Internet Engineering Czesław Smutnicki Discrete Mathematics – Numbers Theory.

Slides:



Advertisements
Similar presentations
Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Advertisements

1 Lect. 12: Number Theory. Contents Prime and Relative Prime Numbers Modular Arithmetic Fermat’s and Euler’s Theorem Extended Euclid’s Algorithm.
CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
Section 4.1: Primes, Factorization, and the Euclidean Algorithm Practice HW (not to hand in) From Barr Text p. 160 # 6, 7, 8, 11, 12, 13.
1 Section 2.4 The Integers and Division. 2 Number Theory Branch of mathematics that includes (among other things): –divisibility –greatest common divisor.
Data encryption with big prime numbers
22C:19 Discrete Structures Integers and Modular Arithmetic
Chapter Primes and Greatest Common Divisors ‒Primes ‒Greatest common divisors and least common multiples 1.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Number Theory(L5) Number Theory Number Theory(L5).
CSC2110 Discrete Mathematics Tutorial 5 GCD and Modular Arithmetic
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
6/20/2015 5:05 AMNumerical Algorithms1 x x1x
Chapter 4 – Finite Fields Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2001 Lecture 7 Tuesday, 11/6/01 Number-Theoretic Algorithms Chapter.
CSE 311 Foundations of Computing I Lecture 12 Primes, GCD, Modular Inverse Spring
CS555Spring 2012/Topic 61 Cryptography CS 555 Topic 6: Number Theory Basics.
Peter Lam Discrete Math CS.  Sometimes Referred to Clock Arithmetic  Remainder is Used as Part of Value ◦ i.e Clocks  24 Hours in a Day However, Time.
Software Security Seminar - 1 Chapter 11. Mathematical Background 발표자 : 안병희 Applied Cryptography.
Great Theoretical Ideas in Computer Science.
Introduction to Modular Arithmetic and Public Key Cryptography.
Mathematics of Cryptography Part I: Modular Arithmetic
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
MATH 224 – Discrete Mathematics
Module :MA3036NI Cryptography and Number Theory Lecture Week 7
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
RSA and its Mathematics Behind
Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
© 2005 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. Data Structures for Java William H. Ford William R. Topp Chapter 28 Number.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
YSLInformation Security -- Public-Key Cryptography1 Prime and Relatively Prime Numbers Divisors: We say that b  0 divides a if a = mb for some m, where.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
Chinese Remainder Theorem Dec 29 Picture from ………………………
Fall 2002CS 395: Computer Security1 Chapters 4 and 8: The Mathematics Required for Public Key Cryptography In case you’re beginning to worry that this.
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
1 Network and Computer Security (CS 475) Modular Arithmetic and the RSA Public Key Cryptosystem Jeremy R. Johnson.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
Ch1 - Algorithms with numbers Basic arithmetic Basic arithmetic Addition Addition Multiplication Multiplication Division Division Modular arithmetic Modular.
Great Theoretical Ideas in Computer Science for Some.
AF2. Turn off your phones Primes, gcd, some examples, reading.
Introduction to Number Theory Department of Computer Engineering Sharif University of Technology 3/8/2006.
CSE 311: Foundations of Computing Fall 2013 Lecture 12: Primes, GCD, modular inverse.
Discrete Mathematics
Great Theoretical Ideas In Computer Science COMPSCI 102 Fall 2010 Lecture 16October 27, 2010Duke University Modular Arithmetic and the RSA Cryptosystem.
Lecture 2-3 Basic Number Theory and Algebra. In modern cryptographic systems, the messages are represented by numerical values prior to being encrypted.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
AF2. Turn off your phones Primes, gcd, some examples, reading.
1 Discrete Structures – CNS2300 Text Discrete Mathematics and Its Applications Kenneth H. Rosen (5 th Edition) Chapter 2 The Fundamentals: Algorithms,
The Fundamentals: Algorithms, Integers, and Matrices CSC-2259 Discrete Structures Konstantin Busch - LSU1.
CS480 Cryptography and Information Security
Great Theoretical Ideas in Computer Science.
Internet Engineering Czesław Smutnicki Discrete Mathematics – Cryptography.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
Number-Theoretic Algorithms
Discrete Math II Howon Kim
Mathematical Background for Cryptography: Modular arithmetic and gcd
Mathematics of Cryptography
Advanced Algorithms Analysis and Design
Integers and Division Section 3.4.
Number-Theoretic Algorithms (UNIT-4)
Number Theory (Chapter 7)
Topic 6: Number Theory Basics
Prime and Relatively Prime Numbers
Discrete Math for CS CMPSC 360 LECTURE 12 Last time: Stable matching
CMSC 203, Section 0401 Discrete Structures Fall 2004 Matt Gaston
Number Theory.
Lecture 2-3 Basic Number Theory and Algebra
Presentation transcript:

Internet Engineering Czesław Smutnicki Discrete Mathematics – Numbers Theory

CONTENT S Basic notions Greatest common divisor Modular arithmetics Euclide an algorithm Modular equations Chinese theorem Modular powers Prime numbers RSA algorithm Decomposition into factors

BASIC NOTIONS Natural/integer numbers Divisor d|a, a = kd for some integer k d|a if and only if -d|a Divisor: 24: 1,2,3,4,6,8,12,24 Trivial divisors 1 and a Prime number 2,3,5,7,11,13,17,19,23,29,31,37,41,43,47,53,59 Compos ite number, 27 (3|27) For any integer a and any positive integer n there exist unique integers q and r, 0<=r<n so that a = qn + r Residue r = a mod n Division q = [a/n] Congruence: a  b (mod n) if (a mod n) = (b mod n) Equivalence class (mod n): [a] n = {a + kn : k  Z}

GREATEST COMMON DIVISOR Common divisor: if d|a and d|b d|(ax + by) Relatively prime numbers a and b : gcd(a,b)=1

MODULAR ARITHMETIC

EUCLIDE AN ALGORITHM

EUCLIDE AN ALGORITHM. INSTANCE

EUCLIDE AN ALGORITHM. INSTANCE cont.

MODULAR EQUATIONS EQUATION EITHER HAS d VARIOUS SOLUTIONS mod n OR DOES NOT HAVE ANY SOLUTION CASE b = 1: MULTIPLICATIVE INVERSE (IF gcd(a,n)=1 THEN IT EXISTS AND IS UNIQUE)

LEAST COMMON MULTIPLIER

CHINESE THEOREM

MODULAR POWERS

RSA ALGORITHM Find two big prime numbers p and q Calculate n=p*q and z=(p-1)*(q-1) Find any number d relatively prime with z Find number e so that (e*d) mod z=1 Public key (e,n) Private key (d,n) Encryption message PDecryption C

Thank you for your attention DISCRETE MATHEMATICS Czesław Smutnicki