Exploring Cryptography Using the Sage Computer Algebra System School of Engineering and Science Victoria University

Total Page:16

File Type:pdf, Size:1020Kb

Exploring Cryptography Using the Sage Computer Algebra System School of Engineering and Science Victoria University Exploring Cryptography Using the Sage Computer Algebra System by Minh Van Nguyen Thesis submitted in partial fulfillment of the Requirements for the Degree of Bachelor of Science (Honours) in Computer Science Supervisor: Dr Alasdair McAndrew School of Engineering and Science Victoria University December, 2009 c Copyright by Minh Van Nguyen 2009 Exploring Cryptography Using the Sage Computer Algebra System Declaration I hereby declare that this submission is my own work and to the best of my knowl- edge it contains no material previously published or written by another person, nor material which to a substantial extent has been accepted for the award of any other degree or diploma at Victoria University or any other educational institution, except where due acknowledgement is made in the thesis. Any contribution made to the re- search by colleagues, with whom I have worked at Victoria University or elsewhere, during my candidature, is fully acknowledged. I also declare that the intellectual content of this thesis is the product of my own work, except to the extent that assistance from others in the project’s design and conception or in style, presentation and linguistic expression is acknowledged. Information derived from the published and unpublished work of others has been acknowledged in the text and a list of references is given. Minh Van Nguyen 05 December 2009 iii Exploring Cryptography Using the Sage Computer Algebra System Minh Van Nguyen [email protected] Victoria University, 2009 Supervisor: Dr Alasdair McAndrew [email protected] Abstract Cryptography has become indispensable in areas such as e-commerce, the legal safe- guarding of medical records, and secure electronic communication. Hence, it is incumbent upon software engineers to understand the concepts and techniques un- derlying the cryptosystems that they implement. An educator needs to consider which topics to cover in a course on cryptography as well as how to present the concepts and techniques to be covered in the course. This thesis contributes to the field of cryptography pedagogy by discussing and implementing small-scale cryp- tosystems whose encryption and decryption processes can be stepped through by hand. Our implementation has been accepted and integrated into the code base of the computer algebra system Sage. As Sage is free and open source, students and educators of cryptology need not worry about paying license fees in order to use Sage, but can instead concentrate on exploring cryptography using Sage’s built-in support for cryptography. iv Acknowledgements I am indebted to several people whose support, inspiration and encouragement have been invaluable during the course of writing and performing the work described in the thesis. First and foremost is my thesis supervisor Dr Alasdair McAndrew who provided a stimulating environment during the time that we worked together. His probing questions and indefatigable support have contributed to enhancing the quality of the thesis. The majority of my software development effort took place on the compute node sage.math [101], which is one of four machines comprising the Sage cluster and supported by US National Science Foundation Grant No. DMS-0821725. I wish to extend my gratitude to Associate Professor William A. Stein of the University of Washington, USA, for allowing me access to the Sage cluster in order to develop and test all of the software implementation described in this thesis. Professor Stein is a technical reviewer of my implementation of S-DES [83]. He also provided me with access to the machine bsd.math.washington.edu and expended considerable effort so that I have access to the computer network SkyNet, which is a research network of the US Department of Defense and administered by Mariah Lenox. Software testing conducted on the Sage cluster, the machine bsd.math.washington.edu, and SkyNet has contributed to enhancing the quality, stability and portability of my enhancements to the cryptography module of the Sage computer algebra system. Martin Albrecht of the University of London, UK, is a technical reviewer of my implementation of S-DES [83] and the sole technical reviewer of my implementation of Mini-AES [80]. His constructive and timely feedback played a considerable role in enhancing the quality of those two implementations. He also read an early draft of this thesis and made numerous suggestions to clarify the exposition of Chapters 1 and 2. I also wish to thank Mr Albrecht for reminding me that Sage distributes the PyCrypto library. This observation has contributed to improving the exposition of Chapter 2. Nick Alexander of the University