ࡱ> jli` Pbjbj .`-84`vj* %"&&&'''suuuuuuuuuuuuu$wh2zXu.}''..u&&gvQQQ. 8&&suQ.suQQRr3u& DkE<ssu0v0`vsbztDz<3uz3u@')Q+4O,{'''uu8K'''`v.... Chris Farley Research Paper RSA Public-key Cryptosystem Suppose Alice and Bob want to communicate with each other, but they do not want others to be able to ease drop on their conversations. For example, Alice and Bob may be working on top-secret research or they may be allies in a war. They would need to develop their own system for communication like their own language or alphabet. However, this would not necessarily ensure that they could protect the translation from an attacker. They need a way of converting information and then decoding the converted information so that it is only understood by each other. The process by which they will achieve this is cryptography, also known as cryptology. The particular scheme that they employ is a cryptosystem. Cryptosystems are made up of three basic parts: the encryption algorithm, the decryption algorithm, and the key(s). The encryption algorithm is the algorithm used to encode an original, or a plaintext message. The decryption algorithm is the reverse process of the encryption algorithm. With the decryption algorithm, the user converts the encoded message back to its original plaintext message. The key system is used during the process of encrypting and decrypting messages. Generally, an encryption key is used to encrypt messages, whereas a decryption key is used decrypt messages. The RSA algorithm is used in cryptography as a public-key cryptosystem. This algorithm was the first known to be suitable for signing as well as encryption. Because of this, it was one of the first great advancements in public-key cryptology. RSA is still widely used and is believed to be secure given sufficiently long keys. This is because RSA is based on the difficulty of factoring large prime numbers. Ron Rivest, Adi Shamir, and Len Adleman described the RSA algorithm at MIT in 1977. The algorithms name, RSA, was derived from the initials of their last names. The algorithm was patented by MIT in the United States in 1983. It was given the U.S. Patent number 4,405,829, expiring on September 21, 2000 (Wikipedia, RSA). A British mathematician, Clifford Cocks, supposedly had written an equivalent system to RSA in 1973. However, the research was not pursued due to the lack of and the cost of computers that were needed to execute the algorithm. This discovery was not revealed until 1997 because of the top-secret classification given by GCHQ (UK Government Communications Head Quarters), of which, Cocks was affiliated. Now that we have a little background about RSA, it is time to answer how Alice can securely communicate with Bob. How do we go about generating the keys that we need to securely send the message? If Bob wants to have Alice send him a secure message over an insecure medium, then he needs to take the following steps to generate the public and private keys: Choose two large primes, p and q, randomly and independently of each other; however, be sure that they are very large so that their product will be of sufficient size. Also, the primes are to be kept secret. Compute the product N = pq. The product, N, is to be made public and is known as the modulus. Compute the totient  EMBED Equation.3  The totient function is Eulers phi function (see notes section). Choose an integer e (which is to be made public), where  EMBED Equation.3  such that  EMBED Equation.3 or equivalently, e is coprime or relatively prime to EMBED Equation.3  In general, if EMBED Equation.3 then a and b are relatively prime, and  EMBED Equation.3 is a congruence. Note that this can be found using the Euclidean Algorithm. Compute the private key, d, which is the multiplicative inverse of  EMBED Equation.3 i.e., find an integer d with  EMBED Equation.3  In general, solve for d in the equation  EMBED Equation.3  The existence of d follows from the fact that if given two integers, a and b, where the  EMBED Equation.3 then b is invertible (mod a) and b has a multiplicative inverse in EMBED Equation.3 . This can also be found with the Euclidean Algorithm. That is how we generate our keys. The public key consists of the modulus, N, and the public exponent, also referred to as the encryption exponent, e. The private key consists of, again, the public modulus, N, and the private exponent, d, which is also called the decryption exponent. The value of d must be kept secret, as well as the values of p, q, and EMBED Equation.3  Now that we have our keys, we can start sending messages. How do we use our keys to send encrypted messages and then decrypt them? To explain, we will return to our hypothetical guinea pigs, Alice and Bob. Suppose Alice wishes to send a message M to Bob. Alice converts the message M to an integer, m < N, by using whatever method she chooses (I will briefly discuss different types of methods that are generally used to do this in other sections of the paper). Note that if  EMBED Equation.3 then Alice would need to break it up into groups, where each group is a number  EMBED Equation.3 and the encryption procedure would be done on all groups. However, for this example, we will assume that m < N. Alice has m, and given the public key N and e, she then converts m to the ciphertext, y, by using the following equation:  EMBED Equation.3  This can be done quickly using the method of exponentiation by squaring (see notes section), but is usually done with a computer. After Alice converts the message to cyphertext, she sends it to Bob. When Bob receives the message, he uses his private key, d, to recover m from y by doing the inverse modular exponentiation process:  EMBED Equation.3  That was easy enough, right? However, you may be asking how we can be sure that when Bob receives the ciphered message, and then deciphers it, that he will arrive at the original message sent by Alice? In other words, we need to verify that  EMBED Equation.3 (this notation is described in the notes section, briefly; we say  EMBED Equation.3 is congruent to m modulo N, where N is the modulus of the congruence, also written  EMBED Equation.3 , Michon, G. P.) For a quick explanation, the decryption procedure works because d mod N is the multiplicative inverse of e. Thus,  EMBED Equation.3 is the inverse of  EMBED Equation.3  To elaborate,  EMBED Equation.3 also,  EMBED Equation.3 and  EMBED Equation.3  Using Fermats little theorem (see notes section) we conclude that  EMBED Equation.3 and EMBED Equation.3  Given that p and q are distinct primes, the Chinese remainder theorem (see notes section) says that these two congruences can be rewritten as EMBED Equation.3 , and finally,  EMBED Equation.3 % (Wikipedia, RSA) In order to exemplify the RSA encryption/decryption process with a working example, we will use very small numbers that are not recommended to be used for real RSA processes. Suppose Alice wants to send the message Hello Bob to Bob. Also, assume that Alice and Bob have decided to convert letters to numbers by using each letters corresponding two-digit representational position in the alphabet. So our number m is to represent the message Hello Bob. Before we go further, we need to generate our keys. First, we will pick our two primes which are to be kept secret. Since we are using relatively small numbers, we let p = 53 and q = 41. Next, we compute N = pq = EMBED Equation.3  which is the modulus, a part of the public key. Then, we choose e such that it is coprime to EMBED Equation.3  For this example, we will choose e = 7, verified by  EMBED Equation.3  Remember that e, the encryption exponent, is also part of the public key. From here, we can find d by solving for it in the equation 1 = 7d mod 2080. In this case, d = 1783 will work because  EMBED Equation.3 (CITE) Now