Assignment #1 Solutions

Slides:



Advertisements
Similar presentations
Time to solve equations!
Advertisements

Modular Arithmetic Several important cryptosystems make use of modular arithmetic. This is when the answer to a calculation is always in the range 0 –
Mod arithmetic.
Mathematics of Cryptography Part II: Algebraic Structures
Time Series Analysis – Homework Homework Rules: All homework must be completed by due date Homework may be done in groups – please put names of all group.
Integer & Fixed Point Addition and Multiplication CENG 329 Lab Notes By F. Serdar TAŞEL.
COMP 170 L2 Page 1 L06: The RSA Algorithm l Objective: n Present the RSA Cryptosystem n Prove its correctness n Discuss related issues.
Section 4.1: Primes, Factorization, and the Euclidean Algorithm Practice HW (not to hand in) From Barr Text p. 160 # 6, 7, 8, 11, 12, 13.
9/21/12. I can identify which factors are prime numbers. LEARNING TARGET.
Problem 1 1/20/2011Practical Aspects of Modern Cryptography.
Section 2.6 Question 1. Section 2.6 Answer 1 Section 2.6 Question 2.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Dan Boneh Intro. Number Theory Modular e’th roots Online Cryptography Course Dan Boneh.
Codes, Ciphers, and Cryptography-RSA Encryption
Least Common Multiple (LCM) of
LECTURE 5 Learning Objectives  To apply division algorithm  To apply the Euclidean algorithm.
Mathematics of Cryptography Part I: Modular Arithmetic
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
CompSci 102 Discrete Math for Computer Science February 16, 2012 Prof. Rodger.
EXAMPLE 1 Finding the Greatest Common Factor Find the greatest common factor of 56 and 84. SOLUTION STEP 1 Write the prime factorization of each number.
Multiplication Facts. 1 x3 3 Think Fast… 2 x4 8.
Cryptography Inverses and GCD Piotr Faliszewski. GCD(a,b) gcd(a, 0) = a gcd(a, b) = gcd(b, a mod b) a = b*q + r Here: q =  a / b  r = a mod b (a –
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Chinese Remainder Theorem Dec 29 Picture from ………………………
Network and Computer Security (CS 475) Modular Arithmetic
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
8.4 Use Scientific Notation Algebra. Scientific Notation Numbers such as 1,000,000, 153,000 and are written in standard form. Another way to write.
Number your paper from 1 through 25.. Multiplication Facts Ready Set Begin.
Multiplication Facts Table of Contents 0’s 1’s 2’s 3’s 4’s 5’s 6’s 7’s 8’s 9’s 10’s.
Multiplication Facts X 3 = 2. 8 x 4 = 3. 7 x 2 =
Multiplication Facts. 9 6 x 4 = 24 5 x 9 = 45 9 x 6 = 54.
SATMathVideos.Net A set S consists of all multiples of 4. Which of the following sets are contained within set S? A) S2 only B) S4 only C) S2 and S4 D)
 The greatest common factor is the largest factor that two numbers share.  Factors- The number that are multiplied together in a multiplication problem.
Assignment #3 Solutions January 24, Practical Aspects of Modern Cryptography Problem #1 Use Fermat’s Little Theorem and induction on k to prove.
AF2. Turn off your phones Primes, gcd, some examples, reading.
Prime Factors Friday, 19 February 2016 Objective Write a number as a product of its prime factors. Find the HCF and LCM of two numbers.
Introduction to Elliptic Curves CSCI 5857: Encoding and Encryption.
Multiplication Level 1 (Facts 0-2) Read These Instructions:  Try to get the answer before the computer puts it on the screen.  Do not click on your.
Multiplication Facts. 2x2 4 8x2 16 4x2 8 3x3.
Multiplication Facts Review: x 1 = 1 10 x 8 =
L131 Exponential Inverses Finding modular inverses is good enough for decoding simple modular cryptography. However, in RSA encryption consists of exponentiating.
Copyright © Cengage Learning. All rights reserved. Functions.
Multiplication Facts All Facts. 0 x 1 2 x 1 10 x 5.
EVEN NUMBERS EVEN NUMBERS 1 = prime 2 = prime1 3 = prime 4 = 2 x 22 5 = prime 6 = 2 x 33 7 = prime 8 = 2 x 2 x 24 9 = 3 x 3 10 = 2 x 55.
Direct Proof and Counterexample IV: Division into Cases and the Quotient-Remainder Theorem For each of the following values of n and d, find integers q.
CS480 Cryptography and Information Security
Multiplying and Dividing Integers
Multiplication Facts.
Prelude to Public-Key Cryptography
Integers and Division Section 3.4.
Multiplication Facts.
GCD and Optimization Problem
February 12 – 19, 2018.
Lecture 20 Guest lecturer: Neal Gupta
Week #5 – 23/25/27 September 2002 Prof. Marie desJardins
All Integer Multiplication Facts to 12
Practical Aspects of Modern Cryptography
All Integer Addition Facts to +/- 10
Multiplication Facts.
Miniconference on the Mathematics of Computation
Median Statement problems.
Unit 30 Functions Presentation 1 Functions, Mappings and Domains 1
ALGEBRA 1.6 Inequalities.
Algebra 5 Congruence Classes.
Ordering rational numbers
Subtracting integers without number line 3 digit.
Multiply whole number with rational number
Mathematical Background: Extension Finite Fields
Adding integers without number line 2 digit.
Presentation transcript:

Assignment #1 Solutions January 10, 2006

Problem #1 Show that ((a mod m) + b) mod m = (a + b) mod m and Practical Aspects of Modern Cryptography February 28, 2019

Answer #1 Let r1 = a mod m, r2 = (a + b) mod m, and r3 = ((a mod m) + b) mod m. Then there exist integers q1, q2, and q3 such that a = q1m + r1, a + b = q2m + r2, and ((a mod m) + b) = q3m + r3. Practical Aspects of Modern Cryptography February 28, 2019

Answer #1 (cont.) r2 – r3 = ((a + b) – q2m) – ((a mod m) + b) – q3m) = ((a + b) – q2m) – ((r1 + b) – q3m) = ((a + b) – q2m) – (((a – q1m) + b) – q3m) = (q1 – q2 + q3)m But 0 ≤ r2 < m and 0 ≤ r3 < m, so |r2 – r3| < m. Thus, (q1 – q2 + q3) = 0, and therefore r2 = r3. Practical Aspects of Modern Cryptography February 28, 2019

Answer #1 (cont.) Let r1 = a mod m, r2 = (a  b) mod m, and r3 = ((a mod m)  b) mod m. Then there exist integers q1, q2, and q3 such that a = q1m + r1, a  b = q2m + r2, and ((a mod m)  b) = q3m + r3. Practical Aspects of Modern Cryptography February 28, 2019

Answer #1 (cont.) r2 – r3 = ((a  b) – q2m) – ((a mod m)  b) – q3m) = ((a  b) – q2m) – ((r1  b) – q3m) = ((a  b) – q2m) – (((a – q1m)  b) – q3m) = (bq1 – q2 + q3)m But 0 ≤ r2 < m and 0 ≤ r3 < m, so |r2 – r3| < m. Thus, (bq1 – q2 + q3) = 0, and therefore r2 = r3. Practical Aspects of Modern Cryptography February 28, 2019

Problem #2 Find the mod 11 multiplicative inverse of each value x in the range 0 < x < 11. Practical Aspects of Modern Cryptography February 28, 2019

Answer #2  1 2 3 4 5 6 7 8 9 10 Practical Aspects of Modern Cryptography February 28, 2019

Answer #2 (cont.)  1 2 3 4 5 6 7 8 9 10 Practical Aspects of Modern Cryptography February 28, 2019

Answer #2 (cont.) The same cannot be done mod 12. For example, 2Y mod 12 is even regardless of the value of Y. Therefore 2 does not have a mod 12 multiplicative inverse. Practical Aspects of Modern Cryptography February 28, 2019

Problem #3 Compute 31415926535897932384626433832795028841971693993751058209749445923078164 mod 11. Practical Aspects of Modern Cryptography February 28, 2019

Answer #3 31 mod 11 = 3 36 mod 11 = 3 32 mod 11 = 9 37 mod 11 = 9 Practical Aspects of Modern Cryptography February 28, 2019

Problem #4 Compute 27182818284590452353602874713526624977572470936999595749669676277240766 mod 33. Practical Aspects of Modern Cryptography February 28, 2019

Answer #4 21 mod 33 = 2 26 mod 33 = 31 22 mod 33 = 4 27 mod 33 = 29 Practical Aspects of Modern Cryptography February 28, 2019

Problem #5 If p is a prime, then for integers a such that 0 < a < p, then a p - 1 mod p = 1. Use this fact to show that 65 is not prime. Practical Aspects of Modern Cryptography February 28, 2019

Answer #5 Thus 65 is not prime. 21 mod 65 = 2 216 mod 65 = 16 Practical Aspects of Modern Cryptography February 28, 2019