I. Finite Field Algebra.

Slides:



Advertisements
Similar presentations
Finite Fields Rong-Jaye Chen. p2. Finite fields 1. Irreducible polynomial f(x)  K[x], f(x) has no proper divisors in K[x] Eg. f(x)=1+x+x 2 is irreducible.
Advertisements

BCH Codes Hsin-Lung Wu NTPU.
Mathematics of Cryptography Part II: Algebraic Structures
Cryptography and Network Security
Chapter 4 – Finite Fields. Introduction will now introduce finite fields of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key.
1.  We have studied groups, which is an algebraic structure equipped with one binary operation. Now we shall study rings which is an algebraic structure.
Algebraic Structures DEFINITIONS: PROPERTIES OF BINARY OPERATIONS Let S be a set and let  denote a binary operation on S. (Here  does not necessarily.
1.  Detailed Study of groups is a fundamental concept in the study of abstract algebra. To define the notion of groups,we require the concept of binary.
Cryptography and Network Security Chapter 4
Cryptography and Network Security Chapter 4 Fourth Edition by William Stallings.
Introduction Polynomials
Congruence Classes Z n = {[0] n, [1] n, [2] n, …, [n - 1] n } = the set of congruence classes modulo n.
Chapter 4 – Finite Fields Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public.
Finite fields.
Algebraic Properties: The Rules of Algebra Be Cool - Follow The Rules!
WHOLE NUMBERS; INTEGERS Whole numbers: Z 0,+ = the natural numbers  {0}. Integers:
7.1 - Introduction To Signed Numbers
M. Khalily Dermany Islamic Azad University.  finite number of element  important in number theory, algebraic geometry, Galois theory, cryptography,
Rings,Fields TS. Nguyễn Viết Đông Rings, Integral Domains and Fields, 2. Polynomial and Euclidean Rings 3. Quotient Rings 2.
Chapter 2 Working with Real Numbers. 2-1 Basic Assumptions.
Unit – IV Algebraic Structures
FINITE FIELDS 7/30 陳柏誠.
CPSC 3730 Cryptography and Network Security
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Information Security and Management 4. Finite Fields 8
Cryptography and Network Security Introduction to Finite Fields.
By: Hector L Contreras SSGT / USMC
Monoids, Groups, Rings, Fields
Polynomial Division and the Remainder Theorem Section 9.4.
Chapter 4 – Finite Fields
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
Information Security Lab. Dept. of Computer Engineering 87/121 PART I Symmetric Ciphers CHAPTER 4 Finite Fields 4.1 Groups, Rings, and Fields 4.2 Modular.
ACTIVITY 31: Dividing Polynomials (Section 4.2, pp )
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
(2 + 1) + 4 = 2 + (1 + 4) Associative Property of Addition.
Abstract Algebra 2004/9/29Yuh-Ming Huang, CSIE NCNU1 Introduction to Algebra Def 2.0 ( G, * ) G: a set A binary operation * on G : a * b  G  a,b  G.
PROPERTIES OF REAL NUMBERS. COMMUTATIVE PROPERTY OF ADDITION What it means We can add numbers in any order Numeric Example Algebraic Example
15-499Page :Algorithms and Applications Cryptography II – Number theory (groups and fields)
Cryptography and Network Security Chapter 4 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 13 Mathematic Structures 13.1 Modular Arithmetic Definition 1 (modulo). Let a be an integer and m be a positive integer. We denoted by a mod m.
by D. Fisher (2 + 1) + 4 = 2 + (1 + 4) Associative Property of Addition 1.
(2 + 1) + 4 = 2 + (1 + 4) Associative Property of Addition.
Axioms for Rational Numbers 9/14-9/15. Natural Numbers – Numbers used for counting: 1, 2, 3, and so on. Whole Numbers – Natural numbers and zero: 0, 1,
Divisibility and Modular Arithmetic
6.6 Rings and fields Rings  Definition 21: A ring is an Abelian group [R, +] with an additional associative binary operation (denoted ·) such that.
Multiplicative Group The multiplicative group of Z n includes every a, 0
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Polynomial Long Division
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-5 Mathematical Background:
Dividing Polynomials A review of long division:
Chapter4: Finite Fields
Appendix A Basic Algebra Review
Mathematical Background: Extension Fields
Polynomials.
Unit-III Algebraic Structures
CS480 Cryptography and Information Security
Properties of Operations
Polynomial Let R be a ring. A polynomial over R is an expression of the form: f (x) = a0 + a1x + a2x2 +…+ anxn where the ai  R called the coefficients.
Yuh-Ming Huang, CSIE NCNU
B.Sc. III Year Mr. Shrimangale G.W.
Real Numbers and Number Operations
Properties of Real Numbers
Cryptography and Network Security
Properties of Real Numbers
Finite Fields Rong-Jaye Chen.
Cryptology Design Fundamentals
Set – collection of objects
296.3:Algorithms in the Real World
Presentation transcript:

I. Finite Field Algebra

Binary Operation G is closed under “*” G is a set of elements “*” A binary operation on G is a rule that assigns to each pair of elements a and b a uniquely defined element c G is closed under “*”

Groups A set G on which a binary operation “*” is defined is called a Group if: The binary operation is associative G contains an identity element e (a *e = e *a = a) For any element a in G, there exists an inverse element a’ in G (a *a’ = a’ *a = e) Commutative Group G if for any a and b in G: a*b = b*a

Theorems The identity element in a group G is unique Proof If we have two identity elements e and e’ in G, Then, e’ =e’ * e =e  e, e’ are identical The inverse of any element in a group G is unique Proof If we have two inverse elements a’ and a’’ for a in G, Then, a’ =a’ *e =a’ *(a*a’’)  a’, a’’ are identical

