The Code War

Total Page:16

File Type:pdf, Size:1020Kb

The Code War This article was published in 2003 and has not been updated or revised. BEYONDBEYOND DISCOVERYDISCOVERY® THE PATH FROM RESEARCH TO HUMAN BENEFIT THE CODE WAR efore the widespread use of computers and the about 25 years ago. The security of many public-key sys- Internet, cryptography—from the Greek kryptos tems (there are several kinds) is explicitly based on a B (hidden) and graphein (writing)—was largely long-standing challenge in the branch of mathematics the domain of the military or diplomats. Indeed, the known as number theory—the study of the properties earliest recorded instance of encryption dates to about and patterns of integers, whole numbers such as -2, -1, 400 BC, when the Spartans used a device called a scytale 0, 1, 2,…100,… Number theory has for centuries been to send coded messages between military commanders. widely regarded as the purest of the pure sciences, but in A strip of parchment or leather was wrapped spirally recent years it has found many applications. around a baton or staff of a certain diameter. The Number theory has played an essential role in the sender wrote the message down the length of the staff, development of public-key cryptography. Without the and then unwrapped the parchment, effectively scram- basic inquiry carried out by early theorists, today’s com- bling the order of the letters. To decode the message, the puter transactions would be easy pickings for would-be recipient had to wrap the parchment around a staff of thieves and swindlers. The number theorists’ challenge the same diameter, whereupon the transposed letters to potential intruders is this: Given a (very, very large) returned to their original order. number obtained by multiplying two other numbers, In today’s information age, we make use of data find the two (very large) numbers that were multiplied scrambling whenever we use a password to check e-mail, to produce it. These numbers can be thought of as the withdraw money from an automated bank teller keys that lock and unlock the encryption code. The task machine, make a cellular phone call, or charge a pur- of finding these keys is so difficult that the snoops must chase over the Internet. We rely on encryption to ensure either be bizarrely lucky (as lucky, say, as one person the validity of our financial transactions, prove our winning 20 state lotteries simultaneously) or they must identity, and safeguard our solve a problem that has privacy. Although some stumped the smartest people people hesitate to conduct in the world for more than business over the Internet, 2000 years. Every time we most of us engage in online conduct an encrypted transactions with confi- transaction, we’re betting dence that encryption pro- that the snoops will lose. tects our activities. This faith is generally well founded. Many of the new methods of encrypting Modern e-commerce is pro- and decrypting information tected by reliable encryption involve public-key cryptogra- techniques. Photo ©PhotoDisc phy, which was invented This article was published in 2003 and has not been updated or revised. Plaintext: THE BUTCHER THE BAKER AND THE CANDLESTICK MAKER Early Ciphers Key: BIG BIGBIGB IGB IGBIG BIG BIG BIGBIGBIGBI GBIGB Encryption’s history has been one of unceasing efforts to devise uncrackable codes—and equally Ciphertext: UPK CCZDPKS BNF JGLMX BVJ unceasing efforts to crack them. Early ciphers were UPK DITETKTBODS SBSKS relatively simple systems, easy for both sender and Knowing that “BIG” was the key, the recipient receiver to use. Julius Caesar, for instance, encoded could easily decipher the message by shifting its letters messages with a “substitution cipher” in which each back the corresponding amounts. letter is replaced by the third letter after it in the For many years Vigenère’s cipher was considered alphabet: A is replaced by D, B by E, etc. At the end unbreakable, but Charles Babbage, an independently of the alphabet, the pattern wraps around to the wealthy Englishman known mostly for his pioneer- beginning: X becomes A, Y becomes B, and Z ing work in computer science, showed in the 1850s becomes C. Unfortunately, simplicity of use is a dou- that it was not so. Babbage hacked the system by ble-edged sword: The ciphertext thus encoded is looking for repeated strings of letters. Of course, highly susceptible to being decoded. Caesar’s cipher the strength of Vigenère’s cipher was supposed to can be cracked simply by moving each letter in the be that it encoded letters differently in different encoded message back three spaces in the alphabet. places. The first “THE” in the message above is More sophisticated substitution ciphers, in which the rendered as “UPK” and