Cryptography Lecture 21.

Slides:



Advertisements
Similar presentations
1 Lect. 12: Number Theory. Contents Prime and Relative Prime Numbers Modular Arithmetic Fermat’s and Euler’s Theorem Extended Euclid’s Algorithm.
Advertisements

Finite Fields Rong-Jaye Chen. p2. Finite fields 1. Irreducible polynomial f(x)  K[x], f(x) has no proper divisors in K[x] Eg. f(x)=1+x+x 2 is irreducible.
Chapter 4 Finite Fields. Introduction of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key concern operations on “numbers”
Cryptography and Network Security Chapter 4 Fourth Edition by William Stallings.
Chapter 4 – Finite Fields. Introduction will now introduce finite fields of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key.
Math 3121 Abstract Algebra I
1.  Detailed Study of groups is a fundamental concept in the study of abstract algebra. To define the notion of groups,we require the concept of binary.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 18 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Introduction Polynomials
Congruence Classes Z n = {[0] n, [1] n, [2] n, …, [n - 1] n } = the set of congruence classes modulo n.
Chapter 4 – Finite Fields Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
M. Khalily Dermany Islamic Azad University.  finite number of element  important in number theory, algebraic geometry, Galois theory, cryptography,
CPSC 3730 Cryptography and Network Security
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Numbers, Operations, and Quantitative Reasoning.
Monoids, Groups, Rings, Fields
Chapter 4 – Finite Fields
Math 3121 Abstract Algebra I Lecture 9 Finish Section 10 Section 11.
Scott CH Huang COM5336 Cryptography Lecture 11 Euclidean Domains & Division Algorithm Scott CH Huang COM 5336 Cryptography Lecture 10.
Information Security Lab. Dept. of Computer Engineering 87/121 PART I Symmetric Ciphers CHAPTER 4 Finite Fields 4.1 Groups, Rings, and Fields 4.2 Modular.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Great Theoretical Ideas in Computer Science.
CS Lecture 14 Powerful Tools     !. Build your toolbox of abstract structures and concepts. Know the capacities and limits of each tool.
Lecture 3.1: Public Key Cryptography I CS 436/636/736 Spring 2015 Nitesh Saxena.
15-499Page :Algorithms and Applications Cryptography II – Number theory (groups and fields)
Chapter 13 Mathematic Structures 13.1 Modular Arithmetic Definition 1 (modulo). Let a be an integer and m be a positive integer. We denoted by a mod m.
Great Theoretical Ideas in Computer Science.
Great Theoretical Ideas in Computer Science.
Cryptography Lecture 14 Arpita Patra © Arpita Patra.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2014.
L131 Exponential Inverses Finding modular inverses is good enough for decoding simple modular cryptography. However, in RSA encryption consists of exponentiating.
Chapter 4 With Question/Answer Animations 1. Chapter Motivation Number theory is the part of mathematics devoted to the study of the integers and their.
Math 3121 Abstract Algebra I
Assignment 4 is due! Assignment 5 is out and is due in two weeks!
Mathematical Background : A quick approach to Group and Field Theory
Modular Arithmetic and the RSA Cryptosystem
The Basic Properties of
CS480 Cryptography and Information Security
Topic 12: Number Theory Basics (2)
Great Theoretical Ideas in Computer Science
Advanced Algorithms Analysis and Design
Lecture 3.2: Public Key Cryptography II
Great Theoretical Ideas In Computer Science
MATH301- DISCRETE MATHEMATICS Copyright © Nahid Sultana Dr. Nahid Sultana Chapter 4: Number Theory and Cryptography.
Number Theory and Modular Arithmetic
Cryptography Lecture 22.
Lecture 20 Guest lecturer: Neal Gupta
Foundations of Network and Computer Security
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Great Theoretical Ideas in Computer Science
Lecture 3.1: Public Key Cryptography I
Great Theoretical Ideas in Computer Science
Section 10.1 Groups.
B.Sc. III Year Mr. Shrimangale G.W.
Lecture 43 Section 10.1 Wed, Apr 6, 2005
1.3 Properties of Real Numbers
Algebraic Structures: Group Theory
Cryptology Design Fundamentals
Cryptography Lecture 18.
Cryptography Lecture 17.
Cryptography Lecture 20.
Cryptography Lecture 16.
Cryptography Lecture 21.
Cryptography Lecture 19.
296.3:Algorithms in the Real World
Lecture 3 Strings and Things (Section 1.1)
Section 9.1 Groups.
Mathematical Background : A quick approach to Group and Field Theory
Presentation transcript:

Cryptography Lecture 21

Groups Introduce the notion of a group Provides a way of reasoning about objects that share the same mathematical structure Not absolutely needed to understand crypto applications, but does make it conceptually easier

Groups An abelian group is a set G and a binary operation ◦ defined on G such that: (Closure) For all g, hG, g◦h is in G There is an identity eG such that e◦g=g for gG Every gG has an inverse hG such that h◦g = e (Associativity) For all f, g, hG, f◦(g◦h) = (f◦g)◦h (Commutativity) For all g, hG, g◦h = h◦g The order of a finite group G is the number of elements in G

Examples ℤ under addition ℤ under multiplication ℝ under addition {0,1}* under concatenation {0, 1}n under bitwise XOR 2 x 2 invertible, real matrices under mult.

Groups The group operation can be written additively or multiplicatively I.e., instead of g◦h, write g+h or gh Does not mean that the group operation corresponds to (integer) addition or multiplication Identity denoted by 0 or 1, respectively Inverse of g denoted by –g or g-1, respectively Group exponentiation: m · a or am, respectively

Computations in groups When working with groups computationally, need to fix some representation of the group elements Usually (but not always) unique representation for a given group element Must be possible to efficiently identify group elements Must be possible to efficiently perform the group operation  Group exponentiation can be computed efficiently

Useful example ℤN = {0, …, N-1} under addition modulo N Identity is 0 Inverse of a is [-a mod N] Associativity, commutativity obvious Order N

Example What happens if we consider multiplication modulo N? {0, …, N-1} is not a group under this operation! 0 has no inverse Even if we exclude 0, there is, e.g., no inverse of 2 modulo 4

Example Consider instead the invertible elements modulo N, under multiplication modulo N I.e., ℤ*N = {0 < x < N : gcd(x, N) = 1} Closure Identity is 1 Inverse of a is [a-1 mod N] Associativity, commutativity obvious

(N) (N) = the number of invertible elements modulo N = |{a  {1, …, N-1} : gcd(a, N) = 1}| = The order of ℤ*N

Two special cases If p is prime, then 1, 2, 3, …, p-1 are all invertible modulo p (p) = |ℤ*p| = p-1 If N=pq for p, q distinct primes, then the invertible elements are the integers from 1 to N-1 that are not multiples of p or q (N) = |ℤ*N| = ?

Back to group theory…

Fermat’s little theorem Let G be a finite group of order m. Then for any gG, it holds that gm = 1 Proof (abelian case)

Examples In ℤN : In ℤ*N : For all aℤN, we have N · a = 0 mod N For all aℤ*N, we have a(N) = 1 mod N p prime: for all aℤ*p, we have ap-1 = 1 mod p