SlideShare a Scribd company logo
Chapter 4  Finite Fields
❏  To review the concept of algebraic structures ❏  To define and give some examples of groups ❏  To define and give some examples of rings ❏  To define and give some examples of fields ❏  To emphasize the finite fields of type GF(2 n )   that make it possible to perform operations such   as addition, subtraction, multiplication, and   division on  n -bit words in modern block ciphers Objectives Chapter 4
4-1  ALGEBRAIC STRUCTURES Cryptography requires sets of integers and specific operations that are defined for those sets. The combination of the set and the operations that are applied to the elements of the set is called an  algebraic structure . In this chapter, we will define three common algebraic structures: groups, rings, and fields. Topics discussed in this section: 4.1.1   Groups 4.1.2   Rings 4.1.3   Fields
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
4.1   Continued Figure 4.1  Common algebraic structure
Group: {G,   } ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4.1.1   Continued Figure 4.2  Group
4.1.1   Continued Application Although a group involves a single operation, the properties imposed on the operation allow the use of a pair of operations as long as they are inverses of each other.  The set of residue integers with the addition operator, G = < Z n  , +>,  is a commutative group. We can perform addition and subtraction on the elements of this set without moving out of the set.  Example 4.1
4.1.1   Continued The set Z n * with the multiplication operator, G = <Z n *, ×>, is also an abelian group.  Example 4.2 Let us define a set G = < { a ,  b ,  c ,  d }, •> and the operation as shown in Table 4.1. Example 4.3
Cyclic Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ring: {R, +,   } ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4.1.2  Ring A ring, R = <{…}, •, >, is an algebraic structure with two operations.  Figure 4.4  Ring
4.1.2   Continued Example 4.11 The set Z with two operations, addition and multiplication, is a commutative ring. We show it by R = <Z, +, ×>. Addition satisfies all of the five properties; multiplication satisfies only three properties.
Field {F, +,   } ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4.1.3  Field A field, denoted by F = <{…}, •, > is a commutative ring in which the second operation satisfies all five properties defined for the first operation except that the identity of the first operation has no inverse.  Figure 4.5  Field
4.1.3   Continued Galois showed that for a field to be finite, the number of elements should be  p n , where  p  is a prime and  n  is a positive integer.  Finite Fields  A Galois field, GF( p n ), is a finite field with  p n  elements. Note
4.1.3   Continued When  n  = 1, we have GF( p ) field. This field can be the set Z p , {0, 1, …, p − 1}, with two arithmetic operations. GF( p ) Fields
4.1.2   Continued Example 4.12 A very common field in this category is GF(2) with the set {0, 1} and two operations, addition and multiplication, as shown in Figure 4.6. Figure 4.6  GF(2) field
4.1.2   Continued Example 4.13 We can define GF(5) on the set Z 5  (5 is a prime) with addition and multiplication operators as shown in Figure 4.7. Figure 4.7  GF(5) field
4.1.3   Continued Table 4.3   Summary Summary
4.2   Continued Example 4.14 Let us define a GF(2 2 ) field in which the set has four 2-bit words: {00, 01, 10, 11}. We can redefine addition and multiplication for this field in such a way that all properties of these operations are satisfied, as shown in Figure 4.8. Figure 4.8  An example of GF(2 2 ) field
4.2.1   Continued GF( 2 n ) Fields Polynomials representing  n -bit words use two fields: GF(2) and GF(2 n ). Note
Modular Arithmetic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Divisors ,[object Object],[object Object],[object Object],[object Object],[object Object]
Properties 2.1.4  Continued Property 1: if a|1, then a = ±1. Property 2: if a|b and b|a, then a = ±b. Property 3: if a|b and b|c, then a|c. Property 4: if a|b and a|c, then    a|(m × b + n × c), where m   and n are arbitrary integers
Modular Arithmetic Operations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modular Operator Properties ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Modular Arithmetic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Residue classes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Residue class continue.. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multiplicative inverse(w -1 ): w  z  ≡  1 mod n
 
 
Formula for Finding Inverse. ,[object Object],[object Object],[object Object],[object Object]
Modular Arithmetic ,[object Object],[object Object]
Greatest Common Divisor (GCD) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Euclid's GCD Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example GCD(1970,1066) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modular Arithmetic ,[object Object],[object Object],[object Object],[object Object],[object Object]
Galois Fields ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Galois Fields GF(p) ,[object Object],[object Object],[object Object],[object Object]
Finding Inverses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Inverse of 550 in GF(1759)

More Related Content

What's hot

Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
DESIGN AND ANALYSIS OF ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMSDESIGN AND ANALYSIS OF ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMSGayathri Gaayu
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
Arpana shree
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
Abhishek Gautam
 
Stressen's matrix multiplication
Stressen's matrix multiplicationStressen's matrix multiplication
Stressen's matrix multiplicationKumar
 
Recognition-of-tokens
Recognition-of-tokensRecognition-of-tokens
Recognition-of-tokens
Dattatray Gandhmal
 
Chapter 22 Finite Field
Chapter 22 Finite FieldChapter 22 Finite Field
Chapter 22 Finite Field
Tony Cervera Jr.
 
