SlideShare a Scribd company logo
Name: Zalte Sayali Pandurang
PRN: 2020mtecsit002
Aim: The relevance of Euler’s Totient Function to the application of Cryptography.
Euler’s Totient Function
Euler’s Totient Function:
Euler’s totient function, also known as phi function ϕ(n), counts the number of integers
between 1 and n inclusive , which are co-prime to n. Two numbers are co-prime if the greatest common divisor
equals 1 . 1 is considered to be co-prime to any number
Properties of Euler’s Totient Function:
• If p is a prime number, then gcd (p, q) = 1 for all 1 <= q < p. Therefore:
ϕ(p) = p – 1.
example: ϕ(5)=4
• If p is a prime number and k >= 1, then there are exactly pk / p numbers between 1 and pk that are divisible by p.
Which gives:
ϕ(p k) = pk – pk-1.
• If a and b are relatively prime, then :
ϕ(ab) = ϕ(a). ϕ(b)
example: ϕ(35)= ϕ(7). ϕ(5)
Mathematical representation
Euler’s Product Formula
It states:
Its equivalent representation:
What are Coprime numbers?
A Co-prime number is a set of numbers or integers which have only 1 as their common factor i.e.
their highest common factor will be 1.
Co-prime numbers are also known as relatively prime or mutually prime numbers.
Examples:
18 and 35 are co-prime numbers.
The factors of 18 are 1, 2, 3, 6, 9, and 18
factors of 35 are 1, 5, 7, and 35.
Since the HCF is 1, they are coprime.
In general we can state that Euler’s totient function is defined as the number of positive integers less than n that
are coprime to n.
Examples of Eulers’s Totient:
• ϕ(3)= 2
As numbers having GCD 1 with 3 are {1,2} and the value of ϕ is the count of elements in the set.
• ϕ(8)= 4
As numbers before 8 having GCD 1 with 8 are{1,3,5,7}
• ϕ(9)= 6
{1,2,4,5,7,8}
• ϕ(7)=6
As we have seen when n is prime ϕ(n)=n-1
• ϕ(12) which can also be further simplified as ϕ(3). Φ(22)=2.2=4
• ϕ(35)= ϕ(7). ϕ(5)=6.4=24
Use of Euler’s Totient function in Cryptography :
• In a Cryptosystem public keys are often encrypted using large prime numbers for security purpose .
• The RSA algorithm in cryptosystem makes use of Euler’s Totient function:
 User creates and publishes a public key based on two large prime numbers, along with an auxiliary value.
 The prime numbers are kept secret.
 Messages can be encrypted by anyone, via the public key, but can only be decoded by someone
who knows the prime numbers.
Euler’s Totient function in RSA
• RSA system involves choosing large prime numbers p and q ,
computing n = p.q and k = φ(n),
• Finding two numbers e and d such that ed ≡ 1 (mod k ).
The numbers n and e (the "encryption key") are released
To the public, and d (the "decryption key") is kept private.
• A message, represented by an integer m, where 0 < m < n, is encrypted by computing
S = me (mod n)
• It is decrypted by computing t = Sd (mod n).
• Euler's Theorem can be used to show that if 0 < t < n, then t = m.
The security of an RSA system would be compromised if the number n could be factored or if φ(n) could
be computed without factoring n.
REFERENCES :
Paper on “The RSAAlgorithm” by Evgeny Milanov (Published on 3 June 2009)
https://www.geeksforgeeks.org/eulers-totient-function/ (Accessed in March 2021)
cp-agorithms.com (Accessed in March 2021)
A generalization of the Euler’s totient function Marius Tarnauceanu (Published on December 5, 2013)

More Related Content

What's hot

Mathematical induction by Animesh Sarkar
Mathematical induction by Animesh SarkarMathematical induction by Animesh Sarkar
Mathematical induction by Animesh Sarkar
Animesh Sarkar
 
34 polar coordinate and equations
34 polar coordinate and equations34 polar coordinate and equations
34 polar coordinate and equations
math266
 
