SlideShare a Scribd company logo
1 of 32
9. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations
9. 9.1.1  Definition Figure 9.1  Three groups of positive integers A prime is divisible only by itself and 1. Note
9. 9.1.1   Continued What is the smallest prime? Example 9.1 Solution The smallest prime is 2, which is divisible by 2 (itself) and 1.  List the primes smaller than 10. Example 9.2 Solution There are four primes less than 10: 2, 3, 5, and 7. It is interesting to note that the percentage of primes in the range 1 to 10 is 40%. The percentage decreases as the range increases.
9. 9.1.2  Cardinality of Primes Infinite Number of Primes There is an infinite number of primes. Number of Primes Note
9. 9.1.2   Continued As a trivial example, assume that the only primes are in the set  {2, 3, 5, 7, 11, 13, 17}. Here P = 510510 and P + 1 = 510511. However, 510511 = 19 × 97 × 277; none of these primes were in the original list. Therefore, there are three primes greater than 17. Example 9.3 Find the number of primes less than 1,000,000. Example 9.4 Solution The approximation gives the range 72,383 to 78,543. The actual number of primes is 78,498.
9. Given a number n, how can we determine if n is a prime? The answer is that we need to see if the number is divisible by all primes less than 9.1.3  Checking for Primeness We know that this method is inefficient, but it is a good start.
9. 9.1.3   Continued Is 97 a prime? Example 9.5 Is 301 a prime? Example 9.6 Solution The floor of   97 = 9. The primes less than 9 are 2, 3, 5, and 7. We need to see if 97 is divisible by any of these numbers. It is not, so 97 is a prime. Solution The floor of   301 = 17. We need to check 2, 3, 5, 7, 11, 13, and 17. The numbers 2, 3, and 5 do not divide 301, but 7 does. Therefore 301 is not a prime.
9. Sieve of Eratosthenes 9.1.3  Continued
9. Euler’s phi-function,   (n), which is sometimes called the Euler’s totient function  plays a very important role in cryptography.  9.1.4  Euler’s Phi-Function
9. We can combine the above four rules to find the value of   (n). For example, if n can be factored as  n = p 1 e 1   × p 2 e 2  × … × p k e k  then we combine the third and the fourth rule to find 9.1.4  Continued The difficulty of finding   (n) depends on the difficulty of finding the factorization of  n . Note
9. 9.1.4   Continued What is the value of   (13)? Example 9.7 Solution Because 13 is a prime,   (13) = (13 −1) = 12. What is the value of   (10)? Example 9.8 Solution We can use the third rule:   (10) =   (2) ×   (5) = 1 × 4 = 4, because 2 and 5 are primes.
9. 9.1.4   Continued What is the value of   (240)? Example 9.9 Solution We can write 240 = 2 4  × 3 1  × 5 1 . Then  (240) = (2 4  −2 3 ) × (3 1  − 3 0 ) × (5 1  − 5 0 ) = 64 Can we say that   (49) =   (7) ×   (7) = 6 × 6 = 36? Example 9.10 Solution No. The third rule applies when  m  and  n  are relatively prime. Here 49 = 7 2 . We need to use the fourth rule:   (49) = 7 2  − 7 1  = 42.
9. 9.1.4   Continued What is the number of elements in Z 14 *? Example 9.11 Solution The answer is   (14) =   (7) ×   (2) = 6 × 1 = 6. The members are 1, 3, 5, 9, 11, and 13. Interesting point: If  n  > 2, the value of   ( n ) is even. Note
9. 9.1.5  Fermat’s Little Theorem First Version a p  ≡ a mod p a p − 1  ≡ 1 mod p Second Version
9. 9.1.5   Continued Find the result of 6 10  mod 11. Example 9.12 Solution We have 6 10  mod 11 = 1. This is the first version of Fermat’s little theorem where  p  = 11. Find the result of 3 12  mod 11. Example 9.13 Solution Here the exponent (12) and the modulus (11) are not the same. With substitution this can be solved using Fermat’s little theorem.
9. Multiplicative Inverses   9.1.5  Continued a −1  mod p = a  p − 2  mod p The answers to multiplicative inverses modulo a prime can be found without using the extended Euclidean algorithm: Example 9.14
9. 9.1.6  Euler’s Theorem First Version a  (n)  ≡ 1 (mod n) Second Version a  k ×   (n) + 1  ≡  a (mod n) The second version of Euler’s theorem is used in the RSA cryptosystem in Chapter 10. Note