that we have generated our public key, (N, e), and our private key, (N, d), we are ready to proceed. We will assume that Bob made the public key and sent it to Alice so that she could transfer encrypted messages to him. We will also assume that Bob has our private key, which he will use to decrypt the message. Alice transforms Hello Bob to m = 080512121500021502 (for our example any blank space is represented by 00). Since the number m is larger than the modulus N, Alice must split it up. To do so, she splits m into six different numbers, each containing three digits, ensuring that each EMBED Equation.3 :  EMBED Equation.3  Next, for each EMBED Equation.3 , Alice will convert the cyphertext y, where y is also made up of six numbers corresponding to each of the  EMBED Equation.3  To do this, Alice computes EMBED Equation.3 :  EMBED Equation.3  Alice then transmits all six of these messages to Bob. When Bob gets around to checking his messages, he realizes that Alice has sent him one. Excited, he quickly applies his private key, d = 1783 to decipher the cyphertext. To do so, he computes  EMBED Equation.3  for each EMBED Equation.3 :  EMBED Equation.3  I will explain how one can compute these large modular exponentiations later (see notes section), for now, I will continue with the decrypting process. Bob now has all of the pieces that he needs to decipher the message. Bob groups the pieces together and gets the number 080512121500021502. He then splits the number up again by grouping in pairs: 08 05 12 12 15 00 02 12 02. Since Bob knows that the numbers correspond to positions of letters in the alphabet, he can convert the message one step further, deciphering the message to discover that Alice says, Hello Bob. As mentioned earlier, the security of relies on the fact it is difficult to factor sufficiently large numbers. No polynomial-time method for factoring large integers on a classical computer has been found yet. However, it has not been proven that none exists. As of November 8, 2005, the largest number factored by general purpose methods was 640 bits long (known as the RSA-640 number) which was a 193 digit number. This factorization was done on 80 CPUs working together and took approximately four and a half months, total. The prize that the German BSI team received for factoring this number was $20,000. Because of the different methods of factorization that are being used with the help of linked computers or super-computers, the current recommendation for the product of primes, N, is for it to be is at least 2048 bits long. However, if quantum computing reaches a sufficient level, as it is predicted to be no earlier than 2015, it potentially can perform factorization in polynomial time, rendering RSA and related algorithms obsolete. How do we know that the message we receive is the sent by our correspondent? For this, RSA provides for message signing which entails the sender producing a hash value of the message to be sent, raising that value to the power of d mod N (as done when decrypting), and attaching it as a signature to the message. When the receiver gets the signed message, he raises the signature to the power of e mod N (as done when encrypting), and compares the resulting hash value with the messages actual hash value, making sure they agree, therefore verifying the signature. (Wikipedia, RSA) There are various different methods that are used to pad numbers to messages to enhance the security of the messages. These methods are commonly referred to as padding schemes. Although, we will not fully discuss these schemes, I think that it is pertinent to know the value of applying these techniques for a practical application. For example, if a sender did not use padding schemes, then the security of their message may be flawed by the following things: Both of the values of m = 0 or m = 1 will produce the same ciphertext due to the properties of exponentiation. If the encryption is done with small encryption exponents and small message values, then the result of  EMBED Equation.3 could be strictly less than the value of the modulus n. If this is the case, then the ciphertext is easily discovered by taking the eth root of it (without using the modulus). Because RSA uses public keys, then an attacker could develop a ciphertext library of resultant ciphers of encryptions using the public key. If the ciphertext that are intercepted match any of the librarys ciphers, then the attacker would know the resultant plaintext. Again, there are many different techniques that are employed to securely pad plaintext. This paper has some references which describe some of these schemes in further detail. The computation of RSA renders it to be slower than other cryptosystems. Because of this, typical applications of RSA would involve sending credit card numbers, very short messages, map coordinates, or other relatively small numbers. If someone wished to send a large message, they usually would encrypt the message with a different cryptography method such as DES. Then they would encrypt a key to decrypt the message with RSA. Of course, the key would be relatively small. After which, the sender would transmit both the RSA encrypted key to the message and the encrypted message itself. There are lots of other security issues and general considerations regarding RSA. For more information, consult the references listed at the end of this paper. For now, we will elaborate on the mathematical backbone of RSA. Notes Section: How It All Works This section presents some principles of number theory and definitions that are used throughout this paper. First, for congruences, we have several forms of notation. For example, a is congruent to b modulo N is a congruence where N is the modulus of the congruence. Mathematically, this congruence can be expressed with the following notations, of which, the first two are used in this paper:  EMBED Equation.3  Next, these ideas are the foundational tools that make the RSA cryptosystem work. Prime numbers are those that are greater than one, which only has factors of one and itself. Two numbers are said to be relatively prime or coprime if the two numbers have no common factors other than one. The largest integer that divides two integers, say, a and b, is known as the greatest common divisor of a and b, denoted  EMBED Equation.3  If two numbers, a and b, are coprime, then  EMBED Equation.3 . The converse is also true. A corollary to this idea is that there exist integers x and y such that  EMBED Equation.3  (Bzouts identity). The Euler phi function or totient function, denoted  EMBED Equation.3  is defined as the number of integers from 1 to N that are coprime to N, where such numbers are totatives of N. Also, for any prime p,  EMBED Equation.3  When we say N divides a, we use the notation N | a. Also, there exists an integer k such that a = Nk. The common notation,  EMBED Equation.3 means a and b have the same remainder when divided by N, or N | a-b. If  EMBED Equation.3 and  EMBED Equation.3 then  EMBED Equation.3 and  EMBED Equation.3  If given that p and q are coprime, and p | a and q | a, then pq | a. Also, if pq | a then p | a and q | a, for all p and q. If p and q are coprime, then EMBED Equation.3  The following section describes the theorems that RSA cryptography is based on: Taken from the Chinese Remainder Theorem: Let p and q be integers, not necessarily prime, such that they are coprime. If  EMBED Equation.3 and  EMBED Equation.3  then we have  EMBED Equation.3  Proof: Since  EMBED Equation.3  then p | a-b. Also, since  EMBED Equation.3  then q | a-b. But p and q are coprime, thus pq | a-b. Therefore,  EMBED Equation.3 % (Davis, T.) Fermat s Little Theorem: For any integer a and any prime number p,  EMBED Equation.3  If a and p are coprime, then  EMBED