Math 412: Number Theory Lecture 13 Applications of

Similar documents
Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

10 Modular Arithmetic and Cryptography

Ma/CS 6a Class 3: The RSA Algorithm

NUMBER THEORY AND CODES. Álvaro Pelayo WUSTL

Public Key Cryptography

Cryptography. P. Danziger. Transmit...Bob...

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013

Powers in Modular Arithmetic, and RSA Public Key Cryptography

RSA. Ramki Thurimella

during transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

University of Tokyo: Advanced Algorithms Summer Lecture 6 27 May. Let s keep in mind definitions from the previous lecture:

Public Key Cryptography

MATH3302 Cryptography Problem Set 2

RSA ENCRYPTION USING THREE MERSENNE PRIMES

Cryptography. pieces from work by Gordon Royle

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups

Theory of RSA. Hiroshi Toyoizumi 1. December 8,

Discrete Mathematics GCD, LCM, RSA Algorithm

Encryption: The RSA Public Key Cipher

Introduction to Modern Cryptography. Benny Chor

Implementation Tutorial on RSA

Review. CS311H: Discrete Mathematics. Number Theory. Computing GCDs. Insight Behind Euclid s Algorithm. Using this Theorem. Euclidian Algorithm

Congruence of Integers

dit-upm RSA Cybersecurity Cryptography

NET 311D INFORMATION SECURITY

My brief introduction to cryptography

Theme : Cryptography. Instructor : Prof. C Pandu Rangan. Speaker : Arun Moorthy CS

Great Theoretical Ideas in Computer Science

Chapter 8 Public-key Cryptography and Digital Signatures

Partial Key Exposure: Generalized Framework to Attack RSA

RSA Algorithm. Factoring, EulerPhi, Breaking RSA. Çetin Kaya Koç Spring / 14

NUMBER THEORY AND CRYPTOGRAPHY

Public Key Algorithms

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1

A Knapsack Cryptosystem Secure Against Attacks Using Basis Reduction and Integer Programming

Number Theory & Modern Cryptography

Math.3336: Discrete Mathematics. Mathematical Induction

17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9.

CS March 17, 2009

Math 412: Number Theory Lecture 3: Prime Decomposition of

CS483 Design and Analysis of Algorithms

THE CUBIC PUBLIC-KEY TRANSFORMATION*

CIS 551 / TCOM 401 Computer and Network Security

The RSA cryptosystem and primality tests

Math 412: Number Theory Lecture 25 Gaussian Integers

The RSA public encryption scheme: How I learned to stop worrying and love buying stuff online

THE RSA CRYPTOSYSTEM

Introduction to Modern Cryptography. Lecture RSA Public Key CryptoSystem 2. One way Trapdoor Functions

Addition. Ch1 - Algorithms with numbers. Multiplication. al-khwārizmī. al-khwārizmī. Division 53+35=88. Cost? (n number of bits) 13x11=143. Cost?

Part IA Numbers and Sets

NUMBER THEORY AND CRYPTOGRAPHY

CRYPTOGRAPHY AND LARGE PRIMES *

LECTURE 5: APPLICATIONS TO CRYPTOGRAPHY AND COMPUTATIONS

Number Theory in Cryptography

8.1 Principles of Public-Key Cryptosystems

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

ICS141: Discrete Mathematics for Computer Science I

Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks

RSA Cryptosystem and Factorization

Number theory (Chapter 4)

Gurgen Khachatrian Martun Karapetyan

Lecture V : Public Key Cryptography

CRYPTOGRAPHY AND NUMBER THEORY

Introduction. What is RSA. A Guide To RSA by Robert Yates. Topics

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other.

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].

Ti Secured communications

and Other Fun Stuff James L. Massey

Week 7 An Application to Cryptography

Math 412: Number Theory Lecture 26 Gaussian Integers II

ECE 646 Lecture 9. RSA: Genesis, operation & security

Circuit Complexity. Circuit complexity is based on boolean circuits instead of Turing machines.

secretsaremadetobefoundoutwithtime UGETGVUCTGOCFGVQDGHQWPFQWVYKVJVKOG Breaking the Code

Cryptography. Course 1: Remainder: RSA. Jean-Sébastien Coron. September 21, Université du Luxembourg

MATHEMATICS EXTENDED ESSAY

Applications of Continued Fractions in Cryptography and Diophantine Equations

THE RSA ENCRYPTION SCHEME

basics of security/cryptography

Mathematical Foundations of Public-Key Cryptography

Number Theory. Modular Arithmetic

An Introduction to Probabilistic Encryption

CPSC 467: Cryptography and Computer Security

Jong C. Park Computer Science Division, KAIST

Public-Key Encryption: ElGamal, RSA, Rabin

Implementation of the RSA algorithm and its cryptanalysis. Abstract. Introduction

Univ.-Prof. Dr. rer. nat. Rudolf Mathar. Written Examination. Cryptography. Tuesday, August 29, 2017, 01:30 p.m.

ECE596C: Handout #11

Public-key Cryptography and elliptic curves

Algorithmic Number Theory and Public-key Cryptography

Errors, Eavesdroppers, and Enormous Matrices

CPSC 467b: Cryptography and Computer Security

Introduction to Cryptography

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Private Key Cryptography. Fermat s Little Theorem. One Time Pads. Public Key Cryptography

Discrete mathematics I - Number theory

MODIFIED RSA IN THE DOMAIN OF GAUSSIAN INTEGERS

Transcription:

Math 412: Number Theory Lecture 13 Applications of Gexin Yu gyu@wm.edu College of William and Mary

Partition of integers A partition λ of the positive integer n is a non increasing sequence of positive integers (λ 1, λ 2,..., λ r ) such that λ 1 + λ 2 +... + λ r = n. The integers λ 1, λ 2,..., λ r are called the parts of the partition λ. The number of different partitions of n is dented by p(n), which is called the partition function. We often study the partitions of n with restriction on the parts. We use p(n conditions) to count the partitions of n where the parts satisfy the conditions specified. p S (n) is the number of partitions of n into parts from S; p D (n) is the number of partitions of n into distinct parts; p m (n) is the number of partitions of n into parts each m.

Thm: The generating function for p(n) equals p(n)x n 1 = 1 x j. n=0 j=1

Thm: The generating function for p D (n) equals p D (n)x n = (1 + x j ). n=0 j=1

Thm: Let S be a subset of the set of positive integers. The generating function for p S (n) equals n=0 p S (n)x n = j S 1 1 x j.

Thm: Let S be a subset of the set of positive integers. The generating function for p S (n) equals n=0 p S (n)x n = j S The generating function for ps D (n) equals n=0 p D S (n)x n = j S 1 1 x j. (1 + x j ).

Euler Parity Theorem: there are the same number of partitions of n into odd parts as there are partitions of n into distinct parts.

Applications in cryptography

Private cryptosystems Caesar Cipher: a letter is shifted by a constant, i.e., C P + k (mod 26)

Private cryptosystems Caesar Cipher: a letter is shifted by a constant, i.e., C P + k (mod 26) Affine Transformation: C ap + b (mod 26), wehre (a, 26) = 1.

Solving the equation a k b (mod m) If (b, m) = 1 and (k, φ(m)) = 1, then b u is a solution, where ku φ(m)v = 1 and u, v > 0.

Solving the equation a k b (mod m) If (b, m) = 1 and (k, φ(m)) = 1, then b u is a solution, where ku φ(m)v = 1 and u, v > 0. What if (b, m) > 1? Make m = pq!

Solving the equation a k b (mod m) If (b, m) = 1 and (k, φ(m)) = 1, then b u is a solution, where ku φ(m)v = 1 and u, v > 0. What if (b, m) > 1? Make m = pq! So to solve it, we need to compute φ(m). If m = pq for primes p, q, it is easy. But it is very hard to break m into pq!!

Public Key Cryptosystem -RSA cryptosystem RSA cryptosystem (Rivest-Shamir-Adleman 1983; Clifford Cocks 1973) Encrption:

Public Key Cryptosystem -RSA cryptosystem RSA cryptosystem (Rivest-Shamir-Adleman 1983; Clifford Cocks 1973) Encrption: 1 Take m = pq and k so that (k, φ(m)) = 1.

Public Key Cryptosystem -RSA cryptosystem RSA cryptosystem (Rivest-Shamir-Adleman 1983; Clifford Cocks 1973) Encrption: 1 Take m = pq and k so that (k, φ(m)) = 1. 2 Encode a message with numbers (A=11, B=12, C=13, et al), and get a large number N.

Public Key Cryptosystem -RSA cryptosystem RSA cryptosystem (Rivest-Shamir-Adleman 1983; Clifford Cocks 1973) Encrption: 1 Take m = pq and k so that (k, φ(m)) = 1. 2 Encode a message with numbers (A=11, B=12, C=13, et al), and get a large number N. 3 Divide N into segments a 1, a 2,..., a r. And let b i ai k (mod m).

Public Key Cryptosystem -RSA cryptosystem RSA cryptosystem (Rivest-Shamir-Adleman 1983; Clifford Cocks 1973) Encrption: 1 Take m = pq and k so that (k, φ(m)) = 1. 2 Encode a message with numbers (A=11, B=12, C=13, et al), and get a large number N. 3 Divide N into segments a 1, a 2,..., a r. And let b i ai k (mod m). 4 send out number M = b 1 b 2... b r.

Public Key Cryptosystem -RSA cryptosystem RSA cryptosystem (Rivest-Shamir-Adleman 1983; Clifford Cocks 1973) Encrption: 1 Take m = pq and k so that (k, φ(m)) = 1. 2 Encode a message with numbers (A=11, B=12, C=13, et al), and get a large number N. 3 Divide N into segments a 1, a 2,..., a r. And let b i ai k (mod m). 4 send out number M = b 1 b 2... b r. Decryption:

Public Key Cryptosystem -RSA cryptosystem RSA cryptosystem (Rivest-Shamir-Adleman 1983; Clifford Cocks 1973) Encrption: 1 Take m = pq and k so that (k, φ(m)) = 1. 2 Encode a message with numbers (A=11, B=12, C=13, et al), and get a large number N. 3 Divide N into segments a 1, a 2,..., a r. And let b i ai k (mod m). 4 send out number M = b 1 b 2... b r. Decryption: 1 Divide M into b 1, b 2,..., b r

Public Key Cryptosystem -RSA cryptosystem RSA cryptosystem (Rivest-Shamir-Adleman 1983; Clifford Cocks 1973) Encrption: 1 Take m = pq and k so that (k, φ(m)) = 1. 2 Encode a message with numbers (A=11, B=12, C=13, et al), and get a large number N. 3 Divide N into segments a 1, a 2,..., a r. And let b i ai k (mod m). 4 send out number M = b 1 b 2... b r. Decryption: 1 Divide M into b 1, b 2,..., b r 2 Solve x k b i (mod m) using the above method to get a i s

Public Key Cryptosystem -RSA cryptosystem RSA cryptosystem (Rivest-Shamir-Adleman 1983; Clifford Cocks 1973) Encrption: 1 Take m = pq and k so that (k, φ(m)) = 1. 2 Encode a message with numbers (A=11, B=12, C=13, et al), and get a large number N. 3 Divide N into segments a 1, a 2,..., a r. And let b i ai k (mod m). 4 send out number M = b 1 b 2... b r. Decryption: 1 Divide M into b 1, b 2,..., b r 2 Solve x k b i (mod m) using the above method to get a i s 3 We get a 1, a 2,..., a r so N. Now decode the numbers into a message.