Information Security and Management 4. Finite Fields 8 Information Security and Management 4. Finite Fields 8. Introduction to Number Theory Chih-Hung Wang Fall 2011
Group A set of elements or “numbers” obeys: (A1) Closure: If a and b belong to G, then ab is also in G. (A2) Associative: (ab) c = a(b c) (A3) Identity element: There is an element e in G such that a e = e a = a (A4) Inverses element: For each a in G there is an element a’ in G such that a a’ = a’ a = e If commutative (A5) a b = b a for all a, b in G then forms an abelian group
Cyclic Group Define exponentiation as repeated application of operator example: a3 = a a a Define identity: e=a0 a-n=(a’)n A group is cyclic if every element is a power of some fixed element ie b = ak for some a and every b in group G a is said to generate the group G or to be a generator of G.
Ring A set of “numbers” with two operations (addition + and multiplication ) which are: An abelian group with addition operation (A1-A5) Multiplication: (M1) Closure (M2) Associative: a(bc)=(ab)c (M3) Distributive law: a(b+c) = ab + ac If multiplication operation is commutative, it forms a commutative ring (M4) Commutativity of multiplication: ab=ba If multiplication operation has identity and no zero divisors, it forms an integral domain (M5) Multiplicative identity: There is an element 1 in R such that a1=1a =a (M6) No zero divisors: If a,b in R and ab=0, then either a=0 or b=0.
Field A set of numbers with two operations: Abelian group for addition (A1-A5) Abelian group for multiplication (ignoring 0) (M1-M6) (M7) Multiplicative inverse: For each a in F, except 0, there is an element a-1 in F such that aa- 1=(a-1)a =1.
Group, Ring and Field
Modular Arithmetic Define modulo operator a mod n to be remainder when a is divided by n Use the term congruence for: a ≡ b mod n when divided by n, a & b have the same remainder eg. 73 ≡ 4 mod 23 r is called the residue of a mod n since with integers can always write: a = qn + r Usually have 0 <= b <= n-1 -12 mod 7 ≡ -5 mod 7 ≡ 2 mod 7 ≡ 9 mod 7
The Relationship a = qn + r, 0r<n
Modulo 7 Example ... -21 -20 -19 -18 -17 -16 -15 -14 -13 -12 -11 -10 -9 -8 -7 -6 -5 -4 -3 -2 -1 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34
Divisors Say a non-zero number b divides a if for some m have a=mb (a,b,m are all integers) That is b divides into a with no remainder Denote this b|a Also say that b is a divisor of a eg. all of 1,2,3,4,6,8,12,24 divide 24
Modular Arithmetic Operations is 'clock arithmetic' uses a finite number of values, and loops back from either end modular arithmetic is when do addition & multiplication and modulo reduce answer can do reduction at any point, ie a+b mod n = [(a mod n) + (b mod n)] mod n a-b mod n = [(a mod n) – (b mod n)] mod n ab mod n = [(a mod n) (b mod n)] mod n
Property
Modular Arithmetic Can do modular arithmetic with any group of integers: Zn = {0, 1, … , n-1} form a commutative ring for addition with a multiplicative identity note some peculiarities if (a+b)≡(a+c) mod n then b≡c mod n but (ab)≡(ac) mod n then b≡c mod n only if a is relatively prime to n
Relatively Prime 6 and 8 are not relatively prime Relative prime: their only common positive integer factor is 1. An integer has a multiplicative inverse in Zn if that integer is relatively prime to n. Example: 63=18 ≡ 2 mod 8 67=42 ≡ 2 mod 8 3 ≡ 7 mod 8 6 and 8 are not relatively prime
Residue Class The residue classes modulo n as [0], [1], [2], …, [n-1] where [r] = {a: a is an integer, a ≡ r mod n} Z8 1 2 3 4 5 6 7 6 12 18 24 30 36 42 Residues
Multiplicative Inverse Z8 1 2 3 4 5 6 7 5 10 15 20 25 30 35 Residues If p is a prime number, then all the elements of Zp are relatively prime to p Multiplicative inverse (w-1) For each there exists a z such that w z 1 mod p For each and gcd(w,n)=1, there exists a z such that w z 1 mod n
