Peter Lam Discrete Math CS.  Sometimes Referred to Clock Arithmetic  Remainder is Used as Part of Value ◦ i.e Clocks  24 Hours in a Day However, Time.

Slides:



Advertisements
Similar presentations
1 Lect. 12: Number Theory. Contents Prime and Relative Prime Numbers Modular Arithmetic Fermat’s and Euler’s Theorem Extended Euclid’s Algorithm.
Advertisements

Cryptography and Network Security
Chapter 4 Finite Fields. Introduction of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key concern operations on “numbers”
Cryptography and Network Security Chapter 4 Fourth Edition by William Stallings.
Chapter 4 – Finite Fields. Introduction will now introduce finite fields of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key.
Section 4.1: Primes, Factorization, and the Euclidean Algorithm Practice HW (not to hand in) From Barr Text p. 160 # 6, 7, 8, 11, 12, 13.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
Number Theory(L5) Number Theory Number Theory(L5).
CSC2110 Discrete Mathematics Tutorial 5 GCD and Modular Arithmetic
Cryptography and Network Security Chapter 4
Cryptography and Network Security Chapter 4 Fourth Edition by William Stallings.
Congruence of Integers
Chapter 4 – Finite Fields Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public.
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
Fall 2002CMSC Discrete Structures1 Let us get into… Number Theory.
CS555Spring 2012/Topic 61 Cryptography CS 555 Topic 6: Number Theory Basics.
BY MISS FARAH ADIBAH ADNAN IMK
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
9/2/2015Discrete Structures1 Let us get into… Number Theory.
Mathematics of Cryptography Part I: Modular Arithmetic
February 24, 2015Applied Discrete Mathematics Week 4: Number Theory 1 Modular Arithmetic Let a be an integer and m be a positive integer. We denote by.
MATH 224 – Discrete Mathematics
Module :MA3036NI Cryptography and Number Theory Lecture Week 7
Mathematics of Cryptography Modular Arithmetic, Congruence,
CPSC 3730 Cryptography and Network Security
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Information Security and Management 4. Finite Fields 8
Cryptography and Network Security Introduction to Finite Fields.
Prep Math Competition, Lec. 1Peter Burkhardt1 Number Theory Lecture 1 Divisibility and Modular Arithmetic (Congruences)
Chapter 4 – Finite Fields
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
YSLInformation Security -- Public-Key Cryptography1 Prime and Relatively Prime Numbers Divisors: We say that b  0 divides a if a = mb for some m, where.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
Chinese Remainder Theorem Dec 29 Picture from ………………………
Fall 2002CS 395: Computer Security1 Chapters 4 and 8: The Mathematics Required for Public Key Cryptography In case you’re beginning to worry that this.
Information Security Lab. Dept. of Computer Engineering 87/121 PART I Symmetric Ciphers CHAPTER 4 Finite Fields 4.1 Groups, Rings, and Fields 4.2 Modular.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
Network and Computer Security (CS 475) Modular Arithmetic
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Module #9 – Number Theory 1/5/ Algorithms, The Integers and Matrices.
Great Theoretical Ideas in Computer Science for Some.
Slide Copyright © 2009 Pearson Education, Inc. Unit 1 Number Theory MM-150 SURVEY OF MATHEMATICS – Jody Harris.
Ref: Pfleeger96, Ch.31 Properties of Arithmetic Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, 1996.
Introduction to Number Theory
Chapter 13 Mathematic Structures 13.1 Modular Arithmetic Definition 1 (modulo). Let a be an integer and m be a positive integer. We denoted by a mod m.
Discrete Mathematics
Cryptography Lecture 14 Arpita Patra © Arpita Patra.
1 Discrete Structures – CNS2300 Text Discrete Mathematics and Its Applications Kenneth H. Rosen (5 th Edition) Chapter 2 The Fundamentals: Algorithms,
Ch04-Number Theory and Cryptography 1. Introduction to Number Theory Number theory is about integers and their properties. We will start with the basic.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 3. Mathematics of Cryptography.
Chapter 4 With Question/Answer Animations 1. Chapter Motivation Number theory is the part of mathematics devoted to the study of the integers and their.
Number Theory Lecture 1 Text book: Discrete Mathematics and its Applications, 7 th Edition.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-5 Mathematical Background:
Number-Theoretic Algorithms
CMPS 2433 – Coding Theory Chapter 3
Mathematical Background for Cryptography: Modular arithmetic and gcd
Cryptology Design Fundamentals
Cryptology Design Fundamentals
MATH301- DISCRETE MATHEMATICS Copyright © Nahid Sultana Dr. Nahid Sultana Chapter 4: Number Theory and Cryptography.
Applied Discrete Mathematics Week 4: Number Theory
Topic 6: Number Theory Basics
Prime and Relatively Prime Numbers
Discrete Math for CS CMPSC 360 LECTURE 12 Last time: Stable matching
Section 10.3 Modular Arithmetic
Clements MAΘ October 30th, 2014
Number Theory.
Section 9.3 Modular Arithmetic.
Mathematical Background: Extension Finite Fields
Presentation transcript:

Peter Lam Discrete Math CS

 Sometimes Referred to Clock Arithmetic  Remainder is Used as Part of Value ◦ i.e Clocks  24 Hours in a Day However, Time is Divided to Two Twelve Hour Periods  22 Hours is or Ten O'clock

 Modular represents what to divide a number by and that remainder is the result  Any integer will work for Modular n  Is used to simplify equations

 Equivalence Relation or Algebraic Structure that is Compatible with the Structure  If a-b is divisible by n or remainder is same when divided by n ◦ Example: 37 ≣ 57

 = 20 or multiple of 10  37/10 = modulo 7  57/10 = modulo 7  Remainders are the Same

 Let 0 represent even numbers  Let 1 represent odd numbers  After Some Minor Calculations We Obtain ◦ 0 × 0 ≡ 0 mod 2, Multiplication of Two Even Numbers Result in Even Numbers ◦ 0 × 1 ≡ 0 mod 2, Multiplication of Odd and Even Numbers Result in Even Numbers ◦ 1 × 1 ≡ 1 mod 2, Multiplication of Two Odd Numbers Result in Odd Numbers

 Example ◦ 2a – 3 = 12 ◦ 0 * a – 1 = 0 mod 2 ◦ 1 = 0 mod 2 ◦ According to the Calculations Aforementioned (1 = 0 ≠ 1 × 1 ≡ 1 mod 2)  1 ≢ 0 Therefore There is No Integer Solution for 2a – 3 = 12

 Reflexivity: a ≡ a mod m.  Symmetry: If a ≡ b mod m, then b ≡ a mod m.  Transitivity: If a ≡ b mod m and b ≡ c mod m, then a ≡ c mod m.

 Finding Greatest Common Divisor  Number Theory  Simplifying Extensive Calculations  Cryptography ◦ Directly Underpins Public Key Systems ◦ Provides Finite Fields which Underlie Elliptic Curves  Used in Symmetric Key Algorithms – AES, IDEA, RC4

 Commonly denoted as GCD  To find GCD ◦ Identify minimum power for each prime ◦ If prime for number a is, and prime for number b is, ◦ Then

 Find the GCD of 5500 and 450  Prime Factorization of Both 5500 and 450 ◦ 5500 = 2 2, 3 0, 5 3, 11 1 ◦ 450 = 2 1, 3 2, 5 2, 11 0  Determine The minimum number between the Two

 2 2 > 2 1 Therefore 2 1 is used  3 0 < 3 2 Therefore 3 0 is used  5 3 > 5 2 Therefore 5 2 is used  11 1 > 11 0 Therefore 11 0 is used  The equation for GCD then becomes ◦ 2 1 * 3 0 * 5 2 * 11 0 = 50 ◦ GCD of 5500 and 450 is 50

 a b (mod n)  If b is a large integer, there are shortcuts  Fermat’s Theorem

 If a b (mod n) = 1 ◦ If p is prime and greatest common divisor (a,p) = 1, then, Z p ◦ a (p-1) = 1  Example =1 in Z 13  Z is a set that represents ALL whole numbers, positive, negative and zero

 Modular Arithmetic is a Common Technique for Security and Cryptography  Two types of Cryptography ◦ Symmetric Cryptography ◦ Asymmetric Cryptography  Refer to Cryptography Powerpoint for Review

 Use Elliptic Curve for Asymmetry Cryptography  Point Multiplication ◦ = kP, k is integer and P is Point on Elliptic Curve ◦ K is defined as elliptic curve over finite field ◦ Finite Field is consisted of Modular Arithmetic ◦ More Advanced – 2 Finite Fields (Binary Fields)

 Finite Field is a set of numbers and rules for doing arithmetic with numbers in that set  Based off Modular Arithmetic  Can be added, subtracted, multiplied and divided  Members of finite field with multiplication operation is called Multiplicative Group of Finite Field

 Modular Arithmetic is Used ◦ To simplify simultaneous equations ◦ Simplify extensive calculations ◦ Cryptography and finite fields  There are Many More Applications with Modular Arithmetic

 knot.org/blue/examples.shtml knot.org/blue/examples.shtml  html html  dulararithmetic.html dulararithmetic.html  html html  domain-summary/63-cbk- cryptography.html?start=3 domain-summary/63-cbk- cryptography.html?start=3