Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields

Size: px
Start display at page:

Download "Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields"

Transcription

1 1 / 27 Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields Jingguo Bi Institute for Advanced Study Tsinghua University Beijing, China October, 2014 Vienna, Austria This is a joint work with Qi Cheng and J. Maurice Rojas.

2 2 / 27 Applications of lattice theory Lattice theory has fruitful applications in Physics and Chemistry, such as the structure of particle systems under a variety of physical constraints, packing problems, etc, but also has applications in Computational Number Theory, Computational Algebra, Coding Theory, Theoretical Computer Science and Cryptography, etc.

3 3 / 27 The Problem Let R be a ring. Given any univariate t-nomial f (x) := c 1 + c 2 x a 2 + c 3 x a c t x at R[x] (decision version) decide whether there is a root in R (search version) find one of the roots in R (counting version) count the number of roots in R

4 4 / 27 Previous work Cucker, Koiran, and Smale found a polynomial-time algorithm to find all integer roots of a univariate polynomial f in Z[x] with exactly t terms H. W. Lenstra, Jr. gave a polynomial-time algorithm to compute all factors of fixed degree over an algebraic extension of Q of fixed degree (and thereby all rational roots) Independently, Kaltofen and Koiran and Avendano, Krick, and Sombra extended this to finding bounded-degree factors of sparse polynomials in Q[x, y] in polynomial-time

5 5 / 27 Previous work on finite fields NP-hardness over even characteristic for sparse polynomials (Kipnis-Shamir 1999) For prime order finite field, detecting rational roots for straight-line program is prove to be NP-hard (Cheng-Hill-Wan 2012) Even for trinomials, no nontrivial algorithm is known

6 6 / 27 Main Results Given any univariate t-nomial f (x) = c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 F q [x] We can decide, within 4 t+o(t) q t 2 t 1 +o(1) deterministic bit operations, whether f (x) has a root in F q Moreover, we also give the structure of the roots of f (x) over F q When t is fix, this is the first sub-linear in q algorithm to solve this problem There is an algorithm running in time q 1/2+o(1) to decide whether a trinomial in F q [x] has a root in F q

7 7 / 27 Backgrounds of Lattice What Is a Lattice? Given n linearly independent vectors b 1,..., b n R m (n m), the lattice generated by them is the set of vectors L(b 1,..., b n ) = { n x i b i : x i Z} i=1 The vectors b 1,..., b n form a basis of the lattice

8 8 / 27 Backgrounds of Lattice The Shortest Vector Problem The most famous computational problem on lattices is the shortest vector problem (SVP): Given a basis of a lattice L, find a vector u L, such that v u for any vector v L \ 0

9 9 / 27 Backgrounds of Lattice The Minkowski Convex Body Theorem There exists a nonzero lattice vector with length less than n det(l) 1/n

10 10 / 27 Backgrounds of Lattice The LLL Reduction There is a polynomial time algorithm to find a base such that the length of the shortest vector in the base (2/ 3) n λ 1, where λ 1 denotes the length of the shortest nonzero vector in the lattice

11 11 / 27 Backgrounds of Lattice Exact algorithm for SVP There is an algorithm to compute the shortest nonzero vector of a n-dimensional lattice which needs at most 4 n+o(n) arithmetic operations. (Micciancio-Voulgaris 2010)

12 12 / 27 Main idea Main theorem Given any univariate t-nomial f (x) = c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 F q [x] We can decide, within 4 t+o(t) q t 2 t 1 +o(1) deterministic bit operations, whether f (x) has a root in F q

13 13 / 27 Main idea Observation Detecting roots over F q is the same as detecting linear factors of polynomials in F q [x] However, to detect roots in F q, we don t need the full power of factoring we need only decide whether gcd(x q x, f (x)) has positive degree, which takes time deg(f ) 1+o(1) (log q) O(1) (E.Bach and J. Shallit 1996)

14 14 / 27 Main idea Degree reduction Replace x by y e in f. f (y e ) := c 0 + c 1 y ea 1 + c 2 y ea c t 1 y ea t 1

15 14 / 27 Main idea Degree reduction Replace x by y e in f. f (y e ) := c 0 + c 1 y ea 1 + c 2 y ea c t 1 y ea t 1 If gcd(e, q 1) = 1, then the map from F q to F q given by y e is one-to-one, thus it will not change the solvability of f

16 14 / 27 Main idea Degree reduction Replace x by y e in f. f (y e ) := c 0 + c 1 y ea 1 + c 2 y ea c t 1 y ea t 1 If gcd(e, q 1) = 1, then the map from F q to F q given by y e is one-to-one, thus it will not change the solvability of f A new polynomial c 0 +c 1 y ea 1 (mod q 1) +c 2 y ea 2 (mod q 1) + +c t 1 y ea t 1 (mod q 1)

17 14 / 27 Main idea Degree reduction Replace x by y e in f. f (y e ) := c 0 + c 1 y ea 1 + c 2 y ea c t 1 y ea t 1 If gcd(e, q 1) = 1, then the map from F q to F q given by y e is one-to-one, thus it will not change the solvability of f A new polynomial c 0 +c 1 y ea 1 (mod q 1) +c 2 y ea 2 (mod q 1) + +c t 1 y ea t 1 (mod q 1) Find a suitable e to reduce the degree.

