21,476 research outputs found
Security systems based on Gaussian integers : Analysis of basic operations and time complexity of secret transformations
Many security algorithms currently in use rely heavily on integer arithmetic modulo prime numbers. Gaussian integers can be used with most security algorithms that are formulated for real integers. The aim of this work is to study the benefits of common security protocols with Gaussian integers. Although the main contribution of this work is to analyze and improve the application of Gaussian integers for various public key (PK) algorithms, Gaussian integers were studied in the context of image watermarking as well.
The significant benefits of the application of Gaussian integers become apparent when they are used with Discrete Logarithm Problem (DLP) based PK algorithms. In order to quantify the complexity of the Gaussian integer DLP, it is reduced to two other well known problems: DLP for Lucas sequences and the real integer DLP. Additionally, a novel exponentiation algorithm for Gaussian integers, called Lucas sequence Exponentiation of Gaussian integers (LSEG) is introduced and its performance assessed, both analytically and experimentally. The LSEG achieves about 35% theoretical improvement in CPU time over real integer exponentiation. Under an implementation with the GMP 5.0.1 library, it outperformed the GMP\u27s mpz_powm function (the particularly efficient modular exponentiation function that comes with the GMP library) by 40% for bit sizes 1000-4000, because of low overhead associated with LSEG. Further improvements to real execution time can be easily achieved on multiprocessor or multicore platforms. In fact, over 50% improvement is achieved with a parallelized implementation of LSEG. All the mentioned improvements do not require any special hardware or software and are easy to implement. Furthermore, an efficient way for finding generators for DLP based PK algorithms with Gaussian integers is presented.
In addition to DLP based PK algorithms, applications of Gaussian integers for factoring-based PK cryptosystems are considered. Unfortunately, the advantages of Gaussian integers for these algorithms are not as clear because the extended order of Gaussian integers does not directly come into play. Nevertheless, this dissertation describes the Extended Square Root algorithm for Gaussian integers used to extend the Rabin Cryptography algorithm into the field of Gaussian integers. The extended Rabin Cryptography algorithm with Gaussian integers allows using fewer preset bits that are required by the algorithm to guard against various attacks. Additionally, the extension of RSA into the domain of Gaussian integers is analyzed. The extended RSA algorithm could add security only if breaking the original RSA is not as hard as factoring. Even in this case, it is not clear whether the extended algorithm would increase security.
Finally, the randomness property of the Gaussian integer exponentiation is utilized to derive a novel algorithm to rearrange the image pixels to be used for image watermarking. The new algorithm is more efficient than the one currently used and it provides a degree of cryptoimmunity. The proposed method can be used to enhance most picture watermarking algorithms
A Quasi-Random Approach to Matrix Spectral Analysis
Inspired by the quantum computing algorithms for Linear Algebra problems
[HHL,TaShma] we study how the simulation on a classical computer of this type
of "Phase Estimation algorithms" performs when we apply it to solve the
Eigen-Problem of Hermitian matrices. The result is a completely new, efficient
and stable, parallel algorithm to compute an approximate spectral decomposition
of any Hermitian matrix. The algorithm can be implemented by Boolean circuits
in parallel time with a total cost of Boolean
operations. This Boolean complexity matches the best known rigorous parallel time algorithms, but unlike those algorithms our algorithm is
(logarithmically) stable, so further improvements may lead to practical
implementations.
