Notation Intro. Number Theory Online Cryptography Course Dan Boneh

Slides:



Advertisements
Similar presentations
Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Advertisements

Section 4.1: Primes, Factorization, and the Euclidean Algorithm Practice HW (not to hand in) From Barr Text p. 160 # 6, 7, 8, 11, 12, 13.
Primality Testing Patrick Lee 12 July 2003 (updated on 13 July 2003)
CSE 311 Foundations of Computing I Lecture 13 Number Theory Autumn 2012 CSE
ACM Workshop Number Theory.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
CSE115/ENGR160 Discrete Mathematics 03/13/12 Ming-Hsuan Yang UC Merced 1.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
Number Theory(L5) Number Theory Number Theory(L5).
CSC2110 Discrete Mathematics Tutorial 5 GCD and Modular Arithmetic
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
Chapter II. THE INTEGERS
6/20/2015 5:05 AMNumerical Algorithms1 x x1x
CS470, A.SelcukPublic Key Cryptography1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CSE 321 Discrete Structures Winter 2008 Lecture 8 Number Theory: Modular Arithmetic.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2001 Lecture 7 Tuesday, 11/6/01 Number-Theoretic Algorithms Chapter.
Introduction to Computer and Network Security Iliano Cervesato 2 September 2008 – Public-key Encryption.
Great Theoretical Ideas in Computer Science.
Dan Boneh Intro. Number Theory Modular e’th roots Online Cryptography Course Dan Boneh.
Dan Boneh Intro. Number Theory Intractable problems Online Cryptography Course Dan Boneh.
CSE 311 Foundations of Computing I Lecture 12 Primes, GCD, Modular Inverse Spring
CS555Spring 2012/Topic 61 Cryptography CS 555 Topic 6: Number Theory Basics.
Peter Lam Discrete Math CS.  Sometimes Referred to Clock Arithmetic  Remainder is Used as Part of Value ◦ i.e Clocks  24 Hours in a Day However, Time.
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
Great Theoretical Ideas in Computer Science.
9/2/2015Discrete Structures1 Let us get into… Number Theory.
Mathematics of Cryptography Part I: Modular Arithmetic
COMP 170 L2 Page 1 L05: Inverses and GCDs l Objective: n When does have an inverse? n How to compute the inverse? n Need: Greatest common dividers (GCDs)
Module :MA3036NI Cryptography and Number Theory Lecture Week 7
Mathematics of Cryptography Modular Arithmetic, Congruence,
CS 312: Algorithm Analysis Lecture #4: Primality Testing, GCD This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.Creative.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Copyright © Zeph Grunschlag, Basic Number Theory Zeph Grunschlag.
YSLInformation Security -- Public-Key Cryptography1 Prime and Relatively Prime Numbers Divisors: We say that b  0 divides a if a = mb for some m, where.
CS/ECE Advanced Network Security Dr. Attila Altay Yavuz
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
Math 409/409G History of Mathematics Books VII – IX of the Elements Part 1: Divisibility.
CS Modular Division and RSA1 RSA Public Key Encryption To do RSA we need fast Modular Exponentiation and Primality generation which we have shown.
MA/CSSE 473 Day 08 Extended Euclid's Algorithm Modular Division Fermat's little theorem.
CSE 311 Foundations of Computing I Lecture 14 Euclid’s Algorithm Mathematical Induction Autumn 2012 CSE
Tuesday’s lecture: Today’s lecture: One-way permutations (OWPs)
Ch1 - Algorithms with numbers Basic arithmetic Basic arithmetic Addition Addition Multiplication Multiplication Division Division Modular arithmetic Modular.
Great Theoretical Ideas in Computer Science for Some.
Dan Boneh Stream ciphers PRG Security Defs Online Cryptography Course Dan Boneh.
Lecture 3.1: Public Key Cryptography I CS 436/636/736 Spring 2015 Nitesh Saxena.
Dan Boneh Intro. Number Theory Fermat and Euler Online Cryptography Course Dan Boneh.
15-499Page :Algorithms and Applications Cryptography II – Number theory (groups and fields)
CSE 311: Foundations of Computing Fall 2013 Lecture 12: Primes, GCD, modular inverse.
Dan Boneh Intro. Number Theory Arithmetic algorithms Online Cryptography Course Dan Boneh.
Great Theoretical Ideas In Computer Science COMPSCI 102 Fall 2010 Lecture 16October 27, 2010Duke University Modular Arithmetic and the RSA Cryptosystem.
Cryptography Lecture 14 Arpita Patra © Arpita Patra.
Ch04-Number Theory and Cryptography 1. Introduction to Number Theory Number theory is about integers and their properties. We will start with the basic.
Great Theoretical Ideas in Computer Science.
Number-Theoretic Algorithms
Mathematics of Cryptography
MA/CSSE 473 Day 06 Euclid's Algorithm.
CSE 311 Foundations of Computing I
Number Theory and Modular Arithmetic
Numerical Algorithms x x-1
Number Theory (Chapter 7)
Prime and Relatively Prime Numbers
Lecture 20 Guest lecturer: Neal Gupta
Discrete Math for CS CMPSC 360 LECTURE 12 Last time: Stable matching
Copyright © Zeph Grunschlag,
Modular Inverses Recall the simple encryption function
Cryptography Lecture 16.
Cryptography Lecture 19.
Presentation transcript:

Notation Intro. Number Theory Online Cryptography Course Dan Boneh In the last module we saw that number theory can be useful for key exchange. In this module we will review some basic facts from number theory that will help us build many public key systems next week. As we go through the material it might help to pause the video from time to time to make sure all the examples are clear.

Background We will use a bit of number theory to construct: Key exchange protocols Digital signatures Public-key encryption This module: crash course on relevant concepts More info: read parts of Shoup’s book referenced at end of module

Notation From here on: N denotes a positive integer. p denote a prime. Can do addition and multiplication modulo N ZN = {0,1,…,n-1}

Modular arithmetic Examples: let N = 12 9 + 8 = 5 in 5 × 7 = 11 in Arithmetic in works as you expect, e.g x⋅(y+z) = x⋅y + x⋅z in

Greatest common divisor Def: For ints. x,y: gcd(x, y) is the greatest common divisor of x,y Example: gcd( 12, 18 ) = 6 Fact: for all ints. x,y there exist ints. a,b such that a⋅x + b⋅y = gcd(x,y) a,b can be found efficiently using the extended Euclid alg. If gcd(x,y)=1 we say that x and y are relatively prime Example: 2*12 – 18 = 6

Modular inversion Over the rationals, inverse of 2 is ½ . What about ? Def: The inverse of x in is an element y in s.t. y is denoted x-1 . Example: let N be an odd integer. The inverse of 2 in is x . y = 1 in Zn

Modular inversion Which elements have an inverse in ? Lemma: x in has an inverse if and only if gcd(x,N) = 1 Proof: gcd(x,N)=1 ⇒ ∃ a,b: a⋅x + b⋅N = 1 gcd(x,N) > 1 ⇒ ∀a: gcd( a⋅x, N ) > 1 ⇒ a⋅x ≠ 1 in

More notation Def: = (set of invertible elements in ) = = { x∈ : gcd(x,N) = 1 } Examples: for prime p, = { 1, 5, 7, 11} For x in , can find x-1 using extended Euclid algorithm.

Solving modular linear equations Solve: a⋅x + b = 0 in Solution: x = −b⋅a-1 in Find a-1 in using extended Euclid. Run time: O(log2 N) What about modular quadratic equations? next segments

End of Segment