Dan Boneh Intro. Number Theory Fermat and Euler Online Cryptography Course Dan Boneh.

Slides:



Advertisements
Similar presentations
ElGamal Security Public key encryption from Diffie-Hellman
Advertisements

Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.3 Basic Number Theory.
Primality Testing Patrick Lee 12 July 2003 (updated on 13 July 2003)
Data encryption with big prime numbers
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 18 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
CNS2010handout 8 :: introduction to number theory1 computer and network security matt barrie.
and Factoring Integers (I)
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
Chapter II. THE INTEGERS
CS470, A.SelcukPublic Key Cryptography1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
and Factoring Integers
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2001 Lecture 7 Tuesday, 11/6/01 Number-Theoretic Algorithms Chapter.
Introduction to Computer and Network Security Iliano Cervesato 2 September 2008 – Public-key Encryption.
Dan Boneh Intro. Number Theory Modular e’th roots Online Cryptography Course Dan Boneh.
Dan Boneh Collision resistance Generic birthday attack Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations The RSA trapdoor permutation Online Cryptography Course Dan Boneh.
The RSA Algorithm Based on the idea that factorization of integers into their prime factors is hard. ★ n=p . q, where p and q are distinct primes Proposed.
Dan Boneh Intro. Number Theory Intractable problems Online Cryptography Course Dan Boneh.
Cryptography Lecture 6 Stefan Dziembowski
Introduction to Modular Arithmetic and Public Key Cryptography.
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Information Security and Management 4. Finite Fields 8
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Dan Boneh Public Key Encryption from trapdoor permutations Is RSA a one-way function? Online Cryptography Course Dan Boneh.
Basic Number Theory Divisibility Let a,b be integers with a≠0. if there exists an integer k such that b=ka, we say a divides b which is denoted by a|b.
Dan Boneh Introduction Discrete Probability (crash course) Online Cryptography Course Dan Boneh See also:
Dan Boneh Introduction Discrete Probability (crash course) Online Cryptography Course Dan Boneh.
YSLInformation Security -- Public-Key Cryptography1 Prime and Relatively Prime Numbers Divisors: We say that b  0 divides a if a = mb for some m, where.
Dan Boneh Stream ciphers Pseudorandom Generators Online Cryptography Course Dan Boneh.
CS/ECE Advanced Network Security Dr. Attila Altay Yavuz
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
Tuesday’s lecture: Today’s lecture: One-way permutations (OWPs)
Great Theoretical Ideas in Computer Science for Some.
Dan Boneh Stream ciphers Stream ciphers are semantically secure Online Cryptography Course Dan Boneh Goal: secure PRG ⇒ semantically secure stream cipher.
Great Theoretical Ideas In Computer Science Anupam GuptaCS Fall 2006 Lecture 15Oct 17, 2006Carnegie Mellon University Algebraic Structures: Groups,
Dan Boneh Stream ciphers PRG Security Defs Online Cryptography Course Dan Boneh.
Dan Boneh Intro. Number Theory Arithmetic algorithms Online Cryptography Course Dan Boneh.
Great Theoretical Ideas in Computer Science.
Great Theoretical Ideas In Computer Science COMPSCI 102 Fall 2010 Lecture 16October 27, 2010Duke University Modular Arithmetic and the RSA Cryptosystem.
Cryptography Lecture 14 Arpita Patra © Arpita Patra.
Dan Boneh Public Key Encryption from trapdoor permutations Constructions Online Cryptography Course Dan Boneh Goal: construct chosen-ciphertext secure.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
MA/CSSE 473 Day 10 Primality Testing. MA/CSSE 473 Day 10 In-class exam: Friday, Sept 28 –You may bring a two-sided 8.5x11 inch piece of paper containing.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2014.
Multiplicative Group The multiplicative group of Z n includes every a, 0
L131 Exponential Inverses Finding modular inverses is good enough for decoding simple modular cryptography. However, in RSA encryption consists of exponentiating.
Modular Arithmetic and the RSA Cryptosystem Great Theoretical Ideas In Computer Science Steven RudichCS Spring 2005 Lecture 8Feb 3, 2005Carnegie.
MA/CSSE 473 Day 9 Primality Testing Encryption Intro.
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Number-Theoretic Algorithms
Assignment 4 is due! Assignment 5 is out and is due in two weeks!
Modular Arithmetic and the RSA Cryptosystem
Lecture 3.2: Public Key Cryptography II
RSA Preliminaries.
Cryptography Lecture 22.
Foundations of Network and Computer Security
Cryptography Lecture 21.
Lecture 43 Section 10.1 Wed, Apr 6, 2005
Patrick Lee 12 July 2003 (updated on 13 July 2003)
Cryptography Lecture 18.
Mathematical Background: Groups, Rings, Finite Fields (GF)
Presentation transcript:

Dan Boneh Intro. Number Theory Fermat and Euler Online Cryptography Course Dan Boneh

Dan Boneh Review N denotes an n-bit positive integer. p denotes a prime. Z N = { 0, 1, …, N-1 } (Z N ) * = (set of invertible elements in Z N ) = = { x ∈ Z N : gcd(x,N) = 1 } Can find inverses efficiently using Euclid alg.: time = O(n 2 )

Dan Boneh Fermat’s theorem (1640) Thm: Let p be a prime ∀ x ∈ (Z p ) * : x p-1 = 1 in Z p Example: p= = 81 = 1 in Z 5 So: x ∈ (Z p ) * ⇒ x ⋅ x p-2 = 1 ⇒ x −1 = x p-2 in Z p another way to compute inverses, but less efficient than Euclid

Dan Boneh Application: generating random primes Suppose we want to generate a large random prime say, prime p of length 1024 bits ( i.e. p ≈ ) Step 1: choose a random integer p ∈ [ , ] Step 2: test if 2 p-1 = 1 in Z p If so, output p and stop. If not, goto step 1. Simple algorithm (not the best). Pr[ p not prime ] < 2 -60

Dan Boneh The structure of (Z p ) * Thm (Euler): (Z p ) * is a cyclic group, that is ∃ g ∈ (Z p ) * such that { 1, g, g 2, g 3, …, g p-2 } = (Z p ) * g is called a generator of (Z p ) * Example: p=7. {1, 3, 3 2, 3 3, 3 4, 3 5 } = {1, 3, 2, 6, 4, 5} = (Z 7 ) * Not every elem. is a generator: {1, 2, 2 2, 2 3, 2 4, 2 5 } = {1, 2, 4}

Dan Boneh Order For g ∈ (Z p ) * the set {1, g, g 2, g 3, … } is called the group generated by g, denoted Def: the order of g ∈ (Z p ) * is the size of ord p (g) = | | = (smallest a>0 s.t. g a = 1 in Z p ) Examples: ord 7 (3) = 6 ; ord 7 (2) = 3 ; ord 7 (1) = 1 Thm (Lagrange): ∀ g ∈ (Z p ) * : ord p (g) divides p-1

Dan Boneh Euler’s generalization of Fermat (1736) Def: For an integer N define ϕ (N) = | (Z N ) * | (Euler’s ϕ func.) Examples: ϕ (12) = | {1,5,7,11} | = 4 ; ϕ (p) = p-1 For N=p ⋅ q:ϕ (N) = N-p-q+1 = (p-1)(q-1) Thm (Euler): ∀ x ∈ (Z N ) * : x ϕ(N) = 1 in Z N Example: 5 ϕ(12) = 5 4 = 625 = 1 in Z 12 Generalization of Fermat. Basis of the RSA cryptosystem

Dan Boneh End of Segment