Fermat’s Little Theorem The RSA Cryptosystem will require exponentiation to decrypt messages. Exponentiation Notation Example 1: Compute Exponentials Example.

Slides:



Advertisements
Similar presentations
RSA.
Advertisements

Modular Arithmetic Several important cryptosystems make use of modular arithmetic. This is when the answer to a calculation is always in the range 0 –
Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
COMP 170 L2 Page 1 L06: The RSA Algorithm l Objective: n Present the RSA Cryptosystem n Prove its correctness n Discuss related issues.
CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
Section 4.1: Primes, Factorization, and the Euclidean Algorithm Practice HW (not to hand in) From Barr Text p. 160 # 6, 7, 8, 11, 12, 13.
Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r p q p q p q p and q prime.
Data encryption with big prime numbers
22C:19 Discrete Structures Integers and Modular Arithmetic
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
COMP 170 L2 Page 1 Part 2 of Course Chapter 2 of Textbook.
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Cryptography & Number Theory
Algebra 1c 1-3 Exponential Notation Objective (things to learn): How to solve problems containing exponents. First we will start off with learning the.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2001 Lecture 7 Tuesday, 11/6/01 Number-Theoretic Algorithms Chapter.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Arithmetic.
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright © The McGraw-Hill Companies, Inc. Permission required.
The Fundamentals: Algorithms, Integers, and Matrices CSC-2259 Discrete Structures Konstantin Busch - LSU1.
Section 4.3: Fermat’s Little Theorem Practice HW (not to hand in) From Barr Text p. 284 # 1, 2.
RSA and its Mathematics Behind
What are quadratic equations, and how can we solve them? Do Now: (To turn in) What do you know about quadratic equations? Have you worked with them before?
Warm up. 3.4 Solving Exponential & Logarithmic Equations Standards 13, 14.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
 To simplify expressions containing positive integral exponents.  To solve exponential equations.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
Elements of Coding and Encryption Continuation 1.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
CSE 311: Foundations of Computing Fall 2014 Lecture 12: Primes, GCD.
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
CS Modular Division and RSA1 RSA Public Key Encryption To do RSA we need fast Modular Exponentiation and Primality generation which we have shown.
Ch1 - Algorithms with numbers Basic arithmetic Basic arithmetic Addition Addition Multiplication Multiplication Division Division Modular arithmetic Modular.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Modular Arithmetic Warmup. Computing powers What is 3 2 (mod 7)? 3 2 = 9 = 2 (mod 7) What is 3 25 (mod 7)? 3 25 = (3 12 ) 2 × = (3 6 ) = (3.
Students will be able to: Use multiplication properties of exponents to evaluate and simplify expressions. Objective 8.1.
Introduction to Number Theory
Lecture 3.1: Public Key Cryptography I CS 436/636/736 Spring 2015 Nitesh Saxena.
9.1 Primes and Related Congruence Equations 23 Sep 2013.
CSE 311: Foundations of Computing Fall 2013 Lecture 12: Primes, GCD, modular inverse.
Great Theoretical Ideas in Computer Science.
Lecture 2-3 Basic Number Theory and Algebra. In modern cryptographic systems, the messages are represented by numerical values prior to being encrypted.
Cryptography Lecture 14 Arpita Patra © Arpita Patra.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
Chapter 1 Algorithms with Numbers. Bases and Logs How many digits does it take to represent the number N >= 0 in base 2? With k digits the largest number.
The Fundamentals: Algorithms, Integers, and Matrices CSC-2259 Discrete Structures Konstantin Busch - LSU1.
CS480 Cryptography and Information Security
L131 Exponential Inverses Finding modular inverses is good enough for decoding simple modular cryptography. However, in RSA encryption consists of exponentiating.
Laws of Exponents Practice using PowerPoint Joe Hill Director of Math and Technology Rockingham County Public Schools
Copyright © Zeph Grunschlag, RSA Encryption Zeph Grunschlag.
Number-Theoretic Algorithms
Public Key Encryption Major topics The RSA scheme was devised in 1978
Chapter Applications of Number Theory Some Useful Results
Exponents exponent power base.
Warm Ups Preview 4-1 Exponents 4-2 Integer Exponents
CS 2210:0001Discrete Structures Modular Arithmetic and Cryptography
Exponential Functions
Solving Exponential Equations
Number Theory (Chapter 7)
NUMBER THEORY.
Private-Key Cryptography
Exponential Functions
Lecture 2-3 Basic Number Theory and Algebra
Presentation transcript:

Fermat’s Little Theorem The RSA Cryptosystem will require exponentiation to decrypt messages. Exponentiation Notation Example 1: Compute Exponentials Example 1 Example 2: compute Exponential Mod Example 2 In Example 2 it is seen that modulus arithmetic on small exponentials is easy. However, Modular arithmetic on large numbers can be quite difficult and is subject to computer errors due to computer round off. – Example: Large exponential… Example

Exponential Notation All laws of exponents in the real number system carry over to MOD arithmetic, except division. Laws of Exponents Method of Successive Squaring for Arithmetic Modulo m – Step 1: Break the exponent down into the sum of powers of 2. – Step 2: Write the base as a succession of the same base with the exponents from step 1. – Step 3: Write the base to each power of 2, up to the highest one used from step 1 (1, 2, 4, 8, …, highest), and perform the modular arithmetic on these. – Step 4: Multiply the numbers obtained in 3 modulo m. – Example 3: Compute Modulo 23 Example 3 – Example 4: Compute Modulo 41… Example 4

Fermat’s Little Theorem Example 5: Compute powers modulo m Example 5 Example 6: Solve Equation…! Example 6