simultaneous diophantine approximations
Recently Published Documents


TOTAL DOCUMENTS

26
(FIVE YEARS 4)

H-INDEX

5
(FIVE YEARS 0)

Author(s):  
Saidu Isah Abubakar ◽  
Sadiq Shehu

This paper reports new techniques that exploit the security of the prime power moduli [Formula: see text] using continued fraction method. Our study shows that the key equation [Formula: see text] can be exploited using [Formula: see text] as good approximation of [Formula: see text]. This enables us to get [Formula: see text] from the convergents of the continued fractions expansion of [Formula: see text] where the bound of the private exponent is [Formula: see text] which leads to the polynomial time factorization of the moduli [Formula: see text]. We further report the polynomial time attacks that can break the security of the generalized prime power moduli [Formula: see text] using generalized system of equation of the form [Formula: see text] and [Formula: see text] by applying simultaneous Diophantine approximations and LLL algorithm techniques where [Formula: see text] and [Formula: see text].



2021 ◽  
pp. 1-28
Author(s):  
DOMINIQUE MALICET

Abstract We consider products of an independent and identically distributed sequence in a set $\{f_1,\ldots ,f_m\}$ of orientation-preserving diffeomorphisms of the circle. We can naturally associate a Lyapunov exponent $\lambda $ . Under few assumptions, it is known that $\lambda \leq 0$ and that the equality holds if and only if $f_1,\ldots ,f_m$ are simultaneously conjugated to rotations. In this paper, we state a quantitative version of this fact in the case where $f_1,\ldots ,f_m$ are $C^k$ perturbations of rotations with rotation numbers $\rho (f_1),\ldots ,\rho (f_m)$ satisfying a simultaneous diophantine condition in the sense of Moser [On commuting circle mappings and simultaneous diophantine approximations. Math. Z.205(1) (1990), 105–121]: we give a precise estimate of $\lambda $ (Taylor expansion) and we prove that there exist a diffeomorphism g and rotations $r_i$ such that $\mbox {dist}(gf_ig^{-1},r_i)\ll |\lambda |^{{1}/{2}}$ for $i=1,\ldots , m$ . We also state analogous results for random products of $2\times 2$ matrices, without any diophantine condition.



Mathematics ◽  
2021 ◽  
Vol 9 (6) ◽  
pp. 591
Author(s):  
Michel L. Lapidus ◽  
Machiel van Frankenhuijsen ◽  
Edward K. Voskanian

The Lattice String Approximation algorithm (or LSA algorithm) of M. L. Lapidus and M. van Frankenhuijsen is a procedure that approximates the complex dimensions of a nonlattice self-similar fractal string by the complex dimensions of a lattice self-similar fractal string. The implication of this procedure is that the set of complex dimensions of a nonlattice string has a quasiperiodic pattern. Using the LSA algorithm, together with the multiprecision polynomial solver MPSolve which is due to D. A. Bini, G. Fiorentino and L. Robol, we give a new and significantly more powerful presentation of the quasiperiodic patterns of the sets of complex dimensions of nonlattice self-similar fractal strings. The implementation of this algorithm requires a practical method for generating simultaneous Diophantine approximations, which in some cases we can accomplish by the continued fraction process. Otherwise, as was suggested by Lapidus and van Frankenhuijsen, we use the LLL algorithm of A. K. Lenstra, H. W. Lenstra, and L. Lovász.



Author(s):  
Sadiq Shehu ◽  
Abdullahi Hussaini ◽  
Zahriya Lawal

Cryptography is fundamental to the provision of a wider notion of information security. Electronic information can easily be transmitted and stored in relatively insecure environments. This research was present to factor the prime power modulus \(N = p^r q\) for \(r \geq 2\) using the RSA key equation, if \(\frac{y}{x}\) is a convergents of the continued fractions expansions of \(\frac{e}{N - \left(2^{\frac{2r+1}{r+1}} N^{\frac{r}{r+1}} - 2^{\frac{r-1}{r+1}} N^{\frac{r-1}{r+1}}\right)}\). We furthered our analysis on \(n\) prime power moduli \(N_i = p_i^r q_i\) by transforming the generalized key equations into Simultaneous Diophantine approximations and using the LLL algorithm on \(n\) prime power public keys \((N_i,e_i)\) we were able to factorize the \(n\) prime power moduli \(N_i = p_i^r q_i\), for \(i = 1,....,n\) simultaneously in polynomial time.



Cryptography ◽  
2018 ◽  
Vol 3 (1) ◽  
pp. 2 ◽  
Author(s):  
Muhammad Ariffin ◽  
Saidu Abubakar ◽  
Faridah Yunos ◽  
Muhammad Asbullah

This paper presents new short decryption exponent attacks on RSA, which successfully leads to the factorization of RSA modulus N = p q in polynomial time. The paper has two parts. In the first part, we report the usage of the small prime difference method of the form | b 2 p - a 2 q | < N γ where the ratio of q p is close to b 2 a 2 , which yields a bound d < 3 2 N 3 4 - γ from the convergents of the continued fraction expansion of e N - ⌈ a 2 + b 2 a b N ⌉ + 1 . The second part of the paper reports four cryptanalytic attacks on t instances of RSA moduli N s = p s q s for s = 1 , 2 , … , t where we use N - ⌈ a 2 + b 2 a b N ⌉ + 1 as an approximation of ϕ ( N ) satisfying generalized key equations of the shape e s d - k s ϕ ( N s ) = 1 , e s d s - k ϕ ( N s ) = 1 , e s d - k s ϕ ( N s ) = z s , and e s d s - k ϕ ( N s ) = z s for unknown positive integers d , k s , d s , k s , and z s , where we establish that t RSA moduli can be simultaneously factored in polynomial time using combinations of simultaneous Diophantine approximations and lattice basis reduction methods. In all the reported attacks, we have found an improved short secret exponent bound, which is considered to be better than some bounds as reported in the literature.





2014 ◽  
Vol 145 ◽  
pp. 362-387 ◽  
Author(s):  
Simon Dauguet ◽  
Wadim Zudilin


2013 ◽  
Vol 1 (1) ◽  
pp. 167-185
Author(s):  
Wieb Bosma ◽  
Ionica Smeets


2013 ◽  
Vol 5 (1) ◽  
pp. 16-34 ◽  
Author(s):  
Attila Kovács ◽  
Norbert Tihanyi

Abstract In this paper we consider two algorithmic problems of simultaneous Diophantine approximations. The first algorithm produces a full solution set for approximating an irrational number with rationals with common denominators from a given interval. The second one aims at finding as many simultaneous solutions as possible in a given time unit. All the presented algorithms are implemented, tested and the PariGP version made publicly available.



Sign in / Sign up

Export Citation Format

Share Document