Computing over Z, Q, K[X]

Size: px
Start display at page:

Download "Computing over Z, Q, K[X]"

Transcription

1 Computing over Z, Q, K[X] Clément PERNET M2-MIA Calcul Exact

2 Outline Introduction Chinese Remainder Theorem Rational reconstruction Problem Statement Algorithms Applications Dense CRT codes Extension to Cauchy Interpolation

3 Outline Introduction Chinese Remainder Theorem Rational reconstruction Problem Statement Algorithms Applications Dense CRT codes Extension to Cauchy Interpolation

4 Exact computations and arithmetic Domain of Computation Z, Q variable size Z p, GF(p k ) fixed size but specific arithmetic K[X] for K = Z p, Z... Key idea: change of representation

5 Deal with size of arithmetic: reduce to Z p Chinese Remainder Algorithm: Z Z m Z m1 Z mk x < m 1 m k Z (x 1 Z m1,..., x k Z mk ) p-adic Lifting: Z Z p k Z p x = x 0 + x 1 p +... x k p k < p k+1 Z p k (x 1 Z p,..., x k Z p ) Rational reconstruction: Q Zk Z p x = n d = x 0 + x 1 p +... x k p k [p k+1 ] (x 1 Z p,..., x k Z p )

6 Outline Introduction Chinese Remainder Theorem Rational reconstruction Problem Statement Algorithms Applications Dense CRT codes Extension to Cauchy Interpolation

7 Chinese remainder algorithm If m 1,..., m k pariwise relatively prime: Z/(m 1... m k )Z Z/m 1 Z Z/m k Z Computation of y = f (x) for f Z[X], x Z m begin Compute an upper bound β on f (x) ; Pick m 1,... m k, pairwise prime, s.t. m 1... m k > β; for i = 1... k do Compute y i = f (x mod m i ) mod m i Compute y = CRT(y 1,..., y k ) CRT : Z/m 1 Z Z/m k Z Z/(m 1... m k )Z (x 1,..., x k ) k i=1 x iπ i Y i mod Π Π = k i=1 m i where Π i = Π/m i Y i = Π 1 i mod m i

8 Chinese remainder algorithm If m 1,..., m k pariwise relatively prime: Z/(m 1... m k )Z Z/m 1 Z Z/m k Z Computation of y = f (x) for f Z[X], x Z m begin Compute an upper bound β on f (x) ; Pick m 1,... m k, pairwise prime, s.t. m 1... m k > β; for i = 1... k do Compute y i = f (x mod m i ) mod m i ; /* Evaluation */ Compute y = CRT(y 1,..., y k ); /* Interpolation */ CRT : Z/m 1 Z Z/m k Z Z/(m 1... m k )Z (x 1,..., x k ) k i=1 x iπ i Y i mod Π Π = k i=1 m i where Π i = Π/m i Y i = Π 1 i mod m i

9 Chinese remaindering and evaluation/interpolation Evaluate P in a Reduce P modulo X a

10 Chinese remaindering and evaluation/interpolation Evaluate P in a Reduce P modulo X a Polynomials Evaluation: P mod X a Evaluate P in a Interpolation: P = k i=1 y i j i(x a j) j i (a i a j )

11 Chinese remaindering and evaluation/interpolation Evaluate P in a Reduce P modulo X a Polynomials Evaluation: P mod X a Evaluate P in a Interpolation: P = k i=1 y i j i(x a j) j i (a i a j ) Integers N mod m Evaluate N in m N = k i=1 y i j i m j( j i m j) 1[m i]

12 Chinese remaindering and evaluation/interpolation Evaluate P in a Reduce P modulo X a Polynomials Evaluation: P mod X a Evaluate P in a Interpolation: P = k i=1 y i j i(x a j) j i (a i a j ) Integers N mod m Evaluate N in m N = k i=1 y i j i m j( j i m j) 1[m i] Analogy: complexities over Z over K[X] size of coefficients O ( log result T algebr. ) degree of polynomials O ( deg(result) T algebr. )

13 Chinese remaindering and evaluation/interpolation Evaluate P in a Reduce P modulo X a Polynomials Evaluation: P mod X a Evaluate P in a Interpolation: P = k i=1 y i j i(x a j) j i (a i a j ) Integers N mod m Evaluate N in m N = k i=1 y i j i m j( j i m j) 1[m i] Analogy: complexities over Z over K[X] size of coefficients O ( log result T algebr. ) det(n, A ) = O (n log A n ω ) degree of polynomials O ( deg(result) T algebr. ) det(n, d) = O (nd n ω )

14 Early termination Classic Chinese remaindering Deterministic bound β on the result Choice of the m i : such that m 1... m k > β

15 Early termination Classic Chinese remaindering Deterministic bound β on the result Choice of the m i : such that m 1... m k > β Early termination Probabilistic Monte Carlo For each new modulo m i : reconstruct yi = f (x) mod m 1 m i If yi == y i 1 terminated

16 Early termination Classic Chinese remaindering Deterministic bound β on the result Choice of the m i : such that m 1... m k > β Early termination Probabilistic Monte Carlo For each new modulo m i : reconstruct yi = f (x) mod m 1 m i If yi == y i 1 terminated Advantage: Adaptive number of moduli depending on the output value Interesting when pessimistic bound: sparse/structured matrices,... no bound available

17 Outline Introduction Chinese Remainder Theorem Rational reconstruction Problem Statement Algorithms Applications Dense CRT codes Extension to Cauchy Interpolation

18 Informally (Black-board)

19 Problem Statement Definition (Rational Reconstruction Problem) Let A K[X] of degree n, and B K[X] of degree < n. For a fixed k {1... n}, find (R, V) K[X] satisfying: gcd(v, A) = 1, deg(r) < k, deg(v) n k and R = VB mod A. A = X n : Padé Approximation A = n i=1 (X u i): Cauchy Interpolation

20 Rational Reconstruction Problem Existence of a solution: k + n k + 1 = n + 1 unknowns, for n equations Uniqueness: A divides R 1 V 1 B and R 2 V 2 B. Thus A divides R 1 V 2 R 2 V 1 = (R 1 V 1 B)V 2 (R 2 V 2 B)V 1 ) of degree < n.

