SlideShare a Scribd company logo
1 of 19
Download to read offline
Number Theory dan Modulo
  Multiplicative Inverse
     Kriptografi dan Sistem Keamanan Komputer
      Standar Sistem Keamanan
      Enkripsi Kunci Simetrik
      Number Theory
      Enkripsi Kunci Publik
      Autentikasi Pesan dan Fungsi Hash




2011-2012-3           Anung Ariwibowo             2
   Himpunan bilangan
   Operasi yang ditentukan terhadap elemen-
    elemen himpunan tersebut
   Hasil operasi berada di dalam himpunan
    (closure)
   Memenuhi
       associative law:    (a.b).c = a.(b.c)
       has identity e:     e.a = a.e = a
       has inverses a-1:   a.a-1 = e
   Jika memenuhi hukum commutative
     a.b = b.a
     Abelian group
   exponentiation
       repeated application of operator
       a3 = a.a.a
   Elemen identitas
       e=a0
   Cyclic group
     Setiap elemen adalah exponent dari sebuah
      generator
     b = ak for some a and every b in group
     a = generator
     b = elemen-elemen himpunan selain a
   a set of “numbers”
   with two operations (addition and
    multiplication) which form:
   an abelian group with addition operation
   and multiplication:
       has closure
       is associative
       distributive over addition: a(b+c) = ab + ac
   if multiplication operation is commutative, it
    forms a commutative ring
   if multiplication operation has an identity and
    no zero divisors, it forms an integral domain
   modulo operator “a mod n” didefinisikan
    sebagai sisa bagi jika a dibagi n
   congruence: a ≡ b mod n
       jika dibagi n, a dan b memiliki sisa bagi yang sama
       100 ≡ 34 mod 11
   b disebut residue dari operasi a mod n
       untuk integer: a = qn + b
       biasanya dipilih sisa bagi positif terkecil
         ie. 0 <= b <= n-1
       modulo reduction
         -12 mod 7 = -5 mod 7 = 2 mod 7 = 9 mod 7
     a mod n
             a≥0
               a = qn + b
               q≥0
               b≥0
             a<0
               'overshoot'
               a = qn + b
               q<0
               b≥0


2011-2012-3                   Anung Ariwibowo   7
     a mod n
             0≤a<1
               a = qn + b
               q≥0
               b≥0
      Modular Multiplicative Inverse
             aa-1 = 1




2011-2012-3                  Anung Ariwibowo   8
   Sebuah bilangan bukan-nol b membagi a jika
    untuk sebuah bilangan m didapatkan a=mb
    (a,b,m adalah integers)
   d.kl. b membagi a tanpa sisa
   dituliskan: b|a
   dikatakan b adalah pembagi dari a
   Contoh: all of 1,2,3,4,6,8,12,24 divide 24
   'clock arithmetic'
   menggunakan sejumlah berhingga bilangan
   loops back from either end
   modular arithmetic is when do addition &
    multiplication and modulo reduce answer
   can do reduction at any point
       a+b mod n = [a mod n + b mod n] mod n
   bisa diterapkan kepada sembarang group of
    integers
       Zn = {0, 1, … , n-1}
   Membentuk commutative ring for addition
    dengan multiplicative identity
   note some peculiarities
       if (a+b)=(a+c) mod n
        then b=c mod n
       but if (a.b)=(a.c) mod n
        then b=c mod n only if a is relatively prime to
        n
+ 0 1 2 3 4 5 6 7
0 0 1 2 3 4 5 6 7
1 1 2 3 4 5 6 7 0
2 2 3 4 5 6 7 0 1
3 3 4 5 6 7 0 1 2
4 4 5 6 7 0 1 2 3
5 5 6 7 0 1 2 3 4
6 6 7 0 1 2 3 4 5
7 7 0 1 2 3 4 5 6
     [0]: {0, 8, 16, 24, . . .}
      [1]: {1, 9, 17, . . .}
      [2]: {2, 10, . . .}
      [3]: {3, 11, . . .}
      [4]: {4, 12, . . .}
      [5]: {5, 13, . . .}
      [6]: {6, 14, . . .}
      [7]: {7, 15, . . .}


