Andrew Odlyzko

Total Page:16

File Type:pdf, Size:1020Kb

Andrew Odlyzko Mathematical computation, mathematical insight, and mathematical truth Andrew Odlyzko School of Mathematics University of Minnesota [email protected] http://www.dtc.umn.edu/∼odlyzko July 31, 2014 Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 1 / 22 The mysteries of prime numbers: Mathematicians have tried in vain to discover some order in the sequence of prime numbers but we have every reason to believe that there are some mysteries which the human mind will never penetrate. To convince ourselves, we have only to cast a glance at tables of primes (which some have constructed to values beyond 100,000) and we should perceive that there reigns neither order nor rule. Euler, 1751 Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 2 / 22 Computing in mathematics: long history growing role “You waste that which is plentiful” (George Gilder) needed to cope with greater complexity and sophistication Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 3 / 22 Computing in mathematics: Gaining insight and intuition, or just knowledge. Discovering new facts, patterns, and relationships. Graphing to expose mathematical facts, structures, or principles. Rigorously testing and especially falsifying conjectures. Exploring a possible result to see if it merits formal proof. Suggesting approaches for formal proof. Computing replacing lengthy hand derivations. Confirming analytically derived results. Borwein and Bailey, Mathematics by Experiment Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 4 / 22 1975 MIT PhD thesis: bounds for discriminants of number fields key element of published formal proof: nonnegativity of rational function 160 98 u2 − 53 1536u2 − 2048 + ··· + − 3(u2 + 4) 25 u4 − 90u2 + 2809 (u2 + 4)3 linear programming and symbolic algebra packages in the background, everything verifiable with paper and pencil Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 5 / 22 Empirical results based on heuristics and theory: sparse linear systems arising in integer factorization and discrete logs: n2 or n3 ? Monte Carlo simulations (1983–84) leading to “intelligent gaussian elimination” (later “structured gaussian elimination” and now “filtering”) stimulated (1984): conjugate gradient for finite fields Lanczos for finite fields Wiedemann algorithm Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 6 / 22 Mertens Conjecture disproof (with te Riele): ρ x x M(x)= n µ(n)= + ··· =1 ρζ′(ρ) P Xρ Ingham innovation: weighted average of M(x) = more tractable sum over ρ need to find x that makes sum large (L3 algorithm, but irrelevant how it is done) and prove it works (rigor !!!) Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 7 / 22 Critical strip: complex s−plane critical strip critical line 0 1/2 1 Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 8 / 22 Riemann, 1859: almost all nontrivial zeros of the zeta function are on the critical line (positive assertion, no hint of proof) it is likely that all such zeros are on the critical line (now called the Riemann Hypothesis, RH) (ambiguous: cites computations of Gauss and others, not clear how strongly he believed in it) π(x) < Li(x) unknown until Siegel discovery in Riemann’s private papers: extensive hand computations of zeros with a very efficient algorithm Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 9 / 22 Interest in zeros of zeta function: numerical verification of RH π(x) − Li(x) and related functions (more recently) distribution questions related to hypothetical random matrix connections Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 10 / 22 Zeta zeros and random matrices: Nearest neighbor spacings among first 1,000,000 zeros density 0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.5 1.0 1.5 2.0 2.5 3.0 normalized spacing Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 11 / 22 Zeta zeros and random matrices: Nearest neighbor spacings among 1,041,600 zeros near the 2*10^20-th zero density 0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.5 1.0 1.5 2.0 2.5 3.0 normalized spacing Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 12 / 22 Zeta zeros and random matrices: Nearest neighbor spacings: Empirical minus expected density difference -0.0100.0 -0.005 0.5 0.0 0.005 1.0 0.010 1.5 2.0 2.5 3.0 normalized spacing Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 13 / 22 Moment results and conjectures: T 1 1 2k Ik (T ) = |ζ( + it)| dt T 2 Z0 Known: I1(T ) ∼ log T as T →∞ I T 1 T 4 T 2( ) ∼ 2π2 (log ) as →∞ Conjectures: for all k ≥ 1, k2 (i) Ik (T ) ∼ ck (log T ) as T →∞ G 2(k+1) (ii) ck = a(k) G(2k+1) ∞ 2 2 Γ(m + k) − a(k) = (1 − 1/p)k p m (m!)2Γ(k)2 p m=0 ! Y X Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 14 / 22 Moment computations: Computations: T +H 1 1 2k Jk (T , H) = |ζ( + it)| dt H 2 ZT 23 6 Values of Jk (T , H) for T near 10 -rd zero: H interval of length approx. 