Lecture 2-3 Basic Number Theory and Algebra

Slides:



Advertisements
Similar presentations
Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Advertisements

1 Lect. 12: Number Theory. Contents Prime and Relative Prime Numbers Modular Arithmetic Fermat’s and Euler’s Theorem Extended Euclid’s Algorithm.
Chapter 4 – Finite Fields. Introduction will now introduce finite fields of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key.
Chapter 8 – Introduction to Number Theory. Prime Numbers prime numbers only have divisors of 1 and self –they cannot be written as a product of other.
Section 4.1: Primes, Factorization, and the Euclidean Algorithm Practice HW (not to hand in) From Barr Text p. 160 # 6, 7, 8, 11, 12, 13.
Chapter 8 Introduction To Number Theory. Prime Numbers Prime numbers only have divisors of 1 and Prime numbers only have divisors of 1 and self. self.
Chapter 8 Introduction to Number Theory. Prime Numbers prime numbers only have divisors of 1 and self –they cannot be written as a product of other numbers.
Data encryption with big prime numbers
22C:19 Discrete Structures Integers and Modular Arithmetic
Chapter 8 More Number Theory. Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime.
NUMBER THEORY Chapter 1: The Integers. The Well-Ordering Property.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
and Factoring Integers (I)
1 Chapter 7– Introduction to Number Theory Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
6/20/2015 5:05 AMNumerical Algorithms1 x x1x
Complexity1 Pratt’s Theorem Proved. Complexity2 Introduction So far, we’ve reduced proving PRIMES  NP to proving a number theory claim. This is our next.
and Factoring Integers
Chapter 4 – Finite Fields Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public.
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
Chapter 8 – Introduction to Number Theory Prime Numbers
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2001 Lecture 7 Tuesday, 11/6/01 Number-Theoretic Algorithms Chapter.
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright © The McGraw-Hill Companies, Inc. Permission required.
Software Security Seminar - 1 Chapter 11. Mathematical Background 발표자 : 안병희 Applied Cryptography.

Number Theory Speaker: P.H. Wu Date: 21/04/11 1. Outline Introduction Residue number system Chinese remainder theory Euclid’s algorithm Stern-Brocot tree.
Module :MA3036NI Cryptography and Number Theory Lecture Week 7
Mathematics of Cryptography Modular Arithmetic, Congruence,
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Information Security and Management 4. Finite Fields 8
Section 4.3: Fermat’s Little Theorem Practice HW (not to hand in) From Barr Text p. 284 # 1, 2.
Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.
YSLInformation Security -- Public-Key Cryptography1 Prime and Relatively Prime Numbers Divisors: We say that b  0 divides a if a = mb for some m, where.
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
Internet Engineering Czesław Smutnicki Discrete Mathematics – Numbers Theory.
Fermat’s Little Theorem The RSA Cryptosystem will require exponentiation to decrypt messages. Exponentiation Notation Example 1: Compute Exponentials Example.
Introduction to Number Theory
9.1 Primes and Related Congruence Equations 23 Sep 2013.
Discrete Mathematics
Lecture 2-3 Basic Number Theory and Algebra. In modern cryptographic systems, the messages are represented by numerical values prior to being encrypted.
1 Discrete Structures – CNS2300 Text Discrete Mathematics and Its Applications Kenneth H. Rosen (5 th Edition) Chapter 2 The Fundamentals: Algorithms,
The Fundamentals: Algorithms, Integers, and Matrices CSC-2259 Discrete Structures Konstantin Busch - LSU1.
CS480 Cryptography and Information Security
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-5 Mathematical Background:
Number-Theoretic Algorithms
Mathematical Background for Cryptography: Modular arithmetic and gcd
Mathematics of Cryptography
Introduction to Cryptography
ALGORITHM NUMBER THEORY
Introduction to Number Theory
6*. An Introduction to Number Theory
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Analytic Number Theory MTH 435
Numerical Algorithms x x-1
Number Theory (Chapter 7)
NUMBER THEORY.
Computer Security Modular Arithmetic November 12, 2018
Mathematical Background: Prime Numbers
Week #5 – 23/25/27 September 2002 Prof. Marie desJardins
Introduction to Cryptography
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
Algebra 5 Congruence Classes.
Mathematical Background: Extension Finite Fields
Presentation transcript:

Lecture 2-3 Basic Number Theory and Algebra

In modern cryptographic systems, the messages are represented by numerical values prior to being encrypted and transmitted. The encryption processes are mathematical operations that turn the input numerical values into output numerical values. Building, analyzing, and attacking these cryptosystem requires mathematical tools. The most important of these is number theory, especially the theory of congruences.

Outline Basic Notions Congruence Quadratic Residues Primitive Root Inverting Matrices Mod n Groups Rings Fields

1 Basic Notions 1.1 Divisibility

1.1 Divisibility (Continued)

1.1 Divisibility (Continued)

1.2 Prime The primes less than 200: 2 3 5 7 11 13 17 19 23 29 31 37 41 43 47 53 59 61 67 71 73 79 83 89 97 101 103 107 109 113 127 131 137 139 149 151 157 163 167 173 179 181 191 193 197 199

1.2 Prime (Continued)

1.2 Prime (Continued)

1.2 Prime (Continued)

1.3 Greatest Common Divisor

1.3 Greatest Common Divisor (Continued)

1.3 Greatest Common Divisor (Continued)

1.3 Greatest Common Divisor (Continued)

1.3 Greatest Common Divisor (Continued)

1.4 The Fundamental Theorem of Arithmetic

1.4 The Fundamental Theorem of Arithmetic (Continued)

1.4 The Fundamental Theorem of Arithmetic (Continued)

1.4 The Fundamental Theorem of Arithmetic (Continued)

1.4 The Fundamental Theorem of Arithmetic (Continued)

1.5 Linear Diophantine Equations

2 Congruences 2.1 Introduction to Congruences

2.1 Introduction to Congruences (Continued)

2.1 Introduction to Congruences (Continued)

2.1 Introduction to Congruences (Continued)

2.1 Introduction to Congruences (Continued)

2.2 Linear Congruences

2.2 Linear Congruences (Continued)

2.2 Linear Congruences (Continued)

2.2 Linear Congruences (Continued)

2.3 The Chinese Remainder Theorem

2.3 The Chinese Remainder Theorem (Continued)

2.3 The Chinese Remainder Theorem (Continued)

2.4 Polynomial Modulo Prime

2.5 Fermat’s Little Theorem and Euler’s Theorem

2.5 Fermat’s Little Theorem and Euler’s Theorem (Continued)

2.5 Fermat’s Little Theorem and Euler’s Theorem (Continued)

2.5 Fermat’s Little Theorem and Euler’s Theorem (Continued)

2.5 Fermat’s Little Theorem and Euler’s Theorem (Continued)

2.5 Fermat’s Little Theorem and Euler’s Theorem (Continued)

3 Quadratic Residues 3.1 Quadratic Residues and Nonresidues

3.1 Quadratic Residues and Nonresidues (Continued)

3.1 Quadratic Residues and Nonresidues (Continued)

3.2 Modular Square Roots

3.2 Modular Square Roots (Continued)

4 Primitive Root 4.1 The Order of an Integer

4.1 The Order of an Integer (Continued)

4.1 The Order of an Integer (Continued)

4.2 Primitive Root

4.2 Primitive Root (Continued)

5 Inverting Matrices Mod n

5 Inverting Matrices Mod n (Continued)

5 Inverting Matrices Mod n (Continued)

6 Groups, Rings, Fields 6.1 Groups

6.1 Groups (Continued)

6.2 Rings

6.2 Rings (Continued)

6.3 Fields

Thank you!