Primes in P Manindra Agrawal Neeraj Kayal Nitin Saxena CS300: Technical Paper review by Arpan Agrawal.

Slides:



Advertisements
Similar presentations
AKS Implementation of a Deterministic Primality Algorithm
Advertisements

P vs. NP, AKS, RSA: The Acronyms of Mathematics Awareness Month Emily List Wittenberg University Thank you for the introduction.
Presented by Alex Atkins.  An integer p >= 2 is a prime if its only positive integer divisors are 1 and p.  Euclid proved that there are infinitely.
Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Cryptography and Network Security
Randomness and Computation: Some Prime Examples Great Theoretical Ideas In Computer Science (Steven Rudich) John LaffertyCS Fall 2005 Lecture 22Nov.
PRIMALITY TESTING – its importance for cryptography
WS Algorithmentheorie 03 – Randomized Algorithms (Primality Testing) Prof. Dr. Th. Ottmann.
Prime Numbers: A Recent Discovery, Secure Communications, and Million Dollar Prizes George T. Gilbert TCU January 29, 2003.
1 Deciding Primality is in P M. Agrawal, N. Kayal, N. Saxena Presentation by Adi Akavia.
Computability and Complexity
MS 101: Algorithms Instructor Neelima Gupta
Agrawal-Kayal-Saxena Presented by: Xiaosi Zhou
Primality Testing Patrick Lee 12 July 2003 (updated on 13 July 2003)
Chapter 8 More Number Theory. Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime.
Number Theory Presented by Shrividya Shivkumar and George Frederick.
Lecture 8: Primality Testing and Factoring Piotr Faliszewski
Introduction to Modern Cryptography Lecture 6 1. Testing Primitive elements in Z p 2. Primality Testing. 3. Integer Multiplication & Factoring as a One.
Primality Testing By Ho, Ching Hei Cheung, Wai Kwok.
COM 5336 Cryptography Lecture 7a Primality Testing
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
1 Fingerprint 2 Verifying set equality Verifying set equality v String Matching – Rabin-Karp Algorithm.
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
Deciding Primality is in P M. Agrawal, N. Kayal, N. Saxena Slides by Adi Akavia.
K. -C. Yang and J. -L. Lin National Tsing Hua University
CS470, A.SelcukPublic Key Cryptography1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Manindra Agrawal NUS / IITK
CSE 321 Discrete Structures Winter 2008 Lecture 10 Number Theory: Primality.
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright © The McGraw-Hill Companies, Inc. Permission required.

Information Security and Management 4. Finite Fields 8
The Polynomial Time Algorithm for Testing Primality George T. Gilbert.
RSA Parameter Generation Bob needs to: - find 2 large primes p,q - find e s.t. gcd(e, Á (pq))=1 Good news: - primes are fairly common: there are about.
The Complexity of Primality Testing. What is Primality Testing? Testing whether an integer is prime or not. – An integer p is prime if the only integers.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Pseudorandomness Emanuele Viola Columbia University April 2008.
PRIMES is in P Manindra Agrawal NUS Singapore / IIT Kanpur.
Analyzing and Testing justified Prime Numbers
Primes in P Deterministic polynomial-time algorithm of Agrawal, Kayal and Saxena Presented by Vladimir Braverman.
Great Theoretical Ideas In Computer Science Anupam GuptaCS Fall 2006 Lecture 17Oct 24, 2006Carnegie Mellon University Randomness and Computation:
9/22/15UB Fall 2015 CSE565: S. Upadhyaya Lec 7.1 CSE565: Computer Security Lecture 7 Number Theory Concepts Shambhu Upadhyaya Computer Science & Eng. University.
Additional Classes: co-NP class Krishna Mahesh Deevela Murali.
Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central University 1 Chapter 7 Time Complexity Some slides are in courtesy.
Primality Testing. Introduction The primality test provides the probability of whether or not a large number is prime. Several theorems including Fermat’s.
Lecture 2-3 Basic Number Theory and Algebra. In modern cryptographic systems, the messages are represented by numerical values prior to being encrypted.
CSE 421 Algorithms Richard Anderson Winter 2009 Lecture 4.
MA/CSSE 473 Day 10 Primality Testing. MA/CSSE 473 Day 10 In-class exam: Friday, Sept 28 –You may bring a two-sided 8.5x11 inch piece of paper containing.
Chapter 4 With Question/Answer Animations 1. Chapter Summary Divisibility and Modular Arithmetic - Sec 4.1 – Lecture 16 Integer Representations and Algorithms.
CS480 Cryptography and Information Security
Fuw-Yi Yang1 Textbook: Introduction to Cryptography 2nd ed. By J.A. Buchmann Chap 1 Integers Department of Computer Science and Information Engineering,
PRIMES is in P Manindra Agrawal Neeraj Kayal Nitin Saxena Dept of CSE, IIT Kanpur.
A Prime Example CS Lecture 20 A positive integer p  2 is prime if the only positive integers that divide p are 1 and p itself. Positive integers.
Data Structures and Algorithm Analysis Lecture 23
CSE565: Computer Security Lecture 7 Number Theory Concepts
Probabilistic Algorithms
Handbook of Applied Cryptography - CH4, from 4.1~4.3
Numerical Algorithms x x-1 Numerical Algorithms
ALGORITHM NUMBER THEORY
Randomness and Computation: Some Prime Examples
Topic 24: Finding Prime Numbers, RSA
Mathematical Background: Prime Numbers
Introduction to Cryptography
Great Theoretical Ideas in Computer Science
Deciding Primality is in P
The Largest Known Prime Number
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
Patrick Lee 12 July 2003 (updated on 13 July 2003)
Randomness and Computation: Some Prime Examples
Lecture 2-3 Basic Number Theory and Algebra
Introduction to Proofs
Presentation transcript:

Primes in P Manindra Agrawal Neeraj Kayal Nitin Saxena CS300: Technical Paper review by Arpan Agrawal

Introduction Prime numbers are of fundamental importance in mathematics. Many primality testing algorithm exists. This paper presented the first unconditional deterministic polynomial time algorithm.

Previous Work Numerous efforts were made to find an efficient primality testing algorithm. Miller (1975) gave a deterministic polynomial running time algorithm assuming Extended Riemann Hypothesis. Rabin modified it to yield an unconditional but randomized polynomial time algorithm. Several other algorithms were proposed but none could achieve unconditonal deterministic polynomial running time.

Idea Based on the generalization of Fermat’s Little Theorem to polynomial rings over finite fields which states: Let a ∈ Z, n ∈ N, n ≥ 2, and gcd(a, n) = 1. Then n is prime if and only if: (X + a)^n = X^n + a (mod n) (1)

Idea To reduce the number of coefficients in LHS, Eq.(1) modulo (X^r-1) is evaluated which gives: (X + a)^n = X^n + a(mod X^r−1, n) (2) The problem is that some composite numbers may also satisfy eq. (2). But it is proved that for appropriately chosen r, if several a’s satisfy above equation then n must be a prime power.

Idea It is also established that the number of a’s and the appropriate r are bound by a polynomial in logn. Thus, an unconditional deterministic polynomial time primality testing algorithm is achieved.

Highlights Time Complexity is O ∼ (log n)^(15/2). Simpler proof of correctness as compared of other primality testing algorithms. If Agrawal’s conjecture is established, time complexity can be improved to O ~ (logn)^3. The authors were awarded with Clay Research Award(2002), Fulkerson Prize(2006) and Godel Prize(2006) for the paper.

References mality_v6.pdf rize wal

Thank You!