Application of Explicit Hilbert s Pairing to Constructive Class Field Theory and Cryptography

Size: px
Start display at page:

Download "Application of Explicit Hilbert s Pairing to Constructive Class Field Theory and Cryptography"

Transcription

1 Applied Mathematical Sciences, Vol. 10, 2016, no. 45, HIKARI Ltd, Application of Explicit Hilbert s Pairing to Constructive Class Field Theory and Cryptography S.V. Vostokov, O.Yu. Podkopaeva and K.V. Ratko St. Petersburg State University Universitetskaya nab., 7-9, St. Petersburg, Russia Copyright c 2016 S.V. Vostokov, O.Yu. Podkopaeva and K.V. Ratko. This article is distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract In the present paper, we apply the explicit formula for Hilbert s pairing suggested by S.V. Vostokov in the late 1970s to class field theory and cryptography. We give an explicit construction of the norm group of a radical extension of a local field F. We also suggest a new public key cryptographic protocol based on the explicit Hilbert pairing. Mathematics Subject Classification: 12J10 Keywords: Hilbert pairing, local field, class group, public key protocol 1 Introduction In the 1985 N. Koblitz and V. Miller independently (see [2] and bibliography therein) inspired by Lenstra s factoring algorithm based on elliptic curves constructed a completely new Diffie-Hellman type protocols using the group of points of an elliptic curve defined over a finite field rather than the multiplicative group of a finite field. Since seminal works of N. Koblitz and V. Miller, more and more pairing-based cryptosystems have been invented. Some time earlier, I.R. Shafarevich, S.V. Vostokov, and H.Brückner initiated the study of explicit constructions in the classical class field theory, which led, above other things, to explicit formulas for Hilbert s pairing [3]. This research direction was further developed by S.V. Vostokov in the 1980s. In section 1 of the present

2 2206 S.V. Vostokov, O.Yu. Podkopaeva and K.V. Ratko paper, we give an explicit formula for Hilbert s pairing and list its basic properties needed in the sequel. In section 2, we apply the explicit Hilbert pairing to class field theory. In section 3, we give an explicit construction of the norm group of a radical extension of a local field F for a given set of generators of an open subgroup of finite index in the multiplicative group of a one-dimensional local field F with finite residue field of characteristic p > 0. In Sec. 4, we apply the explicit Hilbert s pairing to public key cryptography. We suggest an identity-based encryption protocol based on the explicit Hilbert pairing. 2 Hilbert symbol in a one-dimensional local field 2.1 Notation Let F be a local field (a finite extension of Q p ), π a prime element in F, a maximal ideal of the ring of integers in F, R the system of multiplicative representatives in F, U F the group of units in F, U 1 the subgroup of principal units in U F, T the inertia subfield in F, O := O T the ring of integers in T, tr the trace operator in the extension T/Q p, ζ := ζ p n a primitive p n th root of unity in F, e the ramification index of F, e e m =, 1 m n, p m 1 (p 1) U = 1 + XZ p [[X]], Eis(X) = ((1+X)p 1), X p the Frobenius operator on the ring O((X)), f = m a m X m m a σ mx pm, where σ is the Frobenius automorphism in O, R = O T [[X]] o the ideal of series with zero constant term (additive Z p - module), µ m the group of mth roots of unity.

3 Application of explicit Hilbert s pairing The definition and basic properties of the Hilbert symbol Let F contain µ m. For each α F, we denote by σ α the corresponding automorphism of the maximal Abelian extension of F, given by local class field theory. The Hilbert symbol is the pairing defined by the formula (, ) m : F F µ m (α, β) = m β σα 1, (see [1]). We list the basic properties of the Hilbert symbol. 1. Bilinearity (α 1 α 2, β) = (α 1, β)(α 2, β), (α, β 1 β 2 ) = (α, β 1 )(α, β 2 ) 2. Skew-symmetry (α, β) = (β, α) 1 3. Norm property { α is a norm in F ( m β)/f (α, β) = 1 β is a norm in F ( m α)/f. (1) 4. Independence in each argument. Namely, let Eis(X) be an irreducible Eisenstein s polynomial of degree p 1, Eis(X) = ((1 + X)p 1) X p, and let r(x) be the remainder upon dividing f(x) 1 by the polynomial u(x). Then < f(x), g(x) >=< r(x), g(x) >. (2) 2.3 Explicit form of the Hilbert symbol For all f R and g 1 + R, we define the Artin Hasse function and the Vostokov function (see [4, Sec.1]), ( E(f) = exp 1 + ) p + 2 p +... (f), l(g) = 1 2 p log gp. It can be proved (see [3, Proposition 1]) that the functions l and E are inverse isomorphisms between Z p -module R and multiplicative Z p -module 1 + R, i.e., l(e(f)) = f and E(l(g)) = g.

4 2208 S.V. Vostokov, O.Yu. Podkopaeva and K.V. Ratko For an element α F, we denote by α(x) an element of O((X)) such that α(π) = α. Let s(x) = ζ pn 1. It is easy to prove the following two statements. Proposition 1. Let f(x) XO[[X]] and f(x) = a m X m Then l(1 + f(x)) a m X m (mod deg(m + 1)). Proposition 2. Let ζ n = 1 + cπ en + c 1 π en , where c, c i O. Then 1/s(X) satisfies the congruence 1/s(X) c 1 X pe 1 (mod po{{x}}), (3) where O{{X}} = { a ix i i, a i 0}. Now, we define a bilinear pairing γ α,β : F F Z p. Let α = π a θε and β = π b θ η be elements of F, where θ, θ R, and ε, η U 1. We choose α(x) in the form X a θε(x), where ε(x) X=π = ε. In the same way, we define β(x) and η(x) for β. Let p 2. We put where γ α,β = res X Φ α,β (X)/s(X), (4) Φ(α, β) = l(ε) d l(η) d l(ε)β 1 dx dx β + d l(η)α 1 dx α. It can be proved (see [3, Secs. 2 and 3]) that the pairing γ α,β is bilinear, skewsymmetric (mod p n ), and does not dependent (mod p n ) on the choice of a prime element π. Moreover, < α, β > n = tr γ α,β (5) does not depend (mod p n ) on the choice of expansions of the elements α, β, and ζ in power series in π and has the following norm property: < α, β > m = 1 { α is a norm in F ( m β)/f β is a norm in F ( m α)/f In addition, for the Hilbert symbol we have an explicit formula (α, β) n = ζ trγ α,β = ζ <α,β>n.

5 Application of explicit Hilbert s pairing The class group of a cyclic p n -extension of a one-dimensional local field 3.1 Generators of cyclic p n -extensions In this section, we study generators of a cyclic extension F ( pn α), where F is a local field and α F. Lemma 1. Let L = F ( pn α) be a cyclic extension of degree p n. Let β F be such that β is a generator of the cyclic group F /Nm L/F L. Let α 1, α 2, and β 1 be elements of F such that α = α 1 α p 2 and (α 1, β 1 ) = ζ. Then β 1 is also a generator of F /Nm L/F L. Proof. We have (α, β 1 ) = (α 1, β 1 )(α p 2, β 1 ) = ζ 1+pk for some k. Therefore, (α, β 1 ) = (α, β 1+pk ) since (α, β) = ζ. Consequently, (α, β 1+pk β 1 1 ) = 1, and, by the norm property of the Hilbert symbol, we have β 1 β (1+pk) = Nm L/F γ, γ F, which implies that β 1 = β 1+pk Nm L/F γ, i.e., the elements β 1 and β 1+pk of F /Nm L/F L coincide. Therefore, β 1 also generates the factor group. Corollary 1. To find a generator of the group F /Nm L/F L, where L = F ( pn α), it is sufficient to consider the element α modulo F p. An element ω F is called p n -primary if the extension F ( pn ω)/f is unramified. In [4, Sec.4] it is proved that p n -primary elements have the form and ω(a) = E(as(X)) X=π, a O, Moreover, the following congruence is valid: (π, ω(a)) = ζ tr a (6) ω(a) 1 + cπ pe 1 (mod π pe 1+1 ). (7) Lemma 2. a) If α π a ε (mod F p ), (a, p) = 1, and ε is a principal unit, then there is a prime element τ in F such that F ( pn α) = F ( p n τ). b) If α 1 + aπ pe 1 (mod π pe 1+1 ), a O, then α ω(ac 1 ) (mod F p ), where the element c is from (7). c) If α ε (mod F p ) and ε = 1 + aπ u +..., where (p, au) = 1, 1 u < pe 1, then there is a prime element τ in F such that α 1 + aτ u (mod F p ).

6 2210 S.V. Vostokov, O.Yu. Podkopaeva and K.V. Ratko Proof. a) For any integer b prime to p, we have F ( pn α) = F ( p n αb ). Since (a, p) = 1, there is a b such that ab 1 (mod p n ). Consequently, where τ = πε b. b) Follows from (3) and (7). c) By assumption, we have F ( pn α) = F ( p n αb ) = F ( pn πεb ) = F ( pn τ), ε = 1 + aπ u +... = 1 + aπ u (1 + c 1 c 1 π +...) = 1 + aηπ u, where η = 1 + c 1 c 1 π +... U 1. Since the group of principal units U 1 is the m divisible for all m prime to p, there exists an η 1 U 1 such that η u 1 = η. It follows that ε = 1 + c(πη 1 ) u = 1 + cτ u (mod F p ), where τ = πη Generators of the class group of a cyclic p n -extension of a one-dimensional local field In this section, we prove the main result of the paper. Namely, we find an explicit form of a generator of the class group of a radical p n -extension. Theorem 1. Let L = F ( pn α), where α F, be a cyclic extension of degree p n. a) If α τ (mod F p ), then p n -primary element ω(a) with tr a 0 (mod p) is a generator of F /Nm L/F L. b) If α ω(a) (mod F p ), then any prime element π of F is a generator of F /Nm L/F L. c) If α 1 + aπ u (mod F p ), where (p, au) = 1 and 1 u < pe 1, then the element β = 1 + bπ v, where u + v = pe 1 and tr ab 1 (mod p) is a generator of F /Nm L/F L. Proof. a) and b) follow from (6) and Lemma 2. To prove c), we use formula (4) for the Hilbert symbol. We obtain Φ(α, β) = l(1 + bx v )d log(1 + ax u ) l(1 + ax u )d p log(1 + bxv ). By Proposition 1, we have Φ(α, β) ab X u+v 1 = ab X pe 1 1 (mod deg(pe 1 + 1)). (8)

7 Application of explicit Hilbert s pairing 2211 Since u + v = pe 1, congruences (3) and (8) imply Φ(α, β)/s(x) abc 1 X 1 (mod po{{x}}). Consequently, res X Φ(α, β)/s(x) abc 1 (mod p) and < α, β >= tr res Φ(α, β)/s = tr (ab/c) 1 (mod p). As a result, we see that < α, β > n 1 (mod p) and (α, β) = ζ 1+pk is a primitive p n th root of unity. From the norm property of the Hilbert symbol (1), it follow that β is a generator of the class group of F ( pn α) if and only if (α, β) = ζ, where ζ is a primitive p n th root of unity. This proves the theorem. 4 Protocol authentication without disclosure In this section, we use the explicit reciprocity law to describe a variant of a cryptographic protocol. The proof of security of the protocol under consideration is based on the non-polynomial complexity of the discrete logarithm problem in the ring of polynomials with integer coefficients. 4.1 Protocol of parameters and participants The participants of the protocol are Alice A and a verifier V. Both participants know a number s, a polynomial Eis(X), and a polynomial F (X) from the group U(x). Alice knows a secret polynomial a(x) U(X) such that < F (x), a(x) > 0. According to the classical problem of a protocol authentication without disclosure, Alice should be able to prove to the verifier that she knows the secret polynomial a(x) without disclosing it. To verify that Alice knows the secret polynomial a(x), the verifier uses the polynomial A(X) : A(X) = a(x) s mod Eis(X). 4.2 The protocol choreography 1. Alice chooses a random polynomial r(x) :< r(x), F (x) > 0 and calculates the polynomial R(X) = r(x) s mod Eis(X). 2. Alice transmits the value R(x) to the verifier. 3. V verifies < R(x), F (x) > 0 and can ask A one of the following questions:

8 2212 S.V. Vostokov, O.Yu. Podkopaeva and K.V. Ratko A must tell V the polynomial z(x) : s < z(x), F (X) > + < F (X), R(X) >= 0, A must tell V the polynomial y(x) : s < y(x), F (X) > + < F (X), R(X)A(X) >= To answer the first question, A uses the knowledge of the random polynomial r(x) and forms the polynomial z(x) = r(x); to answer the second question, A uses the knowledge of the secret polynomial a(x) and calculates the polynomial y(x) = r(x)a(x) mod Eis(X). 5. V makes sure that the answer of A is correct: for the answer to the first question, s < z(x), F (X) > + < F (X), R(X) > = s < r(x), F (X) > +s < F (X), r(x) >= 0 for the answer to the second question, s < y(x), F (X) > + < F (X), R(X)A(X) > = s < r(x)a(x), F (X) > +s < F (X), r(x)a(x) >= 0. The steps listed above are performed until the verifier makes sure that Alice knows the secret polynomial a(x). All properties of the protocol correspond completely to the classical protocol of authentication without disclosure. Acknowledgements. The work has been supported by the Russian Foundation for Basic Research (grant no ) and by the Russian Federation Government (grant no.14.z ) References [1] I.B. Fesenko and S.V. Vostokov, Local Fields and Their Extensions, The 2nd Edition, American Math Society, Translations of Math Monographs Vol. 121, [2] A.H. Koblitz, N. Koblitz and A. Menezes, Elliptic curve cryptography: the serpentine course of a paradigm shift, Journal of Number Theory, 131 (2011), [3] S.V. Vostokov, Explicit form of the reciprocity law, Izvestiya Acad. of Science USSR, Math., 42 (1978), no. 6,

9 Application of explicit Hilbert s pairing 2213 [4] S.V. Vostokov, Hilbert symbol in a discrete valuated field, Journal of Soviet Mathematics, 19 (1982), no. 1, Received: April 29, 2016; Published: July 6, 2016

Explicit Formulas for Hilbert Pairings on Formal Groups

Explicit Formulas for Hilbert Pairings on Formal Groups CHAPTER 8 Explicit Formulas for Hilbert Pairings on Formal Groups The method of the previous chapter possesses a valuable property: it can be relatively easily applied to derive explicit formulas for various

More information

HASSE ARF PROPERTY AND ABELIAN EXTENSIONS. Ivan B. Fesenko

HASSE ARF PROPERTY AND ABELIAN EXTENSIONS. Ivan B. Fesenko Math. Nachrichten vol. 174 (1995), 81 87 HASSE ARF PROPERTY AND ABELIAN EXTENSIONS Ivan B. Fesenko Let F be a complete (or Henselian) discrete valuation field with a perfect residue field of characteristic

More information

Some algebraic number theory and the reciprocity map

Some algebraic number theory and the reciprocity map Some algebraic number theory and the reciprocity map Ervin Thiagalingam September 28, 2015 Motivation In Weinstein s paper, the main problem is to find a rule (reciprocity law) for when an irreducible

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 2: Mathematical Concepts Divisibility Congruence Quadratic Residues

More information

p-class Groups of Cyclic Number Fields of Odd Prime Degree

p-class Groups of Cyclic Number Fields of Odd Prime Degree International Journal of Algebra, Vol. 10, 2016, no. 9, 429-435 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2016.6753 p-class Groups of Cyclic Number Fields of Odd Prime Degree Jose Valter

More information

FIELD THEORY. Contents

FIELD THEORY. Contents FIELD THEORY MATH 552 Contents 1. Algebraic Extensions 1 1.1. Finite and Algebraic Extensions 1 1.2. Algebraic Closure 5 1.3. Splitting Fields 7 1.4. Separable Extensions 8 1.5. Inseparable Extensions

More information

Classification of Finite Fields

Classification of Finite Fields Classification of Finite Fields In these notes we use the properties of the polynomial x pd x to classify finite fields. The importance of this polynomial is explained by the following basic proposition.

More information

Section V.7. Cyclic Extensions

Section V.7. Cyclic Extensions V.7. Cyclic Extensions 1 Section V.7. Cyclic Extensions Note. In the last three sections of this chapter we consider specific types of Galois groups of Galois extensions and then study the properties of

More information

Finite Fields. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay

Finite Fields. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay 1 / 25 Finite Fields Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay September 25, 2014 2 / 25 Fields Definition A set F together

More information

A Remark on Certain Filtrations on the Inner Automorphism Groups of Central Division Algebras over Local Number Fields

A Remark on Certain Filtrations on the Inner Automorphism Groups of Central Division Algebras over Local Number Fields International Journal of lgebra, Vol. 10, 2016, no. 2, 71-79 HIKRI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2016.612 Remark on Certain Filtrations on the Inner utomorphism Groups of Central

More information

Skew Cyclic and Quasi-Cyclic Codes of Arbitrary Length over Galois Rings

Skew Cyclic and Quasi-Cyclic Codes of Arbitrary Length over Galois Rings International Journal of Algebra, Vol. 7, 2013, no. 17, 803-807 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2013.310100 Skew Cyclic and Quasi-Cyclic Codes of Arbitrary Length over Galois

More information

Field Theory Qual Review

Field Theory Qual Review Field Theory Qual Review Robert Won Prof. Rogalski 1 (Some) qual problems ˆ (Fall 2007, 5) Let F be a field of characteristic p and f F [x] a polynomial f(x) = i f ix i. Give necessary and sufficient conditions

More information

On Permutation Polynomials over Local Finite Commutative Rings

On Permutation Polynomials over Local Finite Commutative Rings International Journal of Algebra, Vol. 12, 2018, no. 7, 285-295 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ija.2018.8935 On Permutation Polynomials over Local Finite Commutative Rings Javier

More information

Quasi-reducible Polynomials

Quasi-reducible Polynomials Quasi-reducible Polynomials Jacques Willekens 06-Dec-2008 Abstract In this article, we investigate polynomials that are irreducible over Q, but are reducible modulo any prime number. 1 Introduction Let

More information

p-adic fields Chapter 7

p-adic fields Chapter 7 Chapter 7 p-adic fields In this chapter, we study completions of number fields, and their ramification (in particular in the Galois case). We then look at extensions of the p-adic numbers Q p and classify

More information

Practice problems for first midterm, Spring 98

Practice problems for first midterm, Spring 98 Practice problems for first midterm, Spring 98 midterm to be held Wednesday, February 25, 1998, in class Dave Bayer, Modern Algebra All rings are assumed to be commutative with identity, as in our text.

More information

An introduction to the algorithmic of p-adic numbers

An introduction to the algorithmic of p-adic numbers An introduction to the algorithmic of p-adic numbers David Lubicz 1 1 Universté de Rennes 1, Campus de Beaulieu, 35042 Rennes Cedex, France Outline Introduction 1 Introduction 2 3 4 5 6 7 8 When do we

More information

On the image of noncommutative local reciprocity map

On the image of noncommutative local reciprocity map On the image of noncommutative local reciprocity map Ivan Fesenko 0. Introduction First steps in the direction of an arithmetic noncommutative local class field theory were described in [] as an attempt

More information

ALGEBRA PH.D. QUALIFYING EXAM September 27, 2008

ALGEBRA PH.D. QUALIFYING EXAM September 27, 2008 ALGEBRA PH.D. QUALIFYING EXAM September 27, 2008 A passing paper consists of four problems solved completely plus significant progress on two other problems; moreover, the set of problems solved completely

More information

Section VI.33. Finite Fields

Section VI.33. Finite Fields VI.33 Finite Fields 1 Section VI.33. Finite Fields Note. In this section, finite fields are completely classified. For every prime p and n N, there is exactly one (up to isomorphism) field of order p n,

More information

Elliptic curves: Theory and Applications. Day 4: The discrete logarithm problem.

Elliptic curves: Theory and Applications. Day 4: The discrete logarithm problem. Elliptic curves: Theory and Applications. Day 4: The discrete logarithm problem. Elisa Lorenzo García Université de Rennes 1 14-09-2017 Elisa Lorenzo García (Rennes 1) Elliptic Curves 4 14-09-2017 1 /

More information

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups

More information

Galois theory (Part II)( ) Example Sheet 1

Galois theory (Part II)( ) Example Sheet 1 Galois theory (Part II)(2015 2016) Example Sheet 1 c.birkar@dpmms.cam.ac.uk (1) Find the minimal polynomial of 2 + 3 over Q. (2) Let K L be a finite field extension such that [L : K] is prime. Show that

More information

Math 121 Homework 6 Solutions

Math 121 Homework 6 Solutions Math 11 Homework 6 Solutions Problem 14. # 17. Let K/F be any finite extension and let α K. Let L be a Galois extension of F containing K and let H Gal(L/F ) be the subgroup corresponding to K. Define

More information

Extensions of Discrete Valuation Fields

Extensions of Discrete Valuation Fields CHAPTER 2 Extensions of Discrete Valuation Fields This chapter studies discrete valuation fields in relation to each other. The first section introduces the class of Henselian fields which are quite similar

More information

SM9 identity-based cryptographic algorithms Part 1: General

SM9 identity-based cryptographic algorithms Part 1: General SM9 identity-based cryptographic algorithms Part 1: General Contents 1 Scope... 1 2 Terms and definitions... 1 2.1 identity... 1 2.2 master key... 1 2.3 key generation center (KGC)... 1 3 Symbols and abbreviations...

More information

CONSTRUCTING SUPERSINGULAR ELLIPTIC CURVES. Reinier Bröker

CONSTRUCTING SUPERSINGULAR ELLIPTIC CURVES. Reinier Bröker CONSTRUCTING SUPERSINGULAR ELLIPTIC CURVES Reinier Bröker Abstract. We give an algorithm that constructs, on input of a prime power q and an integer t, a supersingular elliptic curve over F q with trace

More information

FIXED-POINT FREE ENDOMORPHISMS OF GROUPS RELATED TO FINITE FIELDS

FIXED-POINT FREE ENDOMORPHISMS OF GROUPS RELATED TO FINITE FIELDS FIXED-POINT FREE ENDOMORPHISMS OF GROUPS RELATED TO FINITE FIELDS LINDSAY N. CHILDS Abstract. Let G = F q β be the semidirect product of the additive group of the field of q = p n elements and the cyclic

More information

arxiv: v1 [math.nt] 2 Jul 2009

arxiv: v1 [math.nt] 2 Jul 2009 About certain prime numbers Diana Savin Ovidius University, Constanţa, Romania arxiv:0907.0315v1 [math.nt] 2 Jul 2009 ABSTRACT We give a necessary condition for the existence of solutions of the Diophantine

More information

A BRIEF INTRODUCTION TO LOCAL FIELDS

A BRIEF INTRODUCTION TO LOCAL FIELDS A BRIEF INTRODUCTION TO LOCAL FIELDS TOM WESTON The purpose of these notes is to give a survey of the basic Galois theory of local fields and number fields. We cover much of the same material as [2, Chapters

More information

Homework 8 Solutions to Selected Problems

Homework 8 Solutions to Selected Problems Homework 8 Solutions to Selected Problems June 7, 01 1 Chapter 17, Problem Let f(x D[x] and suppose f(x is reducible in D[x]. That is, there exist polynomials g(x and h(x in D[x] such that g(x and h(x

More information

Elliptic curve cryptography. Matthew England MSc Applied Mathematical Sciences Heriot-Watt University

Elliptic curve cryptography. Matthew England MSc Applied Mathematical Sciences Heriot-Watt University Elliptic curve cryptography Matthew England MSc Applied Mathematical Sciences Heriot-Watt University Summer 2006 Abstract This project studies the mathematics of elliptic curves, starting with their derivation

More information

Number Theory in Cryptology

Number Theory in Cryptology Number Theory in Cryptology Abhijit Das Department of Computer Science and Engineering Indian Institute of Technology Kharagpur October 15, 2011 What is Number Theory? Theory of natural numbers N = {1,

More information

Section IV.23. Factorizations of Polynomials over a Field

Section IV.23. Factorizations of Polynomials over a Field IV.23 Factorizations of Polynomials 1 Section IV.23. Factorizations of Polynomials over a Field Note. Our experience with classical algebra tells us that finding the zeros of a polynomial is equivalent

More information

Local Class Field Theory I

Local Class Field Theory I CHAPTER 4 Local Class Field Theory I In this chapter we develop the theory of abelian extensions of a local field with finite residue field. The main theorem establishes a correspondence between abelian

More information

Definition of a finite group

Definition of a finite group Elliptic curves Definition of a finite group (G, * ) is a finite group if: 1. G is a finite set. 2. For each a and b in G, also a * b is in G. 3. There is an e in G such that for all a in G, a * e= e *

More information

School of Mathematics and Statistics. MT5836 Galois Theory. Handout 0: Course Information

School of Mathematics and Statistics. MT5836 Galois Theory. Handout 0: Course Information MRQ 2017 School of Mathematics and Statistics MT5836 Galois Theory Handout 0: Course Information Lecturer: Martyn Quick, Room 326. Prerequisite: MT3505 (or MT4517) Rings & Fields Lectures: Tutorials: Mon

More information

Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs

Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Jonah Brown-Cohen 1 Introduction The Diffie-Hellman protocol was one of the first methods discovered for two people, say Alice

More information

Section 33 Finite fields

Section 33 Finite fields Section 33 Finite fields Instructor: Yifan Yang Spring 2007 Review Corollary (23.6) Let G be a finite subgroup of the multiplicative group of nonzero elements in a field F, then G is cyclic. Theorem (27.19)

More information

DONG QUAN NGOC NGUYEN

DONG QUAN NGOC NGUYEN REPRESENTATION OF UNITS IN CYCLOTOMIC FUNCTION FIELDS DONG QUAN NGOC NGUYEN Contents 1 Introduction 1 2 Some basic notions 3 21 The Galois group Gal(K /k) 3 22 Representation of integers in O, and the

More information

Math 121 Homework 2 Solutions

Math 121 Homework 2 Solutions Math 121 Homework 2 Solutions Problem 13.2 #16. Let K/F be an algebraic extension and let R be a ring contained in K that contains F. Prove that R is a subfield of K containing F. We will give two proofs.

More information

Contradiction. Theorem 1.9. (Artin) Let G be a finite group of automorphisms of E and F = E G the fixed field of G. Then [E : F ] G.

Contradiction. Theorem 1.9. (Artin) Let G be a finite group of automorphisms of E and F = E G the fixed field of G. Then [E : F ] G. 1. Galois Theory 1.1. A homomorphism of fields F F is simply a homomorphism of rings. Such a homomorphism is always injective, because its kernel is a proper ideal (it doesnt contain 1), which must therefore

More information

Selected exercises from Abstract Algebra by Dummit and Foote (3rd edition).

Selected exercises from Abstract Algebra by Dummit and Foote (3rd edition). Selected exercises from Abstract Algebra by Dummit and Foote (3rd edition). Bryan Félix Abril 12, 2017 Section 14.2 Exercise 3. Determine the Galois group of (x 2 2)(x 2 3)(x 2 5). Determine all the subfields

More information

MATH 431 PART 2: POLYNOMIAL RINGS AND FACTORIZATION

MATH 431 PART 2: POLYNOMIAL RINGS AND FACTORIZATION MATH 431 PART 2: POLYNOMIAL RINGS AND FACTORIZATION 1. Polynomial rings (review) Definition 1. A polynomial f(x) with coefficients in a ring R is n f(x) = a i x i = a 0 + a 1 x + a 2 x 2 + + a n x n i=0

More information

Constructing Families of Pairing-Friendly Elliptic Curves

Constructing Families of Pairing-Friendly Elliptic Curves Constructing Families of Pairing-Friendly Elliptic Curves David Freeman Information Theory Research HP Laboratories Palo Alto HPL-2005-155 August 24, 2005* cryptography, pairings, elliptic curves, embedding

More information

ϕ : Z F : ϕ(t) = t 1 =

ϕ : Z F : ϕ(t) = t 1 = 1. Finite Fields The first examples of finite fields are quotient fields of the ring of integers Z: let t > 1 and define Z /t = Z/(tZ) to be the ring of congruence classes of integers modulo t: in practical

More information

A SIMPLE PROOF OF KRONECKER-WEBER THEOREM. 1. Introduction. The main theorem that we are going to prove in this paper is the following: Q ab = Q(ζ n )

A SIMPLE PROOF OF KRONECKER-WEBER THEOREM. 1. Introduction. The main theorem that we are going to prove in this paper is the following: Q ab = Q(ζ n ) A SIMPLE PROOF OF KRONECKER-WEBER THEOREM NIZAMEDDIN H. ORDULU 1. Introduction The main theorem that we are going to prove in this paper is the following: Theorem 1.1. Kronecker-Weber Theorem Let K/Q be

More information

1 The Galois Group of a Quadratic

1 The Galois Group of a Quadratic Algebra Prelim Notes The Galois Group of a Polynomial Jason B. Hill University of Colorado at Boulder Throughout this set of notes, K will be the desired base field (usually Q or a finite field) and F

More information

Elliptic Curves I. The first three sections introduce and explain the properties of elliptic curves.

Elliptic Curves I. The first three sections introduce and explain the properties of elliptic curves. Elliptic Curves I 1.0 Introduction The first three sections introduce and explain the properties of elliptic curves. A background understanding of abstract algebra is required, much of which can be found

More information

1. Group Theory Permutations.

1. Group Theory Permutations. 1.1. Permutations. 1. Group Theory Problem 1.1. Let G be a subgroup of S n of index 2. Show that G = A n. Problem 1.2. Find two elements of S 7 that have the same order but are not conjugate. Let π S 7

More information

Abstract Algebra: Chapters 16 and 17

Abstract Algebra: Chapters 16 and 17 Study polynomials, their factorization, and the construction of fields. Chapter 16 Polynomial Rings Notation Let R be a commutative ring. The ring of polynomials over R in the indeterminate x is the set

More information

Speeding up the Scalar Multiplication on Binary Huff Curves Using the Frobenius Map

Speeding up the Scalar Multiplication on Binary Huff Curves Using the Frobenius Map International Journal of Algebra, Vol. 8, 2014, no. 1, 9-16 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2014.311117 Speeding up the Scalar Multiplication on Binary Huff Curves Using the

More information

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups

More information

14 Ordinary and supersingular elliptic curves

14 Ordinary and supersingular elliptic curves 18.783 Elliptic Curves Spring 2015 Lecture #14 03/31/2015 14 Ordinary and supersingular elliptic curves Let E/k be an elliptic curve over a field of positive characteristic p. In Lecture 7 we proved that

More information

Factorization in Integral Domains II

Factorization in Integral Domains II Factorization in Integral Domains II 1 Statement of the main theorem Throughout these notes, unless otherwise specified, R is a UFD with field of quotients F. The main examples will be R = Z, F = Q, and

More information

Algebra Qualifying Exam August 2001 Do all 5 problems. 1. Let G be afinite group of order 504 = 23 32 7. a. Show that G cannot be isomorphic to a subgroup of the alternating group Alt 7. (5 points) b.

More information

Math 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille

Math 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille Math 429/581 (Advanced) Group Theory Summary of Definitions, Examples, and Theorems by Stefan Gille 1 2 0. Group Operations 0.1. Definition. Let G be a group and X a set. A (left) operation of G on X is

More information

Katherine Stange. ECC 2007, Dublin, Ireland

Katherine Stange. ECC 2007, Dublin, Ireland in in Department of Brown University http://www.math.brown.edu/~stange/ in ECC Computation of ECC 2007, Dublin, Ireland Outline in in ECC Computation of in ECC Computation of in Definition A integer sequence

More information

Algebraic Number Theory Notes: Local Fields

Algebraic Number Theory Notes: Local Fields Algebraic Number Theory Notes: Local Fields Sam Mundy These notes are meant to serve as quick introduction to local fields, in a way which does not pass through general global fields. Here all topological

More information

Constructing Pairing-Friendly Elliptic Curves for Cryptography

Constructing Pairing-Friendly Elliptic Curves for Cryptography Constructing Pairing-Friendly Elliptic Curves for Cryptography University of California, Berkeley, USA 2nd KIAS-KMS Summer Workshop on Cryptography Seoul, Korea 30 June 2007 Outline 1 Pairings in Cryptography

More information

On a Diophantine Equation 1

On a Diophantine Equation 1 International Journal of Contemporary Mathematical Sciences Vol. 12, 2017, no. 2, 73-81 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ijcms.2017.728 On a Diophantine Equation 1 Xin Zhang Department

More information

Chapter 4 Finite Fields

Chapter 4 Finite Fields Chapter 4 Finite Fields Introduction will now introduce finite fields of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public Key concern operations on numbers what constitutes a number

More information

Name: Solutions Final Exam

Name: Solutions Final Exam Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Put your name on each page of your paper. 1. [10 Points] For

More information

Information Theory. Lecture 7

Information Theory. Lecture 7 Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible

More information

Math/Mthe 418/818. Review Questions

Math/Mthe 418/818. Review Questions Math/Mthe 418/818 Review Questions 1. Show that the number N of bit operations required to compute the product mn of two integers m, n > 1 satisfies N = O(log(m) log(n)). 2. Can φ(n) be computed in polynomial

More information

Introduction to Elliptic Curve Cryptography. Anupam Datta

Introduction to Elliptic Curve Cryptography. Anupam Datta Introduction to Elliptic Curve Cryptography Anupam Datta 18-733 Elliptic Curve Cryptography Public Key Cryptosystem Duality between Elliptic Curve Cryptography and Discrete Log Based Cryptography Groups

More information

Constructing Abelian Varieties for Pairing-Based Cryptography

Constructing Abelian Varieties for Pairing-Based Cryptography for Pairing-Based CWI and Universiteit Leiden, Netherlands Workshop on Pairings in Arithmetic Geometry and 4 May 2009 s MNT MNT Type s What is pairing-based cryptography? Pairing-based cryptography refers

More information

1 Rings 1 RINGS 1. Theorem 1.1 (Substitution Principle). Let ϕ : R R be a ring homomorphism

1 Rings 1 RINGS 1. Theorem 1.1 (Substitution Principle). Let ϕ : R R be a ring homomorphism 1 RINGS 1 1 Rings Theorem 1.1 (Substitution Principle). Let ϕ : R R be a ring homomorphism (a) Given an element α R there is a unique homomorphism Φ : R[x] R which agrees with the map ϕ on constant polynomials

More information

Ramification Theory. 3.1 Discriminant. Chapter 3

Ramification Theory. 3.1 Discriminant. Chapter 3 Chapter 3 Ramification Theory This chapter introduces ramification theory, which roughly speaking asks the following question: if one takes a prime (ideal) p in the ring of integers O K of a number field

More information

MATH 3030, Abstract Algebra Winter 2012 Toby Kenney Sample Midterm Examination Model Solutions

MATH 3030, Abstract Algebra Winter 2012 Toby Kenney Sample Midterm Examination Model Solutions MATH 3030, Abstract Algebra Winter 2012 Toby Kenney Sample Midterm Examination Model Solutions Basic Questions 1. Give an example of a prime ideal which is not maximal. In the ring Z Z, the ideal {(0,

More information

One can use elliptic curves to factor integers, although probably not RSA moduli.

One can use elliptic curves to factor integers, although probably not RSA moduli. Elliptic Curves Elliptic curves are groups created by defining a binary operation (addition) on the points of the graph of certain polynomial equations in two variables. These groups have several properties

More information

Applications of Complex Multiplication of Elliptic Curves

Applications of Complex Multiplication of Elliptic Curves Applications of Complex Multiplication of Elliptic Curves MASTER THESIS Candidate: Massimo CHENAL Supervisor: Prof. Jean-Marc COUVEIGNES UNIVERSITÀ DEGLI STUDI DI PADOVA UNIVERSITÉ BORDEAUX 1 Facoltà di

More information

Math 4320 Final Exam

Math 4320 Final Exam Math 4320 Final Exam 2:00pm 4:30pm, Friday 18th May 2012 Symmetry, as wide or as narrow as you may define its meaning, is one idea by which man through the ages has tried to comprehend and create order,

More information

Section V.8. Cyclotomic Extensions

Section V.8. Cyclotomic Extensions V.8. Cyclotomic Extensions 1 Section V.8. Cyclotomic Extensions Note. In this section we explore splitting fields of x n 1. The splitting fields turn out to be abelian extensions (that is, algebraic Galois

More information

Non-generic attacks on elliptic curve DLPs

Non-generic attacks on elliptic curve DLPs Non-generic attacks on elliptic curve DLPs Benjamin Smith Team GRACE INRIA Saclay Île-de-France Laboratoire d Informatique de l École polytechnique (LIX) ECC Summer School Leuven, September 13 2013 Smith

More information

FORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS

FORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS Sairaiji, F. Osaka J. Math. 39 (00), 3 43 FORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS FUMIO SAIRAIJI (Received March 4, 000) 1. Introduction Let be an elliptic curve over Q. We denote by ˆ

More information

Curves, Cryptography, and Primes of the Form x 2 + y 2 D

Curves, Cryptography, and Primes of the Form x 2 + y 2 D Curves, Cryptography, and Primes of the Form x + y D Juliana V. Belding Abstract An ongoing challenge in cryptography is to find groups in which the discrete log problem hard, or computationally infeasible.

More information

A brief overwiev of pairings

A brief overwiev of pairings Bordeaux November 22, 2016 A brief overwiev of pairings Razvan Barbulescu CNRS and IMJ-PRG R. Barbulescu Overview pairings 0 / 37 Plan of the lecture Pairings Pairing-friendly curves Progress of NFS attacks

More information

Constructing genus 2 curves over finite fields

Constructing genus 2 curves over finite fields Constructing genus 2 curves over finite fields Kirsten Eisenträger The Pennsylvania State University Fq12, Saratoga Springs July 15, 2015 1 / 34 Curves and cryptography RSA: most widely used public key

More information

Primes of the Form x 2 + ny 2

Primes of the Form x 2 + ny 2 Primes of the Form x 2 + ny 2 Steven Charlton 28 November 2012 Outline 1 Motivating Examples 2 Quadratic Forms 3 Class Field Theory 4 Hilbert Class Field 5 Narrow Class Field 6 Cubic Forms 7 Modular Forms

More information

TC10 / 3. Finite fields S. Xambó

TC10 / 3. Finite fields S. Xambó TC10 / 3. Finite fields S. Xambó The ring Construction of finite fields The Frobenius automorphism Splitting field of a polynomial Structure of the multiplicative group of a finite field Structure of the

More information

Finite Fields. [Parts from Chapter 16. Also applications of FTGT]

Finite Fields. [Parts from Chapter 16. Also applications of FTGT] Finite Fields [Parts from Chapter 16. Also applications of FTGT] Lemma [Ch 16, 4.6] Assume F is a finite field. Then the multiplicative group F := F \ {0} is cyclic. Proof Recall from basic group theory

More information

Math 201C Homework. Edward Burkard. g 1 (u) v + f 2(u) g 2 (u) v2 + + f n(u) a 2,k u k v a 1,k u k v + k=0. k=0 d

Math 201C Homework. Edward Burkard. g 1 (u) v + f 2(u) g 2 (u) v2 + + f n(u) a 2,k u k v a 1,k u k v + k=0. k=0 d Math 201C Homework Edward Burkard 5.1. Field Extensions. 5. Fields and Galois Theory Exercise 5.1.7. If v is algebraic over K(u) for some u F and v is transcendental over K, then u is algebraic over K(v).

