Secure hash functions are the unsung heroes of modern cryptography.
Introductory courses in cryptography often leave them out --- since
they don't have a secret key, it is difficult to use hash functions by
themselves for cryptography. In addition, most theoretical
discussions of cryptographic systems can get by without mentioning
them. However, for secure practical implementations of public-key
ciphers, digital signatures, and many other systems they are
indispensable. In this talk I will discuss the requirements for a
secure hash function and relate my attempts to come up with a "toy"
system which both reasonably secure and also suitable for students to
work with by hand in a classroom setting.
The answer is that, yes, we don’t want the function to change the parameter, but neither do we want to use up time and memory creating and storing an entire copy of it. So, we make the original object available to the called function by using pass-by-reference. We also mark it constant so that the function will not alter it, even by mistake.
Mergesort is a divide and conquer algorithm that does exactly that. It splits the list in half
Mergesorts the two halves Then merges the two sorted halves together Mergesort can be implemented recursively
An AVL tree, ordered by key insert: a standard insert; (log n) find: a standard find (without removing, of course); (log n) remove: a standard remove; (log n)
The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...Joshua Holden
This presentation describes the team-teaching of a course in mathematics and art. The goal of the class is to show students the interplay between art and math with a focus on having them make physical objects. Most math and art classes we have heard of focus primarily on introducing liberal arts students to mathematics. In a STEM context, we want to instead build on the mathematical knowledge that our students already have. We intend for students to use their existing mathematical (and perhaps artistic) knowledge to reinforce new artistic (and perhaps mathematical) experiences. Ideally, the knowledge and experience gained will increase their appreciation for both the beauty of mathematics and the importance of art.
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...Joshua Holden
C.P. Snow famously categorized modern intellectual life as being split between the culture of the sciences and the culture of the humanities, and said that solving the world's problems requires bringing these two cultures together. Math and art classes inherently try to do that. However, most math and art classes we have heard of focus primarily on introducing liberal arts students to mathematics. In the Spring Quarter of 2019 Soully Abas and I team-taught a different sort of course in mathematics and art at the Rose-Hulman Institute of Technology. Rose-Hulman is a private, undergraduate-focused institution, all of whose students major in engineering (predominantly), science, or mathematics. We wanted to build on the mathematical knowledge that our STEM students already have with a focus on having them make physical art objects. Soully is an art professor specializing in oil painting and printmaking. Josh is a math professor interested in the mathematics of fiber arts such as embroidery, knitting, crochet, and weaving. Our goal was for students to use their existing mathematical (and perhaps artistic) knowledge to reinforce new artistic (and perhaps mathematical) experiences. Ideally, the knowledge and experience gained will increase their appreciation for both the beauty of mathematics and the importance of art and help them prepare for productive lives solving the world's problems.
The answer is that, yes, we don’t want the function to change the parameter, but neither do we want to use up time and memory creating and storing an entire copy of it. So, we make the original object available to the called function by using pass-by-reference. We also mark it constant so that the function will not alter it, even by mistake.
Mergesort is a divide and conquer algorithm that does exactly that. It splits the list in half
Mergesorts the two halves Then merges the two sorted halves together Mergesort can be implemented recursively
An AVL tree, ordered by key insert: a standard insert; (log n) find: a standard find (without removing, of course); (log n) remove: a standard remove; (log n)
The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...Joshua Holden
This presentation describes the team-teaching of a course in mathematics and art. The goal of the class is to show students the interplay between art and math with a focus on having them make physical objects. Most math and art classes we have heard of focus primarily on introducing liberal arts students to mathematics. In a STEM context, we want to instead build on the mathematical knowledge that our students already have. We intend for students to use their existing mathematical (and perhaps artistic) knowledge to reinforce new artistic (and perhaps mathematical) experiences. Ideally, the knowledge and experience gained will increase their appreciation for both the beauty of mathematics and the importance of art.
