SlideShare une entreprise Scribd logo
1  sur  15
Mathematical Foundations
Adri Jovin J J, M.Tech., Ph.D.
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY
Overview
• Divisibility
• Division Algorithm
• Modular Arithmetic
• Euclidean Algorithm
• Extended Euclidean Algorithm
• Groups, Rings and Fields
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 2
• Prime Numbers
• Relative Primality
• Fermat’s Theorem
• Euler Totient Function
• Euler’s Theorem
• Chinese Remainder Theorem
Divisibility
If 𝒂, 𝒃 ∈ ℤ, 𝒃 = 𝟎, then to say that 𝒃 divides 𝒂, denoted by 𝒃|𝒂,
means that 𝒂 = 𝒃𝒙 for a unique 𝒙 ∈ ℤ, denoted by 𝒙 = 𝒂/𝒃.
• The existence and uniqueness of 𝑥 implies that 𝑏 cannot be 0
• This can be stated as 𝑎 is divisible by 𝑏.
• If 𝑏 does not divide 𝑎, then we write 𝑏 ∤ 𝑎 and say that 𝑎 is not divisible by 𝑏.
• Division by zero is undefined.
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 3
Division Algorithm
If 𝒂 ∈ ℕ and 𝒃 ∈ ℤ, then there exist unique integers 𝒒, 𝒓 ∈ ℤ
with 𝟎 ≤ 𝒓 ≤ 𝒂, and 𝒃 = 𝒂𝒒 + 𝒓.
Proof:
Two parts
• Existence
• Uniqueness
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 4
Modular Arithmetic
Let 𝒏 ∈ ℕ and suppose that for any 𝒙 ∈ ℤ,
𝒙 denotes the congruence class of 𝒙 modulo 𝒏.
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 5
Congruence:
If 𝒏 ∈ ℕ, then we say that a is congruent to 𝒃 modulo 𝒏 if 𝒏 | (𝒂 − 𝒃), denoted by
𝒂 ≡ 𝒃 (𝒎𝒐𝒅 𝒏).
On the other hand, if 𝒏 ∤ (𝒂 − 𝒃), then we write
𝒂 ≢ 𝒃 (𝒎𝒐𝒅 𝒏)
and say that 𝒂 and 𝒃 are incongruent modulo 𝒏, or that 𝒂 is not congruent to 𝒃 modulo 𝒏. The
integer 𝒏 is the modulus of the congruence. The set of all integers that are congruent to a given
integer 𝒎 modulo 𝒏, denoted by 𝒎, is called the congruence class or residue class of 𝒎 modulo 𝒏.
Sometimes termed “clock arithmetic”
Euclidean Algorithm
Let 𝒂, 𝒃 ∈ ℤ (𝒂 ≥ 𝒃 > 𝟎), and set 𝒂 = 𝒓−𝟏, 𝒃 = 𝒓 𝟎. By repeatedly applying the Division
Algorithm, we get 𝒓𝒋−𝟏 = 𝒓𝒋 𝒒𝒋+𝟏 + 𝒓𝒋+𝟏 with 𝟎 < 𝒓𝒋+𝟏 < 𝒓𝒋 for all 𝟎 ≤ 𝒋 < 𝒏, where 𝒏 is the
least non-negative number such that 𝒓 𝒏+𝟏 = 𝟎, in which case 𝒈𝒄𝒅 𝒂, 𝒃 = 𝒓𝒏.
An equivalent definition: 𝒈𝒄𝒅 𝒂, 𝒃 = 𝒎𝒂𝒙 𝒌, 𝒔𝒖𝒄𝒉 𝒕𝒉𝒂𝒕 𝒌 𝒂 𝒂𝒏𝒅 𝒌 𝒃
A simpler form: Let 𝒂, 𝒃 > 𝟏 with 𝒃 ∤ 𝒂. Then,
gcd(𝒂, 𝒃) = gcd(𝒃, [𝒂 𝒎𝒐𝒅 𝒃])
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 6
The Euclidean algorithm GCD
Input: Integers 𝑎, 𝑏 with 𝑎 ≥ 𝑏 > 0
Output: The greatest common divisor
of 𝑎 and 𝑏
if 𝑏 𝑑𝑖𝑣𝑖𝑑𝑒𝑠 𝑎
return 𝑏
else
return 𝐺𝐶𝐷(𝑏, [𝑎 𝑚𝑜𝑑 𝑏])
Extended Euclidean Algorithm
Let 𝒂, 𝒃 ∈ ℕ, and let 𝒒𝒊 for 𝒊 = 𝟏, 𝟐, . . . , 𝒏 + 𝟏 be the quotients obtained from the application of the
Euclidean Algorithm to find 𝒈 = gcd(𝒂, 𝒃), where 𝒏 is the least non-negative integer such that 𝒓 𝒏+𝟏 =
𝟎. If 𝒔−𝟏 = 𝟏, 𝒔 𝟎 = 𝟎, and
𝒔𝒊 = 𝒔𝒊−𝟐 − 𝒒 𝒏−𝟏+𝟐 𝒔𝒊−𝟏,
for 𝒊 = 𝟏, 𝟐, . . . , 𝒏 + 𝟏, then
𝒈 = 𝒔 𝒏+𝟏 𝒂 + 𝒔 𝒏 𝒃.