21 Algorithm R = VB mod A VB + UA = R begin R 0 A; U 0 1; V 0 0; R 0 B; U 0 0; V 0 1; i 1; while deg R i k do (Q i, R i+1 ) QuoRem(R i 1, R i ); U i+1 U i 1 Q i U i ; V i+1 V i 1 Q i V i ; i i + 1; if gcd(a, V i ) = 1 then return (R i, V i ) else return 0

22 Outline Introduction Chinese Remainder Theorem Rational reconstruction Problem Statement Algorithms Applications Dense CRT codes Extension to Cauchy Interpolation

23 Dense interpolation with errors Problem : CRT with errors Given (y i, m i ) for i = 1... n, Find Y such that Y = y i mod m i on at least n e values. CRT codes [Mandelbaum] Based on Rational reconstruction

24 Mandelbaum algorithm over Z Chinese Remainder Theorem x Z x 1 x 2... x k where m 1 m k > x and x i = x mod m i i

25 Mandelbaum algorithm over Z Chinese Remainder Theorem x Z x 1 x 2... x k x k+1... x n where m 1 m n > x and x i = x mod m i i

26 Mandelbaum algorithm over Z Chinese Remainder Theorem x Z x 1 x 2... x k x k+1... x n where m 1 m n > x and x i = x mod m i i Definition { (n, k)-code: C = { x < m1... m (x 1,..., x n ) Z m1 Z mn s.t. x, k x i = x mod m i i }

27 Principle Property X C iff X < Π k. Π n = p 1 p n p 1 p 2... p k p k+1... p n Π k = p 1 p k Redundancy : r = n k

28 ABFT with Chinese remainder algorithm Input A Encoding A = (A 1,... A n) Computation Solution x < Π n x < Π k x = (r 1,..., r n) Correction x = (x 1,..., x n) Decoding

29 Properties of the code Error model: Error: E = X X Error support: I = {i 1... n, E 0 mod m i } Impact of the error: Π F = i I m i

30 Properties of the code Error model: Error: E = X X Error support: I = {i 1... n, E 0 mod m i } Impact of the error: Π F = i I m i Detects up to r errors: If X = X + E with X C, #I r, then X > Π k. Redundancy r = n k, distance: r + 1 can correct up to r 2 errors in theory More complicated in practice...

31 Correction i / I : E mod m i = 0 E is a multiple of Π V : E = ZΠ V = Z i/ I m i gcd(e, Π) = Π V Mandelbaum 78: rational reconstruction X = X E = X ZΠ v X Π = X Π Z Π F X Π Z Π F 1 2Π 2 F Z Π F = E X Π is a convergent of Π Rational reconstruction of X mod Π Extended Euclidean Algorithm interrupted

32 Correction capacity Mandelbaum 78: 1 symbol = 1 residue Polynomial time algorithm if e (n k) log m min log 2 log m max+log m min worst case: exponential (random perturbation) Goldreich Ron Sudan 99 weighted residues equivalent Guruswami Sahai Sudan 00 invariably polynomial time

33 Correction capacity Mandelbaum 78: 1 symbol = 1 residue Polynomial time algorithm if e (n k) log m min log 2 log m max+log m min worst case: exponential (random perturbation) Goldreich Ron Sudan 99 weighted residues equivalent Guruswami Sahai Sudan 00 invariably polynomial time Interpretation: Errors have variable weights depending on their impact Π F = i I m i Example: m 1 = 2, m 2 = 3, m 3 = error mod 2 or mod 3, can be corrected, not mod 101 limits to X < 2, where X < 17 is sufficient

34 Analogy with Reed Solomon Dornstetter 87 Berlekamp/Massey extended Euclidean Alg. Gao02 Reed-Solomon decoding by extended Euclidean Alg. Chinese Remaindering over K[X] m i = X a i Encoding = evaluation in a i Decoding = interpolation Correction = Extended Euclidean algorithm

35 Analogy with Reed Solomon Dornstetter 87 Berlekamp/Massey extended Euclidean Alg. Gao02 Reed-Solomon decoding by extended Euclidean Alg. Chinese Remaindering over K[X] m i = X a i Encoding = evaluation in a i Decoding = interpolation Correction = Extended Euclidean algorithm Generalization for m i of degrees > 1 Variable impact, depending on the degree of m i Necessary unification [Sudan 01,...]

36 Generalized point of view: amplitude code Over a Euclidean ring A with a Euclidean function ν, multiplicative and sub-additive, ie such that ν(ab) = ν(a)ν(b) ν(a + b) ν(a) + ν(b) eg. over Z: ν(x) = x over K[X]: ν(p) = 2 deg(p) Definition Error impact between x and y: Π F = i x y[m i ] m i Error amplitude: ν(π F )

37 Amplitude codes Distance : A A R + (x, y) i x y[m i ] log 2 ν (m i ) (x, y) = log 2 ν(π F )

38 Definition ((n, k) amplitude code) Given {m i } i m pairwise rel. prime, and κ R + The set C = {x A : ν(x) < κ}, n = log 2 i m m i, k = log 2 κ. is a (n,k) amplitude code.

39 Definition ((n, k) amplitude code) Given {m i } i m pairwise rel. prime, and κ R + The set C = {x A : ν(x) < κ}, n = log 2 i m m i, k = log 2 κ. is a (n,k) amplitude code. Property (Quasi MDS) (x, y) C (x, y) > n k 1 correction capacity = maximal amplitude of an error that can be corrected

40 Definition ((n, k) amplitude code) Given {m i } i m pairwise rel. prime, and κ R + The set C = {x A : ν(x) < κ}, n = log 2 i m m i, k = log 2 κ. is a (n,k) amplitude code. Property (Quasi MDS) (x, y) C, A = K[X] Singleton bound (x, y) n k + 1 correction capacity = maximal amplitude of an error that can be corrected

41 Advantages Generalization over any Euclidean ring Natural representation of the amount of information No need to sort moduli Finer correction capacities

42 Advantages Generalization over any Euclidean ring Natural representation of the amount of information No need to sort moduli Finer correction capacities Adaptive decoding: taking advantage of all the available redundancy Early termination: with no a priori knowledge of a bound on the result