of California at Irvine, USA, is the sole technical reviewer of my patch at ticket #6222 [85]. Sage developer and release manager Mike Hansen reviewed my implementation [79] of an algorithm for solving the subset sum problem over super-increasing sequences. He is also the sole technical reviewer of my patch at ticket #6176 [81], and co-reviewed my patches at ticket #7123 [78]. Prior to starting development of the Sage implementation of cryptosystems de- scribed in Chapters 3 to 6, I submitted a patch to ticket #5529 [77] in order to enhance the documentation of the Sage cryptography module. Associate Professor v John Palmieri of the University of Washington, USA, is the technical reviewer of that patch. His comments and reviewer patch for ticket #5529 have contributed to improving the overall quality of the documentation for the Sage cryptography module. I wish to acknowledge Professor Robert A. Beezer of the University of Puget Sound, USA, for bringing to my attention both the chi-square and squared-differences statistical measures and our subsequent discussion on using those measures for crypt- analysis of the shift and affine cryptosystems. Professor Beezer is the technical re- viewer of my implementation of the shift [84, 82, 78] and affine [76] cryptosystems. His feedback have contributed to considerably enhancing my original implementa- tions. Professor Beezer also reviewed a draft of the thesis and provided comments on typographical and stylistic errors. I would like to extend my gratitude to Professor Bernhard Esslinger, leader of the CrypTool [37] project, for inviting me to join the project’s documentation team. Since joining the documentation team of CrypTool, I have had ample opportunities to enhance the CrypTool tutorial with Sage code for learning cryptography. Some of the cryptography implementations described in the thesis have made their way into the CrypTool tutorial as examples showing the working of particular cryptosystems. Professor Esslinger also made numerous comments on a draft of the thesis that help to clarify many issues. Finally, I wish to thank Brett Robertson of Victoria University, Australia, and two anonymous reviewers for reading a draft of the thesis. Mr Robertson made numerous comments that help to improve the organization of the thesis and the exposition of Chapters 1 and 7. One of the two anonymous reviewers reminded me that Sage also supports the PyCrypto library, an observation which helps to improve my exposition of Chapter 2. The anonymous reviewers, and many people who read a draft of the thesis, pointed out numerous grammatical, spelling and stylistic errors. Any errors that remain are solely my responsibility. Minh Van Nguyen Victoria University December 2009 vi Contents Abstract ..................................... iv Acknowledgements .............................. v List of Tables .................................. ix List of Figures ................................. x List of Algorithms ............................... xi 1 Introduction ................................. 1 1.1 Cryptography and computer security . 2 1.2 Thesisoutline ............................... 3 2 A Survey of CAS for Cryptography Education ........... 5 2.1 Computeralgebrasystems . 6 2.2 CASincryptographyeducation . 7 2.3 Sagemathematicssoftwaresystem . 9 2.4 CAS functionalities for cryptography education . ...... 10 2.5 TheRSAalgorithminSage . 16 2.6 Extending Sage’s cryptographic functionalities . ........ 17 3 The Shift Cryptosystem ......................... 19 3.1 Congruence and congruence classes . 19 3.2 Plaintext and ciphertext alphabets . .. 22 3.3 Encryption and decryption functions . .. 22 3.4 Cryptanalysis ............................... 23 3.5 ExampleSageusage ........................... 26 4 The Affine Cryptosystem ........................ 31 4.1 Greatestcommondivisors . 31 4.2 Multiplicativegroups . .. .. 33 4.3 Encryption and decryption functions . .. 36 4.4 Cryptanalysis ............................... 37 4.5 ExampleSageusage ........................... 38 5 Simplified Data Encryption Standard ................. 43 5.1 TheS-DESsecretkeys .......................... 44 5.2 Encryption and decryption functions . .. 46 5.3 ExampleSageusage ........................... 50 vii 6 Mini Advanced Encryption Standard ................. 55 6.1 Structureoffinitefields. 56 6.2 The Mini-AES irreducible polynomial . .. 57 6.3 ComponentsofMini-AES . 58 6.4 Encryption and decryption functions . .. 63 6.5 ExampleSageusage ........................... 64 7 Conclusions and Future Work ...................... 71 Appendix A Sage Manual for Shift Cryptosystem ........... 73 A.1 Classdocumentation . 73 A.2 Publicmethods .............................. 77 A.3 Privatemethods.............................. 91 Appendix B Sage Manual for Affine Cryptosystem .......... 95 B.1 Classdocumentation . .. .. 95 B.2 Publicmethods .............................