Mathematical induction
Mathematical inductionMathematical induction
Mathematical induction
rey castro
 
Mathematics:Cryptography
Mathematics:CryptographyMathematics:Cryptography
Mathematics:Cryptography
St Mary's College,Thrissur,Kerala
 
Number theory
Number theoryNumber theory
Number theory
Samsil Arefin
 
Fermat and euler theorem
Fermat and euler theoremFermat and euler theorem
Fermat and euler theorem
Janani S
 
Mathematical Induction
Mathematical InductionMathematical Induction
Mathematical InductionEdelyn Cagas
 
Complex Numbers
Complex NumbersComplex Numbers
Complex Numbersitutor
 
Properties of Real Numbers
Properties of Real NumbersProperties of Real Numbers
Properties of Real Numbers
rfant
 
Sequences and series
Sequences and seriesSequences and series
Sequences and seriesmstf mstf
 
5.4 mathematical induction t
5.4 mathematical induction t5.4 mathematical induction t
5.4 mathematical induction t
math260
 
Number Theory - Lesson 1 - Introduction to Number Theory
Number Theory - Lesson 1 - Introduction to Number TheoryNumber Theory - Lesson 1 - Introduction to Number Theory
Number Theory - Lesson 1 - Introduction to Number Theory
Laguna State Polytechnic University
 
5.4 mathematical induction
5.4 mathematical induction5.4 mathematical induction
5.4 mathematical inductionmath260
 
Integration of Trigonometric Functions
Integration of Trigonometric FunctionsIntegration of Trigonometric Functions
Integration of Trigonometric Functions
Raymundo Raymund
 
Group homomorphism
Group homomorphismGroup homomorphism
Group homomorphism
NaliniSPatil
 
Calculus volume 1
Calculus volume 1Calculus volume 1
Calculus volume 1
VICTOR PRINCE-DATEME
 
L19 increasing &amp; decreasing functions
L19 increasing &amp; decreasing functionsL19 increasing &amp; decreasing functions
L19 increasing &amp; decreasing functions
James Tagara
 
Abstract algebra & its applications (1)
Abstract algebra & its applications (1)Abstract algebra & its applications (1)
Abstract algebra & its applications (1)
drselvarani
 
Number theory
Number theoryNumber theory
Number theory
AbdulsemedEngida
 
Ring
RingRing

What's hot (20)

Mathematical induction by Animesh Sarkar
Mathematical induction by Animesh SarkarMathematical induction by Animesh Sarkar
Mathematical induction by Animesh Sarkar
 
34 polar coordinate and equations
34 polar coordinate and equations34 polar coordinate and equations
34 polar coordinate and equations
 
Mathematical induction
Mathematical inductionMathematical induction
Mathematical induction
 
Mathematics:Cryptography
Mathematics:CryptographyMathematics:Cryptography
Mathematics:Cryptography
 
Number theory
Number theoryNumber theory
Number theory
 
Fermat and euler theorem
Fermat and euler theoremFermat and euler theorem
Fermat and euler theorem
 
Mathematical Induction
Mathematical InductionMathematical Induction
Mathematical Induction
 
Complex Numbers
Complex NumbersComplex Numbers
Complex Numbers
 
Properties of Real Numbers
Properties of Real NumbersProperties of Real Numbers
Properties of Real Numbers
 
Sequences and series
Sequences and seriesSequences and series
Sequences and series
 
5.4 mathematical induction t
5.4 mathematical induction t5.4 mathematical induction t
5.4 mathematical induction t
 
Number Theory - Lesson 1 - Introduction to Number Theory
Number Theory - Lesson 1 - Introduction to Number TheoryNumber Theory - Lesson 1 - Introduction to Number Theory
Number Theory - Lesson 1 - Introduction to Number Theory
 
5.4 mathematical induction
5.4 mathematical induction5.4 mathematical induction
5.4 mathematical induction
 
Integration of Trigonometric Functions
Integration of Trigonometric FunctionsIntegration of Trigonometric Functions
Integration of Trigonometric Functions
 