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...Joshua Holden
C.P. Snow famously categorized modern intellectual life as being split between the culture of the sciences and the culture of the humanities, and said that solving the world's problems requires bringing these two cultures together. Math and art classes inherently try to do that. However, most math and art classes we have heard of focus primarily on introducing liberal arts students to mathematics. In the Spring Quarter of 2019 Soully Abas and I team-taught a different sort of course in mathematics and art at the Rose-Hulman Institute of Technology. Rose-Hulman is a private, undergraduate-focused institution, all of whose students major in engineering (predominantly), science, or mathematics. We wanted to build on the mathematical knowledge that our STEM students already have with a focus on having them make physical art objects. Soully is an art professor specializing in oil painting and printmaking. Josh is a math professor interested in the mathematics of fiber arts such as embroidery, knitting, crochet, and weaving. Our goal was for students to use their existing mathematical (and perhaps artistic) knowledge to reinforce new artistic (and perhaps mathematical) experiences. Ideally, the knowledge and experience gained will increase their appreciation for both the beauty of mathematics and the importance of art and help them prepare for productive lives solving the world's problems.
Teaching the Group Theory of Permutation CiphersJoshua Holden
One of the first topics often taught in an abstract algebra class is permutations, since they provide good examples of non-commutative finite groups which the students can manipulate and visualize. This visualization is often done through symmetry groups. For students who are less geometrically inclined, however, the use of permutation ciphers provides another good way of motivating permutations. They can easily be used to illustrate composition, non-commutativity, inverses, and the order of group elements, which are fundamental topics in group theory. We will give examples of how this can be done and suggest other courses besides abstract algebra in which this could also prove useful.
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...Joshua Holden
Until now, most methods for making a hyperbolic plane from crochet or similar fabrics have fallen into one of two categories. In one type, the work starts from a point or line and expands in a sequence of increasingly long rows, creating a constant negative curvature. In the other, polygonal tiles are created out of a more or less Euclidean fabric and then attached in such a way that the final product approximates a hyperbolic plane on the large scale with an average negative curvature. On the small scale, however, the curvature of the fabric will be closer to zero near the center of the tiles and more negative near the vertices and edges, depending on the amount of stretch in the fabric. The goal of this project is to show how crochet can be used to create polygonal tiles which themselves have constant negative curvature and can therefore be joined into a large region of a hyperbolic plane without significant stretching. Formulas from hyperbolic trigonometry are used to show how, in theory, any regular tiling of the hyperbolic plane can be produced in this way.
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...Joshua Holden
An Eulerian walk traverses each edge of a graph exactly once. What happens
if you want to traverse each edge of a graph exactly twice? If you want to
cover the graph with "double-running stitch", then you need to
traverse each edge twice but also put conditions on how many edges you
traverse in-between. Then you could add conditions on whether you traverse
the edges once in each direction or twice in the same direction. Which
graphs can you still traverse? Classical algorithms for solving mazes give
us some answers to these questions, but others are still open.
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...Joshua Holden
The mathematical study of braids combines aspects of topology and group theory to study mathematical representations of one-dimensional strands in three-dimensional space. These strands are also sometimes viewed as representing the movement through a time dimension of points in two-dimensional space. On the other hand, the study of cellular automata usually involves a one- or two-dimensional grid of cells which evolve through a time dimension according to specified rules. This time dimension is often represented as an extra spacial dimension. The ideas of representing both strands in space and cellular automata have also been explored in many artistic media, including drawing, sculpture, knitting, crochet, and weaving.
Previous work as been shown that rules for cellular automata can be written in order to produce depictions of braids. This talk will extend the previous system into a more flexible one which more realistically captures the behavior of strands in certain media, such as knitting. Some theorems about what can and cannot be represented with these cellular automata will be presented.
