Matching Items (49)
Filtering by

Clear all filters

148348-Thumbnail Image.png
Description

Many current cryptographic algorithms will eventually become easily broken by Shor's Algorithm once quantum computers become more powerful. A number of new algorithms have been proposed which are not compromised by quantum computers, one of which is the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol (SIDH). SIDH works by having both

Many current cryptographic algorithms will eventually become easily broken by Shor's Algorithm once quantum computers become more powerful. A number of new algorithms have been proposed which are not compromised by quantum computers, one of which is the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol (SIDH). SIDH works by having both parties perform random walks between supersingular elliptic curves on isogeny graphs of prime degree and eventually end at the same location, a shared secret.<br/><br/>This thesis seeks to explore some of the theory and concepts underlying the security of SIDH, especially as it relates to finding supersingular elliptic curves, generating isogeny graphs, and implementing SIDH. As elliptic curves and SIDH may be an unfamiliar topic to many readers, the paper begins by providing a brief introduction to elliptic curves, isogenies, and the SIDH Protocol. Next, the paper investigates more efficient methods of generating supersingular elliptic curves, which are important for visualizing the isogeny graphs in the algorithm and the setup of the protocol. Afterwards, the paper focuses on isogeny maps of various degrees, attempting to visualize isogeny maps similar to those used in SIDH. Finally, the paper looks at an implementation of SIDH in PARI/GP and work is done to see the effects of using isogenies of degree greater than 2 and 3 on the security, runtime, and practicality of the algorithm.

ContributorsSteele, Aaron J (Author) / Jones, John (Thesis director) / Childress, Nancy (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148207-Thumbnail Image.png
Description

Optimal foraging theory provides a suite of tools that model the best way that an animal will <br/>structure its searching and processing decisions in uncertain environments. It has been <br/>successful characterizing real patterns of animal decision making, thereby providing insights<br/>into why animals behave the way they do. However, it does

Optimal foraging theory provides a suite of tools that model the best way that an animal will <br/>structure its searching and processing decisions in uncertain environments. It has been <br/>successful characterizing real patterns of animal decision making, thereby providing insights<br/>into why animals behave the way they do. However, it does not speak to how animals make<br/>decisions that tend to be adaptive. Using simulation studies, prior work has shown empirically<br/>that a simple decision-making heuristic tends to produce prey-choice behaviors that, on <br/>average, match the predicted behaviors of optimal foraging theory. That heuristic chooses<br/>to spend time processing an encountered prey item if that prey item's marginal rate of<br/>caloric gain (in calories per unit of processing time) is greater than the forager's<br/>current long-term rate of accumulated caloric gain (in calories per unit of total searching<br/>and processing time). Although this heuristic may seem intuitive, a rigorous mathematical<br/>argument for why it tends to produce the theorized optimal foraging theory behavior has<br/>not been developed. In this thesis, an analytical argument is given for why this<br/>simple decision-making heuristic is expected to realize the optimal performance<br/>predicted by optimal foraging theory. This theoretical guarantee not only provides support<br/>for why such a heuristic might be favored by natural selection, but it also provides<br/>support for why such a heuristic might a reliable tool for decision-making in autonomous<br/>engineered agents moving through theatres of uncertain rewards. Ultimately, this simple<br/>decision-making heuristic may provide a recipe for reinforcement learning in small robots<br/>with little computational capabilities.

ContributorsCothren, Liliaokeawawa Kiyoko (Author) / Pavlic, Theodore (Thesis director) / Brewer, Naala (Committee member) / School of Mathematical and Statistical Sciences (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

The self-assembly of strongly-coupled nanocrystal superlattices, as a convenient bottom-up synthesis technique featuring a wide parameter space, is at the forefront of next-generation material design. To realize the full potential of such tunable, functional materials, a more complete understanding of the self-assembly process and the artificial crystals it produces is

The self-assembly of strongly-coupled nanocrystal superlattices, as a convenient bottom-up synthesis technique featuring a wide parameter space, is at the forefront of next-generation material design. To realize the full potential of such tunable, functional materials, a more complete understanding of the self-assembly process and the artificial crystals it produces is required. In this work, we discuss the results of a hard coherent X-ray scattering experiment at the Linac Coherent Light Source, observing superlattices long after their initial nucleation. The resulting scattering intensity correlation functions have dispersion suggestive of a disordered crystalline structure and indicate the occurrence of rapid, strain-relieving events therein. We also present real space reconstructions of individual superlattices obtained via coherent diffractive imaging. Through this analysis we thus obtain high-resolution structural and dynamical information of self-assembled superlattices in their native liquid environment.

