Mathematics of Cryptography Part I

Similar documents
8 Primes and Modular Arithmetic

= = 3 4, Now assume that P (k) is true for some fixed k 2. This means that

SOLUTIONS FOR PROBLEM SET 2

Using row reduction to calculate the inverse and the determinant of a square matrix

Intermediate Math Circles March 7, 2012 Linear Diophantine Equations II

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, Notes on Algebra

Chapter 3. if 2 a i then location: = i. Page 40

Factoring Algorithms

z 0 and y even had the form

Applications of Fermat s Little Theorem and Congruences

Homework until Test #2

Arithmetic and Algebra of Matrices

Solve addition and subtraction word problems, and add and subtract within 10, e.g., by using objects or drawings to represent the problem.

Continued Fractions and the Euclidean Algorithm

Integer Factorization using the Quadratic Sieve

Elementary Number Theory and Methods of Proof. CSE 215, Foundations of Computer Science Stony Brook University

ECE 842 Report Implementation of Elliptic Curve Cryptography

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

The last three chapters introduced three major proof techniques: direct,

THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0

Modélisation et résolutions numérique et symbolique

Cryptography and Network Security Chapter 8

a 11 x 1 + a 12 x a 1n x n = b 1 a 21 x 1 + a 22 x a 2n x n = b 2.

CHAPTER 5. Number Theory. 1. Integers and Division. Discussion

Math Content by Strand 1

Factoring Algorithms

8 Divisibility and prime numbers

SUM OF TWO SQUARES JAHNAVI BHASKAR

Notes on Factoring. MA 206 Kurt Bryan

Lecture 5: Singular Value Decomposition SVD (1)

ABSTRACT ALGEBRA: A STUDY GUIDE FOR BEGINNERS

PROPERTIES OF ELLIPTIC CURVES AND THEIR USE IN FACTORING LARGE NUMBERS

RSA and Primality Testing

Settling a Question about Pythagorean Triples

Notes on Determinant

Here are some examples of combining elements and the operations used:

MACM 101 Discrete Mathematics I

Similar matrices and Jordan form

Today s Topics. Primes & Greatest Common Divisors

Kevin James. MTHSC 412 Section 2.4 Prime Factors and Greatest Comm

Lecture 13 - Basic Number Theory.

1 Determinants and the Solvability of Linear Systems

The Euclidean Algorithm

Section 4.2: The Division Algorithm and Greatest Common Divisors

Question 2: How do you solve a matrix equation using the matrix inverse?

by the matrix A results in a vector which is a reflection of the given

V Quantitative Reasoning: Computers, Number Theory and Cryptography

Reduced echelon form: Add the following conditions to conditions 1, 2, and 3 above:

Number Theory Hungarian Style. Cameron Byerley s interpretation of Csaba Szabó s lectures

CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY

Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter 4 described a mathematical system

Zeros of a Polynomial Function

9. POLYNOMIALS. Example 1: The expression a(x) = x 3 4x 2 + 7x 11 is a polynomial in x. The coefficients of a(x) are the numbers 1, 4, 7, 11.

An Introductory Course in Elementary Number Theory. Wissam Raji

Groups in Cryptography

Name: Section Registered In:

Grade 7/8 Math Circles Fall 2012 Factors and Primes

MATH 423 Linear Algebra II Lecture 38: Generalized eigenvectors. Jordan canonical form (continued).

SUBGROUPS OF CYCLIC GROUPS. 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and

Factorization Algorithms for Polynomials over Finite Fields

Use of Linear Algebra in Cryptography

MATH 537 (Number Theory) FALL 2016 TENTATIVE SYLLABUS

Chapter 11 Number Theory

Computing exponents modulo a number: Repeated squaring

Handout NUMBER THEORY

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

Lecture 4: Partitioned Matrices and Determinants

MATH Fundamental Mathematics IV

Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm.

Public Key Cryptography: RSA and Lots of Number Theory

Grade 7 & 8 Math Circles October 19, 2011 Prime Numbers

Runtime and Implementation of Factoring Algorithms: A Comparison

An Overview of Integer Factoring Algorithms. The Problem

Factoring Polynomials

On the generation of elliptic curves with 16 rational torsion points by Pythagorean triples

Linear Programming. March 14, 2014

Unit 18 Determinants

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS

Overview of Number Theory Basics. Divisibility

CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12

GREATEST COMMON DIVISOR

Linear Algebra Notes for Marsden and Tromba Vector Calculus

Number Theory: A Mathemythical Approach. Student Resources. Printed Version

Mathematics Course 111: Algebra I Part IV: Vector Spaces

1 Introduction to Matrices

Computer and Network Security

CONTENTS. Please note:

MATH 22. THE FUNDAMENTAL THEOREM of ARITHMETIC. Lecture R: 10/30/2003

Matrix Algebra. Some Basic Matrix Laws. Before reading the text or the following notes glance at the following list of basic matrix algebra laws.