10 zeros k =1 k =2 k =3 50.11 34.89 × 104 18.74 × 109 49.94 38.02 × 104 27.78 × 109 50.07 38.47 × 104 37.69 × 109 49.64 27.86 × 104 8.47 × 109 50.27 53.03 × 104 75.77 × 109 50.11 41.01 × 104 46.18 × 109 50.23 36.59 × 104 19.43 × 109 50.52 38.74 × 104 24.57 × 109 Consecutive blocks of approx. 106 zeros. Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 15 / 22 Numerical evidence, “genericity,” and truth: empirically, primes and zeros exhibit random behavior random models produce nice results, and are often testable BUT primes show deviations from random predictions at small scale (Maier’s results) and on very large scale (on log(x) scale, harmonic series with frequencies determined by zeta zeros) Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 16 / 22 Zeros of the zeta function: N(t) = number of zeros ρ with 0 < Im(ρ) < t 1 N(t)=1+ θ(t)+ S(t) π where θ(t) is a smooth function, and |S(t)| = O(log t) t1 S(u)du = O(log t ) Z 1 t0 Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 17 / 22 Typical behavior of S(t): S(t) around zero number 10^23 S(t) −1.0 −0.5 0.0 0.5 1.0 1 2 3 4 Gram point scale Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 18 / 22 Beware the law of small numbers (especially in number theory): 1 N(t)=1+ π θ(t)+ S(t) where θ(t) is a smooth function, and S(t) is small: |S(t)| = O(log t) 1 t S(u)2du ∼ c log log t t Z10 |S(t)| < 1 for t < 280 |S(t)| < 2 for t < 6.8 × 106 Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 19 / 22 extreme among 106 zeros near zero 1023: extreme S(t) around zero number 10^23 S(t) −2.0 −1.5 −1.0 −0.5 0.0 0.5 1.0 5 10 15 20 25 Gram point scale Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 20 / 22 Beware the law of small numbers (cont’d): we have not seen “typical” behavior of S(t) we are not likely to ever see “typical” behavior of S(t) by direct computation counterexamples to the Riemann Hypothesis (if they exist) are likely to be far beyond reach of any direct computational methods we can even imagine Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 21 / 22 Sign in program counseling office, 1970s: We are sorry that we have not been able to solve all of your problems, and we realize that you are about as confused now as when you came to us for help. However, we hope that you are now confused on a higher level of understanding than before. Andrew Odlyzko ( SchoolMathematical of Mathematics University of Minnesota computation,[email protected] http://www.dtc.umn.edu/ 31, 2014 mathematical 22 / 22.
Recommended publications
  • Polynomial Sequences of Binomial Type and Path Integrals
    Preprint math/9808040, 1998 LEEDS-MATH-PURE-2001-31 Polynomial Sequences of Binomial Type and Path Integrals∗ Vladimir V. Kisil† August 8, 1998; Revised October 19, 2001 Abstract Polynomial sequences pn(x) of binomial type are a principal tool in the umbral calculus of enumerative combinatorics. We express pn(x) as a path integral in the “phase space” N × [−π,π]. The Hamilto- ∞ ′ inφ nian is h(φ)= n=0 pn(0)/n! e and it produces a Schr¨odinger type equation for pn(x). This establishes a bridge between enumerative P combinatorics and quantum field theory. It also provides an algorithm for parallel quantum computations. Contents 1 Introduction on Polynomial Sequences of Binomial Type 2 2 Preliminaries on Path Integrals 4 3 Polynomial Sequences from Path Integrals 6 4 Some Applications 10 arXiv:math/9808040v2 [math.CO] 22 Oct 2001 ∗Partially supported by the grant YSU081025 of Renessance foundation (Ukraine). †On leave form the Odessa National University (Ukraine). Keywords and phrases. Feynman path integral, umbral calculus, polynomial sequence of binomial type, token, Schr¨odinger equation, propagator, wave function, cumulants, quantum computation. 2000 Mathematics Subject Classification. Primary: 05A40; Secondary: 05A15, 58D30, 81Q30, 81R30, 81S40. 1 Polynomial Sequences and Path Integrals 2 Under the inspiring guidance of Feynman, a short- hand way of expressing—and of thinking about—these quantities have been developed. Lewis H. Ryder [22, Chap. 5]. 1 Introduction on Polynomial Sequences of Binomial Type The umbral calculus [16, 18, 19, 21] in enumerative combinatorics uses poly- nomial sequences of binomial type as a principal ingredient. A polynomial sequence pn(x) is said to be of binomial type [18, p.
