Cryptosystem. Diploma Thesis. Mol Petros. July 17, Supervisor: Stathis Zachos
|
|
- Myra Garrett
- 7 years ago
- Views:
Transcription
1 s and s and Diploma Thesis Department of Electrical and Computer Engineering, National Technical University of Athens July 17, 2006 Supervisor: Stathis Zachos ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
2 s and 1 2 and Properties 3 4 on Low Public Exponent Factoring Low Private Exponent 5 ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
3 s and What is a? Informally: A infinite regular arrangement of points in space. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
4 s and Where are the lattices used? In late 18 th and 19 th century mathematicians such as Lagrange, Gauss and Hermite used lattices in the field of algebraic number theory. In the 19 th century, important results due to Minkowski motivated the use of lattice theory in the theory and geometry of numbers. More recently, lattices have become a topic of active research in Computer Science. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
5 s and Where are the lattices used? In late 18 th and 19 th century mathematicians such as Lagrange, Gauss and Hermite used lattices in the field of algebraic number theory. In the 19 th century, important results due to Minkowski motivated the use of lattice theory in the theory and geometry of numbers. More recently, lattices have become a topic of active research in Computer Science. In Cryptology... s have found applications both in Cryptography, where hard lattice problems are used to design secure cryptosystems (GGH, NTRU and more) and in Cryptanalysis, where lattices are used to break cryptosystems. (Merkle-Hellman, GGH, attacks against ). ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
6 s and Some Motivating Questions ➀ is based on the hardness of inverting the function f (x) = x e mod N. However, if x < N 1 e the inversion is trivial. What if someone encrypts x + s instead of x where s is known? Can one still recover x provided that x < N 1 e? ➁ The problem of factoring N = p q is considered to be hard in general. If we know some of the bits of p (or q) can we do anything to recover the full factorization of N? ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
7 s and Some Motivating Questions ➀ is based on the hardness of inverting the function f (x) = x e mod N. However, if x < N 1 e the inversion is trivial. What if someone encrypts x + s instead of x where s is known? Can one still recover x provided that x < N 1 e? ➁ The problem of factoring N = p q is considered to be hard in general. If we know some of the bits of p (or q) can we do anything to recover the full factorization of N? And an Answer s give answers to the above (and many other) questions in Cryptology. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
8 s and Presentation Overview (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
9 s and 1 2 and Properties 3 4 on Low Public Exponent Factoring Low Private Exponent 5 ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
10 s and Formal Definition Let B = {b 1, b 2,..., b n } be a set of linearly independent vectors R n. The lattice generated by B is the set n L(B) = { x i b i : x i Z}. i=1 is a discrete additive subgroup of R n. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
11 s and Formal Definition Let B = {b 1, b 2,..., b n } be a set of linearly independent vectors R n. The lattice generated by B is the set n L(B) = { x i b i : x i Z}. i=1 is a discrete additive subgroup of R n. Basis The set B is called basis and we can compactly represent it as an n n matrix each column of which is a basis vector: B = [b 1, b 2,..., b n ]. Obviously b i L for each i = 1, 2,..., n. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
12 s and Example Consider the following two different bases. [ ] [ ] 1 0 B = and B 1 2 = The above bases are equivalent, that is they produce the same lattice. Figure: Another basis of Z 2 ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
13 s and Unimodular Matrix A matrix U Z n n is called unimodular if detu = ±1. Theorem (Bases Equivalence) Two bases B 1, B 2 R n n are equivalent if and only if B 2 = B 1 U for some unimodular matrix U. Elementary Column Operations Each of the following elementary column operations on a basis B can be represented with a multiplication B U where U is a unimodular matrix and vice versa. 1 b i b i + kb j for some k Z 2 b i b j 3 b i b i Two bases B 1, B 2 are equivalent iff we can produce B 2 by applying the above elementary column operations to B 1 and vice versa. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
14 s and Determinant The deteminant of a lattice L with basis B is defined as: Theorem det(l) = det(b). The determinant of a lattice is independent of the choice of basis b 1, b 2,..., b n R n. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
15 s and Determinant The deteminant of a lattice L with basis B is defined as: Theorem det(l) = det(b). The determinant of a lattice is independent of the choice of basis b 1, b 2,..., b n R n. Shortest Vector Let be an arbitrary norm. The shortest vector of the lattice is defined as the non-zero vector u L such that its norm is minimal. λ 1 (L) denotes the minimal norm. The problem of finding such a u is known as Shortest Vector problem (SVP) and is generally hard. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
16 s and 1 2 and Properties 3 4 on Low Public Exponent Factoring Low Private Exponent 5 ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
17 s and Example Consider the lattices produced by the following bases: [ ] [ ] B 1 = and B = 0 1 ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
18 s and Example Consider the lattices produced by the following bases: [ ] [ ] B 1 = and B = 0 1 The above bases are equivalent. But the second one seems simpler. This leads to the need for reduction. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
