Number-Theoretic Algorithms

Slides:



Advertisements
Similar presentations
Mod arithmetic.
Advertisements

Public Key Cryptography The RSA Cryptosystem. by William M. Faucette Department of Mathematics State University of West Georgia.
Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
COMP 170 L2 Page 1 L06: The RSA Algorithm l Objective: n Present the RSA Cryptosystem n Prove its correctness n Discuss related issues.
Chapter 5 Number Theory © 2008 Pearson Addison-Wesley. All rights reserved.
Prime and Composite Numbers
Section 4.1: Primes, Factorization, and the Euclidean Algorithm Practice HW (not to hand in) From Barr Text p. 160 # 6, 7, 8, 11, 12, 13.
Primality Testing Patrick Lee 12 July 2003 (updated on 13 July 2003)
Chapter 8 More Number Theory. Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
7. Asymmetric encryption-
Announcements: 1. Term project groups and topics due midnight 2. HW6 due next Tuesday. Questions? This week: Primality testing, factoring Primality testing,
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
Announcements: HW3 updated. Due next Thursday HW3 updated. Due next Thursday Written quiz tomorrow on chapters 1-2 (next slide) Written quiz tomorrow on.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2001 Lecture 7 Tuesday, 11/6/01 Number-Theoretic Algorithms Chapter.
DTTF/NB479: Dszquphsbqiz Day 9 Announcements: Homework 2 due now Homework 2 due now Computer quiz Thursday on chapter 2 Computer quiz Thursday on chapter.
© Copyright Martin Tompa, 1999 Secret Codes, Unforgeable Signatures, and Coin Flipping on the Phone Martin Tompa Computer Science & Engineering University.
REMEMBER: A number can be negative or positive as shown in the number line below: Negative Numbers (-) Positive Numbers (+)
Sub Title Factors and Multiples Chapter 3: Conquering SAT Math.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
ASYMMETRIC CIPHERS.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Chapter Number Theory 4 4 Copyright © 2013, 2010, and 2007, Pearson Education, Inc.
A number that divides evenly into a larger number without a remainder Factor- Lesson 7 - Attachment A.
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright © The McGraw-Hill Companies, Inc. Permission required.
Software Security Seminar - 1 Chapter 11. Mathematical Background 발표자 : 안병희 Applied Cryptography.
Introduction to Modular Arithmetic and Public Key Cryptography.
Section 4.3: Fermat’s Little Theorem Practice HW (not to hand in) From Barr Text p. 284 # 1, 2.
Pythagorean Theorum Shaikh albuainain. The Pythagorean theorem has its name derived from the ancient Greek mathematician Pythagoras (569 BC-500 BC). Pythagoras.
HAWKES LEARNING SYSTEMS Students Matter. Success Counts. Copyright © 2013 by Hawkes Learning Systems/Quant Systems, Inc. All rights reserved. Section 1.9.
Cyclic Groups (9/25) Definition. A group G is called cyclic if there exists an element a in G such that G =  a . That is, every element of G can be written.
Number Theory and Advanced Cryptography 2
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
P1. Public-Key Cryptography and RSA 5351: Introduction to Cryptography Spring 2013.
Binary Values and Number Systems
Chinese Remainder Theorem Dec 29 Picture from ………………………
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
Adding Integers. The Number Line Integers = {…, -2, -1, 0, 1, 2, …} -505.
Internet Engineering Czesław Smutnicki Discrete Mathematics – Numbers Theory.
Factor A factor of an integer is any integer that divides the given integer with no remainder.
9.1 Primes and Related Congruence Equations 23 Sep 2013.
Objective: Learn to describe the relationships and extend the terms in arithmetic sequence.
Discrete Mathematics
Lecture 2-3 Basic Number Theory and Algebra. In modern cryptographic systems, the messages are represented by numerical values prior to being encrypted.
3-1 © 2011 Pearson Prentice Hall. All rights reserved Chapter 12 Sequences, Series, and the Binomial Theorem Active Learning Questions.
The Chinese Remainder Theorem A presentation by Vincent Kusiak.
CS480 Cryptography and Information Security
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
EVEN NUMBERS EVEN NUMBERS 1 = prime 2 = prime1 3 = prime 4 = 2 x 22 5 = prime 6 = 2 x 33 7 = prime 8 = 2 x 2 x 24 9 = 3 x 3 10 = 2 x 55.
Number-Theoretic Algorithms
Public Key Encryption Major topics The RSA scheme was devised in 1978
Chapter Applications of Number Theory Some Useful Results
Introduction to Cryptography
Chinese Remainder Theorem
Overview of Residue Number System (RNS) for Advanced VLSI Design and VLSI Signal Processing NTUEE 吳安宇.
Public-Key Cryptography and RSA
RSA and El Gamal Cryptosystems
6*. An Introduction to Number Theory
Using The Sieve of Eratosthenes
Brief Overview of Residue Number System (RNS)
Modular Arithmetic and Change of Base
Designing Algorithms for Multiplication of Fractions
Discrete Math for CS CMPSC 360 LECTURE 13 Last time:
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
Modular Arithmetic and Elliptic Curves
Introduction to Cryptography
Counting to 100 Counting by ones
Lecture 2-3 Basic Number Theory and Algebra
Presentation transcript:

Number-Theoretic Algorithms Chapter 31, CLRS book

Modular Arithmetic

The Chinese Remainder Problem A problem described in an ancient Chinese arithmetic book, Sun Tze Suan Ching, by Sun Tze (around 300AD, author of The Art of War). Problem: We have a number of objects, but we do not know exactly how many. If we count them by threes we have two left over. If we count them by fives we have three left over. If we count them by sevens we have two left over. How many objects are there?

Example: Chinese remainder theorem

Algorithms

The RSA Cryptosystem

Attacks on RSA

RSA-200 = 27,997,833,911,221,327,870,829,467,638, 722,601,621,070,446,786,955,428,537,560, 009,929,326,128,400,107,609,345,671,052, 955,360,856,061,822,351,910,951,365,788, 637,105,954,482,006,576,775,098,580,557, 613,579,098,734,950,144,178,863,178,946, 295,187,237,869,221,823,983.

Generating large primes To set up an RSA cryptosystem, we need two large primes p and q.

Integer Factorization Reference on quadratic sieve: http://blogs.msdn.com/b/devdev/archive/2006/06/19/637332.aspx