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...Joshua Holden
The mathematical study of braids combines aspects of topology and group theory to study mathematical representations of one-dimensional strands in three-dimensional space. These strands are also sometimes viewed as representing the movement through a time dimension of points in two-dimensional space. On the other hand, the study of cellular automata usually involves a one- or two-dimensional grid of cells which evolve through a time dimension according to specified rules. This time dimension is often represented as an extra spacial dimension. Therefore, it seems reasonable to ask whether rules for cellular automata can be written in order to produce depictions of braids. The ideas of representing both strands in space and cellular automata have also been explored in many artistic media, including knitting and crochet, where braids are called “cables”. We will view some examples of braids and their mathematical representations in these media.
Integrating the Use of Maple with the Collaborative Use of Wireless Tablet PCs. Workshop on the Impact of Pen-Based Technology on Education (poster session), Purdue University, October 16, 2008.
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...Joshua Holden
The mathematical study of braids combines aspects of topology and group theory to study mathematical representations of one-dimensional strands in three-dimensional space. These strands are also sometimes viewed as representing the movement through a time dimension of points in two-dimensional space. On the other hand, the study of cellular automata usually involves a one- or two-dimensional grid of cells which evolve through a time dimension according to specified rules. This time dimension is often represented as an extra spacial dimension.
Therefore, it seems reasonable to ask whether rules for cellular automata can be written in order to produce depictions of braids. The ideas of representing both strands in space and cellular automata have also been explored in many artistic media, including drawing, sculpture, knitting, crochet, and macramé, and we will touch on some of these.
Many people don't realize that what we now call "algorithm design" actually dates back to the ancient Greeks! Of course, if you think about it, there's always the "Euclidean Algorithm". A more dubious example might be Theseus's use of a ball of string to solve the "Labyrinth Problem". (Google "Theseus, Labyrinth, string".) Solutions to this problem got a lot less dubious after graph theory was invited, since a graph turns out to be a good way of representing a maze mathematically. We will examine the classical solutions to this problem, and then throw in a twist --- a Twisted Painting Machine that puts restrictions on which paths we can take to explore the maze. Applications to sewing may also appear, depending on the presence of audience interest and string.
Blackwork embroidery and algorithms for maze traversalsJoshua Holden
Blackwork embroidery is a needlework technique often associated with Elizabethan England. The patterns used in blackwork generally are traversed in a way that can be described by classical algorithms in graph theory, such as those used in “The Labyrinth Problem”. We investigate which of these maze-traversing algorithms can also be used to traverse blackwork patterns.
Cryptography and Computer Security for Undergraduates (Panel, SIGCSE 2004)
I have two goals in teaching cryptography to computer science students: to use cryptography as a cool way of introducing important areas of mathematics and computer science theory and to educate students in something that may be necessary for them to know in the future. For the past two years I have co-taught a course in cryptography at the Rose-Hulman Institute of Technology with David Mutchler, a colleague from the Computer Science department. The course is cross-listed in both the Computer Science and Mathematics departments, but most of the students are CS majors. The published prerequisites are one quarter of discrete mathematics and two quarters of computer science.
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...Joshua Holden
Cryptography is a field which has recently attracted a great deal of attention from both students and teachers of mathematics and of computer science. Students of computer science see cryptography as something which is not only "cool" but may be necessary for them to know in their future careers. Many of them do not realize, however, just how much mathematics they need to know in order to understand the algorithms which lie at the heart of modern cryptography.
Modular Arithmetic and Trap Door CiphersJoshua Holden
Like other branches of mathematics, number theory has seen many surprising developments in recent years. One of the most surprising is the fact that number theory, long considered the most "useless" of any field of mathematics, has become vital to the development of modern codes and ciphers. As an example, the RSA cryptosystem, eveloped in the 1970's by Rivest, Shamir, and Adleman, uses some ideas that are very easy to understand. Yet, these ideas underlie large portions of both modern number theory and modern cryptography. We will explore these ideas, and show how they make RSA the first practical "trap door" cipher. This means that anyone can encode a message but only the recipient can decode it!