the second as “BNF”. alphabet is thoroughly scrambled, are nevertheless Also, the two “AKER”s code differently. But the easy enough for amateurs to break, as fans of the first and third “THE”s both code as “UPK.” The “Cryptoquote” puzzles in today’s magazines and “T” in the first “THE” is coded with a “B,” and so newspapers can attest. In any sufficiently long pas- is the “T” in the third “THE.” This happens sage of English text, the most common letter is usual- because the third “THE” begins 21 letters after the ly “E,” the second most common is “T,” and a three- first “THE”; hence the 3-letter keyword “BIG” has letter word that appears repeatedly is probably cycled around 7 times and is back to the beginning “THE.” By applying this type of “frequency analy- again. sis,” an eavesdropper can easily guess which letters in In any message that is much longer than the key, the ciphertext represent “E,” “T” and so on. some repeats of this sort are bound to occur. How Over the years, people who wanted greater secre- would an eavesdropper exploit this fact? If, say, the cy came up with more elaborate coding schemes. ciphertext “UPK” appeared twice, 21 letters apart, In the 1500s, Blaise de Vigenère, a French diplomat, then he could deduce that 21 was probably a multiple invented a method for encrypting different letters in of the keyword’s length. Or to put it another way, a message with different ciphers. Thus, an “E” in the number of letters in the keyword was a divisor of one position might be coded as “M,” while an “E” 21. (A divisor or factor of a number is a number that in another position might be coded as “K,” thereby goes into it with no remainder. The divisors of 21 are foiling anyone attempting to decode the message 1, 3, 7, and 21.) using frequency analysis. Given enough clues of this sort, an eavesdropper In the Vigenère cipher, the sender and recipient could pin down the exact length of the keyword. had to agree on a keyword (or perhaps a literary pas- Once he knew the length, he could do ordinary fre- sage) whose letters told them how far forward or quency analysis to decode the message. Notice that backward to shift the alphabet for every letter in the the math comes first: The eavesdropper figures out message. If the keyword “BIG” was used for example, the length of the keyword before even attempting to the sender would code the message in sets of three let- figure out what its letters are. ters. The first letter of the first trio would need to be Babbage’s ingenious technique broke new ground shifted forward by one (since “B” is one letter after in cryptography by introducing mathematical tools to “A”), the second letter would need to be shifted for- a subject that previously had seemed to be about ward by eight (“I” is eight letters after “A”), and the words. Even if an encryption system does not use third letter would need to be shifted forward by six mathematics explicitly, its hidden patterns can often (“G” is six letters after “A”). After that, the pattern be teased out that way. Mathematics is, after all, the would repeat itself as in the following example: science of patterns. 2 BEYOND DISCOVERY This article was published in 2003 and has not been updated or revised. to be sent. This might just be feasible for messages to a single spy, but it would never be practical for The Enigma Challenge widespread military or commercial use. The “key distribution problem,” as this difficulty is known, Although perhaps not fully appreciated, would remain an obstacle until the latter part of the mathematical decryption techniques made a huge twentieth century, when mathematics once again contribution to the Allied victory in World War II. came to the rescue. In that war, Germany encrypted most of its military transmissions with a machine called “Enigma.” Part electrical, part mechanical, it was like a combination lock with more than 1023 possible combinations. In Cryptography We Trust (For comparison, this is roughly the number of tablespoons of water in all the world’s oceans.) All encryption systems invented before 1970 had Moreover, the Germans changed the combination one thing in common: They were symmetric. In every day—sometimes several times a day. other words, the keys for encryption and decryption Recipients of the transmissions needed to possess were the same, so a person in possession of the key not only a duplicate Enigma machine, but also to could either send or receive messages. But in the know the correct combination. early 1970s, Whitfield Diffie of Stanford University If the Allies had had to rely solely on frequency realized that for some applications this two-way capa- analysis or trial and error, they would still be hunting bility was superfluous.