18 15 / 27 Find a suitable e Lemma (Find e) Given integers a 1,, a t 1, N satisfying 0<a 1 < <a t 1 <N and gcd(n, a 1,, a t 1 ) = 1, one can find, within 4 t+o(t) bit operations, an integer e with the following property for all i {1,..., t 1}: m 1 ea 1 mod N, m 2 ea 2 mod N,, m t 1 ea t 1 mod N if m i [ N/2, N/2], then m i t 1N t 2 t 1

19 16 / 27 Find a suitable e Find e Consider the lattice L generated by the row vectors of the matrix: a 1 a 2 a t 1 N 0 0 B = 0 N N

20 16 / 27 Find a suitable e Find e Consider the lattice L generated by the row vectors of the matrix: a 1 a 2 a t 1 N 0 0 B = 0 N N det(l) N t 2

21 16 / 27 Find a suitable e Find e Consider the lattice L generated by the row vectors of the matrix: a 1 a 2 a t 1 N 0 0 B = 0 N N det(l) N t 2 From Minkowski s Theorem, let m = (m 1, m 2,, m t 1 ) be the shortest vector of lattice L, then, m t 1N t 2 t 1

22 16 / 27 Find a suitable e Find e Consider the lattice L generated by the row vectors of the matrix: a 1 a 2 a t 1 N 0 0 B = 0 N N det(l) N t 2 From Minkowski s Theorem, let m = (m 1, m 2,, m t 1 ) be the shortest vector of lattice L, then, m t 1N t 2 t 1 One can find m by using the Micciancio-Voulgaris algorithm

23 17 / 27 Find a suitable e Find e From m = (m 1, m 2,, m t 1 ) L, then there exists an integer e such that m 1 = ea 1 (mod N), m 2 = ea 2 (mod N),, m t 1 = ea t 1 (mod N) Because gcd(a 1, a 2,, a t 1, N) = 1, one can find integers x 1, x 2,, x t s.t., t 1 x i a i + x t N = 1 Let i=1 t 1 e = x i m i i=1 mod N Therefore, for i, 1 i t 1, we have ea i m i m i m t 1N t 2 t 1 mod N and

24 18 / 27 Proof of main theorem Main theorem Given any univariate t-nomial f (x) = c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 F q [x] We can decide, within 4 t+o(t) q t 2 t 1 +o(1) deterministic bit operations, whether f (x) has a root in F q

25 19 / 27 Proof of main theorem The case of gcd(a 1, a 2, a t 1, q 1) > 1. Let δ = gcd(a 1, a 2, a t 1, q 1). The F q -solvability of f (x) := c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 is equivalent to the solvability of the following system of equations: c 0 + c 1 y a1/δ + + c t 1 y at 1/δ = 0 y q 1 δ = 1

26 20 / 27 Proof of main theorem The main lemma Given a finite field F q and the polynomials ( ) x N 1 and c 0 + c 1 x a c t 1 x a t 1, in F q [x] with 0<a 1 < <a t 1 <N, gcd(n, a 1,, a t 1 ) = 1, c i 0 for all i, and N (q 1), there exists a deterministic q 1/4 (log q) O(1) + 4 t (t log N) O(1) + t 1 2 +o(1) N t 2 t 1 +o(1) (log q) 2+o(1) algorithm to decide whether these two polynomials share a root in F q. Remark: One can find a generator g of F q within q 1/4 (log q) O(1) bit operations. (Shparlinski, 1996)

27 21 / 27 Proof of main theorem Proof of the main lemma we can find an integer e in time 4 t+o(t) by reducing the lattice a 1 a 2 a t 1 N 0 0 B = 0 N N such that if m 1,..., m t 1 are the unique integers in the range [ N/2, N/2 ] respectively congruent to ea 1,..., ea t 1, then m i < t 1N t 2 t 1 for each i {1,..., t 1}.

28 22 / 27 Proof of main theorem Since N (q 1), we have x N 1 x q x, then the roots of x N 1 = 0 the same as x g q 1 N, let ζ N = g q 1 N, and k = gcd(e, N) If k = 1, the map is one-to-one ϕ :< ζ N > < ζ N > x x e finding a solution for ( ) is equivalent to finding x ζ N such that c 0 + c 1 x ea c t 1 x ea t 1 =0 The last equation can be rewritten as the lower degree equation c 0 + c 1 x m c t 1 x m t 1 =0 Time complexity: ( t 1N t 2 t 1 ) 1+o(1) (log q) 2+o(1)

29 23 / 27 Proof of main theorem if k >1, the map from ζ N to ζ N given by x x e is no longer one-to-one. Instead, it sends ζ N to a smaller subgroup ζ k N of order N/k Any element x ζ N can be written as ζn i z for some i {0,..., k 1} and z ζn k Now, gcd(e/k, N/k) = 1, so the map ϕ 1 is one-to-one ϕ 1 :< ζn k > < ζn k > y y e/k

30 24 / 27 Proof of main theorem Let x N 1 = 0 and c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 = 0 x < ζ N > and c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 = 0 i, 1 i k, x = (ζ N ) i y, y < ζn k > and c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 = 0 i, 1 i k, y < ζn k > and c 0 + c 1 ((ζ N ) i y) a c t 1 ((ζ N ) i y) a t 1 = 0 i, 1 i k, y < ζn k > and c 0 + c 1 ((ζ N ) i y e/k ) a c t 1 ((ζ N ) i y e/k ) a t 1 = 0 i, 1 i k, y N/k 1 = 0 and c 0 + c 1 (ζ N ) a1i y m1/k + + c t 1 (ζ N ) at 1i y mt 1/k = 0 f i (y) = c 0 + c 1 (ζ N ) a 1i y m 1/k + + c t 1 (ζ N ) a t 1i y m t 1/k

31 25 / 27 Proof of main theorem If f i is identically { zero then we have found a whole set of x solutions for N 1 = 0 c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 = 0 : the coset ζn i ζk N If f i is not identically zero then let l:=min i min(m i /k, 0) The polynomial z l f i (z) then has degree bounded from above by 2 t 1N t 2 t 1 /k. Deciding whether the pair of equations { y N/k 1 = 0 y l f i (y) = 0 has ( a solution for some i takes deterministic time t ) t 2 1+o(1) k 1N t 1 /k (log q) 2+o(1)

32 26 / 27 Proof of main theorem Roots structure Let γ be the number of f i 0, then the solutions of equations { x N 1 = 0 c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 = 0 has two parts over F q. The first part contains at most 2γ t 1N t 2 t 1 /k isolated roots, the other part includes k γ subgroup of F q with order N/k

33 27 / 27 Proof of main theorem Thank you!