9. 9.1.5   Continued Find the result of 6 24  mod 35. Example 9.15 Solution We have 6 24  mod 35 = 6  (35)  mod 35 = 1. Find the result of 20 62  mod 77. Example 9.16 Solution If we let  k  = 1 on the second version, we have  20 62  mod 77 = (20 mod 77) (20  (77)   + 1  mod 77) mod 77  = (20)(20) mod 77 = 15.
9. Multiplicative Inverses  Euler’s theorem can be used to find multiplicative inverses modulo a composite.  9.1.6  Continued a −1  mod n = a  (n)−1  mod n
9. 9.1.5   Continued The answers to multiplicative inverses modulo a composite can be found without using the extended Euclidean algorithm if we know the factorization of the composite: Example 9.17
9. 9-2  PRIMALITY TESTING Finding an algorithm to correctly and efficiently test a very large integer and output a prime or a composite has always been a challenge in number theory, and consequently in cryptography. However, recent developments look very promising. Topics discussed in this section: 9.2.1 Deterministic Algorithms 9.2.2 Probabilistic Algorithms 9.2.3 Recommended Primality Test
9. 9.2.2  Continued Miller-Rabin Test Figure 9.2  Idea behind Fermat primality test The Miller-Rabin test needs from step  0 to step  k  − 1. Note
9. 9.2.2  Continued
9. 9.2.2   Continued Does the number 561 pass the Miller-Rabin test? Example 9.25 Solution Using base 2, let 561 − 1 = 35 × 2 4 , which means  m  = 35,  k  = 4, and  a  = 2.
9. 9.2.2   Continued We already know that 27 is not a prime. Let us apply the Miller-Rabin test. Example 9.26 Solution With base 2, let 27 − 1 = 13 × 2 1 , which means that  m  = 13,  k  = 1, and  a  = 2. In this case, because  k  − 1 = 0, we should do only the initialization step: T = 2 13  mod 27 = 11 mod 27. However, because the algorithm never enters the loop, it returns a composite.
9. 9.2.2   Continued We know that 61 is a prime, let us see if it passes the Miller-Rabin test. Example 9.27 Solution We use base 2.
9. 9-4  CHINESE REMAINDER THEOREM The Chinese remainder theorem (CRT) is used to solve a set of congruent equations with one variable but different moduli, which are relatively prime, as shown below:
9. 9-4  Continued The following is an example of a set of equations with different moduli: Example 9.35 The solution to this set of equations is given in the next section; for the moment, note that the answer to this set of equations is x = 23. This value satisfies all equations: 23 ≡ 2 (mod 3), 23 ≡ 3 (mod 5), and 23 ≡ 2 (mod 7).
9. 9-4  Continued Solution To Chinese Remainder Theorem 1. Find M = m 1  × m 2  × … × m k . This is the common modulus. 2. Find M 1  = M/m 1 , M 2  = M/m 2 , …, M k  = M/m k . 3. Find the multiplicative inverse of M 1 , M 2 , …, M k  using the   corresponding moduli (m 1 , m 2 , …, m k ). Call the inverses   M 1 −1 , M 2 −1 , …, M k   −1 . 4. The solution to the simultaneous equations is
9. 9-4  Continued Find the solution to the simultaneous equations: Example 9.36 Solution We follow the four steps. 1. M = 3 × 5 × 7 = 105 2. M 1  = 105 / 3 = 35, M 2  = 105 / 5 = 21, M 3  = 105 / 7 = 15 3. The inverses are M 1 −1  = 2, M 2 −1  = 1, M 3   −1  = 1 4. x = (2 × 35 × 2 + 3 × 21 × 1 + 2 × 15 × 1) mod 105 = 23 mod 105
9. 9-4  Continued Find an integer that has a remainder of 3 when divided by 7 and 13, but is divisible by 12. Example 9.37 Solution This is a CRT problem. We can form three equations and solve them to find the value of x. If we follow the four steps, we find x = 276. We can check that  276 = 3 mod 7, 276 = 3 mod 13 and 276 is divisible by 12 (the quotient is 23 and the remainder is zero).
9. 9-4  Continued Assume we need to calculate  z  =  x  +  y  where  x  = 123 and  y  = 334, but our system accepts only numbers less than 100. These numbers can be represented as follows: Example 9.38 Adding each congruence in  x  with the corresponding congruence in  y  gives Now three equations can be solved using the Chinese remainder theorem to find z. One of the acceptable answers is  z  = 457.