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 7
The extended Euclidean algorithm eGCD
Input: Integers 𝑎, 𝑏 with 𝑎 ≥ 𝑏 > 0
Output: (𝑑, 𝑋, 𝑌) with 𝑑 = 𝑔𝑐𝑑(𝑎, 𝑏) and 𝑋 𝑎 + 𝑌𝑏 = 𝑑
if 𝑏 𝑑𝑖𝑣𝑖𝑑𝑒𝑠 𝑎
return (𝑏, 0, 1)
else
Compute integers 𝑞, 𝑟 with 𝑎 = 𝑞𝑏 + 𝑟 and 0 < 𝑟 < 𝑏
(𝑑, 𝑋, 𝑌) ∶= 𝑒𝐺𝐶𝐷(𝑏, 𝑟) /* note that 𝑋𝑏 + 𝑌𝑟 = 𝑑 */
return (𝑑, 𝑌, 𝑋 − 𝑌𝑞)
Groups, Rings and Fields
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 8
Image Source: Cryptography and Network Security: Principles and Practices, 6th Ed.
Prime Numbers
Why Prime numbers are prominently used in Cryptography?
Difficulty in determining the prime factors of a large number …
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 9
The Factoring Problem is the determination of the prime
factorization of a given 𝒏 ∈ ℕ guaranteed by The Fundamental
Theorem of Arithmetic. This theorem says that the primes in the
factorization of a given natural number 𝑛 are unique to 𝑛 up to
order of the factors. Thus, the prime numbers are the
fundamental building blocks of number theory.
Relative Primality
If 𝒂, 𝒃 ∈ 𝒁, and 𝒈𝒄𝒅(𝒂, 𝒃) = 𝟏, then 𝒂 and 𝒃 are said to be relatively prime or coprime.
Sometimes the phrase
𝒂 is prime to 𝒃
is also used.
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 10
Fermat’s Theorem
If 𝒑 is prime and 𝒂 is a positive integer not divisible by 𝒑, then
𝒂 𝒑−𝟏 ≡ 𝟏 (𝒎𝒐𝒅 𝒑)
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 11
Euler Totient Function
The Euler’s totient function, usually represented as 𝝓 𝒏 is defined as the number of
positive integers less than 𝒏 and relatively prime to 𝒏.
By convention, 𝝓 𝟏 = 𝟏.
In general, 𝝓 𝒏 = 𝒏 − 𝟏
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 12
Euler’s Theorem
For every 𝒂 and 𝒏 that are relatively prime:
𝒂 𝝓(𝒏)
≡ 𝟏(𝒎𝒐𝒅 𝒏)
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 13
Chinese Remainder Theorem
Discovered by the Chinese mathematician Sun Tse
Let 𝒏𝒊 ∈ ℕ for natural numbers 𝒊 ≤ 𝒌 ∈ ℕ be pairwise relatively prime, set
𝒏 =
𝒋=𝟏
𝒌
𝒏𝒋
and let 𝒓𝒊 ∈ ℤ for 𝒊 ≤ 𝒌. Then the system of 𝒌 simultaneous linear congruences given by
𝒙 ≡ 𝒓 𝟏 (𝒎𝒐𝒅 𝒏 𝟏),
𝒙 ≡ 𝒓 𝟐 (𝒎𝒐𝒅 𝒏 𝟐),
…
𝒙 ≡ 𝒓 𝒌 (𝒎𝒐𝒅 𝒏 𝒌),
has a unique solution modulo 𝒏.
In simpler terms, if the prime factorization of 𝒏 is 𝒑 𝟏 ∗ 𝒑 𝟐 ∗ ⋯ ∗ 𝒑 𝒕, then the system of equations
(𝒙 𝒎𝒐𝒅 𝒑𝒊) = 𝒂𝒊, 𝒘𝒉𝒆𝒓𝒆 𝒊 = 𝟏, 𝟐, … , 𝒕
has a unique solution, 𝒙, where 𝒙 is less than 𝒏.
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 14
References
Schneier, B. (2007). Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons.
Rosen, K. H. (2007). An Introduction to Cryptography. ISBN-10, 1-58488.
Stallings, W. (2014). Cryptography and network security, 6/E. Pearson Education India.
Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. CRC press.
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 15

