Skip to main content

Showing 1–50 of 126 results for author: Kak, S

.
  1. arXiv:2407.02493  [pdf

    physics.bio-ph cs.DC cs.IT

    The dimensionality of a coiled helical coil

    Authors: Subhash Kak

    Abstract: The helical coil is ubiquitous in biological and natural systems and often it is the basic form that leads to complex structures. This paper considers the question of its dimensionality in biological information as the helical coil goes through recursive coiling as happens to DNA and RNA molecules in chromatin. It has been shown that the dimensionality of coiled coils is virtually equal to e. Of t… ▽ More

    Submitted 11 April, 2024; originally announced July 2024.

    Comments: 10 pages, 8 figures

  2. arXiv:2402.09408  [pdf

    q-bio.BM

    The geometry of chromatin

    Authors: Subhash Kak

    Abstract: We investigate the large-scale geometry of the DNA-protein complex of chromatin using a generalized optimality principle, which requires that not only should all sub-parts of a natural process be optimal but also the unfolding of higher recursive levels. It was shown previously that an information-theoretic geometry of the genetic code data, together with the principle of maximum entropy, explains… ▽ More

    Submitted 11 December, 2023; originally announced February 2024.

    Comments: 12 pages

  3. The base-e representation of numbers and the power law

    Authors: Subhash Kak

    Abstract: Some properties of the optimal representation of numbers are investigated. This representation, which is to the base-e, is examined for coding of integers. An approximate representation without fractions that we call WF is introduced and compared with base-2 and base-3 representations, which are next to base-e in efficiency. Since trees are analogous to number representation, we explore the releva… ▽ More

    Submitted 21 March, 2020; v1 submitted 28 February, 2020; originally announced March 2020.

    Comments: 12 pages; with correction of typographical errors

    Journal ref: Circuits, Systems, and Signal Processing (2020)

  4. arXiv:1807.06419  [pdf

    cs.AI

    On Ternary Coding and Three-Valued Logic

    Authors: Subhash Kak

    Abstract: Mathematically, ternary coding is more efficient than binary coding. It is little used in computation because technology for binary processing is already established and the implementation of ternary coding is more complicated, but remains relevant in algorithms that use decision trees and in communications. In this paper we present a new comparison of binary and ternary coding and their relative… ▽ More

    Submitted 13 July, 2018; originally announced July 2018.

    Comments: 12 pages

  5. arXiv:1806.06695  [pdf

    physics.soc-ph

    Variations on the Newcomb-Benford Law

    Authors: Subhash Kak

    Abstract: The Newcomb-Benford Law, which is also called the first digit phenomenon, has applications in diverse phenomena ranging from social and computer networks, engineering systems, natural sciences, and accounting. In forensics, it has been used to determine intrusion in a computer server based on the measured expectations of first digits of time varying values of data, and to check whether the informa… ▽ More

    Submitted 14 June, 2018; originally announced June 2018.

    Comments: 10 pages

  6. arXiv:1804.02759  [pdf

    cs.AI

    Order Effects for Queries in Intelligent Systems

    Authors: Subhash Kak

    Abstract: This paper examines common assumptions regarding the decision-making internal environment for intelligent agents and investigates issues related to processing of memory and belief states to help obtain better understanding of the responses. In specific, we consider order effects and discuss both classical and non-classical explanations for them. We also consider implicit cognition and explore if c… ▽ More

    Submitted 8 April, 2018; originally announced April 2018.

    Comments: 11 pages; 5 figures

    Report number: Plenary Lecture, TSC2018 (East-West Forum), Tucson, April 2, 2018

  7. arXiv:1803.04994  [pdf

    cs.AI

    On the Algebra in Boole's Laws of Thought

    Authors: Subhash Kak

    Abstract: This article explores the ideas that went into George Boole's development of an algebra for logical inference in his book The Laws of Thought. We explore in particular his wife Mary Boole's claim that he was deeply influenced by Indian logic and argue that his work was more than a framework for processing propositions. By exploring parallels between his work and Indian logic, we are able to explai… ▽ More

    Submitted 13 March, 2018; originally announced March 2018.

