The Euler Phi-Function Is Multiplicative (3/3)

Slides:



Advertisements
Similar presentations
Public Key Cryptography The RSA Cryptosystem. by William M. Faucette Department of Mathematics State University of West Georgia.
Advertisements

An Aside from Number Theory: The Euler Phi-function (9/20/13) Definition. The Euler Phi-function of a positive integer n, denoted  (n) is the number of.
Equivalence Relations
1 Lect. 12: Number Theory. Contents Prime and Relative Prime Numbers Modular Arithmetic Fermat’s and Euler’s Theorem Extended Euclid’s Algorithm.
Section 11 Direct Products and Finitely Generated Abelian Groups One purpose of this section is to show a way to use known groups as building blocks to.
Section 4.1: Primes, Factorization, and the Euclidean Algorithm Practice HW (not to hand in) From Barr Text p. 160 # 6, 7, 8, 11, 12, 13.
Primality Testing Patrick Lee 12 July 2003 (updated on 13 July 2003)
Fermat’s Little Theorem (2/24) Theorem (flt). If p is prime and GCD(a, p) = 1, then a p – 1  1 (mod p). Again, this says that in a mod p congruence, we.
The Fundamental Theorem of Arithmetic (2/12) Definition (which we all already know). A number greater than 1 is called prime if its only divisors are 1.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Cyclic Groups Part 2.
Ch 2.4: Differences Between Linear and Nonlinear Equations
Elementary Number Theory and Methods of Proof. Basic Definitions An integer n is an even number if there exists an integer k such that n = 2k. An integer.
Announcements: Homework 1 returned. Comments from Kevin? Homework 1 returned. Comments from Kevin? Matlab: tutorial available at
Inverses and GCDs Supplementary Notes Prepared by Raymond Wong
Complexity1 Pratt’s Theorem Proved. Complexity2 Introduction So far, we’ve reduced proving PRIMES  NP to proving a number theory claim. This is our next.
Congruence of Integers
CS470, A.SelcukPublic Key Cryptography1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 CSE20 Lecture 6 4/19/11 CK Cheng UC San Diego. Residual Numbers (NT-1 and Shaum’s Chapter 11) Introduction Definition Operations Range of numbers Conversion.
Matrix Algebra THE INVERSE OF A MATRIX © 2012 Pearson Education, Inc.
Dan Boneh Intro. Number Theory Modular e’th roots Online Cryptography Course Dan Boneh.
BY MISS FARAH ADIBAH ADNAN IMK
The Integers and Division
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright © The McGraw-Hill Companies, Inc. Permission required.
Proof of Euler-Fermat (2/28) Here’s an outline of the proof of the Euler-Fermat Theorem, which mirrors the proof of flt. Given any m, let B = {b i | 0.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
Module :MA3036NI Cryptography and Number Theory Lecture Week 7
Functions. Recall Relation Let A and B be two sets. A relation between A and B is a collection of ordered pairs (a, b) such that a  A and b  B.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
4 4.4 © 2012 Pearson Education, Inc. Vector Spaces COORDINATE SYSTEMS.
Cryptography Inverses and GCD Piotr Faliszewski. GCD(a,b) gcd(a, 0) = a gcd(a, b) = gcd(b, a mod b) a = b*q + r Here: q =  a / b  r = a mod b (a –
The Integers. The Division Algorithms A high-school question: Compute 58/17. We can write 58 as 58 = 3 (17) + 7 This forms illustrates the answer: “3.
Cyclic Groups (9/25) Definition. A group G is called cyclic if there exists an element a in G such that G =  a . That is, every element of G can be written.
Basic Number Theory Divisibility Let a,b be integers with a≠0. if there exists an integer k such that b=ka, we say a divides b which is denoted by a|b.
Chapter 4 More on Directed Proof and Proof by Contrapositive 4.1 Proofs Involving Divisibility of Integers 4.2 Proofs Involving Congruence of Integers.
Chinese Remainder Theorem Dec 29 Picture from ………………………
Chapter 2 (Part 1): The Fundamentals: Algorithms, the Integers & Matrices The Integers and Division (Section 2.4)
1 Network and Computer Security (CS 475) Modular Arithmetic and the RSA Public Key Cryptosystem Jeremy R. Johnson.
Elements of Coding and Encryption 1. Encryption In the modern word, it is crucial that the information is transmitted safely. For example, Internet purchases,
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
Network and Computer Security (CS 475) Modular Arithmetic
1 Section Congruences In short, a congruence relation is an equivalence relation on the carrier of an algebra such that the operations of the algebra.
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
Matrices and linear transformations For grade 1, undergraduate students For grade 1, undergraduate students Made by Department of Math.,Anqing Teachers.
Tuesday’s lecture: Today’s lecture: One-way permutations (OWPs)
Computing k th Roots Quickly (4/4) Via the Fast Exp algorithm, we know we can quickly compute large powers of large numbers modulo large numbers. What.
Congruences (2/17) If m (the modulus) is positive and if a and b are integers, then we say a is congruent to b mod m, writing a  b (mod m), provided that.
Prime Numbers (3/17 ) We all know what a prime number is. Theorem (Euclid). There are infinitely many primes. Euclid’s original proof idea can be stated.
Chinese Remainder Theorem Ying Ding Junru Chen. Chinese Remainder Theorem Sun Zi suanjing ( 孫子算經 The Mathematical Classic by Sun Zi) Shushu Jiuzhang (
9.1 Primes and Related Congruence Equations 23 Sep 2013.
Divisibility and Modular Arithmetic
AF2. Turn off your phones Primes, gcd, some examples, reading.
2 2.2 © 2016 Pearson Education, Ltd. Matrix Algebra THE INVERSE OF A MATRIX.
CS480 Cryptography and Information Security
Chapter 4 With Question/Answer Animations 1. Chapter Motivation Number theory is the part of mathematics devoted to the study of the integers and their.
Discrete Mathematics Chapter 2 The Fundamentals : Algorithms, the Integers, and Matrices. 大葉大學 資訊工程系 黃鈴玲.
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Dr Nazir A. Zafar Advanced Algorithms Analysis and Design Advanced Algorithms Analysis and Design By Dr. Nazir Ahmad Zafar.
B504/I538: Introduction to Cryptography
Advanced Algorithms Analysis and Design
Prelude to Public-Key Cryptography
Advanced Algorithms Analysis and Design
Chapter 2 Sets and Functions.
6*. An Introduction to Number Theory
Applied Symbolic Computation (CS 300) Modular Arithmetic
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
Applied Symbolic Computation (CS 300) Modular Arithmetic
Applied Symbolic Computation (CS 300) Modular Arithmetic
Applied Symbolic Computation (CS 300) Modular Arithmetic
Applied Symbolic Computation (CS 300) Modular Arithmetic
Presentation transcript:

The Euler Phi-Function Is Multiplicative (3/3) Last time we showed that if p is prime, then (pk) = pk – pk-1 . Hence by the FTA, we will be able to compute (m) for any m provided that  is multiplicative (recall that definition!). To this end, let m and n be relatively prime. We define two sets: Let S = {a : 1 ≤ a ≤ mn and GCD(a, mn) = 1}. How elements does S have? Let T = {(b, c) : 1 ≤ b ≤ m and GCD(b, m) = 1, and 1 ≤ c ≤ n and GCD(c, n) = 1}. How many elements does T have?

Do S and T have the same number of elements? We will know then that (mn) = (m) (n) if we can show that S and T have the same number of elements. We can do that by displaying a one-to-one and onto correspondence between the two sets. (This is basic set theory.) Okay, so let f be the function from S to T given by f (a) = (a (mod m), a (mod n)). Example: Suppose m = 8, n = 7, and a = 25. Then f (a) = (?, ?). We claim f is one-to-one and onto.

The function f is one-to-one We show “one-to-oneness” of a function by assuming that there are two elements of the domain which are sent to the same element of the range, and show that they were in fact the same element to start with. So assume a1 and a2 are in S, and suppose f (a1) = f (a2), i.e., a1 (mod m) = a2 (mod m) and a1 (mod n) = a2 (mod n). Hence m | (a2 – a1) and n | (a2 – a1), but then, by Exercise 7.2 (which you did!), we get that …….. Thus a1 = a2 (why?), and so we have established that f is one-to-one.

The function f is onto This is trickier. In fact this result is itself an important one in number theory and hence has its own name: The Chinese Remainder Theorem. If GCD(m, n) = 1, then the simultaneous congruences x  b (mod m) and x  c (mod n) have a unique solution x1 with 0 ≤ x1 < mn. This is best seen via an example. Suppose again that m = 8 and n = 7. What is a solution less than 56 to to the congruences x  1 (mod 8) and x  4 (mod 7)? Well, we already saw that 25 is a solution. This theorem (CRT) says it will be only solution as well.

An algorithm to solve simultaneous congruences Consider again x  1 (mod 8) and x  4 (mod 7). What’s x (below 56)? Since x  1 (mod 8) , we know there exists a y such that x = 1 + 8y. Plug this into the second congruence: 1 + 8y  4 (mod 7), so 8y  3 (mod 7). But we know that since GCD(7, 8) = 1, this linear congruence has a unique solution! Using our EEA algorithm to solve it (or by reducing the 8 (mod 7)!), we get y = 3. Hence x = 1 + 8(3) = 25, as predicted! Why is 25 unique? Well, y was unique below 7, but then x had to be unique and at most 7 + 8(6) = 55.

Final comments on CRT The CRT can easily be extended to any collection of moduli (not just 2 of them), provided that they are pairwise relatively prime. Please read the general proof of CRT in the text (pages 79-80) and please do Exercises 11.5 and 11.6. By the way, please note that in the course of all this, we have proved that the Euler phi-function is indeed multiplicative. Yea! Hence, if we can factor m, we can compute (m). For large m, this turns out to be a “big if”.