Number Theory 04/26/07. Tasks Announcement of Final Example lecture Course evaluation Dispatch computer project reports.

Slides:



Advertisements
Similar presentations
Richard Fateman CS 282 Lecture eea1 Extended Euclidean Algorithm Lecture eea.
Advertisements

Euclidean Algorithm Applied Symbolic Computation CS 567 Jeremy Johnson.
RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
CSE 311 Foundations of Computing I Lecture 13 Number Theory Autumn 2012 CSE
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
Announcements: Homework 1 returned. Comments from Kevin? Homework 1 returned. Comments from Kevin? Matlab: tutorial available at
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
Chapter II. THE INTEGERS
CSE115/ENGR160 Discrete Mathematics 03/17/11 Ming-Hsuan Yang UC Merced 1.
Chapter 4 – Finite Fields Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
CSE 20 DISCRETE MATH Prof. Shachar Lovett Clicker frequency: CA.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2001 Lecture 7 Tuesday, 11/6/01 Number-Theoretic Algorithms Chapter.
Dan Boneh Intro. Number Theory Modular e’th roots Online Cryptography Course Dan Boneh.
CSE 311 Foundations of Computing I Lecture 12 Primes, GCD, Modular Inverse Spring
Montgomery multiplication Algorithm Mohammad Farmani Under supervision of : Dr. S. Bayat-sarmadi 2 nd. Semister, Sharif University of Technology.
Chapter 2 The Fundamentals: Algorithms, the Integers, and Matrices
Mathematics of Cryptography Part I: Modular Arithmetic
Module :MA3036NI Cryptography and Number Theory Lecture Week 7
Do Now: Evaluate: 3AB. Algebra II 3.7: Evaluate Determinants HW: p.207 (4-14 even) Test : Friday, 12/6.
Cryptography Inverses and GCD Piotr Faliszewski. GCD(a,b) gcd(a, 0) = a gcd(a, b) = gcd(b, a mod b) a = b*q + r Here: q =  a / b  r = a mod b (a –
COMP 170 L2 Page 1 Review for Midterm 1 l Part I: Counting n L01-L03 l Part II: Number Theory and Cryptography n L04, L05.
Copyright © Zeph Grunschlag, Basic Number Theory Zeph Grunschlag.
Computational Thinking – Lesson 3 Lesson Objective To be able to construct an algorithm and flowchart for a given problem.
Rational Numbers and Fields
APPLIED COMPUTER PROGRAMMING Who am I? Adriana ALBU Lecturer at Automation and Applied Informatics Department from Automation and Computers.
Chapter Integers and Algorithms Representations of integers
Chinese Remainder Theorem Dec 29 Picture from ………………………
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
MA/CSSE 473 Day 08 Extended Euclid's Algorithm Modular Division Fermat's little theorem.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
CSE 311 Foundations of Computing I Lecture 14 Euclid’s Algorithm Mathematical Induction Autumn 2012 CSE
Tuesday’s lecture: Today’s lecture: One-way permutations (OWPs)
4-8 Complex Numbers Today’s Objective: I can compute with complex numbers.
The Euclidean Algorithm That’s right, it’s real..
Ref: Pfleeger96, Ch.31 Properties of Arithmetic Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, 1996.
Tuesday, 16 February 2016 Integers. Tuesday, 16 February 2016 Learning Intention Success Criteria 2.Solving expressions showing working. 1.To explain.
Lecture 3.1: Public Key Cryptography I CS 436/636/736 Spring 2012 Nitesh Saxena.
Lecture 3.1: Public Key Cryptography I CS 436/636/736 Spring 2015 Nitesh Saxena.
CSE 311: Foundations of Computing Fall 2013 Lecture 12: Primes, GCD, modular inverse.
Cryptography Lecture 14 Arpita Patra © Arpita Patra.
Mathematical Background for Cryptography: Modular arithmetic and gcd
Understanding Exponents
Lecture 3.2: Public Key Cryptography II
CSE 311 Foundations of Computing I
Quick reviews / corrections
CSE 311 Foundations of Computing I
Cryptology Design Fundamentals
Cryptology Design Fundamentals
CSE 311 Foundations of Computing I
GCD and Optimization Problem
Lecture 20 Guest lecturer: Neal Gupta
Cryptography Lecture 21.
Discrete Math for CS CMPSC 360 LECTURE 12 Last time: Stable matching
CSE 311: Foundations of Computing
Lecture 3.1: Public Key Cryptography I
Copyright © Zeph Grunschlag,
Modular Inverses Recall the simple encryption function
CLOCK ARITHMETIC.
Exponents is repeated multiplication!!!
Mathematical Background for Cryptography
Cryptology Design Fundamentals
Cryptography Lecture 18.
Cryptography Lecture 17.
Cryptography Lecture 16.
Cryptography Lecture 19.
Useful GCD Fact If a and b are positive integers, then gcd(a,b) = gcd(b, a mod b) Proof: By definition of mod, a = qb+ (a mod b) for.
Mathematical Background : A quick approach to Group and Field Theory
Exponent practice.
Presentation transcript:

Number Theory 04/26/07

Tasks Announcement of Final Example lecture Course evaluation Dispatch computer project reports

Announcement of Final The final is hold on Tuesday, May 8 th, 8:00am, Physics lecture hall Forty multiple choice problems Closed book

Example 1-modular exponentiation Eg.1: get 5 10 mod 21 Tip: just remember ab mod z=[(a mod z)(b mod z)] mod z Sol: Because 5 2 mod 21 =25 mod 21 =4, 5 10 mod 21= 4 5 mod 21= [(4 2 mod 21)(4 3 mod 21)] mod 21=[16*1]mod 21=16

Example 2-solve ax+b mod z Eg.2: [10* ] mod 21 Tip: just remember [a+b] mod z=[(a mod z)+(b mod z)] mod z Sol: Because 5 10 mod 21 =16, 10*5 10 mod 21= 160 mod 21= 13 [10* ] mod 21=[13+11]mod 21=3

Example 3-gcd Eg.3: gcd(2091,4807) Tip: just remember gcd(a,b)=gcd(b,r) Sol: gcd(2091,4807) = gcd(2091,625) = gcd(625,216) = gcd(216,193) = gcd(193,23) = gcd(23,9) =1 = gcd(9,5) = gcd(5,4) = gcd(4,1) = gcd(1,0)=1

Example 4-inverse mod n Eg.4: We know gcd(3,4)=1, find inverse of 3 mod 4 Tip: Use Euclidean algorithm to find gcd(a,b)=sa+tb, and s mod b. Sol: gcd(3,4)=gcd(3,1)=gcd(1,0)=1 1=3-1*2; 1=4-1*3=4-(3-1*2)*3=4-3, so s=-1 s mod b=-1 mod 4=3

Course Evaluation& dispatch reports 14:332:202:01