Congruence and Sets Discrete Structures (CS 173) Madhusudan Parthasarathy, University of Illinois Dali - “The Persistence of Memory” 1.

Slides:



Advertisements
Similar presentations
Mod arithmetic.
Advertisements

CRT RSA Algorithm Protected Against Fault Attacks WISTP - 5/10/07 Arnaud BOSCHER Spansion EMEA Robert NACIRI Oberthur Card Systems Emmanuel PROUFF Oberthur.
Chapter 4 – Finite Fields. Introduction will now introduce finite fields of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key.
The Integers and Division. Outline Division: Factors, multiples Exercise 2.3 Primes: The Fundamental Theorem of Arithmetic. The Division Algorithm Greatest.
The Divisibility & Modular Arithmetic: Selected Exercises Goal: Introduce fundamental number theory concepts: The division algorithm Congruences Rules.
COMP 170 L2 Page 1 Part 2 of Course Chapter 2 of Textbook.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
Congruence of Integers
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
CSE 20 DISCRETE MATH Prof. Shachar Lovett Clicker frequency: CA.
Mathematics1 Mathematics 1 Applied Informatics Štefan BEREŽNÝ.
Week 8 - Wednesday.  What did we talk about last time?  Cardinality  Countability  Relations.
CS555Spring 2012/Topic 61 Cryptography CS 555 Topic 6: Number Theory Basics.
MATH 224 – Discrete Mathematics
Mathematics of Cryptography Modular Arithmetic, Congruence,
Section 4.3: Fermat’s Little Theorem Practice HW (not to hand in) From Barr Text p. 284 # 1, 2.
Prep Math Competition, Lec. 1Peter Burkhardt1 Number Theory Lecture 1 Divisibility and Modular Arithmetic (Congruences)
Copyright © Curt Hill Divisibility and Modular Arithmetic A Topic in Number Theory.
Chapter The Integers and Division Division
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Unit 3 Lesson 2: Rational Expressions
CS 103 Discrete Structures Lecture 10 Basic Structures: Sets (1)
Computational Number Theory - traditional number theory Prime Numbers Factors Counting Factors D- functions.
Foundations of Computing I CSE 311 Fall It’s Boolean algebra again Definition for  based on  Definition for  based on  Complement works like.
Graphs and Isomorphisms Discrete Structures (CS 173) Madhusudan Parthasarathy, University of Illinois Backyards of Old Houses in Antwerp in the Snow Van.
Elements of Coding and Encryption 1. Encryption In the modern word, it is crucial that the information is transmitted safely. For example, Internet purchases,
CSE 20: Discrete Mathematics for Computer Science Prof. Shachar Lovett.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
Relations Discrete Structures (CS 173)
David Kauchak CS52 – Spring 2015
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
Graphs and 2-Way Bounding Discrete Structures (CS 173) Madhusudan Parthasarathy, University of Illinois 1 /File:7_bridgesID.png.
01/29/13 Number Theory: Factors and Primes Discrete Structures (CS 173) Madhusudan Parthasarathy, University of Illinois Boats of Saintes-Maries Van Gogh.
Internet Engineering Czesław Smutnicki Discrete Mathematics – Numbers Theory.
Modular Arithmetic Warmup. Computing powers What is 3 2 (mod 7)? 3 2 = 9 = 2 (mod 7) What is 3 25 (mod 7)? 3 25 = (3 12 ) 2 × = (3 6 ) = (3.
RSA Encryption © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
EPFL-IC-IIF-LACAL Marcelo E. Kaihara April 27 th, 2007 Algorithms for public-key cryptology Montgomery Arithmetic.
Foundations of Computing I CSE 311 Fall Review: Division Theorem Let a be an integer and d a positive integer. Then there are unique integers q.
Fermat’s Little Theorem The RSA Cryptosystem will require exponentiation to decrypt messages. Exponentiation Notation Example 1: Compute Exponentials Example.
Introduction to Number Theory
Lecture 3.1: Public Key Cryptography I CS 436/636/736 Spring 2015 Nitesh Saxena.
9.1 Primes and Related Congruence Equations 23 Sep 2013.
Unit 2 Modular Arithmetic and Cryptography IT Disicipline ITD1111 Discrete Mathematics & Statistics STDTLP 1 Unit 2 Modular Arithmetic and Cryptography.
Introduction to Elliptic Curves CSCI 5857: Encoding and Encryption.
Discrete Mathematics
Cryptography Lecture 14 Arpita Patra © Arpita Patra.
Divisibility and Modular Arithmetic
01/24/13 Strategies for Proofs Discrete Structures (CS 173) Madhusudan Parthasarathy, University of Illinois Landscape with House and Ploughman Van Gogh.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
CS480 Cryptography and Information Security
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 3. Mathematics of Cryptography.
Chapter 4 With Question/Answer Animations 1. Chapter Motivation Number theory is the part of mathematics devoted to the study of the integers and their.
Week 8 - Monday.  What did we talk about last time?  Properties of functions  One-to-one  Onto  Inverses  Cardinality.
Week 8 - Wednesday.  What did we talk about last time?  Relations  Properties of relations  Reflexive  Symmetric  Transitive.
CSE 311 Foundations of Computing I Lecture 12 Modular Arithmetic and Applications Autumn 2012 CSE
Number-Theoretic Algorithms
Lecture 3.2: Public Key Cryptography II
Applied Discrete Mathematics Week 4: Number Theory
NUMBER THEORY.
Discrete Math for CS CMPSC 360 LECTURE 12 Last time: Stable matching
Modular Arithmetic and Change of Base
Lecture 43 Section 10.1 Wed, Apr 6, 2005
Topic 1: Be able to combine functions and determine the resulting function. Topic 2: Be able to find the product of functions and determine the resulting.
CSE 321 Discrete Structures
Section 10.3 Modular Arithmetic
Miniconference on the Mathematics of Computation
Lecture 3 Strings and Things (Section 1.1)
Section 9.3 Modular Arithmetic.
Presentation transcript:

Congruence and Sets Discrete Structures (CS 173) Madhusudan Parthasarathy, University of Illinois Dali - “The Persistence of Memory” 1

Review of Last Class 2

Goals of this lecture 3

Applications of congruence bitwise operations error checking computing 2D coordinates in images encryption telling time etc. 4

Congruence mod k 5

Examples of congruent mod k 6 overhead

7

8

9

Modulus addition proof 10 overhead

11

Modulus multiplication proof 12 overhead

Equivalence classes with modulus 13

Modulus arithmetic 14 overhead

RSA Key Generation 15

Rationals 16

Reals 17

Another congruence proof 18 overhead

Sets Topics: lists, set builders, tuples vs. sets, equivalence, cardinality, subsets and supersets 19 overhead

Things to remember Concept of congruence mod k, it’s definition in terms of divide, and equivalence classes – Many applications in CS The key to modular arithmetic is keeping numbers small Concept of sets and set equivalence 20

Thank you Next week: sets and relations 21