Contenu connexe

Tendances

Tendances (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Clustering Malware Activity: How We Do Attribution
Clustering Malware Activity: How We Do AttributionClustering Malware Activity: How We Do Attribution
Clustering Malware Activity: How We Do Attribution
 
Cryptography
CryptographyCryptography
Cryptography
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber Security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Affine Cypher Encryption - Decryption
Affine Cypher Encryption - DecryptionAffine Cypher Encryption - Decryption
Affine Cypher Encryption - Decryption
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
Chap7 2 Ecc Intro
Chap7 2 Ecc IntroChap7 2 Ecc Intro
Chap7 2 Ecc Intro
 
1. Linear Algebra for Machine Learning: Linear Systems
1. Linear Algebra for Machine Learning: Linear Systems1. Linear Algebra for Machine Learning: Linear Systems
1. Linear Algebra for Machine Learning: Linear Systems
 
Rc4
Rc4Rc4
Rc4
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Password based cryptography
Password based cryptographyPassword based cryptography
Password based cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 

Similaire à Mathematical Foundations of Cryptography

Integers and matrices (slides)
Integers and matrices (slides)Integers and matrices (slides)
Integers and matrices (slides)IIUM
 
Introduction to PyTorch
Introduction to PyTorchIntroduction to PyTorch
Introduction to PyTorchJun Young Park
 
Symbolic Computation via Gröbner Basis
Symbolic Computation via Gröbner BasisSymbolic Computation via Gröbner Basis
Symbolic Computation via Gröbner BasisIJERA Editor
 
Sequence Entropy and the Complexity Sequence Entropy For 𝒁𝒏Action
Sequence Entropy and the Complexity Sequence Entropy For 𝒁𝒏ActionSequence Entropy and the Complexity Sequence Entropy For 𝒁𝒏Action
Sequence Entropy and the Complexity Sequence Entropy For 𝒁𝒏ActionIJRES Journal
 