Recommended publications
  • Quantum Cryptography Without Basis Switching 2004
    Quantum Cryptography Without Basis Switching Christian Weedbrook B.Sc., University of Queensland, 2003. A thesis submitted for the degree of Bachelor of Science Honours in Physics The Australian National University October 2004 ii iii Listen, do you want to know a secret? Do you promise not to tell? - John Lennon and Paul McCartney iv Declaration This thesis is an account of research undertaken with the supervision of Dr Ping Koy Lam, Dr Tim Ralph and Dr Warwick Bowen between February 2004 and October 2004. It is a partial fulfilment of the requirements for the degree of a Bachelor of Science with Honours in theoretical physics at the Australian National University, Canberra, Australia. Except where acknowledged in the customary manner, the material presented in this thesis is, to the best of my knowledge, original and has not been submitted in whole or part for a degree in any university. Christian Weedbrook 29th October 2004 v vi Acknowledgements During the three years of residency, it was the relationships that got you through. - J.D., Scrubs I have met a lot of people during my Honours year, and a lot of people to thank and be thankful for. First I would like to thank my supervisors Ping Koy Lam, Tim Ralph, Warwick Bowen and my “unofficial” supervisor Andrew Lance. Ping Koy, thank you for your positive approach and enthusiasm. It was excellent having you as my supervisor, as you have many ideas and the ability to know the best way to proceed. I would like to thank you for my scholarship and also for organizing that I could do my Honours at ANU, and to spend some time up at UQ.
    [Show full text]
  • 1914 Martin Gardner
    ΠME Journal, Vol. 13, No. 10, pp 577–609, 2014. 577 THE PI MU EPSILON 100TH ANNIVERSARY PROBLEMS: PART II STEVEN J. MILLER∗, JAMES M. ANDREWS†, AND AVERY T. CARR‡ As 2014 marks the 100th anniversary of Pi Mu Epsilon, we thought it would be fun to celebrate with 100 problems related to important mathematics milestones of the past century. The problems and notes below are meant to provide a brief tour through some of the most exciting and influential moments in recent mathematics. No list can be complete, and of course there are far too many items to celebrate. This list must painfully miss many people’s favorites. As the goal is to introduce students to some of the history of mathematics, ac- cessibility counted far more than importance in breaking ties, and thus the list below is populated with many problems that are more recreational. Many others are well known and extensively studied in the literature; however, as our goal is to introduce people to what can be done in and with mathematics, we’ve decided to include many of these as exercises since attacking them is a great way to learn. We have tried to include some background text before each problem framing it, and references for further reading. This has led to a very long document, so for space issues we split it into four parts (based on the congruence of the year modulo 4). That said: Enjoy! 1914 Martin Gardner Few twentieth-century mathematical authors have written on such diverse sub- jects as Martin Gardner (1914–2010), whose books, numbering over seventy, cover not only numerous fields of mathematics but also literature, philosophy, pseudoscience, religion, and magic.
    [Show full text]
  • Historical Ciphers • A
    ECE 646 - Lecture 6 Required Reading • W. Stallings, Cryptography and Network Security, Chapter 2, Classical Encryption Techniques Historical Ciphers • A. Menezes et al., Handbook of Applied Cryptography, Chapter 7.3 Classical ciphers and historical development Why (not) to study historical ciphers? Secret Writing AGAINST FOR Steganography Cryptography (hidden messages) (encrypted messages) Not similar to Basic components became modern ciphers a part of modern ciphers Under special circumstances modern ciphers can be Substitution Transposition Long abandoned Ciphers reduced to historical ciphers Transformations (change the order Influence on world events of letters) Codes Substitution The only ciphers you Ciphers can break! (replace words) (replace letters) Selected world events affected by cryptology Mary, Queen of Scots 1586 - trial of Mary Queen of Scots - substitution cipher • Scottish Queen, a cousin of Elisabeth I of England • Forced to flee Scotland by uprising against 1917 - Zimmermann telegram, America enters World War I her and her husband • Treated as a candidate to the throne of England by many British Catholics unhappy about 1939-1945 Battle of England, Battle of Atlantic, D-day - a reign of Elisabeth I, a Protestant ENIGMA machine cipher • Imprisoned by Elisabeth for 19 years • Involved in several plots to assassinate Elisabeth 1944 – world’s first computer, Colossus - • Put on trial for treason by a court of about German Lorenz machine cipher 40 noblemen, including Catholics, after being implicated in the Babington Plot by her own 1950s – operation Venona – breaking ciphers of soviet spies letters sent from prison to her co-conspirators stealing secrets of the U.S. atomic bomb in the encrypted form – one-time pad 1 Mary, Queen of Scots – cont.