2011-2012-3                    Anung Ariwibowo   13
   a common problem in number theory
   GCD (a,b) of a and b is the largest number that
    divides evenly into both a and b
       eg GCD(60,24) = 12
   often want no common factors (except 1) and
    hence numbers are relatively prime
     eg GCD(8,15) = 1
     hence 8 & 15 are relatively prime
   an efficient way to find the GCD(a,b)
   memanfaatkan teorema:
       GCD(a,b) = GCD(b, a mod b)
   Versi iteratif
    EUCLID(a,b)
    1.   A = a; B = b
    2.   if B = 0 return   A
    3.   R = A mod B
    4.   A = B
    5.   B = R
    6.   goto 2
     Versi rekursif
         Kuis(a,b)
         if b = 0 then return a
         else Kuis(b, a mod b)




2011-2012-3                  Anung Ariwibowo   16
1970 = 1 x 1066 + 904   gcd(1066, 904)
1066 = 1 x 904 + 162    gcd(904, 162)
904 = 5 x 162 + 94      gcd(162, 94)
162 = 1 x 94 + 68       gcd(94, 68)
94 = 1 x 68 + 26        gcd(68, 26)
68 = 2 x 26 + 16        gcd(26, 16)
26 = 1 x 16 + 10        gcd(16, 10)
16 = 1 x 10 + 6         gcd(10, 6)
10 = 1 x 6 + 4          gcd(6, 4)
6 = 1 x 4 + 2           gcd(4, 2)
4 = 2 x 2 + 0           gcd(2, 0)
     Sebuah integer x yang memenuhi
         a-1 ≡ x mod n
         ax ≡ aa-1 mod n
         ax ≡ 1 mod n

      hanya ada jika a dan n coprime
      Contoh
         3-1 ≡ x mod 11
         3x ≡ 1 mod 11
         x=4
         0 ≤ x < 11




2011-2012-3                 Anung Ariwibowo   18
     Modular Multiplicative Inverse
       http://en.wikipedia.org/wiki/Modular_multiplicative
       _inverse
      Stallings, "Cryptography and Network
       Security"http://williamstallings.com/Cryptography/
      Schneier, "Applied Cryptography"
       http://www.schneier.com/book-applied.html
      Thomas L Noack,
       http://ece.uprm.edu/~noack/crypto/
      Slides
       tjerdastangkas.blogspot.com/search/label/ikh323

2011-2012-3               Anung Ariwibowo                19

More Related Content

What's hot

5.1 quadratic functions
5.1 quadratic functions5.1 quadratic functions
5.1 quadratic functionsmorrobea
 
Switching theory and logic design.
Switching theory and logic design.Switching theory and logic design.
Switching theory and logic design.Anto Jose Moyalan
 
Mcq ch 1_fsc_part1_nauman
Mcq ch 1_fsc_part1_naumanMcq ch 1_fsc_part1_nauman
Mcq ch 1_fsc_part1_naumanAzhar Khalid
 
Summative Assessment Paper-3
Summative Assessment Paper-3Summative Assessment Paper-3
Summative Assessment Paper-3APEX INSTITUTE
 
digital logic design Chapter 2 boolean_algebra_&_logic_gates
digital logic design Chapter 2 boolean_algebra_&_logic_gatesdigital logic design Chapter 2 boolean_algebra_&_logic_gates
digital logic design Chapter 2 boolean_algebra_&_logic_gatesImran Waris
 
Productos notables
Productos notablesProductos notables
Productos notablesPROFTEBA
 
EJERCICIOS PARA EL EXAMEN
EJERCICIOS PARA EL EXAMENEJERCICIOS PARA EL EXAMEN
EJERCICIOS PARA EL EXAMENnenyta08
 
Digital logic circuits important question and answers for 5 units
Digital logic circuits important question and answers for 5 unitsDigital logic circuits important question and answers for 5 units
Digital logic circuits important question and answers for 5 unitsLekashri Subramanian
 
Line Drawing Algorithms - Computer Graphics - Notes
Line Drawing Algorithms - Computer Graphics - NotesLine Drawing Algorithms - Computer Graphics - Notes
Line Drawing Algorithms - Computer Graphics - NotesOmprakash Chauhan
 
