Software Security Seminar - 1 Chapter 11. Mathematical Background 2002. 10. 24. 발표자 : 안병희 Applied Cryptography.

Slides:



Advertisements
Similar presentations
Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Advertisements

Cryptography and Network Security Chapter 8 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Modified – Tom Noack.
1 Lect. 12: Number Theory. Contents Prime and Relative Prime Numbers Modular Arithmetic Fermat’s and Euler’s Theorem Extended Euclid’s Algorithm.
WS Algorithmentheorie 03 – Randomized Algorithms (Primality Testing) Prof. Dr. Th. Ottmann.
Cryptography and Network Security
Chapter 8 – Introduction to Number Theory. Prime Numbers prime numbers only have divisors of 1 and self –they cannot be written as a product of other.
Chapter 8 Introduction To Number Theory. Prime Numbers Prime numbers only have divisors of 1 and Prime numbers only have divisors of 1 and self. self.
Chapter 8 Introduction to Number Theory. Prime Numbers prime numbers only have divisors of 1 and self –they cannot be written as a product of other numbers.
Primality Testing Patrick Lee 12 July 2003 (updated on 13 July 2003)
Chapter 8 More Number Theory. Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
CSC2110 Discrete Mathematics Tutorial 5 GCD and Modular Arithmetic
1 Chapter 7– Introduction to Number Theory Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :
Cryptography and Network Security Chapter 4
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
6/20/2015 5:05 AMNumerical Algorithms1 x x1x
CS470, A.SelcukPublic Key Cryptography1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
and Factoring Integers
Chapter 4 – Finite Fields Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public.
Chapter 8 – Introduction to Number Theory Prime Numbers  prime numbers only have divisors of 1 and self they cannot be written as a product of other numbers.
CSE 321 Discrete Structures Winter 2008 Lecture 8 Number Theory: Modular Arithmetic.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Chapter 8 – Introduction to Number Theory Prime Numbers
Cryptography and Network Security Chapter 8. Chapter 8 – Introduction to Number Theory The Devil said to Daniel Webster: "Set me a task I can't carry.
Chapter 8 – Introduction to Number Theory Prime Numbers  prime numbers only have divisors of 1 and self they cannot be written as a product of other numbers.
Topic 18: RSA Implementation and Security
CSE 321 Discrete Structures Winter 2008 Lecture 10 Number Theory: Primality.
CSE 311 Foundations of Computing I Lecture 12 Primes, GCD, Modular Inverse Spring
Peter Lam Discrete Math CS.  Sometimes Referred to Clock Arithmetic  Remainder is Used as Part of Value ◦ i.e Clocks  24 Hours in a Day However, Time.
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright © The McGraw-Hill Companies, Inc. Permission required.

Module :MA3036NI Cryptography and Number Theory Lecture Week 7
CPSC 3730 Cryptography and Network Security
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Information Security and Management 4. Finite Fields 8
Chapter 4 – Finite Fields
YSLInformation Security -- Public-Key Cryptography1 Prime and Relatively Prime Numbers Divisors: We say that b  0 divides a if a = mb for some m, where.
Fall 2002CS 395: Computer Security1 Chapters 4 and 8: The Mathematics Required for Public Key Cryptography In case you’re beginning to worry that this.
CSE 311: Foundations of Computing Fall 2014 Lecture 12: Primes, GCD.
9/22/15UB Fall 2015 CSE565: S. Upadhyaya Lec 7.1 CSE565: Computer Security Lecture 7 Number Theory Concepts Shambhu Upadhyaya Computer Science & Eng. University.
MA/CSSE 473 Day 08 Extended Euclid's Algorithm Modular Division Fermat's little theorem.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Introduction to Number Theory
Pertemuan #5 Pengantar ke Number Theory Kuliah Pengaman Jaringan.
Introduction to Number Theory Department of Computer Engineering Sharif University of Technology 3/8/2006.
9.1 Primes and Related Congruence Equations 23 Sep 2013.
Discrete Mathematics
Lecture 2-3 Basic Number Theory and Algebra. In modern cryptographic systems, the messages are represented by numerical values prior to being encrypted.
CS480 Cryptography and Information Security
Number-Theoretic Algorithms
Mathematical Background for Cryptography: Modular arithmetic and gcd
CSE565: Computer Security Lecture 7 Number Theory Concepts
Lecture 3.2: Public Key Cryptography II
Numerical Algorithms x x-1 Numerical Algorithms
ALGORITHM NUMBER THEORY
Cryptography and Network Security
Introduction to Number Theory
6*. An Introduction to Number Theory
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Computer Security Modular Arithmetic November 12, 2018
Prime and Relatively Prime Numbers
Cryptography and Network Security
Introduction to Cryptography
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
Mathematical Background for Cryptography
Patrick Lee 12 July 2003 (updated on 13 July 2003)
Lecture 2-3 Basic Number Theory and Algebra
Presentation transcript:

Software Security Seminar - 1 Chapter 11. Mathematical Background 발표자 : 안병희 Applied Cryptography

Software Security Seminar - 2 Contents 11.1 Information Theory 11.2 Complexity Theory 11.3 Number Theory 11.4 Factoring 11.5 Prime Number Generation 11.6 Discrete Logarithms In a Finite Field

Software Security Seminar - 3 Modular Arithmetic Definition a  b (mod n)  a - b is divisible by n a (mod n) is called “Residue” if 0  a < n. Example (Clock Arithmetic) 13  1 (mod 12) Modular Arithmetic is just like Normal Arithmetic! (a  b) (mod n) = ( a (mod n)  b (mod n) ) (mod n)  = +, -, *, / a^x (mod n) = (a * a * … * a ) (mod n)

Software Security Seminar - 4 Modular Reduction Methods 1.Montgomery’s Method 2.Barret’s Reduction

Software Security Seminar - 5 Prime Numbers Definition P ( > 1 ) is prime if and only if P is an integer whose factors are 1 and itself. Example 2, 3, 5, 7, …

Software Security Seminar - 6 Greatest Common Divisior Definition gcd ( a, b ) = the Greatest Common Divisior of a and b. a and b are relatively prime iff gcd(a,b) = 1. Euclid’s Algorithm gcd ( a, b ) = gcd ( a, b mod a)

Software Security Seminar - 7 Inverses Modulo a Number Objective For given a and n, Find x such that ax (mod n) = 1. Existence & Uniqueness The unique solution exists iff gcd(a, n) = 1. How to find? Use Euclid’s Algorithm r(0) = n, r(1) = a, s(0) = 0, s(1) = 1. r(I) = r(I-2) - q(I-1) r(I-1), where q(I-1) = r(I-2) / r(I-1) s(I) = s(I-2) - q(I-1) s(I-1)

Software Security Seminar - 8 Multiplicative Subgroup in {1, …, n} Fermat’s Little Theorem If n is prime, then a^n = a (mod n) Generalized Fermat’s Theorem Euler Function Phi(n) = The number of integer relatively prime to n Phi(p) = p - 1 for any prime number p n : arbitrary integer a^Phi(n) = a (mod n)

Software Security Seminar - 9 Chinese Remainder Theorem Problem Find a residue class x such that x mod p_I = a_I, where I = 1, 2, …, t and p_I ’s are distinct. Theorem There is a unique solution up to modulo n. Example Find x such that x mod 2 = 1 x mod 5 = 2 x mod 7 = 4

Software Security Seminar - 10 Quadratic Residue and Legendre(Jacobi) Symbol Definition a is quadratic residue mod p iff there exist x whose square is a mod p. L(a, p) is Legendre Symbol defined as L(a, p) = 0 if a is divisible by p L(a, p) = 1 if a is quadratic residue mod p L(a, p) = -1 otherwise. J(a, n) is Jacobi Symbol defined as J(a, p1*p2) = J(a, p1) * J(a, p2) J(a, p) = L(a, p) if p is prime

Software Security Seminar - 11 Contents 11.1 Information Theory 11.2 Complexity Theory 11.3 Number Theory 11.4 Factoring 11.5 Prime Number Generation 11.6 Discrete Logarithms In a Finite Field

Software Security Seminar - 12 Factoring The Factoring Problem is one of the oldest in Number Theory. Simple but Hard. Best Algorithms Number field sieve (NFS) Quadratic sieve (QS) Elliptic curve method (ECM) Monte Carlo algorithm Continued fraction algorithm Trial division Complexity O( exp ((1 + O(1))(ln(n))^(1/2)(ln ln n)^(1/2) )

Software Security Seminar - 13 Contents 11.1 Information Theory 11.2 Complexity Theory 11.3 Number Theory 11.4 Factoring 11.5 Prime Number Generation 11.6 Discrete Logarithms In a Finite Field

Software Security Seminar - 14 Primality Test Deterministic Polynomial time testing has developed by M.Agrawal. Probabilistic testing Solovay-Strassen Lehmann Rabin-Miller Prime Generation Generate Random n-bit number p Set the highest and lowest bit to 1. Primality Test If p fails one of test, restart.

Software Security Seminar - 15 Contents 11.1 Information Theory 11.2 Complexity Theory 11.3 Number Theory 11.4 Factoring 11.5 Prime Number Generation 11.6 Discrete Logarithms In a Finite Field

Software Security Seminar - 16 Discrete Logarithm Problem Discrete Logarithm Problem (DLP) For given a, b and n, Find the exponent x such that a^x = b mod n Example Find x such that 3^x = 15 mod 17 3^1 = 3, 3^2 = 9, 3^3 = 10, 3^4 = 13, 3^5 = 5, 3^6 = 15. x = 6 DLP is essentially the same as the Factoring problem.