    Comments: 11 pages

    Journal ref: Current Science, vol.. 114, pp. 2570-2573, 2018

  8. arXiv:1802.04093  [pdf

    cs.AI

    Reasoning in a Hierarchical System with Missing Group Size Information

    Authors: Subhash Kak

    Abstract: The paper analyzes the problem of judgments or preferences subsequent to initial analysis by autonomous agents in a hierarchical system where the higher level agents does not have access to group size information. We propose methods that reduce instances of preference reversal of the kind encountered in Simpson's paradox.

    Submitted 7 February, 2018; originally announced February 2018.

    Comments: 9 pages

  9. arXiv:1712.09331  [pdf

    cs.NE

    Learning Based on CC1 and CC4 Neural Networks

    Authors: Subhash Kak

    Abstract: We propose that a general learning system should have three kinds of agents corresponding to sensory, short-term, and long-term memory that implicitly will facilitate context-free and context-sensitive aspects of learning. These three agents perform mututally complementary functions that capture aspects of the human cognition system. We investigate the use of CC1 and CC4 networks for use as models… ▽ More

    Submitted 22 December, 2017; originally announced December 2017.

    Comments: 5 pages.arXiv admin note: text overlap with arXiv:0809.5087; text overlap with arXiv:cs/0601129 by other authors

  10. arXiv:1712.04909  [pdf

    cs.AI

    Reasoning in Systems with Elements that Randomly Switch Characteristics

    Authors: Subhash Kak

    Abstract: We examine the issue of stability of probability in reasoning about complex systems with uncertainty in structure. Normally, propositions are viewed as probability functions on an abstract random graph where it is implicitly assumed that the nodes of the graph have stable properties. But what if some of the nodes change their characteristics? This is a situation that cannot be covered by abstracti… ▽ More

    Submitted 13 December, 2017; originally announced December 2017.

    Comments: 10 pages

  11. arXiv:1709.04029  [pdf

    cs.AI

    Probability Reversal and the Disjunction Effect in Reasoning Systems

    Authors: Subhash Kak

    Abstract: Data based judgments go into artificial intelligence applications but they undergo paradoxical reversal when seemingly unnecessary additional data is provided. Examples of this are Simpson's reversal and the disjunction effect where the beliefs about the data change once it is presented or aggregated differently. Sometimes the significance of the difference can be evaluated using statistical tests… ▽ More

    Submitted 12 September, 2017; originally announced September 2017.

    Comments: 11 pages

  12. The Limits to Machine Consciousness

    Authors: Subhash Kak

    Abstract: It is generally accepted that machines can replicate cognitive tasks performed by conscious agents as long as they are not based on the capacity of awareness. We consider several views on the nature of subjective awareness, which is fundamental for self-reflection and review, and present reasons why this property is not computable. We argue that consciousness is more than an epiphenomenon and assu… ▽ More

    Submitted 17 July, 2017; originally announced July 2017.

    Comments: 14 pages, 8 figures

    Journal ref: Journal of Artificial Intelligence and Consciousness, August 2021

  13. arXiv:1704.08718  [pdf

    cs.CR

    Binary Prime Tableau Sequences

    Authors: Prashanth Busireddygari, Subhash Kak

    Abstract: This paper proposes a new class of random sequences called binary primes tableau (PT) sequences that have potential applications in cryptography and communications. The PT sequence of rank p is obtained from numbers arranged in a tableau with p columns where primes are marked off until each column has at least one prime and where the column entries are added modulo 2. We also examine the dual to t… ▽ More

    Submitted 16 April, 2017; originally announced April 2017.

    Comments: 10

  14. arXiv:1703.03693  [pdf

    cs.AI

    On Quantum Decision Trees

    Authors: Subhash Kak

    Abstract: Quantum decision systems are being increasingly considered for use in artificial intelligence applications. Classical and quantum nodes can be distinguished based on certain correlations in their states. This paper investigates some properties of the states obtained in a decision tree structure. How these correlations may be mapped to the decision tree is considered. Classical tree representations… ▽ More

    Submitted 8 March, 2017; originally announced March 2017.