More Related Content

What's hot

CNIT 141: 9. Hard Problems
CNIT 141: 9. Hard ProblemsCNIT 141: 9. Hard Problems
CNIT 141: 9. Hard ProblemsSam Bowne
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography rinnocente
 
Basics of Email writing
Basics of Email writingBasics of Email writing
Basics of Email writingShagun Rathore
 
Cryptography
CryptographyCryptography
CryptographyEmaSushan
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTScsandit
 
Digital Certified Mail (PPT)
Digital Certified Mail (PPT)Digital Certified Mail (PPT)
Digital Certified Mail (PPT)Matthew Chang
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard ProblemsSam Bowne
 
Number theory and cryptography
Number theory and cryptographyNumber theory and cryptography
Number theory and cryptographyYasser Ali
 
Elgamal_digital_signature_scheme.pptx
Elgamal_digital_signature_scheme.pptxElgamal_digital_signature_scheme.pptx
Elgamal_digital_signature_scheme.pptxKarim Monir
 
Diffie_Hellman-Merkle Key Exchange
Diffie_Hellman-Merkle Key ExchangeDiffie_Hellman-Merkle Key Exchange
Diffie_Hellman-Merkle Key ExchangeKevin OBrien
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryptionRashmi Burugupalli
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithmSunita Kharayat
 
Is unit 5_message authentication and hash functions
Is unit 5_message authentication and hash functionsIs unit 5_message authentication and hash functions
Is unit 5_message authentication and hash functionsSarthak Patel
 

What's hot (20)

CNIT 141: 9. Hard Problems
CNIT 141: 9. Hard ProblemsCNIT 141: 9. Hard Problems
CNIT 141: 9. Hard Problems
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
Basics of Email writing
Basics of Email writingBasics of Email writing
Basics of Email writing
 
Cryptography
CryptographyCryptography
Cryptography
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
 
Digital Certified Mail (PPT)
Digital Certified Mail (PPT)Digital Certified Mail (PPT)
Digital Certified Mail (PPT)
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
Idea
IdeaIdea
Idea
 
ElGamal Encryption Algoritham.pptx
ElGamal Encryption Algoritham.pptxElGamal Encryption Algoritham.pptx
ElGamal Encryption Algoritham.pptx
 
Number theory and cryptography
Number theory and cryptographyNumber theory and cryptography
Number theory and cryptography
 
Elgamal_digital_signature_scheme.pptx
Elgamal_digital_signature_scheme.pptxElgamal_digital_signature_scheme.pptx
Elgamal_digital_signature_scheme.pptx
 
Diffie_Hellman-Merkle Key Exchange
Diffie_Hellman-Merkle Key ExchangeDiffie_Hellman-Merkle Key Exchange
Diffie_Hellman-Merkle Key Exchange
 