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...Joshua Holden
The Pohlig-Hellman exponentiation cipher is a symmetric-key cipher that uses some of the same mathematical operations as the better-known RSA and Diffie-Hellman public-key cryptosystems. First published in 1978, the Pohlig-Hellman cipher was never of practical importance due to its slow speed compared to ciphers such as DES and AES. The theoretical importance of the Pohlig-Hellman cipher comes from the fact that it relies on the Discrete Logarithm Problem for its resistance against known plain text attacks, as does RSA and several other modern cryptosystems. For this reason, the Pohlig-Hellman systemcan play a very important role pedagogically, since it also shares many features in common with classical ciphers such as shift ciphers and Hill ciphers. Thus, it allows the instructor to introduce the important concepts of the discrete logarithm and known plain text attacks separately from the more conceptually difficult idea of public-key cryptography.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Teaching the Group Theory of Permutation CiphersJoshua Holden
One of the first topics often taught in an abstract algebra class is permutations, since they provide good examples of non-commutative finite groups which the students can manipulate and visualize. This visualization is often done through symmetry groups. For students who are less geometrically inclined, however, the use of permutation ciphers provides another good way of motivating permutations. They can easily be used to illustrate composition, non-commutativity, inverses, and the order of group elements, which are fundamental topics in group theory. We will give examples of how this can be done and suggest other courses besides abstract algebra in which this could also prove useful.
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...Joshua Holden
Until now, most methods for making a hyperbolic plane from crochet or similar fabrics have fallen into one of two categories. In one type, the work starts from a point or line and expands in a sequence of increasingly long rows, creating a constant negative curvature. In the other, polygonal tiles are created out of a more or less Euclidean fabric and then attached in such a way that the final product approximates a hyperbolic plane on the large scale with an average negative curvature. On the small scale, however, the curvature of the fabric will be closer to zero near the center of the tiles and more negative near the vertices and edges, depending on the amount of stretch in the fabric. The goal of this project is to show how crochet can be used to create polygonal tiles which themselves have constant negative curvature and can therefore be joined into a large region of a hyperbolic plane without significant stretching. Formulas from hyperbolic trigonometry are used to show how, in theory, any regular tiling of the hyperbolic plane can be produced in this way.
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...Joshua Holden
An Eulerian walk traverses each edge of a graph exactly once. What happens
if you want to traverse each edge of a graph exactly twice? If you want to
cover the graph with "double-running stitch", then you need to
traverse each edge twice but also put conditions on how many edges you
traverse in-between. Then you could add conditions on whether you traverse
the edges once in each direction or twice in the same direction. Which
graphs can you still traverse? Classical algorithms for solving mazes give
us some answers to these questions, but others are still open.
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...Joshua Holden
The mathematical study of braids combines aspects of topology and group theory to study mathematical representations of one-dimensional strands in three-dimensional space. These strands are also sometimes viewed as representing the movement through a time dimension of points in two-dimensional space. On the other hand, the study of cellular automata usually involves a one- or two-dimensional grid of cells which evolve through a time dimension according to specified rules. This time dimension is often represented as an extra spacial dimension. The ideas of representing both strands in space and cellular automata have also been explored in many artistic media, including drawing, sculpture, knitting, crochet, and weaving.
Previous work as been shown that rules for cellular automata can be written in order to produce depictions of braids. This talk will extend the previous system into a more flexible one which more realistically captures the behavior of strands in certain media, such as knitting. Some theorems about what can and cannot be represented with these cellular automata will be presented.
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...Joshua Holden
The mathematical study of braids combines aspects of topology and group theory to study mathematical representations of one-dimensional strands in three-dimensional space. These strands are also sometimes viewed as representing the movement through a time dimension of points in two-dimensional space. On the other hand, the study of cellular automata usually involves a one- or two-dimensional grid of cells which evolve through a time dimension according to specified rules. This time dimension is often represented as an extra spacial dimension. Therefore, it seems reasonable to ask whether rules for cellular automata can be written in order to produce depictions of braids. The ideas of representing both strands in space and cellular automata have also been explored in many artistic media, including knitting and crochet, where braids are called “cables”. We will view some examples of braids and their mathematical representations in these media.