    [Show full text]
  • RIEMANN's HYPOTHESIS 1. Gauss There Are 4 Prime Numbers Less
    RIEMANN'S HYPOTHESIS BRIAN CONREY 1. Gauss There are 4 prime numbers less than 10; there are 25 primes less than 100; there are 168 primes less than 1000, and 1229 primes less than 10000. At what rate do the primes thin out? Today we use the notation π(x) to denote the number of primes less than or equal to x; so π(1000) = 168. Carl Friedrich Gauss in an 1849 letter to his former student Encke provided us with the answer to this question. Gauss described his work from 58 years earlier (when he was 15 or 16) where he came to the conclusion that the likelihood of a number n being prime, without knowing anything about it except its size, is 1 : log n Since log 10 = 2:303 ::: the means that about 1 in 16 seven digit numbers are prime and the 100 digit primes are spaced apart by about 230. Gauss came to his conclusion empirically: he kept statistics on how many primes there are in each sequence of 100 numbers all the way up to 3 million or so! He claimed that he could count the primes in a chiliad (a block of 1000) in 15 minutes! Thus we expect that 1 1 1 1 π(N) ≈ + + + ··· + : log 2 log 3 log 4 log N This is within a constant of Z N du li(N) = 0 log u so Gauss' conjecture may be expressed as π(N) = li(N) + E(N) Date: January 27, 2015. 1 2 BRIAN CONREY where E(N) is an error term.
    [Show full text]
  • Computation and the Riemann Hypothesis: Dedicated to Herman Te Riele on the Occasion of His Retirement
    Computation and the Riemann Hypothesis: Dedicated to Herman te Riele on the occasion of his retirement Andrew Odlyzko School of Mathematics University of Minnesota [email protected] http://www.dtc.umn.edu/∼odlyzko December 2, 2011 Andrew Odlyzko ( School of Mathematics UniversityComputation of Minnesota and [email protected] Riemann Hypothesis: http://www.dtc.umn.edu/ Dedicated toDecember2,2011 Herman te∼ Rieodlyzkole on) the 1/15 occasion The mysteries of prime numbers: Mathematicians have tried in vain to discover some order in the sequence of prime numbers but we have every reason to believe that there are some mysteries which the human mind will never penetrate. To convince ourselves, we have only to cast a glance at tables of primes (which some have constructed to values beyond 100,000) and we should perceive that there reigns neither order nor rule. Euler, 1751 Andrew Odlyzko ( School of Mathematics UniversityComputation of Minnesota and [email protected] Riemann Hypothesis: http://www.dtc.umn.edu/ Dedicated toDecember2,2011 Herman te∼ Rieodlyzkole on) the 2/15 occasion Herman te Riele’s contributions towards elucidating some of the mysteries of primes: numerical verifications of Riemann Hypothesis (RH) improved bounds in counterexamples to the π(x) < Li(x) conjecture disproof and improved lower bounds for Mertens conjecture improved bounds for de Bruijn – Newman constant ... Andrew Odlyzko ( School of Mathematics UniversityComputation of Minnesota and [email protected] Riemann Hypothesis: http://www.dtc.umn.edu/ Dedicated toDecember2,2011
    [Show full text]
  • Umbral Calculus and Cancellative Semigroup Algebras
    Preprint funct-an/9704001, 1997 Umbral Calculus and Cancellative Semigroup Algebras∗ Vladimir V. Kisil April 1, 1997; Revised February 4, 2000 Dedicated to the memory of Gian-Carlo Rota Abstract We describe some connections between three different fields: com- binatorics (umbral calculus), functional analysis (linear functionals and operators) and harmonic analysis (convolutions on group-like struc- tures). Systematic usage of cancellative semigroup, their convolution algebras, and tokens between them provides a common language for description of objects from these three fields. Contents 1 Introduction 2 2 The Umbral Calculus 3 arXiv:funct-an/9704001v2 8 Feb 2000 2.1 Finite Operator Description ................... 3 2.2 Hopf Algebras Description .................... 4 2.3 The Semantic Description .................... 4 3 Cancellative Semigroups and Tokens 5 3.1 Cancellative Semigroups: Definition and Examples ....... 5 3.2 Tokens: Definition and Examples ................ 10 3.3 t-Transform ............................ 13 ∗Supported by grant 3GP03196 of the FWO-Vlaanderen (Fund of Scientific Research- Flanders), Scientific Research Network “Fundamental Methods and Technique in Mathe- matics”. 2000 Mathematics Subject Classification. Primary: 43A20; Secondary: 05A40, 20N++. Keywords and phrases. Cancellative semigroups, umbral calculus, harmonic analysis, token, convolution algebra, integral transform. 1 2 Vladimir V. Kisil 4 Shift Invariant Operators 16 4.1 Delta Families and Basic Distributions ............. 17 4.2 Generating Functions and Umbral Functionals ......... 22 4.3 Recurrence Operators and Generating Functions ........ 24 5 Models for the Umbral Calculus 28 5.1 Finite Operator Description: a Realization ........... 28 5.2 Hopf Algebra Description: a Realization ............ 28 5.3 The Semantic Description: a Realization ............ 29 Acknowledgments 30 It is a common occurrence in combinatorics for a sim- ple idea to have vast ramifications; the trick is to real- ize that many seemingly disparate phenomena fit un- der the same umbrella.