Recommended publications
  • Plotting Direction Fields in Matlab and Maxima – a Short Tutorial
    Plotting direction fields in Matlab and Maxima – a short tutorial Luis Carvalho Introduction A first order differential equation can be expressed as dx x0(t) = = f(t; x) (1) dt where t is the independent variable and x is the dependent variable (on t). Note that the equation above is in normal form. The difficulty in solving equation (1) depends clearly on f(t; x). One way to gain geometric insight on how the solution might look like is to observe that any solution to (1) should be such that the slope at any point P (t0; x0) is f(t0; x0), since this is the value of the derivative at P . With this motivation in mind, if you select enough points and plot the slopes in each of these points, you will obtain a direction field for ODE (1). However, it is not easy to plot such a direction field for any function f(t; x), and so we must resort to some computational help. There are many computational packages to help us in this task. This is a short tutorial on how to plot direction fields for first order ODE’s in Matlab and Maxima. Matlab Matlab is a powerful “computing environment that combines numeric computation, advanced graphics and visualization” 1. A nice package for plotting direction field in Matlab (although resourceful, Matlab does not provide such facility natively) can be found at http://math.rice.edu/»dfield, contributed by John C. Polking from the Dept. of Mathematics at Rice University. To install this add-on, simply browse to the files for your version of Matlab and download them.
    [Show full text]
  • A Note on Integral Points on Elliptic Curves 3
    Journal de Th´eorie des Nombres de Bordeaux 00 (XXXX), 000–000 A note on integral points on elliptic curves par Mark WATKINS Abstract. We investigate a problem considered by Zagier and Elkies, of finding large integral points on elliptic curves. By writ- ing down a generic polynomial solution and equating coefficients, we are led to suspect four extremal cases that still might have non- degenerate solutions. Each of these cases gives rise to a polynomial system of equations, the first being solved by Elkies in 1988 using the resultant methods of Macsyma, with there being a unique rational nondegenerate solution. For the second case we found that resultants and/or Gr¨obner bases were not very efficacious. Instead, at the suggestion of Elkies, we used multidimensional p-adic Newton iteration, and were able to find a nondegenerate solution, albeit over a quartic number field. Due to our methodol- ogy, we do not have much hope of proving that there are no other solutions. For the third case we found a solution in a nonic number field, but we were unable to make much progress with the fourth case. We make a few concluding comments and include an ap- pendix from Elkies regarding his calculations and correspondence with Zagier. Resum´ e.´ A` la suite de Zagier et Elkies, nous recherchons de grands points entiers sur des courbes elliptiques. En ´ecrivant une solution polynomiale g´en´erique et en ´egalisant des coefficients, nous obtenons quatre cas extr´emaux susceptibles d’avoir des so- lutions non d´eg´en´er´ees. Chacun de ces cas conduit `aun syst`eme d’´equations polynomiales, le premier ´etant r´esolu par Elkies en 1988 en utilisant les r´esultants de Macsyma; il admet une unique solution rationnelle non d´eg´en´er´ee.
    [Show full text]
  • Stan: a Probabilistic Programming Language
    JSS Journal of Statistical Software January 2017, Volume 76, Issue 1. doi: 10.18637/jss.v076.i01 Stan: A Probabilistic Programming Language Bob Carpenter Andrew Gelman Matthew D. Hoffman Columbia University Columbia University Adobe Creative Technologies Lab Daniel Lee Ben Goodrich Michael Betancourt Columbia University Columbia University Columbia University Marcus A. Brubaker Jiqiang Guo Peter Li York University NPD Group Columbia University Allen Riddell Indiana University Abstract Stan is a probabilistic programming language for specifying statistical models. A Stan program imperatively defines a log probability function over parameters conditioned on specified data and constants. As of version 2.14.0, Stan provides full Bayesian inference for continuous-variable models through Markov chain Monte Carlo methods such as the No-U-Turn sampler, an adaptive form of Hamiltonian Monte Carlo sampling. Penalized maximum likelihood estimates are calculated using optimization methods such as the limited memory Broyden-Fletcher-Goldfarb-Shanno algorithm. Stan is also a platform for computing log densities and their gradients and Hessians, which can be used in alternative algorithms such as variational Bayes, expectation propa- gation, and marginal inference using approximate integration. To this end, Stan is set up so that the densities, gradients, and Hessians, along with intermediate quantities of the algorithm such as acceptance probabilities, are easily accessible. Stan can be called from the command line using the cmdstan package, through R using the rstan package, and through Python using the pystan package. All three interfaces sup- port sampling and optimization-based inference with diagnostics and posterior analysis. rstan and pystan also provide access to log probabilities, gradients, Hessians, parameter transforms, and specialized plotting.