A PROBABILISTIC ALGORITHM OF COMPUTING THE POLYNOMIAL GREATEST COMMON DIVISOR...
A PROBABILISTIC ALGORITHM OF COMPUTING THE POLYNOMIAL GREATEST COMMON DIVISOR...A PROBABILISTIC ALGORITHM OF COMPUTING THE POLYNOMIAL GREATEST COMMON DIVISOR...
A PROBABILISTIC ALGORITHM OF COMPUTING THE POLYNOMIAL GREATEST COMMON DIVISOR...ijscmcj
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Generalised Statistical Convergence For Double Sequences
Generalised Statistical Convergence For Double SequencesGeneralised Statistical Convergence For Double Sequences
Generalised Statistical Convergence For Double SequencesIOSR Journals
 
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...mathsjournal
 
Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...
Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...
Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...cscpconf
 
Koh_Liang_ICML2017
Koh_Liang_ICML2017Koh_Liang_ICML2017
Koh_Liang_ICML2017Masa Kato
 
Efficient anomaly detection via matrix sketching
Efficient anomaly detection via matrix sketchingEfficient anomaly detection via matrix sketching
Efficient anomaly detection via matrix sketchingHsing-chuan Hsieh
 
A GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGN
A GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGNA GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGN
A GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGNcscpconf
 
A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...
A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...
A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...csandit
 
Numerical solution of fuzzy differential equations by Milne’s predictor-corre...
Numerical solution of fuzzy differential equations by Milne’s predictor-corre...Numerical solution of fuzzy differential equations by Milne’s predictor-corre...
Numerical solution of fuzzy differential equations by Milne’s predictor-corre...mathsjournal
 
Tutorial Equivariance in Imaging ICMS 23.pptx
Tutorial Equivariance in Imaging ICMS 23.pptxTutorial Equivariance in Imaging ICMS 23.pptx
Tutorial Equivariance in Imaging ICMS 23.pptxJulián Tachella
 

Similaire à Mathematical Foundations of Cryptography (20)

Integers and matrices (slides)
Integers and matrices (slides)Integers and matrices (slides)
Integers and matrices (slides)
 
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
 
PETERSON BERGE
PETERSON BERGEPETERSON BERGE
PETERSON BERGE
 
DDDDDDDDDDDDDDDDDD
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
DDDDDDDDDDDDDDDDDD
 
Introduction to PyTorch
Introduction to PyTorchIntroduction to PyTorch
Introduction to PyTorch
 
Symbolic Computation via Gröbner Basis
Symbolic Computation via Gröbner BasisSymbolic Computation via Gröbner Basis
Symbolic Computation via Gröbner Basis
 
Sequence Entropy and the Complexity Sequence Entropy For 𝒁𝒏Action
Sequence Entropy and the Complexity Sequence Entropy For 𝒁𝒏ActionSequence Entropy and the Complexity Sequence Entropy For 𝒁𝒏Action
Sequence Entropy and the Complexity Sequence Entropy For 𝒁𝒏Action
 
A PROBABILISTIC ALGORITHM OF COMPUTING THE POLYNOMIAL GREATEST COMMON DIVISOR...
A PROBABILISTIC ALGORITHM OF COMPUTING THE POLYNOMIAL GREATEST COMMON DIVISOR...A PROBABILISTIC ALGORITHM OF COMPUTING THE POLYNOMIAL GREATEST COMMON DIVISOR...
A PROBABILISTIC ALGORITHM OF COMPUTING THE POLYNOMIAL GREATEST COMMON DIVISOR...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Machine Learning 1
Machine Learning 1Machine Learning 1
Machine Learning 1
 
Generalised Statistical Convergence For Double Sequences
Generalised Statistical Convergence For Double SequencesGeneralised Statistical Convergence For Double Sequences
Generalised Statistical Convergence For Double Sequences
 
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
 
Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...
Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...
Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...
 
