Introduction to Cryptography

Slides:



Advertisements
Similar presentations
Presented by Alex Atkins.  An integer p >= 2 is a prime if its only positive integer divisors are 1 and p.  Euclid proved that there are infinitely.
Advertisements

Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Cryptography and Network Security Chapter 8 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 3 Public Key Cryptography and RSA Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.
Cryptography and Network Security Chapter 8 Fourth Edition by William Stallings.
Opening quote. A number of concepts from number theory are essential in the design of public-key cryptographic algorithms, which this chapter will introduce.
Cryptography and Network Security
Cryptography and Network Security
Chapter 8 – Introduction to Number Theory. Prime Numbers prime numbers only have divisors of 1 and self –they cannot be written as a product of other.
Section 4.1: Primes, Factorization, and the Euclidean Algorithm Practice HW (not to hand in) From Barr Text p. 160 # 6, 7, 8, 11, 12, 13.
Computability and Complexity
Chapter 8 Introduction To Number Theory. Prime Numbers Prime numbers only have divisors of 1 and Prime numbers only have divisors of 1 and self. self.
Chapter 8 Introduction to Number Theory. Prime Numbers prime numbers only have divisors of 1 and self –they cannot be written as a product of other numbers.
Agrawal-Kayal-Saxena Presented by: Xiaosi Zhou
Chapter 8 More Number Theory. Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime.
COM 5336 Cryptography Lecture 7a Primality Testing
1 Chapter 7– Introduction to Number Theory Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
6/20/2015 5:05 AMNumerical Algorithms1 x x1x
Chapter 8 – Introduction to Number Theory Prime Numbers  prime numbers only have divisors of 1 and self they cannot be written as a product of other numbers.
Chapter 8 – Introduction to Number Theory Prime Numbers
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2001 Lecture 7 Tuesday, 11/6/01 Number-Theoretic Algorithms Chapter.
Cryptography and Network Security Chapter 8. Chapter 8 – Introduction to Number Theory The Devil said to Daniel Webster: "Set me a task I can't carry.
Chapter 8 – Introduction to Number Theory Prime Numbers  prime numbers only have divisors of 1 and self they cannot be written as a product of other numbers.
CSE 321 Discrete Structures Winter 2008 Lecture 10 Number Theory: Primality.
BY MISS FARAH ADIBAH ADNAN IMK
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright © The McGraw-Hill Companies, Inc. Permission required.
Software Security Seminar - 1 Chapter 11. Mathematical Background 발표자 : 안병희 Applied Cryptography.

Mathematics of Cryptography Part I: Modular Arithmetic
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Information Security and Management 4. Finite Fields 8
RSA Parameter Generation Bob needs to: - find 2 large primes p,q - find e s.t. gcd(e, Á (pq))=1 Good news: - primes are fairly common: there are about.
YSLInformation Security -- Public-Key Cryptography1 Prime and Relatively Prime Numbers Divisors: We say that b  0 divides a if a = mb for some m, where.
Fall 2002CS 395: Computer Security1 Chapters 4 and 8: The Mathematics Required for Public Key Cryptography In case you’re beginning to worry that this.
9/22/15UB Fall 2015 CSE565: S. Upadhyaya Lec 7.1 CSE565: Computer Security Lecture 7 Number Theory Concepts Shambhu Upadhyaya Computer Science & Eng. University.
Introduction to Number Theory
Primality Testing. Introduction The primality test provides the probability of whether or not a large number is prime. Several theorems including Fermat’s.
9.1 Primes and Related Congruence Equations 23 Sep 2013.
Lecture 2-3 Basic Number Theory and Algebra. In modern cryptographic systems, the messages are represented by numerical values prior to being encrypted.
CS480 Cryptography and Information Security
MA/CSSE 473 Day 9 Primality Testing Encryption Intro.
Number-Theoretic Algorithms
Public Key Encryption Major topics The RSA scheme was devised in 1978
Introduction to Number Theory
Mathematics of Cryptography
Chapter Applications of Number Theory Some Useful Results
CSE565: Computer Security Lecture 7 Number Theory Concepts
CS 2210:0001Discrete Structures Modular Arithmetic and Cryptography
Handbook of Applied Cryptography - CH4, from 4.1~4.3
Introduction to Cryptography
Numerical Algorithms x x-1 Numerical Algorithms
ALGORITHM NUMBER THEORY
Number-Theoretic Algorithms (UNIT-4)
Cryptography and Network Security
Introduction to Number Theory
Cryptography and Network Security Chapter 8
MATH301- DISCRETE MATHEMATICS Copyright © Nahid Sultana Dr. Nahid Sultana Chapter 4: Number Theory and Cryptography.
Numerical Algorithms x x-1
Number Theory (Chapter 7)
Cryptography and Network Security
Prime and Relatively Prime Numbers
Cryptography and Network Security
Analysis of the RSA Encryption Algorithm
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
Lecture 3.1: Public Key Cryptography I
Lecture 2-3 Basic Number Theory and Algebra
Presentation transcript:

Introduction to Cryptography Based on: William Stallings, Cryptography and Network Security

Chapter 8 More Number Theory A number of concepts from number theory are essential in the design of public-key cryptographic algorithms. This chapter provides an overview of the concepts referred to in other chapters. The reader familiar with these topics can safely skip this chapter. The reader should also review Sections 4.1 through 4.3 before proceeding with this chapter. As with Chapter 4, this chapter includes a number of examples, each of which is highlighted in a shaded box. More Number Theory

Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime numbers are central to number theory Any integer a > 1 can be factored in a unique way as a = p1 a1 * p2 a2 * . . . * pp1 a1 where p1 < p2 < . . . < pt are prime numbers and where each ai is a positive integer This is known as the fundamental theorem of arithmetic

Table 8.1 Primes Under 2000

Fermat's Theorem States the following: ap-1 = 1 (mod p) If p is prime and a is a positive integer not divisible by p then ap-1 = 1 (mod p) Sometimes referred to as Fermat’s Little Theorem An alternate form is: If p is prime and a is a positive integer then ap = a (mod p) Plays an important role in public-key cryptography

Some Values of Euler’s Totient Function ø(n)

Euler's Theorem States that for every a and n that are relatively prime: aø(n) = 1 (mod n) An alternative form is: aø(n)+1 = a (mod n) Plays an important role in public-key cryptography

Miller-Rabin Algorithm Typically used to test a large number for primality Let 𝑛 be an odd prime, and 𝑛−1= 2 𝑠 𝑟, where 𝑟 is odd. Let 𝑎 be any integer such that gcd 𝑎,𝑛 =1. Then either 𝑎 𝑟 ≡1 (𝑚𝑜𝑑 𝑛), or 𝑎 2 𝑗 𝑟 ≡−1 𝑚𝑜𝑑 𝑛 , for some 𝑗, 0≤𝑗≤𝑠−1. This motivates the following algorithm.

Miller-Rabin Algorithm TEST: input 𝑛≥3 ; output “prime” or “composite” 1. Write 𝑛−1= 2 𝑠 𝑟, 𝑟 odd. For 𝑖=1 to 𝑡 do the following: 2. Choose a random integer 𝑎, 1<𝑎<𝑛−1, and compute 𝑦= 𝑎 𝑟 𝑚𝑜𝑑 𝑛 3. if 𝑦≠1, 𝑦 ≠𝑛−1 then do: 4. 𝑗←1; while 𝑗≤𝑠−1 and 𝑦≠𝑛−1 do 5. compute 𝑦← 𝑦 2 𝑚𝑜𝑑 𝑛; if 𝑦=1 then return “composite”; 𝑗←𝑗+1; if 𝑦≠𝑛−1 then return “composite”; 6. return (“prime") ;

Deterministic Primality Algorithm Prior to 2002 there was no known method of efficiently proving the primality of very large numbers All of the algorithms in use produced a probabilistic result In 2002 Agrawal, Kayal, and Saxena developed an algorithm that efficiently determines whether a given large number is prime Known as the AKS algorithm Does not appear to be as efficient as the Miller-Rabin algorithm

Chinese Remainder Theorem (CRT) Believed to have been discovered by the Chinese mathematician Sun-Tsu in around 100 A.D. One of the most useful results of number theory Says it is possible to reconstruct integers in a certain range from their residues modulo a set of pairwise relatively prime moduli Can be stated in several ways Provides a way to manipulate (potentially very large) numbers mod M in terms of tuples of smaller numbers This can be useful when M is 150 digits or more However, it is necessary to know beforehand the factorization of M