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS. + + x 2. x n. a 11 a 12 a 1n b 1 a 21 a 22 a 2n b 2 a 31 a 32 a 3n b 3. a m1 a m2 a mn b m

Recent Breakthrough in Primality Testing

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

FACTORS AND MULTIPLES Answer Key

Introduction to Hill cipher

JUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson

8 Square matrices continued: Determinants

WOLLONGONG COLLEGE AUSTRALIA. Diploma in Information Technology

Solving simultaneous equations using the inverse matrix

Transcription:

CHAPTER 2 Mathematics of Cryptography Part I (Solution to Odd-Numbered Problems) Review Questions 1. The set of integers is Z. It contains all integral numbers from negative infinity to positive infinity. The set of residues modulo n is Z n. It contains integers from 0 to n 1. The set Z has non-negative (positive and zero) and negative integers; the set Z n has only non-negative integers. To map a nonnegative integer from Z to Z n, we need to divide the integer by n and use the remainder; to map a negative integer from Z to Z n, we need to repeatedly add n to the integer to move it to the range 0 to n 1. 3. The number 1 is an integer with only one divisor, itself. A prime has only two divisors: 1 and itself. For example, the prime 7 has only two divisor 7 and 1. A composite has more than two divisors. For example, the composite 42 has several divisors: 1, 2, 3, 6, 7, 14, 21, and 42. 5. A linear Diophantine equation of two variables is of the form ax + by = c. We need to find integer values for x and y that satisfy the equation. This type of equation has either no solution or an infinite number of solutions. Let d = gcd (a, b). If d does not divide c then the equation have no solitons. If d divides c, then we have an infinite number of solutions. One /. of them is called the particular solution; the rest, are called the general solutions. 7. A residue class [a] is the set of integers congruent modulo n. It is the set of all integers such that x = a (mod n). In each set, there is one element called the least (nonnegative) residue. The set of all of these least residues is Z n. 9. A matrix is a rectangular array of l m elements, in which l is the number of rows and m is the number of columns. If a matrix has only one row (l = 1), it is called a row matrix; if it has only one column (m = 1), it is called a column matrix. A square matrix is a matrix with the same number of rows and columns (l = m). The determinant of a square matrix A is a scalar defined in linear algebra. The multiplicative inverse of a square matrix exists only if its determinant has a multiplicative inverse in the corresponding set. 1

2 Exercises 11. a. It is false because 26 = 2 13. b. It is true because 123 = 3 41. c. It is true because 127 is a prime. d. It is true because 21 = 3 7. e. It is false because 96 = 2 5 3. f. It is false because 8 is greater than 5. 13. a. gcd (a, b, 16) = gcd (gcd (a, b), 16) = gcd (24, 16) = 8 b. gcd (a, b, c, 16) = gcd (gcd (a, b, c), 16) = gcd (12, 16) = 4 c. gcd (200, 180, 450) = gcd (gcd (200, 180), 450) = gcd (20, 450) = 10 d. gcd (200, 180, 450, 600) = gcd (gcd (200, 180, 450), 600) = gcd (10, 600) = 10 15. a. gcd (3n + 1, 2n + 1) = gcd (2n + 1, n) = 1 b. gcd (301, 201) = gcd (3 100 + 1, 2 100 + 1) = 1 gcd (121, 81) = gcd (3 40 + 1, 2 40 + 1) = 1 17. a. 22 mod 7 = 1 b. 291 mod 42 = 39 c. 84 mod 320 = 84 d. 400 mod 60 = 40 19. a. (125 45) mod 10 = (125 mod 10 45 mod 10) mod 10 = (5 5) mod 10 = 5 mod 10 b. (424 32) mod 10 = (424 mod 10 32 mod 10) mod 10 = (4 2) mod 10 = 8 mod 10 c. (144 34) mod 10 = (144 mod 10 34 mod 10) mod 10 = (4 4) mod 10 = 6 mod 10 d. (221 23) mod 10 = (221 mod 10 23 mod 10) mod 10 = (1 3) mod 10 = 3 mod 10 21. a mod 5 = (a n 10 n + + a 1 10 1 + a 0 ) mod 5 = [(a n 10 n ) mod 5 + + (a 1 10 1 ) mod 5 + a 0 mod 5] mod 5 = [0 + + 0 + a 0 mod 5] = a 0 mod 5