19 s and Example Consider the lattices produced by the following bases: [ ] [ ] B 1 = and B = 0 1 The above bases are equivalent. But the second one seems simpler. This leads to the need for reduction. Example (Reduction in Vector Space) Figure: Gram-Schmidt Orthogonalization ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
20 s and Does it work for lattices? [ ] [ ] NO. Let B =. Then B 0 1 =. 0 1 But B is not a basis ( for ) the lattice L(B). For example B 1 cannot produce b 2 =. 1 A new notion for reduction In 1982, A.K. Lenstra, H.W. Lenstra, and L. Lovasz presented a new notion of reduction and a polynomial time reduction algorithm, which is called LLL algorithm. 1 Does not guarantee to find the shortest lattice vector. 2 It guarantees to find in polynomial time a vector within a factor of the shortest vector. 3 In practice LLL algorithm often performs much better than the theoretical bound. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
21 s and Example Figure: A Bad Basis Figure: A Good Basis ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
22 s and Theorem On input B = [ b 1, b 2,..., b n ], LLL algorithm returns in Time an equivalent reduced basis B = [ b 1, b2,..., bn ] the vectors of which satisfy: b n λ 1 (L) (LLL1) b n det(l) 1 n (LLL2) LLL execution entails only elementary column operations. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
23 s and (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
24 s and 1 2 and Properties 3 4 on Low Public Exponent Factoring Low Private Exponent 5 ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
25 s and Problem Given: A large integer N of unknown factorization, a polynomial f Z[x] of degree d and a modular equation f (x) = a d x d + a d 1 x d a 1 x + a 0 0 (mod N). Goal:Find x 0 Z such that f (x 0 ) 0 (mod N). ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
26 s and Problem Given: A large integer N of unknown factorization, a polynomial f Z[x] of degree d and a modular equation f (x) = a d x d + a d 1 x d a 1 x + a 0 0 (mod N). Goal:Find x 0 Z such that f (x 0 ) 0 (mod N). Current Knowledge No known efficient algorithm for the general case. However, small roots can be found efficiently using LLL (1996,Coppersmith[Cop96b]). ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
27 s and Notation f (x) := i a ix i : polynomial with coefficients a i Z. Vector representation of s: if p(x) = 3x 3 + 2x + 20 then p = (20, 2, 0, 3) is the corresponding vector. Euclidean norm of a polynomial f : f 2 := i a2 i. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
28 s and Notation f (x) := i a ix i : polynomial with coefficients a i Z. Vector representation of s: if p(x) = 3x 3 + 2x + 20 then p = (20, 2, 0, 3) is the corresponding vector. Euclidean norm of a polynomial f : f 2 := i a2 i. Definition (Root container polynomial) A polynomial h is root container of a polynomial f if each root of f is also a root of h. When the roots are considered modulo N, we say that h is root container of f modulo N. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
29 s and Looking inside the problem How can we recover the small modular roots of f (x)? By transforming the modular equation to an equation over the integers. How small are the roots we can extract? We would like to be able to efficiently find all roots x 0 s.t x 0 < X for a bound X to be maximized. (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
30 s and Looking inside the problem How can we recover the small modular roots of f (x)? By transforming the modular equation to an equation over the integers. How small are the roots we can extract? We would like to be able to efficiently find all roots x 0 s.t x 0 < X for a bound X to be maximized. Basic Idea Find a polynomial h(x) Z[x] such that h(x 0 ) f (x 0 ) 0 (mod N) and h 2 = deg(h) i=0 h 2 i is small. (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
31 s and Looking inside the problem How can we recover the small modular roots of f (x)? By transforming the modular equation to an equation over the integers. How small are the roots we can extract? We would like to be able to efficiently find all roots x 0 s.t x 0 < X for a bound X to be maximized. Basic Idea Find a polynomial h(x) Z[x] such that h(x 0 ) f (x 0 ) 0 (mod N) and h 2 = deg(h) i=0 h 2 i is small. We still need... 1 A lemma that gives the conditions under which a modular equation can be transformed to an integer one. 2 An inequality that would determine the bound X. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
32 s and Lemma (Howgrave-Graham for s) Let h(x) Z[x] be a univariate polynomial with at most ω monomials. Suppose in addition that h satisfies the following two conditions: 1 h(x 0 ) 0(mod N) where x 0 < X and 2 h(xx ) N/ ω. Then h(x 0 ) = 0 holds over the integers. Maximizing the bound X Applying the second condition of the lemma for f may lead to small bounds. We can push X to larger values by replacing f with a root container polynomial h and then demand h(xx ) N/ ω. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
33 s and Early Constructions Set of root container polynomials Z 1 = {g 0 (x) = N, g 1 (x) = Nx,..., g d 1 (x) = Nx d 1, g d = f (x)}. Consider the following lattice L 1 with basis B 1 = 2N 0 f XN. Xf X d... X d 1 fd (d+1) (d+1) Each point of L 1 corresponds to the coefficient vector of a polynomial h(xx ) = d i=0 c ig i (xx ). f (x 0 ) 0 (mod N) h(x 0 ) 0 (mod N). ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
34 s and Bounding X Applying LLL to B 1 we get an equivalent (reduced) basis B 1 = [b 1, b 2,..., b n] where b 1 is the coefficient vector of a h(xx ) such that: b 1 = h(xx ) 2 d 4 det(l1 ) 1 d+1. The second condition of Howgrave-Graham Lemma s is satisfied if 2 d 4 det(l1 ) 1 d+1 < N d + 1 X k(d)n 2 d(d+1). where k(d) is a small enough constant that depends only on d. Summarizing: If we use Z 1 to construct the lattice, we can find all roots x 0 s.t f (x 0 ) 0 (mod N) and x 0 < k(d)n 2 d(d+1). ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
