Cryptography Lecture 17.

Slides:



Advertisements
Similar presentations
1 Lect. 12: Number Theory. Contents Prime and Relative Prime Numbers Modular Arithmetic Fermat’s and Euler’s Theorem Extended Euclid’s Algorithm.
Advertisements

Finite Fields Rong-Jaye Chen. p2. Finite fields 1. Irreducible polynomial f(x)  K[x], f(x) has no proper divisors in K[x] Eg. f(x)=1+x+x 2 is irreducible.
Chapter 4 Finite Fields. Introduction of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key concern operations on “numbers”
Chapter 4 – Finite Fields. Introduction will now introduce finite fields of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key.
Math 3121 Abstract Algebra I
1.  Detailed Study of groups is a fundamental concept in the study of abstract algebra. To define the notion of groups,we require the concept of binary.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 18 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Introduction Polynomials
Congruence Classes Z n = {[0] n, [1] n, [2] n, …, [n - 1] n } = the set of congruence classes modulo n.
Chapter 4 – Finite Fields Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Great Theoretical Ideas in Computer Science.
M. Khalily Dermany Islamic Azad University.  finite number of element  important in number theory, algebraic geometry, Galois theory, cryptography,
Great Theoretical Ideas in Computer Science.
CPSC 3730 Cryptography and Network Security
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Information Security and Management 4. Finite Fields 8
Numbers, Operations, and Quantitative Reasoning.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Monoids, Groups, Rings, Fields
Math 3121 Abstract Algebra I Lecture 9 Finish Section 10 Section 11.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Great Theoretical Ideas in Computer Science.
CS Lecture 14 Powerful Tools     !. Build your toolbox of abstract structures and concepts. Know the capacities and limits of each tool.
Lecture 3.1: Public Key Cryptography I CS 436/636/736 Spring 2015 Nitesh Saxena.
15-499Page :Algorithms and Applications Cryptography II – Number theory (groups and fields)
Chapter 13 Mathematic Structures 13.1 Modular Arithmetic Definition 1 (modulo). Let a be an integer and m be a positive integer. We denoted by a mod m.
Great Theoretical Ideas in Computer Science.
Great Theoretical Ideas in Computer Science.
Cryptography Lecture 14 Arpita Patra © Arpita Patra.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2014.
L131 Exponential Inverses Finding modular inverses is good enough for decoding simple modular cryptography. However, in RSA encryption consists of exponentiating.
Properties of Groups Proposition 1: Let (G,  ) be a group. i.The inverse element of any element of G is unique. Remark: In view of i., we may use the.
Chapter 4 With Question/Answer Animations 1. Chapter Motivation Number theory is the part of mathematics devoted to the study of the integers and their.
Great Theoretical Ideas in Computer Science.
Math 3121 Abstract Algebra I
Assignment 4 is due! Assignment 5 is out and is due in two weeks!
Mathematical Background : A quick approach to Group and Field Theory
Modular Arithmetic and the RSA Cryptosystem
CS480 Cryptography and Information Security
Topic 12: Number Theory Basics (2)
Great Theoretical Ideas in Computer Science
Prelude to Public-Key Cryptography
Advanced Algorithms Analysis and Design
Lecture 3.2: Public Key Cryptography II
B504/I538: Introduction to Cryptography
Great Theoretical Ideas In Computer Science
Number Theory and Modular Arithmetic
Cryptography Lecture 22.
Cryptography Lecture 23.
Lecture 20 Guest lecturer: Neal Gupta
Foundations of Network and Computer Security
Cryptography Lecture 21.
Great Theoretical Ideas in Computer Science
Lecture 3.1: Public Key Cryptography I
Great Theoretical Ideas in Computer Science
Section 10.1 Groups.
B.Sc. III Year Mr. Shrimangale G.W.
Algebraic Structures: Group Theory
Cryptology Design Fundamentals
Cryptography Lecture 18.
Cryptography Lecture 20.
Cryptography Lecture 16.
Cryptography Lecture 19.
Cryptography Lecture 21.
Cryptography Lecture 19.
296.3:Algorithms in the Real World
Lecture 3 Strings and Things (Section 1.1)
Section 9.1 Groups.
Mathematical Background : A quick approach to Group and Field Theory
Presentation transcript:

Cryptography Lecture 17

Q and A; bring the written answers to TA before the class 1. What is a group? I really want you to remember the definition of a group. You should be very familiar with it. 2. Give one example group. Prove why it satisfies the definition. You can use the example in the book. However, you need to prove it satisfies the definition. 3. Give another example of a group. 4. (N) = the number of invertible elements modulo N = |{a  {1, …, N-1} : gcd(a, N) = 1}| = The order of ℤ*N If N = pq, where p and q are primes, why (N) = (p-1)(q-1)? 5. What is Fermat’s little theorem

Groups Introduce the notion of a group Provides a way of reasoning about objects that share the same mathematical structure Not absolutely needed to understand crypto applications, but does make it conceptually easier

Groups An abelian group is a set G and a binary operation ◦ defined on G such that: (Closure) For all g, hG, g◦h is in G There is an identity eG such that e◦g=g for gG Every gG has an inverse hG such that h◦g = e (Associativity) For all f, g, hG, f◦(g◦h) = (f◦g)◦h (Commutativity) For all g, hG, g◦h = h◦g The order of a finite group G is the number of elements in G

Examples ℤ under addition ℤ under multiplication ℝ under addition {0,1}* under concatenation {0, 1}n under bitwise XOR 2 x 2 invertible, real matrices under mult.

Groups The group operation can be written additively or multiplicatively I.e., instead of g◦h, write g+h or gh Does not mean that the group operation corresponds to (integer) addition or multiplication Identity denoted by 0 or 1, respectively Inverse of g denoted by –g or g-1, respectively Group exponentiation: m · a or am, respectively

Computations in groups When working with groups computationally, need to fix some representation of the group elements Usually (but not always) unique representation for a given group element Must be possible to efficiently identify group elements Must be possible to efficiently perform the group operation  Group exponentiation can be computed efficiently

Useful example ℤN = {0, …, N-1} under addition modulo N Identity is 0 Inverse of a is [-a mod N] Associativity, commutativity obvious Order N

Example What happens if we consider multiplication modulo N? {0, …, N-1} is not a group under this operation! 0 has no inverse Even if we exclude 0, there is, e.g., no inverse of 2 modulo 4

Example Consider instead the invertible elements modulo N, under multiplication modulo N I.e., ℤ*N = {0 < x < N : gcd(x, N) = 1} Closure Identity is 1 Inverse of a is [a-1 mod N] Associativity, commutativity obvious

(N) (N) = the number of invertible elements modulo N = |{a  {1, …, N-1} : gcd(a, N) = 1}| = The order of ℤ*N

Two special cases If p is prime, then 1, 2, 3, …, p-1 are all invertible modulo p (p) = |ℤ*p| = p-1 If N=pq for p, q distinct primes, then the invertible elements are the integers from 1 to N-1 that are not multiples of p or q (N) = |ℤ*N| = ? Proposition 8.18

Generally? Theorem 8.19 It is good to know it. In cryptography, we do not use it much What are more frequently used are ”two special cases.”

Back to group theory…

Fermat’s little theorem Let G be a finite group of order m. Then for any gG, it holds that gm = 1 Proof (abelian case)

Examples In ℤN : In ℤ*N : For all aℤN, we have N · a = 0 mod N For all aℤ*N, we have a(N) = 1 mod N p prime: for all aℤ*p, we have ap-1 = 1 mod p