The sum of the triangle sides lengths reciprocals vs a cyclic sum of a specif...
The sum of the triangle sides lengths reciprocals vs a cyclic sum of a specif...The sum of the triangle sides lengths reciprocals vs a cyclic sum of a specif...
The sum of the triangle sides lengths reciprocals vs a cyclic sum of a specif...Mikołaj Hajduk
 
Matrix Chain Scheduling Algorithm
Matrix Chain Scheduling AlgorithmMatrix Chain Scheduling Algorithm
Matrix Chain Scheduling AlgorithmWen-Shih Chao
 
Intro To Gradient Descent in Javascript
Intro To Gradient Descent in JavascriptIntro To Gradient Descent in Javascript
Intro To Gradient Descent in JavascriptK. Matthew Dupree
 

What's hot (20)

Number theory
Number theoryNumber theory
Number theory
 
5.1 quadratic functions
5.1 quadratic functions5.1 quadratic functions
5.1 quadratic functions
 
Switching theory and logic design.
Switching theory and logic design.Switching theory and logic design.
Switching theory and logic design.
 
Mcq ch 1_fsc_part1_nauman
Mcq ch 1_fsc_part1_naumanMcq ch 1_fsc_part1_nauman
Mcq ch 1_fsc_part1_nauman
 
Álgebra básica 1
Álgebra básica 1Álgebra básica 1
Álgebra básica 1
 
Summative Assessment Paper-3
Summative Assessment Paper-3Summative Assessment Paper-3
Summative Assessment Paper-3
 
digital logic design Chapter 2 boolean_algebra_&_logic_gates
digital logic design Chapter 2 boolean_algebra_&_logic_gatesdigital logic design Chapter 2 boolean_algebra_&_logic_gates
digital logic design Chapter 2 boolean_algebra_&_logic_gates
 
Álgebra básica 2
Álgebra básica 2Álgebra básica 2
Álgebra básica 2
 
Productos notables
Productos notablesProductos notables
Productos notables
 
Mathematics
MathematicsMathematics
Mathematics
 
Ch02 22
Ch02 22Ch02 22
Ch02 22
 
Basic maths
Basic mathsBasic maths
Basic maths
 
EJERCICIOS PARA EL EXAMEN
EJERCICIOS PARA EL EXAMENEJERCICIOS PARA EL EXAMEN
EJERCICIOS PARA EL EXAMEN
 
Digital logic circuits important question and answers for 5 units
Digital logic circuits important question and answers for 5 unitsDigital logic circuits important question and answers for 5 units
Digital logic circuits important question and answers for 5 units
 
Line Drawing Algorithms - Computer Graphics - Notes
Line Drawing Algorithms - Computer Graphics - NotesLine Drawing Algorithms - Computer Graphics - Notes
Line Drawing Algorithms - Computer Graphics - Notes
 
Computer graphics
Computer graphics   Computer graphics
Computer graphics
 
The sum of the triangle sides lengths reciprocals vs a cyclic sum of a specif...
The sum of the triangle sides lengths reciprocals vs a cyclic sum of a specif...The sum of the triangle sides lengths reciprocals vs a cyclic sum of a specif...
The sum of the triangle sides lengths reciprocals vs a cyclic sum of a specif...
 
Đề Thi HK2 Toán 7 - THCS Võ Thành Trang
Đề Thi HK2 Toán 7 - THCS Võ Thành TrangĐề Thi HK2 Toán 7 - THCS Võ Thành Trang
Đề Thi HK2 Toán 7 - THCS Võ Thành Trang
 
Matrix Chain Scheduling Algorithm
Matrix Chain Scheduling AlgorithmMatrix Chain Scheduling Algorithm
Matrix Chain Scheduling Algorithm
 
Intro To Gradient Descent in Javascript
Intro To Gradient Descent in JavascriptIntro To Gradient Descent in Javascript
Intro To Gradient Descent in Javascript
 

Viewers also liked

Kriptografi - Steganografi
Kriptografi - SteganografiKriptografi - Steganografi
Kriptografi - SteganografiKuliahKita
 
Mae Designs Portfolio
Mae Designs PortfolioMae Designs Portfolio
Mae Designs PortfolioMae_Designs
 
Crowdology Consumer Panelv2
Crowdology Consumer Panelv2Crowdology Consumer Panelv2
Crowdology Consumer Panelv2Lisa_Bella
 