How to Share a Secret
How to Share a SecretHow to Share a Secret
How to Share a Secret
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Is unit 5_message authentication and hash functions
Is unit 5_message authentication and hash functionsIs unit 5_message authentication and hash functions
Is unit 5_message authentication and hash functions
 

Viewers also liked

Public Key Algorithms
Public Key AlgorithmsPublic Key Algorithms
Public Key AlgorithmsBit Hacker
 
Complex numbers, neeton's method and fractals
Complex numbers, neeton's method and fractalsComplex numbers, neeton's method and fractals
Complex numbers, neeton's method and fractalsannalf
 
Fractal Geometry Course
Fractal Geometry CourseFractal Geometry Course
Fractal Geometry CourseMartin Turner
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographyKelly Bresnahan
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Solid modeling
Solid modelingSolid modeling
Solid modelingKRvEsL
 
Solid modelling cg
Solid modelling cgSolid modelling cg
Solid modelling cgNareek
 

Viewers also liked (11)

Public Key Algorithms
Public Key AlgorithmsPublic Key Algorithms
Public Key Algorithms
 
Complex numbers, neeton's method and fractals
Complex numbers, neeton's method and fractalsComplex numbers, neeton's method and fractals
Complex numbers, neeton's method and fractals
 
fractals
fractalsfractals
fractals
 
Fractal Geometry Course
Fractal Geometry CourseFractal Geometry Course
Fractal Geometry Course
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Fractal
FractalFractal
Fractal
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Solid modeling
Solid modelingSolid modeling
Solid modeling
 
Solid modelling cg
Solid modelling cgSolid modelling cg
Solid modelling cg
 
Fractals
FractalsFractals
Fractals
 

Similar to Prime

ch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.pptch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.ppttahirnaquash2
 
Geometry unit 7.1
Geometry unit 7.1Geometry unit 7.1
Geometry unit 7.1Mark Ryder
 
Onlinetest360.com quantitative aptitude PDF
Onlinetest360.com quantitative aptitude PDFOnlinetest360.com quantitative aptitude PDF
Onlinetest360.com quantitative aptitude PDFonlinetest
 
7.3 Solving Multi Step Frac Deci
7.3 Solving Multi Step Frac Deci7.3 Solving Multi Step Frac Deci
7.3 Solving Multi Step Frac DeciJessca Lundin
 
modul pembelajaran 4
modul pembelajaran 4modul pembelajaran 4
modul pembelajaran 4Ajrina Pia
 
MODULE_05-Matrix Decomposition.pptx
MODULE_05-Matrix Decomposition.pptxMODULE_05-Matrix Decomposition.pptx
MODULE_05-Matrix Decomposition.pptxAlokSingh205089
 
A higher problem solving strategy
A higher problem solving strategyA higher problem solving strategy
A higher problem solving strategyAan Hendroanto
 
C language numanal
C language numanalC language numanal
C language numanalaluavi
 
A study on number theory and its applications
A study on number theory and its applicationsA study on number theory and its applications
A study on number theory and its applicationsItishree Dash
 
AptitudeTestBook www.mechengg.net.pdf
AptitudeTestBook www.mechengg.net.pdfAptitudeTestBook www.mechengg.net.pdf
AptitudeTestBook www.mechengg.net.pdfHitendraThakur4
 
Maths Revision Notes - IGCSE
Maths Revision Notes - IGCSEMaths Revision Notes - IGCSE
Maths Revision Notes - IGCSERahul Jose
 
Complex numbers precalculus
Complex numbers   precalculusComplex numbers   precalculus
Complex numbers precalculusItumeleng Segona
 

Similar to Prime (20)

ch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.pptch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.ppt
 