More information

Polynomials with nontrivial relations between their roots

Polynomials with nontrivial relations between their roots ACTA ARITHMETICA LXXXII.3 (1997) Polynomials with nontrivial relations between their roots by John D. Dixon (Ottawa, Ont.) 1. Introduction. Consider an irreducible polynomial f(x) over a field K. We are

More information

LECTURE 2. Hilbert Symbols

LECTURE 2. Hilbert Symbols LECTURE 2 Hilbert Symbols Let be a local field over Q p (though any local field suffices) with char() 2. Note that this includes fields over Q 2, since it is the characteristic of the field, and not the

More information

Explicit Methods in Algebraic Number Theory

Explicit Methods in Algebraic Number Theory Explicit Methods in Algebraic Number Theory Amalia Pizarro Madariaga Instituto de Matemáticas Universidad de Valparaíso, Chile amaliapizarro@uvcl 1 Lecture 1 11 Number fields and ring of integers Algebraic

More information

On The Weights of Binary Irreducible Cyclic Codes

On The Weights of Binary Irreducible Cyclic Codes On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:

More information

9. Finite fields. 1. Uniqueness

9. Finite fields. 1. Uniqueness 9. Finite fields 9.1 Uniqueness 9.2 Frobenius automorphisms 9.3 Counting irreducibles 1. Uniqueness Among other things, the following result justifies speaking of the field with p n elements (for prime

More information

Field Theory Problems

Field Theory Problems Field Theory Problems I. Degrees, etc. 1. Answer the following: (a Find u R such that Q(u = Q( 2, 3 5. (b Describe how you would find all w Q( 2, 3 5 such that Q(w = Q( 2, 3 5. 2. If a, b K are algebraic

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer 1 Lecture 13 October 16, 2017 (notes revised 10/23/17) 1 Derived from lecture notes by Ewa Syta. CPSC 467, Lecture 13 1/57 Elliptic Curves

More information

Algorithms for ray class groups and Hilbert class fields

Algorithms for ray class groups and Hilbert class fields (Quantum) Algorithms for ray class groups and Hilbert class fields Sean Hallgren joint with Kirsten Eisentraeger Penn State 1 Quantum Algorithms Quantum algorithms for number theoretic problems: Factoring

More information

= 1 2x. x 2 a ) 0 (mod p n ), (x 2 + 2a + a2. x a ) 2

= 1 2x. x 2 a ) 0 (mod p n ), (x 2 + 2a + a2. x a ) 2 8. p-adic numbers 8.1. Motivation: Solving x 2 a (mod p n ). Take an odd prime p, and ( an) integer a coprime to p. Then, as we know, x 2 a (mod p) has a solution x Z iff = 1. In this case we can suppose

More information

x mv = 1, v v M K IxI v = 1,

x mv = 1, v v M K IxI v = 1, 18.785 Number Theory I Fall 2017 Problem Set #7 Description These problems are related to the material covered in Lectures 13 15. Your solutions are to be written up in latex (you can use the latex source

More information

On attaching coordinates of Gaussian prime torsion points of y 2 = x 3 + x to Q(i)

On attaching coordinates of Gaussian prime torsion points of y 2 = x 3 + x to Q(i) On attaching coordinates of Gaussian prime torsion points of y 2 = x 3 + x to Q(i) Gordan Savin and David Quarfoot March 29, 2010 1 Background One of the natural questions that arises in the study of abstract

More information

CONSTRUCTION OF THE HILBERT CLASS FIELD OF SOME IMAGINARY QUADRATIC FIELDS. Jangheon Oh

CONSTRUCTION OF THE HILBERT CLASS FIELD OF SOME IMAGINARY QUADRATIC FIELDS. Jangheon Oh Korean J. Math. 26 (2018), No. 2, pp. 293 297 https://doi.org/10.11568/kjm.2018.26.2.293 CONSTRUCTION OF THE HILBERT CLASS FIELD OF SOME IMAGINARY QUADRATIC FIELDS Jangheon Oh Abstract. In the paper [4],

More information

CHARACTERIZING INTEGERS AMONG RATIONAL NUMBERS WITH A UNIVERSAL-EXISTENTIAL FORMULA

CHARACTERIZING INTEGERS AMONG RATIONAL NUMBERS WITH A UNIVERSAL-EXISTENTIAL FORMULA CHARACTERIZING INTEGERS AMONG RATIONAL NUMBERS WITH A UNIVERSAL-EXISTENTIAL FORMULA BJORN POONEN Abstract. We prove that Z in definable in Q by a formula with 2 universal quantifiers followed by 7 existential

More information

RINGS: SUMMARY OF MATERIAL

RINGS: SUMMARY OF MATERIAL RINGS: SUMMARY OF MATERIAL BRIAN OSSERMAN This is a summary of terms used and main results proved in the subject of rings, from Chapters 11-13 of Artin. Definitions not included here may be considered

More information

Homework 4 Solutions

Homework 4 Solutions Homework 4 Solutions November 11, 2016 You were asked to do problems 3,4,7,9,10 in Chapter 7 of Lang. Problem 3. Let A be an integral domain, integrally closed in its field of fractions K. Let L be a finite

More information

but no smaller power is equal to one. polynomial is defined to be

but no smaller power is equal to one. polynomial is defined to be 13. Radical and Cyclic Extensions The main purpose of this section is to look at the Galois groups of x n a. The first case to consider is a = 1. Definition 13.1. Let K be a field. An element ω K is said

More information

18. Cyclotomic polynomials II

18. Cyclotomic polynomials II 18. Cyclotomic polynomials II 18.1 Cyclotomic polynomials over Z 18.2 Worked examples Now that we have Gauss lemma in hand we can look at cyclotomic polynomials again, not as polynomials with coefficients

More information