Cost-effective approach to full-cycle vulnerability management
Cost-effective approach to full-cycle vulnerability managementCost-effective approach to full-cycle vulnerability management
Cost-effective approach to full-cycle vulnerability managementSasha Nunke
 
Science World Board Presentation
Science World Board PresentationScience World Board Presentation
Science World Board PresentationDanny Robinson
 
Electric energy scientific development, main source and consumers
Electric energy scientific development, main source and consumersElectric energy scientific development, main source and consumers
Electric energy scientific development, main source and consumersP K Agarwal
 
Cbi Revenue Recognition Panel Slides 031709 Final
Cbi Revenue Recognition Panel Slides 031709 FinalCbi Revenue Recognition Panel Slides 031709 Final
Cbi Revenue Recognition Panel Slides 031709 Finalthess1121
 
Quesnel.Adolescent Literacy.Feb 2016
Quesnel.Adolescent Literacy.Feb 2016Quesnel.Adolescent Literacy.Feb 2016
Quesnel.Adolescent Literacy.Feb 2016Faye Brownlie
 
Estuarians - Inspiring Social Innovators in Residence
Estuarians - Inspiring Social Innovators in ResidenceEstuarians - Inspiring Social Innovators in Residence
Estuarians - Inspiring Social Innovators in ResidenceOgunte CIC
 
BJF.Delta.Nov Redesigned ELA Curriculum K-3
BJF.Delta.Nov Redesigned ELA Curriculum K-3BJF.Delta.Nov Redesigned ELA Curriculum K-3
BJF.Delta.Nov Redesigned ELA Curriculum K-3Faye Brownlie
 
Itransition At A Glance 2009
Itransition At A Glance 2009Itransition At A Glance 2009
Itransition At A Glance 2009Stefanovich
 
Pipeline 4 Progress Action Plan Summary
Pipeline 4 Progress Action Plan SummaryPipeline 4 Progress Action Plan Summary
Pipeline 4 Progress Action Plan SummaryCreAgent Marketing
 
Jules Cheret (1836-1933) y sus contemporáneos
Jules Cheret (1836-1933) y sus contemporáneosJules Cheret (1836-1933) y sus contemporáneos
Jules Cheret (1836-1933) y sus contemporáneosalmudenaresad
 
ikd312-05-kalkulus-relasional
ikd312-05-kalkulus-relasionalikd312-05-kalkulus-relasional
ikd312-05-kalkulus-relasionalAnung Ariwibowo
 
Orange Language Travel Hero
Orange Language Travel   HeroOrange Language Travel   Hero
Orange Language Travel HeroOrange BG
 
Transforming Managers A learning Agenda
Transforming Managers A learning AgendaTransforming Managers A learning Agenda
Transforming Managers A learning AgendaP K Agarwal
 
Distributed Events, State and Commands
Distributed Events, State and CommandsDistributed Events, State and Commands
Distributed Events, State and CommandsAngelo Corsaro
 

Viewers also liked (20)

Kriptografi - Steganografi
Kriptografi - SteganografiKriptografi - Steganografi
Kriptografi - Steganografi
 
Mae Designs Portfolio
Mae Designs PortfolioMae Designs Portfolio
Mae Designs Portfolio
 
Crowdology Consumer Panelv2
Crowdology Consumer Panelv2Crowdology Consumer Panelv2
Crowdology Consumer Panelv2
 
Cost-effective approach to full-cycle vulnerability management
Cost-effective approach to full-cycle vulnerability managementCost-effective approach to full-cycle vulnerability management
Cost-effective approach to full-cycle vulnerability management
 
isd312-09-summarization
isd312-09-summarizationisd312-09-summarization
isd312-09-summarization
 
Science World Board Presentation
Science World Board PresentationScience World Board Presentation
Science World Board Presentation
 
Science world
Science worldScience world
Science world
 
Electric energy scientific development, main source and consumers
Electric energy scientific development, main source and consumersElectric energy scientific development, main source and consumers
Electric energy scientific development, main source and consumers
 
Cbi Revenue Recognition Panel Slides 031709 Final
Cbi Revenue Recognition Panel Slides 031709 FinalCbi Revenue Recognition Panel Slides 031709 Final
Cbi Revenue Recognition Panel Slides 031709 Final
 