Koh_Liang_ICML2017
Koh_Liang_ICML2017Koh_Liang_ICML2017
Koh_Liang_ICML2017
 
Efficient anomaly detection via matrix sketching
Efficient anomaly detection via matrix sketchingEfficient anomaly detection via matrix sketching
Efficient anomaly detection via matrix sketching
 
A GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGN
A GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGNA GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGN
A GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGN
 
A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...
A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...
A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...
 
Numerical solution of fuzzy differential equations by Milne’s predictor-corre...
Numerical solution of fuzzy differential equations by Milne’s predictor-corre...Numerical solution of fuzzy differential equations by Milne’s predictor-corre...
Numerical solution of fuzzy differential equations by Milne’s predictor-corre...
 
Tutorial Equivariance in Imaging ICMS 23.pptx
Tutorial Equivariance in Imaging ICMS 23.pptxTutorial Equivariance in Imaging ICMS 23.pptx
Tutorial Equivariance in Imaging ICMS 23.pptx
 
control_5.pptx
control_5.pptxcontrol_5.pptx
control_5.pptx
 

Plus de Adri Jovin

Adri Jovin J J - CV
Adri Jovin J J - CVAdri Jovin J J - CV
Adri Jovin J J - CVAdri Jovin
 
Introduction to Relational Database Management Systems
Introduction to Relational Database Management SystemsIntroduction to Relational Database Management Systems
Introduction to Relational Database Management SystemsAdri Jovin
 
Introduction to ER Diagrams
Introduction to ER DiagramsIntroduction to ER Diagrams
Introduction to ER DiagramsAdri Jovin
 
Introduction to Database Management Systems
Introduction to Database Management SystemsIntroduction to Database Management Systems
Introduction to Database Management SystemsAdri Jovin
 
Neural Networks
Neural NetworksNeural Networks
Neural NetworksAdri Jovin
 
Introduction to Genetic Algorithm
Introduction to Genetic AlgorithmIntroduction to Genetic Algorithm
Introduction to Genetic AlgorithmAdri Jovin
 
Introduction to Fuzzy logic
Introduction to Fuzzy logicIntroduction to Fuzzy logic
Introduction to Fuzzy logicAdri Jovin
 
Introduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksIntroduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksAdri Jovin
 
Introductory Session on Soft Computing
Introductory Session on Soft ComputingIntroductory Session on Soft Computing
Introductory Session on Soft ComputingAdri Jovin
 
Creative Commons
Creative CommonsCreative Commons
Creative CommonsAdri Jovin
 
Image based security
Image based securityImage based security
Image based securityAdri Jovin
 
Blockchain Technologies
Blockchain TechnologiesBlockchain Technologies
Blockchain TechnologiesAdri Jovin
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityAdri Jovin
 
Heartbleed Bug: A case study
Heartbleed Bug: A case studyHeartbleed Bug: A case study
Heartbleed Bug: A case studyAdri Jovin
 
Zoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case studyZoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case studyAdri Jovin
 
Security Models
Security ModelsSecurity Models
Security ModelsAdri Jovin
 
Introduction to blockchains
Introduction to blockchainsIntroduction to blockchains
Introduction to blockchainsAdri Jovin
 
Security tools
Security toolsSecurity tools
Security toolsAdri Jovin
 
Python - Functions - Azure Jupyter Notebooks
Python - Functions - Azure Jupyter NotebooksPython - Functions - Azure Jupyter Notebooks
Python - Functions - Azure Jupyter NotebooksAdri Jovin
 
Theoretical Foundations of Computer Science - Graphs
Theoretical Foundations of Computer Science - GraphsTheoretical Foundations of Computer Science - Graphs
Theoretical Foundations of Computer Science - GraphsAdri Jovin
 

Plus de Adri Jovin (20)

Adri Jovin J J - CV
Adri Jovin J J - CVAdri Jovin J J - CV
Adri Jovin J J - CV
 
Introduction to Relational Database Management Systems
Introduction to Relational Database Management SystemsIntroduction to Relational Database Management Systems
Introduction to Relational Database Management Systems
 