Equation.3  or, equivalently, EMBED Equation.3  This Theorem has many proofs, for ours, we will prove it by using group theory. For this we will need to recognize that  EMBED Equation.3 forms a group under the operation of multiplication modulo p and also, we will need to use Lagranges Theorem: The order of any subgroup divides the order of the whole group. Proof: Let  EMBED Equation.3 form a group under the operation of multiplication modulo p. Choose  EMBED Equation.3  Let k be the order of a, so that  EMBED Equation.3  By Lagranges theorem, k divides the order of G, which is  EMBED Equation.3  So,  EMBED Equation.3  for some positive integer m. Thus,  EMBED Equation.3 % (Wikipedia, Proofs of Fermat s Little Theorem) Fermat-Euler Theorem or Euler s Generalization of Fermat s Little Theorem: For any number a coprime to n, we have  EMBED Equation.3 where  EMBED Equation.3  is Eulers phi function (as previously described). Since this is a generalization of Fermats Little Theorem, we will not display a formal proof. From here, we have all of the tools needed to prove the main result of the RSA process. The following is a proof that will use the abovementioned number theory and theorems to prove the main result of the RSA scheme. Choose two large primes, p and q, randomly and independently of each other. Let  EMBED Equation.3  also, define the totient function  EMBED Equation.3  Next, let e be an integer such that  EMBED Equation.3  (i.e. e is coprime to EMBED Equation.3 ). Then, let d be a number such that  EMBED Equation.3  (A further elaboration of how to generate d is given following our proof). Given the message m, an integer such that  EMBED Equation.3  define the encoded message, y, as EMBED Equation.3  We need to show that the decoded message is given by  EMBED Equation.3  Proof of main result: Since we are given that  EMBED Equation.3 we can express this congruence as  EMBED Equation.3 that is  EMBED Equation.3  divides  EMBED Equation.3  Since p and q are coprime, we have  EMBED Equation.3  Therefore,  EMBED Equation.3  and we can also express this as  EMBED Equation.3  and  EMBED Equation.3  Since  EMBED Equation.3  then  EMBED Equation.3  an integer k such that  EMBED Equation.3  or, because p is prime,  EMBED Equation.3  Now, looking at the general case of  EMBED Equation.3  We can form the congruence  EMBED Equation.3  or equivalently,  EMBED Equation.3  As shown above, we can substitute for  EMBED Equation.3  and we have,  EMBED Equation.3  Since p is prime, then our integer, a, will be either coprime to p, or it will be a multiple of p (i.e.  EMBED Equation.3  Case 1: In the case where a is coprime to p, from Fermats Little Theorem, we have  EMBED Equation.3  We can raise this to the power of an integer k getting  EMBED Equation.3  Thus, our congruence can be rewritten as  EMBED Equation.3  Case 2: Considering the other case where a is a multiple of p, we recognize that if  EMBED Equation.3 then  EMBED Equation.3  From this fact, we have  EMBED Equation.3  But, since  EMBED Equation.3  we have  EMBED Equation.3  Therefore, because  EMBED Equation.3  the congruence  EMBED Equation.3  still holds true. By the same argument, we can show that because  EMBED Equation.3  we have  EMBED Equation.3  We have shown that  EMBED Equation.3 and  EMBED Equation.3  Thus, because p and q are coprime, by the Chinese Remainder Theorem,  EMBED Equation.3  We can now relate this to our original equation, as given,  EMBED Equation.3  Now we have  EMBED Equation.3  But, as a result shown above,  EMBED Equation.3  Hence,  EMBED Equation.3 and  EMBED Equation.3  At this point, it is important to mention that expressed as a congruence, this relationship does not yield a one-to-one correspondence between our message m and our ciphertext y. But, because the calculation is limited to EMBED Equation.3 , we are limiting the value to be less than our modulus, N. Therefore, there is only one integer m, satisfying  EMBED Equation.3  Thus,  EMBED Equation.3  % (DI Management) Further elaboration on the generation of d, with terms defined as above, is as follows: Given the integer e, we will need to find d such that  EMBED Equation.3  To find this d, we will use Euler s Generalization of Fermat s Little Theorem. By this theorem we get  EMBED Equation.3  so  EMBED Equation.3  is a suitable value for d (Davis, T.). The following section describes, as promised, the computation of large modular exponentiations: Look at the following computation, as seen previously.  EMBED Equation.3  Although this calculation looks tough, it can be done by taking the binary expansion of the exponent, d, in order to calculate partial results modulo N, otherwise known as the method of modular exponentiation by squaring. To elaborate, consider our d = 1783. This can also be written as d =1024 + 512 + 128 + 64+ 32 + 16 + 4 + 2 + 1 = 1783. Therefore, if we want to calculate EMBED Equation.3 , we do the following:  EMBED Equation.3  Now we need to calculate the partial results modulo N, and following the repeated squaring pattern of 200, we will get all the exponents that have a power of 2. As we obtain these, we will exclude the ones that are not used in the binary expansion of 1783 (we will not need 256 or 8):  EMBED Equation.3  The result we will generate from this is:  EMBED Equation.3  That is exactly what we were looking for. In this case, the computation of  EMBED Equation.3  is also too challenging for your calculator, but you can repeat the preceding process on it and then use its result to finish the computation (Davis, T.). Random quote: Mathematics is the Queen of sciences, and arithmetic the Queen of mathematics. Carl Friedrich Gauss (1777-1855). Reference: Davis, T., RSA Encryption. Geometer, Math Circles. Retrieved on November 11, 2005 from the World Wide Web:  HYPERLINK "http://www.geometer.org/mathcircles" http://www.geometer.org/mathcircles DI Management, RSA Theory. DI Management Services, 2000-2004. Retrieved on December 4, 2005 from the World Wide Web:  HYPERLINK "http://www.di-mgt.com.au/rsa_theory.html" http://www.di-mgt.com.au/rsa_theory.html DI Management, RSA Algorithm. DI Management Services, 2000-2004. Retrieved on December 4, 2005 from the World Wide Web:  HYPERLINK "http://www.di-mgt.com.au/rsa_theory.html" http://www.di-mgt.com.au/rsa_theory.html Gilbert, J., Gilbert, L., Elements of Modern Algebra. Brooks/Cole, Thompson Learning, 2000. ISBN 0-534-37351-8. Gottesman, D., Lo Hoi-Kwong, Figure 2 from From Quantum Cheating to Quantum Security. Physics Today Online, 2001 American Institute of Physics. Retrieved on November 8, 2005 from the World Wide Web:  HYPERLINK "http://www.physicstoday.org/pt/vol-53/iss-11/captions/p22cap2.html" http://www.physicstoday.org/pt/vol-53/iss-11/captions/p22cap2.html Johnsonbaugh, R., Discrete Mathematics. Prentice Hall 2001. ISBN 0-13-089008-1. Lewand, R. E., Cryptological Mathematics. The Mathematical Association of America Inc., 2000. Library of Congress Catalog Card Number 00-105256. ISBN 0-88385-719-7. Michon, G. P., Final Answers: Modular Arithmetic. 2000-2005 Gerald P. Michon, Ph.D. Retrieved on December 4, 2005 from:  HYPERLINK "  9CHJcdij/5EF$%89:;FGZ[\]no|rjhi EHUj9G hi CJUVaJjhi EHUj]9G hi CJUVaJjlhi EHUj9G hi CJUVaJ hi hi jhi EHUjW9G hi CJUVaJjhi U hi 6 h{Ph{P h{Phi h hi , !0L h KJ|\.\tr#(** $d`a$ & Fdd`$da$d MO    uv'()*=>qrǽ|rjwhi EHUj9G hi CJUVaJjhi EHUj>G hi CJUVaJj hi EHUjՄ>G hi CJUVaJj hi EHUj9G hi CJUVaJ hi 6j@ hi EHUjЗ9G hi CJUVaJjhi Uhi ,rwxyzZ[ǽjThi EHUj9G hi CJUVaJj.hi EHUj9G hi CJUVaJjhi EHUjQ9G hi CJUVaJjhi EHUj)9G hi CJUVaJjhi U hi 6hi 6  ty   %&\]pqrsgh{|}~¸wj/=G hi CJUVaJjT$hi EHUj6=G hi CJUVaJj"hi EHUj9G hi CJUVaJjhi EHUj9G hi CJUVaJ hi ] hi 6jhi Uj}hi EHUj?G hi CJUVaJhi -* + > ? @ A C R !!!!!!*!+!,!-!3!4!G!