Group homomorphism
Group homomorphismGroup homomorphism
Group homomorphism
 
Calculus volume 1
Calculus volume 1Calculus volume 1
Calculus volume 1
 
L19 increasing &amp; decreasing functions
L19 increasing &amp; decreasing functionsL19 increasing &amp; decreasing functions
L19 increasing &amp; decreasing functions
 
Abstract algebra & its applications (1)
Abstract algebra & its applications (1)Abstract algebra & its applications (1)
Abstract algebra & its applications (1)
 
Number theory
Number theoryNumber theory
Number theory
 
Ring
RingRing
Ring
 

Similar to Eulers totient

RSA final notation change2
RSA final notation change2RSA final notation change2
RSA final notation change2Coleman Gorham
 
2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiouvafopoulos
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
Vaibhav Khanna
 
11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf
VipinNegi38
 
Arithmetic sequence in elementary and HS
Arithmetic sequence in elementary and HSArithmetic sequence in elementary and HS
Arithmetic sequence in elementary and HS
RoseEdenAbitong2
 
EULER AND FERMAT THEOREM
EULER AND FERMAT THEOREMEULER AND FERMAT THEOREM
EULER AND FERMAT THEOREM
ankita pandey
 
Primality
PrimalityPrimality
NumberTheory explanations in the easiest way.ppt
NumberTheory explanations in the easiest way.pptNumberTheory explanations in the easiest way.ppt
NumberTheory explanations in the easiest way.ppt
IshwariKhanal
 
Cyber Security Part-3.pptx
Cyber Security Part-3.pptxCyber Security Part-3.pptx
Cyber Security Part-3.pptx
RavikumarVadana
 
On the Secrecy of RSA Private Keys
On the Secrecy of RSA Private KeysOn the Secrecy of RSA Private Keys
On the Secrecy of RSA Private Keys
Dharmalingam Ganesan
 
Public Key and RSA.pdf
Public Key and RSA.pdfPublic Key and RSA.pdf
Public Key and RSA.pdf
SeifAllahElMesloulNa
 
Rsa documentation
Rsa documentationRsa documentation
Rsa documentation
Farag Zakaria
 
Unit 3.ppt
Unit 3.pptUnit 3.ppt
FermatThm.pptx
FermatThm.pptxFermatThm.pptx
FermatThm.pptx
SnehSinha6
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
Nathan F. Dunn
 
Computing the Square Roots of Unity to break RSA using Quantum Algorithms
Computing the Square Roots of Unity to break RSA using Quantum AlgorithmsComputing the Square Roots of Unity to break RSA using Quantum Algorithms
Computing the Square Roots of Unity to break RSA using Quantum Algorithms
Dharmalingam Ganesan
 

Similar to Eulers totient (20)

RSA final notation change2
RSA final notation change2RSA final notation change2
RSA final notation change2
 
2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf
 
Arithmetic sequence in elementary and HS
Arithmetic sequence in elementary and HSArithmetic sequence in elementary and HS
Arithmetic sequence in elementary and HS
 
EULER AND FERMAT THEOREM
EULER AND FERMAT THEOREMEULER AND FERMAT THEOREM
EULER AND FERMAT THEOREM
 
Primality
PrimalityPrimality
Primality
 
NumberTheory explanations in the easiest way.ppt
NumberTheory explanations in the easiest way.pptNumberTheory explanations in the easiest way.ppt
NumberTheory explanations in the easiest way.ppt
 
Ch08
Ch08Ch08
Ch08
 
Cyber Security Part-3.pptx
Cyber Security Part-3.pptxCyber Security Part-3.pptx
Cyber Security Part-3.pptx
 
On the Secrecy of RSA Private Keys
On the Secrecy of RSA Private KeysOn the Secrecy of RSA Private Keys
On the Secrecy of RSA Private Keys
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Public Key and RSA.pdf
Public Key and RSA.pdfPublic Key and RSA.pdf
Public Key and RSA.pdf
 
Rsa documentation
Rsa documentationRsa documentation
Rsa documentation
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3.ppt
Unit 3.pptUnit 3.ppt
Unit 3.ppt
 