Introduction to ER Diagrams
Introduction to ER DiagramsIntroduction to ER Diagrams
Introduction to ER Diagrams
 
Introduction to Database Management Systems
Introduction to Database Management SystemsIntroduction to Database Management Systems
Introduction to Database Management Systems
 
Neural Networks
Neural NetworksNeural Networks
Neural Networks
 
Introduction to Genetic Algorithm
Introduction to Genetic AlgorithmIntroduction to Genetic Algorithm
Introduction to Genetic Algorithm
 
Introduction to Fuzzy logic
Introduction to Fuzzy logicIntroduction to Fuzzy logic
Introduction to Fuzzy logic
 
Introduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksIntroduction to Artificial Neural Networks
Introduction to Artificial Neural Networks
 
Introductory Session on Soft Computing
Introductory Session on Soft ComputingIntroductory Session on Soft Computing
Introductory Session on Soft Computing
 
Creative Commons
Creative CommonsCreative Commons
Creative Commons
 
Image based security
Image based securityImage based security
Image based security
 
Blockchain Technologies
Blockchain TechnologiesBlockchain Technologies
Blockchain Technologies
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Heartbleed Bug: A case study
Heartbleed Bug: A case studyHeartbleed Bug: A case study
Heartbleed Bug: A case study
 
Zoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case studyZoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case study
 
Security Models
Security ModelsSecurity Models
Security Models
 
Introduction to blockchains
Introduction to blockchainsIntroduction to blockchains
Introduction to blockchains
 
Security tools
Security toolsSecurity tools
Security tools
 
Python - Functions - Azure Jupyter Notebooks
Python - Functions - Azure Jupyter NotebooksPython - Functions - Azure Jupyter Notebooks
Python - Functions - Azure Jupyter Notebooks
 
Theoretical Foundations of Computer Science - Graphs
Theoretical Foundations of Computer Science - GraphsTheoretical Foundations of Computer Science - Graphs
Theoretical Foundations of Computer Science - Graphs
 

Dernier

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Dernier (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Mathematical Foundations of Cryptography

