M. Khalily Dermany Islamic Azad University.  finite number of element  important in number theory, algebraic geometry, Galois theory, cryptography,

Slides:



Advertisements
Similar presentations
Finite Fields Rong-Jaye Chen. p2. Finite fields 1. Irreducible polynomial f(x)  K[x], f(x) has no proper divisors in K[x] Eg. f(x)=1+x+x 2 is irreducible.
Advertisements

BCH Codes Hsin-Lung Wu NTPU.
Mathematics of Cryptography Part II: Algebraic Structures
Cryptography and Network Security, Finite Fields From Third Edition by William Stallings Lecture slides by Mustafa Sakalli so much modified..
Cryptography and Network Security
Chapter 4 Finite Fields. Introduction of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key concern operations on “numbers”
Cryptography and Network Security Chapter 4 Fourth Edition by William Stallings.
Chapter 4 – Finite Fields. Introduction will now introduce finite fields of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key.
Number Theory and Cryptography
Algebraic Structures DEFINITIONS: PROPERTIES OF BINARY OPERATIONS Let S be a set and let  denote a binary operation on S. (Here  does not necessarily.
Cryptography and Network Security Chapter 4
Cryptography and Network Security Chapter 4 Fourth Edition by William Stallings.
Introduction Polynomials
Congruence Classes Z n = {[0] n, [1] n, [2] n, …, [n - 1] n } = the set of congruence classes modulo n.
Chapter 4 – Finite Fields Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public.
Slide 10-1 Copyright © 2005 Pearson Education, Inc. SEVENTH EDITION and EXPANDED SEVENTH EDITION.
WHOLE NUMBERS; INTEGERS Whole numbers: Z 0,+ = the natural numbers  {0}. Integers:
Chapter 2 Working with Real Numbers. 2-1 Basic Assumptions.
FINITE FIELDS 7/30 陳柏誠.
CPSC 3730 Cryptography and Network Security
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Information Security and Management 4. Finite Fields 8
Cryptography and Network Security Introduction to Finite Fields.
By: Hector L Contreras SSGT / USMC
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
Monoids, Groups, Rings, Fields
Temperature Readings The equation to convert the temperature from degrees Fahrenheit to degrees Celsius is: c(x) = (x - 32) The equation to convert the.
Session 1 Stream ciphers 1.
Chapter 4 – Finite Fields
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
Linear Feedback Shift Register. 2 Linear Feedback Shift Registers (LFSRs) These are n-bit counters exhibiting pseudo-random behavior. Built from simple.
Commutative Properties The Commutative Property is when a change in the order of the numbers does not change the answer. For example, addition would be:
Great Theoretical Ideas in Computer Science.
Information Security Lab. Dept. of Computer Engineering 87/121 PART I Symmetric Ciphers CHAPTER 4 Finite Fields 4.1 Groups, Rings, and Fields 4.2 Modular.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
UNIT - 2.  A binary operation on a set combines two elements of the set to produce another element of the set. a*b  G,  a, b  G e.g. +, -, ,  are.
Abstract Algebra 2004/9/29Yuh-Ming Huang, CSIE NCNU1 Introduction to Algebra Def 2.0 ( G, * ) G: a set A binary operation * on G : a * b  G  a,b  G.
CS Lecture 14 Powerful Tools     !. Build your toolbox of abstract structures and concepts. Know the capacities and limits of each tool.
15-499Page :Algorithms and Applications Cryptography II – Number theory (groups and fields)
Cryptography and Network Security Chapter 4 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Multiplication and Division Properties. Multiplication Properties Commutative Property Associative Property Identity Property Zero Property Distributive.
Hardware Implementations of Finite Field Primitives
Multiplicative Group The multiplicative group of Z n includes every a, 0
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 4 With Question/Answer Animations 1. Chapter Motivation Number theory is the part of mathematics devoted to the study of the integers and their.
Write, Interpret and Use Mathematical Expression and Equations.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-5 Mathematical Background:
Introductory Algebra Glossary The Language of Math.
Chapter 7 Algebraic Structures
Unit-III Algebraic Structures
CS480 Cryptography and Information Security
Great Theoretical Ideas in Computer Science
Great Theoretical Ideas In Computer Science
GROUPS & THEIR REPRESENTATIONS: a card shuffling approach
Cryptography Lecture 21.
Great Theoretical Ideas in Computer Science
Cryptography and Network Security
PROPERTIES OF ALGEBRA.
Great Theoretical Ideas in Computer Science
Section 10.1 Groups.
I. Finite Field Algebra.
Algebraic Structures: Group Theory
MA5242 Wavelets Lecture 1 Numbers and Vector Spaces
296.3:Algorithms in the Real World
Section 9.1 Groups.
Mathematical Background: Extension Finite Fields
Presentation transcript:

M. Khalily Dermany Islamic Azad University

 finite number of element  important in number theory, algebraic geometry, Galois theory, cryptography, coding theory and Quantum error correction  applications in many areas of mathematics and computer science, including coding theory, LFSRs, modular representation theory, and the groups of Lie type  Finite fields are an active area of research, including recent results on the Kakeya conjecture and open problems on the size of the smallest primitive root.

 Semi group ◦ Associative: (x+y)+z=x+(y+z)  Monoid ◦ A semi group with identity: a + e = a  Group ◦ A Monoid with inverses : a + (−a) = e ◦ The order of a group is the number of elements in the group.  Abelian group ◦ Commutativity: a + b = b + a  Ring ◦ is Abelian and is group ◦ Distributivity: a · (b + c) = (a · b) + (a · c).  Field ◦ and is Abelian ◦ Distributivity a · (b + c) = (a · b) + (a · c).

 Closure of F under addition and multiplication ◦ For all a, b in F, both a + b and a · b are in F (or more formally, + and · are binary operations on F).  Associativity of addition and multiplication ◦ For all a, b, and c in F, a + (b + c) = (a + b) + c and a · (b · c) = (a · b) · c.  Commutativity of addition and multiplication ◦ For all a and b in F : a + b = b + a and a · b = b · a.

 Existence of additive and multiplicative identity elements ◦ There exists an element of F, called the additive identity element and denoted by 0, such that for all a in F  a + 0 = a ◦ Likewise, there is an element, called the multiplicative identity element and denoted by 1, such that for all a in F  a · 1 = a  the additive identity and the multiplicative identity are required to be distinct.

 Existence of additive inverses and multiplicative inverses or subtraction and division operations exist. ◦ For every a in F, there exists an element −a in F, such that a + (−a) = 0 ◦ Similarly, for any a in F other than 0, there exists an element a −1 in F, such that a · a −1 = 1. ◦ The elements a + (−b) and a · b −1 are also denoted a − b and a/b, respectively  Distributivity of multiplication over addition ◦ For all a, b and c in F, the following equality holds: a · (b + c) = (a · b) + (a · c)

 example F 4 is a field with four elements  Inverse  Identity

 all finite fields must have prime power order ◦ there is no finite field with 6 elements.  In any field F with m elements, the equation x m =x is satisfied by all elements x of F.  In any prime size field, it can be proved that there is always at least one element whose powers constitute all the nonzero elements of the field. This element is said to be primitive.

 For example, in the field GF(7), the number 3 is primitive as  6 x 2=3 3 x 3 2 = 3 5 = 5

 subtract 6 from 3, ◦ first use the addition table to find the additive inverse of 6, which is 1. ◦ Then we add 1 to 3 to obtain the result ◦ 3-6=3+(-6)=3+1=4  divide 3 by 2. ◦ first find the multiplicative inverse of 2, which is 4, ◦ multiply 3 by 4 to obtain the result ◦ 3÷2=3.(2 -1 )=3.4=5.

 polynomials whose coefficients are from the binary field GF(2)  The degree of a polynomial is the largest power of X with a nonzero coefficient.

 There are two polynomials over GF(2) with  degree 1 ◦ X and 1+X.  There are four polynomials over GF(2) with  degree 2 ◦ X 2, 1 + X 2, X + X 2, and 1 + X + X 2  In general, there are 2 n polynomials over GF(2) with degree n.

 Therefore, the set F* is a Galois field of 2 m elements. Also GF(2) is a subfield of GF(2 m ).

 X 2 + 6X + 25 does not have roots ◦ —3 + 4j ◦ —3 — 4j  This is also true for polynomials with coefficients from GF(2)

 there must exist two positive integers m and n such that m < n and  There must exist a smallest positive integer λ such that λ  This integer λ is called the characteristic of the field GF(q).  λ is a prime.

 Any two finite fields with the same number of elements are isomorphic. That is, under some renaming of the elements of one of these, both its addition and multiplication tables become identical to the corresponding tables of the other one.