Generalized Fermat-Mersenne Number Theoretic Transform Vassil S. Dimitrov, Todor V. Cooklev, and Borislav D. Donevsky

Size: px
Start display at page:

Download "Generalized Fermat-Mersenne Number Theoretic Transform Vassil S. Dimitrov, Todor V. Cooklev, and Borislav D. Donevsky"

Transcription

1 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-11: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 41, NO., FEBRUARY Generalized Fermat-Mersenne Number Theoretic Transform Vassil S. Dimitrov, Todor V. Cooklev, and Borislav D. Donevsky Abstract-A generalization of the Fermat and Mersenne number transform is suggested. The transforms are defined over finite fields and rings. This paper establishes the conditions necessary for these numbers to be prime. The length of the transforms is a highly composite number. An algorithm for hding primitive roots of unity is also discussed. The proposed transforms are characterized by respectable Combinations of transform length, dynamic range and computational efficiency and can be used for fast convolution of integer sequences. S I. INTRODUCTION EVERAL papers appeared in the beginning of the seventies in which number-theoretic transforms (NTT's) were proposed as an alternative to the approaches with fast Fourier transform (FFT)[1]-[31]. There are many applications of the NTT: digital filtering [4]-[5], fast convolution [6]-[9], bilinear and other transforms [lo], image processing [ 111, decoding of Reed-Solomon codes [1], and solution of partial differential equations [13], to name just a few. Let Z, represent the ring of integers (0, l,...,p - 1). The NTT and its inverse over Z, are defined by the pair of relations: N-1 ~ ( k = ) Cx(n)ank, /c = 0, 1,..., N - 1 (la) n=o N-1 where all computations are modulo, and a suitable chosen integer p. N is a number of signal samples in the input and output sequences and the kernel of the transform a is a primitive Nth root of unity an 1 (mod p) and for every IC < N a' f 1 (mod p) () Every NTT is specified by three parameters-n, p, and a. There are several requirements which, when satisfied, will make the technique competitive: 1) the transform length (TL) N should be large enough in order for x(n) to accommodate practical signals; ) N must be a highly composite number Manuscript received April 30, 1991; revised May 8, 199, March 1, 1993 and September 16, V. S. Dimitrov is with the Technical University of Plovdiv, Plovdiv, Bulgaria. T. V. Cooklev is with the Faculty of Engineering, Tokyo Institute of Technology, Tokyo, Japan. B. D. Donevsky is with the IAMI, Technical University of Sofia, Sofia, Bulgaria. IEEE Log Number so that fast algorithms can be used; 3) the multiplication by powers of a must be simple operation and error-proof. This is easily accomplished in q-ary arithmetic if a is a power of q; 4) the modulus p determines the dynamic range and must be large enough; 5) p should have an attractive representation in q-ary arithmetic to facilitate arithmetic mod p; 6) in order to avoid overflow the modulus must be much larger than the TL. These requirements are our objectives and will be addressed in more details in the sequel. The problem for choosing N, p and a is complicated be the fact that these parameters are not independent. They can not be chosen separately. Theorem I [I], [3]: If the modulus p is composite, that is p = p;'. p;z.... p;k then N must divide the greatest common divisor (GCD) of (PI- 1, pa - 1,...,Pk- 1). If p is prime, then N must divide p - 1. NTTs with Fermat (Mersenne) numbers as a modulus are called Fermat (Mersenne) number transforms, or FNT (MNT). The Fermat and Mersenne numbers are defined correspondingly by ~,=~"+1, n=l,,3,... (3) M, = " - 1, n - prime. (4) Rader [] was the first to use the MNT for digital convolution. Agarwal and Bums [3] proposed the FNT. A major disadvantage of these transforms is that the relationship between the dynamic range and the transform length, as outlined in Theorem 1, is overly restrictive. To relax this restriction, several other NTT's have been considered. Pollard [14] used prime numbers of the form p = " - " + 1. (5) In [ 151 and [ 161, the authors have used numbers of the form 4q for q = 8, 1, 16, 18, 4, 3. Obviously, these numbers are a special case of (3, for m = n. Another intersting special case of (5) is m = n +, or p = 3. " + 1. Golomb et ul. [17] developed an algorithm for integer convolution over the finite field GF(3." + 1) and described a technique for finding prime numbers of the form 3. n + 1. From pure number-theoretic point of view, this problem is considered in [18]. The number 3. " + 1 have an interesting property-the necessary condition to be prime is that n has no prime factors greater than 3 [19]. Nussbaumer [0], [1] generalized the FNT and MNT and developed pseudo-fermat (pseudo-mersenne) number theoretic transforms, which are /94$ IEEE

2 134 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-11: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 41, NO., FEBRUARY 1994 transforms over the ring Z,, where p-is a divisor of composite Fermat (Mersenne) number. It should be noted that all of the above moduli can be written in the form p = " + s, where s is an arbitrary integer. Now we shall look for generalized Fermat-Mersenne (GFM) numbers, which will include the above numbers as special cases. Using these GFM numbers as moduli, the restrictive relationships between the transform length and the dynamic range can be significantly relaxed. Investigating the same problem in [] Lu and Lee proposed numbers of the form: p = qmt f (q - 1). (6) The numbers (6) have three free parameters-q, m, and t, which must be chosen properly in order for p to be prime. The authors of [] did not investigate the conditions when the numbers (6) are prime. In the present paper a different approach is used. We consider numbers of the form (from now on called GFM numbers): Lemma : The polynomial Q(z) = ~P-~+zp-~+...+z+1 divides the polynomial P(z) = zml + xm* zmp if and only if mi f mj (mod p) implies i # j. Theorem : The necessary conditions for Gq,p,n to be prime are: 1) pprime and ) n = pk (k-nonnegative integer). Now some interesting properties of the GFM numbers will be discussed. In the nineteenth century, Lucas [3] proved that all the prime divisors of the nth Fermat numbers F, have the form k."+ +l. The numbers Gq,, 71 have a similar property: Theorem 3: All prime divisors of Gq,P,pm greater than p have the form k. pa+' + 1. This theorem is a key to an algorithm for finding primes of the form Gq,p, ". B. Implementation of the Arithmetic Operations One of the most important reasons for the interest in the Fermat and Mersenne transforms is the simple binary representation of the Fermat and Mersenne numbers: (Z" + 1 )lo The following notations are used: M,, = G,p, = (P-l)" + (P-)" "+1 A, = M3," = 4" +" + 1 (8) T, = M5," = 16" + 8" + 4" + " + 1 S, = M7, 7L = 64" + 3" + 16" + 8" + 4" + " + 1. It is clear that Mp, 1 is a Mersenne number and M, k is a Fermat number. The NTT's over the ring ZM=, are called GFM N'IT's. The paper is organized as follows. In section 11, the necessary conditions for primality are established. These conditions will lead to an algorithm for finding prime numbers of the form (7). Then algorithms for the basic arithmetic operations modulo the GFM numbers are presented. Section I11 provides an algorithm for finding primitive roots of unity. In section IV some N7T's of practical importance are discussed. 11. ANALYSIS OF THE RING ZG~, p, ~ A. Necessary Conditions for Primality (zn = (11.. ' 1) = $1 (10) The subscripts denote the base of the number system. This simple binary representation not only greatly facilitates modular arithmetic, but makes possible error-free computation. The other numbers, which have been considered so far can be represented as follows: (3-"+1)10 = (110~~~01) - (p)o("-1)1) (11) 4" - " + 1 = (11...lo...01) - (1(")0("-1)1 ) (1) The numbers M,, ", which are in process of consideration, have the following binary representation: (Mp,n)10 = ( 10~~~010~~~010~~~01) - (13) - (1 o(n-1) (P 1) - 1 It will be demonstrated, that by exploiting the symmetry in the binary representation, the arithmetic operations can be performed efficiently. As outlined in [4], there are simple and efficient procedures for addition and multiplication in the residue arithmetic mod (n f s), where s 5 n/3. Four integer multiplications are necessary to compute the product of two integers mod (" f s). The symmetry in the As was pointed out in the introduction, the modulo does not have to be a prime number. However, the powers of the primitive element ai must be relative prime to the modulo for each integer i. So, to avoid additional restrictions, the modulo binary representation of the numbers M,," is chosen to be a prime number. Besides, N in this case is as large as possible, because it must divide p - 1. Now we are in a position to state the necessary conditions for the numbers Gq, to be prime. To do this, we need two lemmas (all Multiplication in the Ring ZM,, proofs are in the Appendix). Lemma I: If p is a prime, then for every t 1 and T 1 there will be a positive integer B,,t, such that qtpp+l = (Gq,P,Pr). BT,t + 1. makes possible the reduction of the number of multiplications to one, which is very significant. Let us define the function G(X) = X1 - Xs, where x = X I + ~(p-')". The following two theorems are trivial extensions of theorems and 3 from [4]. They are stated without proof.

3 ~ DIMITROV et al.:generalized FERMAT-MERSENNE NUMBER THEORETIC TRANSFORM 135 TABLE I COMPLEXITY OF ALGORITHMS FOR MODULAR MULTIPLICATIONS Theorem 4: G(X) = X (mod Mp, n) Theorem 5: Let X, Y E [0, Mp,n - 1 and s = (1--')x(P-l)n. Then -(P-l)n < G'(XY) < (P-l)n+l, where G' = G(G(... G(XY))...)). 7 k-times An efficient algorithm is given for multiplying X and Y mod Mp, n. 1. begin a. C:= X *Y; b. for i:= 1 to 3 do C:= G(C); c. if C < 0 then retum C - Mp, d. else if C > Mp, then retum C - Mp, e. else retum C. end; Example: Find the residue modulo 73 of the product of 7 and 70. X = 7010 = =, Y = 710 = , 73 = M3,3 Since the case IC = 0 (s = +1) corresponds to the Fermat numbers the suggested algorithm may be used for the computation of the FNT. The approach is an alternative to the technique of Leibowitz [7]. When s = -1 an efficient method for multiplication modulo Mersenne numbers is obtained AN ALGORITHM FOR FINDING NTH ROOTS OF UNITY IN NTT'S MOD kfp,n From algebra we know that if every element of a group is equal to a power of the primitive element this group is called cyclic and the primitive element is called a generator of the group. Recall that x a (mod p) then a is a quadratic residue mod p. According to the Euler's criterion for quadratic residues [8], if a(p-1)/ 1 (mod p) then a is a quadratic residue mod p, and if u(p-')/~ = -1 then a is a quadratic nonresidue mod p, where p is prime and p is not a divisor of a. If the length of the transform N is chosen to be a power of two, i.e. N = n, then highly efficient algorithm can be used. To specify completely the NTT, we must find a primitive element which generates the n-element cyclic subgroup in Z~LI,, n. Suppose g is a quadratic nonresidue mod Mp, n, i.e., We have g(mp.n-1)/ E -1 (mod M P, n ). (14) (Mp, - 1)/ = "-1((p-1)" - 1)/(n - 1) and " - 1 is odd, so Multiplicative step: X. Y = = = loolllollooooz ~ Partial result: = 5040 = = = = = = 78.8 Partial result: = -654 = 50+(-11) = = =11.8 Partial result: = 149 = 1 + ' = 1 10 = ~. 8 Final result: 11 = 310 The complexity of the above algorithm is one integer multiplication and three additions and shifts. Therefore, the complexity of the multiplication is crucial. There are three basic algorithms for the multiplication of m-bit integers-the direct one, with o(m) bit operations, the Karatsuba-Ofman algorithm [5] with 0(m1.585) operations, and the Schonhage- Strassen algorithm [6], which is the fastest one, with o(m log m log log m) operations. The numbers mod Mp, have o(pn) bits in their binary representation. The complexity of the suggested algorithm for modular multiplication is presented in Table I. If a is a generator of the n-element cyclic subgroup in the ring ZM~, then a" 1 (mod Mp, n) and, therefore, According to theorem 1 in [l] a"-' is the primitive element which generates the n-element cyclic subgroup. For sequences with less samples (N = P, 1 5 t 5 n) the primitive Nth root of unity will be gt = u(~"-~)~"-*. IV. SOME USEFUL GFM NIT'S Now we shall briefly review some NTT's of practical importance, which are special cases of the GFM NTT's. A. htt Over the Ring ZA,, It may easily be verified that Al = 7, A3 = 73 and Ag = 6657 are prime numbers. It is still unknown whether greater values for n, satisfying the condition An-prime exist or not. A7 and A81 can be factored as follows: A7 = A81 = In Table 11, the numbers A, (n < 16), a list of factors, and the maximum transform length (power of ) are given:

4 3l ~ 136 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-11 ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 41, NO., FEBRUARY 1994 TABLE II TRANSFORM LENGTHS FOR Nn.5 MOD An n A, =4"+"+l FACTORIZATION MAX.TL(POWER OF TWO) prime prime prime According to Table 11, practical applications may find the case n = 9, Ag = 6657, because the maximum transform length, 51, is sufficient in many applications. The primitive element must satisfy (), which has cp(n) solutions, where cp is the Euler's totient function [8]. If N=56, cp(n) = 18, so there are 18 possible values for a, which may be found by a simple computer program. These values of a are presented in Table 111. B. NTT Over the Ring ZT, In this case the NTT is carried out with the numbers Tn as moduli. The necessary condition T, to be a prime is n = 5'+. If a then T, is too large. The case a = 0 corresponds to the MNT. We shall pay attention to the cases cy = 1 and cy =. 1) cy = 1. It is easily verified that T5 is composite: T5 = = According to Theorem 1, the maximum transform length is N,,, = GCD(600,1800) = 600. Note that 600 is a highly composite number, 600 = 3.3.5', and the Winograd algorithm [9] can be applied. At the same time, 600 samples are sufficient for many applications. Therefore, all objectives stated in section I are met. This NlT has been developed independently in [30] via an analysis of cyclotomic integers. ) a =. T5 is composite and can be factored: T5 = = Pi. P Using Euclid's algorithm we find N,, = GCD(P1-1, Pz - 1) = = 4 +. S3.41. This NlT can meet extreme requirements for precision and length. Again the Winograd algorithm for a length 4.3l. 53 can be used. C. NTT Over the Ring Zs, According to Theorem 1, n must have the form 7'+. Practical application may find the case a = 1. The number ST = is prime and the maximum transform length 57-1 is highly composite: S7-1 = Z Again the Winograd algorithm for a transform length 4 3'. 7 = 1008 can be applied. To the best of our knowledge, the number 5'7 is the greatest known prime number of the class.mp,n. Finding greater prime numbers which belong to this TABLE Roo~s OF UNITY IN class is an interesting problem for the computational number theory. The results of this section are summarized in Table IV. Note, that is of the form a.3b.5c.7d. In this case, Winograd or mixed radix [31,3] algorithms can be used. At this point a comparison to other existing transforms (Tables V-VII) is necessary. As is pointed by Agarwal and Burms in [3] the MNT is not of practical importance, because the TL it offers are small and are not highly composite. The NIT mod F4 is characterized by dynamic range of 17 bits and maximum TL of 16. This is not a good choice, because inevitably overflow must be satisfied. The modulus must be much greater than the TL. The suggested NTT's clearly meet all requirements stated in the introduction. They are useful alternatives to the other NTTs of practical importance, such as NTT mod 3, + 1. Some applications require a very large dynamic range. In this case, transforms mod 5'7 and T5 should be used. V. CONCLUSIONS In this paper, a generalization of the Fermat and Mersenne number theoretic transform was presented. A class of numbers called generalized Fermat-Mersenne numbers leads to these transforms. An algorithm for finding prime numbers belonging to this class was given and an algorithm for finding primitive roots of unity was also included. These Nm's provide practical sequence lengths and dynamic range. The generalized Fermat-Mersenne NTT's are a useful alternative to existing transforms. VI. APPENDIX A. Proof of Lemma 1. Let t = 1. Then qpp+l = (qpr - 1). G,,~,~'. SO E I ~ =, ~ qpp - 1.

5 DIMITROV er al.:generalized FERMAT-MERSENNE NUMBER THEORETIC TRANSFORM 137 TABLE IV SOME NEW "ITS OF PRACTICAL IMPORTANCE MODULUS G FACTORS OF G TRANSFORM LENGTH OF G DYNAMIC RANGE (BITS) A '. 33 = A7 593,71119, = T ' = TZ '3.5' = s '.3'. 7 = TABLE V PARAMETERS OF FERMAT [3] MODLILUS MAX. TRANSFORM LENGTH DYNAMIC RANGE (BITS) F4 = F~ = l 33.& = MODULUS 3 ' ' TABLE VII PARAMETERS OF THE NlT MOD 3 '" MAX. TL (POWER OF TWO) DYNAMIC RANGE (BITS) ' TABLE VI PARAMETERS OF THE "IT MOD 4" - " + 1[16] n MODULUS MAX. TRANSFORM LENGTH DYNAMIC RANGE (BITS) *-3+l C. Proof of Theorem. This theorem for the special case q = has been proven in [33]. The proof, which will be given here, uses only elementary number theory. It is believed that our proof is simpler but nevertheless valid for the general case. The proof of the first condition is a very simple. Let us suppose that p is a composite, or p = plp. Then If t 1, then B. Proof of Lemma. Necessity: mi $ mj (mod p) implies i # j. Let mi = kip + si, for i = 1,..., p and let w be a root of Q(z). Then WP = 1. and and, therefore Gq, p, is a composite too. Thus p must be prime. The proof of the second condition is not so obvious. Let n = pr. n1, and n1 = pk + a, where 1 5 a 5 p - 1. Now we use Lemma 1: The condition mi $ mj (mod p) means that all numbers ~i are distinct, and since 0 5 ~i 5 p + 1 the numbers ~i are a permutation of the set (0, 1,..., p - 1) and therefore P(w) = 0. Suficiency: Let us consider the polynomial P C(z) = czpt. It is clear that C(w) = P(w) = 0, therefore every root of Q(z) is a root of C(z). But the degree of C(z) is less than or equal to p - 1, and if there is a pair (i, j) for i # j, such that mi mj (mod p) then Q(z)/C(z), which is impossible. i=l To complete the proof it is enough to prove that where a I b means a divides b. We define a set A = (icr, i = 0,..., p - l), where a and p are mutually prime. For every two distinct elements ai and aj from A we have ai f aj (mod p), because a; - aj = (i - j)a f 0 (mod p). And now in Lemma, the substitutions z = qpr and mi = ia are made. Thus (C4) is proved. A conclusion is made that if n has a factor of the form pk f a (15 a 5 p - l), then Gq, p, cannot be a prime. This completes the proof of Theorem.

6 ~ 138 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-11: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 41, NO., FEBRUARY 1994 D. Proof of Theorem 3 Let T be a prime divisor of Gq, P, Pe. Then qpa+ z 1 (mod T). Let us define a number theoretic function ord (a. 711): if (a, m) = 1 then ord(w. vi) = r; else ord(a. m) = 0 where z is the least integer, such that flx -- 1 (mod m). It will be proved, that ord(q. T) = yn+l. It i? well known [8] that if ord(a, m) = T, and an -- 1 (mod 7n), then.f is a divisor of n. If ord(q, r) = f, then t I yo+, therefore f = p, where,o L Q + 1. It will be proved that fi = (Y + 1. Let us suppose that 0 < CY + 1. Then we have the following congruence relationships: qp i 1 (mod 1.) (D1) qp = 1 (mod 1.) qzp 3 1 (mod r) 1s 1 (modr) (D) (D3) (D5) The addition of the congruences D4, 05 leads to Gy,p,pa 3 y (mod T ) But Gq, p, pa 0 (mod T ) and y and r are primes, so p = T, which contradicts to the condition T > p. Hence, [I = a + 1. From Fermat s little theorem we have qr- 1 (mod T), therefore T = k. pn Q.E.D. ACKNOWLEDGMENT The authors are indebted to the anonymous reviewers for their comments and suggestions, which improved the quality of the presentation. REFERENCES [l] J. M. Pollard, The fast Fourier transform over finite fields, Math. Comput., vol. 5, pp , [] C. M. Rader, Discrete convolutions via Meraenne transform, IEEE Trans. Computers, vol. C-1, pp , 197. [3] R. C. Agarwal and C. S. Burrus, Fast convolution using Fermat number transform with application to digital filtering, IEEE Truns. Acaust. Speech, Signal Proc., vol., pp , [4] W. Li and A. M. Peterson, FIR filtering by the modified Fen number transform, IEEE Trans. Acoust. Speech, Signal Proc., vol. 38, pp , [5] Y. C. Lee, B. K. Min, and M. Suk, Realization of adaptive digital filtering using the Fermat number transform, IEEE Truns. Acoust. Speech, Signal Proc., vol. ASSP-33, pp , B. Martens and M. C. Vanwormhondt, Convolution of long integer sequences by means of number-theoretic transform over residue class polynomial ring, IEEE Trans. Acoust. Speech, Signal Proc., vol. 3 I, pp , [7] -, Convolution using a conjugate symmetry property for number theoretic transform over rings of regular integers, IEEE Trans. Acoust. Speech, Signal Proc., vol. ASSP-31, pp , [8] J. B. Martens, Two-dimensoinal convolutions by means of number theoretic transform over residue class polynomial ring. IEEE Trans. Acoust. Speech, Signal Proc., vol. ASSP-3, pp , [9] J. B. Martens, Number-theoretic transforms for the calculations of convolutions, IEEE Trans. Acoust. Speech, Signul Proc., vol. ASSP-3 I, pp , [IO) A. E. Yagle, Number-theoretic fast algorithms for bilinear and other generalized transforms, IEEE Trans. Auto. Cont., vol. 35, pp , [ 1 I ] S. Boussakta and A. G. J. Holt, Fast multidimensional discrete Hartley transform using Fermat number transform, IEEE Proc., Pt. E, vol. 135, pp , I. S. Reed, T. K. Truong, and L. R. Welch, The fast decoding of Reed- Solomon code using Fermat number theoretic transforms, IEEE Trans. Info. Theory, vol. 4, pp , [I31 Y. W. Eastwood and C. R. Jasshope, The solution of elliptic partial differential equations using number theoretic transforms with application to narrow of limited computer hardware, Comput. Physics Comm., vol. 13, pp , J. M. Pollard, Implementation of number theoretic transforms, Electronics Letters, vol. 1, pp , K. Y. Liu, I. S. Reed, and T. K. Truong, Fast number theoretic transforms for digital filtering, Electronics Letters, vol. 1, pp , E. Dubois and A. N. Venetsanopoulos, Fast integer convolution using rings of algebraic integers, IEEE Trans. Acoust. Speech, Signal Proc., vol. ASSP-8, pp , S. W. Golomb, 1. S. Reed, and T. K. Truong, Integer convolutions over the finite fields GF(3 + l), SIAM J. Applied Math., vol. 3, pp , IS] R. M. Robinson, A report on primes of the form k. +1 and on factors of Fermat numbers, Proc. Amer. Math. Soc., vol. 9, pp , [ 191 S. W. Golomb, Properties of the sequences , Math. Comput., vol. 30, pp , N. J. Nussbaumer, Digital filtering using pseudo-fermat number transforms, IEEE Trans. Acoust. Speech, Signal Proc., vol. ASSP-6, pp , N. J. Nussbaumer, Digital filtering using complex Mersenne transforms, IBM J. Research Devel., vol. 0, pp , [] H. Lu and S. Lee, A new approach to solve the sequence-length constraint problem in circular convolutions using number-theoretic transform, IEEE Transactions on Signal Proc., vol. 39, pp , [3J L. E. Dixon, History of the theory of numbers, vol. I, Washington, D.C.: Camegie Institute, 1919, p D. Y. Y. Yun and C. N. Zhang, Binary paradigm and systolic array implementation for residue arithmetic, Technical Report 84-CSE-1, Department of Computer Science and Engineering, Southern Methodist University, Dallas, Texas, A. Karatsuba and Yu. Ofman, Multiplication of multidigit numbers on automata, Soviet Physics Dokl., vol. 7, pp , (61 A. Schonhage and V. Strassen, Fast multiplication of integers, (in German), Computing, vol. 7, pp. 81-9, [7] L. M. Leibowitr, A simplified binary arithmetic for the Fermat number transform, IEEE Trans. Acoust. Speech, Signal Proc., vol. ASSP-4, pp , I81 G. H. Hardy and E. M. Wright, An introduction to the theory of the numbers, London, Oxford University Press, 1968, ch S. Winograd, On computing the discrete Fourier transform, Math. Comput., vol. 3, pp , R. Creutzburg and G. Steidl, Number theoretic transforms in rings of cyclotomic integers, J. Info. Proc. Cybernetics, vol. 11-1, pp , [311 J. B. Martens, Recursive cyclotomic factorization-a new algorithm for calculating the discrete Fourier transform, IEEE Trans. Acoust. Speech, Signul Proc., vol. ASSP-3, pp. 75&760, [3] W. Singleton, An algorithm for computing the mixed radix fast Fourier transform, IEEE Trans. AU, vol. 17, S. Ligh and P. Jones, Generalized Fermat and Mersenne numbers, Fibonacci Quarterly, vol. 0, pp. 1-16, 198. V. S. Dimitrov was bom in Plovdiv, Bulgaria in He received the M.Sc. degree in computer science from the Technical University of Sofia, Bulgaria. Now he is working towards the Ph.D. degree of mathematics at the Mathematical Institute of Bulgarian Academy of Sciences. His research interests include fast algorithms for digital signal processing, computational number theory, computational complexity, parallel computing, computer arithmetic and related topics..

7 DIMITROV et al.:generalized FERMAT-MERSENNE NUMBER THEORETIC TRANSFORM 139 T. V. Cooklev (S 9) was bom in Plovdiv, Bulgaria in 1966 He graduated from the Technical University of Sofia, Bulgana in 1988 Dunng 1991 he was bnefly on the faculty at the same University. At the moment, he is studying towards the Ph D degree in engineenng at Tokyo Institute of Technology, Japan. He is a recipient of a Monbusho scholarship His research activities are in digital filters, algonthms for digital signal processing, circuits and systems and related topics Mr Cooklev is a student member of the Institute of Electronics, Information and Communication Engineers (IEICE) of Japan and student member of IEEE. Borislav Donevsky was bom in Pleven, Bulgaria, on July 10, He received the B.Sc. degree in communications and electronics, and the M.S. and Ph.D. degrees in electncal engineering in 1961, 1963 and 1974, respectively, from the Technical University of Sofia, Bulgana. In 1964 he joined the Department of Applied Mathematics and Informatics of the Technical University of Sofia as an Assistant Professor, and since 1981 has been an Associate Professor of Applied Mathematics there His main research interests are in digital signal processing and computer anthmetics. He is a member of the Amencan Mathematical Society. Donevsky is the author of the books. Numerical Methods by the Calculator, Technica, Sofia, 198; Fourier Series, Technica, Sofia, He was also the coauthor of the books: The Application of the Graph Theory for the Analysis and Synthesis of the Electronic Circuits, Technica, Sofia, 1979; Digital Filters, Technica, Sofia, 1981; FFT, Technical University, Sofia, He translated from English to Bulganan the books: Manual for Operational Amplrfier Users, J. D Lenk, Reston Publishing CO, 1976; Operational Amplifiers, G B. Clayton, Buttenvorth, 1979; Experiments with Operational Amplrfier, G. B. Clayton, The Macmillan Press Ltd., 1975; 110 Waveform Generator Projects for the Home Constructor, R M. Marston, TAB, 1978; Signals and Systems, A. V. Oppenheim, A. S. Willsky, I T Young, Prentice- Hall, 1983; Art of Electronics, T C. Hayes, P. Horowitz, Cambridge University Press, 1989

Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography

Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography Selçuk Baktır, Berk Sunar {selcuk,sunar}@wpi.edu Department of Electrical & Computer Engineering Worcester Polytechnic Institute

More information

Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations

Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 9.1 Chapter 9 Objectives

More information

SOME HISTORICAL NOTES ON NUMBER THEORETIC TRANSFORM

SOME HISTORICAL NOTES ON NUMBER THEORETIC TRANSFORM SOME HISTORICAL NOTES ON NUMBER THEORETIC TRANSFORM M. Bhattacharya *, R.Creutzburg **, and J. Astola * * Institute of Signal Processing Tampere University of Technology P.O. Box 553, Tampere, FIN 33101,

More information

Number-Theoretic Transforms of Prescribed Length

Number-Theoretic Transforms of Prescribed Length MATHEMATICS OF COMPUTATION VOLUME 47, NUMBER 176 OCTOBER 1986. PAGES 693-701 Number-Theoretic Transforms of Prescribed Length By R. Creutzburg and M. Tasche Abstract. A new constructive method for finding

More information

ECEN 5022 Cryptography

ECEN 5022 Cryptography Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,

More information

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald)

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) 1 Euclid s Algorithm Euclid s Algorithm for computing the greatest common divisor belongs to the oldest known computing procedures

More information

On the computation of discrete Fourier transform using Fermat number transform

On the computation of discrete Fourier transform using Fermat number transform On the computation of discrete Fourier transform using Fermat number transform Wan-Chi Siu, AP(HK), M.Phil., C.Eng., M.I.E.R.E., Mem.I.E.E.E., A.G. Constantinides, B.Sc.(Eng.), Ph.D., C.Eng., M.I.E.E.,

More information

ON VALUES OF CYCLOTOMIC POLYNOMIALS. V

ON VALUES OF CYCLOTOMIC POLYNOMIALS. V Math. J. Okayama Univ. 45 (2003), 29 36 ON VALUES OF CYCLOTOMIC POLYNOMIALS. V Dedicated to emeritus professor Kazuo Kishimoto on his seventieth birthday Kaoru MOTOSE In this paper, using properties of

More information

Infinite Sequences, Series Convergence and the Discrete Time Fourier Transform over Finite Fields

Infinite Sequences, Series Convergence and the Discrete Time Fourier Transform over Finite Fields Infinite Sequences, Series Convergence and the Discrete Time Fourier Transform over Finite Fields R M Campello de Souza M M Campello de Souza H M de Oliveira M M Vasconcelos Depto de Eletrônica e Sistemas,

More information

Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases

Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases 1 Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases H. Fan and M. A. Hasan March 31, 2007 Abstract Based on a recently proposed Toeplitz

More information

A SURVEY OF PRIMALITY TESTS

A SURVEY OF PRIMALITY TESTS A SURVEY OF PRIMALITY TESTS STEFAN LANCE Abstract. In this paper, we show how modular arithmetic and Euler s totient function are applied to elementary number theory. In particular, we use only arithmetic

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

Introduction to Number Theory

Introduction to Number Theory INTRODUCTION Definition: Natural Numbers, Integers Natural numbers: N={0,1,, }. Integers: Z={0,±1,±, }. Definition: Divisor If a Z can be writeen as a=bc where b, c Z, then we say a is divisible by b or,

More information

LECTURE NOTES IN CRYPTOGRAPHY

LECTURE NOTES IN CRYPTOGRAPHY 1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic

More information

Technical Note

Technical Note Technical Note 1975-50 The Use of Finite Fields and Rings to Compute Convolutions I. S. Reed 6 June 1975 undi P n Lincoln Laboratory MASSACHUSETTS INSTITUTE OF TECH LEXINGTON, MASSACHI Approved for pn

More information

Chapter 5. Modular arithmetic. 5.1 The modular ring

Chapter 5. Modular arithmetic. 5.1 The modular ring Chapter 5 Modular arithmetic 5.1 The modular ring Definition 5.1. Suppose n N and x, y Z. Then we say that x, y are equivalent modulo n, and we write x y mod n if n x y. It is evident that equivalence

More information

Partial Sums of Powers of Prime Factors

Partial Sums of Powers of Prime Factors 1 3 47 6 3 11 Journal of Integer Sequences, Vol. 10 (007), Article 07.1.6 Partial Sums of Powers of Prime Factors Jean-Marie De Koninck Département de Mathématiques et de Statistique Université Laval Québec

More information

2.3 In modular arithmetic, all arithmetic operations are performed modulo some integer.

2.3 In modular arithmetic, all arithmetic operations are performed modulo some integer. CHAPTER 2 INTRODUCTION TO NUMBER THEORY ANSWERS TO QUESTIONS 2.1 A nonzero b is a divisor of a if a = mb for some m, where a, b, and m are integers. That is, b is a divisor of a if there is no remainder

More information

Difference Sets Corresponding to a Class of Symmetric Designs

Difference Sets Corresponding to a Class of Symmetric Designs Designs, Codes and Cryptography, 10, 223 236 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Difference Sets Corresponding to a Class of Symmetric Designs SIU LUN MA

More information

An integer p is prime if p > 1 and p has exactly two positive divisors, 1 and p.

An integer p is prime if p > 1 and p has exactly two positive divisors, 1 and p. Chapter 6 Prime Numbers Part VI of PJE. Definition and Fundamental Results Definition. (PJE definition 23.1.1) An integer p is prime if p > 1 and p has exactly two positive divisors, 1 and p. If n > 1

More information

This is a recursive algorithm. The procedure is guaranteed to terminate, since the second argument decreases each time.

This is a recursive algorithm. The procedure is guaranteed to terminate, since the second argument decreases each time. 8 Modular Arithmetic We introduce an operator mod. Let d be a positive integer. For c a nonnegative integer, the value c mod d is the remainder when c is divided by d. For example, c mod d = 0 if and only

More information

On the Prime Divisors of Odd Perfect Numbers

On the Prime Divisors of Odd Perfect Numbers On the Prime Divisors of Odd Perfect Numbers Justin Sweeney Department of Mathematics Trinity College Hartford, CT justin.sweeney@trincoll.edu April 27, 2009 1 Contents 1 History of Perfect Numbers 5 2

More information

Introduction to Information Security

Introduction to Information Security Introduction to Information Security Lecture 5: Number Theory 007. 6. Prof. Byoungcheon Lee sultan (at) joongbu. ac. kr Information and Communications University Contents 1. Number Theory Divisibility

More information

Construction of Galois Fields of Characteristic

Construction of Galois Fields of Characteristic Construction of Galois Fields of Characteristic Two and Irreducible Polynomials By J. D. Swift 1. Introduction. The primary purpose of this paper is to provide a practical method of constructing Galois

More information

Perfect Power Riesel Numbers

Perfect Power Riesel Numbers Perfect Power Riesel Numbers Carrie Finch a, Lenny Jones b a Mathematics Department, Washington and Lee University, Lexington, VA 24450 b Department of Mathematics, Shippensburg University, Shippensburg,

More information

Homework 10 M 373K by Mark Lindberg (mal4549)

Homework 10 M 373K by Mark Lindberg (mal4549) Homework 10 M 373K by Mark Lindberg (mal4549) 1. Artin, Chapter 11, Exercise 1.1. Prove that 7 + 3 2 and 3 + 5 are algebraic numbers. To do this, we must provide a polynomial with integer coefficients

More information

#A11 INTEGERS 12 (2012) FIBONACCI VARIATIONS OF A CONJECTURE OF POLIGNAC

#A11 INTEGERS 12 (2012) FIBONACCI VARIATIONS OF A CONJECTURE OF POLIGNAC #A11 INTEGERS 12 (2012) FIBONACCI VARIATIONS OF A CONJECTURE OF POLIGNAC Lenny Jones Department of Mathematics, Shippensburg University, Shippensburg, Pennsylvania lkjone@ship.edu Received: 9/17/10, Revised:

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a k for some integer k. Notation

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand 1 Divisibility, prime numbers By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a

More information

= 1 2x. x 2 a ) 0 (mod p n ), (x 2 + 2a + a2. x a ) 2

= 1 2x. x 2 a ) 0 (mod p n ), (x 2 + 2a + a2. x a ) 2 8. p-adic numbers 8.1. Motivation: Solving x 2 a (mod p n ). Take an odd prime p, and ( an) integer a coprime to p. Then, as we know, x 2 a (mod p) has a solution x Z iff = 1. In this case we can suppose

More information

Some Results on the Arithmetic Correlation of Sequences

Some Results on the Arithmetic Correlation of Sequences Some Results on the Arithmetic Correlation of Sequences Mark Goresky Andrew Klapper Abstract In this paper we study various properties of arithmetic correlations of sequences. Arithmetic correlations are

More information

Large Integer Multiplication on Hypercubes. Barry S. Fagin Thayer School of Engineering Dartmouth College Hanover, NH

Large Integer Multiplication on Hypercubes. Barry S. Fagin Thayer School of Engineering Dartmouth College Hanover, NH Large Integer Multiplication on Hypercubes Barry S. Fagin Thayer School of Engineering Dartmouth College Hanover, NH 03755 barry.fagin@dartmouth.edu Large Integer Multiplication 1 B. Fagin ABSTRACT Previous

More information

Mathematics of Cryptography

Mathematics of Cryptography UNIT - III Mathematics of Cryptography Part III: Primes and Related Congruence Equations 1 Objectives To introduce prime numbers and their applications in cryptography. To discuss some primality test algorithms

More information

New algebraic decoding method for the (41, 21,9) quadratic residue code

New algebraic decoding method for the (41, 21,9) quadratic residue code New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 2: Mathematical Concepts Divisibility Congruence Quadratic Residues

More information

Solution Sheet (i) q = 5, r = 15 (ii) q = 58, r = 15 (iii) q = 3, r = 7 (iv) q = 6, r = (i) gcd (97, 157) = 1 = ,

Solution Sheet (i) q = 5, r = 15 (ii) q = 58, r = 15 (iii) q = 3, r = 7 (iv) q = 6, r = (i) gcd (97, 157) = 1 = , Solution Sheet 2 1. (i) q = 5, r = 15 (ii) q = 58, r = 15 (iii) q = 3, r = 7 (iv) q = 6, r = 3. 2. (i) gcd (97, 157) = 1 = 34 97 21 157, (ii) gcd (527, 697) = 17 = 4 527 3 697, (iii) gcd (2323, 1679) =

More information

Cryptography CS 555. Topic 18: RSA Implementation and Security. CS555 Topic 18 1

Cryptography CS 555. Topic 18: RSA Implementation and Security. CS555 Topic 18 1 Cryptography CS 555 Topic 18: RSA Implementation and Security Topic 18 1 Outline and Readings Outline RSA implementation issues Factoring large numbers Knowing (e,d) enables factoring Prime testing Readings:

More information

Integer multiplication with generalized Fermat primes

Integer multiplication with generalized Fermat primes Integer multiplication with generalized Fermat primes CARAMEL Team, LORIA, University of Lorraine Supervised by: Emmanuel Thomé and Jérémie Detrey Journées nationales du Calcul Formel 2015 (Cluny) November

More information

DONG QUAN NGOC NGUYEN

DONG QUAN NGOC NGUYEN REPRESENTATION OF UNITS IN CYCLOTOMIC FUNCTION FIELDS DONG QUAN NGOC NGUYEN Contents 1 Introduction 1 2 Some basic notions 3 21 The Galois group Gal(K /k) 3 22 Representation of integers in O, and the

More information

Optimization of new Chinese Remainder theorems using special moduli sets

Optimization of new Chinese Remainder theorems using special moduli sets Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2010 Optimization of new Chinese Remainder theorems using special moduli sets Narendran Narayanaswamy Louisiana State

More information

SECOND-ORDER RECURRENCES. Lawrence Somer Department of Mathematics, Catholic University of America, Washington, D.C

SECOND-ORDER RECURRENCES. Lawrence Somer Department of Mathematics, Catholic University of America, Washington, D.C p-stability OF DEGENERATE SECOND-ORDER RECURRENCES Lawrence Somer Department of Mathematics, Catholic University of America, Washington, D.C. 20064 Walter Carlip Department of Mathematics and Computer

More information

A Proof of the Lucas-Lehmer Test and its Variations by Using a Singular Cubic Curve

A Proof of the Lucas-Lehmer Test and its Variations by Using a Singular Cubic Curve 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.6. A Proof of the Lucas-Lehmer Test and its Variations by Using a Singular Cubic Curve Ömer Küçüksakallı Mathematics Department Middle East

More information

Cullen Numbers in Binary Recurrent Sequences

Cullen Numbers in Binary Recurrent Sequences Cullen Numbers in Binary Recurrent Sequences Florian Luca 1 and Pantelimon Stănică 2 1 IMATE-UNAM, Ap. Postal 61-3 (Xangari), CP 58 089 Morelia, Michoacán, Mexico; e-mail: fluca@matmor.unam.mx 2 Auburn

More information

GENERALIZED ARYABHATA REMAINDER THEOREM

GENERALIZED ARYABHATA REMAINDER THEOREM International Journal of Innovative Computing, Information and Control ICIC International c 2010 ISSN 1349-4198 Volume 6, Number 4, April 2010 pp. 1865 1871 GENERALIZED ARYABHATA REMAINDER THEOREM Chin-Chen

More information

Algebra for error control codes

Algebra for error control codes Algebra for error control codes EE 387, Notes 5, Handout #7 EE 387 concentrates on block codes that are linear: Codewords components are linear combinations of message symbols. g 11 g 12 g 1n g 21 g 22

More information

The DFT as Convolution or Filtering

The DFT as Convolution or Filtering Connexions module: m16328 1 The DFT as Convolution or Filtering C. Sidney Burrus This work is produced by The Connexions Project and licensed under the Creative Commons Attribution License A major application

More information

Statistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study

Statistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study International Journal of Foundations of Computer Science c World Scientific Publishing Company Statistical Properties of the Arithmetic Correlation of Sequences Mark Goresky School of Mathematics Institute

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 9 September 30, 2015 CPSC 467, Lecture 9 1/47 Fast Exponentiation Algorithms Number Theory Needed for RSA Elementary Number Theory

More information

Part II. Number Theory. Year

Part II. Number Theory. Year Part II Year 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2017 Paper 3, Section I 1G 70 Explain what is meant by an Euler pseudoprime and a strong pseudoprime. Show that 65 is an Euler

More information

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,

More information

Course 2316 Sample Paper 1

Course 2316 Sample Paper 1 Course 2316 Sample Paper 1 Timothy Murphy April 19, 2015 Attempt 5 questions. All carry the same mark. 1. State and prove the Fundamental Theorem of Arithmetic (for N). Prove that there are an infinity

More information

Mathematical Foundations of Public-Key Cryptography

Mathematical Foundations of Public-Key Cryptography Mathematical Foundations of Public-Key Cryptography Adam C. Champion and Dong Xuan CSE 4471: Information Security Material based on (Stallings, 2006) and (Paar and Pelzl, 2010) Outline Review: Basic Mathematical

More information

Contest Number Theory

Contest Number Theory Contest Number Theory Andre Kessler December 7, 2008 Introduction Number theory is one of the core subject areas of mathematics. It can be somewhat loosely defined as the study of the integers. Unfortunately,

More information

Topics in Cryptography. Lecture 5: Basic Number Theory

Topics in Cryptography. Lecture 5: Basic Number Theory Topics in Cryptography Lecture 5: Basic Number Theory Benny Pinkas page 1 1 Classical symmetric ciphers Alice and Bob share a private key k. System is secure as long as k is secret. Major problem: generating

More information

Divisibility of Trinomials by Irreducible Polynomials over F 2

Divisibility of Trinomials by Irreducible Polynomials over F 2 Divisibility of Trinomials by Irreducible Polynomials over F 2 Ryul Kim Faculty of Mathematics and Mechanics Kim Il Sung University, Pyongyang, D.P.R.Korea Wolfram Koepf Department of Mathematics University

More information

2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer?

2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer? Chapter 3: Theory of Modular Arithmetic 25 SECTION C Solving Linear Congruences By the end of this section you will be able to solve congruence equations determine the number of solutions find the multiplicative

More information

Number Theory. Modular Arithmetic

Number Theory. Modular Arithmetic Number Theory The branch of mathematics that is important in IT security especially in cryptography. Deals only in integer numbers and the process can be done in a very fast manner. Modular Arithmetic

More information

Introduction to Cryptography. Lecture 6

Introduction to Cryptography. Lecture 6 Introduction to Cryptography Lecture 6 Benny Pinkas page 1 Public Key Encryption page 2 Classical symmetric ciphers Alice and Bob share a private key k. System is secure as long as k is secret. Major problem:

More information

Math 229: Introduction to Analytic Number Theory Elementary approaches I: Variations on a theme of Euclid

Math 229: Introduction to Analytic Number Theory Elementary approaches I: Variations on a theme of Euclid Math 229: Introduction to Analytic Number Theory Elementary approaches I: Variations on a theme of Euclid Like much of mathematics, the history of the distribution of primes begins with Euclid: Theorem

More information

Low Power, High Speed Parallel Architecture For Cyclic Convolution Based On Fermat Number Transform (FNT)

Low Power, High Speed Parallel Architecture For Cyclic Convolution Based On Fermat Number Transform (FNT) RESEARCH ARTICLE OPEN ACCESS Low Power, High Speed Parallel Architecture For Cyclic Convolution Based On Fermat Number Transform (FNT) T.Jyothsna 1 M.Tech, M.Pradeep 2 M.Tech 1 E.C.E department, shri Vishnu

More information

Proof: Let the check matrix be

Proof: Let the check matrix be Review/Outline Recall: Looking for good codes High info rate vs. high min distance Want simple description, too Linear, even cyclic, plausible Gilbert-Varshamov bound for linear codes Check matrix criterion

More information

On the existence of cyclic difference sets with small parameters

On the existence of cyclic difference sets with small parameters Fields Institute Communications Volume 00, 0000 On the existence of cyclic difference sets with small parameters Leonard D. Baumert 325 Acero Place Arroyo Grande, CA 93420 Daniel M. Gordon IDA Center for

More information

Homework 7 solutions M328K by Mark Lindberg/Marie-Amelie Lawn

Homework 7 solutions M328K by Mark Lindberg/Marie-Amelie Lawn Homework 7 solutions M328K by Mark Lindberg/Marie-Amelie Lawn Problem 1: 4.4 # 2:x 3 + 8x 2 x 1 0 (mod 1331). a) x 3 + 8x 2 x 1 0 (mod 11). This does not break down, so trial and error gives: x = 0 : f(0)

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 8 February 1, 2012 CPSC 467b, Lecture 8 1/42 Number Theory Needed for RSA Z n : The integers mod n Modular arithmetic GCD Relatively

More information

Mathematics for Cryptography

Mathematics for Cryptography Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1

More information

CALCULATING EXACT CYCLE LENGTHS IN THE GENERALIZED FIBONACCI SEQUENCE MODULO p

CALCULATING EXACT CYCLE LENGTHS IN THE GENERALIZED FIBONACCI SEQUENCE MODULO p CALCULATING EXACT CYCLE LENGTHS IN THE GENERALIZED FIBONACCI SEQUENCE MODULO p DOMINIC VELLA AND ALFRED VELLA. Introduction The cycles that occur in the Fibonacci sequence {F n } n=0 when it is reduced

More information

Idempotent Generators of Generalized Residue Codes

Idempotent Generators of Generalized Residue Codes 1 Idempotent Generators of Generalized Residue Codes A.J. van Zanten A.J.vanZanten@uvt.nl Department of Communication and Informatics, University of Tilburg, The Netherlands A. Bojilov a.t.bozhilov@uvt.nl,bojilov@fmi.uni-sofia.bg

More information

7.2 Applications of Euler s and Fermat s Theorem.

7.2 Applications of Euler s and Fermat s Theorem. 7.2 Applications of Euler s and Fermat s Theorem. i) Finding and using inverses. From Fermat s Little Theorem we see that if p is prime and p a then a p 1 1 mod p, or equivalently a p 2 a 1 mod p. This

More information

Cryptography. Number Theory with AN INTRODUCTION TO. James S. Kraft. Lawrence C. Washington. CRC Press

Cryptography. Number Theory with AN INTRODUCTION TO. James S. Kraft. Lawrence C. Washington. CRC Press AN INTRODUCTION TO Number Theory with Cryptography James S Kraft Gilman School Baltimore, Maryland, USA Lawrence C Washington University of Maryland College Park, Maryland, USA CRC Press Taylor & Francis

More information

Section X.55. Cyclotomic Extensions

Section X.55. Cyclotomic Extensions X.55 Cyclotomic Extensions 1 Section X.55. Cyclotomic Extensions Note. In this section we return to a consideration of roots of unity and consider again the cyclic group of roots of unity as encountered

More information

Pseudo Sylow numbers

Pseudo Sylow numbers Pseudo Sylow numbers Benjamin Sambale May 16, 2018 Abstract One part of Sylow s famous theorem in group theory states that the number of Sylow p- subgroups of a finite group is always congruent to 1 modulo

More information

arxiv: v1 [cs.it] 12 Jun 2016

arxiv: v1 [cs.it] 12 Jun 2016 New Permutation Trinomials From Niho Exponents over Finite Fields with Even Characteristic arxiv:606.03768v [cs.it] 2 Jun 206 Nian Li and Tor Helleseth Abstract In this paper, a class of permutation trinomials

More information

MATH 361: NUMBER THEORY FOURTH LECTURE

MATH 361: NUMBER THEORY FOURTH LECTURE MATH 361: NUMBER THEORY FOURTH LECTURE 1. Introduction Everybody knows that three hours after 10:00, the time is 1:00. That is, everybody is familiar with modular arithmetic, the usual arithmetic of the

More information

Definition 6.1 (p.277) A positive integer n is prime when n > 1 and the only positive divisors are 1 and n. Alternatively

Definition 6.1 (p.277) A positive integer n is prime when n > 1 and the only positive divisors are 1 and n. Alternatively 6 Prime Numbers Part VI of PJE 6.1 Fundamental Results Definition 6.1 (p.277) A positive integer n is prime when n > 1 and the only positive divisors are 1 and n. Alternatively D (p) = { p 1 1 p}. Otherwise

More information

Trace Representation of Legendre Sequences

Trace Representation of Legendre Sequences C Designs, Codes and Cryptography, 24, 343 348, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Trace Representation of Legendre Sequences JEONG-HEON KIM School of Electrical and

More information

Constructing c-ary Perfect Factors

Constructing c-ary Perfect Factors Constructing c-ary Perfect Factors Chris J. Mitchell Computer Science Department Royal Holloway University of London Egham Hill Egham Surrey TW20 0EX England. Tel.: +44 784 443423 Fax: +44 784 443420 Email:

More information

Oleg Eterevsky St. Petersburg State University, Bibliotechnaya Sq. 2, St. Petersburg, , Russia

Oleg Eterevsky St. Petersburg State University, Bibliotechnaya Sq. 2, St. Petersburg, , Russia ON THE NUMBER OF PRIME DIVISORS OF HIGHER-ORDER CARMICHAEL NUMBERS Oleg Eterevsky St. Petersburg State University, Bibliotechnaya Sq. 2, St. Petersburg, 198904, Russia Maxim Vsemirnov Sidney Sussex College,

More information

Algebra. Modular arithmetic can be handled mathematically by introducing a congruence relation on the integers described in the above example.

Algebra. Modular arithmetic can be handled mathematically by introducing a congruence relation on the integers described in the above example. Coding Theory Massoud Malek Algebra Congruence Relation The definition of a congruence depends on the type of algebraic structure under consideration Particular definitions of congruence can be made for

More information

2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer?

