High order procedures Primality testing The RSA cryptosystem

Slides:



Advertisements
Similar presentations
WS Algorithmentheorie 03 – Randomized Algorithms (Primality Testing) Prof. Dr. Th. Ottmann.
Advertisements

22C:19 Discrete Structures Integers and Modular Arithmetic
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Introduction to Modern Cryptography Lecture 6 1. Testing Primitive elements in Z p 2. Primality Testing. 3. Integer Multiplication & Factoring as a One.
Primality Testing By Ho, Ching Hei Cheung, Wai Kwok.
מבוא מורחב 1 Lecture #6. מבוא מורחב 2 Primality testing (application) Know how to test whether n is prime in  (log n) time => Can easily find very large.
מבוא מורחב 1 Lecture 4 Material in the textbook on Pages 44-46, of 2nd Edition Sections and Hanoy towers.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
7. Asymmetric encryption-
Great Theoretical Ideas in Computer Science.
1 Fingerprint 2 Verifying set equality Verifying set equality v String Matching – Rabin-Karp Algorithm.
מבוא מורחב - שיעור 6 1 Lecture 6 High order procedures Primality testing The RSA cryptosystem.
Cryptography Lecture 11: Oct 12. Cryptography AliceBob Cryptography is the study of methods for sending and receiving secret messages. adversary Goal:
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
CSE 321 Discrete Structures Winter 2008 Lecture 8 Number Theory: Modular Arithmetic.
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
The RSA Algorithm Based on the idea that factorization of integers into their prime factors is hard. ★ n=p . q, where p and q are distinct primes Proposed.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Topic 18: RSA Implementation and Security
RSA Parameter Generation Bob needs to: - find 2 large primes p,q - find e s.t. gcd(e, Á (pq))=1 Good news: - primes are fairly common: there are about.
MA/CSSE 473 Day 08 Randomized Primality Testing Carmichael Numbers Miller-Rabin test.
The Complexity of Primality Testing. What is Primality Testing? Testing whether an integer is prime or not. – An integer p is prime if the only integers.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
PRIMES is in P Manindra Agrawal NUS Singapore / IIT Kanpur.
Cryptography Lecture 7: RSA Primality Testing Piotr Faliszewski.
Introduction to Algorithms Second Edition by Cormen, Leiserson, Rivest & Stein Chapter 31.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
מבוא מורחב - שיעור 6 1 Lecture 6 High order procedures Primality testing The RSA cryptosystem.
Ch1 - Algorithms with numbers Basic arithmetic Basic arithmetic Addition Addition Multiplication Multiplication Division Division Modular arithmetic Modular.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Week 4 - Wednesday.  What did we talk about last time?  Finished DES  AES.
Primality Testing. Introduction The primality test provides the probability of whether or not a large number is prime. Several theorems including Fermat’s.
9.1 Primes and Related Congruence Equations 23 Sep 2013.
מבוא מורחב 1 Lecture 4 Material in the textbook on Pages 44-46, of 2nd Edition Sections and Hanoy towers.
MA/CSSE 473 Day 10 Primality Testing. MA/CSSE 473 Day 10 In-class exam: Friday, Sept 28 –You may bring a two-sided 8.5x11 inch piece of paper containing.
מבוא מורחב - שיעור 5 1 Lecture 5 Higher-order procedures.
MA/CSSE 473 Day 09 Modular Division Revisited Fermat's Little Theorem Primality Testing.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
MA/CSSE 473 Day 9 Primality Testing Encryption Intro.
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
PRIMES is in P Manindra Agrawal Neeraj Kayal Nitin Saxena Dept of CSE, IIT Kanpur.
RSA cryptosystem with large key length
Lecture #5 מבוא מורחב.
Encryption Take 2: Practical details
Public Key Encryption Major topics The RSA scheme was devised in 1978
Practical Aspects of Modern Cryptography
CSE565: Computer Security Lecture 7 Number Theory Concepts
Probabilistic Algorithms
CS 2210:0001Discrete Structures Modular Arithmetic and Cryptography
Handbook of Applied Cryptography - CH4, from 4.1~4.3
Randomness and Computation: Some Prime Examples
Material in the textbook on pages
Number Theory (Chapter 7)
Number Theory and Euclidean Algorithm
Lecture #5 מבוא מורחב.
Introduction to Cryptography
Analysis of the RSA Encryption Algorithm
Symmetric-Key Cryptography
Lecture #6 section pages pages72-77
Lecture #6 מבוא מורחב.
Material in the textbook on
Lecture #6 section pages pages72-77
Lecture 5 Higher-order procedures מבוא מורחב - שיעור 5.
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Symmetric-Key Cryptography
Introduction to Cryptography
Presentation transcript:

High order procedures Primality testing The RSA cryptosystem Lecture 6 High order procedures Primality testing The RSA cryptosystem מבוא מורחב - שיעור 6

x0 is a fixed point of F(x) if F(x0) = x0 Fixed Points x0 is a fixed point of F(x) if F(x0) = x0 x0 = Example: a is a fixed point of F(x) = a/x מבוא מורחב - שיעור 6 2 2

Finding fixed points for f(x) Start with an arbitrary first guess x1 Each time: try the guess, f(x) ~ x ?? If it’s not a good guess try the next guess xi+1 = f(xi) (define (fixed-point f first-guess) (define tolerance 0.00001) (define (close-enough? v1 v2) (< (abs (- v1 v2)) tolerance)) (define (try guess) (let ((next (f guess))) (if (close-enough? guess next) guess (try next)))) (try first-guess)) מבוא מורחב - שיעור 6 מבוא מורחב - שיעור 5 3

An example: f(x) = 1+1/x (define (f x) (+ 1 (/ 1 x))) (fixed-point f 1.0) X1 = 1.0 X2 = f(x1) = 2 X3 = f(x2) = 1.5 X4 = f(x3) = 1.666666666.. X5 = f(x4) = 1.6 X6 = f(x5) = 1.625 X7 = f(x6) = 1.6153846… Exact fixed-point: 1.6180339… Note how odd guesses underestimate And even guesses Overestimate. מבוא מורחב - שיעור 6 מבוא מורחב - שיעור 5 4

Another example: f(x) = 2/x (define (f x) (/ 2 x)) (fixed-point f 1.0) x1 = 1.0 x2 = f(x1) = 2 x3 = f(x2) = 1 x4 = f(x3) = 2 x5 = f(x4) = 1 x6 = f(x5) = 2 x7 = f(x6) = 1 Exact fixed-point: 1.414213562… מבוא מורחב - שיעור 6 מבוא מורחב - שיעור 5 5

How do we deal with oscillation? Consider f(x)=2/x. If guess is a number such that guess < sqrt(2) then 2/guess > sqrt(2) So the average of guess and 2/guess is always an even Better guess. So, we will try to find a fixed point of g(x)= (x + f(x))/2 Notice that g(x) = (x +f(x)) /2 has the same fixed points as f. For f(x)=2/x this gives: g(x)= (x + 2/x)/2 מבוא מורחב - שיעור 5 מבוא מורחב - שיעור 6 6

To find an approximation of x: Make a guess G Improve the guess by averaging G and x/G Keep improving the guess until it is good enough X = 2 G = 1 X/G = 2 G = ½ (1+ 2) = 1.5 X/G = 4/3 G = ½ (3/2 + 4/3) = 17/12 = 1.416666 X/G = 24/17 G = ½ (17/12 + 24/17) = 577/408 = 1.4142156 מבוא מורחב - שיעור 5 מבוא מורחב - שיעור 6 7 7

Extracting the common pattern: average-damp (define (average-damp f) ;outputs g(x)=(x+f(x))/2 (lambda (x) (average x (f x)))) average-damp: (number  number)  (number  number) ((average-damp square) 10) ((lambda (x) (average x (square x))) 10) (average 10 (square 10)) 55 מבוא מורחב - שיעור 6 מבוא מורחב - שיעור 5 8

… which gives us a clean version of sqrt (define (sqrt x) (fixed-point (average-damp (lambda (y) (/ x y))) 1)) Compare this to our previous implementation of sqrt – same process. For the cubic root of x, fixed point of f(y) = x/y2 (define (cubert x) (average-damp (lambda (y) (/ x (square y)))) מבוא מורחב - שיעור 5 מבוא מורחב - שיעור 6 9

Further abstraction (define (osc-fixed-point f first-guess) (fixed-point (average-damp f) first-guess)) (define (sqrt x) (osc-fixed-point (lambda (y) (/ x y)) 1.0) (define (cubert x) (osc-fixed-point (lambda (y) (/ x (square y))) מבוא מורחב - שיעור 6 מבוא מורחב - שיעור 5 10 10

A solution to the equation: F(x) = 0 Newton’s method A solution to the equation: F(x) = 0 is a fixed point of: G(x) = x - F(x)/F’(x) (define (newton-transform f) (lambda (x) (- x (/ (f x) ((deriv f) x))))) (define (newton-method f guess) (fixed-point (newton-transform f) guess)) (define (sqrt x) (newton-method (lambda (y) (- (square y) x)) 1.0)) מבוא מורחב - שיעור 5 מבוא מורחב - שיעור 6 11 11

