11 research outputs found

    New vulnerability of RSA modulus type N = p2q

    Get PDF
    This paper proposes new attacks on modulus of type N = p2q. Given k moduli of the form Ni = p2iqi for k ≥ 2 and i = 1, …, k, the attack works when k public keys (Ni, ei) are such that there exist k relations of the shape eix – Niyi = zi – (ap2i + bq2i)yi or of the shape eixi – Niy = zi – (ap2i + bq2i)y where the parameters x, xi, y, yi and zi are suitably small in terms of the prime factors of the moduli. The proposed attacks utilizing the LLL algorithm enables one to factor the k moduli Ni simultaneously

    On the Efficiency of Fast RSA Variants in Modern Mobile Phones

    Full text link
    Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public key cryptosystem RSA. It is, however, well known that public key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on modern mobile phones. In this paper, we explore the efficiency on modern mobile phones of variants of the RSA cryptosystem, covering CRT, MultiPrime RSA, MultiPower RSA, Rebalanced RSA and R Prime RSA by comparing the encryption and decryption time using a simple Java implementation and a typical RSA setup.Comment: 5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS December 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis

    Solving Generalized Small Inverse Problems

    Get PDF
    Abstract. We introduce a “generalized small inverse problem (GSIP)” and present an algorithm for solving this problem. GSIP is formulated as finding small solutions of f(x0, x1,..., xn) = x0h(x1,..., xn) + C = 0(mod M) for an n-variate polynomial h, non-zero integers C and M. Our algorithm is based on lattice-based Coppersmith technique. We pro-vide a strategy for construction of a lattice basis for solving f = 0, which are systematically transformed from a lattice basis for solving h = 0. Then, we derive an upper bound such that the target problem can be solved in polynomial time in logM in an explicit form. Since GSIPs in-clude some RSA-related problems, our algorithm is applicable to them. For example, the small key attacks by Boneh and Durfee are re-found automatically. This is a full version of [13]

    Minimally-invasive Wearable Sensors and Data Processing Methods for Mental Stress Detection

    Get PDF
    Chronic stress is endemic to modern society. If we could monitor our mental state, we may be able to develop insights about how we respond to stress. However, it is unfeasible to continuously annotate stress levels all the time. In the studies conducted for this dissertation, a minimally-invasive wearable sensor platform and physiological data processing methods were developed to analyze a number of physiological correlates of mental stress. We present a minimally obtrusive wearable sensor system that incorporates embedded and wireless communication technologies. The system is designed such that it provides a balance between data collection and user comfort. The system records the following stress related physiological and contextual variables: heart rate variability (HRV), respiratory activity, electrodermal activity (EDA), electromyography (EMG), body acceleration, and geographical location. We assume that if the respiratory influences on HRV can be removed, the residual HRV will be more salient to stress in comparison with raw HRV. We develop three signal processing methods to separate HRV into a respiration influenced and residual HRV. The first method consists of estimating respiration-induced portion of HRV using a linear system identification method (autoregressive moving average model with exogenous inputs). The second method consists of decomposing HRV into respiration-induced principal dynamic mode and residual using nonlinear dynamics decomposition method (principal dynamic mode analysis). The third method consists of splitting HRV into respiration-induced power spectrum and residual in frequency domain using spectral weighting method. These methods were validated on a binary discrimination problem of two psychophysiological conditions: mental stress and relaxation. The linear system identification method, nonlinear dynamics decomposition method, and spectral weighting method classified stress and relaxation conditions at 85.2 %, 89.2 %, and 81.5 % respectively. When tonic and phasic EDA features were combined with the linear system identification method, the nonlinear dynamics decomposition method, and the spectral weighting method, the average classification rates were increased to 90.4 %, 93.2 %, and 88.1 % respectively. To evaluate the developed wearable sensors and signal processing methods on multiple subjects, we performed case studies. In the first study, we performed experiments in a laboratory setting. We used the wearable sensors and signal processing methods to discriminate between stress and relaxation conditions. We achieved 81 % average classification rate in the first case study. In the second study, we performed experiments to detect stress in ambulatory settings. We collected data from the subjects who wore the sensors during regular daily activities. Relaxation and stress conditions were allocated during daily activities. We achieved a 72 % average classification rate in ambulatory settings. Together, the results show achievements in recognizing stress from wearable sensors in constrained and ambulatory conditions. The best results for stress detection were achieved by removing respiratory influence from HRV and combining features from EDA