35 s and Can we do any better? YES. (Coppersmith) 1. Z 2 = {N, Nx, Nx 2,..., Nx d 1 } {f (x), xf (x),..., x d 1 f (x)} X l(d)n 1 2d Z h = {N h j 1 f (x) j x i 0 i < d, 0 j < h} Take LIC of the above set modulo N h 1 instead of modulo N. Bound achieved: X = N 1 d. Theorem (Coppersmith, ) Let f (x) be a monic polynomial of degree d. Let N be an integer of unknown factorization. If there exists a x 0 s.t. f (x 0 ) 0 (mod N) and x 0 < N 1 d. Then one can find x 0 in time polynomial in (log N, d). ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
36 s and Method Overview Step 1: Given f (x) construct an appropriate basis B which produces a lattice L the points of which correspond to polynomials that are root containers of f. Step 2: Run LLL on B to take an equivalent basis B with a small first basis vector b 1. Step 3: Consider the polynomial h(x) that corresponds to b 1 and solve the equation h(x) = 0 over the integers. Step 4: Test the roots obtained in step 3 and accept only those that satisfy f (x 0 ) 0 (mod N). The preceding analysis guarantees that all the modular roots of f (x) with x 0 < N 1 d will be found. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
37 s and 1 2 and Properties 3 4 on Low Public Exponent Factoring Low Private Exponent 5 ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
38 s and Case f ( x) = f (x 1, x 2,..., x k ) Z[x 1,..., x k ] f ( x) = f (x 1, x 2,..., x k ) = a i1,...,a k x i1 1...x i k k i 1,...,i k Idea:Directly Extend the previous approach. 0 (mod N). ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
39 s and Case f ( x) = f (x 1, x 2,..., x k ) Z[x 1,..., x k ] f ( x) = f (x 1, x 2,..., x k ) = a i1,...,a k x i1 1...x i k k i 1,...,i k Idea:Directly Extend the previous approach. 0 (mod N). Problem Goal: Find the maximum bounds X 1, X 2,..., X k which make possible the transformation of the modular equation to an equation over the integers. Difference: Since we have k unknown variables, we now need k polynomials h 1,..., h k with sufficiently small coefficient and which contain all the small roots of f. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
40 s and 1 2 and Properties 3 4 on Low Public Exponent Factoring Low Private Exponent 5 ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
41 s and The problem Given: A bivariate polynomial p(x, y) = i,j p i,j x i y j with integer coefficients. Goal: Find all integer pairs (x 0, y 0 ) such that p(x 0, y 0 ) = 0. In general, there is no such efficient algorithm. However, one can efficiently find small root pairs (Coppersmith [Cop96a]). (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
42 s and The problem Given: A bivariate polynomial p(x, y) = i,j p i,j x i y j with integer coefficients. Goal: Find all integer pairs (x 0, y 0 ) such that p(x 0, y 0 ) = 0. In general, there is no such efficient algorithm. However, one can efficiently find small root pairs (Coppersmith [Cop96a]). Theorem (Coppersmith, Bivariate Integer ) p(x, y) Z[x, y] be irreducible with maximum degree δ in x, y separately. X, Y : upper bounds on the desired integer solution (x 0, y 0 ). W = max i,j p i,j X i Y j. Then, If XY W 2 3δ, one can find all integer pairs (x 0, y 0 ) such that p(x 0, y 0 ) = 0, x 0 X and y 0 Y in time polynomial in log W and 2 δ. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
43 s and Current Knowledge Problem Status Bound Simplification f (x) 0 (mod N) Proven[Cop96b] N 1 d [HG97] f ( x) 0 (mod N) Heuristic[Cop96b] [HG97] f (x, y) = 0 Proven[Cop96a] XY < W 2 3δ [Cor04] ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
44 s and 1 2 and Properties 3 4 on Low Public Exponent Factoring Low Private Exponent 5 ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
45 s and Choosing Parameters 1.Generate two large, random, distinct and balanced primes p and q. 2.Compute N = p q and φ(n) = (p 1) (q 1). 3.Select a random integer e, 1 < e < φ(n) such that gcd(e, φ(n)) = Compute the unique integer d, 1 < d < φ(n), such that e d 1 (mod φ(n)). 5. Public Key: (N, e); Private Key: d. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
46 s and Choosing Parameters 1.Generate two large, random, distinct and balanced primes p and q. 2.Compute N = p q and φ(n) = (p 1) (q 1). 3.Select a random integer e, 1 < e < φ(n) such that gcd(e, φ(n)) = Compute the unique integer d, 1 < d < φ(n), such that e d 1 (mod φ(n)). 5. Public Key: (N, e); Private Key: d. Encryption/Decryption Processes Encryption: 1.Represent the message as an integer m in the interval [0, N 1]. 2. Compute and send c = m e mod N. Decryption: 1.Use the private key d to recover m = c d mod N. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
47 s and 1 2 and Properties 3 4 on Low Public Exponent Factoring Low Private Exponent 5 ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
48 s and Overview Since its initial publication, in 1977, has been extensively analyzed for vulnerabilities by many researchers. None of the attacks has proven devastating. The attacks mostly illustrate the danger of improper choices of the parameters. theory and the invention of LLL has motivated a number of lattice attacks.still, in its general setting, remains unbroken. The attacks described below take advantage of insecure choices of e or d or use partial information about p or d to recover the message or factor N and do not expose any inherent flaws of the itself. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
49 s and A Typical Communication Scenario ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
50 s and 1 2 and Properties 3 4 on Low Public Exponent Factoring Low Private Exponent 5 ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
51 s and Motivation for using a small e Simplify/Speed up the encryption process. Typical values e = 3 or e = A trivial Attack For simplicity, let e = 3. If we know that m < N 1 3 then inverting c = m 3 mod N is trivial. If the message is m = B + x where B is known,we can then apply Coppersmith theorem to the polynomial f (x) = (B + x) 3 c and find x, m provided that x < N 1 3. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
52 s and Alternative Scenario Using CRT, Eva can find the unique m, m 3 < N 1 N 2 N 3 s.t m 3 c i (mod N i ). ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