  • 1. Mathematical Foundations Adri Jovin J J, M.Tech., Ph.D. UITC203 CRYPTOGRAPHY AND NETWORK SECURITY
  • 2. Overview • Divisibility • Division Algorithm • Modular Arithmetic • Euclidean Algorithm • Extended Euclidean Algorithm • Groups, Rings and Fields UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 2 • Prime Numbers • Relative Primality • Fermat’s Theorem • Euler Totient Function • Euler’s Theorem • Chinese Remainder Theorem
  • 3. Divisibility If 𝒂, 𝒃 ∈ ℤ, 𝒃 = 𝟎, then to say that 𝒃 divides 𝒂, denoted by 𝒃|𝒂, means that 𝒂 = 𝒃𝒙 for a unique 𝒙 ∈ ℤ, denoted by 𝒙 = 𝒂/𝒃. • The existence and uniqueness of 𝑥 implies that 𝑏 cannot be 0 • This can be stated as 𝑎 is divisible by 𝑏. • If 𝑏 does not divide 𝑎, then we write 𝑏 ∤ 𝑎 and say that 𝑎 is not divisible by 𝑏. • Division by zero is undefined. UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 3
  • 4. Division Algorithm If 𝒂 ∈ ℕ and 𝒃 ∈ ℤ, then there exist unique integers 𝒒, 𝒓 ∈ ℤ with 𝟎 ≤ 𝒓 ≤ 𝒂, and 𝒃 = 𝒂𝒒 + 𝒓. Proof: Two parts • Existence • Uniqueness UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 4
  • 5. Modular Arithmetic Let 𝒏 ∈ ℕ and suppose that for any 𝒙 ∈ ℤ, 𝒙 denotes the congruence class of 𝒙 modulo 𝒏. UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 5 Congruence: If 𝒏 ∈ ℕ, then we say that a is congruent to 𝒃 modulo 𝒏 if 𝒏 | (𝒂 − 𝒃), denoted by 𝒂 ≡ 𝒃 (𝒎𝒐𝒅 𝒏). On the other hand, if 𝒏 ∤ (𝒂 − 𝒃), then we write 𝒂 ≢ 𝒃 (𝒎𝒐𝒅 𝒏) and say that 𝒂 and 𝒃 are incongruent modulo 𝒏, or that 𝒂 is not congruent to 𝒃 modulo 𝒏. The integer 𝒏 is the modulus of the congruence. The set of all integers that are congruent to a given integer 𝒎 modulo 𝒏, denoted by 𝒎, is called the congruence class or residue class of 𝒎 modulo 𝒏. Sometimes termed “clock arithmetic”
  • 6. Euclidean Algorithm Let 𝒂, 𝒃 ∈ ℤ (𝒂 ≥ 𝒃 > 𝟎), and set 𝒂 = 𝒓−𝟏, 𝒃 = 𝒓 𝟎. By repeatedly applying the Division Algorithm, we get 𝒓𝒋−𝟏 = 𝒓𝒋 𝒒𝒋+𝟏 + 𝒓𝒋+𝟏 with 𝟎 < 𝒓𝒋+𝟏 < 𝒓𝒋 for all 𝟎 ≤ 𝒋 < 𝒏, where 𝒏 is the least non-negative number such that 𝒓 𝒏+𝟏 = 𝟎, in which case 𝒈𝒄𝒅 𝒂, 𝒃 = 𝒓𝒏. An equivalent definition: 𝒈𝒄𝒅 𝒂, 𝒃 = 𝒎𝒂𝒙 𝒌, 𝒔𝒖𝒄𝒉 𝒕𝒉𝒂𝒕 𝒌 𝒂 𝒂𝒏𝒅 𝒌 𝒃 A simpler form: Let 𝒂, 𝒃 > 𝟏 with 𝒃 ∤ 𝒂. Then, gcd(𝒂, 𝒃) = gcd(𝒃, [𝒂 𝒎𝒐𝒅 𝒃]) UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 6 The Euclidean algorithm GCD Input: Integers 𝑎, 𝑏 with 𝑎 ≥ 𝑏 > 0 Output: The greatest common divisor of 𝑎 and 𝑏 if 𝑏 𝑑𝑖𝑣𝑖𝑑𝑒𝑠 𝑎 return 𝑏 else return 𝐺𝐶𝐷(𝑏, [𝑎 𝑚𝑜𝑑 𝑏])
  • 7. Extended Euclidean Algorithm Let 𝒂, 𝒃 ∈ ℕ, and let 𝒒𝒊 for 𝒊 = 𝟏, 𝟐, . . . , 𝒏 + 𝟏 be the quotients obtained from the application of the Euclidean Algorithm to find 𝒈 = gcd(𝒂, 𝒃), where 𝒏 is the least non-negative integer such that 𝒓 𝒏+𝟏 = 𝟎. If 𝒔−𝟏 = 𝟏, 𝒔 𝟎 = 𝟎, and 𝒔𝒊 = 𝒔𝒊−𝟐 − 𝒒 𝒏−𝟏+𝟐 𝒔𝒊−𝟏, for 𝒊 = 𝟏, 𝟐, . . . , 𝒏 + 𝟏, then 𝒈 = 𝒔 𝒏+𝟏 𝒂 + 𝒔 𝒏 𝒃. UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 7 The extended Euclidean algorithm eGCD Input: Integers 𝑎, 𝑏 with 𝑎 ≥ 𝑏 > 0 Output: (𝑑, 𝑋, 𝑌) with 𝑑 = 𝑔𝑐𝑑(𝑎, 𝑏) and 𝑋 𝑎 + 𝑌𝑏 = 𝑑 if 𝑏 𝑑𝑖𝑣𝑖𝑑𝑒𝑠 𝑎 return (𝑏, 0, 1) else Compute integers 𝑞, 𝑟 with 𝑎 = 𝑞𝑏 + 𝑟 and 0 < 𝑟 < 𝑏 (𝑑, 𝑋, 𝑌) ∶= 𝑒𝐺𝐶𝐷(𝑏, 𝑟) /* note that 𝑋𝑏 + 𝑌𝑟 = 𝑑 */ return (𝑑, 𝑌, 𝑋 − 𝑌𝑞)