    Comments: 9 pages, 7 figures

  15. arXiv:1702.05778  [pdf

    cs.AI cs.GT

    The Absent-Minded Driver Problem Redux

    Authors: Subhash Kak

    Abstract: This paper reconsiders the problem of the absent-minded driver who must choose between alternatives with different payoff with imperfect recall and varying degrees of knowledge of the system. The classical absent-minded driver problem represents the case with limited information and it has bearing on the general area of communication and learning, social choice, mechanism design, auctions, theorie… ▽ More

    Submitted 19 February, 2017; originally announced February 2017.

    Comments: 9 pages, 3 figures

  16. arXiv:1607.06080  [pdf

    physics.hist-ph quant-ph

    An Epistemic View of Quantum Communication

    Authors: Subhash Kak

    Abstract: This paper presents an epistemological perspective on quantum communication between parties that highlights the choices that must be made in order to send and obtain information. The notion of information obtained in such a communication is a property associated with the observers and while dependent on the nature of the physical system its fundamental basis is epistemic. We argue that the observa… ▽ More

    Submitted 20 July, 2016; originally announced July 2016.

    Comments: 11 pages in Presented at International Conference on Quantum and Beyond. Linnaeus University, Vaxjo, Sweden, June 13-16, 2016

  17. arXiv:1606.00410  [pdf

    cs.CR

    The binary primes sequence for computational hardening of pseudorandom sequences

    Authors: B. Prashanth Reddy, Subhash Kak

    Abstract: This paper proposes the use of the binary primes sequence to strengthen pseudorandom (PN) decimal sequences for cryptography applications. The binary primes sequence is added to the PN decimal sequence (where one can choose from many arbitrary shift values) and it is shown that the sum sequence has improved autocorrelation properties besides being computationally hard. Also, an analysis on the com… ▽ More

    Submitted 1 June, 2016; originally announced June 2016.

    Comments: 8 pages

  18. arXiv:1601.07110  [pdf

    cs.IT cs.CR

    The Narayana Universal Code

    Authors: Krishnamurthy Kirthi, Subhash Kak

    Abstract: This paper presents a method of universal coding based on the Narayana series. The rules necessary to make such coding possible have been found and the length of the resulting code has been determined to follow the Narayana count.

    Submitted 26 January, 2016; originally announced January 2016.

    Comments: 9 pages, 2 figures

  19. State Ensembles and Quantum Entropy

    Authors: Subhash Kak

    Abstract: This paper considers quantum communication involving an ensemble of states. Apart from the von Neumann entropy, it considers other measures one of which may be useful in obtaining information about an unknown pure state and another that may be useful in quantum games. It is shown that under certain conditions in a two-party quantum game, the receiver of the states can increase the entropy by addin… ▽ More

    Submitted 31 August, 2015; originally announced September 2015.

    Comments: 12 pages, 5 figures

    Journal ref: Int. J. Theoretical Physics (2016) 55: 3017-3026

  20. arXiv:1506.07497  [pdf

    cs.SI physics.soc-ph

    Two Power Series Models of Self-Similarity in Social Networks

    Authors: Subhash Kak

    Abstract: Two power series models are proposed to represent self-similarity and they are compared to the Zipf and Benford distributions. Since evolution of a social network is associated with replicating self-similarity at many levels, the nature of interconnections can serve as a measure of the optimality of its organization. In contrast with the Zipf distribution where the middle term is the harmonic mean… ▽ More

    Submitted 24 June, 2015; originally announced June 2015.

    Comments: 12 pages, 4 figures. arXiv admin note: text overlap with arXiv:0812.2891 by other authors without attribution

  21. arXiv:1506.03377  [pdf

    cs.SI

    Connectivity in Social Networks

    Authors: Sieteng Soh, Gongqi Lin, Subhash Kak

    Abstract: The value of a social network is generally determined by its size and the connectivity of its nodes. But since some of the nodes may be fake ones and others that are dormant, the question of validating the node counts by statistical tests becomes important. In this paper we propose the use of the Benford's distribution to check on the trustworthiness of the connectivity statistics. Our experiments… ▽ More

    Submitted 10 June, 2015; originally announced June 2015.

    Comments: 8 pages, 5 figures

  22. arXiv:1505.05081  [pdf

    cs.CR

    Multiparty Probability Computation and Verification

    Authors: Subhash Kak

    Abstract: A multiparty computation protocol is described in which the parties can generate different probability events that is based on the sharing of a single anonymized random number, and also perform oblivious transfer. A method to verify the correctness of the procedure, without revealing the random numbers used by the parties, is proposed.