鸮韕|j.hi EHUj&C?G hi CJUVaJj,hi EHUjC=G hi CJUVaJj*hi EHUj=G hi CJUVaJh{Pj(hi EHUjrB?G hi CJUVaJ hi 6hi jhi Uj&hi EHU+G!H!I!J!N!O!b!c!d!e!!!!!!!!!!!!!!!!!"""""## #F#H#ڲڙڊڊ{qbj9G hi CJUVaJj{:hi EHUj,=G hi CJUVaJ hi 6j48hi EHUj=G hi CJUVaJj5hi EHUj(=G hi CJUVaJj3hi EHUj9G hi CJUVaJhi jhi Uj\1hi EHUj9G hi CJUVaJ#H#J#L#P#p#Z%\%0&1&;&<&U&V&Y&[&]&^&q&r&s&t&&&&&&&&& ''' '3'4'5'6'F'G''''''''' ((鸮韕j9G hi CJUVaJjChi EHUj9G hi CJUVaJj9Ahi EHUj9G hi CJUVaJj?hi EHUj9G hi CJUVaJ hi 6h{Phi jhi Uj<hi EHU0(((D(E(G(H(a(b(d(e(w)y)))))&*'*t*u*********************6+7+J+K+L+M+i+j+}+鼲飙銀jOhi EHUj?G hi CJUVaJjMhi EHUjg9G hi CJUVaJjKhi EHUjm9G hi CJUVaJjHhi EHUj9G hi CJUVaJ hi 6hi jhi UjdFhi EHU1}+~+++++++++X,Z,,,,,,,,,,,,,,,,,,,5555|7~777>8?8R8ڼڭڔ{qjfjڼڼh{P h{Phi j[hi EHUj>F?G hi CJUVaJjYhi EHUj?G hi CJUVaJjWhi EHUj6F?G hi CJUVaJ hi 6j)Thi EHUjF?G hi CJUVaJhi jhi UjQhi EHUj'F?G hi CJUVaJ(*++,,}-%/G35f779::"=>)>??#@@@A\BGCC & Fd & F dd`$da$dR8S8T8U88888>(>>>>>>>????????#@0@@@@@)A*A/A0ABAYA]A^AcAdAnAoAAAAAAAAAAAAAڽڤڋj=G hi CJUVaJjchi EHUj*=G hi CJUVaJj(ahi EHUjp>G hi CJUVaJhi 5CJaJ hi 6hi jhi Uj+_hi EHUjyIG hi CJUVaJ5AAABB#B%B/B0BCBDBEBFB`BrBvBBBBBBBBBBBBCCCC,C-C/C0CCCDCECFCSCTC]C^CtCvCxCyCCCCCCCCCC鼲飙jlhi EHUjX=G hi CJUVaJjljhi EHUj=G hi CJUVaJj=hhi EHUj)=G hi CJUVaJ hi 6hi jhi Ujehi EHU7CCCCCCCCDDDD!D$D%D8D9D:D;D?D@DSDTDUDVD[D\DoDpDqDrDvDwDDDھڥ͏̀r͏cj=G hi CJUVaJjuhi EHUmH sH j?=G hi CJUVaJjhi UmH sH jVshi EHUj=G hi CJUVaJjqhi EHUj=G hi CJUVaJhi mH sH hi 6hi jhi Ujnhi EHUj=G hi CJUVaJ"C!DD E?EEH`MN*R9T6UUVX}X Y Z$\{^^_-_``$da$d` 0d^`0d & FdDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDEEE E EEEEE'E(E;EEEEE F FF FԼԥԝj=G hi CJUVaJjhi Uhi 5mH sH j$zhi EHUmH sH j\=G hi CJUVaJhi 6mH sH hi mH sH hi 6hi jhi UmH sH jwhi EHUmH sH 4 F!F"F&F'F:F;FIbIdIIIIICJDJWJXJYJZJںڡڈ~oejŐhi EHUj=G hi CJUVaJjqhi EHUjMIG hi CJUVaJj#hi EHUj=G hi CJUVaJjhi EHUj=G hi CJUVaJ hi 6 hi 5 hM`h{Phi jhi Ujhi EHUj=G hi CJUVaJ'ZJJJJJK!K'K(K;KKxKyKKKKKKKKKKKKKKKKKKKLLL LFLHLJLLLXLZLLL¸wjd=G hi CJUVaJj"hi EHUjd=G hi CJUVaJjhi EHUjs=G hi CJUVaJjhi EHUj=G hi CJUVaJjAhi EHUj=G hi CJUVaJjhi U hi 5 hi 6hi ,LLLLLLLLLLLM\MbMM N NNN$N%N8N9N:N;NANBNUNVNWNXNOOOOPP.P/P0P1PTPUPhP鳩隐wjhi EHUja>G hi CJUVaJjmhi EHUj=G hi CJUVaJj hi EHUj~=G hi CJUVaJ hi 5h{Pjvhi EHUj%E?G hi CJUVaJ hi 6hi jhi UjIhi EHU+hPiPjPkPwPxPPPPPPPPPPPPPPPPPPPQQQQ=Q>QqQrQQQQQQQQQQQQƼڱژujhi EHUjq>G hi CJUVaJjhi EHUj?G hi CJUVaJjhi EHUjօ>G hi UVj.hi EHUj>G hi CJUVaJ hi 6hi jhi Ujhi EHUj̅>G hi CJUVaJ*QQQQRR$R%R&R'R*R?RYRZRmRnRoRpRRRRRRRRRRRRRRRRRRRRڼڭڔuf\jdhi EHUj7>G hi CJUVaJjkhi EHUj>G hi UVjhi EHUjIG hi CJUVaJjhi EHUjLj>G hi CJUVaJ hi 5jehi EHUjZ>G hi CJUVaJhi jhi Ujhi EHUjه>G hi CJUVaJ$RRRR SS!S"S#S$S1S2SESFSGSHSiSjS}S~SSSSSSSSSSSSSSSS|rcYj;hi EHUjIG hi CJUVaJjhi EHUjIG hi CJUVaJjhi EHUjIG hi CJUVaJjhi EHUjIG hi CJUVaJjhi Ujhi EHUmH sH ja>G hi CJUVaJhi mH sH jhi UmH sH hi hi 6"SSSSSSSSSSTTTTTTT T3T4T5T6T]T^TqTrTsTtTTTTTTTTTTTƼ{qbjO>G hi CJUVaJjhi EHUj>G hi CJUVaJj7hi EHUj?G hi CJUVaJjhi EHUj>G hi CJUVaJjhi EHUjq>G hi CJUVaJ hi 6jhi EHUjD>G hi CJUVaJhi jhi U%TTTTT U UUUUU1U2U3U4U*jhi EHUju?G hi CJUVaJ hi 6jNhi EHUj>G hi CJUVaJjZhi EHUj>G hi UVhi jhi Ujhi EHU-mVnVoVpVVVVVVVVVVVVVWWWWWW#W$W7W8W9W:WTWUWhWiWjWkWxWyWWڼڷڷڨڏvljhi EHUj?G hi CJUVaJj|hi EHUjR?G hi CJUVaJjihi EHUj?G hi CJUVaJ hi 6 hi >*jhi EHUj?G hi CJUVaJhi jhi Ujfhi EHUj?G hi CJUVaJ$WWWWWWWWWWWWWWWWWWWWXXXXDXEXXXYXZX[XdXeXxXyXzXڲڙڊ{qbXjhi EHUj?G hi CJUVaJjhi EHUjIG hi CJUVaJ hi >*jmhi EHUjU?G hi CJUVaJj3hi EHUj?G hi CJUVaJjhi EHUj|?G hi CJUVaJhi jhi Ujhi EHUjD?G hi CJUVaJ"zX{X}XXXXXXXXXXXXXXXXXY YYYYY[Y\YoYpYqYrYYYYYYYYYYƼvljhi EHUj ?G hi CJUVaJjRhi EHUjه>G hi CJUVaJjhi EHUj_?G hi CJUVaJ hi 6jhi EHUjm?G hi CJUVaJjZhi EHUjf?G hi CJUVaJhi hi >*jhi U'YYYYYYYYYYYYZZZZZZZZZZZZZZ7[8[`[a[n[o[[[[[[[[[[ڲڣڣڔڣڣڲqgjAhi EHUj?G hi CJUVaJjhi EHUjhi EHUjx ?G hi CJUVaJ hi 6j hi EHUj ?G hi CJUVaJjR hi EHUjY ?G hi CJUVaJhi jhi Uj hi EHUj% ?G hi CJUVaJ([[\\ \"\v\x\\\*],]B]D]j]l]n]p]]]!^"^5^6^7^8^<^=^P^Q^R^S^l^m^n^z^__)_*_+_,_____'`ujhi EHUj?G hi CJUVaJ hM`h{Pjhi EHUjU?G hi CJUVaJjhi EHUj$?G hi CJUVaJjhi EHUj?G hi CJUVaJ hi 6 h{Ph{P h{Phi hi jhi U.'`)`N`P`````````````"a#a b bb b!b"bMbNbabbbcbdbbbbbbbWcXcacƼ{qjc hM`hM` hM`hi j*hi EHUj0?G hi CJUVaJj'hi EHUjE?G hi CJUVaJjQ$hi EHBUj?G hi CJUVaJjw!hi EHUj?G hi CJUVaJjuhi EHUj?G hi CJUVaJjhi Uhi hi 6&` b#bMbebdcecfcgchcicjckclc{ccccccccccc ddgd3d`d@$da$dacccecgclctcccccccc d&d?ABCLMPhqI 0JmHnHuhi hi 0Jjhi 0JUjhJBUhJB,1h/ =!"#$% lDd @\   c $A ? ?#" `2>VKƕ޷@M}JD `!>VKƕ޷@M}J  & ^xcdd``.dd``baV d,FYzP1n:&B@?b u 00 UXRY7S?&,e`abM-VK-WMc1sC VPZ%T Tp280 v<׀11gccq/(+ss~(q]XQ{@$wqЅ۳ bHb8Ae 2n F= , st0rm.ݘAFsAc hƕ;+KRs@0u(2tA4Ag!t?1es%xyaDd |@\  c $A? ?#" `2.$ 3 Hf `!.$ 3 Hf`  Sxcdd``bd``baV d,FYzP1n:&.! KA?H1: \ ǀqC0&dT20 KXB2sSRsn\MaF\ 8AZu*a|%07`5*V4u`M y N(߄dCzr \5wG!.dɥ" #le$s6LHMX@|?l0 ?+`O.p# `p*adbR ,.Ie2C 2S&Dd l@\  c $A? ?#" `2v_"Pf]2R^ `!J_"Pf]2 xcdd`` @c112BYL%bpuܴ\,!B\IO8DvrA Ɩ; +KRs.ePdh,Āf |>Dd @\  c $A? ?#" `2^;(Nn j `!b^;(Nn @ 0xڕQJPM&i!H .y+(xB>H>CG;(I0sPt0prs~rN\j @~jT !˲h_lג/N@h&J&çМjs2kN ǃe&/ xP~|QK4U,YAٝ;,lw&(Ms3Y7`MW_|J١'9\k+UΣ;CMzzzef>#q  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`bcdefghknoprqsutvxwyz{}|~Root Entry F@DkEmData a7WordDocument.ObjectPool@(DkE@DkE_1194952791F@DkE@DkEOle CompObjfObjInfo "%(+.147:=BGJMPSVY\]`cfilqtwz{| FMicrosoft Equation 3.0 DS Equation Equation.39q$Ik (N)=(p"1)(q"1). FMicrosoft Equation 3.0 DS EqEquation Native e_1194953185 F@DkE@DkEOle CompObj fuation Equation.39q$-k 1<e<(N), FMicrosoft Equation 3.0 DS Equation Equation.39qObjInfo Equation Native  I_1194953309F@DkE@DkEOle  CompObj fObjInfoEquation Native ]_1194953389F@DkE@DkE$Ak gcd((N),e)=1, FMicrosoft Equation 3.0 DS Equation Equation.39q$P| (N).Ole CompObjfObjInfoEquation Native 9_11949567526F@DkE@DkEOle CompObjfObjInfo FMicrosoft Equation 3.0 DS Equation Equation.39q$5k gcd(a,b)=1, FMicrosoft Equation 3.0 DS Equation Equation.39qEquation Native Q_1194956822,JF@DkE@DkEOle CompObj fObjInfo! Equation Native !Y_1195279573'$F@DkE@DkEOle #$=P| aa"b(mod(N)) FMicrosoft Equation 3.0 DS Equation Equation.39qApTb e(modCompObj#%$fObjInfo&&Equation Native ']_1195279599)F@DkE@DkE(N)), FMicrosoft Equation 3.0 DS Equation Equation.39qQd$? dea"1(mod(N)).Ole )CompObj(**fObjInfo+,Equation Native -m_1194954153 1.F@DkE@DkEOle /CompObj-/0fObjInfo02 FMicrosoft Equation 3.0 DS Equation Equation.39q$Q, 1=edmod(p"1)(q"1). FMicrosoft Equation 3.0 DS Equation Equation.39qEquation Native 3m_11949550493F@DkE@DkEOle 5CompObj246fObjInfo58Equation Native 9Q_11949561138F@DkE@DkEOle ;"$5k gcd(a,b)=1, FMicrosoft Equation 3.0 DS Equation Equation.39q$k  aCompObj79<fObjInfo:>Equation Native ?6_1194971090=F@DkE@DkEOle @CompObj<>AfObjInfo?CEquation Native D5 FMicrosoft Equation 3.0 DS Equation Equation.39q$k me"N, FMicrosoft Equation 3.0 DS Equation Equation.39q_1195316983 BF@DkE@DkEOle ECompObjACFfObjInfoDH$c  em  ei  e<N,i=0,1,2... FMicrosoft Equation 3.0 DS Equation Equation.39q$R  ey=Equation Native I_1194970049GF@DkE@DkEOle KCompObjFHLfObjInfoINEquation Native On_1194970065rLF@DkE@DkEOle Qm  eemodN FMicrosoft Equation 3.0 DS Equation Equation.39q$BhV  em=y  edmodNCompObjKMRfObjInfoNTEquation Native U^_1195236150QF@DkE@DkEOle WCompObjPRXfObjInfoSZEquation Native [ FMicrosoft Equation 3.0 DS Equation Equation.39qf  em  eeda"m(modN) FMicrosoft Equation 3.0 DS Eq_1195236143&bVF@DkE@DkEOle ^CompObjUW_fObjInfoXauation Equation.39q*@L  em  eed FMicrosoft Equation 3.0 DS Equation Equation.39qEquation Native bF_1195328114[F@DkE@DkEOle dCompObjZ\efObjInfo]gEquation Native hf_1195229878`F@DkE@DkEOle j$J k  em  eedmodN=m FMicrosoft Equation 3.0 DS Equation Equation.39q"pTb  ey  edCompObj_akfObjInfobmEquation Native n>_1195236163O]eF@DkE@DkEOle oCompObjdfpfObjInfogrEquation Native sC FMicrosoft Equation 3.0 DS Equation Equation.39q'`  em  ee . FMicrosoft Equation 3.0 DS Equation Equation.39q_1195328294YujF@DkE@DkEOle uCompObjikvfObjInfolx$½k  ey  edmodN=(m  ee)  edmodN=m  