Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory.

Similar documents
Chapter 8. Introduction to Number Theory

CSC 474 Information Systems Security

Numbers. Çetin Kaya Koç Winter / 18

CIS 6930/4930 Computer and Network Security. Topic 5.1 Basic Number Theory -- Foundation of Public Key Cryptography

Number Theory. Modular Arithmetic

Outline. Some Review: Divisors. Common Divisors. Primes and Factors. b divides a (or b is a divisor of a) if a = mb for some m

Outline. AIT 682: Network and Systems Security. GCD and Euclid s Algorithm Modulo Arithmetic Modular Exponentiation Discrete Logarithms

CSC 474 Network Security. Outline. GCD and Euclid s Algorithm. GCD and Euclid s Algorithm Modulo Arithmetic Modular Exponentiation Discrete Logarithms

2.3 In modular arithmetic, all arithmetic operations are performed modulo some integer.

Number Theory and Group Theoryfor Public-Key Cryptography

CPSC 467: Cryptography and Computer Security

Number Theory A focused introduction

Lecture 14: Hardness Assumptions

Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations

3 The fundamentals: Algorithms, the integers, and matrices

Basic elements of number theory

Basic elements of number theory

Public Key Cryptography

CPSC 467b: Cryptography and Computer Security

Congruence Classes. Number Theory Essentials. Modular Arithmetic Systems

4 Number Theory and Cryptography

Applied Cryptography and Computer Security CSE 664 Spring 2018

NUMBER THEORY. Anwitaman DATTA SCSE, NTU Singapore CX4024. CRYPTOGRAPHY & NETWORK SECURITY 2018, Anwitaman DATTA

[Part 2] Asymmetric-Key Encipherment. Chapter 9. Mathematics of Cryptography. Objectives. Contents. Objectives

CIS 551 / TCOM 401 Computer and Network Security

10 Problem 1. The following assertions may be true or false, depending on the choice of the integers a, b 0. a "

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald)

Introduction to Public-Key Cryptosystems:

Chapter 9 Basic Number Theory for Public Key Cryptography. WANG YANG

cse 311: foundations of computing Fall 2015 Lecture 12: Primes, GCD, applications

Encryption: The RSA Public Key Cipher

Lecture 3.1: Public Key Cryptography I

Integers and Division

cse 311: foundations of computing Spring 2015 Lecture 12: Primes, GCD, applications

Topics in Cryptography. Lecture 5: Basic Number Theory

Public Key Encryption

Elementary Number Theory Review. Franz Luef

NUMBER THEORY AND CODES. Álvaro Pelayo WUSTL

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

Introduction to Cryptography. Lecture 6

Theory of Numbers Problems

The security of RSA (part 1) The security of RSA (part 1)

Q 2.0.2: If it s 5:30pm now, what time will it be in 4753 hours? Q 2.0.3: Today is Wednesday. What day of the week will it be in one year from today?

Number Theory. Raj Jain. Washington University in St. Louis

Introduction to Cybersecurity Cryptography (Part 5)

Mathematics for Cryptography

CPSC 467b: Cryptography and Computer Security

This is a recursive algorithm. The procedure is guaranteed to terminate, since the second argument decreases each time.

MATH 4400 SOLUTIONS TO SOME EXERCISES. 1. Chapter 1

Discrete mathematics I - Number theory

Senior Math Circles Cryptography and Number Theory Week 2

Mathematical Foundations of Public-Key Cryptography

Homework #2 solutions Due: June 15, 2012

Exercises Exercises. 2. Determine whether each of these integers is prime. a) 21. b) 29. c) 71. d) 97. e) 111. f) 143. a) 19. b) 27. c) 93.

Chapter 8 Public-key Cryptography and Digital Signatures

Math 324, Fall 2011 Assignment 7 Solutions. 1 (ab) γ = a γ b γ mod n.

PREPARATION NOTES FOR NUMBER THEORY PRACTICE WED. OCT. 3,2012

a the relation arb is defined if and only if = 2 k, k

Applied Cryptography and Computer Security CSE 664 Spring 2017

THE CUBIC PUBLIC-KEY TRANSFORMATION*

Lecture 4: Number theory

10 Public Key Cryptography : RSA

MATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences.

CS 5319 Advanced Discrete Structure. Lecture 9: Introduction to Number Theory II

Mathematics of Cryptography

Number Theory Notes Spring 2011

COMP239: Mathematics for Computer Science II. Prof. Chadi Assi EV7.635

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

CS483 Design and Analysis of Algorithms

Cryptography IV: Asymmetric Ciphers

Introduction to Information Security

Number Theory & Modern Cryptography

Finite Fields. Mike Reiter

basics of security/cryptography

An integer p is prime if p > 1 and p has exactly two positive divisors, 1 and p.