Divide and conquer
Divide and conquerDivide and conquer
Divide and conquer
Vikas Sharma
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key Exchange
SAURABHDHAGE6
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
Computer_ at_home
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Shortest path algorithm
Shortest  path algorithmShortest  path algorithm
Shortest path algorithm
Subrata Kumer Paul
 
Chapter 5 Syntax Directed Translation
Chapter 5   Syntax Directed TranslationChapter 5   Syntax Directed Translation
Chapter 5 Syntax Directed Translation
Radhakrishnan Chinnusamy
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 

What's hot (20)

Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Ch04
Ch04Ch04
Ch04
 
DESIGN AND ANALYSIS OF ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMSDESIGN AND ANALYSIS OF ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMS
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
Stressen's matrix multiplication
Stressen's matrix multiplicationStressen's matrix multiplication
Stressen's matrix multiplication
 
Recognition-of-tokens
Recognition-of-tokensRecognition-of-tokens
Recognition-of-tokens
 
Chapter 22 Finite Field
Chapter 22 Finite FieldChapter 22 Finite Field
Chapter 22 Finite Field
 
Divide and conquer
Divide and conquerDivide and conquer
Divide and conquer
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key Exchange
 
Cryptography
CryptographyCryptography
Cryptography
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Unit 3
Unit 3Unit 3
Unit 3
 
Shortest path algorithm
Shortest  path algorithmShortest  path algorithm
Shortest path algorithm
 
Chapter 5 Syntax Directed Translation
Chapter 5   Syntax Directed TranslationChapter 5   Syntax Directed Translation
Chapter 5 Syntax Directed Translation
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 

Viewers also liked

Galois field
Galois fieldGalois field
Galois field
Niaj Morshed
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
هيثم فرج
 
Ch01
Ch01Ch01
Ch01n C
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
Pawandeep Kaur
 
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
Thara
TharaThara
Adjacency Decomposition Method: Breaking up problems
Adjacency Decomposition Method: Breaking up problemsAdjacency Decomposition Method: Breaking up problems
Adjacency Decomposition Method: Breaking up problems
Jayant Apte, PhD
 
Finite fields
Finite fieldsFinite fields
Finite fields
Loeky Haryanto
 
Presentation-Alex-20150421
Presentation-Alex-20150421Presentation-Alex-20150421
Presentation-Alex-20150421alexfang2014
 
A Short Study of Galois Field
A Short Study of Galois FieldA Short Study of Galois Field
A Short Study of Galois Field
Hazratali Naim
 
Spin-Seeback Effect: a review
Spin-Seeback Effect: a reviewSpin-Seeback Effect: a review
Spin-Seeback Effect: a reviewDongwook Go
 
A crash course on group theory
A crash course on group theoryA crash course on group theory
A crash course on group theoryDongwook Go
 
Star Polygons - Application of Cyclic Group
Star Polygons - Application of Cyclic GroupStar Polygons - Application of Cyclic Group
Star Polygons - Application of Cyclic Group
Divyansh Verma
 
Group Theory
Group TheoryGroup Theory
Group Theory
Durgesh Chahar
 
X2 t01 09 de moivres theorem
X2 t01 09 de moivres theoremX2 t01 09 de moivres theorem
X2 t01 09 de moivres theoremNigel Simmons
 
Cyclic group- group theory
Cyclic group- group theoryCyclic group- group theory
Cyclic group- group theory
Ayush Agrawal
 
Chapter 4 Cyclic Groups
Chapter 4 Cyclic GroupsChapter 4 Cyclic Groups
Chapter 4 Cyclic Groups
Tony Cervera Jr.
 

Viewers also liked (20)

Ch08
Ch08Ch08
Ch08
 
Galois field
Galois fieldGalois field
Galois field
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Ch01
Ch01Ch01
Ch01
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Thara
TharaThara
Thara
 
Adjacency Decomposition Method: Breaking up problems
Adjacency Decomposition Method: Breaking up problemsAdjacency Decomposition Method: Breaking up problems
Adjacency Decomposition Method: Breaking up problems
 
Finite fields
Finite fieldsFinite fields
Finite fields
 
Presentation-Alex-20150421
Presentation-Alex-20150421Presentation-Alex-20150421
Presentation-Alex-20150421
 
A Short Study of Galois Field
A Short Study of Galois FieldA Short Study of Galois Field
A Short Study of Galois Field
 