53 s and Avoid the attack Use user-specific padding to m before sending. For instance, c i = (i 2 h + m) 3 (modn i ). We can still break this system using Hastad s attack. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
54 s and Avoid the attack Use user-specific padding to m before sending. For instance, c i = (i 2 h + m) 3 (modn i ). We can still break this system using Hastad s attack. Theorem (Hastad) Let N 1, N 2,..., N k be pairwise relatively prime, N min = min i N i. Let g i Z Ni [x] be k polynomials of maximum degree d. Suppose that there exists a unique m < N min such that g i (m) = c i (mod N i ) for all i = 1, 2..., k. Then, if k d, one can efficiently find m given (N i, g i, c i ) k i=1. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
55 s and Proof Sketch Define g i (x) = (i 2 h + x) e c i for 1 i k. g i (m) 0 (mod N i ) Set N = N 1 N 2 N k and using CRT, we can find T i s.t. g(x) = k i=1 T ih i (x) (mod N) and g(m) 0 (mod N) Using Coppersmith s theorem, we can recover m in polynomial time. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
56 s and 1 2 and Properties 3 4 on Low Public Exponent Factoring Low Private Exponent 5 ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
57 s and The challenge Information: Some bits of p or q. Goal: Recover all of p (factor N). Result: The knowledge of half of the bits of p suffices to factor N, provided that p, q are of the same bitsize. Proof Sketch Let n be the bitsize of N. Write p = p 1 2 n 4 + p 0 and q = q 1 2 n 4 + q 0 where p i, q i < 2 n 4. Define f (x, y) = 1 ((x2 n 2 n 4 + p0 )(y2 n 4 + q0 ) N) 4 = xy2 n 4 + q0 x + p 0 y + 1 (p 2 n 0 q 0 N). 4 ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
58 s and Proof Sketch Given the n 4 LSBs of p, we know p 0 and thus q 0 since p 0 q 0 N (mod 2 n 4 ). f (x, y) Z[x, y] with degree d = 1 in x, y and f (p 1, q 1 ) = 0. Letting X = Y = N 1 4 ɛ, then p 1 < X, q 1 < Y. In addition W = f (x, y) N 3 4. Thus XY = N 1 2 2ɛ < (N 3 4 ) 2 3 = W 2 3d. We can then apply Coppersmith s theorem for the bivariate case and recover p 1, q 1. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
59 s and 1 2 and Properties 3 4 on Low Public Exponent Factoring Low Private Exponent 5 ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
60 s and Reducing the attack to a modular equation Assume that gcd(p 1, q 1) = 2. Then the equation can be written ed + k 2 φ(n) = 1 for some k Z. ed + k( N+1 2 p+q 2 ) = 1 Set s = p+q 2, A = N+1 2. Assume that d = N δ, e N. Define the polynomial f (k, s) = k(a + s) 1 0 (mod e) s < 2N 0.5 and k < 2de φ(n) 3de N eδ. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
61 s and Solving the equation We use the heuristic technique to solve the bivariate modular equation. Boneh and Durfee [BD99] proved that the attack can work as soon as δ The bound d < N is the best known bound for the private exponent. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
62 s and Overview Category Ref Result Comment [Has88] rec e multiple messages Factoring attacks [Cop96a] Half bits of p p, q balanced [BD99] d < N heuristic ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
63 s and Review We presented the basics on lattice theory and LLL algorithm which motivated several applications of lattices in CS. We showed how LLL can be used in finding small solutions to polynomial equations. We demonstrated how one can mount real-time attacks against utilizing the polynomial running time of LLL. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
64 s and Review We presented the basics on lattice theory and LLL algorithm which motivated several applications of lattices in CS. We showed how LLL can be used in finding small solutions to polynomial equations. We demonstrated how one can mount real-time attacks against utilizing the polynomial running time of LLL. Look to the future ➀ Find conditions for the bounds X i, under which the method for solving multivariate modular equations becomes provable. ➁ More effective attacks. For example,increase the low private exponent bound to N 0.5. ➂ Unify the approaches for modular and integer equations. For instance, in 2005, Blömer and May [BM05] showed that solving univariate modular equations can be reduced to solving bivariate integer equations. ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
65 s and Dan Boneh and Glenn Durfee. Cryptanalysis of with Private Key Less than In EUROCRYPT, pages 1 11, Johannes Blömer and Alexander May. A Tool Kit for Finding Small Roots of Bivariate s over the Integers. In Ronald Cramer, editor, EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, pages Springer, Don Coppersmith. Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known. In EUROCRYPT, pages , Don Coppersmith. Finding a Small Root of a Equation. In EUROCRYPT, pages , ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
66 s and Jean-Sébastien Coron. Finding Small Roots of Bivariate Integer Revisited. In Christian Cachin and Jan Camenisch, editors, EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages Springer, Johan Hastad. Solving simultaneous modular equations of low degree. SIAM Journal on Computing, 17: , URL: johanh/papers.html. Nick Howgrave-Graham. Finding Small Roots of Revisited. In Michael Darnell, editor, IMA Int. Conf., volume 1355 of Lecture Notes in Computer Science, pages Springer, ol Petros (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
67 s and A. K. Lenstra, H. W. Lenstra, Jr., and L. Lovász. Factoring polynomials with rational coefficients. 261: , (Department of Electrical and Computer sengineering, and National Technical University of Athens) July 17, / 49
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited Jean-Sébastien Coron Gemplus Card International 34 rue Guynemer, 92447 Issy-les-Moulineaux, France jean-sebastien.coron@gemplus.com
More informationThe Mathematical Cryptography of the RSA Cryptosystem
The Mathematical Cryptography of the RSA Cryptosystem Abderrahmane Nitaj Laboratoire de Mathématiques Nicolas Oresme Université de Caen, France abderrahmanenitaj@unicaenfr http://wwwmathunicaenfr/~nitaj