Discrete Mathematics GCD, LCM, RSA Algorithm

CSc 466/566. Computer Security. 5 : Cryptography Basics

Iterated Encryption and Wiener s attack on RSA

MATH 361: NUMBER THEORY FOURTH LECTURE

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2

A Guide to Arithmetic

COMS W4995 Introduction to Cryptography September 29, Lecture 8: Number Theory

Chuck Garner, Ph.D. May 25, 2009 / Georgia ARML Practice

CSC 5930/9010 Modern Cryptography: Number Theory

Asymmetric Cryptography

Chapter 4 Asymmetric Cryptography

Factoring Algorithms Pollard s p 1 Method. This method discovers a prime factor p of an integer n whenever p 1 has only small prime factors.

A. Algebra and Number Theory

INTEGERS. In this section we aim to show the following: Goal. Every natural number can be written uniquely as a product of primes.

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

CS March 17, 2009

Number Theory and Algebra: A Brief Introduction

2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer?

Public-key Cryptography: Theory and Practice

Basic Algorithms in Number Theory

Public Key Algorithms

Overview. Background / Context. CSC 580 Cryptography and Computer Security. March 21, 2017

ECE596C: Handout #11

Elementary Number Theory MARUCO. Summer, 2018

Transcription:

CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L06, Steve/Courses/2011/S2/CSS322/Lectures/number.tex, r2070

Contents Divisibility and Prime Numbers

Divisibility b divides a if a = mb for some m, where a, b and m are integers b a b is a divisor of a gcd(a, b): greatest common divisor of a and b Euclidean algorithm can find gcd Two integers, a and b, are relatively prime if gcd(a, b) = 1

Prime Numbers An integer p > 1 is a prime number if and only if its only divisors are ±1 and ±p Any integer a > 1 can be factored as: a = p a 1 2 pa 2 2 pat t where p 1 < p 2 <... < p t are prime numbers and where each a i is a positive integer

Under 2000

Contents Divisibility and Prime Numbers

If a is an integer and n is a positive integer, we define a mod n to be the remainder when a is divided by n n is called the modulus Two integers a and b are congruent modulo n if (a mod n) = (b mod n), which is written as a b (mod n) (mod n) operator maps all integers into the set of integers Z n = {0, 1,..., (n 1)} arithmetic performs arithmetic operations within confines of set Z n

Properties of Rules of ordinary arithmetic involving addition, subtraction, and multiplication also apply in modular arithmetic [(a mod n) + (b mod n)] mod n = (a + b) mod n [(a mod n) (b mod n)] mod n = (a b) mod n [(a mod n) (b mod n)] mod n = (a b) mod n

Division in a is additive inverse of b if a + b 0 (mod n) All integers have an additive inverse a is multiplicative inverse of b if a b 1 (mod n) Not all integers have a multiplicative inverse a has a multiplicative inverse in (mod n) if a is relatively prime to n Division: a b a MultInverse(b) (mod n)

Fermat s Theorem Fermat s Theorem (1): if p is prime and a is a positive integer not divisible by p, then a p 1 1 (mod p) Fermat s Theorem (2): if p is prime and a is a positive integer, then a p a (mod p)

Euler s Theorem Euler s Totient Function, φ(n): the number of positive integers less than n and relatively prime to n φ(1) = 1 For prime p, φ(p) = p 1 For primes p and q, and n = pq, φ(n) = (p 1) (q 1) Euler s Theorem (1): For every a and n that are relatively prime: a φ(n) 1 (mod n) Euler s Theorem (2): For positive integers a and n: a φ(n)+1 a (mod n)

Logarithms in Exponentiation (mod n): repeated multiplication Logarithms in ordinary arithmetic: b = a i i = log a (b) Logarithms in modular arithmetic (discrete logarithm): b = a i (mod p) i = dlog a,p (b) A unique exponent i can be found if a is a primitive root of prime p If a is a primitive root of p then a, a 2, a 3,..., a p 1 are distinct (modp) Only integers with primitive roots: 2, 4, p α, 2p α where p is any odd prime and alpha is positive integer

Powers of Integers, Modulo 19

Discrete Logarithms, Modulo 19

Complexity Certain problems are computationally hard... Integer Factorization If p and q are unknown primes, given n = pq, find p and q Largest RSA number factored into two primes is 768 bits (232 decimal digits) Euler s Totient Given composite n, find φ(n) Harder than integer factorization Discrete Logarithms Given b, a and p, find i such that i = dlog a,p (b) Comparable to integer factorization