eedmodN, FMicrosoft Equation 3.0 DS Equation Equation.39qEquation Native y_1194969483oF@DkE@ DkEOle }CompObjnp~fObjInfoqEquation Native a_1194969518mEtF@ DkE@ DkEOle $E| eda"1(modp"1) FMicrosoft Equation 3.0 DS Equation Equation.39q$I eda"1(CompObjsufObjInfovEquation Native e_1195236136yF@ DkE@ DkEmodq"1). FMicrosoft Equation 3.0 DS Equation Equation.39qfx7  em  eeda"m(modp)Ole CompObjxzfObjInfo{Equation Native _1195236127+w~F@ DkE@ DkEOle CompObj}fObjInfo FMicrosoft Equation 3.0 DS Equation Equation.39qjpTb  em  eeda"m(modq).Equation Native _1195217196F@ DkE@ DkEOle CompObjf FMicrosoft Equation 3.0 DS Equation Equation.39qjpTb  em  eeda"m(modpq) FMicrosoft Equation 3.0 DS EqObjInfoEquation Native _1194970020F@ DkE@ DkEOle CompObjfObjInfoEquation Native _1194977798;F@ DkE@ DkEuation Equation.39q$jx  em  eeda"m(modN). FMicrosoft Equation 3.0 DS Equation Equation.39qOle CompObjfObjInfoEquation Native Q$50 | 5341=2173, FMicrosoft Equation 3.0 DS Equation Equation.39q$u k (p"1)(q_1194978039F@ DkE@ DkEOle CompObjfObjInfoEquation Native _1194978216^F@ DkE@ DkEOle CompObjf"1)=5240=2080=(N). FMicrosoft Equation 3.0 DS Equation Equation.39q$qk gcd((N),e)a"gcd(2080,7)ObjInfoEquation Native _1194981344F@ DkE@ DkEOle =1. FMicrosoft Equation 3.0 DS Equation Equation.39q$‘k 71783=12481=6(2080)+1=1(modN).CompObjfObjInfoEquation Native _1194982863F@ DkE@ DkEOle CompObjfObjInfoEquation Native ? FMicrosoft Equation 3.0 DS Equation Equation.39q$#k m i <N FMicrosoft Equation 3.0 DS Equation Equation.39q_1194982509F@ DkE@ DkEOle CompObjfObjInfo$`B& m 1 =080 m 4 =500m 2 =512 m 5 =021m 3 =121 m 6 =502 FMicrosoft Equation 3.0 DS EqEquation Native _1194983015F@ DkE@ DkEOle CompObjfuation Equation.39q$k m i FMicrosoft Equation 3.0 DS Equation Equation.39q$4XLq  em  ei  eObjInfoEquation Native 6_1195316943F@ DkE@ DkEOle CompObjfObjInfoEquation Native P_1195329063h5F@ DkE@ DkE's . FMicrosoft Equation 3.0 DS Equation Equation.39q$bhV  ey  ei  e=m  ei  eemodNOle CompObjfObjInfoEquation Native ~_1195329048F@ DkE@ DkEOle CompObjfObjInfo FMicrosoft Equation 3.0 DS Equation Equation.39q$ p_$  ey  e1  e=080  e7mod2173=200  y  e4  e=500  e7mod2173=1355  ey  e2 Equation Native %_1195329078F@ DkE@ DkEOle CompObjf e=512  e7mod2173=1730  y  e5  e=021  e7mod2173=1837  ey  e3  e=121  e7mod2173=1102  y  e6  e=502  e7mod2173=592 FMicrosoft Equation 3.0 DS Equation Equation.39q$fx;  em  ei  e=y  ei  edmodN,ObjInfoEquation Native _1195316908RF0TDkE0TDkEOle CompObjfObjInfoEquation Native ?_1195329086F0TDkE0TDkE FMicrosoft Equation 3.0 DS Equation Equation.39q$#>  ey  ei  FMicrosoft Equation 3.0 DS Equation Equation.39qOle CompObjfObjInfoEquation Native m     !$'*-058;>ADGJMPSVY\_behknqtwz}$Q0  em  e1  e=200  e1783mod2173=080  m  e4  e=1355  e1783mod2173=500  em  e2  e=1730  e1783mod2173=512  m  e5  e=1837  e1783mod2173=021  em  e3  e=1102  e1783mod2173=121  m  e6  e=592  e1783mod2173=502 FMicrosoft Equation 3.0 DS Eq_1196011641F0TDkE0TDkEOle CompObjfObjInfouation Equation.39q$"k  em  ee FMicrosoft Equation 3.0 DS Equation Equation.39qpTb  eaa"bEquation Native >_1195279216gF0TDkE0TDkEOle CompObjfObjInfoEquation Native _1195226666F0TDkE0TDkEOle (modN)  eamodN=b  eaa"b[N]  e[a]10=[b]10 FMicrosoft Equation 3.0 DS Equation Equation.39qCompObjfObjInfoEquation Native  M_1195227406F0TDkE0TDkE1pTb gcd(a,b). FMicrosoft Equation 3.0 DS Equation Equation.39q5pTb gcd(a,b)=1Ole "CompObj#fObjInfo%Equation Native &Q_1195227945F0TDkE0TDkEOle (CompObj)fObjInfo+ FMicrosoft Equation 3.0 DS Equation Equation.39q-pTb ax+by=1 FMicrosoft Equation 3.0 DS EqEquation Native ,I_1195228837F0TDkE0TDkEOle .CompObj/fuation Equation.39qpTb (N), FMicrosoft Equation 3.0 DS Equation Equation.39q-pTb (p)=p"ObjInfo1Equation Native 29_1195229016F0TDkE0TDkEOle 3CompObj4fObjInfo6Equation Native 7I_1195229957F0TDkE0TDkE1. FMicrosoft Equation 3.0 DS Equation Equation.39q=t aa"b(modN),Ole 9CompObj:fObjInfo<Equation Native =Y_1195230360F0TDkE0TDkEOle ?CompObj@fObjInfoB FMicrosoft Equation 3.0 DS Equation Equation.39q9pTb aa"b(modN) FMicrosoft Equation 3.0 DS Equation Equation.39qEquation Native CU_1195230375F0TDkE0TDkEOle ECompObjFfObjInfoHEquation Native IU_1195230527F0TDkE0TDkEOle K9(c$? ca"d(modN) FMicrosoft Equation 3.0 DS Equation Equation.39qQ n$? ac = bCompObjLfObjInfoNEquation Native Om_1195230455F0TDkE0TDkEd (mod N)  FMicrosoft Equation 3.0 DS Equation Equation.39qEOL4 ac=bd(mod N).Ole QCompObjRfObjInfoTEquation Native Ua_1195231836  F0œDkE0œDkEOle WCompObj  XfObjInfo Z FMicrosoft Equation 3.0 DS Equation Equation.39qEpTb (p)(q)=(pq). FMicrosoft Equation 3.0 DS Equation Equation.39qEquation Native [a_1195231947F0œDkE0œDkEOle ]CompObj^fObjInfo`Equation Native aU_1195231952qF0œDkE0œDkEOle c9pTb aa"b(modp) FMicrosoft Equation 3.0 DS Equation Equation.39q9i$? aa"b(mCompObjdfObjInfofEquation Native gU_1195232069F0œDkE0œDkEodq) FMicrosoft Equation 3.0 DS Equation Equation.39qApTb aa"b(modpq).      !#$O&%')(*+,.-/1024357689:<;=?>@ABDCEGFHJIKLMPNQ{SRTVUWXY[Z\^]_a`bcdfeghikjlmnpoqsrtuvxwy|z}~P/H{-l`}&Ki_Dd l@\  c $A? ?#" `2FrLs|3E\ `!FrLs|3E Xh Qxcdd``vfd``baV d,FYzP1n:&B@?b u p30 UXRY7S?&,e`abM-VK-WMc1sC VPZn–vN #T.f KSS/*2d&LE HFn~ L3Ha.Ir#3גd_.o T,0 Ma`ϕNBa۳dOZ*0 X6vb dĮT.hqc5``#RpeqIj.A @ ] U |\Dd 8 @\  c $A? ?#" `2Tξ.V@g"na `!Tξ.V@g"na| NxڕQN@8?,W(0A( zhA#06(ToH@"*$b[< ,o7Ёž$V@OQ.L fB&IYK,̜gIyQFi u$D\eq U33X8FgQG*o<&$ M=qw/p>pݗf?u'"H[ Wvuo).iz93_&T =O 2g |4iˢ ו̇u&uuea%mO{Ɇ.(3Bʵhy> U.l \mFDd @\  c $A? ?#" ` 2N}>|꼽ir `!jN}>|꼽i<  8xcdd``cd``baV d,FYzP1n:&&! KA?H1: ㆪaM,,He` @201d++&1ܘ!+(|-aIcgF\ - :0 6kk!9|)X\#@penR~?7B8\6nMF7DBekQR2 OL悆38. ev0o8+KRsA0u(2t5= QfDd @h\  c $A? ?#" ` 2eɚL-K$IeD7A] `!9ɚL-K$IeD7@ |xcdd``> @c112BYL%bpu p1#37 d-L =$ F= 2Lc|U&/FTy+?W o\G4=Ĥ\Y\P rP"CX,Ā`s8o:Dd @|\  c $A? ?#" `2kV=ì f# `!^kV=ì  `p0,xcdd``cd``baV d,FYzP1n:&.! KA?H1ZqsC0&dT20͔ `[YB2sSRsn\ղsi# ~# Z g`s~gd8ư2OIb2 W&00纼NALfp8llk(#RpeqIj.C-\E./Qe;Dd T\  c $A? ?#" `2J2l-f?%6g]" `!_J2l-f?%6 @C-xcdd``cd``baV d,FYzP1n:L \B@?b -*熪aM,,He`) 01d++&1ܘ!+(|-?fT TptUB%, ~J%Lނį@JtHDℚ[ 27?%L@(\kʂB8}1Sఱ炆#8;;LLJ% s:@ĞB `v0eFDd \  c $A? ?#" `2vX?Z4cr$ `!jvX?Z4c< @C8xcdd``cd``baV d,FYzP1n:L 13X? WjDd \  c $A? ?#" `2O8d Ou0BLi+& `!#8d Ou0BLiZ`:hxcdd``^ @c112BYL%bpuDd \  c $A? ?#" `29_WmjJ\YEj( `!b9_WmjJ\YE, @C0xcdd``cd``baV d,FYzP1n:L,56~) @ p104sC0&dT20 `[YB2sSRsn\?ULf*F\ L} 0)6caSu`R  Ma`,U02H a\ 1k`s13ܛ W.p؃ ;[LLJ% :@ĞB `y3iDd |\  c $A? ?#" `2F![VpSၛv68N"+ `!![VpSၛv68NJ`0xcdd``^ @c112BYL%bpu}==;#4/ `!V˛>}==;#4@(xxcdd``.`d``baV d,FYzP1n:LRB@?b ēb`熪aM,,He` @201d++&1ܘ!+(|-NHq10MiթkDT2L.|_ȇb@w%#Idd\[ 2jsc0(@SS`qB \8?X} L} 7?dDѿU+~Fd@@,I9 +^,(36 dSMd-ܞ_l>4-p 8ҡ)ANaLLJ% [A0u(2t5=Ø}2IDd 0@\ " c $A!? ?#" `2|u$i$pM%ۥu1 `!m|u$i$pM%ۥ< H ;xcdd``cd``baV d,FYzP1n:&n! KA?H1: ǀqC0&dT20 KXB2sSRsn\JUsi#.VJ'oX {thT0UbqO I9 ظ|F%o8@FjL . {I)F=7A&1aEJj 4qPh( 0y{Ĥ\Y\`C D,ĀGf~gaJDd @\ # c $A"? ?#" `2Ob/ D:Tv3 `!nOb/ D:T<`  <xcdd``cd``baV d,FYzP1n:&n! KA?H1: ǀqC0&dT20 KXB2sSRsn\ocMScF\ !\ 'i8AFqB, )0&`X\@penR~C׶pD@r0 F} n v p{L@! g.p\ `p121)W2aPdk{> 1haEDd X\ $ c $A#? ?#" `2[-,޴q36 `!i[-,޴<  7@C7xcdd``cd``baV d,FYzP1n:L,56~) @ 깡jx|K2B* Rvfjv ,L ! ~ Ay 7. _rdF\ L| P&6 tID@ɉ dBA.υ{@8T&z,>gBܤٹ|s 2bW.4qPh( 0y{Ĥ\Y\˰d.P"CXY= QlZGDd l\ % c $A$? ?#" `2hr kSgaЬvsx8 `!khr kSgaЬv< Xh@C9xcdd``cd``baV d,FYzP1n:L,56~) @ p304sC0&dT20 KXB2sSRsn\_NT Tr obOA$@$@&X@\(ߏ OׁmLobs& Ma`8zG!>k #vrAÙ ;{LLJ% @2u(2t5=ÀwmFDd \ & c $A%? ?#" `2GrxBh+׼ьr: `!jGrxBh+׼ь< _@C8xcdd``cd``baV d,FYzP1n:L gBܤ`Xp/(w1udĮ\.h8sP``cI)$5!d.P"CXY= {j4Dd @\ ( c $A'? ?#" `2gj|d\ Z `I? `!Xgj|d\ Z `  &xcdd``~ @c112BYL%bpudd|j% 2n"L {+ssV s,(3d!2" 27MK\'pYB #lgCq[|#Tm .B?Mo\4 NX&b\f;: @> 1 3X{Dd  @\ * c $A)? ?#" `2Ra48Q]2D `!Ra48Q]2``  xcdd``nad``baV d,FYzP1n:&a! KA?H1: ǀqC0&dT20 KXB2sSRsn\KUsi#SB z0>oKp~?ou*9  , `"n  v0~+(X4u`M y  & 0 I9 ٹZ|kF9|;[KD8@]0{4LHa?b\ܴd.h+p…v0o8%221)W2ePdh,Ā'f Y̐Dd @\ + c $A*? ?