Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

Slides:



Advertisements
Similar presentations
Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Advertisements

1 Lect. 12: Number Theory. Contents Prime and Relative Prime Numbers Modular Arithmetic Fermat’s and Euler’s Theorem Extended Euclid’s Algorithm.
COMP 170 L2 Page 1 L06: The RSA Algorithm l Objective: n Present the RSA Cryptosystem n Prove its correctness n Discuss related issues.
Chapter 5 Number Theory © 2008 Pearson Addison-Wesley. All rights reserved.
Chapter 8 – Introduction to Number Theory. Prime Numbers prime numbers only have divisors of 1 and self –they cannot be written as a product of other.
Section 4.1: Primes, Factorization, and the Euclidean Algorithm Practice HW (not to hand in) From Barr Text p. 160 # 6, 7, 8, 11, 12, 13.
Chapter 8 Introduction To Number Theory. Prime Numbers Prime numbers only have divisors of 1 and Prime numbers only have divisors of 1 and self. self.
Chapter 8 Introduction to Number Theory. Prime Numbers prime numbers only have divisors of 1 and self –they cannot be written as a product of other numbers.
Thinking Mathematically
Data encryption with big prime numbers
22C:19 Discrete Structures Integers and Modular Arithmetic
Capstone Project Presentation A Tool for Cryptography Problem Generation CSc 499 Mark Weston Winter 2006.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
and Factoring Integers (I)
1 Chapter 7– Introduction to Number Theory Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
6/20/2015 5:05 AMNumerical Algorithms1 x x1x
Announcements: HW3 updated. Due next Thursday HW3 updated. Due next Thursday Written quiz tomorrow on chapters 1-2 (next slide) Written quiz tomorrow on.
Chapter 8 – Introduction to Number Theory Prime Numbers
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2001 Lecture 7 Tuesday, 11/6/01 Number-Theoretic Algorithms Chapter.
Sullivan Algebra and Trigonometry: Section 1.3 Quadratic Equations in the Complex Number System Objectives Add, Subtract, Multiply, and Divide Complex.
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright © The McGraw-Hill Companies, Inc. Permission required.

Number Theory Speaker: P.H. Wu Date: 21/04/11 1. Outline Introduction Residue number system Chinese remainder theory Euclid’s algorithm Stern-Brocot tree.
Mathematics of Cryptography Modular Arithmetic, Congruence,
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Information Security and Management 4. Finite Fields 8
Section 4.3: Fermat’s Little Theorem Practice HW (not to hand in) From Barr Text p. 284 # 1, 2.
Basic Number Theory Divisibility Let a,b be integers with a≠0. if there exists an integer k such that b=ka, we say a divides b which is denoted by a|b.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
1 Section Congruences In short, a congruence relation is an equivalence relation on the carrier of an algebra such that the operations of the algebra.
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
Internet Engineering Czesław Smutnicki Discrete Mathematics – Numbers Theory.
Fermat’s Little Theorem The RSA Cryptosystem will require exponentiation to decrypt messages. Exponentiation Notation Example 1: Compute Exponentials Example.
Introduction to Number Theory
Pertemuan #5 Pengantar ke Number Theory Kuliah Pengaman Jaringan.
9.1 Primes and Related Congruence Equations 23 Sep 2013.
Lecture 2-3 Basic Number Theory and Algebra. In modern cryptographic systems, the messages are represented by numerical values prior to being encrypted.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
The Fundamentals: Algorithms, Integers, and Matrices CSC-2259 Discrete Structures Konstantin Busch - LSU1.
CS480 Cryptography and Information Security
Copyright © Zeph Grunschlag, RSA Encryption Zeph Grunschlag.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-5 Mathematical Background:
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Number-Theoretic Algorithms
Mathematical Background : A quick approach to Group and Field Theory
Mathematical Background: Groups, Rings, Finite Fields (GF)
Mathematical Background for Cryptography: Modular arithmetic and gcd
Mathematics of Cryptography
ALGORITHM NUMBER THEORY
Introduction to Number Theory
6*. An Introduction to Number Theory
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Number Theory (Chapter 7)
Computer Security Modular Arithmetic November 12, 2018
Mathematical Background: Prime Numbers
Week #5 – 23/25/27 September 2002 Prof. Marie desJardins
Introduction to Cryptography
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
Square Least number Add & Subtract.
Algebra 5 Congruence Classes.
Lecture 2-3 Basic Number Theory and Algebra
Mathematical Background: Groups, Rings, Finite Fields (GF)
Mathematical Background: Extension Finite Fields
Presentation transcript:

Lecture 2 Basic Number Theory and Algebra

In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and transmitted. The encryption processes are mathematical operations that turn the input numerical value into output numerical values. Building, analyzing, and attacking these cryptosystem requires mathematical tools. The most important of these is number theory, especially the theory of congruences.

Outline  Basic Notions  Solving ax+by=d=gcd(a,b)  Congruence  The Chinese Remainder Theorem  Fermat’s Little Theorem and Euler’s Theorem  Primitive Root  Inverting Matrices Mod n  Square Roots Mod n  Groups Rings Fields

1 Basic Notions 1.1 Divisibility

1.1 Divisibility (Continued)

1.2 Prime The primes less than 200:

1.2 Prime (Continued)

1.3 Greatest Common Divisor

1.3 Greatest Common Divisor (Continued)

2 Solving ax+by=d=gcd(a,b)

3 Congruences

3.1 Addition, Subtraction, Multiplication

3.1 Addition, Subtraction, Multiplication (Continued)

3.2 Division

3.2 Division (Continued)

3.3 Division (Continued)

3.2 Division (Continued)

4 The Chinese Remainder Theorem

4 The Chinese Remainder Theorem (Continued)

5 Fermat’s Little Theorem and Euler’s Theorem

5 Fermat’s Little Theorem and Euler’s Theorem (Continued)

6 Primitive Root

6 Primitive Root (Continued)

7 Inverting Matrices Mod n

7 Inverting Matrices Mod n (Continued)

8 Square Roots Mod n

8 Square Roots Mod n (Continued)

9 Groups, Rings, Fields 9.1 Groups

9.1 Groups (Continued)

9.2 Rings

9.2 Rings (Continued)

9.3 Fields

Thank you!