Maths tricks -1
Maths tricks -1Maths tricks -1
Maths tricks -1
 
Rsa example
Rsa exampleRsa example
Rsa example
 
Geometry unit 7.1
Geometry unit 7.1Geometry unit 7.1
Geometry unit 7.1
 
Onlinetest360.com quantitative aptitude PDF
Onlinetest360.com quantitative aptitude PDFOnlinetest360.com quantitative aptitude PDF
Onlinetest360.com quantitative aptitude PDF
 
7.3 Solving Multi Step Frac Deci
7.3 Solving Multi Step Frac Deci7.3 Solving Multi Step Frac Deci
7.3 Solving Multi Step Frac Deci
 
Daa chapter 3
Daa chapter 3Daa chapter 3
Daa chapter 3
 
modul pembelajaran 4
modul pembelajaran 4modul pembelajaran 4
modul pembelajaran 4
 
MODULE_05-Matrix Decomposition.pptx
MODULE_05-Matrix Decomposition.pptxMODULE_05-Matrix Decomposition.pptx
MODULE_05-Matrix Decomposition.pptx
 
A higher problem solving strategy
A higher problem solving strategyA higher problem solving strategy
A higher problem solving strategy
 
C language numanal
C language numanalC language numanal
C language numanal
 
Ma3bfet par 10.6 5 aug 2014
Ma3bfet par 10.6 5 aug 2014Ma3bfet par 10.6 5 aug 2014
Ma3bfet par 10.6 5 aug 2014
 
PEA 305.pdf
PEA 305.pdfPEA 305.pdf
PEA 305.pdf
 
5 3 solving trig eqns
5 3 solving trig eqns5 3 solving trig eqns
5 3 solving trig eqns
 
MODULE 3.pptx
MODULE 3.pptxMODULE 3.pptx
MODULE 3.pptx
 
A study on number theory and its applications
A study on number theory and its applicationsA study on number theory and its applications
A study on number theory and its applications
 
AptitudeTestBook www.mechengg.net.pdf
AptitudeTestBook www.mechengg.net.pdfAptitudeTestBook www.mechengg.net.pdf
AptitudeTestBook www.mechengg.net.pdf
 
Maths Revision Notes - IGCSE
Maths Revision Notes - IGCSEMaths Revision Notes - IGCSE
Maths Revision Notes - IGCSE
 
Complex numbers precalculus
Complex numbers   precalculusComplex numbers   precalculus
Complex numbers precalculus
 
