SlideShare a Scribd company logo
Prime Numbers: Theory and their
application in Public Key
Cryptography
Ashutosh Tripathi
10UCS011
A prime number is any natural number
greater than 1, which cannot be factored
as the product of two smaller numbers.
Examples: 2,3,5,7,11,13,17,…,991,…,99991,
…,9999991,…
The Convergence
There are 8 primes in first 20 counting
numbers
Only 4 in next 20
Does this sequence ultimately converge to
0?
The answer dates itself back to ~300 BC
Euclid’s Theorem
There are infinitely many primes
The proof to this is one of the earliest
appearance of Reductio-ad-absurdum
(proof by contradiction)
Every natural number greater than1 can be
uniquely factored into one or more primes
Fundamental Theorem of Arithmatic
The Prime Number Theorem
Gauss noticed, as Euclid did, that the prime
numbers begin to dwindle out as we get
higher and higher up the number ladder…
After lots of calculating and trial and error,
Gauss showed that:
Density of Primes ≈ 1/log n
More Precisely,
limlim ππ(x)(x) = 1= 1
xx →→ ∝∝
x/ln xx/ln x
Few Interesting Results On
Primes
The Largest Prime is 257,885,161
− 1
courtesy, GIMPS project
The Twin Prime Conjecture
Quartet for the End of Time. Olivier Messiaen
Vinogradov Theorem: All odd numbers
(sufficiently large can be expressed as sum of
three primes) Odd and Even Goldbach
conjectures
All large primes have 1,3,7,9 as their last digit
Randomness in Primes
Given n, there is no way we could tell the nth
prime, unlike the squares or even Fibonacci seq.
Although they are deterministic, but they seem to
appear randomly on the number line
“God may not play dice with the universe, but
something strange is going on with the prime
numbers” –Paul Erdos
This randomness aids in many modern day
cryptographic techniques which rely solely on the
“difficulties underlying prime factorization”
Fermat’s Little Theorem
If p is a prime then for every 0<a<p
ap-1
≡ 1 (mod p)
Proof?
All a.i(mod p) are distinct and range between 1
and p-1 (inclusive)
Fermat’s Test: for any N pick a<N randomly
if aN-1
≡ 1 (mod N) implies N is prime
Carmichael numbers: numbers that are not prime
yet fool the Fermat's Test. Ex., 561= 3.11.17
Private Key Schemes
Two parties secretly agree on some secret code
Each message therefrom is encoded by first
processing it with the secret code (XOR op.)
On the receiver's End, the same computation is
repeated to recover the original code
x ≡ secret code
g ≡ message to be encoded
Sender’s End e(g) = (g o x)
Receiver's End d(e(g)) = ((g o x) o x) = g (voila!)
The RSA Algorithm
by Rivest, Shamir & Adleman of MIT in
1977
best known & widely used public-key
scheme uses large integers (e.g., 1024 bits)
security due to cost of factoring large
numbers
Owes its reliability to prime factorization
The RSA Algorithm (… contd)
Unlike the previous protocol, the RSA scheme is
an example of public-key cryptography: anybody
can send a message to anybody else using publicly
available information, rather like addresses or
phone numbers. Each person has a public key
known to the whole world and a secret key known
only to him- or herself. When Alice wants to send
message x to Bob, she encodes it using his public
key. He decrypts it using his secret key, to retrieve
x . Eve is welcome to see as many encrypted
messages for Bob as she likes, but she will not be
able to decode them, under certain simple
assumptions.
The RSA Algorithm (… contd)
Property Pick any two primes p and q and let N =
p.q . For any e relatively prime to (p − 1)(q − 1) :
1. The mapping x→ xe
(mod N) is a bijection on {0, 1,
2, ... N-1}
2. Moreover the inverse mapping is easily realised,
let d be the inverse of e(modulo (p-1)(q-1))
then for all x e {0,1,…, N-1}
(xe
)d
= x mod N.
The RSA Algorithm (… contd)
The first property tells us that the mapping x 7→
xe mod N is a reasonable way to encode messages
x ; no information is lost. So, if Bob publishes (N,
e) as his public key, everyone else can use it to
send him encrypted messages. The second property
then tells us how decryption can be achieved. Bob
should retain the value d as his secret key, with
which he can decode all messages that come to him
by simply raising them to the d th power modulo N
.
Queries??
ashu0x00@gmail.com