    [Show full text]
  • USC Phi Beta Kappa Visiting Scholar Program
    The Phi Beta Kappa chapter of the University of South Carolina is pleased to present Dr. Andrew Odlyzko as the 2010 Visiting Schol- ar. Dr. Odlyzko will present two main talks, both in Amoco Hall of the Swearingen Center on the USC campus: 3:30 pm, Thursday, 25 February 2010 Technology manias: From railroads to the Internet and beyond A comparison of the Internet bubble with the British Rail- way Mania of the 1840s, the greatest technology mania in history, provides many tantalizing similarities as well as contrasts. Especially interesting is the presence in both cases of clear quantitative measures showing a priori that these manias were bound to fail financially, measures that were not considered by investors in their pursuit of “effortless riches.” In contrast to the Internet case, the Railway Mania had many vocal and influential skeptics, yet even then, these skeptics were deluded into issuing warnings that were often counterproductive in that they inflated the bubble further. The role of such imperfect information dissemination in these two manias leads to speculative projections on how future technology bubbles will develop. 2:30 pm, Friday, 26 February 2010 How to live and prosper with insecure cyberinfra- structure Mathematics has contributed immensely to the development of secure cryptosystems and protocols. Yet our networks are terribly insecure, and we are constantly threatened with the prospect of im- minent doom. Furthermore, even though such warnings have been common for the last two decades, the situation has not gotten any better. On the other hand, there have not been any great disasters either.
    [Show full text]
  • The Past, Evolving Present and Future of Discrete Logarithm
    The Past, evolving Present and Future of Discrete Logarithm Antoine Joux, Andrew Odlyzko and Cécile Pierrot Abstract The first practical public key cryptosystem ever published, the Diffie-Hellman key exchange algorithm, relies for its security on the assumption that discrete logarithms are hard to compute. This intractability hypothesis is also the foundation for the security of a large variety of other public key systems and protocols. Since the introduction of the Diffie-Hellman key exchange more than three decades ago, there have been substantial algorithmic advances in the computation of discrete logarithms. However, in general the discrete logarithm problem is still considered to be hard. In particular, this is the case for the multiplicative group of finite fields with medium to large characteristic and for the additive group of a general elliptic curve. This paper presents a current survey of the state of the art concerning discrete logarithms and their computation. 1 Introduction 1.1 The Discrete Logarithm Problem Many popular public key cryptosystems are based on discrete exponentiation. If G is a multi- plicative group, such as the group of invertible elements in a finite field or the group of points on an elliptic curve, and g is an element of G, then gx is the discrete exponentiation of base g to the power x. This operation shares basic properties with ordinary exponentiation, for example gx+y = gx · gy. The inverse operation is, given h in G, to determine a value of x, if it exists, such that h = gx. Such a number x is called a discrete logarithm of h to the base g, since it shares many properties with the ordinary logarithm.
