Prime Numbers: A Recent Discovery, Secure Communications, and Million Dollar Prizes George T. Gilbert TCU January 29, 2003.

Slides:



Advertisements
Similar presentations
P vs. NP, AKS, RSA: The Acronyms of Mathematics Awareness Month Emily List Wittenberg University Thank you for the introduction.
Advertisements

Presented by Alex Atkins.  An integer p >= 2 is a prime if its only positive integer divisors are 1 and p.  Euclid proved that there are infinitely.
Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Copyright © Cengage Learning. All rights reserved.
Great Theoretical Ideas in Computer Science for Some.
Structure and Randomness in the prime numbers Terence Tao, UCLA New Fellows Seminar, 11 July 2007.
Chapter 8 – Introduction to Number Theory. Prime Numbers prime numbers only have divisors of 1 and self –they cannot be written as a product of other.
1 Deciding Primality is in P M. Agrawal, N. Kayal, N. Saxena Presentation by Adi Akavia.
Computability and Complexity
CSE115/ENGR160 Discrete Mathematics 03/15/12
22C:19 Discrete Structures Integers and Modular Arithmetic
Lecture 8: Primality Testing and Factoring Piotr Faliszewski
Introduction to Modern Cryptography Lecture 6 1. Testing Primitive elements in Z p 2. Primality Testing. 3. Integer Multiplication & Factoring as a One.
Primality Testing By Ho, Ching Hei Cheung, Wai Kwok.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
1 The RSA Algorithm Supplementary Notes Prepared by Raymond Wong Presented by Raymond Wong.
Session 4 Asymmetric ciphers.
Deciding Primality is in P M. Agrawal, N. Kayal, N. Saxena Slides by Adi Akavia.
Factoring 1 Factoring Factoring 2 Factoring  Security of RSA algorithm depends on (presumed) difficulty of factoring o Given N = pq, find p or q and.
K. -C. Yang and J. -L. Lin National Tsing Hua University
CS470, A.SelcukPublic Key Cryptography1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CSE 321 Discrete Structures Winter 2008 Lecture 8 Number Theory: Modular Arithmetic.
ELEMENTARY NUMBER THEORY AND METHODS OF PROOF
The Distribution of Prime Numbers
BY MISS FARAH ADIBAH ADNAN IMK
The Integers and Division
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright © The McGraw-Hill Companies, Inc. Permission required.
Cryptography A little number theory Public/private key cryptography –Based on slides of William Stallings and Lawrie Brown.