More informationA Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers
A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers Johannes Blömer, Alexander May Faculty of Computer Science, Electrical Engineering and Mathematics University of Paderborn
More informationRSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
More informationDit proefschrift is goedgekeurd door de promotor: prof.dr.ir. H.C.A. van Tilborg Copromotor: dr. B.M.M. de Weger
Dit proefschrift is goedgekeurd door de promotor: prof.dr.ir. H.C.A. van Tilborg Copromotor: dr. B.M.M. de Weger CIP-DATA LIBRARY TECHNISCHE UNIVERSITEIT EINDHOVEN Jochemsz, Ellen Cryptanalysis of RSA
More informationFactoring N = p r q for Large r
Factoring N = p r q for Large r Dan Boneh 1,GlennDurfee 1, and Nick Howgrave-Graham 2 1 Computer Science Department, Stanford University, Stanford, CA 94305-9045 {dabo,gdurf}@cs.stanford.edu 2 Mathematical
More informationThe van Hoeij Algorithm for Factoring Polynomials
The van Hoeij Algorithm for Factoring Polynomials Jürgen Klüners Abstract In this survey we report about a new algorithm for factoring polynomials due to Mark van Hoeij. The main idea is that the combinatorial
More informationLattice Attacks in Cryptography: A Partial Overview
Lattice Attacks in Cryptography: A Partial Overview M. Jason Hinek School of Computer Science, University of Waterloo Waterloo, Ontario, N2L-3G1, Canada mjhinek@alumni.uwaterloo.ca October 22, 2004 Abstract
More informationCRYPTANALYSIS OF RSA USING ALGEBRAIC AND LATTICE METHODS
CRYPTANALYSIS OF RSA USING ALGEBRAIC AND LATTICE METHODS a dissertation submitted to the department of computer science and the committee on graduate studies of stanford university in partial fulfillment
More informationLecture 13 - Basic Number Theory.
Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted
More informationDiscrete Mathematics, Chapter 4: Number Theory and Cryptography
Discrete Mathematics, Chapter 4: Number Theory and Cryptography Richard Mayr University of Edinburgh, UK Richard Mayr (University of Edinburgh, UK) Discrete Mathematics. Chapter 4 1 / 35 Outline 1 Divisibility
More informationa 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given
More informationIndex Calculation Attacks on RSA Signature and Encryption
Index Calculation Attacks on RSA Signature and Encryption Jean-Sébastien Coron 1, Yvo Desmedt 2, David Naccache 1, Andrew Odlyzko 3, and Julien P. Stern 4 1 Gemplus Card International {jean-sebastien.coron,david.naccache}@gemplus.com
More informationHow To Prove The Dirichlet Unit Theorem
Chapter 6 The Dirichlet Unit Theorem As usual, we will be working in the ring B of algebraic integers of a number field L. Two factorizations of an element of B are regarded as essentially the same if
More informationI. GROUPS: BASIC DEFINITIONS AND EXAMPLES
I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called
More informationMATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
More informationFactoring pq 2 with Quadratic Forms: Nice Cryptanalyses
Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses Phong Nguyễn http://www.di.ens.fr/~pnguyen & ASIACRYPT 2009 Joint work with G. Castagnos, A. Joux and F. Laguillaumie Summary Factoring A New Factoring
More informationChapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm.
Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm. We begin by defining the ring of polynomials with coefficients in a ring R. After some preliminary results, we specialize
More information15. Symmetric polynomials
15. Symmetric polynomials 15.1 The theorem 15.2 First examples 15.3 A variant: discriminants 1. The theorem Let S n be the group of permutations of {1,, n}, also called the symmetric group on n things.
More informationQuotient Rings and Field Extensions
Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.
More informationCIS 5371 Cryptography. 8. Encryption --
CIS 5371 Cryptography p y 8. Encryption -- Asymmetric Techniques Textbook encryption algorithms In this chapter, security (confidentiality) is considered in the following sense: All-or-nothing secrecy.
More informationU.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
More informationLattice-based Cryptography
Lattice-based Cryptography Daniele Micciancio Oded Regev July 22, 2008 1 Introduction In this chapter we describe some of the recent progress in lattice-based cryptography. Lattice-based cryptographic
More informationOn Efficiently Calculating Small Solutions of Systems of Polynomial Equations
On Efficiently Calculating Small Solutions of Systems of Polynomial Equations Lattice-Based Methods and Applications to Cryptography Dissertation zur Erlangung des Doktorgrades der Naturwissenschaften
More informationThe application of prime numbers to RSA encryption
The application of prime numbers to RSA encryption Prime number definition: Let us begin with the definition of a prime number p The number p, which is a member of the set of natural numbers N, is considered
More informationPublic Key Cryptography: RSA and Lots of Number Theory
Public Key Cryptography: RSA and Lots of Number Theory Public vs. Private-Key Cryptography We have just discussed traditional symmetric cryptography: Uses a single key shared between sender and receiver
More informationInternational Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
More informationArithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28
Arithmetic algorithms for cryptology 5 October 2015, Paris Sieves Razvan Barbulescu CNRS and IMJ-PRG R. Barbulescu Sieves 0 / 28 Starting point Notations q prime g a generator of (F q ) X a (secret) integer
More informationIdeal Class Group and Units
Chapter 4 Ideal Class Group and Units We are now interested in understanding two aspects of ring of integers of number fields: how principal they are (that is, what is the proportion of principal ideals
More informationPrime Numbers and Irreducible Polynomials
Prime Numbers and Irreducible Polynomials M. Ram Murty The similarity between prime numbers and irreducible polynomials has been a dominant theme in the development of number theory and algebraic geometry.