Integrating the Use of Maple with the Collaborative Use of Wireless Tablet PCs. Workshop on the Impact of Pen-Based Technology on Education (poster session), Purdue University, October 16, 2008.
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...Joshua Holden
The mathematical study of braids combines aspects of topology and group theory to study mathematical representations of one-dimensional strands in three-dimensional space. These strands are also sometimes viewed as representing the movement through a time dimension of points in two-dimensional space. On the other hand, the study of cellular automata usually involves a one- or two-dimensional grid of cells which evolve through a time dimension according to specified rules. This time dimension is often represented as an extra spacial dimension.
Therefore, it seems reasonable to ask whether rules for cellular automata can be written in order to produce depictions of braids. The ideas of representing both strands in space and cellular automata have also been explored in many artistic media, including drawing, sculpture, knitting, crochet, and macramé, and we will touch on some of these.
Many people don't realize that what we now call "algorithm design" actually dates back to the ancient Greeks! Of course, if you think about it, there's always the "Euclidean Algorithm". A more dubious example might be Theseus's use of a ball of string to solve the "Labyrinth Problem". (Google "Theseus, Labyrinth, string".) Solutions to this problem got a lot less dubious after graph theory was invited, since a graph turns out to be a good way of representing a maze mathematically. We will examine the classical solutions to this problem, and then throw in a twist --- a Twisted Painting Machine that puts restrictions on which paths we can take to explore the maze. Applications to sewing may also appear, depending on the presence of audience interest and string.
Blackwork embroidery and algorithms for maze traversalsJoshua Holden
Blackwork embroidery is a needlework technique often associated with Elizabethan England. The patterns used in blackwork generally are traversed in a way that can be described by classical algorithms in graph theory, such as those used in “The Labyrinth Problem”. We investigate which of these maze-traversing algorithms can also be used to traverse blackwork patterns.
Cryptography and Computer Security for Undergraduates (Panel, SIGCSE 2004)
I have two goals in teaching cryptography to computer science students: to use cryptography as a cool way of introducing important areas of mathematics and computer science theory and to educate students in something that may be necessary for them to know in the future. For the past two years I have co-taught a course in cryptography at the Rose-Hulman Institute of Technology with David Mutchler, a colleague from the Computer Science department. The course is cross-listed in both the Computer Science and Mathematics departments, but most of the students are CS majors. The published prerequisites are one quarter of discrete mathematics and two quarters of computer science.
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...Joshua Holden
Cryptography is a field which has recently attracted a great deal of attention from both students and teachers of mathematics and of computer science. Students of computer science see cryptography as something which is not only "cool" but may be necessary for them to know in their future careers. Many of them do not realize, however, just how much mathematics they need to know in order to understand the algorithms which lie at the heart of modern cryptography.
Modular Arithmetic and Trap Door CiphersJoshua Holden
Like other branches of mathematics, number theory has seen many surprising developments in recent years. One of the most surprising is the fact that number theory, long considered the most "useless" of any field of mathematics, has become vital to the development of modern codes and ciphers. As an example, the RSA cryptosystem, eveloped in the 1970's by Rivest, Shamir, and Adleman, uses some ideas that are very easy to understand. Yet, these ideas underlie large portions of both modern number theory and modern cryptography. We will explore these ideas, and show how they make RSA the first practical "trap door" cipher. This means that anyone can encode a message but only the recipient can decode it!