Topik 1
Topik 1Topik 1
Topik 1
 

Recently uploaded

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Prime

  • 1. 9. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations
  • 2. 9. 9.1.1 Definition Figure 9.1 Three groups of positive integers A prime is divisible only by itself and 1. Note
  • 3. 9. 9.1.1 Continued What is the smallest prime? Example 9.1 Solution The smallest prime is 2, which is divisible by 2 (itself) and 1. List the primes smaller than 10. Example 9.2 Solution There are four primes less than 10: 2, 3, 5, and 7. It is interesting to note that the percentage of primes in the range 1 to 10 is 40%. The percentage decreases as the range increases.
  • 4. 9. 9.1.2 Cardinality of Primes Infinite Number of Primes There is an infinite number of primes. Number of Primes Note
  • 5. 9. 9.1.2 Continued As a trivial example, assume that the only primes are in the set {2, 3, 5, 7, 11, 13, 17}. Here P = 510510 and P + 1 = 510511. However, 510511 = 19 × 97 × 277; none of these primes were in the original list. Therefore, there are three primes greater than 17. Example 9.3 Find the number of primes less than 1,000,000. Example 9.4 Solution The approximation gives the range 72,383 to 78,543. The actual number of primes is 78,498.
  • 6. 9. Given a number n, how can we determine if n is a prime? The answer is that we need to see if the number is divisible by all primes less than 9.1.3 Checking for Primeness We know that this method is inefficient, but it is a good start.
  • 7. 9. 9.1.3 Continued Is 97 a prime? Example 9.5 Is 301 a prime? Example 9.6 Solution The floor of  97 = 9. The primes less than 9 are 2, 3, 5, and 7. We need to see if 97 is divisible by any of these numbers. It is not, so 97 is a prime. Solution The floor of  301 = 17. We need to check 2, 3, 5, 7, 11, 13, and 17. The numbers 2, 3, and 5 do not divide 301, but 7 does. Therefore 301 is not a prime.
  • 8. 9. Sieve of Eratosthenes 9.1.3 Continued
  • 9. 9. Euler’s phi-function,  (n), which is sometimes called the Euler’s totient function plays a very important role in cryptography. 9.1.4 Euler’s Phi-Function
  • 10. 9. We can combine the above four rules to find the value of  (n). For example, if n can be factored as n = p 1 e 1 × p 2 e 2 × … × p k e k then we combine the third and the fourth rule to find 9.1.4 Continued The difficulty of finding  (n) depends on the difficulty of finding the factorization of n . Note
  • 11. 9. 9.1.4 Continued What is the value of  (13)? Example 9.7 Solution Because 13 is a prime,  (13) = (13 −1) = 12. What is the value of  (10)? Example 9.8 Solution We can use the third rule:  (10) =  (2) ×  (5) = 1 × 4 = 4, because 2 and 5 are primes.
  • 12. 9. 9.1.4 Continued What is the value of  (240)? Example 9.9 Solution We can write 240 = 2 4 × 3 1 × 5 1 . Then  (240) = (2 4 −2 3 ) × (3 1 − 3 0 ) × (5 1 − 5 0 ) = 64 Can we say that  (49) =  (7) ×  (7) = 6 × 6 = 36? Example 9.10 Solution No. The third rule applies when m and n are relatively prime. Here 49 = 7 2 . We need to use the fourth rule:  (49) = 7 2 − 7 1 = 42.
  • 13. 9. 9.1.4 Continued What is the number of elements in Z 14 *? Example 9.11 Solution The answer is  (14) =  (7) ×  (2) = 6 × 1 = 6. The members are 1, 3, 5, 9, 11, and 13. Interesting point: If n > 2, the value of  ( n ) is even. Note
  • 14. 9. 9.1.5 Fermat’s Little Theorem First Version a p ≡ a mod p a p − 1 ≡ 1 mod p Second Version
  • 15. 9. 9.1.5 Continued Find the result of 6 10 mod 11. Example 9.12 Solution We have 6 10 mod 11 = 1. This is the first version of Fermat’s little theorem where p = 11. Find the result of 3 12 mod 11. Example 9.13 Solution Here the exponent (12) and the modulus (11) are not the same. With substitution this can be solved using Fermat’s little theorem.
  • 16. 9. Multiplicative Inverses 9.1.5 Continued a −1 mod p = a p − 2 mod p The answers to multiplicative inverses modulo a prime can be found without using the extended Euclidean algorithm: Example 9.14
  • 17. 9. 9.1.6 Euler’s Theorem First Version a  (n) ≡ 1 (mod n) Second Version a k ×  (n) + 1 ≡ a (mod n) The second version of Euler’s theorem is used in the RSA cryptosystem in Chapter 10. Note
