Chapter 8 More Number Theory. Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime.

Slides:



Advertisements
Similar presentations
Presented by Alex Atkins.  An integer p >= 2 is a prime if its only positive integer divisors are 1 and p.  Euclid proved that there are infinitely.
Advertisements

Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Cryptography and Network Security Chapter 8 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 3 Public Key Cryptography and RSA Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.
Cryptography and Network Security Chapter 8 Fourth Edition by William Stallings.
Opening quote. A number of concepts from number theory are essential in the design of public-key cryptographic algorithms, which this chapter will introduce.
1 Lect. 12: Number Theory. Contents Prime and Relative Prime Numbers Modular Arithmetic Fermat’s and Euler’s Theorem Extended Euclid’s Algorithm.
Cryptography and Network Security
Cryptography and Network Security
Chapter 8 – Introduction to Number Theory. Prime Numbers prime numbers only have divisors of 1 and self –they cannot be written as a product of other.
Computability and Complexity
Chapter 8 Introduction To Number Theory. Prime Numbers Prime numbers only have divisors of 1 and Prime numbers only have divisors of 1 and self. self.
Chapter 8 Introduction to Number Theory. Prime Numbers prime numbers only have divisors of 1 and self –they cannot be written as a product of other numbers.
22C:19 Discrete Structures Integers and Modular Arithmetic
Number Theory Presented by Shrividya Shivkumar and George Frederick.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
and Factoring Integers (I)
CSC2110 Discrete Mathematics Tutorial 5 GCD and Modular Arithmetic
1 Chapter 7– Introduction to Number Theory Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
6/20/2015 5:05 AMNumerical Algorithms1 x x1x
and Factoring Integers
Chapter 8 – Introduction to Number Theory Prime Numbers  prime numbers only have divisors of 1 and self they cannot be written as a product of other numbers.
Chapter 8 – Introduction to Number Theory Prime Numbers
Cryptography and Network Security Chapter 8. Chapter 8 – Introduction to Number Theory The Devil said to Daniel Webster: "Set me a task I can't carry.
Chapter 8 – Introduction to Number Theory Prime Numbers  prime numbers only have divisors of 1 and self they cannot be written as a product of other numbers.
ASYMMETRIC CIPHERS.
CSE 321 Discrete Structures Winter 2008 Lecture 10 Number Theory: Primality.
Peter Lam Discrete Math CS.  Sometimes Referred to Clock Arithmetic  Remainder is Used as Part of Value ◦ i.e Clocks  24 Hours in a Day However, Time.
BY MISS FARAH ADIBAH ADNAN IMK
Prime Numbers Prime numbers only have divisors of 1 and self
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright © The McGraw-Hill Companies, Inc. Permission required.
Software Security Seminar - 1 Chapter 11. Mathematical Background 발표자 : 안병희 Applied Cryptography.
Cryptography A little number theory Public/private key cryptography –Based on slides of William Stallings and Lawrie Brown.