More informationAn Introduction to the RSA Encryption Method
April 17, 2012 Outline 1 History 2 3 4 5 History RSA stands for Rivest, Shamir, and Adelman, the last names of the designers It was first published in 1978 as one of the first public-key crytographic systems
More informationCubic Polynomials in the Number Field Sieve. Ronnie Scott Williams, Jr., B.S. A Thesis. Mathematics and Statistics
Cubic Polynomials in the Number Field Sieve by Ronnie Scott Williams, Jr., B.S. A Thesis In Mathematics and Statistics Submitted to the Graduate Faculty of Texas Tech University in Partial Fulfillment
More informationCHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY
January 10, 2010 CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY The set of polynomials over a field F is a ring, whose structure shares with the ring of integers many characteristics.
More informationWinter Camp 2011 Polynomials Alexander Remorov. Polynomials. Alexander Remorov alexanderrem@gmail.com
Polynomials Alexander Remorov alexanderrem@gmail.com Warm-up Problem 1: Let f(x) be a quadratic polynomial. Prove that there exist quadratic polynomials g(x) and h(x) such that f(x)f(x + 1) = g(h(x)).
More informationPost-Quantum Cryptography #4
Post-Quantum Cryptography #4 Prof. Claude Crépeau McGill University http://crypto.cs.mcgill.ca/~crepeau/waterloo 185 ( 186 Attack scenarios Ciphertext-only attack: This is the most basic type of attack
More informationFactorization Algorithms for Polynomials over Finite Fields
Degree Project Factorization Algorithms for Polynomials over Finite Fields Sajid Hanif, Muhammad Imran 2011-05-03 Subject: Mathematics Level: Master Course code: 4MA11E Abstract Integer factorization is
More informationRSA and Primality Testing
and Primality Testing Joan Boyar, IMADA, University of Southern Denmark Studieretningsprojekter 2010 1 / 81 Correctness of cryptography cryptography Introduction to number theory Correctness of with 2
More informationCHAPTER 5. Number Theory. 1. Integers and Division. Discussion
CHAPTER 5 Number Theory 1. Integers and Division 1.1. Divisibility. Definition 1.1.1. Given two integers a and b we say a divides b if there is an integer c such that b = ac. If a divides b, we write a
More informationRESULTANT AND DISCRIMINANT OF POLYNOMIALS
RESULTANT AND DISCRIMINANT OF POLYNOMIALS SVANTE JANSON Abstract. This is a collection of classical results about resultants and discriminants for polynomials, compiled mainly for my own use. All results
More informationMOP 2007 Black Group Integer Polynomials Yufei Zhao. Integer Polynomials. June 29, 2007 Yufei Zhao yufeiz@mit.edu
Integer Polynomials June 9, 007 Yufei Zhao yufeiz@mit.edu We will use Z[x] to denote the ring of polynomials with integer coefficients. We begin by summarizing some of the common approaches used in dealing
More informationMasao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
More information1 Homework 1. [p 0 q i+j +... + p i 1 q j+1 ] + [p i q j ] + [p i+1 q j 1 +... + p i+j q 0 ]
1 Homework 1 (1) Prove the ideal (3,x) is a maximal ideal in Z[x]. SOLUTION: Suppose we expand this ideal by including another generator polynomial, P / (3, x). Write P = n + x Q with n an integer not
More informationSimilarity and Diagonalization. Similar Matrices
MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that
More information11 Ideals. 11.1 Revisiting Z
11 Ideals The presentation here is somewhat different than the text. In particular, the sections do not match up. We have seen issues with the failure of unique factorization already, e.g., Z[ 5] = O Q(
More informationMATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction
MATH 168: FINAL PROJECT Troels Eriksen 1 Introduction In the later years cryptosystems using elliptic curves have shown up and are claimed to be just as secure as a system like RSA with much smaller key
More informationFACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z
FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z DANIEL BIRMAJER, JUAN B GIL, AND MICHAEL WEINER Abstract We consider polynomials with integer coefficients and discuss their factorization
More information7. Some irreducible polynomials
7. Some irreducible polynomials 7.1 Irreducibles over a finite field 7.2 Worked examples Linear factors x α of a polynomial P (x) with coefficients in a field k correspond precisely to roots α k [1] of
More informationBasic Algorithms In Computer Algebra
Basic Algorithms In Computer Algebra Kaiserslautern SS 2011 Prof. Dr. Wolfram Decker 2. Mai 2011 References Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, 1993. Cox, D.; Little,
More informationLecture 3: One-Way Encryption, RSA Example
ICS 180: Introduction to Cryptography April 13, 2004 Lecturer: Stanislaw Jarecki Lecture 3: One-Way Encryption, RSA Example 1 LECTURE SUMMARY We look at a different security property one might require
More informationLecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
More informationModern Algebra Lecture Notes: Rings and fields set 4 (Revision 2)
Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2) Kevin Broughan University of Waikato, Hamilton, New Zealand May 13, 2010 Remainder and Factor Theorem 15 Definition of factor If f (x)
More informationTHE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS
THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS KEITH CONRAD 1. Introduction The Fundamental Theorem of Algebra says every nonconstant polynomial with complex coefficients can be factored into linear
More informationThe Ideal Class Group
Chapter 5 The Ideal Class Group We will use Minkowski theory, which belongs to the general area of geometry of numbers, to gain insight into the ideal class group of a number field. We have already mentioned
More informationOn the coefficients of the polynomial in the number field sieve
On the coefficients of the polynomial in the number field sieve Yang Min a, Meng Qingshu b,, Wang Zhangyi b, Li Li a, Zhang Huanguo b a International School of Software, Wuhan University, Hubei, China,
More informationA Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
More informationGradual sub-lattice reduction and a new complexity for factoring polynomials
Gradual sub-lattice reduction and a new complexity for factoring polynomials Mark van Hoeij 1 and Andrew Novocin 2 1 Florida State University, 208 Love Building Tallahassee, FL 32306-4510 hoeij@math.fsu.edu
More information11 Multivariate Polynomials
CS 487: Intro. to Symbolic Computation Winter 2009: M. Giesbrecht Script 11 Page 1 (These lecture notes were prepared and presented by Dan Roche.) 11 Multivariate Polynomials References: MC: Section 16.6
More informationminimal polyonomial Example
Minimal Polynomials Definition Let α be an element in GF(p e ). We call the monic polynomial of smallest degree which has coefficients in GF(p) and α as a root, the minimal polyonomial of α. Example: We
More informationInner Product Spaces
Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and
More information1 Lecture: Integration of rational functions by decomposition
Lecture: Integration of rational functions by decomposition into partial fractions Recognize and integrate basic rational functions, except when the denominator is a power of an irreducible quadratic.
More informationSolving Systems of Linear Equations
LECTURE 5 Solving Systems of Linear Equations Recall that we introduced the notion of matrices as a way of standardizing the expression of systems of linear equations In today s lecture I shall show how
More informationAn LLL Algorithm with Quadratic Complexity
An LLL Algorithm with Quadratic Complexity Phong Q. Nguyen Damien Stehlé October 18, 2007 Abstract The Lenstra-Lenstra-Lovász lattice basis reduction algorithm called LLL or L 3 is a fundamental tool in
More informationBasics of Polynomial Theory
3 Basics of Polynomial Theory 3.1 Polynomial Equations In geodesy and geoinformatics, most observations are related to unknowns parameters through equations of algebraic (polynomial) type. In cases where
More informationCryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a
More informationTHE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0
THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0 RICHARD J. MATHAR Abstract. We count solutions to the Ramanujan-Nagell equation 2 y +n = x 2 for fixed positive n. The computational
More informationNumber Theoretic SETUPs for RSA Like Factoring Based Algorithms
Journal of Information Hiding and Multimedia Signal Processing c 2012 ISSN 2073-4212 Ubiquitous International Volume 3, Number 2, April 2012 Number Theoretic SETUPs for RSA Like Factoring Based Algorithms
More informationHOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!
Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following
More informationFACTORING SPARSE POLYNOMIALS
FACTORING SPARSE POLYNOMIALS Theorem 1 (Schinzel): Let r be a positive integer, and fix non-zero integers a 0,..., a r. Let F (x 1,..., x r ) = a r x r + + a 1 x 1 + a 0. Then there exist finite sets S
More informationLinear Algebra Notes for Marsden and Tromba Vector Calculus
Linear Algebra Notes for Marsden and Tromba Vector Calculus n-dimensional Euclidean Space and Matrices Definition of n space As was learned in Math b, a point in Euclidean three space can be thought of
More informationContinued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
More informationSome Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.
Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.com This paper contains a collection of 31 theorems, lemmas,
More informationDie ganzen zahlen hat Gott gemacht
Die ganzen zahlen hat Gott gemacht Polynomials with integer values B.Sury A quote attributed to the famous mathematician L.Kronecker is Die Ganzen Zahlen hat Gott gemacht, alles andere ist Menschenwerk.
More informationMarch 29, 2011. 171S4.4 Theorems about Zeros of Polynomial Functions
MAT 171 Precalculus Algebra Dr. Claude Moore Cape Fear Community College CHAPTER 4: Polynomial and Rational Functions 4.1 Polynomial Functions and Models 4.2 Graphing Polynomial Functions 4.3 Polynomial
More informationInteger Factorization using the Quadratic Sieve
Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 seib0060@morris.umn.edu March 16, 2011 Abstract We give
More informationH/wk 13, Solutions to selected problems
H/wk 13, Solutions to selected problems Ch. 4.1, Problem 5 (a) Find the number of roots of x x in Z 4, Z Z, any integral domain, Z 6. (b) Find a commutative ring in which x x has infinitely many roots.
More informationRSA Question 2. Bob thinks that p and q are primes but p isn t. Then, Bob thinks Φ Bob :=(p-1)(q-1) = φ(n). Is this true?