All previous efficient and rigorous approaches to solve the Eigen-Problem use
randomization to avoid bad condition as we do too. Our algorithm makes further
use of randomization in a completely new way, taking random powers of a unitary
matrix to randomize the phases of its eigenvalues. Proving that a tiny Gaussian
perturbation and a random polynomial power are sufficient to ensure almost
pairwise independence of the phases is the main technical
contribution of this work. This randomization enables us, given a Hermitian
matrix with well separated eigenvalues, to sample a random eigenvalue and
produce an approximate eigenvector in parallel time and
Boolean complexity. We conjecture that further improvements of
our method can provide a stable solution to the full approximate spectral
decomposition problem with complexity similar to the complexity (up to a
logarithmic factor) of sampling a single eigenvector.Comment: Replacing previous version: parallel algorithm runs in total
complexity and not . However, the depth of the
implementing circuit is : hence comparable to fastest
eigen-decomposition algorithms know
Detecting Simultaneous Integer Relations for Several Real Vectors
An algorithm which either finds an nonzero integer vector for
given real -dimensional vectors such
that or proves that no such integer vector with
norm less than a given bound exists is presented in this paper. The cost of the
algorithm is at most exact arithmetic
operations in dimension and the least Euclidean norm of such
integer vectors. It matches the best complexity upper bound known for this
problem. Experimental data show that the algorithm is better than an already
existing algorithm in the literature. In application, the algorithm is used to
get a complete method for finding the minimal polynomial of an unknown complex
algebraic number from its approximation, which runs even faster than the
corresponding \emph{Maple} built-in function.Comment: 10 page
Novel Approach to Real Polynomial Root-finding and Matrix Eigen-solving
Univariate polynomial root-finding is both classical and important for modern
computing. Frequently one seeks just the real roots of a polynomial with real
coefficients. They can be approximated at a low computational cost if the
polynomial has no nonreal roots, but typically nonreal roots are much more
numerous than the real ones. We dramatically accelerate the known algorithms in
this case by exploiting the correlation between the computations with matrices
and polynomials, extending the techniques of the matrix sign iteration, and
exploiting the structure of the companion matrix of the input polynomial. We
extend some of the proposed techniques to the approximation of the real
eigenvalues of a real nonsymmetric matrix.Comment: 17 pages, added algorithm
Incremental and Transitive Discrete Rotations
A discrete rotation algorithm can be apprehended as a parametric application
from \ZZ[i] to \ZZ[i], whose resulting permutation ``looks
like'' the map induced by an Euclidean rotation. For this kind of algorithm, to
be incremental means to compute successively all the intermediate rotate d
copies of an image for angles in-between 0 and a destination angle. The di
scretized rotation consists in the composition of an Euclidean rotation with a
discretization; the aim of this article is to describe an algorithm whic h
computes incrementally a discretized rotation. The suggested method uses o nly
integer arithmetic and does not compute any sine nor any cosine. More pr
ecisely, its design relies on the analysis of the discretized rotation as a
step function: the precise description of the discontinuities turns to be th e
key ingredient that will make the resulting procedure optimally fast and e
xact. A complete description of the incremental rotation process is provided,
also this result may be useful in the specification of a consistent set of
defin itions for discrete geometry
Accurate and Efficient Expression Evaluation and Linear Algebra
We survey and unify recent results on the existence of accurate algorithms
for evaluating multivariate polynomials, and more generally for accurate
numerical linear algebra with structured matrices. By "accurate" we mean that
the computed answer has relative error less than 1, i.e., has some correct
leading digits. We also address efficiency, by which we mean algorithms that
run in polynomial time in the size of the input. Our results will depend
strongly on the model of arithmetic: Most of our results will use the so-called
Traditional Model (TM). We give a set of necessary and sufficient conditions to
decide whether a high accuracy algorithm exists in the TM, and describe
progress toward a decision procedure that will take any problem and provide
either a high accuracy algorithm or a proof that none exists. When no accurate
algorithm exists in the TM, it is natural to extend the set of available
accurate operations by a library of additional operations, such as , dot
products, or indeed any enumerable set which could then be used to build
further accurate algorithms. We show how our accurate algorithms and decision
procedure for finding them extend to this case. Finally, we address other
models of arithmetic, and the relationship between (im)possibility in the TM
and (in)efficient algorithms operating on numbers represented as bit strings.Comment: 49 pages, 6 figures, 1 tabl
- …