    Submitted 28 May, 2015; v1 submitted 19 May, 2015; originally announced May 2015.

    Comments: 8 pages, 4 figures; Corrected typographical errors

  23. arXiv:1504.00601  [pdf

    cs.CR

    Oblivious Transfer Protocol with Verification

    Authors: Subhash Kak

    Abstract: Although random sequences can be used to generate probability events, they come with the risk of cheating in an unsupervised situation. In such cases, the oblivious transfer protocol may be used and this paper presents a variation to the DH key-exchange to serve as this protocol. A method to verify the correctness of the procedure, without revealing the random numbers used by the two parties, is a… ▽ More

    Submitted 2 April, 2015; originally announced April 2015.

    Comments: 7 pages, 2 figures

  24. Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption

    Authors: Kam Wai Clifford Chan, Mayssaa El Rifai, Pramode K. Verma, Subhash Kak, Yuhua Chen

    Abstract: This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the protocol is presented with coherent states under the intercept-resend attack, the photon number splitting attack, and the man-in-the-middle attac… ▽ More

    Submitted 19 March, 2015; originally announced March 2015.

    Journal ref: International Journal on Cryptography and Information Security, Vol. 5, No. 3/4, pp. 1-13 (2015)

  25. arXiv:1503.03821  [pdf

    cs.CR

    A Class of Random Sequences for Key Generation

    Authors: Krishnamurthy Kirthi, Subhash Kak

    Abstract: This paper investigates randomness properties of sequences derived from Fibonacci and Gopala-Hemachandra sequences modulo m for use in key distribution applications. We show that for sequences modulo a prime a binary random sequence B(n) is obtained based on whether the period is p-1 (or a divisor) or 2p+2 (or a divisor). For the more general case of arbitrary m, we use the property if the period… ▽ More

    Submitted 12 March, 2015; originally announced March 2015.

    Comments: 7 pages; 4 figures

  26. arXiv:1502.00894  [pdf

    cs.IT

    Extended Unary Coding

    Authors: Subhash Kak

    Abstract: Extended variants of the recently introduced spread unary coding are described. These schemes, in which the length of the code word is fixed, allow representation of approximately n^2 numbers for n bits, rather than the n numbers of the standard unary coding. In the first of two proposed schemes the spread increases, whereas in the second scheme the spread remains constant.

    Submitted 3 February, 2015; originally announced February 2015.

    Comments: 5 pages

  27. arXiv:1412.7049  [pdf

    cs.SI

    Friendship Paradox and Attention Economics

    Authors: Subhash Kak

    Abstract: The friendship paradox is revisited by considering both local and global averages of friends. How the economics of attention affects the recruitment of friends is examined. Statistical implications of varying individual attentions are investigated and it is argued that this is one reason why the mean of friends is higher than the median in social networks. The distribution of friends skews to the… ▽ More

    Submitted 22 December, 2014; originally announced December 2014.

    Comments: 8 pages, 4 figures

  28. arXiv:1412.6122  [pdf

    cs.NE cs.IT

    Spread Unary Coding

    Authors: Subhash Kak

    Abstract: Unary coding is useful but it is redundant in its standard form. Unary coding can also be seen as spatial coding where the value of the number is determined by its place in an array. Motivated by biological finding that several neurons in the vicinity represent the same number, we propose a variant of unary numeration in its spatial form, where each number is represented by several 1s. We call thi… ▽ More

    Submitted 2 December, 2014; originally announced December 2014.

    Comments: 5 pages, 2 figures

  29. arXiv:1411.3645  [pdf

    cs.CR

    Authentication Using Piggy Bank Approach to Secure Double-Lock Cryptography

    Authors: Subhash Kak

    Abstract: The piggy bank idea allows one-way encryption of information that can be accessed only by authorized parties. Here we show how the piggy bank idea can be used to authenticate parties to counter man-in-the-middle (MIM) attack that can jeopardize the double-lock cryptography protocol. We call this method double-signature double lock cryptography and it can be implemented in ways that go beyond hash-… ▽ More

    Submitted 13 November, 2014; originally announced November 2014.