2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer? Chapter 3: Theory of Modular Arithmetic 25 SECTION C Solving Linear Congruences By the end of this section you will be able to solve congruence equations determine the number of solutions find the multiplicative

More information

ALG 4.0 Number Theory Algorithms:

ALG 4.0 Number Theory Algorithms: Algorithms Professor John Reif ALG 4.0 Number Theory Algorithms: (a) GCD (b) Multiplicative Inverse (c) Fermat & Euler's Theorems (d) Public Key Cryptographic Systems (e) Primality Testing Greatest Common

More information

8 Primes and Modular Arithmetic

8 Primes and Modular Arithmetic 8 Primes and Modular Arithmetic 8.1 Primes and Factors Over two millennia ago already, people all over the world were considering the properties of numbers. One of the simplest concepts is prime numbers.

More information

PRIMALITY TESTING. Professor : Mr. Mohammad Amin Shokrollahi Assistant : Mahdi Cheraghchi. By TAHIRI JOUTI Kamal

PRIMALITY TESTING. Professor : Mr. Mohammad Amin Shokrollahi Assistant : Mahdi Cheraghchi. By TAHIRI JOUTI Kamal PRIMALITY TESTING Professor : Mr. Mohammad Amin Shokrollahi Assistant : Mahdi Cheraghchi By TAHIRI JOUTI Kamal TABLE OF CONTENTS I- FUNDAMENTALS FROM NOMBER THEORY FOR RANDOMIZED ALGORITHMS:.page 4 1)

More information

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM)

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM) International Journal of Computational Intelligence Research (IJCIR). ISSN: 097-87 Volume, Number 8 (207), pp. 205 2027 Research India Publications http://www.ripublication.com/ijcir.htm New Algebraic

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 8, August 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Efficient

More information

11 Division Mod n, Linear Integer Equations, Random Numbers, The Fundamental Theorem of Arithmetic

11 Division Mod n, Linear Integer Equations, Random Numbers, The Fundamental Theorem of Arithmetic 11 Division Mod n, Linear Integer Equations, Random Numbers, The Fundamental Theorem of Arithmetic Bezout s Lemma Let's look at the values of 4x + 6y when x and y are integers. If x is -6 and y is 4 we

More information

Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory.

Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory. CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L06, Steve/Courses/2011/S2/CSS322/Lectures/number.tex,

More information

Primality Proofs. Geoffrey Exoo Department of Mathematics and Computer Science Indiana State University Terre Haute, IN

Primality Proofs. Geoffrey Exoo Department of Mathematics and Computer Science Indiana State University Terre Haute, IN Primality Proofs Geoffrey Exoo Department of Mathematics and Computer Science Indiana State University Terre Haute, IN 47809 ge@cs.indstate.edu July 30, 2013 Abstract There is an web site [1] that lists

More information

Radix-4 Factorizations for the FFT with Ordered Input and Output

Radix-4 Factorizations for the FFT with Ordered Input and Output Radix-4 Factorizations for the FFT with Ordered Input and Output Vikrant 1, Ritesh Vyas 2, Sandeep Goyat 3, Jitender Kumar 4, Sandeep Kaushal 5 YMCA University of Science & Technology, Faridabad (Haryana),

More information

198 VOLUME 46/47, NUMBER 3

198 VOLUME 46/47, NUMBER 3 LAWRENCE SOMER Abstract. Rotkiewicz has shown that there exist Fibonacci pseudoprimes having the forms p(p + 2), p(2p 1), and p(2p + 3), where all the terms in the products are odd primes. Assuming Dickson

More information

New Negative Latin Square Type Partial Difference Sets in Nonelementary Abelian 2-groups and 3-groups

New Negative Latin Square Type Partial Difference Sets in Nonelementary Abelian 2-groups and 3-groups New Negative Latin Square Type Partial Difference Sets in Nonelementary Abelian 2-groups and 3-groups John Polhill Department of Mathematics, Computer Science, and Statistics Bloomsburg University Bloomsburg,

More information

Extend Fermats Small Theorem to r p 1 mod p 3 for divisors r of p ± 1

Extend Fermats Small Theorem to r p 1 mod p 3 for divisors r of p ± 1 Extend Fermats Small Theorem to r p 1 mod p 3 for divisors r of p ± 1 Nico F. Benschop AmSpade Research, The Netherlands Abstract By (p ± 1) p p 2 ± 1 mod p 3 and by the lattice structure of Z(.) mod q

More information

A Few Primality Testing Algorithms

A Few Primality Testing Algorithms A Few Primality Testing Algorithms Donald Brower April 2, 2006 0.1 Introduction These notes will cover a few primality testing algorithms. There are many such, some prove that a number is prime, others

More information

SQUARE PATTERNS AND INFINITUDE OF PRIMES

SQUARE PATTERNS AND INFINITUDE OF PRIMES SQUARE PATTERNS AND INFINITUDE OF PRIMES KEITH CONRAD 1. Introduction Numerical data suggest the following patterns for prime numbers p: 1 mod p p = 2 or p 1 mod 4, 2 mod p p = 2 or p 1, 7 mod 8, 2 mod

More information

Lecture 4: Number theory

Lecture 4: Number theory Lecture 4: Number theory Rajat Mittal IIT Kanpur In the next few classes we will talk about the basics of number theory. Number theory studies the properties of natural numbers and is considered one of

More information

FINITE ABELIAN GROUPS Amin Witno

FINITE ABELIAN GROUPS Amin Witno WON Series in Discrete Mathematics and Modern Algebra Volume 7 FINITE ABELIAN GROUPS Amin Witno Abstract We detail the proof of the fundamental theorem of finite abelian groups, which states that every

More information

E.J. Barbeau. Polynomials. With 36 Illustrations. Springer

E.J. Barbeau. Polynomials. With 36 Illustrations. Springer E.J. Barbeau Polynomials With 36 Illustrations Springer Contents Preface Acknowledgment of Problem Sources vii xiii 1 Fundamentals 1 /l.l The Anatomy of a Polynomial of a Single Variable 1 1.1.5 Multiplication

More information

SOLUTIONS Math 345 Homework 6 10/11/2017. Exercise 23. (a) Solve the following congruences: (i) x (mod 12) Answer. We have

SOLUTIONS Math 345 Homework 6 10/11/2017. Exercise 23. (a) Solve the following congruences: (i) x (mod 12) Answer. We have Exercise 23. (a) Solve the following congruences: (i) x 101 7 (mod 12) Answer. We have φ(12) = #{1, 5, 7, 11}. Since gcd(7, 12) = 1, we must have gcd(x, 12) = 1. So 1 12 x φ(12) = x 4. Therefore 7 12 x

More information

Euler s, Fermat s and Wilson s Theorems

Euler s, Fermat s and Wilson s Theorems Euler s, Fermat s and Wilson s Theorems R. C. Daileda February 17, 2018 1 Euler s Theorem Consider the following example. Example 1. Find the remainder when 3 103 is divided by 14. We begin by computing

More information

THE TRIANGULAR THEOREM OF THE PRIMES : BINARY QUADRATIC FORMS AND PRIMITIVE PYTHAGOREAN TRIPLES

THE TRIANGULAR THEOREM OF THE PRIMES : BINARY QUADRATIC FORMS AND PRIMITIVE PYTHAGOREAN TRIPLES THE TRIANGULAR THEOREM OF THE PRIMES : BINARY QUADRATIC FORMS AND PRIMITIVE PYTHAGOREAN TRIPLES Abstract. This article reports the occurrence of binary quadratic forms in primitive Pythagorean triangles

More information

p-class Groups of Cyclic Number Fields of Odd Prime Degree

p-class Groups of Cyclic Number Fields of Odd Prime Degree International Journal of Algebra, Vol. 10, 2016, no. 9, 429-435 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2016.6753 p-class Groups of Cyclic Number Fields of Odd Prime Degree Jose Valter

More information