    [Show full text]
  • I – Basic Notions
    Provable Security in the Computational Model I – Basic Notions David Pointcheval MPRI – Paris Ecole normale superieure,´ CNRS & INRIA ENS/CNRS/INRIA Cascade David Pointcheval 1/71 Outline Cryptography Provable Security Basic Security Notions Conclusion ENS/CNRS/INRIA Cascade David Pointcheval 2/71 Cryptography Outline Cryptography Introduction Kerckhoffs’ Principles Formal Notations Provable Security Basic Security Notions Conclusion ENS/CNRS/INRIA Cascade David Pointcheval 3/71 Secrecy of Communications One ever wanted to communicate secretly The treasure Bob is under Alice …/... ENS/CNRS/INRIA Cascade David Pointcheval 4/71 Secrecy of Communications One ever wanted to communicate secretly The treasure Bob is under Alice …/... ENS/CNRS/INRIA Cascade David Pointcheval 4/71 Secrecy of Communications One ever wanted to communicate secretly The treasure Bob is under Alice …/... ENS/CNRS/INRIA Cascade David Pointcheval 4/71 Secrecy of Communications One ever wanted to communicate secretly The treasure Bob is under Alice …/... ENS/CNRS/INRIA Cascade David Pointcheval 4/71 Secrecy of Communications One ever wanted to communicate secretly The treasure Bob is under Alice …/... With the all-digital world, security needs are even stronger ENS/CNRS/INRIA Cascade David Pointcheval 4/71 Old Methods Substitutions and permutations Security relies on the secrecy of the mechanism ENS/CNRS/INRIA Cascade David Pointcheval 5/71 Old Methods Substitutions and permutations Security relies on the secrecy of the mechanism Scytale - Permutation ENS/CNRS/INRIA
    [Show full text]
  • Short History Polybius's Square History – Ancient Greece
    CRYPTOLOGY : CRYPTOGRAPHY + CRYPTANALYSIS Polybius’s square Polybius, Ancient Greece : communication with torches Cryptology = science of secrecy. How : 12345 encipher a plaintext into a ciphertext to protect its secrecy. 1 abcde The recipient deciphers the ciphertext to recover the plaintext. 2 f g h ij k A cryptanalyst shouldn’t complete a successful cryptanalysis. 3 lmnop 4 qrstu Attacks [6] : 5 vwxyz known ciphertext : access only to the ciphertext • known plaintexts/ciphertexts : known pairs TEXT changed in 44,15,53,44. Characteristics • (plaintext,ciphertext) ; search for the key encoding letters by numbers chosen plaintext : known cipher, chosen cleartexts ; • shorten the alphabet’s size • search for the key encode• a character x over alphabet A in y finite word over B. Polybius square : a,...,z 1,...,5 2. { } ! { } Short history History – ancient Greece J. Stern [8] : 3 ages : 500 BC : scytale of Sparta’s generals craft age : hieroglyph, bible, ..., renaissance, WW2 ! • technical age : complex cipher machines • paradoxical age : PKC • Evolves through maths’ history, computing and cryptanalysis : manual • electro-mechanical • by computer Secret key : diameter of the stick • History – Caesar Goals of cryptology Increasing number of goals : secrecy : an enemy shouldn’t gain access to information • authentication : provides evidence that the message • comes from its claimed sender signature : same as auth but for a third party • minimality : encipher only what is needed. • Change each char by a char 3 positions farther A becomes d, B becomes e... The plaintext TOUTE LA GAULE becomes wrxwh od jdxoh. Why enciphering ? The tools Yesterday : • I for strategic purposes (the enemy shouldn’t be able to read messages) Information Theory : perfect cipher I by the church • Complexity : most of the ciphers just ensure computational I diplomacy • security Computer science : all make use of algorithms • Mathematics : number theory, probability, statistics, Today, with our numerical environment • algebra, algebraic geometry,..