Further abstraction (define (fixed-point-of-transform f transform guess) (fixed-point (transform f) guess)) (define (osc-fixed-point f guess) (fixed-point-of-transform f average-damp guess)) (define (newton-method f guess) newton-transform מבוא מורחב - שיעור 5 מבוא מורחב - שיעור 6 12 12

Primality testing A natural number n is prime iff the only natural numbers dividing n are 1 and n. The following are prime: 2, 3, 5, 7, 11, 13, … and so are 1299709, 15485863, 22801763489, … There is an infinite number of prime numbers. Is 2101-1=2535301200456458802993406410751 prime? How do we check whether a number is prime? How do we generate huge prime numbers? Why do we care? מבוא מורחב - שיעור 6

Naïve solution: Finding the smallest divisor (define (divides? a b) (= (remainder b a) 0)) (define (prime? n) (define (find-smallest-divisor n i) (cond ((divides? i n) i) (else (find-smallest-divisor n (+ i 1))))) (= n (find-smallest-divisor n 2))) Space complexity is: (1) For prime n we have time complexity n. If n is a 100 digit number we will wait “for ever”. מבוא מורחב - שיעור 6

An improvement (define (divides? a b) (= (remainder b a) 0)) (define (prime? n) (define (find-smallest-divisor n i) (cond ((> (square i) n) n) (divides? i n) i) (else (find-smallest-divisor n (+ i 1))))) (= n (find-smallest-divisor n 2))) For prime n we have time complexity: (n) Worst case space complexity: (1) Still, if n is a 100 digit number, it is completely infeasible. מבוא מורחב - שיעור 6

Is there a more efficient way of checking primality? Yes! At least if we are willing to accept a tiny probability of error. We can prove that a number is not prime without explicitly finding a divisor of it. Randomness is useful in computations! מבוא מורחב - שיעור 6

The Fermat Primality Test Fermat’s little theorem: If n is a prime number then: an  a (mod n) , for every integer a Corollary: If an ≠a (mod n) , for some a, then n is not a prime! Such an a is a witness to the compositeness of n. The Fermat Test: Do 100 times: Pick a random 1<a<n and compute an (mod n). If an  a (mod n), then n is not a prime. If all 100 tests passed, declare n to be a prime. מבוא מורחב - שיעור 6

Fast computation of modular exponentiation ab mod m (define (expmod a b m) (cond ((= b 0) 1) ((even? b) (remainder (square (expmod a (/ b 2) m)) m)) (else (remainder (* a (expmod a (- b 1) m)) m)))) מבוא מורחב - שיעור 6

Implementing Fermat test (define (test a n)(= (expmod a n n) a)) (define (rand-test n) (test (+ 2 (random (- n 2))) n)) ; note - (random m) returns a random number ; between 0 and m-1 (define (fermat-test n k); (cond ((= k 0) #t) ((rand-test n) (fermat-test n (- k 1))) (else #f))) Worst-case time complexity: (log n) if k is constant Even if n is a 1000 digit number, it is still okay! מבוא מורחב - שיעור 6

Is the Fermat test correct? If the Fermat test says that a number n is composite, then the number n is indeed a composite number. If n is a prime number, the Fermat test will always say that n is prime. But, Can the Fermat test say that a composite number is prime? What is the probability that this will happen? מבוא מורחב - שיעור 6

Carmichael numbers A composite number n is a Carmichael number iff an  a (mod n) for every integer a. The first Carmichael numbers are: 561, 1105, 1729, 2465, 2821, 6601, 8911, 10585, 15841, … Theorem: n is a Carmichael number iff n=p1p2…pk, where p1 , p2 , … , pk are primes and pi-1 divides n-1, for i=1,…,k. On Carmichael numbers, the Fermat test is always wrong! Carmichael numbers are fairly rare. (There are 255 Carmichael numbers smaller than 100,000,000). מבוא מורחב - שיעור 6

Theorem: (Rabin ’77) If n is a composite number that is not a Carmichael number, then at least half of the numbers between 1 and n are witnesses to the compositeness of n. Corollary: Let n be a composite number that is not a Carmichael number. If we pick a random number a, 1<a<n, then a is a witness with a probability of at least a 1/2 ! מבוא מורחב - שיעור 6

“Correctness” of the Fermat test If n is prime, the Fermat test is always right. If n is a Carmichael number, the Fermat test is always wrong! If n is composite number that is not a Carmichael number, the Fermat test is wrong with a probability of at most 2-100. Is an error probability of 2-100 acceptable? Yes! מבוא מורחב - שיעור 6