Spin-Seeback Effect: a review
Spin-Seeback Effect: a reviewSpin-Seeback Effect: a review
Spin-Seeback Effect: a review
 
A crash course on group theory
A crash course on group theoryA crash course on group theory
A crash course on group theory
 
Star Polygons - Application of Cyclic Group
Star Polygons - Application of Cyclic GroupStar Polygons - Application of Cyclic Group
Star Polygons - Application of Cyclic Group
 
Group Theory
Group TheoryGroup Theory
Group Theory
 
X2 t01 09 de moivres theorem
X2 t01 09 de moivres theoremX2 t01 09 de moivres theorem
X2 t01 09 de moivres theorem
 
Cyclic group- group theory
Cyclic group- group theoryCyclic group- group theory
Cyclic group- group theory
 
Chapter 4 Cyclic Groups
Chapter 4 Cyclic GroupsChapter 4 Cyclic Groups
Chapter 4 Cyclic Groups
 

Similar to Chap4

Number theory
Number theoryNumber theory
Number theory
dhivyakesavan3
 
CH04.ppt
CH04.pptCH04.ppt
Cryptography and Network Security chapter 4.ppt
Cryptography and Network Security chapter 4.pptCryptography and Network Security chapter 4.ppt
Cryptography and Network Security chapter 4.ppt
the9amit
 
GTR final project
GTR final projectGTR final project
GTR final project
ChemistMikeLam
 
Finite fields
Finite fields Finite fields
Finite fields
BhumikaPal1
 
Ayush Jajoo(MCA2501622) AOA .pptx
Ayush Jajoo(MCA2501622) AOA .pptxAyush Jajoo(MCA2501622) AOA .pptx
Ayush Jajoo(MCA2501622) AOA .pptx
AmanChoudhary329978
 
Information Security Seminar #2
Information Security Seminar #2Information Security Seminar #2
Information Security Seminar #2
Alexander Kolybelnikov
 
11848 ch04(1) (1)
11848 ch04(1) (1)11848 ch04(1) (1)
11848 ch04(1) (1)
Debanjan Bhattacharya
 
CRYPTOGRAPHY AND NUMBER THEORY, he ha huli
CRYPTOGRAPHY AND NUMBER THEORY, he ha huliCRYPTOGRAPHY AND NUMBER THEORY, he ha huli
CRYPTOGRAPHY AND NUMBER THEORY, he ha huli
harshmacduacin
 
Recursive Definitions in Discrete Mathmatcs.pptx
Recursive Definitions in Discrete Mathmatcs.pptxRecursive Definitions in Discrete Mathmatcs.pptx
Recursive Definitions in Discrete Mathmatcs.pptx
gbikorno
 
Modular arithmetic
Modular arithmeticModular arithmetic
Modular arithmetic
Janani S
 
Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...
Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...
Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...
Larino Jr Salazar Pelaosa
 
02-Basic Structures .ppt
02-Basic Structures .ppt02-Basic Structures .ppt
02-Basic Structures .ppt
Acct4
 
sheet6.pdf
sheet6.pdfsheet6.pdf
sheet6.pdf
aminasouyah
 
doc6.pdf
doc6.pdfdoc6.pdf
doc6.pdf
aminasouyah
 

Similar to Chap4 (20)

Number theory
Number theoryNumber theory
Number theory
 
CH04.ppt
CH04.pptCH04.ppt
CH04.ppt
 
Cryptography and Network Security chapter 4.ppt
Cryptography and Network Security chapter 4.pptCryptography and Network Security chapter 4.ppt
Cryptography and Network Security chapter 4.ppt
 
GTR final project
GTR final projectGTR final project
GTR final project
 
Finite fields
Finite fields Finite fields
Finite fields
 
2.ppt
2.ppt2.ppt
2.ppt
 
Ayush Jajoo(MCA2501622) AOA .pptx
Ayush Jajoo(MCA2501622) AOA .pptxAyush Jajoo(MCA2501622) AOA .pptx
Ayush Jajoo(MCA2501622) AOA .pptx
 
Hay hay
Hay hayHay hay
Hay hay
 
Information Security Seminar #2
Information Security Seminar #2Information Security Seminar #2
Information Security Seminar #2
 
Number theory lecture (part 1)
Number theory lecture (part 1)Number theory lecture (part 1)
Number theory lecture (part 1)
 
11848 ch04(1) (1)
11848 ch04(1) (1)11848 ch04(1) (1)
11848 ch04(1) (1)
 
11848 ch04
11848 ch0411848 ch04
11848 ch04
 
11848 ch04(1)
11848 ch04(1)11848 ch04(1)
11848 ch04(1)
 
CRYPTOGRAPHY AND NUMBER THEORY, he ha huli
CRYPTOGRAPHY AND NUMBER THEORY, he ha huliCRYPTOGRAPHY AND NUMBER THEORY, he ha huli
CRYPTOGRAPHY AND NUMBER THEORY, he ha huli
 
Recursive Definitions in Discrete Mathmatcs.pptx
Recursive Definitions in Discrete Mathmatcs.pptxRecursive Definitions in Discrete Mathmatcs.pptx
Recursive Definitions in Discrete Mathmatcs.pptx
 
Modular arithmetic
Modular arithmeticModular arithmetic
Modular arithmetic
 
Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...
Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...
Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...
 