    [Show full text]
  • Utilizing MATHEMATICA Software to Improve Students' Problem Solving
    International Journal of Education and Research Vol. 7 No. 11 November 2019 Utilizing MATHEMATICA Software to Improve Students’ Problem Solving Skills of Derivative and its Applications Hiyam, Bataineh , Jordan University of Science and Technology, Jordan Ali Zoubi, Yarmouk University, Jordan Abdalla Khataybeh, Yarmouk University, Jordan Abstract Traditional methods of teaching calculus (1) at most Jordanian universities are usually used. This paper attempts to introduce an innovative approach for teaching Calculus (1) using Computerized Algebra Systems (CAS). This paper examined utilizing Mathematica as a supporting tool for the teaching learning process of Calculus (1), especially for derivative and its applications. The research created computerized educational materials using Mathematica, which was used as an approach for teaching a (25) students as experimental group and another (25) students were taught traditionally as control group. The understandings of both samples were tested using problem solving test of 6 questions. The results revealed the experimental group outscored the control group significantly on the problem solving test. The use of Mathematica not just improved students’ abilities to interpret graphs and make connection between the graph of a function and its derivative, but also motivate students’ thinking in different ways to come up with innovative solutions for unusual and non routine problems involving the derivative and its applications. This research suggests that CAS tools should be integrated to teaching calculus (1) courses. Keywords: Mathematica, Problem solving, Derivative, Derivative’s applivations. INTRODUCTION The major technological advancements assisted decision makers and educators to pay greater attention on making the learner as the focus of the learning-teaching process. The use of computer algebra systems (CAS) in teaching mathematics has proved to be more effective compared to traditional teaching methods (Irving & Bell, 2004; Dhimar & Petal, 2013; Abdul Majid, huneiti, Al- Nafa & Balachander, 2012).
    [Show full text]
  • Stan: a Probabilistic Programming Language
    JSS Journal of Statistical Software MMMMMM YYYY, Volume VV, Issue II. http://www.jstatsoft.org/ Stan: A Probabilistic Programming Language Bob Carpenter Andrew Gelman Matt Hoffman Columbia University Columbia University Adobe Research Daniel Lee Ben Goodrich Michael Betancourt Columbia University Columbia University University of Warwick Marcus A. Brubaker Jiqiang Guo Peter Li University of Toronto, NPD Group Columbia University Scarborough Allen Riddell Dartmouth College Abstract Stan is a probabilistic programming language for specifying statistical models. A Stan program imperatively defines a log probability function over parameters conditioned on specified data and constants. As of version 2.2.0, Stan provides full Bayesian inference for continuous-variable models through Markov chain Monte Carlo methods such as the No-U-Turn sampler, an adaptive form of Hamiltonian Monte Carlo sampling. Penalized maximum likelihood estimates are calculated using optimization methods such as the Broyden-Fletcher-Goldfarb-Shanno algorithm. Stan is also a platform for computing log densities and their gradients and Hessians, which can be used in alternative algorithms such as variational Bayes, expectation propa- gation, and marginal inference using approximate integration. To this end, Stan is set up so that the densities, gradients, and Hessians, along with intermediate quantities of the algorithm such as acceptance probabilities, are easily accessible. Stan can be called from the command line, through R using the RStan package, or through Python using the PyStan package. All three interfaces support sampling and optimization-based inference. RStan and PyStan also provide access to log probabilities, gradients, Hessians, and data I/O. Keywords: probabilistic program, Bayesian inference, algorithmic differentiation, Stan.
