Number Theory Speaker: P.H. Wu Date: 21/04/11 1. Outline Introduction Residue number system Chinese remainder theory Euclid’s algorithm Stern-Brocot tree.

Slides:



Advertisements
Similar presentations
Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Advertisements

1 Lect. 12: Number Theory. Contents Prime and Relative Prime Numbers Modular Arithmetic Fermat’s and Euler’s Theorem Extended Euclid’s Algorithm.
Chapter 5 Number Theory © 2008 Pearson Addison-Wesley. All rights reserved.
Chapter 8 – Introduction to Number Theory. Prime Numbers prime numbers only have divisors of 1 and self –they cannot be written as a product of other.
Prime and Composite Numbers
Thinking Mathematically
5.1 Number Theory. The study of numbers and their properties. The numbers we use to count are called the Natural Numbers or Counting Numbers.
1 Section 2.4 The Integers and Division. 2 Number Theory Branch of mathematics that includes (among other things): –divisibility –greatest common divisor.
Quotient-Remainder Theory, Div and Mod
Number Theory(L5) Number Theory Number Theory(L5).
CSC2110 Discrete Mathematics Tutorial 5 GCD and Modular Arithmetic
1 Chapter 7– Introduction to Number Theory Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :
Announcements: Homework 1 returned. Comments from Kevin? Homework 1 returned. Comments from Kevin? Matlab: tutorial available at
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
Chapter II. THE INTEGERS
6/20/2015 5:05 AMNumerical Algorithms1 x x1x
Theory of Computation Transparency No. 1-1 Chapter 2 Introduction to Number Theory and Its applications Cheng-Chia Chen October 2002.
Chapter 4 – Finite Fields Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public.
Theory of Computation Transparency No. 1-1 Chapter 2 Introduction to Number Theory and Its applications Cheng-Chia Chen October 2005.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2001 Lecture 7 Tuesday, 11/6/01 Number-Theoretic Algorithms Chapter.
Fall 2002CMSC Discrete Structures1 Let us get into… Number Theory.
Chapter 5 Number Theory © 2008 Pearson Addison-Wesley.
BY MISS FARAH ADIBAH ADNAN IMK
Section 5.1 Number Theory.
The Fundamentals: Algorithms, Integers, and Matrices CSC-2259 Discrete Structures Konstantin Busch - LSU1.
© by Kenneth H. Rosen, Discrete Mathematics & its Applications, Sixth Edition, Mc Graw-Hill, 2007 Chapter 3 (Part 2): The Fundamentals: Algorithms, the.
9/2/2015Discrete Structures1 Let us get into… Number Theory.
Module :MA3036NI Cryptography and Number Theory Lecture Week 7
Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.
YSLInformation Security -- Public-Key Cryptography1 Prime and Relatively Prime Numbers Divisors: We say that b  0 divides a if a = mb for some m, where.
Chapter 2 (Part 1): The Fundamentals: Algorithms, the Integers & Matrices The Integers and Division (Section 2.4)
Discrete Mathematics Section 3.7 Applications of Number Theory 大葉大學 資訊工程系 黃鈴玲.
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
Module #9 – Number Theory 1/5/ Algorithms, The Integers and Matrices.
Internet Engineering Czesław Smutnicki Discrete Mathematics – Numbers Theory.
Application: Algorithms Lecture 20 Section 3.8 Wed, Feb 21, 2007.
 2012 Pearson Education, Inc. Slide Chapter 5 Number Theory.
Introduction to Number Theory
Discrete Mathematics
Lecture 2-3 Basic Number Theory and Algebra. In modern cryptographic systems, the messages are represented by numerical values prior to being encrypted.
1 Discrete Structures – CNS2300 Text Discrete Mathematics and Its Applications Kenneth H. Rosen (5 th Edition) Chapter 2 The Fundamentals: Algorithms,
The Fundamentals: Algorithms, Integers, and Matrices CSC-2259 Discrete Structures Konstantin Busch - LSU1.
Ch04-Number Theory and Cryptography 1. Introduction to Number Theory Number theory is about integers and their properties. We will start with the basic.
Number Theory: Prime and Composite Numbers
Module #9 – Number Theory 6/11/20161 Chapter 3 Algorithms, Integers and Matrices.
Number Theory Lecture 1 Text book: Discrete Mathematics and its Applications, 7 th Edition.
Discrete Mathematics Chapter 2 The Fundamentals : Algorithms, the Integers, and Matrices. 大葉大學 資訊工程系 黃鈴玲.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Chapter 3 The Fundamentals: Algorithms, the integers, and matrices Section 3.4: The integers and division Number theory: the part of mathematics involving.
Number Theory. Introduction to Number Theory Number theory is about integers and their properties. We will start with the basic principles of divisibility,
Number-Theoretic Algorithms
CS 210 Discrete Mathematics The Integers and Division (Section 3.4)
Integers and Division Section 3.4.
ALGORITHM NUMBER THEORY
Chapter 5: Number Theory
MATH301- DISCRETE MATHEMATICS Copyright © Nahid Sultana Dr. Nahid Sultana Chapter 4: Number Theory and Cryptography.
Analytic Number Theory MTH 435
Applied Discrete Mathematics Week 4: Number Theory
Section 5.1 Number Theory.
Chapter 5 Number Theory 2012 Pearson Education, Inc.
Week #5 – 23/25/27 September 2002 Prof. Marie desJardins
Prime Factorization Course
Section 5.1 Number Theory.
Least Common Multiples
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
Chapter 5 Number Theory 2012 Pearson Education, Inc.
Applied Discrete Mathematics Week 10: Introduction to Counting
Number Theory.
Lecture 2-3 Basic Number Theory and Algebra
Presentation transcript:

Number Theory Speaker: P.H. Wu Date: 21/04/11 1

Outline Introduction Residue number system Chinese remainder theory Euclid’s algorithm Stern-Brocot tree Continuants Conclusion 2

Introduction gcd: greatest common divisor lcm: least common multiple primes: p factorial: n! module: mod module congruence: a b(mod m) Application: encryption, combination and permutation ≡ 3

Introduction Some primes 1.Fermat prime 2.Mersenne prime 3. 4

Residue number system Def: An integer x can be represented as a sequence of residue with respect to moduli that are prime to each other. Res(x) is unique if 0< x <m 1 m 2 …m r, or Res(x) = Res(x + km 1 m 2 …m r ). 5

Residue Number system 6 X mod 12X mod 3X mod Nice coding system!!!

Residue Number system 7 X mod 12X mod 3X mod

Chinese remainder theory 餘數定理 Find x ? x = 2·35a+21b+15c (mod 3·5·7) 8

Euclid’s Algorithm 輾轉相除法 9

Stern-Brocot tree Binary search tree (n, m)= /7  LRRL 10

Stern-Brocot tree Example: 11

Stern-Brocot tree Binary search tree 5. 12

Stern-Brocot tree Example: 13

Continuants Any positive rational number can be represented as continuants. 14

Continuants Continuant polynomial Example: 15

Continuants Continuant polynomial Example: 16

Relation between Euclid’s Alg. and Continuants 17

Relation between Euclid’s Alg. and Continuants 18

Relation between Stern-Brocot tree and Continuants Example: Path: 19

Relation between Stern-Brocot tree and Continuants 20

Other continuant property 1. mirror symmetry 2. more general recurrence 3. The number of terms is a Fibonacci number. 21

Thanks for listening!!! 22