Quesnel.Adolescent Literacy.Feb 2016
Quesnel.Adolescent Literacy.Feb 2016Quesnel.Adolescent Literacy.Feb 2016
Quesnel.Adolescent Literacy.Feb 2016
 
Estuarians - Inspiring Social Innovators in Residence
Estuarians - Inspiring Social Innovators in ResidenceEstuarians - Inspiring Social Innovators in Residence
Estuarians - Inspiring Social Innovators in Residence
 
BJF.Delta.Nov Redesigned ELA Curriculum K-3
BJF.Delta.Nov Redesigned ELA Curriculum K-3BJF.Delta.Nov Redesigned ELA Curriculum K-3
BJF.Delta.Nov Redesigned ELA Curriculum K-3
 
Wfwpeuropedignity 2011
Wfwpeuropedignity 2011Wfwpeuropedignity 2011
Wfwpeuropedignity 2011
 
Itransition At A Glance 2009
Itransition At A Glance 2009Itransition At A Glance 2009
Itransition At A Glance 2009
 
Pipeline 4 Progress Action Plan Summary
Pipeline 4 Progress Action Plan SummaryPipeline 4 Progress Action Plan Summary
Pipeline 4 Progress Action Plan Summary
 
Jules Cheret (1836-1933) y sus contemporáneos
Jules Cheret (1836-1933) y sus contemporáneosJules Cheret (1836-1933) y sus contemporáneos
Jules Cheret (1836-1933) y sus contemporáneos
 
ikd312-05-kalkulus-relasional
ikd312-05-kalkulus-relasionalikd312-05-kalkulus-relasional
ikd312-05-kalkulus-relasional
 
Orange Language Travel Hero
Orange Language Travel   HeroOrange Language Travel   Hero
Orange Language Travel Hero
 
Transforming Managers A learning Agenda
Transforming Managers A learning AgendaTransforming Managers A learning Agenda
Transforming Managers A learning Agenda
 
Distributed Events, State and Commands
Distributed Events, State and CommandsDistributed Events, State and Commands
Distributed Events, State and Commands
 

Similar to ikh323-05

Similar to ikh323-05 (20)

2.ppt
2.ppt2.ppt
2.ppt
 
sheet6.pdf
sheet6.pdfsheet6.pdf
sheet6.pdf
 
doc6.pdf
doc6.pdfdoc6.pdf
doc6.pdf
 
paper6.pdf
paper6.pdfpaper6.pdf
paper6.pdf
 
lecture5.pdf
lecture5.pdflecture5.pdf
lecture5.pdf
 
555_Spring12_topic06.ppt
555_Spring12_topic06.ppt555_Spring12_topic06.ppt
555_Spring12_topic06.ppt
 
ADVANCED ALGORITHMS-UNIT-3-Final.ppt
ADVANCED   ALGORITHMS-UNIT-3-Final.pptADVANCED   ALGORITHMS-UNIT-3-Final.ppt
ADVANCED ALGORITHMS-UNIT-3-Final.ppt
 
Matdis 3.4
Matdis 3.4Matdis 3.4
Matdis 3.4
 
A study on number theory and its applications
A study on number theory and its applicationsA study on number theory and its applications
A study on number theory and its applications
 
Ch04
Ch04Ch04
Ch04
 
Whole Numbers std 6.ppt
Whole Numbers std 6.pptWhole Numbers std 6.ppt
Whole Numbers std 6.ppt
 
Cryptography and Network Security Principles and Practice.docx
Cryptography and Network Security Principles and Practice.docxCryptography and Network Security Principles and Practice.docx
Cryptography and Network Security Principles and Practice.docx
 
new 2.ppt
new 2.pptnew 2.ppt
new 2.ppt
 
DAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptxDAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptx
 
Modular arithmetic
Modular arithmeticModular arithmetic
Modular arithmetic
 
Ch4.pdf
Ch4.pdfCh4.pdf
Ch4.pdf
 
GTR final project
GTR final projectGTR final project
GTR final project
 
CH04.ppt
CH04.pptCH04.ppt
CH04.ppt
 
Inequalities marathon
Inequalities  marathonInequalities  marathon
Inequalities marathon
 