    [Show full text]
  • The Yacas Book of Algorithms
    The Yacas Book of Algorithms by the Yacas team 1 Yacas version: 1.3.6 generated on November 25, 2014 This book is a detailed description of the algorithms used in the Yacas system for exact symbolic and arbitrary-precision numerical computations. Very few of these algorithms are new, and most are well-known. The goal of this book is to become a compendium of all relevant issues of design and implementation of these algorithms. 1This text is part of the Yacas software package. Copyright 2000{2002. Principal documentation authors: Ayal Zwi Pinkus, Serge Winitzki, Jitse Niesen. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". Contents 1 Symbolic algebra algorithms 3 1.1 Sparse representations . 3 1.2 Implementation of multivariate polynomials . 4 1.3 Integration . 5 1.4 Transforms . 6 1.5 Finding real roots of polynomials . 7 2 Number theory algorithms 10 2.1 Euclidean GCD algorithms . 10 2.2 Prime numbers: the Miller-Rabin test and its improvements . 10 2.3 Factorization of integers . 11 2.4 The Jacobi symbol . 12 2.5 Integer partitions . 12 2.6 Miscellaneous functions . 13 2.7 Gaussian integers . 13 3 A simple factorization algorithm for univariate polynomials 15 3.1 Modular arithmetic . 15 3.2 Factoring using modular arithmetic .
    [Show full text]
  • CAS (Computer Algebra System) Mathematica
    CAS (Computer Algebra System) Mathematica- UML students can download a copy for free as part of the UML site license; see the course website for details From: Wikipedia 2/9/2014 A computer algebra system (CAS) is a software program that allows [one] to compute with mathematical expressions in a way which is similar to the traditional handwritten computations of the mathematicians and other scientists. The main ones are Axiom, Magma, Maple, Mathematica and Sage (the latter includes several computer algebras systems, such as Macsyma and SymPy). Computer algebra systems began to appear in the 1960s, and evolved out of two quite different sources—the requirements of theoretical physicists and research into artificial intelligence. A prime example for the first development was the pioneering work conducted by the later Nobel Prize laureate in physics Martin Veltman, who designed a program for symbolic mathematics, especially High Energy Physics, called Schoonschip (Dutch for "clean ship") in 1963. Using LISP as the programming basis, Carl Engelman created MATHLAB in 1964 at MITRE within an artificial intelligence research environment. Later MATHLAB was made available to users on PDP-6 and PDP-10 Systems running TOPS-10 or TENEX in universities. Today it can still be used on SIMH-Emulations of the PDP-10. MATHLAB ("mathematical laboratory") should not be confused with MATLAB ("matrix laboratory") which is a system for numerical computation built 15 years later at the University of New Mexico, accidentally named rather similarly. The first popular computer algebra systems were muMATH, Reduce, Derive (based on muMATH), and Macsyma; a popular copyleft version of Macsyma called Maxima is actively being maintained.
    [Show full text]
  • Axiom / Fricas
    Axiom / FriCAS Christoph Koutschan Research Institute for Symbolic Computation Johannes Kepler Universit¨atLinz, Austria Computer Algebra Systems 15.11.2010 Master's Thesis: The ISAC project • initiative at Graz University of Technology • Institute for Software Technology • Institute for Information Systems and Computer Media • experimental software assembling open source components with as little glue code as possible • feasibility study for a novel kind of transparent single-stepping software for applied mathematics • experimenting with concepts and technologies from • computer mathematics (theorem proving, symbolic computation, model based reasoning, etc.) • e-learning (knowledge space theory, usability engineering, computer-supported collaboration, etc.) • The development employs academic expertise from several disciplines. The challenge for research is interdisciplinary cooperation. Rewriting, a basic CAS technique This technique is used in simplification, equation solving, and many other CAS functions, and it is intuitively comprehensible. This would make rewriting useful for educational systems|if one copes with the problem, that even elementary simplifications involve hundreds of rewrites. As an example see: http://www.ist.tugraz.at/projects/isac/www/content/ publications.html#DA-M02-main \Reverse rewriting" for comprehensible justification Many CAS functions can not be done by rewriting, for instance cancelling multivariate polynomials, factoring or integration. However, respective inverse problems can be done by rewriting and produce human readable derivations. As an example see: http://www.ist.tugraz.at/projects/isac/www/content/ publications.html#GGTs-von-Polynomen Equation solving made transparent Re-engineering equation solvers in \transparent single-stepping systems" leads to types of equations, arranged in a tree. ISAC's tree of equations are to be compared with what is produced by tracing facilities of Mathematica and/or Maple.