    Design Methods Movement, 1944-1967

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Architecture, 2008.Includes bibliographical references (p. 259-282).In the mythic construct of the West, nature, for a considerable era, has served as a seminal broker in basal underpinning discourse. This is despite nature's commutative, convertible and contradictory disclosures. As the antithesis of socio-culture, nature has been the arena of the given, of necessity and compulsion, and a zone of constraint. As "Nature" it has worked as the precipitate of humanity and ministered as the model for human activity. To violate the norms of nature, to be unnatural, has been considered unhealthy, amoral and illegal.Following the Second World War, constructs of nature, socio-culture and norms were altered in design education and practice. Postwar, an emerging discourse of computer-related technologies contributed to reconfiguring representations of architecture, engineering, product and urban planning in the US and UK. The collective driving these changes became known as the Design Methods movement. Together with trajectories of thought in psychology and psychiatry, discourses materializing from such fields as cybernetics, operations research, information theory and computers altered design processes and education.This dissertation ranges from examining the politics of funding surrounding an urban planning research center in Cambridge, Massachusetts to elucidating conferences concerning, architecture, engineering, urban planning and product design in the UK. Taking from media theorist Friedrich Kittler that technologically possible manipulations condition what can become a discourse, this dissertation is structured around two threads.(cont.) One thread concerns how computer-related technologies configured a re-conceptualization of nature and socio-culture in design practice and education. A second thread examines how psychology and psychoanalytic concerns were reworked for design through a lens of computer related technologies. A line between the natural and the normative is questioned concerning concepts of abnormality and deviation.by Alise Upitis.Ph.D

    Reports to the President

    Get PDF
    A compilation of annual reports for the 1989-1990 academic year, including a report from the President of the Massachusetts Institute of Technology, as well as reports from the academic and administrative units of the Institute. The reports outline the year's goals, accomplishments, honors and awards, and future plans

    Abstracts on Radio Direction Finding (1899 - 1995)

    Get PDF
    The files on this record represent the various databases that originally composed the CD-ROM issue of "Abstracts on Radio Direction Finding" database, which is now part of the Dudley Knox Library's Abstracts and Selected Full Text Documents on Radio Direction Finding (1899 - 1995) Collection. (See Calhoun record https://calhoun.nps.edu/handle/10945/57364 for further information on this collection and the bibliography). Due to issues of technological obsolescence preventing current and future audiences from accessing the bibliography, DKL exported and converted into the three files on this record the various databases contained in the CD-ROM. The contents of these files are: 1) RDFA_CompleteBibliography_xls.zip [RDFA_CompleteBibliography.xls: Metadata for the complete bibliography, in Excel 97-2003 Workbook format; RDFA_Glossary.xls: Glossary of terms, in Excel 97-2003 Workbookformat; RDFA_Biographies.xls: Biographies of leading figures, in Excel 97-2003 Workbook format]; 2) RDFA_CompleteBibliography_csv.zip [RDFA_CompleteBibliography.TXT: Metadata for the complete bibliography, in CSV format; RDFA_Glossary.TXT: Glossary of terms, in CSV format; RDFA_Biographies.TXT: Biographies of leading figures, in CSV format]; 3) RDFA_CompleteBibliography.pdf: A human readable display of the bibliographic data, as a means of double-checking any possible deviations due to conversion

    Proselytising public health reform in Punch 1841-1858

    Get PDF
    It is the purpose of this thesis, by analysing the context of public health reform in the nineteenth century, to reconsider the methods, both verbal and visual, by which Punch proselytised reform. Drawing on a range of primary data, this thesis uses a thematic case study to undertake a systematic re-examination of Punch's distinctive stylistic form from 1841 to 1858. This will also assist in identifying how the `character' of the magazine evolved. Case study chapters will focus specifically on the campaigns surrounding the removal of Smithfield Market and the amelioration of the polluted River Thames, providing a point of comparison from which to study the growth of a range of shared motifs developed for discussing reform and social change. Taking a chronological approach, it will be argued that from the close of the 1840st here was a simultaneous shift in both the organisation of the Punch `brotherhood' and in scientific understandings of the cause of disease and pollution. From 1849 the problems of how to communicate the need for reform begin to be resolved due to the increased profile the topic of public health received in the public sphere, particularly through periodicals like Punch. This change is evident from an analysis of the references logged in the Punch Database on Public Health (Appendix Two)
    corecore