More Related Content

What's hot

On the Secrecy of RSA Private Keys
On the Secrecy of RSA Private KeysOn the Secrecy of RSA Private Keys
On the Secrecy of RSA Private Keys
Dharmalingam Ganesan
 
Number theory
Number theoryNumber theory
Number theory
AbdulsemedEngida
 
5.6.08 Fundamental Theorem Of Algebra1
5.6.08   Fundamental Theorem Of Algebra15.6.08   Fundamental Theorem Of Algebra1
5.6.08 Fundamental Theorem Of Algebra1chrismac47
 
A26-8 analyze poly graphs
A26-8 analyze poly graphsA26-8 analyze poly graphs
A26-8 analyze poly graphsvhiggins1
 
Dynamical systems solved ex
Dynamical systems solved exDynamical systems solved ex
Dynamical systems solved ex
Maths Tutoring
 
Proving existential statements
Proving existential statementsProving existential statements
Proving existential statements
Abdur Rehman
 
Computer Science Assignment Help
Computer Science Assignment Help Computer Science Assignment Help
Computer Science Assignment Help
Programming Homework Help
 
Iterative1
Iterative1Iterative1
Iterative1
Md. Mujahid Islam
 
Kolmogorov complexity and topological arguments
Kolmogorov complexity and topological argumentsKolmogorov complexity and topological arguments
Kolmogorov complexity and topological arguments
shenmontpellier
 
Elliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of mathsElliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of maths
Martijn Grooten
 
Signals Processing Homework Help
Signals Processing Homework HelpSignals Processing Homework Help
Signals Processing Homework Help
Matlab Assignment Experts
 
Optimal Budget Allocation: Theoretical Guarantee and Efficient Algorithm
Optimal Budget Allocation: Theoretical Guarantee and Efficient AlgorithmOptimal Budget Allocation: Theoretical Guarantee and Efficient Algorithm
Optimal Budget Allocation: Theoretical Guarantee and Efficient Algorithm
Tasuku Soma
 
Multicasting in Linear Deterministic Relay Network by Matrix Completion
Multicasting in Linear Deterministic Relay Network by Matrix CompletionMulticasting in Linear Deterministic Relay Network by Matrix Completion
Multicasting in Linear Deterministic Relay Network by Matrix Completion
Tasuku Soma
 

What's hot (18)

On the Secrecy of RSA Private Keys
On the Secrecy of RSA Private KeysOn the Secrecy of RSA Private Keys
On the Secrecy of RSA Private Keys
 
An engineer 1+1=2
An engineer 1+1=2An engineer 1+1=2
An engineer 1+1=2
 
Number theory
Number theoryNumber theory
Number theory
 
5.6.08 Fundamental Theorem Of Algebra1
5.6.08   Fundamental Theorem Of Algebra15.6.08   Fundamental Theorem Of Algebra1
5.6.08 Fundamental Theorem Of Algebra1
 
A26-8 analyze poly graphs
A26-8 analyze poly graphsA26-8 analyze poly graphs
A26-8 analyze poly graphs
 
Dynamical systems solved ex
Dynamical systems solved exDynamical systems solved ex
Dynamical systems solved ex
 
Proving existential statements
Proving existential statementsProving existential statements
Proving existential statements
 
Computer Science Assignment Help
Computer Science Assignment Help Computer Science Assignment Help
Computer Science Assignment Help
 
Iterative1
Iterative1Iterative1
Iterative1
 
Kolmogorov complexity and topological arguments
Kolmogorov complexity and topological argumentsKolmogorov complexity and topological arguments
Kolmogorov complexity and topological arguments
 
Elliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of mathsElliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of maths
 
Signals Processing Homework Help
Signals Processing Homework HelpSignals Processing Homework Help
Signals Processing Homework Help
 
Number theory
Number theoryNumber theory
Number theory
 
Optimal Budget Allocation: Theoretical Guarantee and Efficient Algorithm
Optimal Budget Allocation: Theoretical Guarantee and Efficient AlgorithmOptimal Budget Allocation: Theoretical Guarantee and Efficient Algorithm
Optimal Budget Allocation: Theoretical Guarantee and Efficient Algorithm
 
Multicasting in Linear Deterministic Relay Network by Matrix Completion
Multicasting in Linear Deterministic Relay Network by Matrix CompletionMulticasting in Linear Deterministic Relay Network by Matrix Completion
Multicasting in Linear Deterministic Relay Network by Matrix Completion
 
Datacompression1
Datacompression1Datacompression1
Datacompression1
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Number theory lecture (part 2)
Number theory lecture (part 2)Number theory lecture (part 2)
Number theory lecture (part 2)
 

Similar to Primes: a quick tour to spplications and challenges!

