SlideShare a Scribd company logo
1 of 32
9. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations
9. 9.1.1  Definition Figure 9.1  Three groups of positive integers A prime is divisible only by itself and 1. Note
9. 9.1.1   Continued What is the smallest prime? Example 9.1 Solution The smallest prime is 2, which is divisible by 2 (itself) and 1.  List the primes smaller than 10. Example 9.2 Solution There are four primes less than 10: 2, 3, 5, and 7. It is interesting to note that the percentage of primes in the range 1 to 10 is 40%. The percentage decreases as the range increases.
9. 9.1.2  Cardinality of Primes Infinite Number of Primes There is an infinite number of primes. Number of Primes Note
9. 9.1.2   Continued As a trivial example, assume that the only primes are in the set  {2, 3, 5, 7, 11, 13, 17}. Here P = 510510 and P + 1 = 510511. However, 510511 = 19 × 97 × 277; none of these primes were in the original list. Therefore, there are three primes greater than 17. Example 9.3 Find the number of primes less than 1,000,000. Example 9.4 Solution The approximation gives the range 72,383 to 78,543. The actual number of primes is 78,498.
9. Given a number n, how can we determine if n is a prime? The answer is that we need to see if the number is divisible by all primes less than 9.1.3  Checking for Primeness We know that this method is inefficient, but it is a good start.
9. 9.1.3   Continued Is 97 a prime? Example 9.5 Is 301 a prime? Example 9.6 Solution The floor of   97 = 9. The primes less than 9 are 2, 3, 5, and 7. We need to see if 97 is divisible by any of these numbers. It is not, so 97 is a prime. Solution The floor of   301 = 17. We need to check 2, 3, 5, 7, 11, 13, and 17. The numbers 2, 3, and 5 do not divide 301, but 7 does. Therefore 301 is not a prime.
9. Sieve of Eratosthenes 9.1.3  Continued
9. Euler’s phi-function,   (n), which is sometimes called the Euler’s totient function  plays a very important role in cryptography.  9.1.4  Euler’s Phi-Function
9. We can combine the above four rules to find the value of   (n). For example, if n can be factored as  n = p 1 e 1   × p 2 e 2  × … × p k e k  then we combine the third and the fourth rule to find 9.1.4  Continued The difficulty of finding   (n) depends on the difficulty of finding the factorization of  n . Note
9. 9.1.4   Continued What is the value of   (13)? Example 9.7 Solution Because 13 is a prime,   (13) = (13 −1) = 12. What is the value of   (10)? Example 9.8 Solution We can use the third rule:   (10) =   (2) ×   (5) = 1 × 4 = 4, because 2 and 5 are primes.
9. 9.1.4   Continued What is the value of   (240)? Example 9.9 Solution We can write 240 = 2 4  × 3 1  × 5 1 . Then  (240) = (2 4  −2 3 ) × (3 1  − 3 0 ) × (5 1  − 5 0 ) = 64 Can we say that   (49) =   (7) ×   (7) = 6 × 6 = 36? Example 9.10 Solution No. The third rule applies when  m  and  n  are relatively prime. Here 49 = 7 2 . We need to use the fourth rule:   (49) = 7 2  − 7 1  = 42.
9. 9.1.4   Continued What is the number of elements in Z 14 *? Example 9.11 Solution The answer is   (14) =   (7) ×   (2) = 6 × 1 = 6. The members are 1, 3, 5, 9, 11, and 13. Interesting point: If  n  > 2, the value of   ( n ) is even. Note
9. 9.1.5  Fermat’s Little Theorem First Version a p  ≡ a mod p a p − 1  ≡ 1 mod p Second Version
9. 9.1.5   Continued Find the result of 6 10  mod 11. Example 9.12 Solution We have 6 10  mod 11 = 1. This is the first version of Fermat’s little theorem where  p  = 11. Find the result of 3 12  mod 11. Example 9.13 Solution Here the exponent (12) and the modulus (11) are not the same. With substitution this can be solved using Fermat’s little theorem.
9. Multiplicative Inverses   9.1.5  Continued a −1  mod p = a  p − 2  mod p The answers to multiplicative inverses modulo a prime can be found without using the extended Euclidean algorithm: Example 9.14
9. 9.1.6  Euler’s Theorem First Version a  (n)  ≡ 1 (mod n) Second Version a  k ×   (n) + 1  ≡  a (mod n) The second version of Euler’s theorem is used in the RSA cryptosystem in Chapter 10. Note