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...Joshua Holden
The Pohlig-Hellman exponentiation cipher is a symmetric-key cipher that uses some of the same mathematical operations as the better-known RSA and Diffie-Hellman public-key cryptosystems. First published in 1978, the Pohlig-Hellman cipher was never of practical importance due to its slow speed compared to ciphers such as DES and AES. The theoretical importance of the Pohlig-Hellman cipher comes from the fact that it relies on the Discrete Logarithm Problem for its resistance against known plain text attacks, as does RSA and several other modern cryptosystems. For this reason, the Pohlig-Hellman systemcan play a very important role pedagogically, since it also shares many features in common with classical ciphers such as shift ciphers and Hill ciphers. Thus, it allows the instructor to introduce the important concepts of the discrete logarithm and known plain text attacks separately from the more conceptually difficult idea of public-key cryptography.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Chapter 3 - Islamic Banking Products and Services.pptx
A Good Hash Function is Hard to Find, and Vice Versa
1. A Good Hash Function is Hard to Find,
and Vice Versa
This is a really long string of text which is going to
Joshua Holden be the input to our hash function.
Rose-Hulman Institute of
Technology
01100011
2. A hash function is any function which takes an arbitrarily
long string as input and gives a fixed-length output.
Input:
(“Message”) This is a really long string of text which is going to
be the input to our hash function.
Output:
01100011
(“Hash value”)
2
3. An example: Write the message in rows of five letters,
convert to numbers, add down the columns modulo 26.
Input: HELLO 07 04 11 11 14
(“Message”) MYNAM 12 24 13 00 12
EISAL 04 08 18 00 11
ICEXX 08 02 04 23 23
05 12 20 08 08
Output: F M U I I
(“Hash value”)
[Barr, Invitation to Cryptology]
3
5. A hash function is not:
M
h M M M
M h h h
an encoding. secret.
5
6. What is a hash function good for? Maybe to make sure a
message hasn’t been altered.
Alice Eve Bob
Hi, Bob, this is
Hi, Bob, this is Hi, Bob, this is
Eve.
Alice. Eve.
00011100 00011100
00110001,
not 00011100
6
7. What is a hash function good for? Maybe to make sure a
message hasn’t been altered.
Hey!
Alice Eve Bob
Hi, Bob, this is
Hi, Bob, this is Hi, Bob, this is
Eve.
Alice. Eve.
00011100 00011100
00110001,
not 00011100
7
8. But of course, Eve could change the hash value as well as
the message.
?
Alice Eve Bob
Hi, Bob, this is
Hi, Bob, this is Hi, Bob, this is
Eve.
Alice. Eve.
00011100 00110001
Hash values by themselves only protect against 00110001
unintentional changes.
8
9. Alice could prevent this by “digitally signing” the hash
value.
Alice Eve Bob
Hi, Bob, this is
Hi, Bob, this is Hi, Bob, this is
Eve.
Alice. Eve.
00011100 00011100
Digitally signing a hash value is much more 00110001
efficient than signing a whole message!
9
10. What properties do we want a hash function to have?
1. It should be fast to compute.
10
11. What properties do we want a hash function to have?
1. It should be fast to compute.
2. It should distribute hash
values evenly.
M1 M2 M3 M4 M5 M6
h1 h2 h3
11
12. But for cryptographic purposes a hash function should also
be “cryptographically secure”.
M h 1. “One-way” a.k.a.
“preimage-resistant”
12
13. But for cryptographic purposes a hash function should also
be “cryptographically secure”.
M h 1. “One-way” a.k.a.
“preimage-resistant”
M1
2. “Second-preimage resistant”
M2 h
13
14. But for cryptographic purposes a hash function should also
be “cryptographically secure”.
M h 1. “One-way” a.k.a.
“preimage-resistant”
M1
2. “Second-preimage resistant”
M2 h
M1
h 3. “Collision-resistant”
M2
14
15. One common way that real hash functions achieve these
goals is with the Merkle-Damgård construction.
[Wikipedia]
IV = Initialization vector f = Compression function
If the compression function is collision-resistant, then so is the hash function.