Modulo 8 Example (1)
Modulo 8 Example (2)
Properties of Modular Arithmetic for Integer Zn
Greatest Common Divisor (GCD) A common problem in number theory GCD (a,b) of a and b is the largest number that divides evenly into both a and b eg GCD(60,24) = 12 Often want no common factors (except 1) and hence numbers are relatively prime eg GCD(8,15) = 1 hence 8 & 15 are relatively prime
Euclid's GCD Algorithm An efficient way to find the GCD(a,b) uses theorem that: GCD(a,b) = GCD(b, a mod b) gcd(55,22)=gcd(22,55 mod 22)=gcd(22,11)=11 Euclid's Algorithm to compute GCD(a,b): EUCLID(a,b) A a; B b If B=0 return A=gcd(a,b) R = A mod B A B B R goto 2
Example GCD(1970,1066) 1970 = 1 x 1066 + 904 gcd(1066, 904) 1066 = 1 x 904 + 162 gcd(904, 162) 904 = 5 x 162 + 94 gcd(162, 94) 162 = 1 x 94 + 68 gcd(94, 68) 94 = 1 x 68 + 26 gcd(68, 26) 68 = 2 x 26 + 16 gcd(26, 16) 26 = 1 x 16 + 10 gcd(16, 10) 16 = 1 x 10 + 6 gcd(10, 6) 10 = 1 x 6 + 4 gcd(6, 4) 6 = 1 x 4 + 2 gcd(4, 2) 4 = 2 x 2 + 0 gcd(2, 0) Compute successive instances of GCD(a,b) = GCD(b,a mod b). Note this MUST always terminate since will eventually get a mod b = 0 (ie no remainder left).
Galois Fields Finite fields play a key role in cryptography Can show number of elements in a finite field must be a power of a prime pn Known as Galois fields Denoted GF(pn) In particular often use the fields: GF(p) GF(2n)
Galois Fields GF(p) GF(p) is the set of integers {0,1, … , p-1} with arithmetic operations modulo prime p These form a finite field since have multiplicative inverses Hence arithmetic is “well-behaved” and can do addition, subtraction, multiplication, and division without leaving the field GF(p)
Example GF(7) -- (1) From Stallings Table 4.3b
Example GF(7) -- (2)
Finding Inverses (1) Can extend Euclid’s algorithm: EXTENDED EUCLID(m, b) 1. (A1, A2, A3)=(1, 0, m); (B1, B2, B3)=(0, 1, b) 2. if B3 = 0 return A3 = gcd(m, b); no inverse 3. if B3 = 1 return B3 = gcd(m, b); B2 = b–1 mod m 4. Q = A3 / B3 5. (T1, T2, T3)=(A1 – Q B1, A2 – Q B2, A3 – Q B3) 6. (A1, A2, A3)=(B1, B2, B3) 7. (B1, B2, B3)=(T1, T2, T3) 8. goto 2
Finding Inverses (2)
Inverse of 550 in GF(1759) B3 B1 B2 550 545 109=1*1759 – 3*550 5= -5 * 109 + 550 = -5*(1*1759 – 3*550) + 550 =-5 * 1759 + 16 * 550 3 1759 1650 5 109 5
Polynomial Arithmetic Ordinary polynomial arithmetic A polynomial with degree n
Polynomial Arithmetic with Coefficients in Zp Polynomial ring Example of GF(2)
Example of GF(2)
Irreducible A polynomial f(x) over a field F is called irreducible if and only if f(x) cannot be expressed as a product of two polynomials. The polynomial over GF(2) is reducible because is irreducible
Finding the GCD EUCLID Algorithm
Finite Fields of the Form GF(2n) To work with integers that fit exactly into a given number of bits, with no wasted bit patterns. (for implementation efficiency) Arithmetic in GF(23) Addition
Arithmetic in GF(23) Multiplication
Arithmetic in GF(23) Additive and multiplicative inverses
Modular Polynomial Arithmetic Consider the set S of all polynomials of degree n-1 or less over the field Zp. Thus, each polynomial has the form where each ai takes on a value in the set {0,1,…,p-1}. There are a total of pn different polynomials in S.
Arithmetic Operations Arithmetic follows the ordinary rules of polynomial arithmetic using the basic rules of algebra, with the following refinements. Arithmetic on the coefficients is performed modulo p. That is, we use the rules of arithmetic for the finite field Zp. If multiplication results in a polynomial of degree greater than n-1, than the polynomial is reduced modulo some irreducible polynomial m(x) of degree n. That is, we divide by m(x) and keep the remainder. For a polynomial f(x), the remainder is expressed as r(x)=f(x) mod m(x).
