Lecture 2-3 Basic Number Theory and Algebra
In modern cryptographic systems, the messages are represented by numerical values prior to being encrypted and transmitted. The encryption processes are mathematical operations that turn the input numerical value into output numerical values. Building, analyzing, and attacking these cryptosystem requires mathematical tools. The most important of these is number theory, especially the theory of congruences.
Outline Basic Notions Congruence Quadratic Residues Primitive Root Inverting Matrices Mod n Groups Rings Fields
1 Basic Notions 1.1 Divisibility
1.1 Divisibility (Continued)
1.2 Prime The primes less than 200:
1.2 Prime (Continued)
1.3 Greatest Common Divisor
1.3 Greatest Common Divisor (Continued)
1.4 The Fundamental Theorem of Arithmetic
1.4 The Fundamental Theorem of Arithmetic (Continued)
1.5 Linear Diophantine Equations
2 Congruences 2.1 Introduction to Congruences
2.1 Introduction to Congruences (Continued)
2.2 Linear Congruences
2.2 Linear Congruences (Continued)
2.3 The Chinese Remainder Theorem
2.3 The Chinese Remainder Theorem (Continued)
2.4 Polynomial Modulo Prime
2.5 Fermat’s Little Theorem and Euler’s Theorem
2.5 Fermat’s Little Theorem and Euler’s Theorem (Continued)
3 Quadratic Residues 3.1 Quadratic Residues and Nonresidues
3.1 Quadratic Residues and Nonresidues (Continued)
3.2 Modular Square Roots
3.2 Modular Square Roots (Continued)
4 Primitive Root 4.1 The Order of an Integer
4.1 The Order of an Integer (Continued)
4.2 Primitive Root
4.2 Primitive Root (Continued)
5 Inverting Matrices Mod n
5 Inverting Matrices Mod n (Continued)
6 Groups, Rings, Fields 6.1 Groups
6.1 Groups (Continued)
6.2 Rings
6.2 Rings (Continued)
6.3 Fields
Thank you!