43 Interpretation of Mandelbaum s algorithm Remark Rational reconstruction Partial Extended Euclidean Algorithm Property The Extended Euclidean Algorithm, applied to (Π, E) and to (X = X + E, Π), performs the same first iterations until r i < Π V. u i 1 Π + v i 1 E = Π v u i Π + v i E = 0 u i 1 Π + v i 1 X = r i 1 u i Π + v i X = r i v i X = r i

44 Amplitude decoding, with static correction capacity Amplitude based decoder over R Input: Π, X Input: τ R + τ < ν(π) 2 : bound on the maximal error amplitude Output: X R: corrected message s.t. ν(x)4τ 2 ν(π) begin u 0 = 1, v 0 = 0, r 0 = Π; u 1 = 0, v 1 = 1, r 1 = X ; i = 1; while (ν(r i ) > ν(π)/2τ) do Let r i 1 = q i r i + r i+1 be the Euclidean division of r i 1 by r i ; u i+1 = u i 1 q i u i ; v i+1 = v i 1 q i v i ; i = i + 1; return X = ri v i reaches the quasi-maximal correction capacity

45 Amplitude decoding, with static correction capacity Amplitude based decoder over R Input: Π, X Input: τ R + τ < ν(π) 2 : bound on the maximal error amplitude Output: X R: corrected message s.t. ν(x)4τ 2 ν(π) begin u 0 = 1, v 0 = 0, r 0 = Π; u 1 = 0, v 1 = 1, r 1 = X ; i = 1; while (ν(r i ) > ν(π)/2τ) do Let r i 1 = q i r i + r i+1 be the Euclidean division of r i 1 by r i ; u i+1 = u i 1 q i u i ; v i+1 = v i 1 q i v i ; i = i + 1; return X = ri v i reaches the quasi-maximal correction capacity requires an a priori knowledge of τ How to make the correction capacity adaptive?

46 Adaptive approach Multiple goals: With a fixed n, the correction capacity depends on a bound on ν(x) pessimistic estimate how to take advantage of all the available redundancy? redundancy effectively available X bound on v(x) redundancy being used

47 A first adaptive approach: divisibility check Termination criterion in the Extended Euclidean alg.: u i+1 Π + v i+1 E = 0 E = u i+1 Π/v i+1 test if v j divides Π check if X satisfies: ν(x) ν(π) 4ν(v j ) 2 But several candidates are possible discrimination by a post-condition on the result

48 A first adaptive approach: divisibility check Termination criterion in the Extended Euclidean alg.: u i+1 Π + v i+1 E = 0 E = u i+1 Π/v i+1 test if v j divides Π check if X satisfies: ν(x) ν(π) 4ν(v j ) 2 But several candidates are possible discrimination by a post-condition on the result Example x = 23 with 0 error x = 2 with 1 error m i x i 2 3 2

49 Detecting a gap u i Π + v i (X + E) = r i u i Π + v i E = r i v i X r i v ix

50 Detecting a gap u i Π + v i (X + E) = r i u i Π + v i E = r i v i X r i v ix

51 Detecting a gap u i Π + v i (X + E) = r i u i Π + v i E = r i v i X r i v ix

52 Detecting a gap u i Π + v i (X + E) = r i u i Π + v i E = r i v i X r i v ix X = r i /v i At the final iteration: ν(r i ) = ν(v i X) If necessary, a gap appears between r i 1 and r i.

53 Detecting a gap u i Π + v i (X + E) = r i u i Π + v i E = r i v i X r i v ix 2 g X = r i /v i At the final iteration: ν(r i ) = ν(v i X) If necessary, a gap appears between r i 1 and r i. Introduce a blank 2 g in order to detect a gap > 2 g

54 Detecting a gap u i Π + v i (X + E) = r i u i Π + v i E = r i v i X r i v ix 2 g X = r i /v i At the final iteration: ν(r i ) = ν(v i X) If necessary, a gap appears between r i 1 and r i. Introduce a blank 2 g in order to detect a gap > 2 g

55 Detecting a gap u i Π + v i (X + E) = r i u i Π + v i E = r i v i X r i v ix 2 g X = r i /v i At the final iteration: ν(r i ) = ν(v i X) If necessary, a gap appears between r i 1 and r i. Introduce a blank 2 g in order to detect a gap > 2 g

56 Detecting a gap u i Π + v i (X + E) = r i u i Π + v i E = r i v i X r i v ix 2 g X = r i /v i At the final iteration: ν(r i ) = ν(v i X) If necessary, a gap appears between r i 1 and r i. Introduce a blank 2 g in order to detect a gap > 2 g

57 Detecting a gap u i Π + v i (X + E) = r i u i Π + v i E = r i v i X r i v ix 2 g X = r i /v i At the final iteration: ν(r i ) = ν(v i X) If necessary, a gap appears between r i 1 and r i. Introduce a blank 2 g in order to detect a gap > 2 g Property Loss of correction capacity: very small in practice Test of the divisibility for the remaining candidates Strongly reduces the number of divisibility tests

58 Experiments Size of the error g = 2 1/446 1/765 1/1118 2/1183 2/4165 1/7907 g = 3 1/244 1/414 1/576 2/1002 2/2164 1/4117 g = 5 1/53 1/97 1/153 2/262 1/575 1/1106 g = 10 1/1 1/3 1/9 1/14 1/26 1/35 g = 20 1/1 1/1 1/1 1/1 1/1 1/1 Table: Number of remaining candidates after the gap detection: c /d means d candidates with a gap > 2 g, and c of them passed the divisibility test. n 6001 (3000 moduli), κ 201 (100 moduli).

59 Experiments Divisibility Gap g=2 Gap g=5 Gap g=10 Threshold T= Time (s) Size of the errors Figure: Comparison for n (m = 1300 moduli of 20 bits), κ 6001 (300 moduli) and τ (about 500 moduli).

60 Experiments 5 Time (s) Gap g=5 Gap g=7 Gap g=10 Gap g=20 Threshold T= Size of the errors Figure: Comparison for n (m = moduli of 20 bits), κ (8500 moduli) and τ (500 moduli). Gap: Euclidean Algorithm down to the end overhead

61 Dense rational function interpolation with errors (Cauchy interpolation) y i = f (x i) g(x i ) Rational function interpolation: Pade approximant Find h K[X] s.t. h(x i ) = y i (interpolation) Find f, g s.t. hg = f mod (X x i ) (Pade approx)

62 Dense rational function interpolation with errors (Cauchy interpolation) y i = f (x i) g(x i ) Rational function interpolation: Pade approximant Find h K[X] s.t. h(x i ) = y i (interpolation) Find f, g s.t. hg = f mod (X x i ) (Pade approx) Introducing an error of impact Π F = i I (X x i): hgπ F = f Π F mod (X x i ) Property If n deg f + deg g + 2e, one can interpolate with at most e errors

Adaptive decoding for dense and sparse evaluation/interpolation codes

Adaptive decoding for dense and sparse evaluation/interpolation codes Adaptive decoding for dense and sparse evaluation/interpolation codes Clément PERNET INRIA/LIG-MOAIS, Grenoble Université joint work with M. Comer, E. Kaltofen, J-L. Roch, T. Roche Séminaire Calcul formel

More information

On Irreducible Polynomial Remainder Codes

On Irreducible Polynomial Remainder Codes 2011 IEEE International Symposium on Information Theory Proceedings On Irreducible Polynomial Remainder Codes Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering

More information

On Syndrome Decoding of Chinese Remainder Codes

On Syndrome Decoding of Chinese Remainder Codes On Syndrome Decoding of Chinese Remainder Codes Wenhui Li Institute of, June 16, 2012 Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory (ACCT 2012) Pomorie, Bulgaria Wenhui

More information

Fast computation of normal forms of polynomial matrices

Fast computation of normal forms of polynomial matrices 1/25 Fast computation of normal forms of polynomial matrices Vincent Neiger Inria AriC, École Normale Supérieure de Lyon, France University of Waterloo, Ontario, Canada Partially supported by the mobility

More information

Exact Arithmetic on a Computer

Exact Arithmetic on a Computer Exact Arithmetic on a Computer Symbolic Computation and Computer Algebra William J. Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 21 September 2010

More information

ax b mod m. has a solution if and only if d b. In this case, there is one solution, call it x 0, to the equation and there are d solutions x m d

ax b mod m. has a solution if and only if d b. In this case, there is one solution, call it x 0, to the equation and there are d solutions x m d 10. Linear congruences In general we are going to be interested in the problem of solving polynomial equations modulo an integer m. Following Gauss, we can work in the ring Z m and find all solutions to

More information

Chinese Remainder Theorem

Chinese Remainder Theorem Chinese Remainder Theorem Theorem Let R be a Euclidean domain with m 1, m 2,..., m k R. If gcd(m i, m j ) = 1 for 1 i < j k then m = m 1 m 2 m k = lcm(m 1, m 2,..., m k ) and R/m = R/m 1 R/m 2 R/m k ;

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 2: Mathematical Concepts Divisibility Congruence Quadratic Residues

More information

Finite Fields. Mike Reiter

Finite Fields. Mike Reiter 1 Finite Fields Mike Reiter reiter@cs.unc.edu Based on Chapter 4 of: W. Stallings. Cryptography and Network Security, Principles and Practices. 3 rd Edition, 2003. Groups 2 A group G, is a set G of elements

More information

Sparse Polynomial Interpolation and Berlekamp/Massey algorithms that correct Outlier Errors in Input Values

Sparse Polynomial Interpolation and Berlekamp/Massey algorithms that correct Outlier Errors in Input Values Sparse Polynomial Interpolation and Berlekamp/Massey algorithms that correct Outlier Errors in Input Values Clément PERNET joint work with Matthew T. COMER and Erich L. KALTOFEN : LIG/INRIA-MOAIS, Grenoble

More information

The security of RSA (part 1) The security of RSA (part 1)

The security of RSA (part 1) The security of RSA (part 1) The modulus n and its totient value φ(n) are known φ(n) = p q (p + q) + 1 = n (p + q) + 1 The modulus n and its totient value φ(n) are known φ(n) = p q (p + q) + 1 = n (p + q) + 1 i.e. q = (n φ(n) + 1)

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand 1 Divisibility, prime numbers By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a

More information

Numbers. Çetin Kaya Koç Winter / 18

Numbers. Çetin Kaya Koç   Winter / 18 Çetin Kaya Koç http://koclab.cs.ucsb.edu Winter 2016 1 / 18 Number Systems and Sets We represent the set of integers as Z = {..., 3, 2, 1,0,1,2,3,...} We denote the set of positive integers modulo n as

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a k for some integer k. Notation

More information

: Error Correcting Codes. November 2017 Lecture 2

: Error Correcting Codes. November 2017 Lecture 2 03683072: Error Correcting Codes. November 2017 Lecture 2 Polynomial Codes and Cyclic Codes Amnon Ta-Shma and Dean Doron 1 Polynomial Codes Fix a finite field F q. For the purpose of constructing polynomial

More information

Towards High Performance Multivariate Factorization. Michael Monagan. This is joint work with Baris Tuncer.

Towards High Performance Multivariate Factorization. Michael Monagan. This is joint work with Baris Tuncer. Towards High Performance Multivariate Factorization Michael Monagan Center for Experimental and Constructive Mathematics Simon Fraser University British Columbia This is joint work with Baris Tuncer. To

More information

Fast computation of normal forms of polynomial matrices

Fast computation of normal forms of polynomial matrices 1/25 Fast computation of normal forms of polynomial matrices Vincent Neiger Inria AriC, École Normale Supérieure de Lyon, France University of Waterloo, Ontario, Canada Partially supported by the mobility

More information

Towards High Performance Multivariate Factorization. Michael Monagan. This is joint work with Baris Tuncer.

Towards High Performance Multivariate Factorization. Michael Monagan. This is joint work with Baris Tuncer. Towards High Performance Multivariate Factorization Michael Monagan Center for Experimental and Constructive Mathematics Simon Fraser University British Columbia This is joint work with Baris Tuncer. The

More information

Congruences and Residue Class Rings

Congruences and Residue Class Rings Congruences and Residue Class Rings (Chapter 2 of J. A. Buchmann, Introduction to Cryptography, 2nd Ed., 2004) Shoichi Hirose Faculty of Engineering, University of Fukui S. Hirose (U. Fukui) Congruences

More information

Computing with polynomials: Hensel constructions

Computing with polynomials: Hensel constructions Course Polynomials: Their Power and How to Use Them, JASS 07 Computing with polynomials: Hensel constructions Lukas Bulwahn March 28, 2007 Abstract To solve GCD calculations and factorization of polynomials

More information

Great Theoretical Ideas in Computer Science

Great Theoretical Ideas in Computer Science 15-251 Great Theoretical Ideas in Computer Science Polynomials, Lagrange, and Error-correction Lecture 23 (November 10, 2009) P(X) = X 3 X 2 + + X 1 + Definition: Recall: Fields A field F is a set together

More information

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald)

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) 1 Euclid s Algorithm Euclid s Algorithm for computing the greatest common divisor belongs to the oldest known computing procedures

More information

Basic Algorithms in Number Theory

Basic Algorithms in Number Theory Basic Algorithms in Number Theory Algorithmic Complexity... 1 Basic Algorithms in Number Theory Francesco Pappalardi Discrete Logs, Modular Square Roots & Euclidean Algorithm. July 20 th 2010 Basic Algorithms

More information

NUMBER THEORY AND CODES. Álvaro Pelayo WUSTL

NUMBER THEORY AND CODES. Álvaro Pelayo WUSTL NUMBER THEORY AND CODES Álvaro Pelayo WUSTL Talk Goal To develop codes of the sort can tell the world how to put messages in code (public key cryptography) only you can decode them Structure of Talk Part

More information

An Interpolation Algorithm for List Decoding of Reed-Solomon Codes

An Interpolation Algorithm for List Decoding of Reed-Solomon Codes An Interpolation Algorithm for List Decoding of Reed-Solomon Codes Kwankyu Lee Department of Mathematics San Diego State University San Diego, USA Email: kwankyu@sogangackr Michael E O Sullivan Department

More information

On Solving Ambiguity Resolution with Robust Chinese Remainder Theorem for Multiple Numbers

On Solving Ambiguity Resolution with Robust Chinese Remainder Theorem for Multiple Numbers 1 On Solving Ambiguity Resolution with Robust Chinese Remainder Theorem for Multiple Numbers Hanshen Xiao and Guoqiang Xiao arxiv:1807.000v1 [cs.it] 9 Jun 018 Abstract Chinese Remainder Theorem (CRT) is

More information

Reverse Berlekamp-Massey Decoding

Reverse Berlekamp-Massey Decoding Reverse Berlekamp-Massey Decoding Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {yu, loeliger}@isi.ee.ethz.ch arxiv:1301.736v

More information

Coding Theory. Ruud Pellikaan MasterMath 2MMC30. Lecture 11.1 May

Coding Theory. Ruud Pellikaan MasterMath 2MMC30. Lecture 11.1 May Coding Theory Ruud Pellikaan g.r.pellikaan@tue.nl MasterMath 2MMC30 /k Lecture 11.1 May 12-2016 Content lecture 11 2/31 In Lecture 8.2 we introduced the Key equation Now we introduce two algorithms which

More information

Error Correcting Codes Questions Pool

Error Correcting Codes Questions Pool Error Correcting Codes Questions Pool Amnon Ta-Shma and Dean Doron January 3, 018 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to

More information

3x + 1 (mod 5) x + 2 (mod 5)

3x + 1 (mod 5) x + 2 (mod 5) Today. Secret Sharing. Polynomials Polynomials. Secret Sharing. Share secret among n people. Secrecy: Any k 1 knows nothing. Roubustness: Any k knows secret. Efficient: minimize storage. A polynomial P(x)

More information

: Error Correcting Codes. October 2017 Lecture 1

: Error Correcting Codes. October 2017 Lecture 1 03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of

More information

COMP239: Mathematics for Computer Science II. Prof. Chadi Assi EV7.635

COMP239: Mathematics for Computer Science II. Prof. Chadi Assi EV7.635 COMP239: Mathematics for Computer Science II Prof. Chadi Assi assi@ciise.concordia.ca EV7.635 The Euclidean Algorithm The Euclidean Algorithm Finding the GCD of two numbers using prime factorization is

More information

Generalized Reed-Solomon Codes

Generalized Reed-Solomon Codes Chapter 5 Generalized Reed-Solomon Codes In 1960, I.S. Reed and G. Solomon introduced a family of error-correcting codes that are douly lessed. The codes and their generalizations are useful in practice,

More information

Local Fields. Chapter Absolute Values and Discrete Valuations Definitions and Comments

Local Fields. Chapter Absolute Values and Discrete Valuations Definitions and Comments Chapter 9 Local Fields The definition of global field varies in the literature, but all definitions include our primary source of examples, number fields. The other fields that are of interest in algebraic

More information

CPSC 518 Introduction to Computer Algebra Schönhage and Strassen s Algorithm for Integer Multiplication

CPSC 518 Introduction to Computer Algebra Schönhage and Strassen s Algorithm for Integer Multiplication CPSC 518 Introduction to Computer Algebra Schönhage and Strassen s Algorithm for Integer Multiplication March, 2006 1 Introduction We have now seen that the Fast Fourier Transform can be applied to perform

More information

Spatial Navigation. Zaneta Navratilova and Mei Yin. March 6, Theoretical Neuroscience Journal Club University of Arizona

Spatial Navigation. Zaneta Navratilova and Mei Yin. March 6, Theoretical Neuroscience Journal Club University of Arizona Theoretical Neuroscience Journal Club University of Arizona March 6, 2008 Based on the observation that dmec stores only modulo information about rat position, we suggest that dmec may be encoding and

More information

Basic Algorithms in Number Theory

Basic Algorithms in Number Theory Basic Algorithms in Number Theory Algorithmic Complexity... 1 Basic Algorithms in Number Theory Francesco Pappalardi #2-b - Euclidean Algorithm. September 2 nd 2015 SEAMS School 2015 Number Theory and

More information

Applied Cryptography and Computer Security CSE 664 Spring 2018

Applied Cryptography and Computer Security CSE 664 Spring 2018 Applied Cryptography and Computer Security Lecture 12: Introduction to Number Theory II Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline This time we ll finish the

More information

Identifying supersingular elliptic curves

Identifying supersingular elliptic curves Identifying supersingular elliptic curves Andrew V. Sutherland Massachusetts Institute of Technology January 6, 2012 http://arxiv.org/abs/1107.1140 Andrew V. Sutherland (MIT) Identifying supersingular

More information

Notes on Systems of Linear Congruences

Notes on Systems of Linear Congruences MATH 324 Summer 2012 Elementary Number Theory Notes on Systems of Linear Congruences In this note we will discuss systems of linear congruences where the moduli are all different. Definition. Given the

More information

2.3 In modular arithmetic, all arithmetic operations are performed modulo some integer.

2.3 In modular arithmetic, all arithmetic operations are performed modulo some integer. CHAPTER 2 INTRODUCTION TO NUMBER THEORY ANSWERS TO QUESTIONS 2.1 A nonzero b is a divisor of a if a = mb for some m, where a, b, and m are integers. That is, b is a divisor of a if there is no remainder

More information

NUMBER THEORY. Anwitaman DATTA SCSE, NTU Singapore CX4024. CRYPTOGRAPHY & NETWORK SECURITY 2018, Anwitaman DATTA

NUMBER THEORY. Anwitaman DATTA SCSE, NTU Singapore CX4024. CRYPTOGRAPHY & NETWORK SECURITY 2018, Anwitaman DATTA NUMBER THEORY Anwitaman DATTA SCSE, NTU Singapore Acknowledgement: The following lecture slides are based on, and uses material from the text book Cryptography and Network Security (various eds) by William

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 8 February 1, 2012 CPSC 467b, Lecture 8 1/42 Number Theory Needed for RSA Z n : The integers mod n Modular arithmetic GCD Relatively

More information

Chapter 4 Finite Fields

Chapter 4 Finite Fields Chapter 4 Finite Fields Introduction will now introduce finite fields of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public Key concern operations on numbers what constitutes a number

More information

3 The fundamentals: Algorithms, the integers, and matrices

3 The fundamentals: Algorithms, the integers, and matrices 3 The fundamentals: Algorithms, the integers, and matrices 3.4 The integers and division This section introduces the basics of number theory number theory is the part of mathematics involving integers

More information

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups

More information

CPSC 518 Introduction to Computer Algebra Asymptotically Fast Integer Multiplication

CPSC 518 Introduction to Computer Algebra Asymptotically Fast Integer Multiplication CPSC 518 Introduction to Computer Algebra Asymptotically Fast Integer Multiplication 1 Introduction We have now seen that the Fast Fourier Transform can be applied to perform polynomial multiplication

More information

Elementary Number Theory Review. Franz Luef

Elementary Number Theory Review. Franz Luef Elementary Number Theory Review Principle of Induction Principle of Induction Suppose we have a sequence of mathematical statements P(1), P(2),... such that (a) P(1) is true. (b) If P(k) is true, then

More information

Cryptography CS 555. Topic 18: RSA Implementation and Security. CS555 Topic 18 1

Cryptography CS 555. Topic 18: RSA Implementation and Security. CS555 Topic 18 1 Cryptography CS 555 Topic 18: RSA Implementation and Security Topic 18 1 Outline and Readings Outline RSA implementation issues Factoring large numbers Knowing (e,d) enables factoring Prime testing Readings:

More information

Algorithms for exact (dense) linear algebra

Algorithms for exact (dense) linear algebra Algorithms for exact (dense) linear algebra Gilles Villard CNRS, Laboratoire LIP ENS Lyon Montagnac-Montpezat, June 3, 2005 Introduction Problem: Study of complexity estimates for basic problems in exact

More information

Real Solving on Algebraic Systems of Small Dimension

Real Solving on Algebraic Systems of Small Dimension Real Solving on Algebraic Systems of Small Dimension Master s Thesis Presentation Dimitrios I. Diochnos University of Athens March 8, 2007 D. I. Diochnos (Univ. of Athens, µ Q λ ) Real Solving on Bivariate

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

MTH 346: The Chinese Remainder Theorem

MTH 346: The Chinese Remainder Theorem MTH 346: The Chinese Remainder Theorem March 3, 2014 1 Introduction In this lab we are studying the Chinese Remainder Theorem. We are going to study how to solve two congruences, find what conditions are

More information

Class invariants by the CRT method

Class invariants by the CRT method Class invariants by the CRT method Andreas Enge Andrew V. Sutherland INRIA Bordeaux-Sud-Ouest Massachusetts Institute of Technology ANTS IX Andreas Enge and Andrew Sutherland Class invariants by the CRT

More information

List decoding of binary Goppa codes and key reduction for McEliece s cryptosystem

List decoding of binary Goppa codes and key reduction for McEliece s cryptosystem List decoding of binary Goppa codes and key reduction for McEliece s cryptosystem Morgan Barbier morgan.barbier@lix.polytechnique.fr École Polytechnique INRIA Saclay - Île de France 14 April 2011 University

More information

Cryptographic Engineering

Cryptographic Engineering Cryptographic Engineering Clément PERNET M2 Cyber Security, UFR-IM 2 AG, Univ. Grenoble-Alpes ENSIMAG, Grenoble INP Outline Coding Theory Introduction Linear Codes Reed-Solomon codes Application: Mc Eliece

More information

Polynomials. Chapter 4

Polynomials. Chapter 4 Chapter 4 Polynomials In this Chapter we shall see that everything we did with integers in the last Chapter we can also do with polynomials. Fix a field F (e.g. F = Q, R, C or Z/(p) for a prime p). Notation

More information

Chinese Remainder Theorem

Chinese Remainder Theorem Chinese Remainder Theorem Çetin Kaya Koç koc@cs.ucsb.edu Çetin Kaya Koç http://koclab.org Winter 2017 1 / 16 The Chinese Remainder Theorem Some cryptographic algorithms work with two (such as RSA) or more

More information

Applied Cryptography and Computer Security CSE 664 Spring 2017

Applied Cryptography and Computer Security CSE 664 Spring 2017 Applied Cryptography and Computer Security Lecture 11: Introduction to Number Theory Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline What we ve covered so far: symmetric

More information

Fast algorithms for multivariate interpolation problems

Fast algorithms for multivariate interpolation problems Fast algorithms for multivariate interpolation problems Vincent Neiger,, Claude-Pierre Jeannerod Éric Schost Gilles Villard AriC, LIP, École Normale Supérieure de Lyon, France ORCCA, Computer Science Department,

More information

a = a i 2 i a = All such series are automatically convergent with respect to the standard norm, but note that this representation is not unique: i<0

a = a i 2 i a = All such series are automatically convergent with respect to the standard norm, but note that this representation is not unique: i<0 p-adic Numbers K. Sutner v0.4 1 Modular Arithmetic rings integral domains integers gcd, extended Euclidean algorithm factorization modular numbers add Lemma 1.1 (Chinese Remainder Theorem) Let a b. Then

More information

Modular Algorithms for Computing Minimal Associated Primes and Radicals of Polynomial Ideals. Masayuki Noro. Toru Aoyama

Modular Algorithms for Computing Minimal Associated Primes and Radicals of Polynomial Ideals. Masayuki Noro. Toru Aoyama Modular Algorithms for Computing Minimal Associated Primes and Radicals of Polynomial Ideals Toru Aoyama Kobe University Department of Mathematics Graduate school of Science Rikkyo University Department

More information

Elementary Number Theory MARUCO. Summer, 2018

Elementary Number Theory MARUCO. Summer, 2018 Elementary Number Theory MARUCO Summer, 2018 Problem Set #0 axiom, theorem, proof, Z, N. Axioms Make a list of axioms for the integers. Does your list adequately describe them? Can you make this list as

More information

Math 547, Exam 2 Information.

Math 547, Exam 2 Information. Math 547, Exam 2 Information. 3/19/10, LC 303B, 10:10-11:00. Exam 2 will be based on: Homework and textbook sections covered by lectures 2/3-3/5. (see http://www.math.sc.edu/ boylan/sccourses/547sp10/547.html)

More information

Introduction to Modern Cryptography. Benny Chor

Introduction to Modern Cryptography. Benny Chor Introduction to Modern Cryptography Benny Chor RSA Public Key Encryption Factoring Algorithms Lecture 7 Tel-Aviv University Revised March 1st, 2008 Reminder: The Prime Number Theorem Let π(x) denote the

More information

Finite Fields and Error-Correcting Codes

Finite Fields and Error-Correcting Codes Lecture Notes in Mathematics Finite Fields and Error-Correcting Codes Karl-Gustav Andersson (Lund University) (version 1.013-16 September 2015) Translated from Swedish by Sigmundur Gudmundsson Contents

More information

Mathematics for Cryptography

Mathematics for Cryptography Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1

More information

Soft-decision Decoding of Chinese Remainder Codes

Soft-decision Decoding of Chinese Remainder Codes Soft-decision Decoding of Chinese Remainder Codes Venkatesan Guruswami Amit Sahai Ý Madhu Sudan Þ Abstract Given Ò relatively prime integers Ô Ô Ò and an integer Ò, the Chinese Remainder Code, ÊÌ É ÔÔÒ,

More information

MATH 431 PART 2: POLYNOMIAL RINGS AND FACTORIZATION

MATH 431 PART 2: POLYNOMIAL RINGS AND FACTORIZATION MATH 431 PART 2: POLYNOMIAL RINGS AND FACTORIZATION 1. Polynomial rings (review) Definition 1. A polynomial f(x) with coefficients in a ring R is n f(x) = a i x i = a 0 + a 1 x + a 2 x 2 + + a n x n i=0

More information

Basic Algorithms in Number Theory

Basic Algorithms in Number Theory Basic Algorithms in Number Theory Algorithmic Complexity... 1 Basic Algorithms in Number Theory Francesco Pappalardi #2 - Discrete Logs, Modular Square Roots, Polynomials, Hensel s Lemma & Chinese Remainder

More information

LECTURE NOTES IN CRYPTOGRAPHY

LECTURE NOTES IN CRYPTOGRAPHY 1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic

More information

Computing Error Distance of Reed-Solomon Codes

Computing Error Distance of Reed-Solomon Codes Computing Error Distance of Reed-Solomon Codes Guizhen Zhu Institute For Advanced Study Tsinghua University, Beijing, 100084, PR China Email:zhugz08@mailstsinghuaeducn Daqing Wan Department of Mathematics

More information

Information Theory. Lecture 7

Information Theory. Lecture 7 Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible

More information

LECTURE 4: CHINESE REMAINDER THEOREM AND MULTIPLICATIVE FUNCTIONS

LECTURE 4: CHINESE REMAINDER THEOREM AND MULTIPLICATIVE FUNCTIONS LECTURE 4: CHINESE REMAINDER THEOREM AND MULTIPLICATIVE FUNCTIONS 1. The Chinese Remainder Theorem We now seek to analyse the solubility of congruences by reinterpreting their solutions modulo a composite

More information

Cryptography. Course 1: Remainder: RSA. Jean-Sébastien Coron. September 21, Université du Luxembourg

Cryptography. Course 1: Remainder: RSA. Jean-Sébastien Coron. September 21, Université du Luxembourg Course 1: Remainder: RSA Université du Luxembourg September 21, 2010 Public-key encryption Public-key encryption: two keys. One key is made public and used to encrypt. The other key is kept private and

More information

A. Algebra and Number Theory

A. Algebra and Number Theory A. Algebra and Number Theory Public-key cryptosystems are based on modular arithmetic. In this section, we summarize the concepts and results from algebra and number theory which are necessary for an understanding

More information

Chinese Remainder Algorithms. Çetin Kaya Koç Spring / 22

Chinese Remainder Algorithms.   Çetin Kaya Koç Spring / 22 Chinese Remainder Algorithms http://koclab.org Çetin Kaya Koç Spring 2018 1 / 22 The Chinese Remainder Theorem Some cryptographic algorithms work with two (such as RSA) or more moduli (such as secret-sharing)

More information

Fast Polynomial Multiplication

Fast Polynomial Multiplication Fast Polynomial Multiplication Marc Moreno Maza CS 9652, October 4, 2017 Plan Primitive roots of unity The discrete Fourier transform Convolution of polynomials The fast Fourier transform Fast convolution

More information

Error Detection & Correction

Error Detection & Correction Error Detection & Correction Error detection & correction noisy channels techniques in networking error detection error detection capability retransmition error correction reconstruction checksums redundancy

More information

ICS141: Discrete Mathematics for Computer Science I

ICS141: Discrete Mathematics for Computer Science I ICS141: Discrete Mathematics for Computer Science I Dept. Information & Computer Sci., Jan Stelovsky based on slides by Dr. Baek and Dr. Still Originals by Dr. M. P. Frank and Dr. J.L. Gross Provided by

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 22 November 27, 2017 CPSC 467, Lecture 22 1/43 BBS Pseudorandom Sequence Generator Secret Splitting Shamir s Secret Splitting Scheme

More information

Computing minimal interpolation bases

Computing minimal interpolation bases Computing minimal interpolation bases Vincent Neiger,, Claude-Pierre Jeannerod Éric Schost Gilles Villard AriC, LIP, École Normale Supérieure de Lyon, France University of Waterloo, Ontario, Canada Supported

More information

Solutions to Problem Set 3 - Fall 2008 Due Tuesday, Sep. 30 at 1:00

Solutions to Problem Set 3 - Fall 2008 Due Tuesday, Sep. 30 at 1:00 Solutions to 18.781 Problem Set 3 - Fall 2008 Due Tuesday, Sep. 30 at 1:00 1. (Niven 2.3.3) Solve the congruences x 1 (mod 4), x 0 (mod 3), x 5 (mod 7). First we note that 4, 3, and 7 are pairwise relatively

More information

= 1 2x. x 2 a ) 0 (mod p n ), (x 2 + 2a + a2. x a ) 2

= 1 2x. x 2 a ) 0 (mod p n ), (x 2 + 2a + a2. x a ) 2 8. p-adic numbers 8.1. Motivation: Solving x 2 a (mod p n ). Take an odd prime p, and ( an) integer a coprime to p. Then, as we know, x 2 a (mod p) has a solution x Z iff = 1. In this case we can suppose

More information

Constructing Abelian Varieties for Pairing-Based Cryptography

Constructing Abelian Varieties for Pairing-Based Cryptography for Pairing-Based CWI and Universiteit Leiden, Netherlands Workshop on Pairings in Arithmetic Geometry and 4 May 2009 s MNT MNT Type s What is pairing-based cryptography? Pairing-based cryptography refers

More information

MATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences.

MATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences. MATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences. Congruences Let n be a postive integer. The integers a and b are called congruent modulo n if they have the same

More information

RSA Key Generation. Required Reading. W. Stallings, "Cryptography and Network-Security, Chapter 8.3 Testing for Primality

RSA Key Generation. Required Reading. W. Stallings, Cryptography and Network-Security, Chapter 8.3 Testing for Primality ECE646 Lecture RSA Key Generation Required Reading W. Stallings, "Cryptography and Network-Security, Chapter 8.3 Testing for Primality A.Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography

More information

Algebra for error control codes

Algebra for error control codes Algebra for error control codes EE 387, Notes 5, Handout #7 EE 387 concentrates on block codes that are linear: Codewords components are linear combinations of message symbols. g 11 g 12 g 1n g 21 g 22

More information

ECE646 Lecture 11 Required Reading Chapter 8.3 Testing for Primality RSA Key Generation

ECE646 Lecture 11 Required Reading Chapter 8.3 Testing for Primality RSA Key Generation ECE646 Lecture equired eading W. Stallings, "Cryptography and Network-Security, Chapter 8. Testing for Primality SA Key Generation A.Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security Outline Quadratic residues Useful tests Digital Signatures CPSC 467b: Cryptography and Computer Security Lecture 14 Michael J. Fischer Department of Computer Science Yale University March 1, 2010 Michael

More information

Algorithmic Number Theory and Public-key Cryptography

Algorithmic Number Theory and Public-key Cryptography Algorithmic Number Theory and Public-key Cryptography Course 3 University of Luxembourg March 22, 2018 The RSA algorithm The RSA algorithm is the most widely-used public-key encryption algorithm Invented

More information

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups

More information

g(x) = 1 1 x = 1 + x + x2 + x 3 + is not a polynomial, since it doesn t have finite degree. g(x) is an example of a power series.

g(x) = 1 1 x = 1 + x + x2 + x 3 + is not a polynomial, since it doesn t have finite degree. g(x) is an example of a power series. 6 Polynomial Rings We introduce a class of rings called the polynomial rings, describing computation, factorization and divisibility in such rings For the case where the coefficients come from an integral

More information

Hamburger Beiträge zur Mathematik

Hamburger Beiträge zur Mathematik Hamburger Beiträge zur Mathematik Nr. 712, November 2017 Remarks on the Polynomial Decomposition Law by Ernst Kleinert Remarks on the Polynomial Decomposition Law Abstract: we first discuss in some detail

More information

Discrete Mathematics GCD, LCM, RSA Algorithm

Discrete Mathematics GCD, LCM, RSA Algorithm Discrete Mathematics GCD, LCM, RSA Algorithm Abdul Hameed http://informationtechnology.pk/pucit abdul.hameed@pucit.edu.pk Lecture 16 Greatest Common Divisor 2 Greatest common divisor The greatest common

More information

Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations

Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 9.1 Chapter 9 Objectives

More information

Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes

Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes Roberta Barbi December 17, 2015 Roberta Barbi List decoding December 17, 2015 1 / 13 Codes Let F q be

More information

Reed-Solomon codes. Chapter Linear codes over finite fields

Reed-Solomon codes. Chapter Linear codes over finite fields Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime

More information

Chapter 4. Greatest common divisors of polynomials. 4.1 Polynomial remainder sequences

Chapter 4. Greatest common divisors of polynomials. 4.1 Polynomial remainder sequences Chapter 4 Greatest common divisors of polynomials 4.1 Polynomial remainder sequences If K is a field, then K[x] is a Euclidean domain, so gcd(f, g) for f, g K[x] can be computed by the Euclidean algorithm.

More information

Polynomials, Ideals, and Gröbner Bases

Polynomials, Ideals, and Gröbner Bases Polynomials, Ideals, and Gröbner Bases Notes by Bernd Sturmfels for the lecture on April 10, 2018, in the IMPRS Ringvorlesung Introduction to Nonlinear Algebra We fix a field K. Some examples of fields

More information