9. 9.1.5   Continued Find the result of 6 24  mod 35. Example 9.15 Solution We have 6 24  mod 35 = 6  (35)  mod 35 = 1. Find the result of 20 62  mod 77. Example 9.16 Solution If we let  k  = 1 on the second version, we have  20 62  mod 77 = (20 mod 77) (20  (77)   + 1  mod 77) mod 77  = (20)(20) mod 77 = 15.
9. Multiplicative Inverses  Euler’s theorem can be used to find multiplicative inverses modulo a composite.  9.1.6  Continued a −1  mod n = a  (n)−1  mod n
9. 9.1.5   Continued The answers to multiplicative inverses modulo a composite can be found without using the extended Euclidean algorithm if we know the factorization of the composite: Example 9.17
9. 9-2  PRIMALITY TESTING Finding an algorithm to correctly and efficiently test a very large integer and output a prime or a composite has always been a challenge in number theory, and consequently in cryptography. However, recent developments look very promising. Topics discussed in this section: 9.2.1 Deterministic Algorithms 9.2.2 Probabilistic Algorithms 9.2.3 Recommended Primality Test
9. 9.2.2  Continued Miller-Rabin Test Figure 9.2  Idea behind Fermat primality test The Miller-Rabin test needs from step  0 to step  k  − 1. Note
9. 9.2.2  Continued
9. 9.2.2   Continued Does the number 561 pass the Miller-Rabin test? Example 9.25 Solution Using base 2, let 561 − 1 = 35 × 2 4 , which means  m  = 35,  k  = 4, and  a  = 2.
9. 9.2.2   Continued We already know that 27 is not a prime. Let us apply the Miller-Rabin test. Example 9.26 Solution With base 2, let 27 − 1 = 13 × 2 1 , which means that  m  = 13,  k  = 1, and  a  = 2. In this case, because  k  − 1 = 0, we should do only the initialization step: T = 2 13  mod 27 = 11 mod 27. However, because the algorithm never enters the loop, it returns a composite.
9. 9.2.2   Continued We know that 61 is a prime, let us see if it passes the Miller-Rabin test. Example 9.27 Solution We use base 2.
9. 9-4  CHINESE REMAINDER THEOREM The Chinese remainder theorem (CRT) is used to solve a set of congruent equations with one variable but different moduli, which are relatively prime, as shown below:
9. 9-4  Continued The following is an example of a set of equations with different moduli: Example 9.35 The solution to this set of equations is given in the next section; for the moment, note that the answer to this set of equations is x = 23. This value satisfies all equations: 23 ≡ 2 (mod 3), 23 ≡ 3 (mod 5), and 23 ≡ 2 (mod 7).
9. 9-4  Continued Solution To Chinese Remainder Theorem 1. Find M = m 1  × m 2  × … × m k . This is the common modulus. 2. Find M 1  = M/m 1 , M 2  = M/m 2 , …, M k  = M/m k . 3. Find the multiplicative inverse of M 1 , M 2 , …, M k  using the   corresponding moduli (m 1 , m 2 , …, m k ). Call the inverses   M 1 −1 , M 2 −1 , …, M k   −1 . 4. The solution to the simultaneous equations is
9. 9-4  Continued Find the solution to the simultaneous equations: Example 9.36 Solution We follow the four steps. 1. M = 3 × 5 × 7 = 105 2. M 1  = 105 / 3 = 35, M 2  = 105 / 5 = 21, M 3  = 105 / 7 = 15 3. The inverses are M 1 −1  = 2, M 2 −1  = 1, M 3   −1  = 1 4. x = (2 × 35 × 2 + 3 × 21 × 1 + 2 × 15 × 1) mod 105 = 23 mod 105
9. 9-4  Continued Find an integer that has a remainder of 3 when divided by 7 and 13, but is divisible by 12. Example 9.37 Solution This is a CRT problem. We can form three equations and solve them to find the value of x. If we follow the four steps, we find x = 276. We can check that  276 = 3 mod 7, 276 = 3 mod 13 and 276 is divisible by 12 (the quotient is 23 and the remainder is zero).
9. 9-4  Continued Assume we need to calculate  z  =  x  +  y  where  x  = 123 and  y  = 334, but our system accepts only numbers less than 100. These numbers can be represented as follows: Example 9.38 Adding each congruence in  x  with the corresponding congruence in  y  gives Now three equations can be solved using the Chinese remainder theorem to find z. One of the acceptable answers is  z  = 457.