  • 18. 9. 9.1.5 Continued Find the result of 6 24 mod 35. Example 9.15 Solution We have 6 24 mod 35 = 6  (35) mod 35 = 1. Find the result of 20 62 mod 77. Example 9.16 Solution If we let k = 1 on the second version, we have 20 62 mod 77 = (20 mod 77) (20  (77) + 1 mod 77) mod 77 = (20)(20) mod 77 = 15.
  • 19. 9. Multiplicative Inverses Euler’s theorem can be used to find multiplicative inverses modulo a composite. 9.1.6 Continued a −1 mod n = a  (n)−1 mod n
  • 20. 9. 9.1.5 Continued The answers to multiplicative inverses modulo a composite can be found without using the extended Euclidean algorithm if we know the factorization of the composite: Example 9.17
  • 21. 9. 9-2 PRIMALITY TESTING Finding an algorithm to correctly and efficiently test a very large integer and output a prime or a composite has always been a challenge in number theory, and consequently in cryptography. However, recent developments look very promising. Topics discussed in this section: 9.2.1 Deterministic Algorithms 9.2.2 Probabilistic Algorithms 9.2.3 Recommended Primality Test
  • 22. 9. 9.2.2 Continued Miller-Rabin Test Figure 9.2 Idea behind Fermat primality test The Miller-Rabin test needs from step 0 to step k − 1. Note
  • 23. 9. 9.2.2 Continued
  • 24. 9. 9.2.2 Continued Does the number 561 pass the Miller-Rabin test? Example 9.25 Solution Using base 2, let 561 − 1 = 35 × 2 4 , which means m = 35, k = 4, and a = 2.
  • 25. 9. 9.2.2 Continued We already know that 27 is not a prime. Let us apply the Miller-Rabin test. Example 9.26 Solution With base 2, let 27 − 1 = 13 × 2 1 , which means that m = 13, k = 1, and a = 2. In this case, because k − 1 = 0, we should do only the initialization step: T = 2 13 mod 27 = 11 mod 27. However, because the algorithm never enters the loop, it returns a composite.
  • 26. 9. 9.2.2 Continued We know that 61 is a prime, let us see if it passes the Miller-Rabin test. Example 9.27 Solution We use base 2.
  • 27. 9. 9-4 CHINESE REMAINDER THEOREM The Chinese remainder theorem (CRT) is used to solve a set of congruent equations with one variable but different moduli, which are relatively prime, as shown below:
  • 28. 9. 9-4 Continued The following is an example of a set of equations with different moduli: Example 9.35 The solution to this set of equations is given in the next section; for the moment, note that the answer to this set of equations is x = 23. This value satisfies all equations: 23 ≡ 2 (mod 3), 23 ≡ 3 (mod 5), and 23 ≡ 2 (mod 7).
  • 29. 9. 9-4 Continued Solution To Chinese Remainder Theorem 1. Find M = m 1 × m 2 × … × m k . This is the common modulus. 2. Find M 1 = M/m 1 , M 2 = M/m 2 , …, M k = M/m k . 3. Find the multiplicative inverse of M 1 , M 2 , …, M k using the corresponding moduli (m 1 , m 2 , …, m k ). Call the inverses M 1 −1 , M 2 −1 , …, M k −1 . 4. The solution to the simultaneous equations is
  • 30. 9. 9-4 Continued Find the solution to the simultaneous equations: Example 9.36 Solution We follow the four steps. 1. M = 3 × 5 × 7 = 105 2. M 1 = 105 / 3 = 35, M 2 = 105 / 5 = 21, M 3 = 105 / 7 = 15 3. The inverses are M 1 −1 = 2, M 2 −1 = 1, M 3 −1 = 1 4. x = (2 × 35 × 2 + 3 × 21 × 1 + 2 × 15 × 1) mod 105 = 23 mod 105
  • 31. 9. 9-4 Continued Find an integer that has a remainder of 3 when divided by 7 and 13, but is divisible by 12. Example 9.37 Solution This is a CRT problem. We can form three equations and solve them to find the value of x. If we follow the four steps, we find x = 276. We can check that 276 = 3 mod 7, 276 = 3 mod 13 and 276 is divisible by 12 (the quotient is 23 and the remainder is zero).
  • 32. 9. 9-4 Continued Assume we need to calculate z = x + y where x = 123 and y = 334, but our system accepts only numbers less than 100. These numbers can be represented as follows: Example 9.38 Adding each congruence in x with the corresponding congruence in y gives Now three equations can be solved using the Chinese remainder theorem to find z. One of the acceptable answers is z = 457.