#" `2TH2ROF `!TH2RO) xcdd``bd``baV d,FYzP1n:&)! KA?H1:R ǀqC0&dT20 KXB2sSRsn\s]eF\ u 'iqBD@*4rS`* 7̅0L020ЀWqf\P~(D L, `0L1402a27G9#I>gdB Hd9@penR~{!.p(\F@Fؚ@|m8 U>s.hs8/*F&&\ w1u(2t5=À1v|+Dd h\ , c $A+? ?#" ` 2{پAZCڋֈ TW8I `!OپAZCڋֈ T@|xcdd`` @c112BYL%bpu @c112BYL%bpuFcd2yMȄcVrA}~``ÐI)$5aE. hx,+nFf THDd +\ 0 c $A/? ?#" `$2UݜyS,jشt%R `!lUݜyS,jش< M:xcdd``cd``baV d,FYzP1n:L8,56~) @ k/ZT UXRY7S?&meabM-VK-WMc1sC VPZY!m P.P16ZXW abS|W80?ޏυ11c } P'Vf)XLfBܤ= \ pb2#<Ę@FsAÙ `CCY=F&&\9 s:@Dg!t_01n$XDd <\ 1 c $A0? ?#" `%2De`D[3< mT `!|De`D[3< J`(` Ж>JxڕTo1~vQDE2QFHTG?JR#lb`@eSN:00$Ƣ꺀| $}{?g&@Ccbat*4fr,vEKЀ)'Cw,z33 Wևwz\%ϸ(1T{wh^F;çPwYcƵ^$3(xnǗSnl`g + 2asdټ:|5u%]9Qup=7ױzYWJEh~(y+~(i ?NL Ht|GfBKױ˺7~Wg~<7e$HA 3M4?cOVq2.~-:ѵ9c 92u%]g:= ٷ6o<WUIhx ĸⰢ.>)U >AgZ*6*TQq3{0}ހuuL:f.ň*ov)`Bܤ`(qms(3$ d3 dm>4ܹq`h 0y{Ĥ\Y\2C D|b@f~l@Dd \ 3 c $A2? ?#" `'2E&qy~$!Z `!&qy~$JHhx=OjA}3*)hG,`qASAnk+Jϰ ev07oPr;y*1Q$Qԣ#u Uԑ81|GA{)+/g ƫ,BjCWFS 8e{g8mY*nqsɋCE^95)4xY>^/*7ha<\kH3I=fDd t\ 4 c $A3? ?#" `(2E-PTs%  \ `!E-PTs% V / I(XxڕTAh@lvkdnIUuLI B(P Meo=xA/ޤYDz7O<^{Rz]g&.ߟ 1谐呆Z= *Zܓ5)p [4zFǧ&$9U8^&.b?oxD&k^l+n3cM(eӅTnu$";8 }Y>8izy;Tg/ _g&4Q311<5截R6ʪcgASû@dVU*mROg/'"u2mj*Sl3X7 /82ظ3% ?mtoJ l_>hg}Њ>\>VH dž<yJ~U-ůG!41]k')>V/`? 5PDd |@b * c $A*? ?3"`?)2G?[^J"[A#o_`!?[^J"[AJ`0 xcdd``^ @c112BYL%bpu 1aQDd @\ : c $A9? ?#" `.2x 1d8Dd @\ = c $A<? ?#" `12OMo J<ds `!\OMo J<@ PV *xcdd``cd``baV d,FYzP1n:&&N! KA?H1:-:47$# !lo`'0LY ZZpc@ܝ+- P.P56J`iլ0Th槠H M ra&?7as V I9 s8v;|3p{=.ߕ G.pX  `p021)W2ԡ"b> 1g\Dd t @\ > c $A=? ?#" `22/'!z;TSu `!/'!z;TSl q Nxcdd``6cd``baV d,FYzP1n:&&~! KA?H1: ㆪaM,,He` 01d++&1ܘ!+(|-Jca*F\ y| 0~ȉ ~0.v?EWc'3py+y c } ;TpTh`  I9 l\;|6Ma1 ~y.hpAh0y{Ĥ\Y\C D,Ākf~m:Dd @\ ? c $A>? ?#" `32Ȁ-~ #a|f.x `!^Ȁ-~ #a|`  ,xcdd``cd``baV d,FYzP1n:&n! KA?H1: ǀqC0&dT20 KXB2sSRsn\/N3fF\ \ 'iqBa )60d#dM ~033X| +ܤPnhB8}n/d.h8r`P``cI)$5d.P"CX,ĀGf~QFbgDd @\ @ c $A?? ?#" `427`Ňhz `!7`Ň`  Yxcdd``dd``baV d,FYzP1n:&n! KA?H1: ǀqC0&dT20 KXB2sSRsn\7r]dF\ i\ 'i  4| VFG̨=Llyt1>Fɝ8@,(sX@&6b dopenR~'B8b/#^3vip{~0e |,agӿ2l #l N!hƽ;+KRs.ePdh,ĀGf JIf:Dd @\ A c $A@? ?#" `52ӦQuȭJF3f| `!^ӦQuȭJF3@ ,xcdd``cd``baV d,FYzP1n:&B@?b u p00 UXRY7S?&,e`abM-VK-WMc1sC VPZ&T T 4+QU? Rn#I602H6EL(ȅ'1IpgbMa`^Q 2M|W.4a 0h( 0y{Ĥ\Y\ 2C D,ĀGf~kdh9Dd x@\ B c $AA? ?#" `62˧'lmv,^e  `!]˧'lmv,^ +xcdd``cd``baV d,FYzP1n:Ole iCompObjjfObjInfolEquation Native m]_1195232166!F0œDkE0œDkEOle oCompObjpfObjInfo r FMicrosoft Equation 3.0 DS Equation Equation.39q=pTb aa"b(modp), FMicrosoft Equation 3.0 DS Equation Equation.39qEquation Native sY_1195232239#F0œDkE DkEOle uCompObj"$vfObjInfo%xEquation Native yY_1195235259:|(F DkE DkEOle {=pTb aa"b(modq), FMicrosoft Equation 3.0 DS Equation Equation.39qEH1D)  eaa"b(CompObj')|fObjInfo*~Equation Native a_1195235279-F DkE DkEmodpq). FMicrosoft Equation 3.0 DS Equation Equation.39qRxD)  ea  epa"a(modp).Ole CompObj,.fObjInfo/Equation Native n_11952352472F DkE DkEOle CompObj13fObjInfo4 FMicrosoft Equation 3.0 DS Equation Equation.39qZ4  ea  ep"1a"1(modp), FMicrosoft Equation 3.0 DS Equation Equation.39qEquation Native v_11960228617F DkE DkEOle CompObj68fObjInfo9Equation Native j_1195234335?<F DkE DkEOle $Nk  ep|(a  ep"1"1). FMicrosoft Equation 3.0 DS Equation Equation.39qXpTb G=1,2CompObj;=fObjInfo>Equation Native t_1195235204N0AF DkE DkE,...,p"1{} FMicrosoft Equation 3.0 DS Equation Equation.39qbt  eG=  e1,2,...,p"1 {}Ole CompObj@BfObjInfoCEquation Native ~_1195234504SFF DkE DkEOle CompObjEGfObjInfoH FMicrosoft Equation 3.0 DS Equation Equation.39qTb a"G. FMicrosoft Equation 3.0 DS Equation Equation.39qEquation Native 5_1195235187KF DkE DkEOle CompObjJLfObjInfoMEquation Native z_1195235172DIPF DkE DkEOle ^p  ea  eka"1(modp). FMicrosoft Equation 3.0 DS Equation Equation.39qx  p"1.CompObjOQfObjInfoREquation Native 5_1195234916UF DkE DkEOle CompObjTVfObjInfoWEquation Native = FMicrosoft Equation 3.0 DS Equation Equation.39q!Tb p"1=km FMicrosoft Equation 3.0 DS Equation Equation.39q_1195328805ZF DkE DkEOle CompObjY[fObjInfo\Equation Native _1195236478_F DkE DkEOle CompObj^`f$¾|  ea  ep"1a"akma"(ak)ma"1ma"1(modp). FMicrosoft Equation 3.0 DS Equation Equation.39qObjInfoaEquation Native ~_1195236491c"dF DkE DkEOle bpTb  ea  e(n)a"1(modn), FMicrosoft Equation 3.0 DS Equation Equation.39q` (n)CompObjcefObjInfofEquation Native 5_1195279457iF DkE DkEOle CompObjhjfObjInfokEquation Native 9 FMicrosoft Equation 3.0 DS Equation Equation.39qpTb N=pq, FMicrosoft Equation 3.0 DS Equation Equation.39q_1195279820nF DkE DkEOle CompObjmofObjInfopEquation Native e_1195279783TsF DkE DkEOle CompObjrtfI8 (N)=(p"1)(q"1). FMicrosoft Equation 3.0 DS Equation Equation.39q=pTb gcd((N),e)=1ObjInfouEquation Native Y_1195279830lxF DkE DkEOle  FMicrosoft Equation 3.0 DS Equation Equation.39q`S (N) FMicrosoft Equation 3.0 DS Equation Equation.39qCompObjwyfObjInfozEquation Native 5_1195314880}F DkE DkEOle CompObj|~fObjInfoEquation Native i$Mk eda"1(mod(N)) FMicrosoft Equation 3.0 DS Equation Equation.39q!pTb 0d"m<N,_1195280241F DkE DkEOle CompObjfObjInfoEquation Native =_1195280345FgDkEgDkEOle CompObjf FMicrosoft Equation 3.0 DS Equation Equation.39qV  ey=m  eemodN. FMicrosoft Equation 3.0 DS EqObjInfoEquation Native r_1195280474vF DkE DkEOle CompObjfObjInfoEquation Native b_1195280583F DkE DkEuation Equation.39qFpTb  em=y  edmodN. FMicrosoft Equation 3.0 DS Equation Equation.39qOle CompObjfObjInfoEquation Native mQpTb eda"1(mod(N)), FMicrosoft Equation 3.0 DS Equation Equation.39q$9| (N)|(ed"1),_1196022925F DkE DkEOle CompObjfObjInfoEquation Native U_1195280920F DkE DkEOle CompObjf !$'*/258;>ADEHKLOTWX[^adgjknqrsv{~ FMicrosoft Equation 3.0 DS Equation Equation.39q c (N) FMicrosoft Equation 3.0 DS Equation Equation.39qObjInfoEquation Native 5_1195280951F DkE DkEOle CompObjfObjInfoEquation Native  9_1195280993F DkE DkEOl ed"1. FMicrosoft Equation 3.0 DS Equation Equation.39q^8=$?  e(N)=(pq)=(p)(q) .Ole  CompObj fObjInfo Equation Native z_1196022941F DkE DkEOle CompObjfObjInfo FMicrosoft Equation 3.0 DS Equation Equation.39q$I (p)(q)|(ed"1), FMicrosoft Equation 3.0 DS EqEquation Native e_1196022952F DkE DkEOle CompObjfuation Equation.39q$5@G (p)|(ed"1) FMicrosoft Equation 3.0 DS Equation Equation.39qObjInfoEquation Native Q_1196022961F DkE DkEOle CompObjfObjInfoEquation Native  U_1196022972F DkE DkE$9P (q)|(ed"1). FMicrosoft Equation 3.0 DS Equation Equation.39q$9$ (p)|(ed"1),Ole "CompObj#fObjInfo%Equation Native &U_1195281220F DkE;DkEOle (CompObj)fObjInfo+ FMicrosoft Equation 3.0 DS Equation Equation.39q 4 " FMicrosoft Equation 3.0 DS Equation Equation.39qEquation Native ,)_1195281265F;DkE;DkEOle -CompObj.fObjInfo0Equation Native 1M_1195310863F;DkE;DkEOle 31 ed"1=k(p) FMicrosoft Equation 3.0 DS Equation Equation.39q$9. ed"1=k(CompObj4fObjInfo6Equation Native 7U_1195311277@F;DkE;DkEp"1). FMicrosoft Equation 3.0 DS Equation Equation.39q$Z|  ea  eedmodp,a".Ole 9CompObj:fObjInfo<Equation Native =v_1195310789F;DkE;DkEOle ?CompObj@fObjInfoB FMicrosoft Equation 3.0 DS Equation Equation.39q${   ea  eeda"a  eed"1+1(modp), FMicrosoft Equation 3.0 DS EqEquation Native C_1195310927F;DkE;DkEOle FCompObjGfuation Equation.39q$ƒ 6  ea  eeda"a  eed"1"a(modp). FMicrosoft Equation 3.0 DS Equation Equation.39qObjInfoIEquation Native J_1195310874F;DkE;DkEOle MCompObjNfObjInfoPEquation Native Q5_1195310984FDkEDkE$(44 ed"1 FMicrosoft Equation 3.0 DS Equation Equation.39q$‹t  ea  eeda"a  ek(p"1)"aOle RCompObjSfObjInfoUEquation Native V(modp). FMicrosoft Equation 3.0 DS Equation Equation.39q$9k gcd(a,p)=p)._1195311221FDkEDkEOle YCompObjZfObjInfo\Equation Native ]U_1195311709FDkEDkEOle _CompObj`f FMicrosoft Equation 3.0 DS Equation Equation.39q$^k  ea  ep"1a"1(modp). FMicrosoft Equation 3.0 DS Equation Equation.39qObjInfobEquation Native cz_1195311799FDkEDkEOle eCompObjffObjInfohEquation Native i_1195311874FDkEDkE$jk  ea  ek(p"1)a"1(modp). FMicrosoft Equation 3.0 DS Equation Equation.39qOle lCompObjmfObjInfooEquation Native p$·k  ea  eeda"a  ek(p"1)"aa"1"aa"a(modp). FMicrosoft Equation 3.0 DS Equation Equation.39q_1195312151FDkEDkEOle tCompObjufObjInfowEquation Native x9_1195312210FDkEDkEOle yCompObjzf$k p|a, FMicrosoft Equation 3.0 DS Equation Equation.39q$20El  ep|a  eed.ObjInfo|Equation Native }N_1195312381FDkEDkEOle CompObjfObjInfoEquation Native n_1195312452 FDkEDkE FMicrosoft Equation 3.0 DS Equation Equation.39q$Rk  ea  eeda"0(modp). FMicrosoft Equation 3.0 DS Equation Equation.39qOle CompObj fObjInfo Equation Native 5$ ^ p|a, FMicrosoft Equation 3.0 DS Equation Equation.39q$EH|`  eaa"0(modp)._1195312508%FDkEDkEOle CompObj fObjInfoEquation Native a_1195312595FDkEDkEOle CompObjf FMicrosoft Equation 3.0 DS Equation Equation.39q$!k p|a"0, FMicrosoft Equation 3.0 DS Equation Equation.39qObjInfoEquation Native =_1195312725 FDkEDkEOle CompObjfObjInfoEquation Native v_1196023043FDkEDkE$Zk  ea  eeda"a(modp) FMicrosoft Equation 3.0 DS Equation Equation.39q$9k (q)|(eOle CompObjfObjInfoEquation Native Ud"1), FMicrosoft Equation 3.0 DS Equation Equation.39q$^H  ea  eeda"a(modq)._1195312918"FDkEDkEOle CompObj!