The Fundamentals: Algorithms, Integers, and Matrices CSC-2259 Discrete Structures Konstantin Busch - LSU1.
© by Kenneth H. Rosen, Discrete Mathematics & its Applications, Sixth Edition, Mc Graw-Hill, 2007 Chapter 3 (Part 2): The Fundamentals: Algorithms, the.
The Polynomial Time Algorithm for Testing Primality George T. Gilbert.
CPSC 490 Number Theory Primes, Factoring and Euler Phi-function Mar.31 st, 2006 Sam Chan.
The Complexity of Primality Testing. What is Primality Testing? Testing whether an integer is prime or not. – An integer p is prime if the only integers.
Approximation Algorithms Pages ADVANCED TOPICS IN COMPLEXITY THEORY.
MA/CSSE 473 Day 11 Primality testing summary Data Encryption RSA.
PRIMES is in P Manindra Agrawal NUS Singapore / IIT Kanpur.
Cryptography Lecture 7: RSA Primality Testing Piotr Faliszewski.
Primes in P Deterministic polynomial-time algorithm of Agrawal, Kayal and Saxena Presented by Vladimir Braverman.
Computational Number Theory - traditional number theory Prime Numbers Factors Counting Factors D- functions.
Chapter 2 (Part 1): The Fundamentals: Algorithms, the Integers & Matrices The Integers and Division (Section 2.4)
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Foundations of Discrete Mathematics Chapter 4 By Dr. Dalia M. Gil, Ph.D.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
1 Section Congruences In short, a congruence relation is an equivalence relation on the carrier of an algebra such that the operations of the algebra.
Primes in P Manindra Agrawal Neeraj Kayal Nitin Saxena CS300: Technical Paper review by Arpan Agrawal.
Complexity of Computations Nicholas Tran Department of Mathematics & Computer Science Santa Clara University Santa Clara, CA USA.
Week 4 - Wednesday.  What did we talk about last time?  Finished DES  AES.
Primality Testing. Introduction The primality test provides the probability of whether or not a large number is prime. Several theorems including Fermat’s.
9.1 Primes and Related Congruence Equations 23 Sep 2013.
The largest prime number currently known is (It has 17,425,170 decimal digits)
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
The Fundamentals: Algorithms, Integers, and Matrices CSC-2259 Discrete Structures Konstantin Busch - LSU1.
Chapter 4 With Question/Answer Animations 1. Chapter Summary Divisibility and Modular Arithmetic - Sec 4.1 – Lecture 16 Integer Representations and Algorithms.
CS480 Cryptography and Information Security
Lecture 6. RSA Use in Encryption to encrypt a message M the sender: – obtains public key of recipient PU={e,n} – computes: C = M e mod n, where 0≤M
MA/CSSE 473 Day 9 Primality Testing Encryption Intro.
PRIMES is in P Manindra Agrawal Neeraj Kayal Nitin Saxena Dept of CSE, IIT Kanpur.
A Prime Example CS Lecture 20 A positive integer p  2 is prime if the only positive integers that divide p are 1 and p itself. Positive integers.
Section 5.1 Number Theory.
CS 210 Discrete Mathematics The Integers and Division (Section 3.4)
Public Key Encryption Major topics The RSA scheme was devised in 1978
CSE565: Computer Security Lecture 7 Number Theory Concepts
Probabilistic Algorithms
Handbook of Applied Cryptography - CH4, from 4.1~4.3
Textbook: Introduction to Cryptography 2nd ed. By J.A. Buchmann
Chapter 5: Number Theory
Foundations of Discrete Mathematics
Introduction to Cryptography
Mathematical Background for Cryptography
Presentation transcript:

Prime Numbers: A Recent Discovery, Secure Communications, and Million Dollar Prizes George T. Gilbert TCU January 29, 2003

A prime number is a positive integer greater than 1 which is only divisible by 1 and itself. 2, 3, 5, 7, 11, 13, … are prime 1, 4=2  2, 6=2  3, 8=2  4, 9=3  3, 10=2  5, 12=3  4, … are not prime. 4, 6, 8, 9, 10, 12, … are called composite. The (approximate) definition of a prime number was first recorded by Philolaus (c B.C.), a member of the Pythagorean school.

Euclid (c B.C.): There are infinitely many primes. Proof. If not, list them out: p 1, p 2, …, p k Then p 1  p 2  …  p k +1 is 1 greater than a multiple of p 1, p 2, …, p k, so must be divisible by a prime not on the list.

The largest known prime is 2 13,466,917 -1, which has 4,053,946 digits, a result due to Michael Cameron (age 20, Canada), a “member” of the GIMPS (Great Internet Mersenne Prime Search) team Electronic Frontier Foundation Cooperative Computing Awards PrizeFirst Prime w/ $50,000 1,000,000 digits awarded April 6, 2000 $100,000 10,000,000 digits $150, ,000,000 digits $250,0001,000,000,000 digits

A First General Test for Primality Simply start checking for divisibility by 2, 3, 4, 5, 6, 7, … A number n is prime if it isn’t divisible by any number up to  n Note that once we find a factor, we could continue the procedure to get a factorization of n into a product of prime numbers. For example 200=2 3  5 2

COMPUTERS!!! At a billion divisions per second, this method would take 12 days to determine that a 30-digit number is prime and 32 trillion years to determine that a 60-digit number is prime. (The age of the universe seems to be billion years.) Yet the state of the art is that one determine whether a 100-digit number is prime in seconds, several hundred digits in a few minutes, and Several digit numbers have been shown to be prime. Why the discrepancy? First, we chose a slow method, but it also appears that determining whether a number is prime is a much easier (=faster) question than factoring it.

