excitation of axisymmetic guided waves in pipe Thomas R. Hay *, Joseph L. Rose ESM Depatment, Pennsylvania State Univesity, 212 EES

More information

δ =0.586 Average number of nearest signal points (NN): 0.5 NN: 1.5 δ =2.000

δ =0.586 Average number of nearest signal points (NN): 0.5 NN: 1.5 δ =2.000 IEICE TRANS. FUNDAMENTALS, VOL. E{A, NO. JANUARY 999 PAPER Regula pape Tadeos between Eo Pefomance and Decoding Complexity in Multilevel 8-PSK Codes with UEP Capabilities and Multistage Decoding Motohiko

More information

A. Ebadi*, M. Mirzaie* and S. A. Gholamian*

A. Ebadi*, M. Mirzaie* and S. A. Gholamian* A Compaison Between Electical Cicuit and Finite Element Modeling Methods fo Pefomance Analysis of a Thee-Phase nduction Moto unde oltage Unbalance A. Ebadi*, M. Mizaie* and S. A. Gholamian* Abstact: nduction

More information

Analysis of the Radiation Resistance and Gain of Full-Wave Dipole Antenna for Different Feeding Design

Analysis of the Radiation Resistance and Gain of Full-Wave Dipole Antenna for Different Feeding Design Jounal of lectomagnetic Analysis and Applications, 01, 4, 35-4 http://dx.doi.og/10.436/jemaa.01.46033 Published Online June 01 (http://www.scirp.og/jounal/jemaa) 35 Analysis of the Radiation Resistance

More information

Randomized Self-Assembly for Exact Shapes

Randomized Self-Assembly for Exact Shapes Randomized Self-Assembly fo Exact Shapes David Doty Depatment of Compute Science Iowa State Univesity Ames, IA 500, USA ddoty@iastate.edu Abstact Woking in Winfee s abstact tile assembly model, we show

More information

Exercise 1 (MC Question)

Exercise 1 (MC Question) D J Tani -9- Contol Systems II (Sping 8 Solution Execise Set 9 Linea Quadatic Regulato Gioele Zadini, gzadini@ethzch, 7th May 8 Execise (MC Question (I-D, (II-A, (III-C, (IV-B (I-C, (II-A, (III-D, (IV-B

More information

Overlapping community detection in signed networks

Overlapping community detection in signed networks Ovelapping community detection in signed netwoks Yi Chen 1 Xiao-long Wang 1, 2 Bo Yuan 1 1 (Depatment of Compute Science and Technology, Shenzhen Gaduate School, Habin Institute of Technology, Shenzhen

More information

The Periodic Ambiguity Function Its Validity and Value

The Periodic Ambiguity Function Its Validity and Value The Peiodic Ambiguity Function Its Validity and Value Nadav Levanon Dept. of Electical Engineeing Systems Tel Aviv Univesity Tel Aviv, Isael nadav@eng.tau.ac.il Abstact The peiodic ambiguity function (PAF)

More information

A Lifting Algorithm for Output-only Continuous Scan Laser Doppler Vibrometry

A Lifting Algorithm for Output-only Continuous Scan Laser Doppler Vibrometry 53d AIAA/ASME/ASCE/AHS/ASC Stuctues Stuctual Dynamics and Mateials Confeence2th AI 23-26 Apil 22 Honolulu Hawaii AIAA 22- A Lifting Algoithm fo Output-only Continuous Scan Lase Dopple Vibomety Shifei

More information