Mathematical Background: Primes and (GF)

Slides:



Advertisements
Similar presentations
Presented by Alex Atkins.  An integer p >= 2 is a prime if its only positive integer divisors are 1 and p.  Euclid proved that there are infinitely.
Advertisements

Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Finite Fields Rong-Jaye Chen. p2. Finite fields 1. Irreducible polynomial f(x)  K[x], f(x) has no proper divisors in K[x] Eg. f(x)=1+x+x 2 is irreducible.
BCH Codes Hsin-Lung Wu NTPU.
WS Algorithmentheorie 03 – Randomized Algorithms (Primality Testing) Prof. Dr. Th. Ottmann.
Cryptography and Network Security
Chapter 8 – Introduction to Number Theory. Prime Numbers prime numbers only have divisors of 1 and self –they cannot be written as a product of other.
Section 4.1: Primes, Factorization, and the Euclidean Algorithm Practice HW (not to hand in) From Barr Text p. 160 # 6, 7, 8, 11, 12, 13.
Computability and Complexity
22C:19 Discrete Structures Integers and Modular Arithmetic
Quotient-Remainder Theory, Div and Mod
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
6/20/2015 5:05 AMNumerical Algorithms1 x x1x
Chapter 8 – Introduction to Number Theory Prime Numbers
Cryptography and Network Security Chapter 8. Chapter 8 – Introduction to Number Theory The Devil said to Daniel Webster: "Set me a task I can't carry.

CSE 311: Foundations of Computing Fall 2014 Lecture 12: Primes, GCD.
9/22/15UB Fall 2015 CSE565: S. Upadhyaya Lec 7.1 CSE565: Computer Security Lecture 7 Number Theory Concepts Shambhu Upadhyaya Computer Science & Eng. University.
Lecture 2-3 Basic Number Theory and Algebra. In modern cryptographic systems, the messages are represented by numerical values prior to being encrypted.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-9 Public-Key Cryptography.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-5 Mathematical Background:
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-12 Public-Key Cryptography.
Cryptographic Protocols Secret sharing, Threshold Security
Mathematical Background : A quick approach to Group and Field Theory
Mathematical Background: Groups, Rings, Finite Fields (GF)
Mathematical Background for Cryptography: Modular arithmetic and gcd
Rabin Lock and Public-Key Systems
Mathematical Background: Extension Fields
Network Security Design Fundamentals Lecture-13
Public-Key Cryptography RSA Rivest-Shamir-Adelmann Public-Key System
Handbook of Applied Cryptography - CH4, from 4.1~4.3
Numerical Algorithms x x-1 Numerical Algorithms
RSA Public-Key Secrecy and Signature
DH Public-Key Exchange
ALGORITHM NUMBER THEORY
Design Problems (Open book)
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Sample Solution Cryptology Design Fundamentals
Advanced Topics in Security
Mathematical Background: Prime Numbers
ElGamal Public-Key Systems over GF(p) & GF(2m)
Prime and Relatively Prime Numbers
Week #5 – 23/25/27 September 2002 Prof. Marie desJardins
Introduction to Cryptography
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Mathematical Background for Cryptography
Sample Solution Cryptology Design Fundamentals
Sample Solution Final exam: Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptographic Protocols Secret Sharing, Threshold Security
Network Security Design Fundamentals Lecture-13
Cryptology Design Fundamentals
Network Security Tutorial-16 Design Fundamentals PGP ET-IDA-082
Network Security Tutorial-16 Design Fundamentals PGP ET-IDA-082
Cryptology Design Fundamentals
Lecture 2-3 Basic Number Theory and Algebra
Mathematical Background: Groups, Rings, Finite Fields (GF)
Public-Key Cryptography Quadratic Residues and „Rabin Lock“
Mathematical Background : A quick approach to Group and Field Theory
Mathematical Background: Extension Finite Fields
Mathematical Background: Primes and (GF)
Presentation transcript:

Mathematical Background: Primes and (GF) Network Security Design Fundamentals ET-IDA-082 Tutorial-3 Mathematical Background: Primes and (GF) 13.04.2016, v23 Prof. W. Adi

Summary: Primality check and generating primes Fermat ‘s Theorem to check primality: If for any b, where 1 < b < p the following holds bp-1  1 mod p, then p is a pseudo prime to the base b Generating true primes based on Pocklington´s Theorem: If n = R . F + 1 , Where the prime factors of F are: And if for some integer a the following holds: 1. gcd ( a (n-1)/ pj –1 , n ) = 1 for j = 1, 2... r 2. and an-1  1 in Zn (modulo n) 3. and if F > n , then n is a prime number.

To generate large prime numbers; start with a small list, then use Pocklington‘s theorem to get larger and larger primes List of Primes up to 4483

Problem 3-1: Primality test Prove that the following numbers 17, 13, 31 are pseudoprimes to the bases 2 and 3. Fermat ‘s Theorem to check primality: If for any b, where 1 < b < p the following holds bp-1  1 mod p, then p is a pseudoprime to the base b Solution 3-1: 217-1  1 mod 17 213-1  1 mod 13 231-1  1 mod 31 317-1  1 mod 17 313-1  1 mod 13 331-1  1 mod 31

Problem 3-2: Generating definitely prime numbers To set up a cryptographic system the we used the following known prime numbers for generating larger primes: 2, 3,7,11,13 1. Using Pocklington’s Theorem the following number was constructed n=4x7+1 = 29. Check if n=29 is for sure a prime. 2. Generate GF(29) and find 3 primitive elements. Solution 3-2: 1. n = 4( 7) + 1 = 29, F = 7 and R=4 29 is prime if the following conditions all hold : 1. gcd ( 2 (29-1)/ 7 –1 , 29 ) = gcd ( 24 –1 , 29 ) = gcd (15,29)= 1 is true 2. 229-1 = 1 mod 29 or in Z29 is true 3. F = 7 > 29 => 7 > 5.-- is true As all conditions hold, 29 is for sure a prime 2. The possible multiplicative orders in GF(29) are the divisors of (29)= 29-1 =28, namely 1, 2, 4, 7, 14 , 28 Number of the primitive elements with the highest order order 28 is (28) = (22 x 7)= 28 (1-1/2) (1-1/7) = 12 Order of 2: 21 = 2 1, 22 = 4 1, 24 = 161 , 27 = 2x64 = 2 x –6 =-12 1, 214 =( -12)2 =144= -11 => order of 2 is 28 => 2 is a primitive element. 23=8 and 25=3 are also primitive as gcd(28,3)=1 and gcd(28,5)=1. (Notice:The primitive elements are all 2i for which gcd(28,i)=1 namely: 21, 23, 25, 29, 211, 213 ,215, 217, 219, 223,225, 227 )