RSA Question 2 Bob thinks that p and q are primes but p isn t. Then, Bob thinks Φ Bob :=(p-1)(q-1) = φ(n). Is this true? Bob chooses a random e (1 < e < Φ Bob ) such that gcd(e,φ Bob )=1. Then, d = e -1
More informationZeros of a Polynomial Function
Zeros of a Polynomial Function An important consequence of the Factor Theorem is that finding the zeros of a polynomial is really the same thing as factoring it into linear factors. In this section we
More informationUnique Factorization
Unique Factorization Waffle Mathcamp 2010 Throughout these notes, all rings will be assumed to be commutative. 1 Factorization in domains: definitions and examples In this class, we will study the phenomenon
More informationPOLYNOMIAL RINGS AND UNIQUE FACTORIZATION DOMAINS
POLYNOMIAL RINGS AND UNIQUE FACTORIZATION DOMAINS RUSS WOODROOFE 1. Unique Factorization Domains Throughout the following, we think of R as sitting inside R[x] as the constant polynomials (of degree 0).
More informationFactoring Algorithms
Institutionen för Informationsteknologi Lunds Tekniska Högskola Department of Information Technology Lund University Cryptology - Project 1 Factoring Algorithms The purpose of this project is to understand
More informationA New Generic Digital Signature Algorithm
Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study
More informationOutline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
More informationA number field is a field of finite degree over Q. By the Primitive Element Theorem, any number
Number Fields Introduction A number field is a field of finite degree over Q. By the Primitive Element Theorem, any number field K = Q(α) for some α K. The minimal polynomial Let K be a number field and
More informationUniversity of Lille I PC first year list of exercises n 7. Review
University of Lille I PC first year list of exercises n 7 Review Exercise Solve the following systems in 4 different ways (by substitution, by the Gauss method, by inverting the matrix of coefficients
More informationThe Division Algorithm for Polynomials Handout Monday March 5, 2012
The Division Algorithm for Polynomials Handout Monday March 5, 0 Let F be a field (such as R, Q, C, or F p for some prime p. This will allow us to divide by any nonzero scalar. (For some of the following,
More informationPrinciples of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms
Principles of Public Key Cryptography Chapter : Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter : Security on Network and Transport
More informationReal Roots of Univariate Polynomials with Real Coefficients
Real Roots of Univariate Polynomials with Real Coefficients mostly written by Christina Hewitt March 22, 2012 1 Introduction Polynomial equations are used throughout mathematics. When solving polynomials
More informationNumber Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may
Number Theory Divisibility and Primes Definition. If a and b are integers and there is some integer c such that a = b c, then we say that b divides a or is a factor or divisor of a and write b a. Definition
More informationFactoring Algorithms
Factoring Algorithms The p 1 Method and Quadratic Sieve November 17, 2008 () Factoring Algorithms November 17, 2008 1 / 12 Fermat s factoring method Fermat made the observation that if n has two factors
More informationNotes 11: List Decoding Folded Reed-Solomon Codes
Introduction to Coding Theory CMU: Spring 2010 Notes 11: List Decoding Folded Reed-Solomon Codes April 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami At the end of the previous notes,
More informationMATRIX ALGEBRA AND SYSTEMS OF EQUATIONS. + + x 2. x n. a 11 a 12 a 1n b 1 a 21 a 22 a 2n b 2 a 31 a 32 a 3n b 3. a m1 a m2 a mn b m
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS 1. SYSTEMS OF EQUATIONS AND MATRICES 1.1. Representation of a linear system. The general system of m equations in n unknowns can be written a 11 x 1 + a 12 x 2 +
More informationCONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12
CONTINUED FRACTIONS AND PELL S EQUATION SEUNG HYUN YANG Abstract. In this REU paper, I will use some important characteristics of continued fractions to give the complete set of solutions to Pell s equation.
More informationMath 115A HW4 Solutions University of California, Los Angeles. 5 2i 6 + 4i. (5 2i)7i (6 + 4i)( 3 + i) = 35i + 14 ( 22 6i) = 36 + 41i.
Math 5A HW4 Solutions September 5, 202 University of California, Los Angeles Problem 4..3b Calculate the determinant, 5 2i 6 + 4i 3 + i 7i Solution: The textbook s instructions give us, (5 2i)7i (6 + 4i)(
More informationInner product. Definition of inner product
Math 20F Linear Algebra Lecture 25 1 Inner product Review: Definition of inner product. Slide 1 Norm and distance. Orthogonal vectors. Orthogonal complement. Orthogonal basis. Definition of inner product
More informationVector and Matrix Norms
Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty
More informationPublic Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
More informationPractical polynomial factoring in polynomial time
Practical polynomial factoring in polynomial time William Hart University of Warwick Mathematics Institute Coventry CV4 7AL, UK W.B.Hart@warwick.ac.uk Mark van Hoeij Florida State University Tallahassee,
More informationSignature Schemes. CSG 252 Fall 2006. Riccardo Pucella
Signature Schemes CSG 252 Fall 2006 Riccardo Pucella Signatures Signatures in real life have a number of properties They specify the person responsible for a document E.g. that it has been produced by
More informationit is easy to see that α = a
21. Polynomial rings Let us now turn out attention to determining the prime elements of a polynomial ring, where the coefficient ring is a field. We already know that such a polynomial ring is a UF. Therefore
More informationLOW-DEGREE PLANAR MONOMIALS IN CHARACTERISTIC TWO
LOW-DEGREE PLANAR MONOMIALS IN CHARACTERISTIC TWO PETER MÜLLER AND MICHAEL E. ZIEVE Abstract. Planar functions over finite fields give rise to finite projective planes and other combinatorial objects.
More information