3 23. a mod 4 = (a n 10 n + + a 1 10 1 + a 0 ) mod 4 = [(a n 10 n ) mod 4 + + (a 1 10 1 ) mod 4 + a 0 mod 4] mod 4 = [0 + + 0 + (a 1 10 1 ) mod 4 + a 0 mod 4] = (a 1 10 1 + a 0 ) mod 4 25. a mod 9 = (a n 10 n + + a 1 10 1 + a 0 ) mod 9 = [(a n 10 n ) mod 9 + + (a 1 10 1 ) mod 9 + a 0 mod 9] mod 9 = (a n + + a 1 + a 0 ) mod 9 27. a mod 11 = (a n 10 n + + a 1 10 1 + a 0 ) mod 11 = [(a n 10 n ) mod 11 + + (a 1 10 1 ) mod 11 + a 0 mod 11] mod 11 = + a 3 ( 1) + a 2 (1) + a 1 ( 1) + a 0 (1)] mod 11 For example, 631453672 mod 11 = [(1)6 + ( 1)3 + (1)1 + ( 1)4 + (1)5 + ( 1)3 + (1)6 + ( 1)7 + (1)2] mod 11 = 8 mod 11 = 5 mod 11 29. a. (A + N) mod 26 = (0 + 13) mod 26 = 13 mod 26 = N b. (A + 6) mod 26 = (0 + 6) mod 26 = 6 mod 26 = G c. (Y 5) mod 26 = (24 5) mod 26 = 19 mod 26 = T d. (C 10) mod 26 = (2 10) mod 26 = 8 mod 26 = 18 mod 26 = S 31. (1, 1), (3, 7), (9, 9), (11, 11), (13, 17), (19, 19) 33. a. We have a = 25, b = 10 and c = 15. Since d = gcd (a, b) = 5 divides c, there is an infinite number of solutions. The reduced equation is 5x + 2y = 3. We solve the equation 5s + 2t = 1 using the extended Euclidean algorithm to get s =1 and t = 2. The particular and general solutions are x 0 = (c/d) s = 3 x = 3 + 2 k y 0 = (c/d) t = 6 y = 6 5 k (k is an integer) b. We have a = 19, b = 13 and c = 20. Since d = gcd (a, b) = 1 and divides c, there is an infinite number of solutions. The reduced equation is 19x + 13y = 20. We solve the equation 19s + 13t =1 to get s = 2 and t = 3. The particular and general solutions are x 0 = (c/d) s = 40 x = 40 + 13 k y 0 = (c/d) t = 60 y = 60 19 k (k is an integer) c. We have a = 14, b = 21 and c = 77. Since d = gcd (a, b) = 7 divides c, there is an infinite number of solutions. The reduced equation is 2x + 3y = 11. We solve the equation 2s + 3t =1 to get s = 1 and t = 1. The particular and general solutions are x 0 = (c/d) s = 11 x = 11 + 3 k y 0 = (c/d) t = 11 y = 11 2 k (k is an integer)

4 d. We have a = 40, b = 16 and c = 88. Since d = gcd (a, b) = 8 divides c, there is an infinite number of solutions. The reduced equation is 5x + 2y = 11. We solve the equation 5s + 2t =1 to get s = 1 and t = 2. The particular and general solutions are x 0 = (c/d) s = 11 x = 11 + 2 k y 0 = (c/d) t = 22 y = 22 5 k (k is an integer) 35. We have the equation 39x + 15y = 270. We have a = 39, b = 15 and c = 270. Since d = gcd (a, b) = 3 divides c, there is an infinite number of solutions. The reduced equation is 13x + 5y = 90. We solve the equation 13s + 5t =1: s = 2 and t = 5. The particular and general solutions are x 0 = (c/d) s = 180 x = 180 + 5 k y 0 = (c/d) t = 450 y = 450 13 k To find an acceptable solution (nonnegative values) for x and y, we need to start with negative values for k. Two acceptable solutions are k = 35 x = 5 and y = 5 k = 36 x = 0 and y = 18 37. a. 3x + 5 4 (mod 5) 3x ( 5 + 4) (mod 5) 3x 4 (mod 5) a = 3, b = 4, n = 5 d = gcd (a, n) = 1 Since d divides b, there is only one solution. Reduction: 3x 4 (mod 5) x 0 = (3 1 4) (mod 5) = 2 b. 4x + 6 4 (mod 6) 4x ( 6 + 4) (mod 6) 4x 4 (mod 6) a = 4, b = 4, n = 6 d = gcd (a, n) = 2 Since d divides b, there are two solutions. Reduction: 2x 2 (mod 3) x 0 = (2 1 2) (mod 3) = 1 x 1 = 1 + 6 / 2 = 4 c.

5 9x + 4 12 (mod 7) 9x ( 4 + 12) (mod 7) 9x 1 (mod 7) a = 9, b = 1, n = 7 d = gcd (a, n) = 1 Since d divides b, there is only one solution. Reduction: 9x 1 (mod 7) x 0 = (9 1 1) (mod 7) = 4 d. 232x + 42 248 (mod 50) 232x 206 (mod 50) a = 232, b = 206, n = 50 d = gcd (a, n) = 2 Since d divides b, there are two solutions. Reduction: 116x 103 (mod 25) 16x 3 (mod 25) x 0 = (16 1 3) (mod 25) = 8 x 1 = 8 + 50/2 = 33 39. a. The determinant and the inverse of matrix A are shown below: 3 0 A = det(a) = 3 mod 10 1 1 (det(a)) 1 = 7 mod 10 1 0 A 1 = 7 A 1 = 9 3 + adj(a) 7 0 3 1 b. Matrix B has no inverse because det(b) = (4 1 2 1) mod = 2 mod 10, which has no inverse in Z 10. c. The determinant and the inverse of matrix C are shown below: 3 4 6 C = 1 1 8 det(c) = 3 mod 10 5 8 3 C 1 = 3 2 2 9 3 4 1 2 3 (det(c)) 1 = 7 mod 10 In this case, det(c) = 3 mod 10; its inverse in Z 10 is 7 mod 10. It can proved that C C 1 = I (identity matrix).

6