ContributorsHurley, Matthew (Author) / Teitelbaum, Samuel (Thesis director) / Ginsberg, Naomi (Committee member) / Kirian, Richard (Committee member) / Barrett, The Honors College (Contributor) / Department of Physics (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Historical, Philosophical & Religious Studies, Sch (Contributor)
Created2023-05
Description

We implemented the well-known Ising model in one dimension as a computer program and simulated its behavior with four algorithms: (i) the seminal Metropolis algorithm; (ii) the microcanonical algorithm described by Creutz in 1983; (iii) a variation on Creutz’s time-reversible algorithm allowing for bonds between spins to change dynamically; and

We implemented the well-known Ising model in one dimension as a computer program and simulated its behavior with four algorithms: (i) the seminal Metropolis algorithm; (ii) the microcanonical algorithm described by Creutz in 1983; (iii) a variation on Creutz’s time-reversible algorithm allowing for bonds between spins to change dynamically; and (iv) a combination of the latter two algorithms in a manner reflecting the different timescales on which these two processes occur (“freezing” the bonds in place for part of the simulation). All variations on Creutz’s algorithm were symmetrical in time, and thus reversible. The first three algorithms all favored low-energy states of the spin lattice and generated the Boltzmann energy distribution after reaching thermal equilibrium, as expected, while the last algorithm broke from the Boltzmann distribution while the bonds were “frozen.” The interpretation of this result as a net increase to the system’s total entropy is consistent with the second law of thermodynamics, which leads to the relationship between maximum entropy and the Boltzmann distribution.

ContributorsLewis, Aiden (Author) / Chamberlin, Ralph (Thesis director) / Beckstein, Oliver (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Department of Physics (Contributor)
Created2023-05
Description
This document is a guide that can be used by undergraduate physics students alongside Richard J. Jacob and Professor Emeritus’s Tutorials in the Mathematical Methods of Physics to aid in their understanding of the key mathematical concepts from PHY201 and PHY302. This guide can stand on its own and be

This document is a guide that can be used by undergraduate physics students alongside Richard J. Jacob and Professor Emeritus’s Tutorials in the Mathematical Methods of Physics to aid in their understanding of the key mathematical concepts from PHY201 and PHY302. This guide can stand on its own and be used in other upper division physics courses as a handbook for common special functions. Additionally, we have created several Mathematica notebooks that showcase and visualize some of the topics discussed (available from the GitHub link in the introduction of the guide).
ContributorsUnterkofler, Eric (Author) / Skinner, Tristin (Co-author) / Covatto, Carl (Thesis director) / Keeler, Cynthia (Committee member) / Barrett, The Honors College (Contributor) / Department of Physics (Contributor) / School of Mathematical and Statistical Sciences (Contributor)
Created2022-12
Description

This document is a guide that can be used by undergraduate physics students alongside Richard J. Jacob and Professor Emeritus’s Tutorials in the Mathematical Methods of Physics to aid in their understanding of the key mathematical concepts from PHY201 and PHY302. This guide can stand on its own and be

This document is a guide that can be used by undergraduate physics students alongside Richard J. Jacob and Professor Emeritus’s Tutorials in the Mathematical Methods of Physics to aid in their understanding of the key mathematical concepts from PHY201 and PHY302. This guide can stand on its own and be used in other upper division physics courses as a handbook for common special functions. Additionally, we have created several Mathematica notebooks that showcase and visualize some of the topics discussed (available from the GitHub link in the introduction of the guide).

ContributorsSkinner, Tristin (Author) / Unterkofler, Eric (Co-author) / Covatto, Carl (Thesis director) / Keeler, Cynthia (Committee member) / Barrett, The Honors College (Contributor) / Department of Physics (Contributor) / School of Mathematical and Statistical Sciences (Contributor)
Created2022-12
Description

In this project we focus on COVID-19 in a university setting. Arizona State University has a very large population on the Tempe Campus. With the emergence of diseases such as COVID-19, it is very important to track how such a disease spreads within that type of community. This is vital

In this project we focus on COVID-19 in a university setting. Arizona State University has a very large population on the Tempe Campus. With the emergence of diseases such as COVID-19, it is very important to track how such a disease spreads within that type of community. This is vital for containment measures and the safety of everyone involved. We found in the literature several epidemiology models that utilize differential equations for tracking a spread of a disease. However, our goal is to provide a granular look at how disease may spread through contact in a classroom. This thesis models a single ASU classroom and tracks the spread of a disease. It is important to note that our variables and declarations are not aligned with COVID-19 or any other specific disease but are chosen to exemplify the impact of some key parameters on the epidemic size. We found that a smaller transmissibility alongside a more spread-out classroom of agents resulted in fewer infections overall. There are many extensions to this model that are needed in order to take what we have demonstrated and align those ideas with COVID-19 and it’s spread at ASU. However, this model successfully demonstrates a spread of disease through single-classroom interaction, which is the key component for any university campus disease transmission model.