    [Show full text]
  • Analysis and Verification of Arithmetic Circuits Using Computer Algebra Approach
    University of Massachusetts Amherst ScholarWorks@UMass Amherst Doctoral Dissertations Dissertations and Theses March 2020 ANALYSIS AND VERIFICATION OF ARITHMETIC CIRCUITS USING COMPUTER ALGEBRA APPROACH TIANKAI SU University of Massachusetts Amherst Follow this and additional works at: https://scholarworks.umass.edu/dissertations_2 Part of the VLSI and Circuits, Embedded and Hardware Systems Commons Recommended Citation SU, TIANKAI, "ANALYSIS AND VERIFICATION OF ARITHMETIC CIRCUITS USING COMPUTER ALGEBRA APPROACH" (2020). Doctoral Dissertations. 1868. https://doi.org/10.7275/15875490 https://scholarworks.umass.edu/dissertations_2/1868 This Open Access Dissertation is brought to you for free and open access by the Dissertations and Theses at ScholarWorks@UMass Amherst. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of ScholarWorks@UMass Amherst. For more information, please contact [email protected]. ANALYSIS AND VERIFICATION OF ARITHMETIC CIRCUITS USING COMPUTER ALGEBRA APPROACH A Dissertation Presented by TIANKAI SU Submitted to the Graduate School of the University of Massachusetts Amherst in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY February 2020 Electrical and Computer Engineering c Copyright by Tiankai Su 2020 All Rights Reserved ANALYSIS AND VERIFICATION OF ARITHMETIC CIRCUITS USING COMPUTER ALGEBRA APPROACH A Dissertation Presented by TIANKAI SU Approved as to style and content by: Maciej Ciesielski, Chair George S. Avrunin, Member Daniel Holcomb, Member Weibo Gong, Member Christopher V. Hollot, Department Head Electrical and Computer Engineering ABSTRACT ANALYSIS AND VERIFICATION OF ARITHMETIC CIRCUITS USING COMPUTER ALGEBRA APPROACH FEBRUARY 2020 TIANKAI SU B.Sc., NORTHEAST DIANLI UNIVERSITY Ph.D., UNIVERSITY OF MASSACHUSETTS AMHERST Directed by: Professor Maciej Ciesielski Despite a considerable progress in verification of random and control logic, ad- vances in formal verification of arithmetic designs have been lagging.
    [Show full text]
  • Advancedhmc.Jl: a Robust, Modular and Efficient Implementation of Advanced HMC Algorithms
    2nd Symposium on Advances in Approximate Bayesian Inference, 20191{10 AdvancedHMC.jl: A robust, modular and efficient implementation of advanced HMC algorithms Kai Xu [email protected] University of Edinburgh Hong Ge [email protected] University of Cambridge Will Tebbutt [email protected] University of Cambridge Mohamed Tarek [email protected] UNSW Canberra Martin Trapp [email protected] Graz University of Technology Zoubin Ghahramani [email protected] University of Cambridge & Uber AI Labs Abstract Stan's Hamilton Monte Carlo (HMC) has demonstrated remarkable sampling robustness and efficiency in a wide range of Bayesian inference problems through carefully crafted adaption schemes to the celebrated No-U-Turn sampler (NUTS) algorithm. It is challeng- ing to implement these adaption schemes robustly in practice, hindering wider adoption amongst practitioners who are not directly working with the Stan modelling language. AdvancedHMC.jl (AHMC) contributes a modular, well-tested, standalone implementation of NUTS that recovers and extends Stan's NUTS algorithm. AHMC is written in Julia, a modern high-level language for scientific computing, benefiting from optional hardware acceleration and interoperability with a wealth of existing software written in both Julia and other languages, such as Python. Efficacy is demonstrated empirically by comparison with Stan through a third-party Markov chain Monte Carlo benchmarking suite. 1. Introduction Hamiltonian Monte Carlo (HMC) is an efficient Markov chain Monte Carlo (MCMC) algo- rithm which avoids random walks by simulating Hamiltonian dynamics to make proposals (Duane et al., 1987; Neal et al., 2011). Due to the statistical efficiency of HMC, it has been widely applied to fields including physics (Duane et al., 1987), differential equations (Kramer et al., 2014), social science (Jackman, 2009) and Bayesian inference (e.g.