#fObjInfo$Equation Native z_11953129989'FDkEDkEOle CompObj&(f FMicrosoft Equation 3.0 DS Equation Equation.39q$Zk  ea  eeda"a(modp) FMicrosoft Equation 3.0 DS Equation Equation.39qObjInfo)Equation Native v_1195313005,FgDkEgDkEOle CompObj+-fObjInfo.Equation Native z_1195313247*41FgDkEgDkE$^hB  ea  eeda"a(modq). FMicrosoft Equation 3.0 DS Equation Equation.39q$Šk  ea  eed&B@?b u 8 ㆪaM,,He` @201d++&1ܘ!+(|-Kf`ĕU? Rn#I602H6im*̅'1IpgbMa`ZNAeۛv\.h8r`P``cI)$5d.P"CXYݏ`ie:Dd +@\ C c $AB? ?#" `72N&DS#5fB `!^N&DS#5 M ,xcdd``cd``baV d,FYzP1n:&B@?b u -:47$# !lo`'0LY ZZpc@𵼈#m P.P56J`|r'B#7?Fl`dlbTPOb[1X| +ܤ9\\^ > ^Fi`*䂆#8 Ev0o8v+KRsePdk{> 16h58Dd @\ D c $AC? ?#" `82,2[V:led| `!\,2[V:le@ PV *xcdd``cd``baV d,FYzP1n:&&N! KA?H1:-:47$# !lo`'0LY ZZpc@<5NHq%0r bOA$@$"A&@$8ߊO3`X1W&00q-(g{]+ \4=adbR ,.Iehԡ"|b@#3X?peO;Dd @\ E c $AD? ?#" `92p='GAg `!_p='GA % -xcdd``cd``baV d,FYzP1n:&&N! KA?H1:8 ㆪaM,,He` @201d++&1ܘ!+(|-ϗT T 4++;I:P)f tID@IdBa.? O@\,>@penR~C'p b/#4wrAÑ ;;LLJ% s:@ĞB ~d9g:Dd +@\ F c $AE? ?#" `:2s eSe;lf `!^s eSe;l M ,xcdd``cd``baV d,FYzP1n:&B@?b u -:47$# !lo`'0LY ZZpc@𵼈#9 P.P56J`|r'B#7?Fl`dlbTPOb[1X| +ܤ#\S ^Fi`*䂆#8 Ev0o8v+KRsePdk  ^i>Dd |\ G c $AF? ?#" `;2lz d^M0tj) `!blz d^M0t, `F00xcdd``cd``baV d,FYzP1n:.! KA?H1\ R@P5< %! `35;aR&br<??byӾUsi#`kqB )60d#dz 0#f?Lj*oS& Ma`HfJ^QO!`cȈ]\p=8*#RpeqIj.7 @ ]` bg!t?3mNDd D\ H c $AG? ?#" `<2B$յlj1Vzg `!rB$յlj1VL @C@xcdd``Vcd``baV d,FYzP1n:L ,56~) @ k 'p30sC0&dT20 KXB2sSRsn\gKT T*@Ne@*4rS`*8XAB!' |t0F%k8A&cD+0Y1X|I9bNy({b n\p 8.&#RpeqIj.L= @ ]` jTDd Ob I c $AH? ?3"`?=2FnYE!}z `!rFnYE!}Z0, @C@xcdd``ed``baV d,FYzP1n:L B@?b 8J깡jx|K2B* Rvfjv ,L ! ~ Ay 7. _˽8^Ձ\4K$M=(C(? 2_ip_=L@(\/%02Hz 2BF fn3Ȅ\@D8?".pL `p221)W2ԡ"|b@33X?jK|Dd T\ J c $AI? ?#" `>2fѭ+!xͶv `!fѭ+!xͶv  XJnxcdd``ncd``baV d,FYzP1n:&\B@?b p10 UXRY7`7LYI9 3ٹ /|b1sC VPZnT T3VW2ϝy B\ #j6c@47$37X/\!(?71;!2Bm`aX OeӁeуY@|#8239oť(!å#!2BnpʰŰ)ePGwウ.p<40y{I)$5! dP"CXYݏ`3ETJ #GG8;nhOG2Ms$S_?_9#_n6X}=oóRlVZvrPgQr#+^./?~%PyCWL|IHճ4S1Pߖ Z,U]p*tz G{t7c''Dd X@\ ; c $A;? ?#" `C2wcE{ܷ5? ?Sf`!KcE{ܷ5? ? xcdd`` @c112BYL%bpu 1]a-Dd $@\ < c $A<? ?#" `D2} Mu"9Y`!Q Mu"9 HD xcdd``fed``baV d,FYzP1n:&lB@?b u  ㆪaM,,He` 01d++&1ܘ!+(|-wI`*F\ X@N΅@&䢛 W&00dj[Q =e #lԁ]nO \.hqCl,4=`dbR ,.Ieԡ"|b@3X?naDd |b = c $A=? ?3"`?E2ߢ&'MVū`!ߢ&'MVū `(@CxڕK@{aH ء;'Ɋ=[hdsrpg'88I_ƻK {!(+ XdPhjbh!/*HшL[ 1Gz2\χ vnMY܊&3ӷ;yoN4U:j(\UB, &L/Ŧ|PHrZ\NA!`)VAo"B7㢡 f$ϣ:Uȿmcɭ\Rqє]aj7- a0'i(J : Qkp-pl<1p`Dd \ > c $A>? ?#" `F2s$!xoPV$Q`!s$!xoPV$ @CRxڕR=K@~MbT!:H *ؿ i3DLQZR'g' )W't^J;x~@ lWA[ z$1ޡgn+QL(lb iko-v;wSN a*FC&ʀt0r`!zy^Y^>ʀt0 p Hxcdd``bd``baV d,FYzP1n:&\B@?b u -:47$# !lo`'0LY ZZpc@𵼜+-NHq%0*qV &_ r$ 0LLON"+ss9|"F9\&26\F} 1nnȄdߏf Hq &i\18' F&&\h @ ] U bizDd 0@0 3 # A3K2vQSКRά`!JQSКk xcdd`` @c112BYL%bpueBܤl\|S;6 \ 4T=bdbR ,.Ieԡ"|b@33X?3jhGDd b 7 c $A7? ?3"`?O2_i\tz.`m`!e_i\tz.`, 3xcdd``cd``baV d,FYzP1n:L8,56~) @ k7-熪aM,,He` @201d++&1ܘ!+(|-K+dF\ L zP+3n#I602H6sLˇC1)0y0ηb`OP 27)?+~G!>-`sAÕ ;[LLJ% s:@ĞB ~fd/dDd @b $ c $A$? ?3"`?P2~0!x t`!~0!x t  Pxcdd``vfd``baV d,FYzP1n:&&! KA?H1: ㆪaM,,He` @201d++&1ܘ!+(|-̑vN #.f KSS'*d&L HFn~ L 3Ha.Ir#37d_.Pp` dOpenR~:׾pb#ܞK {R!0V`m.՘@FJ8VQ/v0o8021)W2\ԡRY`0O[Dd @b % c $A%? ?3"`?Q2ÍD;)`akuT`!yÍD;)`aku@ PV Gxcdd``dd``baV d,FYzP1n:&&N! KA?H1:-:47$# !lo`'0LY ZZpc@W6-NHq%0pw2X@| 83_cbDQ}@3W&002\Q@$wNaa.#7w )0"~)XabAu)aM.p  `padbR ,.IeHԡRYO`!{Dd 0@0 & # A&R2u\Y:(|L̯Q`!I\Y:(|L̯k xcdd`` @c112BYL%bpu 2B\F 1n (HSSIpp@H{F&&\ s:@ĞB ~`F!d%Dd  @b ( c $A(? ?3"`?T2޼cㅈ.z/`!޼cㅈ.z/" p sxcdd`` @c112BYL%bpu9 P.P56J`9IS? 2JaD…*U~+9&Ty6F<Ir?#/> p{qp~ȟ0"~XrGpenR~n..p#pw\Wܞ_3,|K|S9fvfx<a g3MM\N6д$QF&&\k {: @> 13XUoDd X@b ) c $A)? ?3"`?U2_}e#hQ"\`!_}e#hQ"  7 [xڕRJQΝqtfWSDdP^E8ढ B U||AtKSppww3`Z<ėfcDG,Ftg+^Mul"d8O76#Ng~hj /?| RG;ѥ\R+ GJ#iBv\#ݦ6֖BQ{FHFx>\ XMR Ygԟoi~[Dd x@b + c $A+? ?3"`?W2؇ WmG$`!y؇ WmG Gxcdd``dd``baV d,FYzP1n:&B@?b u 8 ㆪaM,,He` @201d++&1ܘ!+(|-?'fT T 4+q;Iz0;(C83k5p~ #~6Fz,A 27)?AG肏B8? S d.$b.#\SS`|)XabAu1R/27- \G4.=4Ĥ\Y\`2C 2D|[Dd @b , c $A,? ?3"`?X2wR% ,,`!ywR% ,,  Gxcdd``dd``baV d,FYzP1n:&B@?b u p00 UXRY7S?&,e`abM-VK-WMc1sC VPZ=͟Nh8W+v4u`|vQpf_Ώk&FlX@penR~C$攇B8? 3 d.$b.# SS`` RĂ-_dnZ 4616h\ 0y{iI)$5d.P"CD4<b@3XK|Dd b - c $A-? ?3"`?Y2:0E:SuX@,`!0E:SuX@,:@Rx=Na]wDGDG! x $$rZS P(=V&8K6;R@dy18EUʆ;K *3!0d82]$RvIٙ x[#`EQw<ֶ]ES_ "ՠAɷBK^z8Ht\lYo{EKAoQ:0_Dd @b  c $A? ?3"`??2Jf]X'5 `!}Jf]X'5 % Kxcdd``dd``baV d,FYzP1n:&&N! KA?H1:8 ㆪaM,,He` @201d++&1ܘ!+(|-wNSa`ĕҪY _`5|f߰>FcdbPǎφM@A^&I9 l\pb/#g`{R0F`Z\LM@|.hqcMи``#RpeqIj. E. ,Ā'f ,xRDd @b  c $A? ?3"`?@2. Ixugx) `!p. IxugZ F >xcdd``ed``baV d,FYzP1n:&.! KA?H1:\ ǀqC0&dT20 KXB2sSRsn\ˤeHq%0esp> 3D@1W&00䚼@$w` ķ 2op{WǎφM@ᓚ.pL `p221)W2ԡ"|b@f~*jTDd 0b  c $A? ?3"`?A2hTQF+Uz{ `!rhTQF+UL H@xڕQJ@}M r*CГѓ?ͩP!c -zX/J~gI0ή E&L7y3 m1 lPy8c1^F}1kNsP-J #š Ihzc h>G2E 9 eItUBk_#u_ U+T|7o.,PGN7ȓxÑAg_;ӊ-şuϛ}ga?DOWplx:L E>BF7t݃Y8䓩L0RUlVOK(gngDd b  c $A? ?3"`?B2xX/2Q u7HFn~ DEvᆹ62d##d$> 0 ' 7| X. FTy+&2NpsM@A .pȁ v0o8+KRsA2u(2t5  ~`_zDd  b  c $A? ?3"`?E2btѯG3  `!btѯG3 @CfxڕR=K`~gBLEDbC :TԖD}mRcCQ. "I,E.=܅`:+'ګP!xxY1㼭d+ KyZ3'Fky)_Z)VLzmg:GMٸìq޻k';m%*FwؔMwΨGdoE$낲i+doLƍ4W#U|ߡzn߁LR۪q8̙x|\7E_ .17H1.1fWS^/0تF#j$&*c:t7dy(IDd @b  c $A? ?3"`?F2XHI%@penR~C8B8}n d.h8sP``cI)$5!d.P"CXYݏ`~gUDd Xb   c $A ? ?3"`?G2Tx QwpY K{U `!sTx QwpY KL  7@CAxcdd``Vcd``baV d,FYzP1n:L,56~) @ k 7p30sC0&dT20 KXB2sSRsn\WJkbF\ L@NS@*4rS`*8XAB!' |t0F%_8A&cD+0Y1X|I9 |sp{1W ?\.hsP``cI)$5 dP"CXY`lshDd b   c $A ? ?3"`?H2.C#[ w# `!.C#[ w#| @CTxcdd``cd``baV d,FYzP1n:L x,56~) @ k'20TsC0&dT20 KXB2sSRsn\OK aF\ Lx@N8@*4rS`* 7̅Cp +ph䢻$22H.= 2n&T؆\z+?1KH1@penR~C0B8C F;8.%v0o8+KRsB@0u(2t5=ÀpDd 'b   c $A ? ?3"`?I2&9 N]Mw `!&9 N]Mw @%@Cxcdd``ncd``baV d,FYzP1n:LB@?b j熪aM,,He` @201d++&1ܘ!+(|-"NHq)0 _On 050Ty%6F .d$Ʌ K@& ~"ÇʯB0aCt7+ W_ĂQ2pb˧` y& Ma`&utG!!#_AF|.TG!+A|];!깠 j=Ĥ\Y\NE.z0PÅDd X@b  c $A? ?3"`?e2]Z*9`!1Z* xcdd`` @c112BYL%bpuciթD7$@${$b *P 0y{aĤ\Y\˰ dP"CDHg! v320eQDd Hb  c $A? ?3"`?f2ehL9Db!A`!9hL9Db!@"xcdd``~ @c112BYL%bpu#I32p{B1G db"pA}~``ÐI)$5!d/P"CDHg!_!nad`ObHDd b  c $A? ?3"`?g2FKN(qEs#鋺n`!fFKN(qEs#鋺,  4xڕQJ@}I$CRA`9y$5Bn{ Qzgx@)^;4Hу yf̄`০K$JD( (ϜWcS`m> &UL \(Sr8aO3)t gQnx#AI<-ً xϞ|S{C [?jZePcơL%grHR$ܴB_.ĝ$n|ſL*vsyюyNХJmpIl{˭XT-bu20 =hoeqDd 0@b  c $A? ?3"`?h2]-&C~>L9#`!1-&C~>Lk xcdd`` @c112BYL%bpu 1ufEIDd b  c $A? ?3"`?k2PUGa;ԏo`!gPUGa;ԏ,` 5xcdd``cd``baV d,FYzP1n:L B@?b 깡jx|K2B* Rvfjv ,L ! ~ Ay 7. _˹yҚYt9.VJN(߁ B#7?Fl`dl 2 /bF FPद)X|I9 \YpF;AFJႆ+8 Uv0o8+KRsA2u(2t5B ~fc2[Dd @b  c $A? ?3"`?l2Xb< O`!yXb< O@ Gxcdd``dd``baV d,FYzP1n:&B@?b u p00 UXRY7S?