Example of GF(28) – in AES (1)
Example of GF(28) – in AES (2)
Construction of GF(23) Two irreducible polynomials in GF(23)
Polynomial Arithmetic Modulo (1)
Polynomial Arithmetic Modulo (2)
Finding the Multiplicative Inverse
Implementation Considerations (1) Addition
Implementation Considerations (2) Multiplication (1)
Implementation Considerations (3) Multiplication (2)
Implementation Considerations (4) Multiplication (3)
Fermat's Theorem ap-1 mod p = 1 also known as Fermat’s Little Theorem where p is prime and gcd(a,p)=1 also known as Fermat’s Little Theorem useful in public key and primality testing
Euler Totient Function ø(n) When doing arithmetic modulo n Complete set of residues is: 0..n-1 Reduced set of residues is those numbers (residues) which are relatively prime to n e.g. for n=10, complete set of residues is {0,1,2,3,4,5,6,7,8,9} reduced set of residues is {1,3,7,9} Number of elements in reduced set of residues is called the Euler Totient Function ø(n)
Euler Totient Function ø(n) To compute ø(n) need to count number of elements to be excluded In general need prime factorization, but for p (p prime) ø(p) = p-1 for pq (p,q prime) ø(pq) = (p-1)(q-1) e.g. ø(37) = 36 ø(21) = (3–1)×(7–1) = 2×6 = 12
Euler's Theorem A generalisation of Fermat's Theorem aø(n) mod n = 1 where gcd(a,n)=1 e.g. a=3;n=10; ø(10)=4; hence 34 = 81 = 1 mod 10 a=2;n=11; ø(11)=10; hence 210 = 1024 = 1 mod 11
Primality Testing Often need to find large prime numbers Traditionally sieve using trial division ie. divide by all numbers (primes) in turn less than the square root of the number only works for small numbers alternatively can use statistical primality tests based on properties of primes for which all primes numbers satisfy property but some composite numbers, called pseudo-primes, also satisfy the property
The distribution of primes The natural way of measuring the density of primes is to count the number of primes up to a bound x, where x is a real number. For a real number x ¸ 0, the function (x) is defined to be the number of primes up to x. Thus, (1) = 0, (2) = 1, (7:5) = 4, and so on.
Some values of (x)
Miller Rabin Algorithm a test based on Fermat’s Theorem algorithm is: TEST (n) is: 1. Find integers k, q, k > 0, q odd, so that (n–1)=2kq 2. Select a random integer a, 1<a<n–1 3. if aq mod n = 1 then return (“maybe prime"); 4. for j = 0 to k – 1 do 5. if (a2jq mod n = n-1) then return(" maybe prime ") 6. return ("composite")
Probabilistic Considerations If Miller-Rabin returns “composite” the number is definitely not prime Otherwise is a prime or a pseudo-prime chance it detects a pseudo-prime is < ¼ hence if repeat test with different random a then chance n is prime after t tests is: Pr(n prime after t tests) = 1-4-t eg. for t=10 this probability is > 0.99999
Prime Distribution Prime number theorem states that primes occur roughly every (ln n) integers Since can immediately ignore evens and multiples of 5, in practice only need test 0.4 ln(n) numbers of size n before locate a prime note this is only the “average” sometimes primes are close together, at other times are quite far apart
Primitive Roots From Euler’s theorem have aø(n) mod n=1 consider am mod n=1, GCD(a,n)=1 must exist for m= ø(n) but may be smaller once powers reach m, cycle will repeat If smallest is m= ø(n) than a is called a primitive root . a, a2, …, aø(n) are distinct (mod n): order = ø(n) If p is prime, then successive powers of a "generate" the group mod p (a is called the “generator of Zp*”) a, a2,…, ap-1 are distinct (mod p): order = ø(p)=p-1 All orders divides p-1 (in Zp*) These are useful but relatively hard to find.
Powers of Integers, Modulo 19
Discrete Logarithms The inverse problem to exponentiation is to find the discrete logarithm of a number modulo p That is to find x where y=gx mod p Written as x=logg y mod p If g is a primitive root then always exists, otherwise may not x = log5 12 mod 19 (x s.t. 5x = 12 mod 19) has no answer x = log3 5 mod 19 = 4 by trying successive powers Computing exponentiation is relatively easy, finding discrete logarithms is generally a hard problem
Example of DL