 Why the course?  Introduction to Number Theory  The make-up of the seminar  Interdisciplinary collaboration 1.

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

Review for CS1050. Review Questions Without using truth tables, prove that  (p  q)   q is a tautology. Prove that the sum of an even integer and an.
Cryptography and Network Security
Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
Sets, Combinatorics, Probability, and Number Theory Mathematical Structures for Computer Science Chapter 3 Copyright © 2006 W.H. Freeman & Co.MSCS Slides.
1 Section 2.4 The Integers and Division. 2 Number Theory Branch of mathematics that includes (among other things): –divisibility –greatest common divisor.
22C:19 Discrete Structures Integers and Modular Arithmetic
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
hap8.html#chap8ex5.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Number Theory and Cryptography
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Congruence class arithmetic. Definitions: a ≡ b mod m iff a mod m = b mod m. a  [b] iff a ≡ b mod m.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Congruence of Integers
What is the best way to start? 1.Plug in n = 1. 2.Factor 6n 2 + 5n Let n be an integer. 4.Let n be an odd integer. 5.Let 6n 2 + 5n + 4 be an odd.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Copyright © Cengage Learning. All rights reserved.
RSA Question 2 Bob thinks that p and q are primes but p isn’t. Then, Bob thinks ©Bob:=(p-1)(q-1) = Á(n). Is this true ? Bob chooses a random e (1 < e
Codes, Ciphers, and Cryptography-RSA Encryption
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
prime numbers: facts and discoveries
BY MISS FARAH ADIBAH ADNAN IMK
The RSA Algorithm Rocky K. C. Chang, March
© by Kenneth H. Rosen, Discrete Mathematics & its Applications, Sixth Edition, Mc Graw-Hill, 2007 Chapter 3 (Part 2): The Fundamentals: Algorithms, the.
9/2/2015Discrete Structures1 Let us get into… Number Theory.
(CSC 102) Discrete Structures Lecture 10.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
February 24, 2015Applied Discrete Mathematics Week 4: Number Theory 1 Modular Arithmetic Let a be an integer and m be a positive integer. We denote by.
MATH 224 – Discrete Mathematics
RSA and its Mathematics Behind
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Copyright © Curt Hill Divisibility and Modular Arithmetic A Topic in Number Theory.
Chapter 3 Elementary Number Theory and Methods of Proof.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
IELM 511: Information System design Introduction Part 1. ISD for well structured data – relational and other DBMS Part 2. ISD for systems with non-uniformly.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
Governor’s School for the Sciences Mathematics Day 5.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
Chinese Remainder Theorem Dec 29 Picture from ………………………
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
Chapter 2 (Part 1): The Fundamentals: Algorithms, the Integers & Matrices The Integers and Division (Section 2.4)
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
Theorem The square of any odd integer has the form 8m + 1 for some integer m.
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
RSA cryptosystem--preview Suppose n=p  q and  (n)=(p-1)(q-1), where p and q are big primes. Select (find) a and b, such that a  b=1 mod  (n). K=(n,p,q,a,b),
Chapter 12: Cryptography MAT 320 Spring Cryptography: Basic Ideas We want to encode information so that no one other than the intended recipient.
Public Key Cryptography 2 RSA. Lemma 1 Let s and t be relatively prime. Then Proof: Let be given by First we show that  actually maps Then we show 
Discrete Mathematics 4. NUMBER THEORY Lecture 7 Dr.-Ing. Erwin Sitompul
Prove that: odd + odd = even even + even = even odd + even = odd even + odd = odd.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
SOA Seminar1 Seminar on Service Oriented Architecture RSA.
Ch04-Number Theory and Cryptography 1. Introduction to Number Theory Number theory is about integers and their properties. We will start with the basic.
Dr. Saatchi, Seyed Mohsen 1 Arab Open University - AOU T209 Information and Communication Technologies: People and Interactions Sixth Session.
Chapter 4 With Question/Answer Animations 1. Chapter Motivation Number theory is the part of mathematics devoted to the study of the integers and their.
Number Theory Lecture 1 Text book: Discrete Mathematics and its Applications, 7 th Edition.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Chapter 3 The Fundamentals: Algorithms, the integers, and matrices Section 3.4: The integers and division Number theory: the part of mathematics involving.
Dr Nazir A. Zafar Advanced Algorithms Analysis and Design Advanced Algorithms Analysis and Design By Dr. Nazir Ahmad Zafar.
Direct Proof and Counterexample IV: Division into Cases and the Quotient-Remainder Theorem For each of the following values of n and d, find integers q.
CS 210 Discrete Mathematics The Integers and Division (Section 3.4)
Affine Cipher.
Prelude to Public-Key Cryptography
Analytic Number Theory MTH 435
Topic Past Papers –Proofs
Presentation transcript:

 Why the course?  Introduction to Number Theory  The make-up of the seminar  Interdisciplinary collaboration 1

 Enrichment  The needs of an advanced student  Further benefits 2

 Student ownership of the course  Student-teaching-students  Team oriented  Presentations, discussions, assignments, mini-projects 3

 Technology ◦ Excel ◦ C++ programming  An example: Application of the Euclidean Algorithm 4

4.2

4.3

 In summary, p=12553, q = 13006, m = pq = , and k =  Now to send the message “To be or not to be”, set the cipher shift A = 11, B = 12, and so on, and this message becomes the string of digits:

4.5

 The encoded message is the list of numbers: , , ,

 Now let’s try decoding a new message. It’s midnight, there’s a knock at our door, and a mysterious messenger delivers the following cryptic missive: , , , , Use the k th modulo m computing method to solve the congruences. 4.7

x = (mod ) x = x = (mod ) x = x = (mod ) x = x = (mod ) x = x = (mod ) x =

 This gives you the string of digits:  And now you use the number to letter substitution table for the final decoding step.  THOMPSONISINTROUBLE 4.9

 Supplying the obvious word breaks and punctuation, you read:  “Thompson is in trouble”  And off you go to the rescue 4.10

 Increases student involvement  Learning by exploration  Getting back to formal mathematics  Broadening the student’s mathematical horizon 5

The Idea Behind the Proof:  p 2 – 1 = (p + 1) (p – 1)  p + 1 and p – 1 are consecutive even numbers  (p + 1) (p – 1) = 2(i) * 2 (i + 1)  i is either even or odd integer 6.1 Suppose p > 3 is a prime number, Then 24 l p 2 – 1

 All prime numbers > 3 are odd, so p + 1 and p – 1 are consecutive even numbers and can be written as:  (p – 1) (p + 1) = 2 (i) * 2 (i + 1)  p-1, p and p+1 are three consecutive integers. One of three consecutive integers must be divisible by 3.  p is not divisible by 3, since p is a prime number, therefore either p + 1, or p – 1 is divisible by

 Case 1:  (p + 1) (p – 1) = 2(i) * 2 (i + 1)  If i is even, let i = 2j, j = integer, then (p – 1)(p + 1) = 2(2j) *2((2j) + 1) = 8j(2j + 1)  Either j or 2j+ 1 is divisible by 3  If j is divisible by 3, then j = 3k  p 2 – 1= 8j(2j + 1) = 8(3k)(2j + 1) = 24(k(2j + 1))  If 2j + 1 is divisible by 3, then 2j + 1 = 3k p 2 – 1= 8j(2j + 1) = 8(j)(3k) = 24(jk)  Thus, if i is even then p 2 – 1 is divisible by

 Case 2:  (p + 1) (p – 1) = 2(i) * 2 (i + 1)  If i is odd, let i = 2j + 1, j = integer, then (p – 1) (p + 1) = 2(2j + 1) *2((2j + 1) + 1) = 2(2j + 1) *4(j + 1) = 8(2j + 1)(j + 1)  Either 2j + 1 or j + 1 is divisible by 3  If 2j + 1 is divisible by 3, then 2j + 1 = 3k  p 2 – 1= 8(3k)(2j + 1) = 24(k(2j + 1))  If j + 1 is divisible by 3, then j + 1 = 3k p 2 – 1= 8(2j + 1)(3k) = 24(2j + 1)(k)  Thus, if i is odd then p 2 – 1 is divisible by

 Summary:  Case 1: ◦ p 2 – 1= 24(k(2j + 1)) or ◦ p 2 – 1= 24(jk)  Case 2: ◦ p 2 – 1= 24(k(2j + 1)) or ◦ p 2 – 1= 24(2j + 1)(k) Therefore, 24 l p 2 – 1 6.5

 Topics are interchangeable  Disciplines are interchangeable 7

 Questions?