More Related Content

What's hot

What's hot (20)

Fermat and euler theorem
Fermat and euler theoremFermat and euler theorem
Fermat and euler theorem
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Asymmetric Cryptography.pptx
Asymmetric Cryptography.pptxAsymmetric Cryptography.pptx
Asymmetric Cryptography.pptx
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
Ch08
Ch08Ch08
Ch08
 
ch-10.ppt
ch-10.pptch-10.ppt
ch-10.ppt
 
Activity selection problem
Activity selection problemActivity selection problem
Activity selection problem
 
Elliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve Cryptography
 
Rsa
RsaRsa
Rsa
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Visual cryptography for color images
Visual cryptography for color imagesVisual cryptography for color images
Visual cryptography for color images
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
DES
DESDES
DES
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Elgamal & schnorr digital signature scheme copy
Elgamal & schnorr digital signature scheme   copyElgamal & schnorr digital signature scheme   copy
Elgamal & schnorr digital signature scheme copy
 
Rsa
RsaRsa
Rsa
 
Lecture-9.pptx
Lecture-9.pptxLecture-9.pptx
Lecture-9.pptx
 
Dynamic pgmming
Dynamic pgmmingDynamic pgmming
Dynamic pgmming
 

Viewers also liked

Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
Kelly Bresnahan
 
Solid modeling
Solid modelingSolid modeling
Solid modeling
KRvEsL
 

Viewers also liked (10)

Public Key Algorithms
Public Key AlgorithmsPublic Key Algorithms
Public Key Algorithms
 
Complex numbers, neeton's method and fractals
Complex numbers, neeton's method and fractalsComplex numbers, neeton's method and fractals
Complex numbers, neeton's method and fractals
 
fractals
fractalsfractals
fractals
 
Fractal Geometry Course
Fractal Geometry CourseFractal Geometry Course
Fractal Geometry Course
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Fractal
FractalFractal
Fractal
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Solid modeling
Solid modelingSolid modeling
Solid modeling
 
Solid modelling cg
Solid modelling cgSolid modelling cg
Solid modelling cg
 
Fractals
FractalsFractals
Fractals
 

Similar to Prime

ch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.pptch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.ppt
tahirnaquash2
 
modul pembelajaran 4
modul pembelajaran 4modul pembelajaran 4
modul pembelajaran 4
Ajrina Pia
 
A higher problem solving strategy
A higher problem solving strategyA higher problem solving strategy
A higher problem solving strategy
Aan Hendroanto
 

Similar to Prime (20)

ch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.pptch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.ppt
 
Ch08
Ch08Ch08
Ch08
 
Maths tricks -1
Maths tricks -1Maths tricks -1
Maths tricks -1
 
Rsa example
Rsa exampleRsa example
Rsa example
 
Geometry unit 7.1
Geometry unit 7.1Geometry unit 7.1
Geometry unit 7.1
 
Onlinetest360.com quantitative aptitude PDF
Onlinetest360.com quantitative aptitude PDFOnlinetest360.com quantitative aptitude PDF
Onlinetest360.com quantitative aptitude PDF
 
7.3 Solving Multi Step Frac Deci
7.3 Solving Multi Step Frac Deci7.3 Solving Multi Step Frac Deci
7.3 Solving Multi Step Frac Deci
 
Daa chapter 3
Daa chapter 3Daa chapter 3
Daa chapter 3
 
modul pembelajaran 4
modul pembelajaran 4modul pembelajaran 4
modul pembelajaran 4
 
MODULE_05-Matrix Decomposition.pptx
MODULE_05-Matrix Decomposition.pptxMODULE_05-Matrix Decomposition.pptx
MODULE_05-Matrix Decomposition.pptx
 
A higher problem solving strategy
A higher problem solving strategyA higher problem solving strategy
A higher problem solving strategy
 
C language numanal
C language numanalC language numanal
C language numanal
 
Ma3bfet par 10.6 5 aug 2014
Ma3bfet par 10.6 5 aug 2014Ma3bfet par 10.6 5 aug 2014
Ma3bfet par 10.6 5 aug 2014
 
PEA 305.pdf
PEA 305.pdfPEA 305.pdf
PEA 305.pdf
 
5 3 solving trig eqns
5 3 solving trig eqns5 3 solving trig eqns
5 3 solving trig eqns
 
MODULE 3.pptx
MODULE 3.pptxMODULE 3.pptx
MODULE 3.pptx
 
A study on number theory and its applications
A study on number theory and its applicationsA study on number theory and its applications
A study on number theory and its applications
 
AptitudeTestBook www.mechengg.net.pdf
AptitudeTestBook www.mechengg.net.pdfAptitudeTestBook www.mechengg.net.pdf
AptitudeTestBook www.mechengg.net.pdf
 
Maths Revision Notes - IGCSE
Maths Revision Notes - IGCSEMaths Revision Notes - IGCSE
Maths Revision Notes - IGCSE
 