Cryptography and Network Security chapter 4.ppt
Cryptography and Network Security chapter 4.pptCryptography and Network Security chapter 4.ppt
Cryptography and Network Security chapter 4.ppt
 

More from Anung Ariwibowo (20)

isd314-06-association-mining
isd314-06-association-miningisd314-06-association-mining
isd314-06-association-mining
 
ikp213-unifikasi
ikp213-unifikasiikp213-unifikasi
ikp213-unifikasi
 
ikp213-06-horn-clause
ikp213-06-horn-clauseikp213-06-horn-clause
ikp213-06-horn-clause
 
ikp213-01-pendahuluan
ikp213-01-pendahuluanikp213-01-pendahuluan
ikp213-01-pendahuluan
 
ikd312-05-sqlite
ikd312-05-sqliteikd312-05-sqlite
ikd312-05-sqlite
 
ikd312-04-aljabar-relasional
ikd312-04-aljabar-relasionalikd312-04-aljabar-relasional
ikd312-04-aljabar-relasional
 
ikd312-03-design
ikd312-03-designikd312-03-design
ikd312-03-design
 
ikd312-02-three-schema
ikd312-02-three-schemaikd312-02-three-schema
ikd312-02-three-schema
 
ikp213-02-pendahuluan
ikp213-02-pendahuluanikp213-02-pendahuluan
ikp213-02-pendahuluan
 
ikh311-08
ikh311-08ikh311-08
ikh311-08
 
ikh311-07
ikh311-07ikh311-07
ikh311-07
 
ikh311-06
ikh311-06ikh311-06
ikh311-06
 
ikh311-05
ikh311-05ikh311-05
ikh311-05
 
ikp321-svn
ikp321-svnikp321-svn
ikp321-svn
 
ikh311-04
ikh311-04ikh311-04
ikh311-04
 
ikp321-05
ikp321-05ikp321-05
ikp321-05
 
imsakiyah-jakarta-1433-09
imsakiyah-jakarta-1433-09imsakiyah-jakarta-1433-09
imsakiyah-jakarta-1433-09
 
ikh311-03
ikh311-03ikh311-03
ikh311-03
 
ikp321-04
ikp321-04ikp321-04
ikp321-04
 
ikp321-03
ikp321-03ikp321-03
ikp321-03
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