Fermat’s Little Theorem If p is prime, then for all k, k p -k is divisible by p. E.G. 3 4,294,967, has remainder 497,143,886 upon division by 4,294,967,297, so 4,294,967,297 cannot be prime.

Public Key Cryptography and RSA In public key cryptography, one wishes to publish a key that allows anyone to encode a message but only the desired recipient to decode it (or vice versa). The RSA (Rivest-Shamir-Adelman, 1978) method is based on Fermat’s Little Theorem and depends on being able to find large primes quickly, whereas anyone given the product of two large primes “cannot” factor the number in a reasonable time.

Complexity of Algorithms We measure the complexity of a problem by how many steps it takes to solve the problem relative to the size of the input(s). For us, we will look at the worst case scenario, but in practice it also makes sense to look at an average case or most cases or something similar The size of a number n is number of digits (or bits in its binary representation), essentially log 10 n or log 2 n In this context, an algorithm is polynomial time if there exist constants C and m for which the algorithm finishes in at most C(log n) m steps

N √N log 5 N243 8       log 2 N 9    

A Connection to The Riemann Hypothesis If p is prime and p divides k 2 -1=(k-1)(k+1), then p divides either k-1 or k+1. If p is not prime, then under a generalization of the Riemann hypothesis, we can find a k with p dividing k 2 -1 but dividing neither k+1 nor k-1 within a sufficiently small collection of k’s to give a polynomial time algorithm for primality testing (Miller 1975).

The Riemann hypothesis (G. F. Bernard Riemann, 1859), concerns the location of zeros of the zeta function, a meromorphic continuation of  n -s One fairly nontechnical equivalent condition is due to Jeff Lagarias (Amer. Math. Monthly 6/2002) Let H k = 1+1/2+1/3+…+1/k Then R.H. is equivalent to  d|k d ≤ H k +exp(H k ) ln(H k ) for all k with equality if and only if k=1 The Riemann hypothesis is one of the seven Millenium Prize Problems for which the Clay Mathematics Institute is offering $1,000,000 for a proof.*

Certificates of Primality This means a verification that may come out of the blue. There is such a quickly computed certificate for primality based on just a little more than Fermat’s Little Theorem: For each prime q that divides p-1, demonstrate a k for which k (p-1)/q -1 is not divisible by p and yet k p-1 -1 is divisible by p.

A problem is in the class … … NP (=non-deterministic polynomial time) if there exists a polynomial time method for verifying the answer. … P (=polynomial time) if there exists a polynomial time method for deriving the answer; P  NP This past summer it was proved that primality testing is in P. Factoring is in NP. If you could show factoring is not in P, you would have proved P≠NP and the Clay Math Institute would be writing your $1,000,000* check. Of course, “P=NP” and againP=NPagain

Theorem (M. Agrawal, N. Kayal, N. Saxena, 2002) There exists a polynomial time algorithm for testing primality. Preprint is only 8.5 pages Most of first 3 pages are history, summary, and preliminary facts from a standard graduate algebra course. Last 2 pages are a conjectural improvement in the exponent and the bibliography The rest is almost self-contained at the level of a graduate algebra course

The proof exploits the congruence (x-a) p  x p -a (mod p) It further reduces mod x r -1 for a cleverly chosen prime r of modest size The proof consists of elementary manipulations within finite fields and only calls on two outside results: (1/6) n / ln n ≤ #{primes ≤ n} ≤ 6 n / ln n Sieving result (Fouvry, 1985) For a positive density of primes p, the largest prime factor of p-1 is at least p 2/3