    [Show full text]
  • Providing Security with Insecure Systems
    Providing security with insecure systems Andrew Odlyzko School of Mathematics and Digital Technology Center University of Minnesota http://www.dtc.umn.edu/~odlyzko 1 AO 8/03 University of Minnesota Motivation and Outline: • Basic question: What is the role of cryptography and security in society? – Why haven’t cryptography and security lived up to their promise? – Is the future going to be any better? • Main points: – Strong economic, social, and psychological reasons for insecurity – Chewing gum and baling wire will continue to rule – Not absolute security but “speed bumps” – New design philosophy and new research directions 2 AO 8/03 University of Minnesota Security pyramid: users systems protocols algorithms 3 AO 8/03 University of Minnesota Half a century of evidence: •People cannot build secure systems •People cannot live with secure systems 4 4 AO 8/03 University of Minnesota Honor System Virus: This virus works on the honor system. Please forward this message to everyone you know and then delete all the files on your hard disk. Thank you for your cooperation. 5 AO 8/03 University of Minnesota Major problem with secure systems: • secretaries could not forge their bosses’ signatures 6 AO 8/03 University of Minnesota Proposed solution: •Build messy, not clean •(Lessons from past and now) •(Related to “defense in depth,” “resilience.” …) 7 7 AO 8/03 University of Minnesota The dog that did not bark: • Cyberspace is horribly insecure • But no big disasters!!! 8 8 AO 8/03 University of Minnesota The Big Question: •Why have we done so
    [Show full text]
  • Master's Project COMPUTATIONAL METHODS for the RIEMANN
    Master's Project COMPUTATIONAL METHODS FOR THE RIEMANN ZETA FUNCTION under the guidance of Prof. Frank Massey Department of Mathematics and Statistics The University of Michigan − Dearborn Matthew Kehoe [email protected] In partial fulfillment of the requirements for the degree of MASTER of SCIENCE in Applied and Computational Mathematics December 19, 2015 Acknowledgments I would like to thank my supervisor, Dr. Massey, for his help and support while completing the project. I would also like to thank all of the professors at the University of Michigan − Dearborn who continually teach mathematics. Many authors, including Andrew Odlyzko, Glen Pugh, Ken Takusagawa, Harold Edwards, and Aleksandar Ivic assisted me by writing articles and books about the Riemann zeta function. I am also grateful to the online communities of Stack Overflow and Mathematics Stack Exchange. Both of these communities assisted me in my studies and are helpful for all students. i Abstract The purpose of this project is to explore different computational methods for the Riemann zeta function. Modern analysis shows that a variety of different methods have been used to compute values for the zeta function and its zeroes. I am looking to develop multiple programs that will find non-trivial zeroes and specific function values. All computer implementations have been done inside the Java programming language. One could easily transfer the programs written inside the appendix to their preferred programming language. My main motivation for writing these programs is because I am interested in learning more about the mathematics behind the zeta function and its zeroes. The zeta function is an extremely important part of mathematics and is formally denoted by ζ(s).
    [Show full text]
  • Turing and the Riemann Zeta Function
    Turing and the Riemann zeta function Andrew Odlyzko School of Mathematics University of Minnesota [email protected] http://www.dtc.umn.edu/∼odlyzko May 11, 2012 Andrew Odlyzko ( School of Mathematics UniversityTuring of Minnesotaand the [email protected] zeta function http://www.dtc.umn.edu/May11,2012∼odlyzko ) 1/23 The mysteries of prime numbers: Mathematicians have tried in vain to discover some order in the sequence of prime numbers but we have every reason to believe that there are some mysteries which the human mind will never penetrate. To convince ourselves, we have only to cast a glance at tables of primes (which some have constructed to values beyond 100,000) and we should perceive that there reigns neither order nor rule. Euler, 1751 Andrew Odlyzko ( School of Mathematics UniversityTuring of Minnesotaand the [email protected] zeta function http://www.dtc.umn.edu/May11,2012∼odlyzko ) 2/23 Riemann, 1850s: ∞ s 1 s C s ζ( ) = ns , ∈ , Re( ) > 1 . Xn=1 Showed ζ(s) can be continued analytically to C \{1} and has a first order pole at s = 1 with residue 1. If s ξ(s) = π− /2Γ(s/2)ζ(s) , then (functional equation) ξ(s) = ξ(1 − s) . Andrew Odlyzko ( School of Mathematics UniversityTuring of Minnesotaand the [email protected] zeta function http://www.dtc.umn.edu/May11,2012∼odlyzko ) 3/23 Critical strip: complex s−plane critical strip critical line 0 1/2 1 Andrew Odlyzko ( School of Mathematics UniversityTuring of Minnesotaand the [email protected] zeta function http://www.dtc.umn.edu/May11,2012∼odlyzko ) 4/23 Riemann explicit
    [Show full text]
  • Economics, Psychology, and Sociology of Security
    Economics, Psychology, and Sociology of Security Andrew Odlyzko Digital Technology Center, University of Minnesota, 499 Walter Library, 117 Pleasant St. SE, Minneapolis, MN 55455, USA [email protected] http://www.dtc.umn.edu/∼odlyzko Abstract. Security is not an isolated good, but just one component of a complicated economy. That imposes limitations on how effective it can be. The interactions of human society and human nature suggest that security will continue being applied as an afterthought. We will have to put up with the equivalent of bailing wire and chewing gum, and to live on the edge of intolerable frustration. However, that is not likely to to be a fatal impediment to the development and deployment of information technology. It will be most productive to think of security not as a way to provide ironclad protection, but the equivalent of speed bumps, decreasing the velocity and impact of electronic attacks to a level where other protection mechanisms can operate. 1 Introduction This is an extended version of my remarks at the panel on “Economics of Secu- rity” at the Financial Cryptography 2003 Conference. It briefly outlines some of the seldom discussed-reasons security is and will continue to be hard to achieve. Computer and communication security attract extensive press coverage, and are prominent in the minds of government and corporate decision makers. This is largely a result of the growing stream of actual attacks and discovered vul- nerabilities, and of the increasing reliance of our society on its information and communication infrastructure. There are predictions and promises that soon the situation will change, and industry is going to deliver secure systems.