ContributorsJoseph, Mariam (Author) / Bartko, Ezri (Co-author) / Sabuwala, Sana (Co-author) / Milner, Fabio (Thesis director) / O'Keefe, Kelly (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Division of Teacher Preparation (Contributor)
Created2022-12
132260-Thumbnail Image.png
Description
There exists a notable gender gap in the field of economics. One explanation for this gap is the low supply of women entering the economics labor market. To understand the shortage of female economics students, I observe students at the undergraduate and graduate level. My data consists of a sample

There exists a notable gender gap in the field of economics. One explanation for this gap is the low supply of women entering the economics labor market. To understand the shortage of female economics students, I observe students at the undergraduate and graduate level. My data consists of a sample of current undergraduate students and a sample of past Ph.D. applicants at Arizona State University. The gender gaps in these samples, both at the undergraduate and graduate level, can largely be explained by the variation in mathematical preparation of the students. The data reveals that undergraduate male economics students are more frequently enrolled in higher level math courses compared to female undergraduate students. Likewise, a higher number of male Ph.D. applicants have stronger mathematical backgrounds relative to female Ph.D. applicants. This common factor might explain the higher supply of male students who apply and get accepted to postgraduate studies in economics, relative to female students, holding all else constant. I conclude with the following recommended interventions: make information regarding postgraduate opportunities in economics more readily available, and increase math requirements for a bachelor’s degree in economics at ASU.
ContributorsZafari, Zorah (Author) / Datta, Manjira (Thesis director) / Zafar, Basit (Committee member) / School of Mathematical and Statistical Sciences (Contributor) / School of Social Transformation (Contributor, Contributor) / Department of Economics (Contributor) / Dean, W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05
131781-Thumbnail Image.png
Description
In the modern world with the ever growing importance of technology, the challenge of information security is of increasing importance. Cryptographic algorithms used to encode information stored and transmitted over the internet must be constantly improving as methodology and technology for cyber attacks improve. RSA and Elliptic Curve cryptosystems such

In the modern world with the ever growing importance of technology, the challenge of information security is of increasing importance. Cryptographic algorithms used to encode information stored and transmitted over the internet must be constantly improving as methodology and technology for cyber attacks improve. RSA and Elliptic Curve cryptosystems such as El Gamal or Diffie-Hellman key exchange are often used as secure asymmetric cryptographic algorithms. However, quantum computing threatens the security of these algorithms. A relatively new algorithm that is based on isogenies between elliptic curves has been proposed in response to this threat. The new algorithm is thought to be quantum resistant as it uses isogeny walks instead of point addition to generate a shared secret key. In this paper we will analyze this algorithm in an attempt to understand the theory behind it. A main goal is to create isogeny graphs to visualize degree 2 and 3 isogeny walks that can be taken between supersingular elliptic curves over small fields to get a better understanding of the workings and security of the algorithm.
ContributorsLoucks, Sara J (Author) / Jones, John (Thesis director) / Bremner, Andrew (Committee member) / Computer Science and Engineering Program (Contributor) / School of Film, Dance and Theatre (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131750-Thumbnail Image.png
Description
A one-way function (OWF) is a function that is computationally feasible to compute in one direction, but infeasible to invert. Many current cryptosystems make use of properties of OWFs to provide ways to send secure messages. This paper reviews some simple OWFs and examines their use in contemporary cryptosystems and

A one-way function (OWF) is a function that is computationally feasible to compute in one direction, but infeasible to invert. Many current cryptosystems make use of properties of OWFs to provide ways to send secure messages. This paper reviews some simple OWFs and examines their use in contemporary cryptosystems and other cryptographic applications. This paper also discusses the broader implications of OWF-based cryptography, including its relevance to fields such as complexity theory and quantum computing, and considers the importance of OWFs in future cryptographic development
ContributorsMcdowell, Jeremiah Tenney (Author) / Hines, Taylor (Thesis director) / Foy, Joseph (Committee member) / Sprung, Florian (Committee member) / School of Mathematical and Statistical Sciences (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2020-05