    Comments: 8 pages, 6 figures

  30. arXiv:1411.3273  [pdf

    cs.DC

    Efficiency of Matrix Multiplication on the Cross-Wired Mesh Array

    Authors: Subhash Kak

    Abstract: This note looks at the efficiency of the cross-wired mesh array in the context of matrix multiplication. It is shown that in case of repeated operations, the average number of steps to multiply sets of nxn matrices on a 2D cross-wired mesh array approaches n.

    Submitted 12 November, 2014; originally announced November 2014.

    Comments: 5 pages

  31. arXiv:1410.6525  [pdf

    quant-ph

    Quantum Darwinism and Computability Theory

    Authors: Subhash Kak

    Abstract: This paper examines whether unitary evolution alone is sufficient to explain emergence of the classical world from the perspective of computability theory. Specifically, it looks at the problem of how the choice related to the measurement is made by the observer viewed as a quantum system. In interpretations where the system together with the observers is completely described by unitary transforma… ▽ More

    Submitted 23 October, 2014; originally announced October 2014.

    Comments: 6 pages, 3 figures

  32. arXiv:1404.7520  [pdf

    quant-ph

    Quantum Measurement Complexity

    Authors: Subhash Kak

    Abstract: This paper explores the problem of quantum measurement complexity. In computability theory, the complexity of a problem is determined by how long it takes an effective algorithm to solve it. This complexity may be compared to the difficulty for a hypothetical oracle machine, the output of which may be verified by a computable function but cannot be simulated on a physical machine. We define a quan… ▽ More

    Submitted 29 April, 2014; originally announced April 2014.

    Comments: 12 pages, 3 figures

    Journal ref: NeuroQuantology 12: 374-381 (2014)

  33. arXiv:1401.7637  [pdf

    physics.hist-ph physics.pop-ph

    Guaman Poma's Yupana and Inca Astronomy

    Authors: Subhash Kak

    Abstract: An explanation is provided for the Inca counting board described by Guaman Poma in 1615. Although the board could have been used in more than one way, we show that based on certain reasonable assumptions regarding non-uniform representation of numbers its most likely use was counting in multiples of 6, 24, and 72. The independent numbers represented on its five rows are 92, 31, 29, 79, and 56 that… ▽ More

    Submitted 17 February, 2014; v1 submitted 29 January, 2014; originally announced January 2014.

    Comments: 11 pages, 15 figures

    Journal ref: Indian Journal of History of Science, vol. 54.4, December 2019, pp. 397-404

  34. arXiv:1401.2180  [pdf

    quant-ph

    Veiled Nonlocality and Cosmic Censorship

    Authors: Menas Kafatos, Subhash Kak

    Abstract: The premise that consciousness has a quantum mechanical basis or correlate implies that its workings have a nonlocal component. To check whether consciousness as an entity leaves a physical trace, we propose that laboratory searches for such a trace should be for nonlocality, where probabilities do not conform to local expectations. Starting with the idea that nonlocality may be veiled as one of t… ▽ More

    Submitted 26 March, 2014; v1 submitted 7 January, 2014; originally announced January 2014.

    Comments: 7 pages, 1 figure

  35. arXiv:1312.2539  [pdf

    cs.CR

    A Key Set Cipher for Wireless Sensor Networks

    Authors: Subhash Kak

    Abstract: This paper proposes the use of sets of keys, together with corresponding identifiers, for use in wireless sensor networks and similar resource-constrained applications. A specific cryptographic scheme described in the paper is based on the use of a family of self-inverting matrices derived from the number theoretic Hilbert transform in conjunction with the Blom's scheme. In a randomized version of… ▽ More

    Submitted 9 December, 2013; originally announced December 2013.

    Comments: 12 pages, 2 figures

  36. arXiv:1311.6821  [pdf

    cs.CR

    A Class of Orthogonal Sequences

    Authors: Subhash Kak

    Abstract: This paper presents a class of random orthogonal sequences associated with the number theoretic Hilbert transform. We present a constructive procedure for finding the random sequences for different modulus values. These random sequences have autocorrelation function that is zero everywhere excepting at the origin. These sequences may be used as keys and in other cryptography applications.

    Submitted 26 November, 2013; originally announced November 2013.