1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Information Security and Management 4. Finite Fields 8
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 3 Public-Key Cryptography and Key Management.
RSA Parameter Generation Bob needs to: - find 2 large primes p,q - find e s.t. gcd(e, Á (pq))=1 Good news: - primes are fairly common: there are about.
The Complexity of Primality Testing. What is Primality Testing? Testing whether an integer is prime or not. – An integer p is prime if the only integers.
Public-Key Encryption
YSLInformation Security -- Public-Key Cryptography1 Prime and Relatively Prime Numbers Divisors: We say that b  0 divides a if a = mb for some m, where.
Fall 2002CS 395: Computer Security1 Chapters 4 and 8: The Mathematics Required for Public Key Cryptography In case you’re beginning to worry that this.
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
9/22/15UB Fall 2015 CSE565: S. Upadhyaya Lec 7.1 CSE565: Computer Security Lecture 7 Number Theory Concepts Shambhu Upadhyaya Computer Science & Eng. University.
Introduction to Number Theory
9.1 Primes and Related Congruence Equations 23 Sep 2013.
Lecture 2-3 Basic Number Theory and Algebra. In modern cryptographic systems, the messages are represented by numerical values prior to being encrypted.
1 Discrete Structures – CNS2300 Text Discrete Mathematics and Its Applications Kenneth H. Rosen (5 th Edition) Chapter 2 The Fundamentals: Algorithms,
CS480 Cryptography and Information Security
Number-Theoretic Algorithms
Public Key Encryption Major topics The RSA scheme was devised in 1978
Introduction to Number Theory
Mathematics of Cryptography
CSE565: Computer Security Lecture 7 Number Theory Concepts
Handbook of Applied Cryptography - CH4, from 4.1~4.3
Cryptography and Network Security
Introduction to Number Theory
6*. An Introduction to Number Theory
Cryptography and Network Security Chapter 8
MATH301- DISCRETE MATHEMATICS Copyright © Nahid Sultana Dr. Nahid Sultana Chapter 4: Number Theory and Cryptography.
Number Theory (Chapter 7)
Cryptography and Network Security
Computer Security Modular Arithmetic November 12, 2018
Prime and Relatively Prime Numbers
Cryptography and Network Security
Introduction to Cryptography
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
CSE 321 Discrete Structures
Lecture 2-3 Basic Number Theory and Algebra
Presentation transcript:

Chapter 8 More Number Theory

Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime numbers are central to number theory Any integer a > 1 can be factored in a unique way as a = p1 a1 * p 2 a2 *... * p p1 a1 where p 1 < p 2 <... < p t are prime numbers and where each a i is a positive integer This is known as the fundamental theorem of arithmetic

Table 8.1 Primes Under 2000

Fermat's Theorem States the following: If p is prime and a is a positive integer not divisible by p then a p-1 = 1 (mod p) Sometimes referred to as Fermat’s Little Theorem An alternate form is: If p is prime and a is a positive integer then a p = a (mod p) Plays an important role in public-key cryptography

Table 8.2 Some Values of Euler’s Totient Function ø(n)

Euler's Theorem States that for every a and n that are relatively prime: a ø(n) = 1(mod n) An alternative form is: a ø(n)+1 = a(mod n) Plays an important role in public-key cryptography

Miller-Rabin Algorithm Typically used to test a large number for primality Algorithm is: TEST (n) 1. Find integers k, q, with k > 0, q odd, so that (n – 1)=2 k q ; 2. Select a random integer a, 1 < a < n – 1 ; 3. if a q mod n = 1 then return (“inconclusive") ; 4. for j = 0 to k – 1 do 5. if (a 2jq mod n = n – 1) then return (“inconclusive") ; 6. return (“composite") ;

Deterministic Primality Algorithm Prior to 2002 there was no known method of efficiently proving the primality of very large numbers All of the algorithms in use produced a probabilistic result In 2002 Agrawal, Kayal, and Saxena developed an algorithm that efficiently determines whether a given large number is prime Known as the AKS algorithm Does not appear to be as efficient as the Miller-Rabin algorithm

Chinese Remainder Theorem (CRT) Believed to have been discovered by the Chinese mathematician Sun-Tsu in around 100 A.D. One of the most useful results of number theory Says it is possible to reconstruct integers in a certain range from their residues modulo a set of pairwise relatively prime moduli Can be stated in several ways Provides a way to manipulate (potentially very large) numbers mod M in terms of tuples of smaller numbers This can be useful when M is 150 digits or more However, it is necessary to know beforehand the factorization of M

Table 8.3 Powers of Integers, Modulo 19

Summary Prime numbers Fermat’s Theorem Euler’s totient function Euler’s Theorem Testing for primality Miller-Rabin algorithm A deterministic primality algorithm Distribution of primes The Chinese Remainder Theorem Discrete logarithms Powers of an integer, modulo n Logarithms for modular arithmetic Calculation of discrete logarithms