Complex numbers precalculus
Complex numbers   precalculusComplex numbers   precalculus
Complex numbers precalculus
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Prime

  • 1. 9. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations
  • 2. 9. 9.1.1 Definition Figure 9.1 Three groups of positive integers A prime is divisible only by itself and 1. Note
  • 3. 9. 9.1.1 Continued What is the smallest prime? Example 9.1 Solution The smallest prime is 2, which is divisible by 2 (itself) and 1. List the primes smaller than 10. Example 9.2 Solution There are four primes less than 10: 2, 3, 5, and 7. It is interesting to note that the percentage of primes in the range 1 to 10 is 40%. The percentage decreases as the range increases.
  • 4. 9. 9.1.2 Cardinality of Primes Infinite Number of Primes There is an infinite number of primes. Number of Primes Note
  • 5. 9. 9.1.2 Continued As a trivial example, assume that the only primes are in the set {2, 3, 5, 7, 11, 13, 17}. Here P = 510510 and P + 1 = 510511. However, 510511 = 19 × 97 × 277; none of these primes were in the original list. Therefore, there are three primes greater than 17. Example 9.3 Find the number of primes less than 1,000,000. Example 9.4 Solution The approximation gives the range 72,383 to 78,543. The actual number of primes is 78,498.
  • 6. 9. Given a number n, how can we determine if n is a prime? The answer is that we need to see if the number is divisible by all primes less than 9.1.3 Checking for Primeness We know that this method is inefficient, but it is a good start.
  • 7. 9. 9.1.3 Continued Is 97 a prime? Example 9.5 Is 301 a prime? Example 9.6 Solution The floor of  97 = 9. The primes less than 9 are 2, 3, 5, and 7. We need to see if 97 is divisible by any of these numbers. It is not, so 97 is a prime. Solution The floor of  301 = 17. We need to check 2, 3, 5, 7, 11, 13, and 17. The numbers 2, 3, and 5 do not divide 301, but 7 does. Therefore 301 is not a prime.
  • 8. 9. Sieve of Eratosthenes 9.1.3 Continued
  • 9. 9. Euler’s phi-function,  (n), which is sometimes called the Euler’s totient function plays a very important role in cryptography. 9.1.4 Euler’s Phi-Function
  • 10. 9. We can combine the above four rules to find the value of  (n). For example, if n can be factored as n = p 1 e 1 × p 2 e 2 × … × p k e k then we combine the third and the fourth rule to find 9.1.4 Continued The difficulty of finding  (n) depends on the difficulty of finding the factorization of n . Note
  • 11. 9. 9.1.4 Continued What is the value of  (13)? Example 9.7 Solution Because 13 is a prime,  (13) = (13 −1) = 12. What is the value of  (10)? Example 9.8 Solution We can use the third rule:  (10) =  (2) ×  (5) = 1 × 4 = 4, because 2 and 5 are primes.
  • 12. 9. 9.1.4 Continued What is the value of  (240)? Example 9.9 Solution We can write 240 = 2 4 × 3 1 × 5 1 . Then  (240) = (2 4 −2 3 ) × (3 1 − 3 0 ) × (5 1 − 5 0 ) = 64 Can we say that  (49) =  (7) ×  (7) = 6 × 6 = 36? Example 9.10 Solution No. The third rule applies when m and n are relatively prime. Here 49 = 7 2 . We need to use the fourth rule:  (49) = 7 2 − 7 1 = 42.
  • 13. 9. 9.1.4 Continued What is the number of elements in Z 14 *? Example 9.11 Solution The answer is  (14) =  (7) ×  (2) = 6 × 1 = 6. The members are 1, 3, 5, 9, 11, and 13. Interesting point: If n > 2, the value of  ( n ) is even. Note
  • 14. 9. 9.1.5 Fermat’s Little Theorem First Version a p ≡ a mod p a p − 1 ≡ 1 mod p Second Version
  • 15. 9. 9.1.5 Continued Find the result of 6 10 mod 11. Example 9.12 Solution We have 6 10 mod 11 = 1. This is the first version of Fermat’s little theorem where p = 11. Find the result of 3 12 mod 11. Example 9.13 Solution Here the exponent (12) and the modulus (11) are not the same. With substitution this can be solved using Fermat’s little theorem.
  • 16. 9. Multiplicative Inverses 9.1.5 Continued a −1 mod p = a p − 2 mod p The answers to multiplicative inverses modulo a prime can be found without using the extended Euclidean algorithm: Example 9.14
