PRODUCTS OF GROUPS If F and H are groups then their product F x H is the group defined as follows: Example If F = H = {0,1} with + mod 2.

Slides:



Advertisements
Similar presentations
Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Advertisements

Section 11 Direct Products and Finitely Generated Abelian Groups One purpose of this section is to show a way to use known groups as building blocks to.
Math 3121 Abstract Algebra I
Groups TS.Nguyễn Viết Đông.
Algebraic Structures: Group Theory II
1.  Detailed Study of groups is a fundamental concept in the study of abstract algebra. To define the notion of groups,we require the concept of binary.
Group THeory Bingo You must write the slide number on the clue to get credit.
Find all subgroups of the Klein 4- Group. How many are there?
CSE 321 Discrete Structures Winter 2008 Lecture 8 Number Theory: Modular Arithmetic.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
GROUPS & THEIR REPRESENTATIONS: a card shuffling approach Wayne Lawton Department of Mathematics National University of Singapore S ,
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Lagrange's Theorem. The most important single theorem in group theory. It helps answer: –How large is the symmetry group of a volleyball? A soccer ball?
6.3 Permutation groups and cyclic groups  Example: Consider the equilateral triangle with vertices 1 , 2 , and 3. Let l 1, l 2, and l 3 be the angle bisectors.
Cyclic Groups (9/25) Definition. A group G is called cyclic if there exists an element a in G such that G =  a . That is, every element of G can be written.
Basic Number Theory Divisibility Let a,b be integers with a≠0. if there exists an integer k such that b=ka, we say a divides b which is denoted by a|b.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
Math 3121 Abstract Algebra I Lecture 9 Finish Section 10 Section 11.
Great Theoretical Ideas in Computer Science for Some.
1 Network and Computer Security (CS 475) Modular Arithmetic and the RSA Public Key Cryptosystem Jeremy R. Johnson.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
Network and Computer Security (CS 475) Modular Arithmetic
Cosets and Lagrange’s Theorem (10/28)
Questions on Direct Products (11/6) How many elements does D 4  Z 4 have? A. 4B. 8C. 16D. 32E. 64 What is the largest order of an element in D 4  Z 4.
Great Theoretical Ideas in Computer Science for Some.
Normal Subgroups and Factor Groups (11/11) Definition. A subgroup H of a group G is called normal if for every a  G, the left coset aH is the same set.
Great Theoretical Ideas In Computer Science Anupam GuptaCS Fall 2006 Lecture 15Oct 17, 2006Carnegie Mellon University Algebraic Structures: Groups,
Section 14 Factor Groups Factor Groups from Homomorphisms. Theorem Let  : G  G’ be a group homomorphism with kernel H. Then the cosets of H form a factor.
CS Lecture 14 Powerful Tools     !. Build your toolbox of abstract structures and concepts. Know the capacities and limits of each tool.
Math 3121 Abstract Algebra I Lecture 14 Sections
SECTION 8 Groups of Permutations Definition A permutation of a set A is a function  ϕ : A  A that is both one to one and onto. If  and  are both permutations.
Primality Testing. Introduction The primality test provides the probability of whether or not a large number is prime. Several theorems including Fermat’s.
Lecture 3.1: Public Key Cryptography I CS 436/636/736 Spring 2015 Nitesh Saxena.
SECTION 10 Cosets and the Theorem of Lagrange Theorem Let H be a subgroup of G. Let the relation  L be defined on G by a  L b if and only if a -1 b 
Group A set G is called a group if it satisfies the following axioms. G 1 G is closed under a binary operation. G 2 The operation is associative. G 3 There.
Prepared By Meri Dedania (AITS) Discrete Mathematics by Meri Dedania Assistant Professor MCA department Atmiya Institute of Technology & Science Yogidham.
Math 3121 Abstract Algebra I Lecture 6 Midterm back over+Section 7.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Math 3121 Abstract Algebra I
Garis-garis Besar Perkuliahan
Unit-III Algebraic Structures
CS480 Cryptography and Information Security
Topic 12: Number Theory Basics (2)
Great Theoretical Ideas in Computer Science
Prelude to Public-Key Cryptography
Advanced Algorithms Analysis and Design
Lecture 3.2: Public Key Cryptography II
ALGORITHM NUMBER THEORY
Groups and Applications
Great Theoretical Ideas In Computer Science
Elliptic Curves.
B.Sc. III Year Mr. Shrimangale G.W.
Math 3121 Abstract Algebra I
GROUPS & THEIR REPRESENTATIONS: a card shuffling approach
Number Theory and Euclidean Algorithm
Applied Symbolic Computation (CS 300) Modular Arithmetic
Great Theoretical Ideas in Computer Science
Systems Architecture I
Applied Symbolic Computation (CS 300) Modular Arithmetic
Lecture 3.1: Public Key Cryptography I
Great Theoretical Ideas in Computer Science
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Algebraic Structures: Group Theory
Applied Symbolic Computation (CS 300) Modular Arithmetic
Applied Symbolic Computation (CS 300) Modular Arithmetic
CSCI284 Spring 2009 GWU Sections 5.1, 5.2.2, 5.3
Introduction to Algorithms Second Edition by
Applied Symbolic Computation (CS 300) Modular Arithmetic
Rayat Shikshan Sanstha’s S.M.Joshi College, Hadapsar -28
Cryptography Lecture 17.
Presentation transcript:

PRODUCTS OF GROUPS If F and H are groups then their product F x H is the group defined as follows: Example If F = H = {0,1} with + mod 2

PERMUTATIONS A permutation of a set S is a function f : S --> S that is one-to-one and onto The set of all permutation of a set S forms a group, denoted by P(S), under the binary operation, called composition, defined by

EXAMPLES P({a})={(a>a)} has one element P({a,b})={(a>a, b>b), (a>b,b>a)} has two elements P({a,b,c})={(a>a,b>b,c>c), (a>b,b>c,c>a), (a>c,b>a,c>b), (a>a,b>c,c>b), (a>c,b>b,c>a), (a>b,b>a,c>c)} has six elements P({1,…,N}) has N! (N factorial) elements

EXAMPLES The set of rigid transformations that map a geometric object into itself form a group under composition P({a,b,c}) describes the group of rigid transformations of an isosceles triangle P({a,b,c,d}) does not describe the group of rigid transformations of a square

DEFINITIONS A group is abelian if The groups we constructed from numbers are abelian, the permutation and geometric transformation groups are generally not The order of a group is a positive number or infinity that counts its elements An element r in a finite group generates a cyclic subgroup

MORE DEFINITIONS Two groups G and H are isomorphic if there exists a function f: G-->H that is one-to-one and onto and satisfies Here the isomorphism f = (0>1,1>2)

INTERESTING EXAMPLES Chinese Remainder Theorem: with isomorphism 0>(0,0), 1>(1,1), 2>(0,2), 3>(1,0), 4>(0,1), 5>(1,2) Theorem (Fermat): with isomorphism 2>1, 4>2, 3>3, 1>4

SUBGROUPS H is a subgroup of a group G if it is a group under the binary operation on G {0}, {0,2}, has 3 subgroups has 5 subgroups {(0,0)}, {(0,0),{0,1}}, {(0,0}, (0,1)}, {(0,0),(1,0)}, A coset of H in G is a subset of the form

LAGRANGE’s THEOREM The order of a finite group is a multiple of the order of any subgroup Proof. This follows from three facts: 1. G = union of all the cosets of H in G 2. every coset has the same # elements 3. distinct cosets are disjoint To prove 3 assume that

CONSEQUENCES If G is a finite group with order m then If p and q are prime numbers then If p = 3 mod 5 and q = 3 mod 5 then L=5K for some integer K

PUBLIC KEY ENCRYPTION Rivest, Shamir, Adelman (~ to 1978 alg.) 1. You generate huge primes p =3, q=3 mod 5 (by Dirichlet’s Theorem) then distribute N=pq to the public and keep K = ((p-1)(q-1)+1)/5 secret 2. Mr Public generates message then computes & publicly sends encrypted message 3. You decrypt message

PUBLIC KEY ENCRYPTION You are a private encrypter and hold the private key K Mr Public can in theory compute K from the public key N but it will require factorizing N=pq, presumably intractible This algorithm revolutionized secret communications and in particular enabled e-commerce

MIND MENDING EXERCISES Problem 5. Prove all previous assertions Problem 6. Find all subgroups of the group Z of integers and all the cosets of each subgroup Problem 7. Find all subgroups and associated subgroups of S({a,b,c}) Problem 8. Develop a tractible method to compute