15
16. Some common hash functions that use the
Merkle-Damgård construction:
[Wikipedia]
By Ronald Rivest: By NIST and the NSA:
• MD4 (Message Digest • SHA (Secure Hash Algorithm)
algorithm 4) • SHA-1 (slightly tweaked
• MD5 (an improved version version of SHA)
of MD4) • SHA-2 (significant revision of
SHA-1)
16
17. The compression function of MD5 is fairly typical of all of
these ciphers.
16 “steps”
message
word nonlinear
function
diffusion
round
constant
feedforward permutation
MD5 compression function One “step” of the function
[Stallings, Cryptography and Network Security]
17
18. My goals for a new hash function:
1. Can be done without a computer in a class period.
18
19. My goals for a new hash function:
1. Can be done without a computer in a class period.
2. Reasonably secure.
19
20. My goals for a new hash function:
1. Can be done without a computer in a class period.
2. Reasonably secure.
3. Uses elements from
“real” hash functions.
20
21. My goals for a new hash function:
1. Can be done without a computer in a class period.
2. Reasonably secure.
3. Uses elements from
“real” hash functions.
4. “Optimized” for a four-function calculator.
21
22. Our first example doesn’t stack up too well.
HELLO 07 04 11 11 14
MYNAM 12 24 13 00 12
EISAL 04 08 18 00 11
ICEXX 08 02 04 23 23
05 12 20 08 08
F M U I I
1. Can be done without a computer in a class period? Yes.
2. Reasonably secure? No
The problem is that it’s too easy to work backwards from the
hash to the preimage.
22
23. My first try: JHA (2000)
hash = (7 x # of vowels – 3 x # of consonants + # of spaces 2) modulo 17
Hello my name is Alice
(7 x 8 – 3 x 10 + 42) modulo 17 = 8
1. Can be done without a computer in a class period? Yes.
2. Reasonably secure? Not especially.
Preimages are not that easy, but second preimages and
collisions are.
23
24. My second try: JHA-1 (2010)
hash = 5(7 x # of vowels – 3 x # of consonants + # of spaces2) modulo 17
Hello my name is Alice
5(7 x 8 – 3 x 10 + 42) modulo 17 = 9
1. Can be done without a computer in a class period? Yes.
2. Reasonably secure? A little better.
Preimages are even harder, but second preimages and
collisions are still not that hard.
24
25. My latest try: JHA-2 (2011), uses Merkle-Damgård.
Convert letters to numbers, each block is one letter (two digits)
Two-digit length of message
IV = 76 No special
finalization
25
26. JHA-2 compression function:
A B
New message block
+
Operations are
modulo 100
diffusion* x7
permutation
feedforward +
*Thanks to Michael
Pridal-LoPiccolo!
26
27. An example:
H e l l o m y n a m e i s A l i c e
07 04 11 11 14 12 24 13 00 12 04 08 18 00 11 08 02 04 18
76
+ 07 new block
83
x 7
81
18
+ 76 feedforward
94
+ 04 new block
.
.
27
.
28. An example:
H e l l o m y n a m e
07 04 11 11 14 12 24 13 00 12 04
76 94 62 73 61 13 70 55 22 67 02 26
i s A l i c e
08 18 00 11 08 02 04 18
09 07 01 49 48 53 52 61
Hello, my name
is Alice. Hello, my name
61
is Alice.
61
28
29. An example:
H e l l o m y n a m e
07 04 11 11 14 12 24 13 00 12 04
76 94 62 73 61 13 70 55 22 67 02 26
i s A l i c e
08 18 00 11 08 02 04 18 Hi,
09 07 01 49 48 53 52 61 Alice!
Hello, my name
is Alice. Hello, my name
61
is Alice.
61
29
30. T h a n k s f o r
19 07 00 13 10 18 05 14 17
76 32 69 07 11 85 97 38 84 54
l i s t e n i n g
11 08 18 19 04 13 08 13 06 18
09 00 62 38 87 87 43 72 36 23
Bye!
http://www.rose-hulman.edu/~holden
30