    Comments: 8 pages, 2 figures

  37. arXiv:1310.6333  [pdf

    quant-ph cs.CR

    Threshold Quantum Cryptography

    Authors: Subhash Kak

    Abstract: Most current research on quantum cryptography requires transmission and reception of single photons that creates severe implementation challenges and limits range. This paper argues for the development of threshold quantum cryptography protocols in which the system is secure so long as the number of photons being exchanged between Alice and Bob is below a specified threshold. We speak of a (p-k-n)… ▽ More

    Submitted 23 October, 2013; originally announced October 2013.

    Comments: 10 pages, 4 figures. arXiv admin note: text overlap with arXiv:1206.6778

  38. arXiv:1309.6189  [pdf

    physics.hist-ph quant-ph

    From the No-Signaling Theorem to Veiled Nonlocality

    Authors: Subhash Kak

    Abstract: According to the no-signaling theorem, the nonlocal collapse of the wavefunction of an entangled particle by the measurement on its twin particle at a remote location cannot be used to send useful information. Given that experiments on nonlocal correlations continue to have loopholes, we propose a stronger principle that the nonlocality of quantum mechanics itself is veiled. In practical terms, de… ▽ More

    Submitted 24 September, 2013; originally announced September 2013.

    Comments: 11 pages

    Journal ref: NeuroQuantology 12: 12-20 (2014)

  39. arXiv:1309.2238  [pdf

    quant-ph cs.IT

    Probability and the Classical/Quantum Divide

    Authors: Subhash Kak

    Abstract: This paper considers the problem of distinguishing between classical and quantum domains in macroscopic phenomena using tests based on probability and it presents a condition on the ratios of the outcomes being the same (Ps) to being different (Pn). Given three events, Ps/Pn for the classical case, where there are no 3-way coincidences, is one-half whereas for the quantum state it is one-third. Fo… ▽ More

    Submitted 9 September, 2013; originally announced September 2013.

    Comments: 12 pages; 1 figure

    Journal ref: NeuroQuantology, vol. 11, pp. 600-606, 2013

  40. arXiv:1308.1688  [pdf

    cs.CR cs.IT math.NT

    The Number Theoretic Hilbert Transform

    Authors: Subhash Kak

    Abstract: This paper presents a general expression for a number-theoretic Hilbert transform (NHT). The transformations preserve the circulant nature of the discrete Hilbert transform (DHT) matrix together with alternating values in each row being zero and non-zero. Specific examples for 4-point, 6-point, and 8-point NHT are provided. The NHT transformation can be used as a primitive to create cryptographica… ▽ More

    Submitted 5 August, 2013; originally announced August 2013.

    Comments: 11 pages

    Journal ref: Circuits, Systems and Signal Processing 33 (2014) 2539-2548

  41. arXiv:1307.8104  [pdf

    cs.NE

    Neural Network Capacity for Multilevel Inputs

    Authors: Matt Stowe, Subhash Kak

    Abstract: This paper examines the memory capacity of generalized neural networks. Hopfield networks trained with a variety of learning techniques are investigated for their capacity both for binary and non-binary alphabets. It is shown that the capacity can be much increased when multilevel inputs are used. New learning strategies are proposed to increase Hopfield network capacity, and the scalability of th… ▽ More

    Submitted 30 July, 2013; originally announced July 2013.

    Comments: 24 pages,17 figures

  42. arXiv:1305.1900  [pdf

    cs.CR

    Residue Classes of the PPT Sequence

    Authors: Subhash Kak

    Abstract: Primitive Pythagorean triples (PPT) may be put into different equivalence classes using residues with respect to primes. We show that the probability that the smaller odd number associated with the PPT triple is divisible by prime p is 2/(p+1). We have determined the autocorrelation function of the Baudhayana sequences obtained from the residue classes and we show these sequences have excellent ra… ▽ More

    Submitted 8 May, 2013; originally announced May 2013.

    Comments: 8 pages, 4 figures

  43. arXiv:1304.4651  [pdf

    cs.CR

    Generalized Public Key Transformations with Side Information

    Authors: Gunjan Talati, Subhash Kak

    Abstract: This paper presents results on generalized public key cryptography with exponentials modulo primes and composite numbers where the map** is not one-to-one and the uniqueness is achieved by additional side information. Such transformations may be used for oblivious transfer and generate events of specific probabilities.