RSA final notation change2
RSA final notation change2RSA final notation change2
RSA final notation change2Coleman Gorham
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3Coleman Gorham
 
2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiouvafopoulos
 
Riemann Hypothesis
Riemann HypothesisRiemann Hypothesis
Riemann Hypothesis
barnetdh
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
Nathan F. Dunn
 
Algorithms and Complexity: Cryptography Theory
Algorithms and Complexity: Cryptography TheoryAlgorithms and Complexity: Cryptography Theory
Algorithms and Complexity: Cryptography Theory
Alex Prut
 
Random Oracle Model & Hashing - Cryptography & Network Security
Random Oracle Model & Hashing - Cryptography & Network SecurityRandom Oracle Model & Hashing - Cryptography & Network Security
Random Oracle Model & Hashing - Cryptography & Network Security
Mahbubur Rahman
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
Abhishek Gautam
 
Cryptography - Discrete Mathematics
Cryptography - Discrete MathematicsCryptography - Discrete Mathematics
Cryptography - Discrete Mathematics
ACM-KU
 
Proof of Kraft Mc-Millan theorem - nguyen vu hung
Proof of Kraft Mc-Millan theorem - nguyen vu hungProof of Kraft Mc-Millan theorem - nguyen vu hung
Proof of Kraft Mc-Millan theorem - nguyen vu hung
Vu Hung Nguyen
 
Prime number
Prime numberPrime number
Prime number
KliniqueBrown
 
Analysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent dAnalysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent d
Dharmalingam Ganesan
 
An Introduction to RSA Public-Key Cryptography
An Introduction to RSA Public-Key CryptographyAn Introduction to RSA Public-Key Cryptography
An Introduction to RSA Public-Key Cryptography
David Boyhan, JD, CIPP
 
Basics of Mathematical Cryptography
Basics of Mathematical CryptographyBasics of Mathematical Cryptography
Basics of Mathematical Cryptography
Neha Gupta
 
Daa notes 2
Daa notes 2Daa notes 2
Daa notes 2
smruti sarangi
 
basicsofcodingtheory-160202182933-converted.pptx
basicsofcodingtheory-160202182933-converted.pptxbasicsofcodingtheory-160202182933-converted.pptx
basicsofcodingtheory-160202182933-converted.pptx
upendrabhatt13
 

Similar to Primes: a quick tour to spplications and challenges! (20)

RSA final notation change2
RSA final notation change2RSA final notation change2
RSA final notation change2
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3
 
2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou
 
Riemann Hypothesis
Riemann HypothesisRiemann Hypothesis
Riemann Hypothesis
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
 
Algorithms and Complexity: Cryptography Theory
Algorithms and Complexity: Cryptography TheoryAlgorithms and Complexity: Cryptography Theory
Algorithms and Complexity: Cryptography Theory
 
Random Oracle Model & Hashing - Cryptography & Network Security
Random Oracle Model & Hashing - Cryptography & Network SecurityRandom Oracle Model & Hashing - Cryptography & Network Security
Random Oracle Model & Hashing - Cryptography & Network Security
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
Cryptography - Discrete Mathematics
Cryptography - Discrete MathematicsCryptography - Discrete Mathematics
Cryptography - Discrete Mathematics
 
Proof of Kraft Mc-Millan theorem - nguyen vu hung
Proof of Kraft Mc-Millan theorem - nguyen vu hungProof of Kraft Mc-Millan theorem - nguyen vu hung
Proof of Kraft Mc-Millan theorem - nguyen vu hung
 
Rsa
RsaRsa
Rsa
 
Rsa
RsaRsa
Rsa
 
Prime number
Prime numberPrime number
Prime number
 
Analysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent dAnalysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent d
 
An Introduction to RSA Public-Key Cryptography
An Introduction to RSA Public-Key CryptographyAn Introduction to RSA Public-Key Cryptography
An Introduction to RSA Public-Key Cryptography
 
Unit 3
Unit 3Unit 3
Unit 3
 
Basics of Mathematical Cryptography
Basics of Mathematical CryptographyBasics of Mathematical Cryptography
Basics of Mathematical Cryptography
 
Daa notes 2
Daa notes 2Daa notes 2
Daa notes 2
 
basicsofcodingtheory-160202182933-converted.pptx
basicsofcodingtheory-160202182933-converted.pptxbasicsofcodingtheory-160202182933-converted.pptx
basicsofcodingtheory-160202182933-converted.pptx
 
rsa-1
rsa-1rsa-1
rsa-1
 

Recently uploaded

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 

Recently uploaded (20)

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 

Primes: a quick tour to spplications and challenges!