    [Show full text]
  • A Knapsack Type Public Key Ctyptosystern Based on Arithmetic in Finite Fields
    A Knapsack Type Public Key Ctyptosystern Based On Arithmetic in Finite Fields (preliminary draft) Benny Chor Ronald L. Rivest Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, Massachusetts 02139 Absttact-We introduce a new knapsack type public key cryptosystem. The system is based on a novel application of arithmetic in finite fields, following a construction by Bose and Chowla. Appropriately choosing the parameters, we can control the density of the resulting knapsack. In particular, the density can be made high enough to foil "low density" attacks against our system. At the moment, we do not know of any zttncks capable of "breaking" this systen h a reasonable amount of time. 1. INTRODUCTION In 1976, Diffie and Hellman [7] introduced the idea of public key cryptography, in which two different keys are used: one for encryption, and one for decryption. Each user keeps his decryption key secret, whiie making the encryption key public, so it can be used by everyone wishing to send messages to him. A few months later, the first two implementation of public key cryptosystems were discovered: The Merkle-Heilman scheme [13] and the Rivest-Shamir-Adelman scheme [17]. Some more PKC have been proposed since that time. Most of them can be put into two categories': a. PKC based on hard number-theoretic problems ([17],[16],[8]). b. PKC related to the knapsack problem ([13],[2]). While no efficicnt attacks against number theoretic PKC are known, some knapsack type PKC f Research supported by NSF grant MCS-8006938. Par!, of this research wag done while the first author was visiting Bell Laboratorics, Murray Hill, NJ.
    [Show full text]
  • 50Th Anniversary Book
    dat oun ion z F Fe rt llo e w H s h e i p ■ ■ C n o o m i t m a v it o m n n e ■ I n t ■ ty Communi “In grad school, there are a lot of constraints that hold you back from going after some of the big problems and trying things that no one else will try. The Hertz Fellowship gives you Celebrating 50 Years freedom to innovate. Each day, I see it augmenting my graduate experience. of the Having the freedom to take non-linear paths is important because innovative ideas come from detours. The Hertz Hertz Graduate Fellowship Fellowship offers that freedom.” —Shannon Yee THE FANNIE AND JOHN HERTZ FOUNDATION GRADUATE FELLOWSHIP 50th Anniversary 1963–2013 CONTENTS INTRODUCTION 5 LOOKING FORWARD TO THE NEXT 50 YEARS th COMMITMENT 6 50 Anniversary Vision Contributing Security, Prosperity, and Leadership for Our Nation Founding History To provide unique financial and fellowship support to the nation’s most COMMUNITY 30 Collaborating to Inspire Across Generations and Disciplines remarkable PhD students in the physical, 2 biological, and engineering sciences. INNOVATION 48 3 Creating Solutions with World Changing Outcomes To award fellowships that are free of most IMPACT 60 Transforming Ideas into Benefits for Humanity traditional restrictions. The Hertz Foundation Fellows 1963–2013 To nurture Hertz Fellows as they become the innovators and leaders serving in ways that benefit us all. DEDICATION “If I have seen further, To the extraordinary men and women of The Hertz Foundation it is by standing on the Fellows Community in honor of the founders, Fannie and John Hertz.
    [Show full text]