    [Show full text]
  • An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext
    An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext By Isaac Quinn DuPont A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by Isaac Quinn DuPont 2017 ii An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext Isaac Quinn DuPont Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract Tis dissertation is an archeological study of cryptography. It questions the validity of thinking about cryptography in familiar, instrumentalist terms, and instead reveals the ways that cryptography can been understood as writing, media, and computation. In this dissertation, I ofer a critique of the prevailing views of cryptography by tracing a number of long overlooked themes in its history, including the development of artifcial languages, machine translation, media, code, notation, silence, and order. Using an archeological method, I detail historical conditions of possibility and the technical a priori of cryptography. Te conditions of possibility are explored in three parts, where I rhetorically rewrite the conventional terms of art, namely, plaintext, encryption, and ciphertext. I argue that plaintext has historically been understood as kind of inscription or form of writing, and has been associated with the development of artifcial languages, and used to analyze and investigate the natural world. I argue that the technical a priori of plaintext, encryption, and ciphertext is constitutive of the syntactic iii and semantic properties detailed in Nelson Goodman’s theory of notation, as described in his Languages of Art. I argue that encryption (and its reverse, decryption) are deterministic modes of transcription, which have historically been thought of as the medium between plaintext and ciphertext.
    [Show full text]
  • Program of the Sessions San Diego, California, January 9–12, 2013
    Program of the Sessions San Diego, California, January 9–12, 2013 AMS Short Course on Random Matrices, Part Monday, January 7 I MAA Short Course on Conceptual Climate Models, Part I 9:00 AM –3:45PM Room 4, Upper Level, San Diego Convention Center 8:30 AM –5:30PM Room 5B, Upper Level, San Diego Convention Center Organizer: Van Vu,YaleUniversity Organizers: Esther Widiasih,University of Arizona 8:00AM Registration outside Room 5A, SDCC Mary Lou Zeeman,Bowdoin upper level. College 9:00AM Random Matrices: The Universality James Walsh, Oberlin (5) phenomenon for Wigner ensemble. College Preliminary report. 7:30AM Registration outside Room 5A, SDCC Terence Tao, University of California Los upper level. Angles 8:30AM Zero-dimensional energy balance models. 10:45AM Universality of random matrices and (1) Hans Kaper, Georgetown University (6) Dyson Brownian Motion. Preliminary 10:30AM Hands-on Session: Dynamics of energy report. (2) balance models, I. Laszlo Erdos, LMU, Munich Anna Barry*, Institute for Math and Its Applications, and Samantha 2:30PM Free probability and Random matrices. Oestreicher*, University of Minnesota (7) Preliminary report. Alice Guionnet, Massachusetts Institute 2:00PM One-dimensional energy balance models. of Technology (3) Hans Kaper, Georgetown University 4:00PM Hands-on Session: Dynamics of energy NSF-EHR Grant Proposal Writing Workshop (4) balance models, II. Anna Barry*, Institute for Math and Its Applications, and Samantha 3:00 PM –6:00PM Marina Ballroom Oestreicher*, University of Minnesota F, 3rd Floor, Marriott The time limit for each AMS contributed paper in the sessions meeting will be found in Volume 34, Issue 1 of Abstracts is ten minutes.