ikh323-05

  • 1. Number Theory dan Modulo Multiplicative Inverse
  • 2. Kriptografi dan Sistem Keamanan Komputer  Standar Sistem Keamanan  Enkripsi Kunci Simetrik  Number Theory  Enkripsi Kunci Publik  Autentikasi Pesan dan Fungsi Hash 2011-2012-3 Anung Ariwibowo 2
  • 3. Himpunan bilangan  Operasi yang ditentukan terhadap elemen- elemen himpunan tersebut  Hasil operasi berada di dalam himpunan (closure)  Memenuhi  associative law: (a.b).c = a.(b.c)  has identity e: e.a = a.e = a  has inverses a-1: a.a-1 = e  Jika memenuhi hukum commutative  a.b = b.a  Abelian group
  • 4. exponentiation  repeated application of operator  a3 = a.a.a  Elemen identitas  e=a0  Cyclic group  Setiap elemen adalah exponent dari sebuah generator  b = ak for some a and every b in group  a = generator  b = elemen-elemen himpunan selain a
  • 5. a set of “numbers”  with two operations (addition and multiplication) which form:  an abelian group with addition operation  and multiplication:  has closure  is associative  distributive over addition: a(b+c) = ab + ac  if multiplication operation is commutative, it forms a commutative ring  if multiplication operation has an identity and no zero divisors, it forms an integral domain
  • 6. modulo operator “a mod n” didefinisikan sebagai sisa bagi jika a dibagi n  congruence: a ≡ b mod n  jika dibagi n, a dan b memiliki sisa bagi yang sama  100 ≡ 34 mod 11  b disebut residue dari operasi a mod n  untuk integer: a = qn + b  biasanya dipilih sisa bagi positif terkecil  ie. 0 <= b <= n-1  modulo reduction  -12 mod 7 = -5 mod 7 = 2 mod 7 = 9 mod 7
  • 7. a mod n  a≥0  a = qn + b  q≥0  b≥0  a<0  'overshoot'  a = qn + b  q<0  b≥0 2011-2012-3 Anung Ariwibowo 7
  • 8. a mod n  0≤a<1  a = qn + b  q≥0  b≥0  Modular Multiplicative Inverse  aa-1 = 1 2011-2012-3 Anung Ariwibowo 8
  • 9. Sebuah bilangan bukan-nol b membagi a jika untuk sebuah bilangan m didapatkan a=mb (a,b,m adalah integers)  d.kl. b membagi a tanpa sisa  dituliskan: b|a  dikatakan b adalah pembagi dari a  Contoh: all of 1,2,3,4,6,8,12,24 divide 24
  • 10. 'clock arithmetic'  menggunakan sejumlah berhingga bilangan  loops back from either end  modular arithmetic is when do addition & multiplication and modulo reduce answer  can do reduction at any point  a+b mod n = [a mod n + b mod n] mod n
  • 11. bisa diterapkan kepada sembarang group of integers  Zn = {0, 1, … , n-1}  Membentuk commutative ring for addition dengan multiplicative identity  note some peculiarities  if (a+b)=(a+c) mod n then b=c mod n  but if (a.b)=(a.c) mod n then b=c mod n only if a is relatively prime to n
  • 12. + 0 1 2 3 4 5 6 7 0 0 1 2 3 4 5 6 7 1 1 2 3 4 5 6 7 0 2 2 3 4 5 6 7 0 1 3 3 4 5 6 7 0 1 2 4 4 5 6 7 0 1 2 3 5 5 6 7 0 1 2 3 4 6 6 7 0 1 2 3 4 5 7 7 0 1 2 3 4 5 6
  • 13. [0]: {0, 8, 16, 24, . . .}  [1]: {1, 9, 17, . . .}  [2]: {2, 10, . . .}  [3]: {3, 11, . . .}  [4]: {4, 12, . . .}  [5]: {5, 13, . . .}  [6]: {6, 14, . . .}  [7]: {7, 15, . . .} 2011-2012-3 Anung Ariwibowo 13
  • 14. a common problem in number theory  GCD (a,b) of a and b is the largest number that divides evenly into both a and b  eg GCD(60,24) = 12  often want no common factors (except 1) and hence numbers are relatively prime  eg GCD(8,15) = 1  hence 8 & 15 are relatively prime
  • 15. an efficient way to find the GCD(a,b)  memanfaatkan teorema:  GCD(a,b) = GCD(b, a mod b)  Versi iteratif EUCLID(a,b) 1. A = a; B = b 2. if B = 0 return A 3. R = A mod B 4. A = B 5. B = R 6. goto 2
  • 16. Versi rekursif  Kuis(a,b)  if b = 0 then return a  else Kuis(b, a mod b) 2011-2012-3 Anung Ariwibowo 16
  • 17. 1970 = 1 x 1066 + 904 gcd(1066, 904) 1066 = 1 x 904 + 162 gcd(904, 162) 904 = 5 x 162 + 94 gcd(162, 94) 162 = 1 x 94 + 68 gcd(94, 68) 94 = 1 x 68 + 26 gcd(68, 26) 68 = 2 x 26 + 16 gcd(26, 16) 26 = 1 x 16 + 10 gcd(16, 10) 16 = 1 x 10 + 6 gcd(10, 6) 10 = 1 x 6 + 4 gcd(6, 4) 6 = 1 x 4 + 2 gcd(4, 2) 4 = 2 x 2 + 0 gcd(2, 0)
  • 18. Sebuah integer x yang memenuhi  a-1 ≡ x mod n  ax ≡ aa-1 mod n  ax ≡ 1 mod n  hanya ada jika a dan n coprime  Contoh  3-1 ≡ x mod 11  3x ≡ 1 mod 11  x=4  0 ≤ x < 11 2011-2012-3 Anung Ariwibowo 18
  • 19. Modular Multiplicative Inverse http://en.wikipedia.org/wiki/Modular_multiplicative _inverse  Stallings, "Cryptography and Network Security"http://williamstallings.com/Cryptography/  Schneier, "Applied Cryptography" http://www.schneier.com/book-applied.html  Thomas L Noack, http://ece.uprm.edu/~noack/crypto/  Slides tjerdastangkas.blogspot.com/search/label/ikh323 2011-2012-3 Anung Ariwibowo 19