FermatThm.pptx
FermatThm.pptxFermatThm.pptx
FermatThm.pptx
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
 
Computing the Square Roots of Unity to break RSA using Quantum Algorithms
Computing the Square Roots of Unity to break RSA using Quantum AlgorithmsComputing the Square Roots of Unity to break RSA using Quantum Algorithms
Computing the Square Roots of Unity to break RSA using Quantum Algorithms
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Eulers totient

  • 1. Name: Zalte Sayali Pandurang PRN: 2020mtecsit002 Aim: The relevance of Euler’s Totient Function to the application of Cryptography.
  • 3. Euler’s Totient Function: Euler’s totient function, also known as phi function ϕ(n), counts the number of integers between 1 and n inclusive , which are co-prime to n. Two numbers are co-prime if the greatest common divisor equals 1 . 1 is considered to be co-prime to any number Properties of Euler’s Totient Function: • If p is a prime number, then gcd (p, q) = 1 for all 1 <= q < p. Therefore: ϕ(p) = p – 1. example: ϕ(5)=4 • If p is a prime number and k >= 1, then there are exactly pk / p numbers between 1 and pk that are divisible by p. Which gives: ϕ(p k) = pk – pk-1. • If a and b are relatively prime, then : ϕ(ab) = ϕ(a). ϕ(b) example: ϕ(35)= ϕ(7). ϕ(5)
  • 4. Mathematical representation Euler’s Product Formula It states: Its equivalent representation:
  • 5. What are Coprime numbers? A Co-prime number is a set of numbers or integers which have only 1 as their common factor i.e. their highest common factor will be 1. Co-prime numbers are also known as relatively prime or mutually prime numbers. Examples: 18 and 35 are co-prime numbers. The factors of 18 are 1, 2, 3, 6, 9, and 18 factors of 35 are 1, 5, 7, and 35. Since the HCF is 1, they are coprime.
  • 6. In general we can state that Euler’s totient function is defined as the number of positive integers less than n that are coprime to n. Examples of Eulers’s Totient: • ϕ(3)= 2 As numbers having GCD 1 with 3 are {1,2} and the value of ϕ is the count of elements in the set. • ϕ(8)= 4 As numbers before 8 having GCD 1 with 8 are{1,3,5,7} • ϕ(9)= 6 {1,2,4,5,7,8} • ϕ(7)=6 As we have seen when n is prime ϕ(n)=n-1 • ϕ(12) which can also be further simplified as ϕ(3). Φ(22)=2.2=4 • ϕ(35)= ϕ(7). ϕ(5)=6.4=24
  • 7. Use of Euler’s Totient function in Cryptography : • In a Cryptosystem public keys are often encrypted using large prime numbers for security purpose . • The RSA algorithm in cryptosystem makes use of Euler’s Totient function:  User creates and publishes a public key based on two large prime numbers, along with an auxiliary value.  The prime numbers are kept secret.  Messages can be encrypted by anyone, via the public key, but can only be decoded by someone who knows the prime numbers.
  • 8. Euler’s Totient function in RSA • RSA system involves choosing large prime numbers p and q , computing n = p.q and k = φ(n), • Finding two numbers e and d such that ed ≡ 1 (mod k ). The numbers n and e (the "encryption key") are released To the public, and d (the "decryption key") is kept private. • A message, represented by an integer m, where 0 < m < n, is encrypted by computing S = me (mod n) • It is decrypted by computing t = Sd (mod n). • Euler's Theorem can be used to show that if 0 < t < n, then t = m. The security of an RSA system would be compromised if the number n could be factored or if φ(n) could be computed without factoring n.
  • 9. REFERENCES : Paper on “The RSAAlgorithm” by Evgeny Milanov (Published on 3 June 2009) https://www.geeksforgeeks.org/eulers-totient-function/ (Accessed in March 2021) cp-agorithms.com (Accessed in March 2021) A generalization of the Euler’s totient function Marius Tarnauceanu (Published on December 5, 2013)