    [Show full text]
  • Polish Mathematicians Finding Patterns in Enigma Messages
    Fall 2006 Chris Christensen MAT/CSC 483 Machine Ciphers Polyalphabetic ciphers are good ways to destroy the usefulness of frequency analysis. Implementation can be a problem, however. The key to a polyalphabetic cipher specifies the order of the ciphers that will be used during encryption. Ideally there would be as many ciphers as there are letters in the plaintext message and the ordering of the ciphers would be random – an one-time pad. More commonly, some rotation among a small number of ciphers is prescribed. But, rotating among a small number of ciphers leads to a period, which a cryptanalyst can exploit. Rotating among a “large” number of ciphers might work, but that is hard to do by hand – there is a high probability of encryption errors. Maybe, a machine. During World War II, all the Allied and Axis countries used machine ciphers. The United States had SIGABA, Britain had TypeX, Japan had “Purple,” and Germany (and Italy) had Enigma. SIGABA http://en.wikipedia.org/wiki/SIGABA 1 A TypeX machine at Bletchley Park. 2 From the 1920s until the 1970s, cryptology was dominated by machine ciphers. What the machine ciphers typically did was provide a mechanical way to rotate among a large number of ciphers. The rotation was not random, but the large number of ciphers that were available could prevent depth from occurring within messages and (if the machines were used properly) among messages. We will examine Enigma, which was broken by Polish mathematicians in the 1930s and by the British during World War II. The Japanese Purple machine, which was used to transmit diplomatic messages, was broken by William Friedman’s cryptanalysts.
    [Show full text]
  • Integrity, Authentication and Confidentiality in Public-Key Cryptography Houda Ferradi
    Integrity, authentication and confidentiality in public-key cryptography Houda Ferradi To cite this version: Houda Ferradi. Integrity, authentication and confidentiality in public-key cryptography. Cryptography and Security [cs.CR]. Université Paris sciences et lettres, 2016. English. NNT : 2016PSLEE045. tel- 01745919 HAL Id: tel-01745919 https://tel.archives-ouvertes.fr/tel-01745919 Submitted on 28 Mar 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE DE DOCTORAT de l’Université de recherche Paris Sciences et Lettres PSL Research University Préparée à l’École normale supérieure Integrity, Authentication and Confidentiality in Public-Key Cryptography École doctorale n◦386 Sciences Mathématiques de Paris Centre Spécialité Informatique COMPOSITION DU JURY M. FOUQUE Pierre-Alain Université Rennes 1 Rapporteur M. YUNG Moti Columbia University et Snapchat Rapporteur M. FERREIRA ABDALLA Michel Soutenue par Houda FERRADI CNRS, École normale supérieure le 22 septembre 2016 Membre du jury M. CORON Jean-Sébastien Université du Luxembourg Dirigée par
    [Show full text]
  • The the Enigma Enigma Machinemachine
    TheThe EnigmaEnigma MachineMachine History of Computing December 6, 2006 Mike Koss Invention of Enigma ! Invented by Arthur Scherbius, 1918 ! Adopted by German Navy, 1926 ! Modified military version, 1930 ! Two Additional rotors added, 1938 How Enigma Works Scrambling Letters ! Each letter on the keyboard is connected to a lamp letter that depends on the wiring and position of the rotors in the machine. ! Right rotor turns before each letter. How to Use an Enigma ! Daily Setup – Secret settings distributed in code books. ! Encoding/Decoding a Message Setup: Select (3) Rotors ! We’ll use I-II-III Setup: Rotor Ring Settings ! We’ll use A-A-A (or 1-1-1). Rotor Construction Setup: Plugboard Settings ! We won’t use any for our example (6 to 10 plugs were typical). Setup: Initial Rotor Position ! We’ll use “M-I-T” (or 13-9-20). Encoding: Pick a “Message Key” ! Select a 3-letter key (or indicator) “at random” (left to the operator) for this message only. ! Say, I choose “M-C-K” (or 13-3-11 if wheels are printed with numbers rather than letters). Encoding: Transmit the Indicator ! Germans would transmit the indicator by encoding it using the initial (daily) rotor position…and they sent it TWICE to make sure it was received properly. ! E.g., I would begin my message with “MCK MCK”. ! Encoded with the daily setting, this becomes: “NWD SHE”. Encoding: Reset Rotors ! Now set our rotors do our chosen message key “M-C-K” (13-3-11). ! Type body of message: “ENIGMA REVEALED” encodes to “QMJIDO MZWZJFJR”.