  • 1. Prime Numbers: Theory and their application in Public Key Cryptography Ashutosh Tripathi 10UCS011
  • 2. A prime number is any natural number greater than 1, which cannot be factored as the product of two smaller numbers. Examples: 2,3,5,7,11,13,17,…,991,…,99991, …,9999991,…
  • 3. The Convergence There are 8 primes in first 20 counting numbers Only 4 in next 20 Does this sequence ultimately converge to 0? The answer dates itself back to ~300 BC
  • 4. Euclid’s Theorem There are infinitely many primes The proof to this is one of the earliest appearance of Reductio-ad-absurdum (proof by contradiction) Every natural number greater than1 can be uniquely factored into one or more primes Fundamental Theorem of Arithmatic
  • 5. The Prime Number Theorem Gauss noticed, as Euclid did, that the prime numbers begin to dwindle out as we get higher and higher up the number ladder… After lots of calculating and trial and error, Gauss showed that: Density of Primes ≈ 1/log n More Precisely, limlim ππ(x)(x) = 1= 1 xx →→ ∝∝ x/ln xx/ln x
  • 6. Few Interesting Results On Primes The Largest Prime is 257,885,161 − 1 courtesy, GIMPS project The Twin Prime Conjecture Quartet for the End of Time. Olivier Messiaen Vinogradov Theorem: All odd numbers (sufficiently large can be expressed as sum of three primes) Odd and Even Goldbach conjectures All large primes have 1,3,7,9 as their last digit
  • 7. Randomness in Primes Given n, there is no way we could tell the nth prime, unlike the squares or even Fibonacci seq. Although they are deterministic, but they seem to appear randomly on the number line “God may not play dice with the universe, but something strange is going on with the prime numbers” –Paul Erdos This randomness aids in many modern day cryptographic techniques which rely solely on the “difficulties underlying prime factorization”
  • 8. Fermat’s Little Theorem If p is a prime then for every 0<a<p ap-1 ≡ 1 (mod p) Proof? All a.i(mod p) are distinct and range between 1 and p-1 (inclusive) Fermat’s Test: for any N pick a<N randomly if aN-1 ≡ 1 (mod N) implies N is prime Carmichael numbers: numbers that are not prime yet fool the Fermat's Test. Ex., 561= 3.11.17
  • 9. Private Key Schemes Two parties secretly agree on some secret code Each message therefrom is encoded by first processing it with the secret code (XOR op.) On the receiver's End, the same computation is repeated to recover the original code x ≡ secret code g ≡ message to be encoded Sender’s End e(g) = (g o x) Receiver's End d(e(g)) = ((g o x) o x) = g (voila!)
  • 10. The RSA Algorithm by Rivest, Shamir & Adleman of MIT in 1977 best known & widely used public-key scheme uses large integers (e.g., 1024 bits) security due to cost of factoring large numbers Owes its reliability to prime factorization
  • 11. The RSA Algorithm (… contd) Unlike the previous protocol, the RSA scheme is an example of public-key cryptography: anybody can send a message to anybody else using publicly available information, rather like addresses or phone numbers. Each person has a public key known to the whole world and a secret key known only to him- or herself. When Alice wants to send message x to Bob, she encodes it using his public key. He decrypts it using his secret key, to retrieve x . Eve is welcome to see as many encrypted messages for Bob as she likes, but she will not be able to decode them, under certain simple assumptions.
  • 12. The RSA Algorithm (… contd) Property Pick any two primes p and q and let N = p.q . For any e relatively prime to (p − 1)(q − 1) : 1. The mapping x→ xe (mod N) is a bijection on {0, 1, 2, ... N-1} 2. Moreover the inverse mapping is easily realised, let d be the inverse of e(modulo (p-1)(q-1)) then for all x e {0,1,…, N-1} (xe )d = x mod N.
  • 13. The RSA Algorithm (… contd) The first property tells us that the mapping x 7→ xe mod N is a reasonable way to encode messages x ; no information is lost. So, if Bob publishes (N, e) as his public key, everyone else can use it to send him encrypted messages. The second property then tells us how decryption can be achieved. Bob should retain the value d as his secret key, with which he can decode all messages that come to him by simply raising them to the d th power modulo N .