Example: Modulo-2 Addition The set G={0,1} is a group of order 2 under modulo-2 addition Modulo-2 addition is associative The identity element is 0 The inverse of 0 is 0 in G The inverse of 1 is 1 in G Modulo-2 Addition

Example: Modulo-m Addition The set G={0,1,2,…,m-1} is a group of order m under modulo-m addition Modulo-m addition is associative The identity element is 0 The inverse of i is m-i in G Modulo-m Addition + i j =r i+j=qm+r, 0≤r<m-1

Example: Modulo-p Multiplication G={1,2,…,p-1}, p is a prime number, is a group of order p under modulo-p multiplication Modulo-p Multiplication . i j =r i.j=qp+r, 0≤r<p-1 Modulo-5 Multiplication Modulo-5 multiplication is associative The identity element is 1 The inverse of 1 is 1 in G The inverse of 2 is 3 in G The inverse of 3 is 2 in G The inverse of 4 is 4 in G . 1 2 3 4 . Proof?

SubGroups Define a set G as a group under a binary operation *, A subset H is called a subgroup if H is closed under the binary operation * For any element a in H, the inverse of a is also in H Example: Let G be the set of rational numbers constitute a group under real addition. Therefore, The set of integers H is a proper (i.e., H ≠G) subgroup under real addition

Cosets H is a subgroup of a group G under binary operation * If the group G is commutative, a *H =H *a is simply labeled as: a Coset of H

3 + H ={3,7,11,15}= 7 + H + H ={0,4,8,12} 1 + H ={1,5,9,13} 2 + H Example G={0,1,2,…,15} under modulo-16 addition H={0,4,8,12} is a subgroup of G why? The coset 3 + H ={3,7,11,15}= 7 + H Four Distinct and Disjoint Cosets of H + H ={0,4,8,12} 1 + H ={1,5,9,13} 2 + H ={2,6,10,14} 3 + H ={3,7,11,15}

Theorem (Read Only) Let H be a subgroup of a group G with binary operation *. No two elements in a Coset of H are identical

Theorem (Read Only) No two elements in two different Cosets of a subgroup H of a group G are identical

Properties of Cosets Every element in G appears in one and only one of distinct Cosets of H All the distinct Cosets of H are disjoint The union of all distinct Cosets of H forms the group G

Fields Let F be a set of elements on which two binary operations called addition “+” and multiplication “.” are defined. The set F and the two binary operations represent a field if: F is a commutative group under addition. The identity element with respect to addition is called the zero element (denoted by 0) The set of nonzero elements in F is a commutative group under multiplication. The identity element with respect to multiplication is called the unit element (denoted the 1 element) Multiplication is distributive over addition: a.(b+c) = a.b + a.c, a, b, c in F

Basic Properties of Fields a.0=0.a=0 If a,b≠0, a.b≠0 a.b=0 and a≠0 imply that b=0 -(a.b)=(-a).b=a.(-b) If a≠0, a.b=a.c imply that b=c

Galois Field of the order 2 Binary Field GF(2) Modulo-2 Addition Modulo-2 Multiplication + 1 . 1 F={0,1} is a Finite field of order 2 under modulo-2 addition and modulo-2 multiplication Galois Field of the order 2

Subtraction and Division (GF(7)) Modulo-7 Addition Modulo-7 Multiplication + 1 2 3 4 5 6 . 1 2 3 4 5 6 Ex: 3-6=3+(-6)=3+1=4 Ex: 3/2=3.2-1 =3.4=5

Characteristic of a Finite Field GF(q) (Read)

Theorem (Read Only) Proof

The order of a Field Element (Read)

Theorem (Read Only) Let a be a nonzero element of a finite field GF(q). Then aq-1=1 Proof

Theorem (Read Only) Let a be a nonzero element in a finite field GF(q). Let n be the order of a. Then n divides q-1 Proof

A Primitive Element of GF(q) A nonzero element a is said to be primitive if the order of a is q-1 Example: GF(7) 31=3 32=2 33=6 34=4 35=5 36=1 41=4 42=2 43=1 Order of element 4 is 3 which is a factor of 6 Element 4 is not a primitive element of GF(7) Order of element 3 is 6 Element 3 is a primitive element of GF(7)

Binary Field Arithmetic Polynomials of Degree 1 over GF(2) Polynomials of Degree 2 over GF(2) Polynomials of Degree n over GF(2) X X2 2n Polynomials over GF(2) with degree n 1+X 1+X2 X+X2 1+X+X2

Addition of Two Polynomials over GF(2) Example: g(X) = 1+X+X3+X5 f(X) = 1+X2+X3+X4+X7 g(X)+f(X) = X+X2+X4+X5+X7

Division of Two Polynomials over GF(2) (Quotient q(X)) (Remainder r(X))

Irreducible Polynomials A polynomial p(X) over GF(2) of degree m is said to be irreducible over GF(2) if p(X) is not divisible by any polynomial over GF(2) of degree less than m but greater than 0

Theorem Any irreducible polynomial over GF(2) divides Xn+1 where n=2m-1 and m is the degree of the polynomial

Primitive Polynomials An irreducible polynomial p(X) of degree m is said to be primitive if the smallest positive integer n for which p(X) divides Xn+1 is n=2m-1 Example p(X)=X4+X+1 divides X15+1 but does not divide any Xn+1 for 1≤n<15 (Primitive) p(X)= X4+X3+X2+X+1 divides X5+1 (Irreducible but Not Primitive)

Useful Property of Polynomials over GF(2)