    [Show full text]
  • Cryptology and Computational Number Theory (Boulder, Colorado, August 1989) 41 R
    http://dx.doi.org/10.1090/psapm/042 Other Titles in This Series 50 Robert Calderbank, editor, Different aspects of coding theory (San Francisco, California, January 1995) 49 Robert L. Devaney, editor, Complex dynamical systems: The mathematics behind the Mandlebrot and Julia sets (Cincinnati, Ohio, January 1994) 48 Walter Gautschi, editor, Mathematics of Computation 1943-1993: A half century of computational mathematics (Vancouver, British Columbia, August 1993) 47 Ingrid Daubechies, editor, Different perspectives on wavelets (San Antonio, Texas, January 1993) 46 Stefan A. Burr, editor, The unreasonable effectiveness of number theory (Orono, Maine, August 1991) 45 De Witt L. Sumners, editor, New scientific applications of geometry and topology (Baltimore, Maryland, January 1992) 44 Bela Bollobas, editor, Probabilistic combinatorics and its applications (San Francisco, California, January 1991) 43 Richard K. Guy, editor, Combinatorial games (Columbus, Ohio, August 1990) 42 C. Pomerance, editor, Cryptology and computational number theory (Boulder, Colorado, August 1989) 41 R. W. Brockett, editor, Robotics (Louisville, Kentucky, January 1990) 40 Charles R. Johnson, editor, Matrix theory and applications (Phoenix, Arizona, January 1989) 39 Robert L. Devaney and Linda Keen, editors, Chaos and fractals: The mathematics behind the computer graphics (Providence, Rhode Island, August 1988) 38 Juris Hartmanis, editor, Computational complexity theory (Atlanta, Georgia, January 1988) 37 Henry J. Landau, editor, Moments in mathematics (San Antonio, Texas, January 1987) 36 Carl de Boor, editor, Approximation theory (New Orleans, Louisiana, January 1986) 35 Harry H. Panjer, editor, Actuarial mathematics (Laramie, Wyoming, August 1985) 34 Michael Anshel and William Gewirtz, editors, Mathematics of information processing (Louisville, Kentucky, January 1984) 33 H. Peyton Young, editor, Fair allocation (Anaheim, California, January 1985) 32 R.
    [Show full text]
  • On the Binary Expansions of Algebraic Numbers Tome 16, No 3 (2004), P
    David H. BAILEY, Jonathan M. BORWEIN, Richard E. CRANDALL et Carl POMERANCE On the binary expansions of algebraic numbers Tome 16, no 3 (2004), p. 487-518. <http://jtnb.cedram.org/item?id=JTNB_2004__16_3_487_0> © Université Bordeaux 1, 2004, tous droits réservés. L’accès aux articles de la revue « Journal de Théorie des Nom- bres de Bordeaux » (http://jtnb.cedram.org/), implique l’accord avec les conditions générales d’utilisation (http://jtnb.cedram. org/legal/). Toute reproduction en tout ou partie cet article sous quelque forme que ce soit pour tout usage autre que l’utilisation à fin strictement personnelle du copiste est constitutive d’une infrac- tion pénale. Toute copie ou impression de ce fichier doit contenir la présente mention de copyright. cedram Article mis en ligne dans le cadre du Centre de diffusion des revues académiques de mathématiques http://www.cedram.org/ Journal de Th´eoriedes Nombres de Bordeaux 16 (2004), 487–518 On the binary expansions of algebraic numbers par David H. BAILEY, Jonathan M. BORWEIN, Richard E. CRANDALL et Carl POMERANCE Resum´ e.´ En combinant des concepts de th´eorie additive des nom- bres avec des r´esultats sur les d´eveloppements binaires et les s´eries partielles, nous ´etablissons de nouvelles bornes pour la densit´ede 1 dans les d´eveloppements binaires de nombres alg´ebriques r´eels. Un r´esultat clef est que si un nombre r´eel y est alg´ebrique de degr´e D > 1, alors le nombre #(|y|,N) de 1 dans le d´eveloppement de |y| parmi les N premiers chiffres satisfait #(|y|,N) > CN 1/D avec un nombre positif C (qui d´epend de y), la minoration ´etant vraie pour tout N suffisamment grand.
    [Show full text]