Introduction to Cryptography

Slides:



Advertisements
Similar presentations
Mod arithmetic.
Advertisements

1 Lect. 12: Number Theory. Contents Prime and Relative Prime Numbers Modular Arithmetic Fermat’s and Euler’s Theorem Extended Euclid’s Algorithm.
The Integers and Division. Outline Division: Factors, multiples Exercise 2.3 Primes: The Fundamental Theorem of Arithmetic. The Division Algorithm Greatest.
1 Section 2.4 The Integers and Division. 2 Number Theory Branch of mathematics that includes (among other things): –divisibility –greatest common divisor.
Public Key Encryption Algorithm
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
CSC2110 Discrete Mathematics Tutorial 5 GCD and Modular Arithmetic
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Introduction to Cryptography
Fall 2002CMSC Discrete Structures1 Let us get into… Number Theory.
BY MISS FARAH ADIBAH ADNAN IMK
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
9/2/2015Discrete Structures1 Let us get into… Number Theory.
Introduction to Modular Arithmetic and Public Key Cryptography.
Mathematics of Cryptography Part I: Modular Arithmetic
February 24, 2015Applied Discrete Mathematics Week 4: Number Theory 1 Modular Arithmetic Let a be an integer and m be a positive integer. We denote by.
Module :MA3036NI Cryptography and Number Theory Lecture Week 7
Prep Math Competition, Lec. 1Peter Burkhardt1 Number Theory Lecture 1 Divisibility and Modular Arithmetic (Congruences)
Copyright © Curt Hill Divisibility and Modular Arithmetic A Topic in Number Theory.
Chapter The Integers and Division Division
Introduction to Cryptography
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Copyright © Zeph Grunschlag, Basic Number Theory Zeph Grunschlag.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
1 Section Congruences In short, a congruence relation is an equivalence relation on the carrier of an algebra such that the operations of the algebra.
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
The Euclidean Algorithm That’s right, it’s real..
Ref: Pfleeger96, Ch.31 Properties of Arithmetic Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, 1996.
Discrete Mathematics 4. NUMBER THEORY Lecture 7 Dr.-Ing. Erwin Sitompul
Introduction to Number Theory
Lecture 3.1: Public Key Cryptography I CS 436/636/736 Spring 2015 Nitesh Saxena.
Introduction to Elliptic Curves CSCI 5857: Encoding and Encryption.
Discrete Mathematics
Divisibility and Modular Arithmetic
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
1 Discrete Structures – CNS2300 Text Discrete Mathematics and Its Applications Kenneth H. Rosen (5 th Edition) Chapter 2 The Fundamentals: Algorithms,
Ch04-Number Theory and Cryptography 1. Introduction to Number Theory Number theory is about integers and their properties. We will start with the basic.
CS480 Cryptography and Information Security
Chapter 4 With Question/Answer Animations 1. Chapter Motivation Number theory is the part of mathematics devoted to the study of the integers and their.
Number Theory Lecture 1 Text book: Discrete Mathematics and its Applications, 7 th Edition.
Chapter 3 The Fundamentals: Algorithms, the integers, and matrices Section 3.4: The integers and division Number theory: the part of mathematics involving.
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Number Theory. Introduction to Number Theory Number theory is about integers and their properties. We will start with the basic principles of divisibility,
Number-Theoretic Algorithms
Mathematical Background for Cryptography: Modular arithmetic and gcd
Mathematics of Cryptography
Chapter Applications of Number Theory Some Useful Results
Lecture 3.2: Public Key Cryptography II
Integers and Division Section 3.4.
CMSC Discrete Structures
Cryptology Design Fundamentals
Cryptology Design Fundamentals
MATH301- DISCRETE MATHEMATICS Copyright © Nahid Sultana Dr. Nahid Sultana Chapter 4: Number Theory and Cryptography.
Applied Discrete Mathematics Week 3: Algorithms
Applied Discrete Mathematics Week 4: Number Theory
Number Theory.
Prime and Relatively Prime Numbers
CSE 311: Foundations of Computing
Discrete Math for CS CMPSC 360 LECTURE 12 Last time: Stable matching
Week #5 – 23/25/27 September 2002 Prof. Marie desJardins
Introduction to Cryptography
Lecture 3.1: Public Key Cryptography I
Copyright © Zeph Grunschlag,
Applied Discrete Mathematics Week 10: Introduction to Counting
Clements MAΘ October 30th, 2014
Number Theory.
Discrete Mathematics Chapter 4 Number Theory. Discrete Mathematics Chapter 4 Number Theory.
Presentation transcript:

Introduction to Cryptography Lecture 3

Division Principle Let m be a positive integer and let b be any integer. Then there is exactly one pair of integers q (quotient) and r (remainder) such that b = qm + r, r < m. If x and y are relatively prime, than exists s and t such that sx + ty = gcd(x,y) = 1. If exist s and t such that sx + ty = 1, than x and y are relatively prime.

Modular Arithmetic Definition: Let m be a positive integer. We say that two integers x and y are congruent modulo m if x - y is evenly divisible by m Notation: Example:

Modular Arithmetic Rules: Example:

Modular Arithmetic Question: What are the possible reminders when the number n is divided by m? {0,1,….,m-1} Example: If we have mod 2 operation, only reminders we will have are {0,1}. 0 - for evens 1 - for odds

Modular Arithmetic Example: Make a table of y-values for We only need to check possible reminder of division by 12. x 1 2 3 4 5 6 7 8 9 10 11 x-11 -11 -10 -9 -8 -7 -6 -5 -4 -3 -2 -1 y

Modular Arithmetic Theorem: Let m be a positive integer and let 0 < x < m. There is 0 < s < m, such that xs = 1 if and only if gcd(x,m) = 1. Definition: Such s is called the inverse of x mod m. s is unique

Modular Arithmetic Example: Let m = 17 and x = 11. Then gcd(17,11) = 1 and using extended Euclidean algorithm we can find: and 14 is the inverse of 11 mod 17.

Fermat’s Little Theorem If p is prime, then for every x, Example:

Methods of Attacks Ciphertext-Only Attack Known-Plaintext Attack Chosen-Plaintext Attack Chosen-Ciphertext Attack

Ciphertext-Only Attack Know A portion of ciphertext Method of encryption and decryption Find Plaintext Key

Known-Plaintext Attack A portion of ciphertext and corresponding plaintext Method of encryption and decryption Find Key

Chosen-Plaintext Attack Know Method of encryption and decryption Can choose Plaintext Find Key

Chosen-Ciphertext Attack Know Method of encryption and decryption Can choose Ciphertext Find Key

Homework Read pg.51-54, 59-62. Exercises: 4(b,c), 5(b,d), 6 on pg.66-67. Exercises: 2(a,c) on pg.80. Those questions will be a part of your collected homework.