&,e`abM-VK-WMc1sC VPZ#T T 4+q;I:0;(C83k5p~ #~6Fz,A 27)?apD@r] sI7\F,  SĂE_dnZ 4616h\ 0y{iI)$5Ad.P"CDHg!t?1e)yIDd 0b  c $A? ?3"`?m2WN `!E> oU`!gWN `!E> , H5xcdd``cd``baV d,FYzP1n:L B@?b 깡jx|K2B* Rvfjv ,L ! ~ Ay 7. _ejXt9SIzPHFn~ $? ٴdBa._'B! )X|I9 kd|S;b+ \ 4T=bdbR ,.Ieԡ"|b@33X?eOIDd b  c $A? ?3"`?n2r*TGvo`!gr*TGv,` 5xcdd``cd``baV d,FYzP1n:L B@?b 깡jx|K2B* Rvfjv ,L ! ~ Ay 7. _-Yt9.VJN(߁ B#7?Fl`dl 2 /bF FPद)X|I9 \ > )pwX1ؕ W.p؃ `pl121)W2ePdk{> 1͉cvIDd 0b  c $A? ?3"`?o2}r"d*iN@Cgo`!g}r"d*iN@Cg, H5xcdd``cd``baV d,FYzP1n:L B@?b Ole CompObj02fObjInfo3Equation Native a"a(modpq)a"a(modN). FMicrosoft Equation 3.0 DS Equation Equation.39q$šk  eyda"(m  ee)da"m_11953135626FgDkEgDkEOle CompObj57fObjInfo8Equation Native _1195313701/;FgDkEgDkEOle CompObj:<fed(modN). FMicrosoft Equation 3.0 DS Equation Equation.39q$Zk  em  eeda"m(modN).ObjInfo=Equation Native v_1195313753C@FgDkEgDkEOle CompObj?AfObjInfoBEquation Native u_1195313816EFئDkEئDkE FMicrosoft Equation 3.0 DS Equation Equation.39q$Y_  eyda"m(modN) FMicrosoft Equation 3.0 DS Equation Equation.39qOle CompObjDFfObjInfoGEquation Native n$R0l  ema"y  ed(modN). FMicrosoft Equation 3.0 DS Equation Equation.39q$k  N_1195314040>{JFئDkEئDkEOle CompObjIKfObjInfoLEquation Native 6_1195315691\kOFئDkEئDkEOle CompObjNPf FMicrosoft Equation 3.0 DS Equation Equation.39q$j  em=y  edmodN,0d"m<N.ObjInfoQEquation Native _1195315168HfTFئDkEئDkEOle CompObjSUfObjInfoVEquation Native m_1195316772YFئDkEئDkE FMicrosoft Equation 3.0 DS Equation Equation.39q$Qk eda"1(mod(N)). FMicrosoft Equation 3.0 DS Equation Equation.39qOle CompObjXZfObjInfo[Equation Native $j(A  ee  e((N))mod(N)=1, FMicrosoft Equation 3.0 DS Equation Equation.39q_1195315541^FئDkEئDkEOle CompObj]_fObjInfo`Equation Native _1195316754pWcFئDkE!DkEOle CompObjbdf$frl  ee  e((N))"1mod(N) FMicrosoft Equation 3.0 DS Equation Equation.39q$k  em  e1  eObjInfoeEquation Native _1195316416MahF!DkE!DkEOle =200  e1783mod2173=080 FMicrosoft Equation 3.0 DS Equation Equation.39q$6BT  e200  e1783CompObjgifObjInfojEquation Native R_1195316391mF!DkE!DkEOle CompObjlnfObjInfooEquation Native    !$%&'(+.012345789:;<=>?@ABCDEFGHIJKLMNOPQS FMicrosoft Equation 3.0 DS Equation Equation.39q$~k  e200  e1783=200  e1024+512+128+64+32+16+4+2+1=200  e1024200  e512"""200  e1. FMicrosoft Equation 3.0 DS Equation Equation.39q$rC  e200  e_1195316454zrF!DkE!DkEOle  CompObjqs fObjInfotEquation Native _1195328949XwF!DkE!DkEOle CompObjvx f1mod2173=200  e200  e2mod2173=886  e200  e4mod2173=543  e200  e16mod2173=365  e200  e32mod2173=672  e200  e64mod2173=1773  e200  e128mod2173=1371  e200  e512mod2173=16  e200  e1024mod2173=256 FMicrosoft Equation 3.0 DS Equation Equation.39q$Pk  e200  e1783mod2173=(256"16"1371"1773"672"365"543"886"200)mod217ObjInfoy"Equation Native #l_1195316528|F!DkE!DkEOle )3=80=m  e1  FMicrosoft Equation 3.0 DS Equation Equation.39q$6T  e200  e1024Oh+'0CompObj{}*fObjInfo~,Equation Native -R1Tablez      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQR깡jx|K2B* Rvfjv ,L ! ~ Ay 7. _evUsi#..48|6 tID@i'Ȅ\OC%A.IM[1S +ssl|S;b+ \ 4T=bdbR ,.Ie2C D,Āgf~WefDd b  c $A? ?3"`?p2W3[0q0W0`!W3[0q0W~ 2RxڕQMK@}M|1͡A"Hx46B=yOŃ?cJ qwR`de<1@a+POQɳ334ߓ"*2\d61,okf4w"fO;5Ԣ$Ǣ(yI; ۔9yn[NIITM !VmuyEdq1cLk`ZKꆚּК;4qLգ\eW\n/s 7]Mt\62S`K;ed,Gqw{@vhazGۀkXGDd hb   c $A ? ?3"`?q24م-Xm`!e4م-X, @|3xcdd``cd``baV d,FYzP1n:&B@?b  UXRY7S?&,e`abM-VK-WMc1sC VPZÖVT T0jpUrBR@Vn~J* $? 2/01m@|,>eBܤl\|S;6 \ 4T=bdbR ,.Ieԡ"|b@33X?3jhqDd b   c $A ? ?3"`?r2%j8;n'B6Y`!%j8;n'B6YPt@C]xڕRKP?FEJ vAlWJ" >+6PC_.'%E^}ᄏ]L5'/IEBJDY \ggSLXza0ci=K5džvxҊ.=U`8St]/>QE.-Վ#C6%$m˥To{s?e .Rl _ xP;uBf7O;E~y-t#N|f$:gWAg'%N[zE@f  7*?Qf{S??sHDd b  c $A? ?3"`?s2?VC峙 ͼVnN`!f?VC峙 ͼV,@ h4xcdd``cd``baV d,FYzP1n:LOP 27)?P+{G!>fR{pBCU-F&&\ s:@ĞB ~fgyGDd b  c $A? ?3"`?t2LPPI2m `!eLPPI2,  @C3xڕQJP=6UDCtq/Xv"TQ !R En9ɹ{EV Wå ",RTAjɾK]r2ZG0=ppzjj'"]}p#pATDw<^8}|qX9>wnfwUQl7  M=#\[+BxZ>J΀Fݻ UDRQ{vٽYjYFo)VOcg$c41=sdGDd b  c $A? ?3"`?u2K.]>$3ʹm `!eK.]>$3ʹ, 8>3xڕQJ@};i 9у=?X҈-ϞJ~(œ`n=a%o )6rD$E0)74 mB02s$pzj|uI~nL צRLuzx~_8cؐquK/uIM^U+T]urYMR WGZ K~͕S'h,fQh:+i*T61%?Hb}.8cw&A&=;&id!Dd hhb  c $A? ?3"`?v2dlG*&+@$`!8lG*&+@@||xcdd``> @c112BYL%bpu$3ʹm>`!eK.]>$3ʹ, 8>3xڕQJ@};i 9у=?X҈-ϞJ~(œ`n=a%o )6rD$E0)74 mB02s$pzj|uI~nL צRLuzx~_8cؐquK/uIM^U+T]urYMR WGZ K~͕S'h,fQh:+i*T61%?Hb}.8cw&A&=;&id!mDd b   c $A ? ?3"`?x2Ҵp[\FR=`!Ҵp[\FR= hYxcdd``vcd``baV d,FYzP1n:L B@?b 9Q@P5< %! `35;aR&br<??boӖUsi#..VJ? 78A|JN(OIEw#I.`d\R2/ @a| J8ߊKH1@penR~cn > );Ta_ om>4޸q h 0y{I)$5a ^E.z1 esdDd @b   c $A ? ?3"`?y2ʢ0B$Wh`!ʢ0B$Wh  Pxcdd``vfd``baV d,FYzP1n:& +F=A` CP͕Rm.՘@FJ8VQ/v0o8021)W2ԡ1 }Dd L b  c $A? ?3"`?z25^*x1V`!5^*x1p@Ckxڕ1KPIk:;,Em@cJ:9;u~g  ~: w/ihM8ݽ;NY3'͠GB )oH='[ Ű$w/ZR5 WeT/VW@B'X3שEi4l]6zAӦ${#]dފgGa0yFȻ1Mzn esA<U9͙{|뤗;'Q޶qiδOs3K?t5[I~Bf!vXWW['r%p\d.d V =M`Dd b  c $A? ?3"`?{2on`j'+F`!on`j'+F @P@Cmxڕ=KP{XJ fhOpV1EΝPB'8+I0sA-`rϓ P?I2E$D }_Eƺ i/h-5e,FAPFwrugCMۍjl`9v˨cu'x:rWa9HH]Y^ 9"2{iMF{` K\XFCf%MUQ<ٱWu:>8 f{/oscfA,S}tی}"Rzey-eSAW3.>ҊՔ պj\2c U"&Ϩ/JN|cDd b  c $A? ?3"`?|2wxRPc ~v!tiaV`!wxRPc ~v!tiaT Oxcdd``bd``baV d,FYzP1n:&fa! KA?H1[깡jx|K2B* Rvfjv ,L ! ~ Ay 7. _KU}`4C20H8D$8AjrS"!GXAj -j1sE2CKP 27)??pD2Əca$1D 0bk .p `p221)W2ePdk{> 1k`jDd |b  c $A? ?3"`?}2L!+H]]F(`! !+H]]FN`0xcdd``^ @c112BYL%bpuG^%+@HDd !b  c $A? ?3"`?21l%`֪}S '`!l%`֪}S@6TxڕSK@~w?C DKըXTƤ trPآXAtg'w;IA'A'(`w]I$޻%čm6<%.0_Ɗ( Qhk, *Lr5aX:͖r'|/z-. ~ Jv+VQzdK~anMo聉z@:ZLiLcFBO.">5BGEBd82% sh1C)(2V2!~t'[n:8c$uAtK(>zӒB4⹻jad:+& Y͂~_La[eƔz.J#˷ȟ3vYw͋kZx̋#m8׃^</.(^;~Stl|xa 1 <_Fo"Dd |b  c $A? ?3"`?2LzݏE4% 6(*`! zݏE4% 6N`0xcdd``^ @c112BYL%bpu*B*ph<c@1< HTML Definition6]B^@BB Normal (Web)dd[$\$&OQ& ref1phaa !0LhK J  | \.\t!!""##}$%&G*,f..011"45)566#7778\9G::!;; <?<<,>A CHFWHTIIJ3LL>M'NO=QQQQSSTTU'U&V'V(V)V*V+V,V-V.V=VVVVVVVVVVVVW XpXXQYY)[~[\)\]]^_````````````````````aa0p000000000 0 0 0 0 0000000000000000000 0 0 00000000 0 0 0 0 0 0 0 0 0 0 0 0  0  0 0000000000000000000000000000000000000000000@0@000000000000000@0y00@0y00@0y00@0y00@0@0@0@0@0@0@0y000i 4\t; <?<<,>L>M'NO=QTTU'U&VVVW XpXXQYY)[~[]a{0$:#y0y0y00{00y00$:#y00y00y00{00y00P#y00y00y00y00y00b#y00y00 0`UU{00{000`UUy00{00y00y00y00y00y00{00y00{00| ,,,,,/rG!H#(}+R8ACD FGZJLhPQRSTmVWzXY['`acf'P589:;<=>?ABCEFGHIJKLMNOPQRSTVX]_*C` d P6@DUW^O7 $ 8 : F Z \  ')   \prg{}*>@*,3GINbdi}]qs35 t!!!!!!!!!6"J"L"i"}"""""#########>/R/T/666n888888/9C9E9999/:C:E::::$;8;:;?;S;U;[;o;q;v;;;'<;<=< ==!=&=:=<=K=_=a=w======>>>p>>>>>>>>>a?u?w?E@Y@[@@@@@@@-AAACAJA^A`AAAABBVBXB_BsBuB8DLDNDrDDDDDDDDDE-E/EEEEEEE.FBFDFwFFFFFFFFFFGG+G?GAGOGcGeGGGGGGGGGGGGG H!H#H=HQHSH{HHHHHHHHHI*I,I;IOIQIIII(JJwJJJJJJ%K9K;KAKUKWKrKKKKKKKKKKKKLLLbLvLxLLLLLLLLLL&M:M["`#,e$6[%&P' U(`)DCe* +-[,6-`.<0/tZ0Y12.Z34>5Y6|f7V8d9 ̐:8[;|o<4=T>q?- - ||88qqW W !["["""## & &3'\]o^a      !"#$%2 2 ==vv\ \ !`"`"""##&&C'h]^a  !"#$%B&*urn:schemas-microsoft-com:office:smarttagscountry-region8$*urn:schemas-microsoft-com:office:smarttagsCityV%*urn:schemas-microsoft-com:office:smarttagsplacehttp://www.5iantlavalamp.com/8*urn:schemas-microsoft-com:office:smarttagsdate Йy10112005218DayMonthYear&%$%$%$%$%$%$%$%$%$%$%$%$%$$%$%$%$% $ ; < @ A E F ] _ ` l *,/09  \stxy|g~*ACIKL  -13JMNegi>/U/Z/[/]/^/f/6666n888888888888/9F9G9P9Q9Z9999999/:F:G:K:L:N::::::::$;;;>;?;V;Z;[;r;u;v;;;;;;#<'<><?<B<C<L< ="=%=&===>=B=K=b=i=n=>>> >&>p>>>>>>>>>>>>>E@\@`@a@b@c@h@@@@@@@@@@@@A-ADAFAHAJAaAAAAAABBYB^B_BvBwByB8DODPDTDrDDDDDDDDDDDDDDE0E1E3E4E;EEEEEEEEEEEEEF.FEFHFMFNFPFwFFFFFFFFFFFFFFFGG GGG+GBGDGMGOGfGGGGGGGGGGGGG H$H%H'H=HTHWHZH{HHHHHHHHHHHHHHHHHHI-I.I1I2I4I;IRITIYIZI[IIIIIII(J?J@JBJCJFJwJJJJJJJJJJ%KM@MAMDMMMMMMMMMM NNN&N'N)N*N.NOOOO O!O$OOOOOOOcPzP|P~PPPPPPPPQQQQQQQ`SiSSSSSSSSSSSSTTTTTTU&U'U+U,U.UsUUUUUU9WWWWWW\]]&](])]]^^ ^"^#^^__ _}```````````````````aa /| $ ; F ] \* E\st@g~*AN-3JNei.>/U//6667n888888/9F9[9\999/:F:G:::: ;!;$;;;?;V;[;r;v;; <'<><?<= ="=&===K=b===>>+>,>p>>>>>>9?9@E@\@@@@@-ADAJAaAAAAABBYB_BvBB4D8DODrDDDDDDE0EEEEE.FEFGFHFwFFFFFFFG+GBGOGfGGGGGGGGG H$H=HTHVHWH{HHHHHHI-I;IRISIII(J?JwJJJJJ%KMMMMMM NN&NNOOOOOOcPzPPPPQ/U/66n8888/9F999/:F:::$;;;?;V;[;r;v;;'<>< ="=&===K=b=>> >+>p>>>>>>E@\@@@@@-ADAJAaAAAAABBYB_BvB8DODrDDDDDDE0EEEEE.FEFwFFFFFFFG+GBGOGfGGGGGGGGG H$H=HTH{HHHHHHI-I;IRIII(J?JwJJJJ%K/U/Z/66n8888/9F999/:F::::$;;;>;?;V;Z;[;r;u;v;;#<'<>< ="=%=&===K=b=>>>p>>>>>>>E@\@`@@@@@-ADAJAaAAAABBYB^B_BvB8DODrDDDDDDDDE0EEEEEE.FEFwFFFFFFFFFG+GBGOGfGGGGGGGGG H$H=HTH{HHHHHHI-I;IRIII(J?JwJJJJ%K?ABOP\ap@p"pH@pHp@pLp@p\p@ph@UnknownG: Times New Roman5Symbol3& : Arial7&  Verdana?5 : Courier New;Wingdings"1h\Ƙ\sfs_R1s_R1!4d``M 2QHX?i 2 Chris FarleyMath_stuMTH<