Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hatem M. Bahig is active.

Publication


Featured researches published by Hatem M. Bahig.


Computing | 2006

Improved Generation of Minimal Addition Chains

Hatem M. Bahig

An addition chain for a natural number n is a sequence 1=a0<a1< . . . <ar=n of numbers such that for each 0<i≤r, ai=aj+ak for some 0≤k≤j<i. An improvement by a factor of 2 in the generation of all minimal (or one) addition chains is achieved by finding sufficient conditions for star steps, computing what we will call nonstar lower bound in a minimal addition and omitting the sorting step.


international conference on information and communication security | 2012

Cryptanalysis of multi-prime RSA with small prime difference

Hatem M. Bahig; Ashraf Bhery; Dieaa I. Nassr

We show that the attack of de Weger on RSA using continued fractions extends to Multi-Prime RSA. Let (n,e) be a Multi-Prime RSA public-key with private key d, where n=p1p2⋯pr is a product of r distinct balanced (roughly of the same bit size) primes, and p1 < p2 < … < pr. We show that if pr−p1=nα, 0 < α≤1/r, r≥3 and


acs/ieee international conference on computer systems and applications | 2008

A new RSA vulnerability using continued fractions

Dieaa I. Nassr; Hatem M. Bahig; Ashraf Bhery; Sameh S. Daoud

2d^2+1<\frac{n^{2/r - \alpha}}{6r},


Discrete Mathematics | 2008

On a generalization of addition chains: Addition-multiplication chains

Hatem M. Bahig

then Multi-Prime RSA is insecure.


international conference on cryptology in africa | 2014

New Attacks on the RSA Cryptosystem

Abderrahmane Nitaj; Muhammad Rezal Kamel Ariffin; Dieaa I. Nassr; Hatem M. Bahig

Let (n = pq, e) be an RSA public key with private exponent d = ndelta, where p and q are large primes of the same bit size. Suppose that po ges radicn be an approximation of p with |p - po| les 1/8nalpha, alpha les 1/2. Using continued fractions, we show that the system is insecure if delta < 1-alpha/2. Our result is deterministic polynomial time and an extension of Coppersmiths result on a factorization.


International Journal of Computers and Applications | 2008

Merging on PRAM

Hazem M. Bahig; Hatem M. Bahig

We show that some notations and facts on addition chains can be generalized to addition-multiplication chains. In other words, we show that addition-multiplication chains resemble addition chains in many aspects.


Cluster Computing | 2018

A fast GPU-based hybrid algorithm for addition chains

Hatem M. Bahig; Khaled A. AbdElbari

This paper presents three new attacks on the RSA cryptosystem. The first two attacks work when k RSA public keys (N i ,e i ) are such that there exist k relations of the shape e i x − y i φ(N i ) = z i or of the shape e i x i − yφ(N i ) = z i where N i = p i q i , φ(N i ) = (p i − 1)(q i − 1) and the parameters x, x i , y, y i , z i are suitably small in terms of the prime factors of the moduli. We show that our attacks enable us to simultaneously factor the k RSA moduli N i . The third attack works when the prime factors p and q of the modulus N = pq share an amount of their least significant bits (LSBs) in the presence of two decryption exponents d 1 and d 2 sharing an amount of their most significant bits (MSBs). The three attacks improve the bounds of some former attacks that make RSA insecure.


international conference on algorithms and architectures for parallel processing | 2011

Binary addition chain on EREW PRAM

Khaled A. Fathy; Hazem M. Bahig; Hatem M. Bahig; A. A. Ragb

Abstract Many data sets to be merged consist of (1) n distinct keys and (2) the keys are serial numbers. Merging such data can be represented as merging two sorted arrays A=(a0, a1, …, an1−1) and B=(b0, b1, …, bn2−1) of records such that (1) the keys are distinct; (2) 0≤ai · key, bj · key < n, ∀0≤i<n1 and 0≤j<n2, where n=n1+n2 and key is the primary key of the record. We present an optimal deterministic merging algorithm on EREW PRAM in O(n⁄p) time, where p is the number of processors and 1≤p≤n. The algorithm uses linear number of space. We also extend the algorithm to capture repeated keys such that the repetition of the key is at most constant.


hybrid artificial intelligence systems | 2010

Interactive visualization applets for modular exponentiation using addition chains

Hatem M. Bahig; Yasser Kotb

A graphics processing unit (GPU) has been widely used to accelerate discrete optimization problems. In this paper, we introduce a novel hybrid parallel algorithm to generate a shortest addition chain for a positive integer e. The main idea of the proposed algorithm is to divide the search tree into a sequence of three subtrees: top, middle, and bottom. The top subtree works using a branch and bound depth first strategy. The middle subtree works using a branch and bound breadth first strategy, while the bottom subtree works using a parallel (GPU) branch and bound depth first strategy. Our experimental results show that, compared to the fastest sequential algorithm for generating a shortest addition chain, we improve the generation by about 70% using one GPU (NVIDIA GeForce GTX 770). For generating all shortest addition chains, the percentage of the improvement is about 50%.


active media technology | 2010

Interactive visualization system for DES

Mohamed S. Asseisah; Hatem M. Bahig; Sameh S. Daoud

An addition chain for a natural number x of n bits is a sequence of numbers a0, a1, ..., al, such that a0 = 1, al = x, and ak = ai+aj with 0 ≥ i, j > k ≥ l. The addition chain problem is what is the minimal number of additions needed to compute x starting from 1? In this paper, we present a new parallel algorithm to generate a short addition chain for x. The algorithm has running time O(log2 n) using polynomial number processors under EREW PRAM (exclusive read exclusive write parallel random access machine). The algorithm is faster than previous algorithms and is based on binary method.

Collaboration


Dive into the Hatem M. Bahig's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge