Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are...

51
Lecture 2 Basic Number Theory and Algebra

Transcript of Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are...

Page 1: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

Lecture 2 Basic Number Theory and Algebra

Page 2: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and transmitted. The encryption processes are mathematical operations that turn the input numerical value into output numerical values. Building, analyzing, and attacking these cryptosystem requires mathematical tools. The most important of these is number theory, especially the theory of congruences.

Page 3: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

Outline Basic Notions Solving ax+by=d=gcd(a,b) Congruence The Chinese Remainder Theorem Fermat’s Little Theorem and Euler’s Theorem Primitive Root Inverting Matrices Mod n Square Roots Mod n Groups Rings Fields

Page 4: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

1 Basic Notions1.1 Divisibility

.| writewe

, dividenot does fI . of multiple a is

thatis thisexpress y toAnother wa .by

denoted is This .such that interger

an is thereif , divides say that We

.intergers be and ,0et L

b a

baab

a|b

b=kak

ba

ba

1 Definition

Page 5: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

1.1 Divisibility (Continued)

. so ),(Then

. and Write3)( . Therefore,

. and such that and exist There (2)

. thefrom immediate isIt )1( Proof.

. and intergers

allfor )(|then , and If (3)

.|then ,| and If )2(

.every for 1 Also,

. and 0 ,0every For )1(

21

21

tca|sbtkskatcsb

akcakbklac

lbckablk

ts

tcsbaa|ca|b

cacba|b

b|b

a|aa|a

1 Definition

1 nPropositio

Page 6: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

1.1 Divisibility (Continued)

r=r'.

q'qb

q'q

b

qqr=br'

<brr<b

+ra=bqa=bq+rq

rqba rbqaqb

q a

bbbbbb

r<b a=bq+r rqb>

ba

havemust we

e,Furthermor . havemust we, therefore value;absolutein least at be

wouldside hand-right then the, if However, value.absolute

in than less is side hand-left the,assumptionby that observe Now

).'(

obtain we terms,grearrangin

and equations two thesegsubtractinThen .'0 and 0

where,'' and that suppose ,uniquenessFor . and

of existence theprovesIt .Set .)1(such that

integer an exists therei.e. terms, twoamongstay must integer The

.,3,2,,0,,2,3,

sequenceinteger heConsider t Proof.

.0 and such that , integers uniqueexist there,0with

, integers For two property).remainder with (Division

1 Theorem

Page 7: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

1.2 Prime

composite. called is primenot isthat

1an greater thinteger positiveA itself. and 1than

other integers positive noby divisble is that 1than

greater integer positive a is primeA 2 Definition

The primes less than 200:

2 3 5 7 11 13 17 19 23 29 31 37 41 43 47 53 59 61 67 71 73 79 83 89 97 101 103 107 109 113 127 131 137 139 149 151 157 163 167 173 179 181 191 193 197 199

Page 8: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

1.2 Prime (Continued)

primes.only theare these

that assumptionour scontradict which ,,,, amongnot

is prime theTherefore, .impossible is which ,1

divide wouldthen did,it if since ,,,, theofany equal

cannot 2.Clearly, since , primesuch oneleast at bemust

There . divides that prime aconsider and ,1

setThen .,,3,2 themcall primes;many finitely

only weree that thersuppose ion,contradict ofBy way Proof.

primes.many infinitely are There

21

21

21

21

21

k

k

k

k

k

ppp

ppppn

pppp

pnp

nppppn

ppp

2 nPropositio

Page 9: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

1.2 Prime (Continued)

primes.such enough certainly are thereSo

.109.310ln

10

10ln

10)10()10(

:follows as primesdigit -100 ofnumber theestimatecan Wedigits.

100 around ofsay primes, large need ll we'ns,applicatio In various

.proof omit the We.Proof

. as 1)ln()( ratio that thesense in the

,ln

)(

Then . than less primes of

number thebe )(Let )TheoremNumber Prime(

9799

99

100

10099100

xxx//xx

xx

x

x2 Theorem

Page 10: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

1.2 Prime (Continued)

.for holds same theso and

primes, ofproduct a as expressed becan and both ,hypothesis

induction by the ; and ,1,1exist thereso

and composite, is otherwise, prime; one ofproduct theis as

true,isstatement then theprime, a is If primes. ofproduct a as

expressed becan an smaller thinteger positiveevery that assume

and 1,>Let .oninduction by thisprovemay Weprimes.

of empty)(possibly product a as expressed becan integer

positiveevery that showing toamounts This )(Existence Proof.

.reordering toup unique,

is primes intoion factorizat This primes. ofproduct a isinteger

positiveEvery )arithmetic of theoremal(Fundament

n

b a

n = ab<b<n<a<n

nn

n

n

n n

n

3 Theorem

Page 11: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

1.3 Greatest Common Divisor

algorithm.Euclidean The )2(

gcd. the

in appear cannot it then ion,factorizat ain appear not does

prime a If .),gcd(get

and two theofsmaller theTake . and

i.e. primes, into and factor can you If (1)

:gcd thefindingfor waysstandard twoare There

.1),gcd( if prime relatively are

and say that We).,(by or ),gcd(either by denoted

is and and both dividinginteger positivelargest

theis and ofdivisor common great The

),min(),min(2

),min(1

21

21

2211

21

21

nn

nn

n

nn

pppba

pppbp

ppaba

ba

bababa

ba

ba

3 Definition

Page 12: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

1.3 Greatest Common Divisor (Continued)

speed)fast andion factorizat(Without .),gcd( Hence

.

have We. suppose ,generality of

loss Without algorithm.Euclidean theofn descriptio formal

more a give nowcan weguideline, a as example theUsing

.

:shift are numbers thehow Notice

.21180) gcd(482,,So

.02816 216350

16504216 051622482 21648221180

.1180) gcd(482, Compute

1112

323121211

k

kkkkkkk

rba

rqrrrqr

rrqrrrqbrbqa

ba

ignoredividenddivisorremainder

1 Example

Page 13: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

1.3 Greatest Common Divisor (Continued)

.),gcd(for particularin , allfor result obtain the we,Continuing

).(

)()(

Then . all

for have weSuppose ).1()( Similar,

. have we, and 1 Taking.

such that ,integer are e then theralgorithm,Euclidean

theduring obtianedremainder a is if that showcan WeProof.

.1 with , integersexist

e then therprime, relatively and if ,particularIn .that

such , integersexist Then there ).,gcd(let and nonzero,

of oneleast at with integers, twobe and Let

12

12112212

2122

111111

barj

yqyb

xqxabyaxqbyaxrqrr

ji

byaxrqqbqar

byaxrqyxbyaxr

yx

r

byaxyx

badbyax

yxbad

a, bba

kj

jjj

jjjjjjjjjjjj

iii

jjj

jj

j

4 Theorem

Page 14: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

1.3 Greatest Common Divisor (Continued)

.conclusion get thecan weway,

in this Continuing factors. remianing thedivides or |Either

.| Otherwise, done. rewe',| if ,| case For the

.|

Therefore, .obtian toby Multiply .1

with integersexist there, Following.1),gcd(

,| Since .or 1),gcd( prime, is Since .| assume

Now done. are we, divides If . case heConsider t Proof.

.,,, factors theof

one dividemust then ,| prime a if generally, More

.|or |either then ,| and prime a is If

pbp

zbpapzabp

bp

bpbyabxbpyax

x,ypa

apppapap

app|ab

zba

pzabp

bpapabpp

4 Theorem

1 Corollary

Page 15: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

1.3 Greatest Common Divisor (Continued)

.,obtain can

we way,in this Continuing .get

tofactor same theRemove . So .

, Since .,get we,prime are

, Since .|,| know we,| ,| Since

. and and primes,

are ,,, and ,,, where,

that Suppose s)(Uniquenes Proof.

)(Continued

22

11111

1111

1111

2121

212121

21

ls

ls

kjk

jkj

ls

lsl

s

qpls

qqpp

pqppq

qppqqpp

qpqqpnqnp

qqqppp

qqqpppqqq

pppn

3 Theorem

Page 16: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

2 Solving ax+by=d=gcd(a,b)

algorithm.Euclidean extended thecalled oftem is mehtod preceding The

).1180 ,482gcd(2)29(118071482

that shows

n calculatioeasy An .29 Similarly, .713,22

4,52,2,1, In the

).,gcd(Then

,1,

, ,1

:sequences

following get the we, theof procedure proof on the Based

5345

23412321

221211

21221

yxxx

xxxxxxxx

babyax

yyqyqqyqy

xxqxqxx

kk

jjjj

jjjj

1 Example

4 Theorem

Page 17: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

3 Congruences

.13) 17(mod17 7), 37(mod12 5), mod732

negative).or

(positive integer somefor asrewritten becan This

. of ) negativeor (positive

multiple a is )if mod tocongruent is :(read

) (mod

say that We.0 with integers be ,,Let

(2 Example

4 Definition

knkba

n

banba

nba

nnba

Page 18: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

equality. likemuch very behaves Congruence#

proof. omit the WeProof.

).(modthen ),(mod),(mod If )4(

).(mod ifonly and if )(mod )3(

).(mod )2(

.| ifonly and if )(mod0 )1(

,0 with integers be , , ,Let

ncancbnba

nbanab

naa

anna

nncba

3 Propostion

Page 19: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

3.1 Addition, Subtraction, Multiplication

s.congruence

tion with multiplica and n,subtractio addition, of operations

arithmetic usual theperformcan you saysn propositio The#

).(mod so ),(

have wetion,multiplicaFor similar. is )(mod

that proof The ).(modso ),(

Then, .,, integersfor ,, WriteProof.

).(mod ),(mod ),(mod

Then ).(mod),(mod

suppose and ,0 with integers be , , , ,Let

nbdacnklbldkn

bdacndb

candbc alkndb

calknldcnkba

nbdacndbcandbca

ndcnba

nndcba

4 nPropositio

Page 20: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

3.1 Addition, Subtraction, Multiplication (Continued)

1. to0 frominteger an asanswer final the writewe

usuallybut answers, negative with wrongnothing is There#

).17(mod13473 :Solution

).17(mod37problem following heConsider t . mod

algebra docan wehow of examplean is Here

n

x

xn

3 Example

Page 21: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

3.2 Division

).(mod

thatmeans This .|get can we,| Since

.)()(

:by Multiply .1

such that ,exist there,1),gcd( Since Proof.

.by congruence theof sidesboth dividecan we

,prime relatively are , if ,sother wordin ),(mod

then ),(mod If .1),gcd( with and

0 with integers be , , , ,Let

ncb

cbnacabn

cbycbnxacab

cbnyax

yxna

a

nanc

bnacabna

nndcba

5 nPropositio

Page 22: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

3.2 Division (Continued)

7/5. like acts ,8 is

That ).11(mod8 So .(mod11)40291875

that Note (mod11)?mean 7/5 doeswhat ,75

.3(mod11)165 :Solve

).17(mod15

2 1,gcd(2,17) Since 4.732:Solution

.3(mod17)72:Solve

xx

x

x

xx

x

5 Example

4 Example

Page 23: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

3.2 Division (Continued)

).12345(mod988442471

Hence, ).12345(mod1247111111 that meansIt

.112345247111111 ,1)12345,11111gcd(can we

algorithm,Euclidean extended the Using:Solution

).12345(mod411111 Solve

. of

multiple a is 1 that see we,1 Since Proof.

.algorithmEuclidean extended theusing found becan ,

).(mod aswitten ),(modfor inverse tivemultiplica

theis so),(mod1Then .1such that

integers be ,Let .1),gcd( Suppose

1

x

y

x

n

asntas

ts

nana

snasntas

tsna

6 Example

6 nPropositio

Page 24: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

3.3 Division (Continued)

).)(mod/)(1(

,),)(mod/(2),)(mod/(),(mod

are )(mod congruence original theof solutions The )3(

.solution

aobtian toprocedure above by the congruence thisSolve

.1)/,/gcd( and integers are /,/,/ that Note

)./(mod/)/(

congruence new heConsider t .| Assume )2(

solution. no is there,|If (1)

:follows as is procdure The .1

),gcd( when )(mod form theof scongruence Solve

0

000

0

ndndx

ndnxndnxnx

nbax

x

dndadndbda

dndbxda

bd

bd

d

nanbax

Page 25: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

3.2 Division (Continued)

allowed.not isit ,1),gcd(if general,In ).6(mod2/1),6(mod6/1

example,For rs.denominatoarbitrary with fractions uset can' We)3(

eable.interchang becan

)12345(mod6713 and )12345(mod2/1 So, .1get you ,2by 2/1multiply

if :propery oneexactly with symbol asimply is 2/1 symbol The)2(

).(mod meansreally )(mod/ .1),gcd(if mod

used becan fraction a that is rule general The .)12345(mod6173

than writeeasier to is )12345(mod2/1 example,For . mod

fractions work with toconvenient be it will ,situationsmany In )1(

fractions with Working

).39(mod31 ,18 ,5 are congruence original the tosolutions

The .5 issolution A ).39(mod74 congruence new the

obtian to3by Divide .21 diviedeswhich ,3)39 ,12gcd( :Solution

).39(mod2112 Solve

1

0

na

nbanabnan

b/a

n

x

xx

x 7 Example

Page 26: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

4 The Chinese Remainder Theorem

).mod( ..),())((

, so,|,|Then solution.

another is Suppose ).(mod),(modThen

.Let .1such that ,integersexist There Proof.

).(mod ),(mod

scongruence ussimultaneo

the to)(modsolution oneexactly exists there,and Given

1.) ,gcd( Suppose Theorem)Remainder (Chinese

reversed.

becan process that thisshows theoremremainder Chinese The

).6(mod1

)7(mod4)42(mod25

11

1111

1

mnxxeiktlsmnntmsxx

xxnlmkxxxxnxxm

xnbbmsxmaantx

antbmsxntmst s

nbxmax

mnx ba

nm

x

xx

5 Theorem

Page 27: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

4 The Chinese Remainder Theorem (Continued)

answer.

thegives, mod reducingthen , intoback ngSubstituti

),(mod)(Obtain ).(mod solve toneed weso

, form theof are )(mod tocongruent numbers The)2(

.3 ,2 ,1 ,0 ,6 ,5 are

there,7modBy .80 ,65 ,50 ,35 ,20 ,5 are )15(mod5 tocongruent

numbers theexample,For ).(mod tocongruent is that one

findyou until )(mod tocongruent numbers list the To)1(

:solution thefind tomethods Two

. modby determineduniquely is and exists

solution asuch that guarantees theoremThe ).105(mod80

),15(mod5)15(mod80 ),7(mod3)7(mod80 Since :Solution

).15(mod5 ),7(mod3 Solve

1

nmnkbk

mnbakmankb

nkbnb

ma

nb

mn

x

xx

8 Example

Page 28: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

4 The Chinese Remainder Theorem (Continued)

numbers.

composite modulo work than topowers prime modulo

or primes modulo congruence analyze easier to isit often that

is eadvatantag The .modanswer an obtian n toinformatio

resulting therecombinethen , offactor power primeeach

modulo scongruence ussimultaneo intoit break can you ,

number composite a modulo congruence a start withyou If#

).1234511111(mod1098211279884111113

yields This).12345(mod98842471)37(

Therefore,.2471)12345(mod11111:Solution

).11111(mod3),12345(mod7 Solve 1

n

n

n

x

k

xx

9 Example

Page 29: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

4 The Chinese Remainder Theorem (Continued)

).35(mod34)7(mod1),5(mod1

),35(mod29)7(mod1),5(mod1

),35(mod6)7(mod1),5(mod1

),35(mod1)7(mod1),5(mod1

: ways4in er put togethcan We

).7(mod1)7(mod1

)5(mod1)5(mod1

)35(mod1:Solution

)35(mod1 Solve

2

2

2

2

xxx

xxx

xxx

xxx

xx

xx

x

x10 Example

Page 30: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

4 The Chinese Remainder Theorem (Continued)

solutions.2 has )(mod1 then primes, odddistinct

ofproduct theis if general,in Therefore,

proof. omit thecan WeProof.

).(mod,),(mod),(mod

scongruence ussimultaneo the to)(mod

solution oneexactly exists there,,,, integers

Given .1 whenever 1),gcd( with integers

be ,,,Let Form) General-(CRT

2

21

2211

21

21

21

r

r

kkk

k

k

ji

k

nx

rpppn

maxmaxmax

mmmx

aaa

kjimm

mmm

6 Theorem

Page 31: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

5 Fermat’s Little Theorem and Euler’s Theorem

).(mod1 is remains What .1,,3,2,1by

congruence thisdividecan we,for 1),gcd( Since

).))(mod1(321())1((

)3()2()1()1()2()1()1(321

that followsIt . of elementsdistinct are )1(

,),2(),1(,Therefore ).(mod have We.

suppose Now, ).(mod0)( Clearly,).(mod)(

: map heConsider t }.1,,3,2,1{Let Proof.

).(mod1

then,|

and prime a is If )Theorem Little sFermat'(

1

1

1

pap

Sjpj

ppapa

aaapp

Sp

payaxSyx

pxpaxx

SSpS

pa

ap

p

p

p

p

7 Theorem

Page 32: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

5 Fermat’s Little Theorem and Euler’s Theorem (Continued)

).561(mod12 ,17113

561 assuch exceptions exist the thereHowever, quickly. numbers

many eliminate andfaster much is procedure that thisis advantage The#

.techniques

tedsophistica more use test, thepasses When .next the toproceed

andit discard test, thefails If ).(mod1?2 whether see to

number oddeach ly test successive and point starting a Choose

Theorem little sFermat' theusing numbers primefor Search

).11(mod22

deduce we10), 3(mod53 from s,other wordIn ).11(mod82

2)2(2 evaluatecan we this,From .11(mod110242

).11(mod2),11(mod2

560

10

0

353

3

35105310

5310

n

nnn

nnn

11 Example

Page 33: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

5 Fermat’s Little Theorem and Euler’s Theorem (Continued)

.32)5/1)(13/1)(12/1120(15)32(0)12(

,4)5/11)(2/11(10)52(0)1(

proof. omit the WeProof.

.1

1)(,particularin ,1

1)(then

,ionfactorizatpower prime theis If

.function- sEuler' called is Often .1),gcd(that

such 1 integers ofnumber thebe )(Let

3

1

2121

12 Example

7 nPropositio

5 Definition

aak

i i

ak

aa

pp

pp

nn

pppn

na

nan

k

Page 34: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

5 Fermat’s Little Theorem and Euler’s Theorem (Continued)

).(mod1obtain wefactors, out the Dividing

),(mod)(

Therefore,

order. some in in written numbers theare )(

numbers theClearly, ).(mod)(by defined be

Let .1),gcd( with 1 integers ofset

thebe Let . theorems'Fermatfor given one theas

same almost the is theorem thisof proof The Proof.

).(mod1

then1,),gcd( If Theorem) s'(Euler

)(

)(

)(

na

nxaxx

Sx

naxx

SSnxnx

S

na

na

n

Sx

n

SxSx

n

7 Theorem

Page 35: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

5 Fermat’s Little Theorem and Euler’s Theorem (Continued)

).101(mod1410242)2(2

Therefore, ).101(mod1

2 that know we theorem,sFermat' From :Solution

).101(mod2Compute

).1000(mod343

77)7(7 have we,400)5/11(

)2/11(1000)1000( Since 1000. modulo working

as same theis digits last three theKnowing :Solution

?7 of digits last three theare What

1043210043210

100

43210

332400803

803

14 Example

13 Example

Page 36: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

5 Fermat’s Little Theorem and Euler’s Theorem (Continued)

.not )( modulo usingexponent theWork with #

).(mod)1()(

Then .)( WriteProof.

exponent. in the )( modulo work should

you , modulo work oyou want t if s,other wordIn

).(modthen )),((mod If .1),gcd(

,1 with integers be ,,,Let

)()(

nn

naaaaaa

knyx

n

n

naanyxna

nyxna

ykyknyknyx

yx

1 Principle Basic

Page 37: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

6 Primitive Root

. moduloroot primitive )1( are There#

. modulo class nonzeroevery yield powers senumber who

a is moduloroot primitive a prime, a is when gereral,In

13. modroot primitive anot is 3 Therefore,

.3 of powers are 9 ,3 ,1only so),13(mod13 But, 7. modulo

root primitive a is 3 that means This 3. of powers as 7 modulo

classes congruence nonzero theallobtain that weNote

.13 ,53 ,43 ,63 ,23 ,33

:)7(mod3 of powers heConsider t

3

654321

pp

p

pp

Page 38: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

6 Primitive Root (Continued)

).(mod i.e.,(1)by )(mod1 so),1(mod0then ),1(mod

If ).1(mod so),1(mod0 ),1(By ).(mod1 yields

by sidesboth Dividing ).(mod that Suppose . that Assume )2(

.0 So root. primitive a is that assumption thescontradict this,1 Since

).(mod,),(mod),(mod yield )(mod of powers The .0 Suppose

).(mod)(1

have We

.10 with ,)1(

Write).(mod1 Suppose . theorems'Fermatby

)(mod1)(

Therefore, . somefor )1( then ),1(mod0 If )1( Proof.

).1(mod ifonly and if )(mod then ,integers are and If )2(

).1(mod0 ifonly and if )(mod1 then ,integeran is If )1(

. prime for theroot primitive a be Let

12

1

1

pggpgpkjpk

jpkjpkjpg

gpggkj

rgpr

pgpgpgpgr

pggggg

prrqpn

pg

pgg

mmpnpn

pkjpggkj

pnpgn

pg

kjkj

kj

kkj

r

rrrpqn

n

pmn

kj

n

8 nPropositio

Page 39: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

7 Inverting Matrices Mod n

)(mod)(1

example,For prime. relatively are andt determinan

its ifonly and if modulo invertible ismatrix

square a that is need fact we basic The matrix. a

invertingfor methods usual by the edaccomplish

becan modulomatrix a of inverse theFinding

11

nac

bdbcad

ac

bd

bcaddc

ba

n

n

n

Page 40: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

7 Inverting Matrices Mod n (Continued)

).11(mod

641

1048

633

132

286

156

6

941

321

111

),11(mod162,2

941

321

111

:Solution

).11(mod

941

321

111

Invert

).11(mod10

01

2355

1123

57

19

43

21

that showsn calculatioquick A

).11(mod57

19

13

245

13

24

2

1

43

21

obtain we),11(mod152 ,243

21 Since :Solution

).11(mod43

21Invert

1

1

1

16 Example

15 Example

Page 41: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

7 Inverting Matrices Mod n (Continued)

.prime relatively bemust and ||that

meanswhich , modulo inversean has|| Therefore,

).(mod1||||||||

,Then

matrix.identity theis where),(mod Suppose

relatively be to andt determinan theneed wedoWhy

nM

nM

nIMNNM

InIMN

n

Page 42: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

8 Square Roots Mod n

. are of roots square theand , modulo

roots square thehas then ,modroot square no has If )2(

. are

mod of roots square then the, moduloroot square a has If )1(

).(modLet

.integeran be let and prime be )4(mod3Let

).4(mod3 when is caseeasiest The

. prime a modulo roots sqare of case thestart with sLet'

?solutions all and

solution one find wedo How ).77(mod71Consider

4/)1(

2

xyp

ypy

x

pypy

pyx

yp

p

p

x

p

9 nPropositio

Page 43: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

8 Square Roots Mod n (Continued)

. theoremlittle sFermat' scontradict

It ).(mod)/()1(1 because ,impossible is

This .mod square a is 1 meanswhich ),(mod/1Then

).(mod and )(modsay , modulo squares are and

both Suppose . modulo square a is and of oneleast at Therefore,

).(mod so ),(mod0))(( that implies This

),(mod

have we theorem,s'Fermat By the ).(mod0

assume So trivial.are statements theall),(mod0 If Proof.