  • 8. Groups, Rings and Fields UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 8 Image Source: Cryptography and Network Security: Principles and Practices, 6th Ed.
  • 9. Prime Numbers Why Prime numbers are prominently used in Cryptography? Difficulty in determining the prime factors of a large number … UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 9 The Factoring Problem is the determination of the prime factorization of a given 𝒏 ∈ ℕ guaranteed by The Fundamental Theorem of Arithmetic. This theorem says that the primes in the factorization of a given natural number 𝑛 are unique to 𝑛 up to order of the factors. Thus, the prime numbers are the fundamental building blocks of number theory.
  • 10. Relative Primality If 𝒂, 𝒃 ∈ 𝒁, and 𝒈𝒄𝒅(𝒂, 𝒃) = 𝟏, then 𝒂 and 𝒃 are said to be relatively prime or coprime. Sometimes the phrase 𝒂 is prime to 𝒃 is also used. UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 10
  • 11. Fermat’s Theorem If 𝒑 is prime and 𝒂 is a positive integer not divisible by 𝒑, then 𝒂 𝒑−𝟏 ≡ 𝟏 (𝒎𝒐𝒅 𝒑) UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 11
  • 12. Euler Totient Function The Euler’s totient function, usually represented as 𝝓 𝒏 is defined as the number of positive integers less than 𝒏 and relatively prime to 𝒏. By convention, 𝝓 𝟏 = 𝟏. In general, 𝝓 𝒏 = 𝒏 − 𝟏 UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 12
  • 13. Euler’s Theorem For every 𝒂 and 𝒏 that are relatively prime: 𝒂 𝝓(𝒏) ≡ 𝟏(𝒎𝒐𝒅 𝒏) UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 13
  • 14. Chinese Remainder Theorem Discovered by the Chinese mathematician Sun Tse Let 𝒏𝒊 ∈ ℕ for natural numbers 𝒊 ≤ 𝒌 ∈ ℕ be pairwise relatively prime, set 𝒏 = 𝒋=𝟏 𝒌 𝒏𝒋 and let 𝒓𝒊 ∈ ℤ for 𝒊 ≤ 𝒌. Then the system of 𝒌 simultaneous linear congruences given by 𝒙 ≡ 𝒓 𝟏 (𝒎𝒐𝒅 𝒏 𝟏), 𝒙 ≡ 𝒓 𝟐 (𝒎𝒐𝒅 𝒏 𝟐), … 𝒙 ≡ 𝒓 𝒌 (𝒎𝒐𝒅 𝒏 𝒌), has a unique solution modulo 𝒏. In simpler terms, if the prime factorization of 𝒏 is 𝒑 𝟏 ∗ 𝒑 𝟐 ∗ ⋯ ∗ 𝒑 𝒕, then the system of equations (𝒙 𝒎𝒐𝒅 𝒑𝒊) = 𝒂𝒊, 𝒘𝒉𝒆𝒓𝒆 𝒊 = 𝟏, 𝟐, … , 𝒕 has a unique solution, 𝒙, where 𝒙 is less than 𝒏. UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 14
  • 15. References Schneier, B. (2007). Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons. Rosen, K. H. (2007). An Introduction to Cryptography. ISBN-10, 1-58488. Stallings, W. (2014). Cryptography and network security, 6/E. Pearson Education India. Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. CRC press. UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 15