    [Show full text]
  • Arxiv:2102.02679V1 [Cs.LO] 4 Feb 2021 HOL-ODE [10], Which Supports Reasoning for Systems of Ordinary Differential Equations (Sodes)
    Certifying Differential Equation Solutions from Computer Algebra Systems in Isabelle/HOL Thomas Hickman, Christian Pardillo Laursen, and Simon Foster University of York Abstract. The Isabelle/HOL proof assistant has a powerful library for continuous analysis, which provides the foundation for verification of hybrid systems. However, Isabelle lacks automated proof support for continuous artifacts, which means that verification is often manual. In contrast, Computer Algebra Systems (CAS), such as Mathematica and SageMath, contain a wealth of efficient algorithms for matrices, differen- tial equations, and other related artifacts. Nevertheless, these algorithms are not verified, and thus their outputs cannot, of themselves, be trusted for use in a safety critical system. In this paper we integrate two CAS systems into Isabelle, with the aim of certifying symbolic solutions to or- dinary differential equations. This supports a verification technique that is both automated and trustworthy. 1 Introduction Verification of Cyber-Physical and Autonomous Systems requires that we can verify both discrete control, and continuous evolution, as envisaged by the hy- brid systems domain [1]. Whilst powerful bespoke verification tools exist, such as the KeYmaera X [2] proof assistant, software engineering requires a gen- eral framework, which can support a variety of notations and paradigms [3]. Isabelle/HOL [4] is a such a framework. Its combination of an extensible fron- tend for syntax processing, and a plug-in oriented backend, based in ML, which supports a wealth of heterogeneous semantic models and proof tools, supports a flexible platform for software development, verification, and assurance [5,6,7]. Verification of hybrid systems in Isabelle is supported by several detailed li- braries of Analysis, including Multivariate Analysis [8], Affine Arithmetic [9], and arXiv:2102.02679v1 [cs.LO] 4 Feb 2021 HOL-ODE [10], which supports reasoning for Systems of Ordinary Differential Equations (SODEs).
    [Show full text]
  • The Misfortunes of a Trio of Mathematicians Using Computer Algebra Systems
    The Misfortunes of a Trio of Mathematicians Using Computer Algebra Systems. Can We Trust in Them? Antonio J. Durán, Mario Pérez, and Juan L. Varona Introduction by a typical research mathematician, but let us Nowadays, mathematicians often use a computer explain it briefly. It is not necessary to completely algebra system as an aid in their mathematical understand the mathematics, just to realize that it research; they do the thinking and leave the tedious is typical mathematical research using computer calculations to the computer. Everybody “knows” algebra as a tool. that computers perform this work better than Our starting point is a discrete positive measure people. But, of course, we must trust in the results on the real line, µ n 0 Mnδan (where δa denotes = ≥ derived via these powerful computer algebra the Dirac delta at a, and an < an 1) having P + systems. First of all, let us clarify that this paper is a sequence of orthogonal polynomials Pn n 0 f g ≥ not, in any way, a comparison between different (where Pn has degree n and positive leading computer algebra systems, but a sample of the coefficient). Karlin and Szeg˝oconsidered in 1961 (see [4]) the l l Casorati determinants current state of the art of what mathematicians × can expect when they use this kind of software. Pn(ak)Pn(ak 1):::Pn(ak l 1) Although our example deals with a concrete system, + + − Pn 1(ak)Pn 1(ak 1):::Pn 1(ak l 1) 0 + + + + + − 1 we are sure that similar situations may occur with (1) det .
    [Show full text]