SUB-LINEAR ROOT DETECTION, AND NEW HARDNESS RESULTS, FOR SPARSE POLYNOMIALS OVER FINITE FIELDS

SUB-LINEAR ROOT DETECTION, AND NEW HARDNESS RESULTS, FOR SPARSE POLYNOMIALS OVER FINITE FIELDS SUB-LINEAR ROOT DETECTION, AND NEW HARDNESS RESULTS, FOR SPARSE POLYNOMIALS OVER FINITE FIELDS JINGGUO BI, QI CHENG, AND J. MAURICE ROJAS Abstract. We present a deterministic 2 O(t) q t 2 t 1 +o(1) algorithm

More information

Roots of Sparse Polynomials over a Finite Field

Roots of Sparse Polynomials over a Finite Field ANTS-XII August 30, 2016 Sparsity-Dependant Bounds f(x) = c 0 + c 1 x a 1 + c 2 x a 2 + + c t x at R[x]. f is sparse if t deg f. Descartes Rule of Signs: The number of positive, real roots of f is bounded

More information

Background: Lattices and the Learning-with-Errors problem

Background: Lattices and the Learning-with-Errors problem Background: Lattices and the Learning-with-Errors problem China Summer School on Lattices and Cryptography, June 2014 Starting Point: Linear Equations Easy to solve a linear system of equations A s = b

More information

Sub-Linear Root Detection, and New Hardness Results, for Sparse Polynomials Over Finite Fields

Sub-Linear Root Detection, and New Hardness Results, for Sparse Polynomials Over Finite Fields Sub-Linear Root Detection, and New Hardness Results, for Sparse Polynomials Over Finite Fields Jingguo Bi Qi Cheng Institute for Advanced Study School of Computer Science Tsinghua University University

More information

M4. Lecture 3. THE LLL ALGORITHM AND COPPERSMITH S METHOD

M4. Lecture 3. THE LLL ALGORITHM AND COPPERSMITH S METHOD M4. Lecture 3. THE LLL ALGORITHM AND COPPERSMITH S METHOD Ha Tran, Dung H. Duong, Khuong A. Nguyen. SEAMS summer school 2015 HCM University of Science 1 / 31 1 The LLL algorithm History Applications of

More information

Solving All Lattice Problems in Deterministic Single Exponential Time

Solving All Lattice Problems in Deterministic Single Exponential Time Solving All Lattice Problems in Deterministic Single Exponential Time (Joint work with P. Voulgaris, STOC 2010) UCSD March 22, 2011 Lattices Traditional area of mathematics Bridge between number theory

More information

Hard Instances of Lattice Problems

Hard Instances of Lattice Problems Hard Instances of Lattice Problems Average Case - Worst Case Connections Christos Litsas 28 June 2012 Outline Abstract Lattices The Random Class Worst-Case - Average-Case Connection Abstract Christos Litsas

More information

1 Shortest Vector Problem

1 Shortest Vector Problem Lattices in Cryptography University of Michigan, Fall 25 Lecture 2 SVP, Gram-Schmidt, LLL Instructor: Chris Peikert Scribe: Hank Carter Shortest Vector Problem Last time we defined the minimum distance

More information

Lower Bounds of Shortest Vector Lengths in Random NTRU Lattices

Lower Bounds of Shortest Vector Lengths in Random NTRU Lattices Lower Bounds of Shortest Vector Lengths in Random NTRU Lattices Jingguo Bi 1,2 and Qi Cheng 2 1 School of Mathematics Shandong University Jinan, 250100, P.R. China. Email: jguobi@mail.sdu.edu.cn 2 School

More information

Factoring univariate polynomials over the rationals

Factoring univariate polynomials over the rationals Factoring univariate polynomials over the rationals Tommy Hofmann TU Kaiserslautern November 21, 2017 Tommy Hofmann Factoring polynomials over the rationals November 21, 2017 1 / 31 Factoring univariate

More information

Looking back at lattice-based cryptanalysis

Looking back at lattice-based cryptanalysis September 2009 Lattices A lattice is a discrete subgroup of R n Equivalently, set of integral linear combinations: α 1 b1 + + α n bm with m n Lattice reduction Lattice reduction looks for a good basis

More information

CSC 2414 Lattices in Computer Science October 11, Lecture 5

CSC 2414 Lattices in Computer Science October 11, Lecture 5 CSC 244 Lattices in Computer Science October, 2 Lecture 5 Lecturer: Vinod Vaikuntanathan Scribe: Joel Oren In the last class, we studied methods for (approximately) solving the following two problems:

More information

Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices

Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices Jingguo Bi 1 and Qi Cheng 2 1 Lab of Cryptographic Technology and Information Security School of Mathematics

More information

9 Knapsack Cryptography

9 Knapsack Cryptography 9 Knapsack Cryptography In the past four weeks, we ve discussed public-key encryption systems that depend on various problems that we believe to be hard: prime factorization, the discrete logarithm, and

More information

Lattice-Based Cryptography: Mathematical and Computational Background. Chris Peikert Georgia Institute of Technology.

Lattice-Based Cryptography: Mathematical and Computational Background. Chris Peikert Georgia Institute of Technology. Lattice-Based Cryptography: Mathematical and Computational Background Chris Peikert Georgia Institute of Technology crypt@b-it 2013 1 / 18 Lattice-Based Cryptography y = g x mod p m e mod N e(g a, g b

More information

How to Factor N 1 and N 2 When p 1 = p 2 mod 2 t

How to Factor N 1 and N 2 When p 1 = p 2 mod 2 t How to Factor N 1 and N 2 When p 1 = p 2 mod 2 t Kaoru Kurosawa and Takuma Ueda Ibaraki University, Japan Abstract. Let N 1 = p 1q 1 and N 2 = p 2q 2 be two different RSA moduli. Suppose that p 1 = p 2

More information

Cryptanalysis of the Quadratic Generator

Cryptanalysis of the Quadratic Generator Cryptanalysis of the Quadratic Generator Domingo Gomez, Jaime Gutierrez, Alvar Ibeas Faculty of Sciences, University of Cantabria, Santander E 39071, Spain jaime.gutierrez@unican.es Abstract. Let p be

More information

Some Sieving Algorithms for Lattice Problems

Some Sieving Algorithms for Lattice Problems Foundations of Software Technology and Theoretical Computer Science (Bangalore) 2008. Editors: R. Hariharan, M. Mukund, V. Vinay; pp - Some Sieving Algorithms for Lattice Problems V. Arvind and Pushkar

More information

Congruences and Residue Class Rings

Congruences and Residue Class Rings Congruences and Residue Class Rings (Chapter 2 of J. A. Buchmann, Introduction to Cryptography, 2nd Ed., 2004) Shoichi Hirose Faculty of Engineering, University of Fukui S. Hirose (U. Fukui) Congruences

More information

Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors

Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors 1 / 15 Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors Chris Peikert 1 Alon Rosen 2 1 SRI International 2 Harvard SEAS IDC Herzliya STOC 2007 2 / 15 Worst-case versus average-case

More information

Finding Small Solutions of the Equation Bx Ay = z and Its Applications to Cryptanalysis of the RSA Cryptosystem

Finding Small Solutions of the Equation Bx Ay = z and Its Applications to Cryptanalysis of the RSA Cryptosystem Finding Small Solutions of the Equation Bx Ay = z and Its Applications to Cryptanalysis of the RSA Cryptosystem Shixiong Wang 1, Longjiang Qu 2,3, Chao Li 1,3, and Shaojing Fu 1,2 1 College of Computer,

More information

A Disaggregation Approach for Solving Linear Diophantine Equations 1

A Disaggregation Approach for Solving Linear Diophantine Equations 1 Applied Mathematical Sciences, Vol. 12, 2018, no. 18, 871-878 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ams.2018.8687 A Disaggregation Approach for Solving Linear Diophantine Equations 1 Baiyi

More information

Algorithms for ray class groups and Hilbert class fields

Algorithms for ray class groups and Hilbert class fields (Quantum) Algorithms for ray class groups and Hilbert class fields Sean Hallgren joint with Kirsten Eisentraeger Penn State 1 Quantum Algorithms Quantum algorithms for number theoretic problems: Factoring

More information

Computational complexity of lattice problems and cyclic lattices

Computational complexity of lattice problems and cyclic lattices Computational complexity of lattice problems and cyclic lattices Lenny Fukshansky Claremont McKenna College Undergraduate Summer Research Program ICERM - Brown University July 28, 2014 Euclidean lattices

More information

Lecture 6.3: Polynomials and irreducibility

Lecture 6.3: Polynomials and irreducibility Lecture 6.3: Polynomials and irreducibility Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Modern Algebra M. Macauley (Clemson)

More information

Homework problems from Chapters IV-VI: answers and solutions

Homework problems from Chapters IV-VI: answers and solutions Homework problems from Chapters IV-VI: answers and solutions IV.21.1. In this problem we have to describe the field F of quotients of the domain D. Note that by definition, F is the set of equivalence

More information

LECTURE NOTES IN CRYPTOGRAPHY

LECTURE NOTES IN CRYPTOGRAPHY 1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic

More information

Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?

Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? Alexander May, Maike Ritzenhofen Faculty of Mathematics Ruhr-Universität Bochum, 44780 Bochum,

More information

From the shortest vector problem to the dihedral hidden subgroup problem

From the shortest vector problem to the dihedral hidden subgroup problem From the shortest vector problem to the dihedral hidden subgroup problem Curtis Bright University of Waterloo December 8, 2011 1 / 19 Reduction Roughly, problem A reduces to problem B means there is a

More information

Homework 8 Solutions to Selected Problems

Homework 8 Solutions to Selected Problems Homework 8 Solutions to Selected Problems June 7, 01 1 Chapter 17, Problem Let f(x D[x] and suppose f(x is reducible in D[x]. That is, there exist polynomials g(x and h(x in D[x] such that g(x and h(x

More information

CSE 206A: Lattice Algorithms and Applications Spring Basis Reduction. Instructor: Daniele Micciancio

CSE 206A: Lattice Algorithms and Applications Spring Basis Reduction. Instructor: Daniele Micciancio CSE 206A: Lattice Algorithms and Applications Spring 2014 Basis Reduction Instructor: Daniele Micciancio UCSD CSE No efficient algorithm is known to find the shortest vector in a lattice (in arbitrary

More information

A Few Primality Testing Algorithms

A Few Primality Testing Algorithms A Few Primality Testing Algorithms Donald Brower April 2, 2006 0.1 Introduction These notes will cover a few primality testing algorithms. There are many such, some prove that a number is prime, others

More information

MATH 501 Discrete Mathematics. Lecture 6: Number theory. German University Cairo, Department of Media Engineering and Technology.

MATH 501 Discrete Mathematics. Lecture 6: Number theory. German University Cairo, Department of Media Engineering and Technology. MATH 501 Discrete Mathematics Lecture 6: Number theory Prof. Dr. Slim Abdennadher, slim.abdennadher@guc.edu.eg German University Cairo, Department of Media Engineering and Technology 1 Number theory Number

More information

A new attack on RSA with a composed decryption exponent

A new attack on RSA with a composed decryption exponent A new attack on RSA with a composed decryption exponent Abderrahmane Nitaj and Mohamed Ould Douh,2 Laboratoire de Mathématiques Nicolas Oresme Université de Caen, Basse Normandie, France abderrahmane.nitaj@unicaen.fr

More information

Algebra Homework, Edition 2 9 September 2010

Algebra Homework, Edition 2 9 September 2010 Algebra Homework, Edition 2 9 September 2010 Problem 6. (1) Let I and J be ideals of a commutative ring R with I + J = R. Prove that IJ = I J. (2) Let I, J, and K be ideals of a principal ideal domain.

More information

A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-sparse Representations of Short Lattice Vectors

A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-sparse Representations of Short Lattice Vectors A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-sparse Representations of Short Lattice Vectors Dan Ding 1, Guizhen Zhu 2, Yang Yu 1, Zhongxiang Zheng 1 1 Department of Computer Science

More information

Foundations of Cryptography

Foundations of Cryptography Foundations of Cryptography Ville Junnila viljun@utu.fi Department of Mathematics and Statistics University of Turku 2015 Ville Junnila viljun@utu.fi Lecture 7 1 of 18 Cosets Definition 2.12 Let G be a

More information

A Note on the Density of the Multiple Subset Sum Problems

A Note on the Density of the Multiple Subset Sum Problems A Note on the Density of the Multiple Subset Sum Problems Yanbin Pan and Feng Zhang Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences,

More information

Applications of Lattice Reduction in Cryptography

Applications of Lattice Reduction in Cryptography Applications of Lattice Reduction in Cryptography Abderrahmane Nitaj University of Caen Basse Normandie, France Kuala Lumpur, Malaysia, June 27, 2014 AK Q ËAÓ Abderrahmane Nitaj (LMNO) Applications of

More information

Top Ehrhart coefficients of integer partition problems

Top Ehrhart coefficients of integer partition problems Top Ehrhart coefficients of integer partition problems Jesús A. De Loera Department of Mathematics University of California, Davis Joint Math Meetings San Diego January 2013 Goal: Count the solutions

More information

MATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences.

MATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences. MATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences. Congruences Let n be a postive integer. The integers a and b are called congruent modulo n if they have the same

More information

For your quiz in recitation this week, refer to these exercise generators:

For your quiz in recitation this week, refer to these exercise generators: Monday, Oct 29 Today we will talk about inverses in modular arithmetic, and the use of inverses to solve linear congruences. For your quiz in recitation this week, refer to these exercise generators: GCD

More information

From the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem

From the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem From the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem Curtis Bright December 9, 011 Abstract In Quantum Computation and Lattice Problems [11] Oded Regev presented the first known connection

More information

Straight Line Programs and Torsion Points on Elliptic Curves

Straight Line Programs and Torsion Points on Elliptic Curves Straight Line Programs and Torsion Points on Elliptic Curves Qi Cheng Abstract In this paper, we show several connections between the L-conjecture, proposed by Bürgisser [3], and the boundedness theorem

More information

Fast Absolute Irreducibility Testing via Newton Polytopes

Fast Absolute Irreducibility Testing via Newton Polytopes Fast Absolute Irreducibility Testing via Newton Polytopes Shuhong Gao and Alan G.B. Lauder Abstract We present a polytope method to test irreducibility of random sparse polynomials over an arbitrary field,

More information

Lecture Notes. Advanced Discrete Structures COT S

Lecture Notes. Advanced Discrete Structures COT S Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-13 Recap Divisibility Prime Number Theorem Euclid s Lemma Fundamental Theorem of Arithmetic Euclidean Algorithm Basic Notions - Section

More information

Modern Algebra I. Circle the correct answer; no explanation is required. Each problem in this section counts 5 points.

Modern Algebra I. Circle the correct answer; no explanation is required. Each problem in this section counts 5 points. 1 2 3 style total Math 415 Please print your name: Answer Key 1 True/false Circle the correct answer; no explanation is required. Each problem in this section counts 5 points. 1. Every group of order 6

More information

ECEN 5022 Cryptography

ECEN 5022 Cryptography Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,

More information

Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring

Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring Jean-Sébastien Coron and Alexander May Gemplus Card International 34 rue Guynemer, 92447 Issy-les-Moulineaux, France

More information

COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY

COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY QI CHENG, JOSHUA E. HILL, AND DAQING WAN Abstract. Let p be a prime. Given a polynomial in F p m[x] of egree over the finite fiel F p m, one can view it as

More information

CS Asymptotic Notations for Algorithm Analysis

CS Asymptotic Notations for Algorithm Analysis CS483-02 Asymptotic Notations for Algorithm Analysis Instructor: Fei Li Room 443 ST II Office hours: Tue. & Thur. 4:30pm - 5:30pm or by appointments lifei@cs.gmu.edu with subject: CS483 http://www.cs.gmu.edu/

More information

Irreducible Polynomials over Finite Fields

Irreducible Polynomials over Finite Fields Chapter 4 Irreducible Polynomials over Finite Fields 4.1 Construction of Finite Fields As we will see, modular arithmetic aids in testing the irreducibility of polynomials and even in completely factoring

More information

Mathematical Foundations of Cryptography

Mathematical Foundations of Cryptography Mathematical Foundations of Cryptography Cryptography is based on mathematics In this chapter we study finite fields, the basis of the Advanced Encryption Standard (AES) and elliptical curve cryptography

More information

Pseudorandom Sequences I: Linear Complexity and Related Measures

Pseudorandom Sequences I: Linear Complexity and Related Measures Pseudorandom Sequences I: Linear Complexity and Related Measures Arne Winterhof Austrian Academy of Sciences Johann Radon Institute for Computational and Applied Mathematics Linz Carleton University 2010

More information

Lattices. A Lattice is a discrete subgroup of the additive group of n-dimensional space R n.

Lattices. A Lattice is a discrete subgroup of the additive group of n-dimensional space R n. Lattices A Lattice is a discrete subgroup of the additive group of n-dimensional space R n. Lattices have many uses in cryptography. They may be used to define cryptosystems and to break other ciphers.

More information

a + bi by sending α = a + bi to a 2 + b 2. To see properties (1) and (2), it helps to think of complex numbers in polar coordinates:

a + bi by sending α = a + bi to a 2 + b 2. To see properties (1) and (2), it helps to think of complex numbers in polar coordinates: 5. Types of domains It turns out that in number theory the fact that certain rings have unique factorisation has very strong arithmetic consequences. We first write down some definitions. Definition 5.1.

More information

New attacks on RSA with Moduli N = p r q

New attacks on RSA with Moduli N = p r q New attacks on RSA with Moduli N = p r q Abderrahmane Nitaj 1 and Tajjeeddine Rachidi 2 1 Laboratoire de Mathématiques Nicolas Oresme Université de Caen Basse Normandie, France abderrahmane.nitaj@unicaen.fr

More information

Factorization in Integral Domains II

Factorization in Integral Domains II Factorization in Integral Domains II 1 Statement of the main theorem Throughout these notes, unless otherwise specified, R is a UFD with field of quotients F. The main examples will be R = Z, F = Q, and

More information

Centrum Wiskunde & Informatica, Amsterdam, The Netherlands

Centrum Wiskunde & Informatica, Amsterdam, The Netherlands Logarithmic Lattices Léo Ducas Centrum Wiskunde & Informatica, Amsterdam, The Netherlands Workshop: Computational Challenges in the Theory of Lattices ICERM, Brown University, Providence, RI, USA, April

More information

Algebraic structures I

Algebraic structures I MTH5100 Assignment 1-10 Algebraic structures I For handing in on various dates January March 2011 1 FUNCTIONS. Say which of the following rules successfully define functions, giving reasons. For each one

More information

RSA Cryptosystem and Factorization

RSA Cryptosystem and Factorization RSA Cryptosystem and Factorization D. J. Guan Department of Computer Science National Sun Yat Sen University Kaoshiung, Taiwan 80424 R. O. C. guan@cse.nsysu.edu.tw August 25, 2003 RSA Cryptosystem was

More information

Finite Fields. Mike Reiter

Finite Fields. Mike Reiter 1 Finite Fields Mike Reiter reiter@cs.unc.edu Based on Chapter 4 of: W. Stallings. Cryptography and Network Security, Principles and Practices. 3 rd Edition, 2003. Groups 2 A group G, is a set G of elements

More information

Explicit Methods in Algebraic Number Theory

Explicit Methods in Algebraic Number Theory Explicit Methods in Algebraic Number Theory Amalia Pizarro Madariaga Instituto de Matemáticas Universidad de Valparaíso, Chile amaliapizarro@uvcl 1 Lecture 1 11 Number fields and ring of integers Algebraic

More information

CSE 206A: Lattice Algorithms and Applications Spring Minkowski s theorem. Instructor: Daniele Micciancio

CSE 206A: Lattice Algorithms and Applications Spring Minkowski s theorem. Instructor: Daniele Micciancio CSE 206A: Lattice Algorithms and Applications Spring 2014 Minkowski s theorem Instructor: Daniele Micciancio UCSD CSE There are many important quantities associated to a lattice. Some of them, like the

More information

The Shortest Vector Problem (Lattice Reduction Algorithms)

The Shortest Vector Problem (Lattice Reduction Algorithms) The Shortest Vector Problem (Lattice Reduction Algorithms) Approximation Algorithms by V. Vazirani, Chapter 27 - Problem statement, general discussion - Lattices: brief introduction - The Gauss algorithm

More information

Fields in Cryptography. Çetin Kaya Koç Winter / 30

Fields in Cryptography.   Çetin Kaya Koç Winter / 30 Fields in Cryptography http://koclab.org Çetin Kaya Koç Winter 2017 1 / 30 Field Axioms Fields in Cryptography A field F consists of a set S and two operations which we will call addition and multiplication,

More information

Elliptic curves and Hilbert s Tenth Problem

Elliptic curves and Hilbert s Tenth Problem Elliptic curves and Hilbert s Tenth Problem Karl Rubin, UC Irvine MAA @ UC Irvine October 16, 2010 Karl Rubin Elliptic curves and Hilbert s Tenth Problem MAA, October 2010 1 / 40 Elliptic curves An elliptic

More information

CS Asymptotic Notations for Algorithm Analysis Outline

CS Asymptotic Notations for Algorithm Analysis Outline CS483-02 Asymptotic Notations for Algorithm Analysis Instructor: Fei Li Room 443 ST II Office hours: Tue. & Thur. 4:30pm - 5:30pm or by appointments lifei@cs.gmu.edu with subject: CS483 http://www.cs.gmu.edu/

More information

GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2)

GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2) GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2) KEITH CONRAD We will describe a procedure for figuring out the Galois groups of separable irreducible polynomials in degrees 3 and 4 over

More information

Corollary 4.2 (Pepin s Test, 1877). Let F k = 2 2k + 1, the kth Fermat number, where k 1. Then F k is prime iff 3 F k 1

Corollary 4.2 (Pepin s Test, 1877). Let F k = 2 2k + 1, the kth Fermat number, where k 1. Then F k is prime iff 3 F k 1 4. Primality testing 4.1. Introduction. Factorisation is concerned with the problem of developing efficient algorithms to express a given positive integer n > 1 as a product of powers of distinct primes.

More information

On the complexity of polynomial system solving

On the complexity of polynomial system solving Bruno Grenet LIX École Polytechnique partly based on a joint work with Pascal Koiran & Natacha Portier XXVèmes rencontres arithmétiques de Caen Île de Tatihou, June 30. July 4., 2014 Is there a (nonzero)

More information

On the Optimality of Lattices for the Coppersmith Technique

On the Optimality of Lattices for the Coppersmith Technique On the Optimality of Lattices for the Coppersmith Technique Yoshinori Aono Manindra Agrawal Takakazu Satoh Osamu Watanabe December 18, 2015 Abstract We investigate a method for finding small integer solutions

More information

Practical Analysis of Key Recovery Attack against Search-LWE Problem

Practical Analysis of Key Recovery Attack against Search-LWE Problem Practical Analysis of Key Recovery Attack against Search-LWE Problem The 11 th International Workshop on Security, Sep. 13 th 2016 Momonari Kudo, Junpei Yamaguchi, Yang Guo and Masaya Yasuda 1 Graduate

More information

1. Group Theory Permutations.

1. Group Theory Permutations. 1.1. Permutations. 1. Group Theory Problem 1.1. Let G be a subgroup of S n of index 2. Show that G = A n. Problem 1.2. Find two elements of S 7 that have the same order but are not conjugate. Let π S 7

More information

Algebra Exam Fall Alexander J. Wertheim Last Updated: October 26, Groups Problem Problem Problem 3...

Algebra Exam Fall Alexander J. Wertheim Last Updated: October 26, Groups Problem Problem Problem 3... Algebra Exam Fall 2006 Alexander J. Wertheim Last Updated: October 26, 2017 Contents 1 Groups 2 1.1 Problem 1..................................... 2 1.2 Problem 2..................................... 2

More information

Algebraic number theory

Algebraic number theory Algebraic number theory F.Beukers February 2011 1 Algebraic Number Theory, a crash course 1.1 Number fields Let K be a field which contains Q. Then K is a Q-vector space. We call K a number field if dim

More information

An arithmetic Bernštein-Kušnirenko inequality

An arithmetic Bernštein-Kušnirenko inequality An arithmetic Bernštein-Kušnirenko inequality César Martínez joint with Martín Sombra Laboratoire de Mathématiques Nicolas Oresme Université de Caen Normandie MEGA June 12th 2017 Schema Counting the number

More information

Some Lattice Attacks on DSA and ECDSA

Some Lattice Attacks on DSA and ECDSA Some Lattice Attacks on DSA and ECDSA Dimitrios Poulakis Department of Mathematics, Aristotle University of Thessaloniki, Thessaloniki 54124, Greece, email:poulakis@math.auth.gr November 10, 2010 Abstract

More information

Parity of the Number of Irreducible Factors for Composite Polynomials

Parity of the Number of Irreducible Factors for Composite Polynomials Parity of the Number of Irreducible Factors for Composite Polynomials Ryul Kim Wolfram Koepf Abstract Various results on parity of the number of irreducible factors of given polynomials over finite fields

More information

Chapter 14: Divisibility and factorization

Chapter 14: Divisibility and factorization Chapter 14: Divisibility and factorization Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Summer I 2014 M. Macauley (Clemson) Chapter

More information

Metacommutation of Hurwitz primes

Metacommutation of Hurwitz primes Metacommutation of Hurwitz primes Abhinav Kumar MIT Joint work with Henry Cohn January 10, 2013 Quaternions and Hurwitz integers Recall the skew-field of real quaternions H = R+Ri +Rj +Rk, with i 2 = j

More information

Gentry s SWHE Scheme

Gentry s SWHE Scheme Homomorphic Encryption and Lattices, Spring 011 Instructor: Shai Halevi May 19, 011 Gentry s SWHE Scheme Scribe: Ran Cohen In this lecture we review Gentry s somewhat homomorphic encryption (SWHE) scheme.

More information

Algebra Qualifying Exam August 2001 Do all 5 problems. 1. Let G be afinite group of order 504 = 23 32 7. a. Show that G cannot be isomorphic to a subgroup of the alternating group Alt 7. (5 points) b.

More information

Running head: IDEAL LATTICE CRYPTOGRAPHY 1. Ideal Lattice Cryptography: Escaping the Cryptopocalypse. Stephen Gillen. Georgia Institute of Technology

Running head: IDEAL LATTICE CRYPTOGRAPHY 1. Ideal Lattice Cryptography: Escaping the Cryptopocalypse. Stephen Gillen. Georgia Institute of Technology Running head: IDEAL LATTICE CRYPTOGRAPHY 1 Ideal Lattice Cryptography: Escaping the Cryptopocalypse Stephen Gillen Georgia Institute of Technology MATH 6122 Algebra II April 29, 2016 IDEAL LATTICE CRYPTOGRAPHY

More information

Elliptic curves: Theory and Applications. Day 3: Counting points.

Elliptic curves: Theory and Applications. Day 3: Counting points. Elliptic curves: Theory and Applications. Day 3: Counting points. Elisa Lorenzo García Université de Rennes 1 13-09-2017 Elisa Lorenzo García (Rennes 1) Elliptic Curves 3 13-09-2017 1 / 26 Counting points:

More information

Page Points Possible Points. Total 200

Page Points Possible Points. Total 200 Instructions: 1. The point value of each exercise occurs adjacent to the problem. 2. No books or notes or calculators are allowed. Page Points Possible Points 2 20 3 20 4 18 5 18 6 24 7 18 8 24 9 20 10

More information

1. Algebra 1.7. Prime numbers

1. Algebra 1.7. Prime numbers 1. ALGEBRA 30 1. Algebra 1.7. Prime numbers Definition Let n Z, with n 2. If n is not a prime number, then n is called a composite number. We look for a way to test if a given positive integer is prime

More information

Lattices, Cryptography, and NTRU. An introduction to lattice theory and the NTRU cryptosystem. Ahsan Z. Zahid

Lattices, Cryptography, and NTRU. An introduction to lattice theory and the NTRU cryptosystem. Ahsan Z. Zahid Lattices, Cryptography, and NTRU An introduction to lattice theory and the NTRU cryptosystem Ahsan Z. Zahid A thesis presented for the degree of Bachelor of Science School of Science St. Mary s College

More information

Cryptanalysis via Lattice Techniques

Cryptanalysis via Lattice Techniques Cryptanalysis via Lattice Techniques Alexander May Horst Görtz Institute for IT-Security Faculty of Mathematics Ruhr-University Bochum crypt@b-it 2010, Aug 2010, Bonn Lecture 1, Mon Aug 2 Introduction

More information

CYCLOTOMIC POLYNOMIALS

CYCLOTOMIC POLYNOMIALS CYCLOTOMIC POLYNOMIALS 1. The Derivative and Repeated Factors The usual definition of derivative in calculus involves the nonalgebraic notion of limit that requires a field such as R or C (or others) where

More information

Graduate Preliminary Examination

Graduate Preliminary Examination Graduate Preliminary Examination Algebra II 18.2.2005: 3 hours Problem 1. Prove or give a counter-example to the following statement: If M/L and L/K are algebraic extensions of fields, then M/K is algebraic.

More information

Dividing Polynomials: Remainder and Factor Theorems

Dividing Polynomials: Remainder and Factor Theorems Dividing Polynomials: Remainder and Factor Theorems When we divide one polynomial by another, we obtain a quotient and a remainder. If the remainder is zero, then the divisor is a factor of the dividend.

More information

Simultaneous Linear, and Non-linear Congruences

Simultaneous Linear, and Non-linear Congruences Simultaneous Linear, and Non-linear Congruences CIS002-2 Computational Alegrba and Number Theory David Goodwin david.goodwin@perisic.com 09:00, Friday 18 th November 2011 Outline 1 Polynomials 2 Linear

More information

A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties:

A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: Byte multiplication 1 Field arithmetic A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: F is an abelian group under addition, meaning - F is closed under

More information

Lecture 7.5: Euclidean domains and algebraic integers

Lecture 7.5: Euclidean domains and algebraic integers Lecture 7.5: Euclidean domains and algebraic integers Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Modern Algebra M. Macauley

More information

Lattice Basis Reduction and the LLL Algorithm

Lattice Basis Reduction and the LLL Algorithm Lattice Basis Reduction and the LLL Algorithm Curtis Bright May 21, 2009 1 2 Point Lattices A point lattice is a discrete additive subgroup of R n. A basis for a lattice L R n is a set of linearly independent

More information

SPARSE UNIVARIATE POLYNOMIALS WITH MANY ROOTS OVER FINITE FIELDS

SPARSE UNIVARIATE POLYNOMIALS WITH MANY ROOTS OVER FINITE FIELDS SPARSE UNIVARIATE POLYNOMIALS WITH MANY ROOTS OVER FINITE FIELDS QI CHENG, SHUHONG GAO, J. MAURICE ROJAS, AND DAQING WAN Abstract. Supposeq isaprimepowerandf F q [x]isaunivariatepolynomialwithexactly t

More information

CYCLOTOMIC POLYNOMIALS

CYCLOTOMIC POLYNOMIALS CYCLOTOMIC POLYNOMIALS 1. The Derivative and Repeated Factors The usual definition of derivative in calculus involves the nonalgebraic notion of limit that requires a field such as R or C (or others) where

More information

Integer Factorization using lattices

Integer Factorization using lattices Integer Factorization using lattices Antonio Vera INRIA Nancy/CARAMEL team/anr CADO/ANR LAREDA Workshop Lattice Algorithmics - CIRM - February 2010 Plan Introduction Plan Introduction Outline of the algorithm

More information

Algebra Qualifying Exam Solutions. Thomas Goller

Algebra Qualifying Exam Solutions. Thomas Goller Algebra Qualifying Exam Solutions Thomas Goller September 4, 2 Contents Spring 2 2 2 Fall 2 8 3 Spring 2 3 4 Fall 29 7 5 Spring 29 2 6 Fall 28 25 Chapter Spring 2. The claim as stated is false. The identity

More information