    Submitted 16 April, 2013; originally announced April 2013.

    Comments: 15 pages. arXiv admin note: text overlap with arXiv:1304.4273

  44. arXiv:1304.4273  [pdf

    cs.CR

    The Quartic Public Key Transformation

    Authors: Gunjan Talati, Subhash Kak

    Abstract: This paper presents the quartic public key transformation which can be used for public key applications if side information is also used. This extends an earlier work where the cubic transformation was similarly used. Such a transformation can be used in multiparty communications protocols.

    Submitted 15 April, 2013; originally announced April 2013.

    Comments: 6 pages

  45. arXiv:1301.1994  [pdf

    quant-ph

    Simulating Entanglement in Classical Computing

    Authors: Subhash Kak

    Abstract: This note shows how quantum entanglement may be simulated in classical computing. The simulated entanglement protocol is implemented using oblivious transfer in the simplest case and other many-to-one map**s in more general cases. For the case where the map** is of order k, we prove a theorem that gives us the function of the entangled state. A useful generalization beyond this research will b… ▽ More

    Submitted 7 January, 2013; originally announced January 2013.

    Comments: 7 pages, 2 figures

  46. arXiv:1301.0313  [pdf

    cs.CR

    The Piggy Bank Cryptographic Trope

    Authors: Subhash Kak

    Abstract: This paper presents applications of the trope of the locked and sealed piggy-bank into which the secret can be easily inserted but from which it cannot be withdrawn without opening the box. We present a basic two-pass cryptographic scheme that can serve as template for a variety of implementations. Together with the sealed piggy-bank is sent a coded letter that lists and certifies the contents of… ▽ More

    Submitted 1 January, 2013; originally announced January 2013.

    Comments: 7 pages, 6 figures

    Journal ref: Infocommunications Journal 6: 22-25 (2014)

  47. arXiv:1211.2751  [pdf

    cs.CR

    Random Sequences from Primitive Pythagorean Triples

    Authors: Monisha Prabhu, Subhash Kak

    Abstract: This paper shows that the six classes of PPTs can be put into two groups. Autocorrelation and cross-correlation functions of the six classes derived from the gaps between each class type have been computed. It is shown that Classes A and D (in which the largest term is divisible by 5) are different from the other four classes in their randomness properties if they are ordered by the largest term.… ▽ More

    Submitted 12 November, 2012; originally announced November 2012.

    Comments: 10 pages, 6 figures

  48. arXiv:1210.8398  [pdf

    cs.IT

    An Alignment Algorithm for Sequences

    Authors: Sandeep Hosangadi, Subhash Kak

    Abstract: This paper describes a new alignment algorithm for sequences that can be used for determination of deletions and substitutions. It provides several solutions out of which the best one can be chosen on the basis of minimization of gaps or other considerations. The algorithm does not use similarity tables and it performs aspects of both global and local alignment. The algorithm is compared with othe… ▽ More

    Submitted 31 October, 2012; originally announced October 2012.

    Comments: 8 pages

  49. arXiv:1210.4614  [pdf

    cs.CR cs.IT

    Random Sequences Based on the Divisor Pairs Function

    Authors: Subhash Kak

    Abstract: This paper investigates the randomness properties of a function of the divisor pairs of a natural number. This function, the antecedents of which go to very ancient times, has randomness properties that can find applications in cryptography, key distribution, and other problems of computer science. It is shown that the function is aperiodic and it has excellent autocorrelation properties.

    Submitted 21 November, 2012; v1 submitted 10 October, 2012; originally announced October 2012.

    Comments: 6 pages, 5 figures

  50. arXiv:1209.4621  [pdf

    cs.CR

    Goldbach Circles and Balloons and Their Cross Correlation

    Authors: Krishnama Raju Kanchu, Subhash Kak

    Abstract: Goldbach partitions can be used in creation of ellipses and circles on the number line. We extend this work and determine the count and other properties of concentric Goldbach circles for different values of n. The autocorrelation function of this sequence with respect to even and odd values suggests that it has excellent randomness properties. Cross correlation properties of ellipse and circle se… ▽ More

    Submitted 20 September, 2012; originally announced September 2012.

    Comments: 9 pages, 7 figures