  • 17. 9. 9.1.6 Euler’s Theorem First Version a  (n) ≡ 1 (mod n) Second Version a k ×  (n) + 1 ≡ a (mod n) The second version of Euler’s theorem is used in the RSA cryptosystem in Chapter 10. Note
  • 18. 9. 9.1.5 Continued Find the result of 6 24 mod 35. Example 9.15 Solution We have 6 24 mod 35 = 6  (35) mod 35 = 1. Find the result of 20 62 mod 77. Example 9.16 Solution If we let k = 1 on the second version, we have 20 62 mod 77 = (20 mod 77) (20  (77) + 1 mod 77) mod 77 = (20)(20) mod 77 = 15.
  • 19. 9. Multiplicative Inverses Euler’s theorem can be used to find multiplicative inverses modulo a composite. 9.1.6 Continued a −1 mod n = a  (n)−1 mod n
  • 20. 9. 9.1.5 Continued The answers to multiplicative inverses modulo a composite can be found without using the extended Euclidean algorithm if we know the factorization of the composite: Example 9.17
  • 21. 9. 9-2 PRIMALITY TESTING Finding an algorithm to correctly and efficiently test a very large integer and output a prime or a composite has always been a challenge in number theory, and consequently in cryptography. However, recent developments look very promising. Topics discussed in this section: 9.2.1 Deterministic Algorithms 9.2.2 Probabilistic Algorithms 9.2.3 Recommended Primality Test
  • 22. 9. 9.2.2 Continued Miller-Rabin Test Figure 9.2 Idea behind Fermat primality test The Miller-Rabin test needs from step 0 to step k − 1. Note
  • 23. 9. 9.2.2 Continued
  • 24. 9. 9.2.2 Continued Does the number 561 pass the Miller-Rabin test? Example 9.25 Solution Using base 2, let 561 − 1 = 35 × 2 4 , which means m = 35, k = 4, and a = 2.
  • 25. 9. 9.2.2 Continued We already know that 27 is not a prime. Let us apply the Miller-Rabin test. Example 9.26 Solution With base 2, let 27 − 1 = 13 × 2 1 , which means that m = 13, k = 1, and a = 2. In this case, because k − 1 = 0, we should do only the initialization step: T = 2 13 mod 27 = 11 mod 27. However, because the algorithm never enters the loop, it returns a composite.
  • 26. 9. 9.2.2 Continued We know that 61 is a prime, let us see if it passes the Miller-Rabin test. Example 9.27 Solution We use base 2.
  • 27. 9. 9-4 CHINESE REMAINDER THEOREM The Chinese remainder theorem (CRT) is used to solve a set of congruent equations with one variable but different moduli, which are relatively prime, as shown below:
  • 28. 9. 9-4 Continued The following is an example of a set of equations with different moduli: Example 9.35 The solution to this set of equations is given in the next section; for the moment, note that the answer to this set of equations is x = 23. This value satisfies all equations: 23 ≡ 2 (mod 3), 23 ≡ 3 (mod 5), and 23 ≡ 2 (mod 7).
  • 29. 9. 9-4 Continued Solution To Chinese Remainder Theorem 1. Find M = m 1 × m 2 × … × m k . This is the common modulus. 2. Find M 1 = M/m 1 , M 2 = M/m 2 , …, M k = M/m k . 3. Find the multiplicative inverse of M 1 , M 2 , …, M k using the corresponding moduli (m 1 , m 2 , …, m k ). Call the inverses M 1 −1 , M 2 −1 , …, M k −1 . 4. The solution to the simultaneous equations is
  • 30. 9. 9-4 Continued Find the solution to the simultaneous equations: Example 9.36 Solution We follow the four steps. 1. M = 3 × 5 × 7 = 105 2. M 1 = 105 / 3 = 35, M 2 = 105 / 5 = 21, M 3 = 105 / 7 = 15 3. The inverses are M 1 −1 = 2, M 2 −1 = 1, M 3 −1 = 1 4. x = (2 × 35 × 2 + 3 × 21 × 1 + 2 × 15 × 1) mod 105 = 23 mod 105
  • 31. 9. 9-4 Continued Find an integer that has a remainder of 3 when divided by 7 and 13, but is divisible by 12. Example 9.37 Solution This is a CRT problem. We can form three equations and solve them to find the value of x. If we follow the four steps, we find x = 276. We can check that 276 = 3 mod 7, 276 = 3 mod 13 and 276 is divisible by 12 (the quotient is 23 and the remainder is zero).
  • 32. 9. 9-4 Continued Assume we need to calculate z = x + y where x = 123 and y = 334, but our system accepts only numbers less than 100. These numbers can be represented as follows: Example 9.38 Adding each congruence in x with the corresponding congruence in y gives Now three equations can be solved using the Chinese remainder theorem to find z. One of the acceptable answers is z = 457.