The Rabin-Miller test A fairly simple modification of the Fermat test that is correct with a probability of at least 1-2-100 also on Carmichael numbers. Will not be covered in this course. מבוא מורחב - שיעור 6

Probabilistic algorithms An algorithm that uses random choices but outputs the correct result, with high probability, for every input! Randomness is a very useful algorithmic tool. Until the year 2002, there were no efficient deterministic primality testing algorithms. In 2002, Agarwal, Kayal and Saxena found a fast deterministic primality testing algorithm. We want an algorithm that is good for every input, because the input can be chosen by an adversary, and he will chose the wrost input for us. We therefore can not assume any distribution over the inputs, certainly not that they are chosen at random. Given the input, however, we chose random coins, and we control the probability distribution we use. מבוא מורחב - שיעור 6

Finding large prime numbers The prime number Theorem: The number of prime numbers smaller than n is asymptotically n / ln n. Thus, for every number n, there is “likely” to be a prime number between n and n + ln n. To find a prime number roughly the size of (odd) n, simply test n, n+2, n+4, … for primality. Show sample runs of find-prime (define (find-prime n t) (if (fermat-test n t) n (find-prime (+ n 2) t))) מבוא מורחב - שיעור 6

> (find-prime (+ (exp 2 200) 1) 20) 1606938044258990275541962092341162602522202993782792835301611 > (find-prime (+ (exp 2 500) 1) 20) 3273390607896141870013189696827599152216642046043064789483291368096133796404674554883270092325904157150886684127560071009217256545885393053328527589431 > (find-prime (+ (exp 2 1000) 1) 20) 10715086071862673209484250490600018105614048117055336074437503883703510511249361224931983788156958581275946729175531468251871452856923140435984577574698574803934567774824230985421074605062371141877954182153046474983581941267398767559165543946077062914571196477686542167660429831652624386837205668069673 מבוא מורחב - שיעור 6

Primality testing versus Factoring Fast primality testing algorithms determine that a number n is composite without finding any of its factors. No efficient factoring algorithms are known. Factoring a number is believed to be a much harder task. Primality testing - Easy Factoring - Hard Now: Use the ease of primality and hardness of factoring מבוא מורחב - שיעור 6

Cryptography Eve Alice Bob מבוא מורחב - שיעור 6

Traditional solution: classical cryptography #$%&*() Hi Bob! Hi Bob! Eve Encryption Decryption Alice Bob Encryption key Decryption key מבוא מורחב - שיעור 6

In classical cryptography: The two parties (Alice and Bob) should agree in advance on the encryption/decryption key. The encryption and decryption keys are either identical or easily derived from one another. מבוא מורחב - שיעור 6

The internet age Bob Calvin Alice Donald Felix Eve מבוא מורחב - שיעור 6

Is it possible to construct secure public key cryptosystems? Public key cryptology A system in which it is infeasible to deduce the decryption key from the encryption key. Each user publishes an encryption key that should be used for sending messages to her, but keeps her decryption key private. Is it possible to construct secure public key cryptosystems? מבוא מורחב - שיעור 6

The RSA public key cryptosystem [Rivest, Shamir, Adleman (1977)] Bob: Picks two huge primes p and q. Calculates n=pq, and announces n. Chooses and announce integer e prime to (p-1)(q-1) e and (p-1)(q-1) have no common divisor other than 1 Calculates the unique d such that de = 1 (mod (p-1)(q-1)) It is believed that computing d, without knowing p and q, is hard. מבוא מורחב - שיעור 6

The RSA cryptosystem (cont.) EBob(m) = me (mod n) DBob(m) = md (mod n) Lemma: DBob(EBob(m)) = m To send a message m (0≤m<n) to Bob, Alice computes c=EBob(m) and sends it to Bob. To decipher the message, Bob computes m=DBob(c) מבוא מורחב - שיעור 6

(define base (* (- p 1) (- q 1))) (define e 35) (define p 17) (define q 13) (define n (* p q)) (define base (* (- p 1) (- q 1))) (define e 35) (define d (find-d e base)) (display d) (define message 121) (display message) (newline) (define alice-message (expmod message e n) (define bob-decipher (expmod alice-message d n) (display bob-decipher) ; d = 11 מבוא מורחב - שיעור 6

Find-d (define (find-d e base) (define (guess d) (if ( = (remainder (* d e) base) 1) d (guess (+ d 1)) ) (guess 0) Obviously, not the way this is done for real numbers.. Why? מבוא מורחב - שיעור 6

Some executions message 121 alice-message 127 bob-decipher 121 מבוא מורחב - שיעור 6