02-Basic Structures .ppt
02-Basic Structures .ppt02-Basic Structures .ppt
02-Basic Structures .ppt
 
sheet6.pdf
sheet6.pdfsheet6.pdf
sheet6.pdf
 
doc6.pdf
doc6.pdfdoc6.pdf
doc6.pdf
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 

Chap4

  • 1. Chapter 4 Finite Fields
  • 2. ❏ To review the concept of algebraic structures ❏ To define and give some examples of groups ❏ To define and give some examples of rings ❏ To define and give some examples of fields ❏ To emphasize the finite fields of type GF(2 n ) that make it possible to perform operations such as addition, subtraction, multiplication, and division on n -bit words in modern block ciphers Objectives Chapter 4
  • 3. 4-1 ALGEBRAIC STRUCTURES Cryptography requires sets of integers and specific operations that are defined for those sets. The combination of the set and the operations that are applied to the elements of the set is called an algebraic structure . In this chapter, we will define three common algebraic structures: groups, rings, and fields. Topics discussed in this section: 4.1.1 Groups 4.1.2 Rings 4.1.3 Fields
  • 4.
  • 5. 4.1 Continued Figure 4.1 Common algebraic structure
  • 6.
  • 7. 4.1.1 Continued Figure 4.2 Group
  • 8. 4.1.1 Continued Application Although a group involves a single operation, the properties imposed on the operation allow the use of a pair of operations as long as they are inverses of each other. The set of residue integers with the addition operator, G = < Z n , +>, is a commutative group. We can perform addition and subtraction on the elements of this set without moving out of the set. Example 4.1
  • 9. 4.1.1 Continued The set Z n * with the multiplication operator, G = <Z n *, ×>, is also an abelian group. Example 4.2 Let us define a set G = < { a , b , c , d }, •> and the operation as shown in Table 4.1. Example 4.3
  • 10.
  • 11.
  • 12. 4.1.2 Ring A ring, R = <{…}, •, >, is an algebraic structure with two operations. Figure 4.4 Ring
  • 13. 4.1.2 Continued Example 4.11 The set Z with two operations, addition and multiplication, is a commutative ring. We show it by R = <Z, +, ×>. Addition satisfies all of the five properties; multiplication satisfies only three properties.
  • 14.
  • 15. 4.1.3 Field A field, denoted by F = <{…}, •, > is a commutative ring in which the second operation satisfies all five properties defined for the first operation except that the identity of the first operation has no inverse. Figure 4.5 Field
  • 16. 4.1.3 Continued Galois showed that for a field to be finite, the number of elements should be p n , where p is a prime and n is a positive integer. Finite Fields A Galois field, GF( p n ), is a finite field with p n elements. Note
  • 17. 4.1.3 Continued When n = 1, we have GF( p ) field. This field can be the set Z p , {0, 1, …, p − 1}, with two arithmetic operations. GF( p ) Fields
  • 18. 4.1.2 Continued Example 4.12 A very common field in this category is GF(2) with the set {0, 1} and two operations, addition and multiplication, as shown in Figure 4.6. Figure 4.6 GF(2) field
  • 19. 4.1.2 Continued Example 4.13 We can define GF(5) on the set Z 5 (5 is a prime) with addition and multiplication operators as shown in Figure 4.7. Figure 4.7 GF(5) field
  • 20. 4.1.3 Continued Table 4.3 Summary Summary
  • 21. 4.2 Continued Example 4.14 Let us define a GF(2 2 ) field in which the set has four 2-bit words: {00, 01, 10, 11}. We can redefine addition and multiplication for this field in such a way that all properties of these operations are satisfied, as shown in Figure 4.8. Figure 4.8 An example of GF(2 2 ) field
  • 22. 4.2.1 Continued GF( 2 n ) Fields Polynomials representing n -bit words use two fields: GF(2) and GF(2 n ). Note
  • 23.
  • 24.
  • 25. Properties 2.1.4 Continued Property 1: if a|1, then a = ±1. Property 2: if a|b and b|a, then a = ±b. Property 3: if a|b and b|c, then a|c. Property 4: if a|b and a|c, then a|(m × b + n × c), where m and n are arbitrary integers
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. Multiplicative inverse(w -1 ): w  z ≡ 1 mod n
  • 33.  
  • 34.  
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. Inverse of 550 in GF(1759)