Page 53 - tech fest 2025 ב״ש חוברת תקצירים
P. 53
Implementing the RSA Cryptosystem Using Turing Machines
CS-D-27
Shilat Dahan; shilat2132@gmail.com Rotem Maimon; rotemaimon77@gmail.com
Advisor: Dr. Jeremy Miller
SCE - Shamoon College of Engineering, Be’er-Sheva
This project explored the implementation of RSA key encryption and decryption using a Turing machine. The system consists of three main machines: one for generating the private key, one for encryption, and one for decryption. The key generation machine uses the extended Euclidean algorithm to compute the modular inverse. The encryption machine employs modular exponentiation via the square-and-multiply method, while the decryption machine utilizes both modular exponentiation and the Chinese remainder theorem for efficiency. Initially, unary representation was used but proved inefficient, leading to a transition to binary representation, which improved performance.
Keywords: encryption, extended Euclidean algorithm, key generation, modular exponentiation, RSA, Turing machine
Identifying Human Movements and Vehicle Activity in Noisy Environments
CS-D-28
Lidor Pahima; lidorpahima28@gmail.com Gil Rahamim; gil7002@gmail.com
Advisor: Prof. Shlomo Greenberg
SCE - Shamoon College of Engineering, Be’er-Sheva
The objective of this project was to classify various background noises, in order to enable the detection of human movements and vehicle activity in a noisy environment. The project involved developing a neural network-based approach for identifying human steps and vehicle movements by using geophone sensors and a deep neural network (DNN). This method succeeded in improving the accuracy and reliability of systems for the identification of human movements in various challenging acoustic conditions.
Keywords: DNN, geophone sensor, human movements detection
Book of Abstracts | 2025
53