12/)1(

2

22

222

21214

pba

ppba

pybpyapyy

pyy

pyxpyxyx

pyyyyx

py

py

pp

pp

)(

Page 44: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

8 Square Roots Mod n (Continued)

).77(mod 15,29,29,15

computecan wetheorem,remainder Chinese theUsing

,)11(mod4

)7(mod1,

)11(mod4

)7(mod1,

)11(mod4

)7(mod1,

)11(mod4

)7(mod1

i.e. ways,

fourin combinecan We).11(mod4 ),7(mod1 ,Therefore

).11(mod571 ),7(mod171 that meansIt :Solution

).77(mod71 Solve

.8 are 2(mod11)of roots

square the,mod11root square no has 2 so ),11(mod298

But ).11(mod823,12/41)/4( Since :Solution

.2(mod11) ofroot square theFind

.4 are 5(mod11) of roots square theSo ).11(mod54 compute

can We).11(mod453,12/41)/4( Since :Solution

.5(mod11) ofroot square theFind

22

2

2

3

2

3

x

x

x

x

x

x

x

x

x

xx

xx

x

xp

xp

19 Example

18 Example

17 Example

Page 45: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

8 Square Roots Mod n (Continued)

. factoring toequivalentnally computatio is )(mod

to, solutionsfour thefindingThen . modroot squere a has

which toprime relativelynumber a is and )4(mod3 tocongruent

primes twoofproduct theis Suppose

.77 offactor nontrivial a gives

7)77,2915gcd( ,In ).(),gcd(..),|(

|but )|(| Therefore,)).(mod)((mod

))(mod)((mod that know we, From

).(mod of )(mod, solutionsfour theknow weand

primes twoofproduct theis Suppose

2

2

nnyx

baxn

ny

pqn

qpnbaeibap

baqbaqbappbaqb

aqbapba

nyxnbax

pqn

2 Principle Basic

19 Example

19 Example

OracleRoot Square

Page 46: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

9 Groups, Rings, Fields9.1 Groups

. , allfor (4)

e,furthermor if, e)commutativ(or abelian is groupA

.1 such that , of inverse

thecalled ,element an exists G thereeach For (3)

. allfor 11that

such element,identity thecalled ,1element an is There (2)

. , ,allfor )(

)( is,That e.associativ isoperation group The (1)

axioms. threefollowing thesatisfying on operation

binary a with set a of consists ) ,( groupA

11

1

Gbab*aa*b

G

*aaa*aa

Gaa

Gaa*aa *

G

Gcb a * ca*b

b* ca*

G*

G*G

6 Definition

Page 47: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

9.1 Groups (Continued)

.,element identity

withgroup, a form XOR, ofoperation with the},,{set The (3)

1.element identity with , modulo

tionmultiplica ofoperation under the group a is set theHowever,

inverses. tivemultiplica have elements allnot since group, anot is

modulotion multiplica ofoperation with theset The group.

a forms , moduloaddition ofoperation with the,set The (2)

.integer theis

integer an of inverse theand 0 iselement identity The group. a

formsaddition ofoperation with the Zintegers ofset The (1)

1

*

TTF

FT

n

Z

nZ

nZ

aa

n

n

n

20 Example

Page 48: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

9.2 Rings

. , allfor if ring ecommutativ a is ring The

.

, , allfor )()()( and )()(

)( is,That .over vedistributi is operation The (4)

. allfor 1 1that

such 0, 1 with 1, denotedidentity tivemultiplica a is There (3)

. , , allfor

)( )( is,That e.associativ is operation The (2)

0. denotedidentity with groupabelian an is ) (R, (1)

axioms. following thesatisfying ,on

ation)(multiplic and (addition) denotedy arbitraril operations

binary with twoset a of consists ),,( ringA

Rbaabba

R

cbaacabacbcaba

cba

Ra aaa

Rcba

cbacba

R

RR

7 Definition

Page 49: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

9.2 Rings (Continued)

ring. ecommutativ a is modulo performed

tion multiplica andaddition with set The (2)

ring.

ecommutativ a istion multiplica andaddition of

operations usual with the Zintegers ofset The (1)

n

Zn

21 Example

Page 50: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

9.3 Fields

order. its called is elements ofnumber The

finite. is elements ofnumber theif finite is structure algebraA #

prime. is

If number. prime a is ifonly and if ) modulotion multiplica

andaddition of operations usual (under the field a is (2)

.operations usual under the fields

form numberscomplex theand , numbers real the, numbers

rational theHowever, 1. and 1 are inverses tivemultiplicawith

integers zero-nononly thesince field, anot istion multiplica and

addition of operations usual under the integers ofset The (1)

inverses. tivemultiplica have elements

zero-non allin which ring ecommutativ a is fieldA

nnn

Zn

CRQ

22 Example

8 Definition

Page 51: Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.

Thank you!