0% found this document useful (0 votes)
85 views45 pages

Unit 1

solutions

Uploaded by

Advoch
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
85 views45 pages

Unit 1

solutions

Uploaded by

Advoch
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 45
IT 285. = QD CRYPTOGRAPHY AND NETWORK SEevrity unt -1 = ypiegnaphs Crypte graphy ts the study g qechniques tmmunitaton fn the presente 9 third for Seucre. Parties: lad Sexurity 7 | 1. temputer Seuurity - gener name. gor the teller gy ropls designed fp protecbolata. and te fn | hackers measures to protece dale 2. Network Seuidy + provece lai clusing transmiss ter interconnected measures ZB. Tmiemet Security ? tollecttor hae cluving thelr francmiccion over & networks Sound} TRENDS: Bigh Allaek sophiciralion CWSI Fe 56 vipting __slntuder's knowledge . es 20c0 Seunity Atiacks: 0 Pacsive Atlacks dis Active Atacke: Passive Attacks: No Modifilakon in message ~ Goad of Opponent Ze td eblair jreormalzon that fs beng trancmitied “Wpes — Dittault tp cleteck becuse no alteration: dy Release gy Message contervic div Taacklic Analysis. | | 2, Ls phone wnversation ;Fmart Message . (only Read the torrtertts aj message) . > i) observe patiern 4) messages’ i) Analyzing ‘the traddic, determine the Localiow identidy tommunttaleng heck, observe length of Mss Act've Atiacke: U? TE involves. modidication aq) dat. ii OD Dittiuctt t prevent active atiacke dice & the Variety °) Physi@l Aatieare, ane notoork Vulner abilidies » a) goal fe te detect autre attacks and chrom dicruption eo delays caused by them fo veLover Tapes | Masquerade’ Jakes plac one entity at as another entily Replay » Passive Gpiare gy adata wit and ite | Subsequent ‘Telransmicsign hw produc. an mnauctherized eqdect: Modification G) Messages Some partion? the mexsage hj atterec/. Deniet q Services? | TO degrade the perdormanie of nelioork by be ditaupiion GY an entere network C either by obteabling the Notwork wo by overloading Te with messages. Security gervites: B Servicce implement securily poliitesand ve tmplemented — by Security mechantsms Avthentiatton Ascurance g) tommunciating entity f& the one that it claims fe be. do Peer entity Authe nutebar eutton to provide tongidente tht ca Log teat tonn identity of entities wernected it wae UP Date orgie Authen tiation Sn a tonnectntess thanster provides Y verived date ts as Qeeuyanta tab thendoune Clatnved - Access conWol: To achieve thik ¥ “1 ath wser trythg to ger cues: must fist to be ientidied , or authenweected ¢ 20 That Quess VightS @n be latlorec| to the tndivduat, Data wndiclentealigy Pootecttop oO) dala drm weusthorized users. |) Connection —Condidentiality the profeclior of} atl user date Sn & tenncrion Gy tonnettontess confidentiality The pactectin cj all user data tra Single elate bleck & ef n Selective ~ Field condidenti identiclty: — Congicentiaioy gq selreted dielel 9 S user data ~ Peteckion 4 \ndormalion that cbservedd by Waddit lous Traddte low tondiderctua tty Pala Indeqrity FAY Assurance that the dala srewived ame exacthy os Sent by On authorized erty Antegrdy worth mecovery. wethoub TeLovery . Apnnettcer Cy tonneciton Inte gndy ee Setectcve. Jiel| Connection Integrity VP Connectisnters In tegrilg C7 Scteeteve dield eonnerteonters Th egy Ay - Non Repuckation Pockes protection agauisk deniat by one O] the entries trvelved m a to mmuntation UY having participacted mau wr part 4) the tommuntialion ° dy Non sre puchiation , ogee o> Ascuranu rd sowre dv Non ye pucation , Destination > Aseuvamce C) Receivers dassical Encryption Techniques! ay’ bs Symmetic epher technique > dingle Key ioe o> . ar 4. Agymmelnt Epher ihe Dee Ste ave used ciphers? Coonventional FrerypHon/ secrer Roy/ Single Koy) - Sy ramet plain det 2 tiginal message upstttutcan and Tans position, Vanous Alon Algondhm 7 Techneque Enoy Setret Key > a eke) : 7g ay used dor Enoyption| Devy < cipherdex E > Enonypred me oe “9 o i ssage (OD Stream bled moist Deuypier 2 tpherte s x Lonverted thle ayigehap Message» lrypranatyse (20: Meseaw aa on oe gee Decry pain ee Algerithon Ye EK Aggvithr ——> aactinalion al) best > Secure channe! Keysouree Tapes! pp eee Jot 9) peetrrexte _ cb Block etprer > Enuyp?s a bl iin Stream etphe™ > Enuyyps date. one bie wy oT? byte at a time- — 9 DES, RES ene ara e Rye Asymmetiic ephers! g Cpupli Key? BPM Key), L L ; platy A pPluntexe —? Enuyplion — > Dewy prior eo LP tplaintex®? Ceiphor tex] w 2 Le Ef POb: PP pe OC PR) o)- | 7 “APIanalysis And Baute.-Force Atlack: crypt by TYptanetysc os, Natwre aj algerithm , dome sample Plantext —ctpher text pairs « PD By thi atau dind plaintextor Key, Brute “derce Atleck > Tice even possible keys on a ciphertext unitit platztext fs Oblacned ASSical Ener ption Jechnuq we: . nvrext, 7S GU? Subsirheion Techngque.> letters 9 plan Jone creplaed by other et — @esar ciphers ~ Moncal phabelit. ciphers ~ Polyalphabettt. ciphers 2 Vigenere upher ~ Playfair tipher - Hill cipher — One -Time pael : ater tr67D- diy ‘Ivanspesition Techarue Crail Fente7 € pen” letier order. did RoreR Machines Rearranging letler dv Steganography - Substhdion Tech nique Caesar cipher a ATiwolves veplaung each etter oy the ates with ‘the letter Standing ‘k’ plaws durther clown The abet * | alp C= ECk)p) = (Pi k7 mod 26 P= DCKO = (e-K) mod 26. Got eis ee ert ee Get ae Frample: Ke3 plaintext | Meet Me- Po: i 2 abet me ‘ boeudvs yy a ee eee Dis Advantages Prey pris and Deuryption Algovtih Know e M7 Theve are possible only as Rays boy - known. J? Language ) Pacotext ts Moncaiphabetit &phers: te seb 7) element ‘gfe an Pormutatin > din aut the. olemen’ orderec| Sequence 4} Cl 6? with each element emactly appean ng onee- the Fetters Qa bi hewrt yy > shudtle v a didterent D — Feen platy text Letter Maps 1 random Uphertext etter > tentwe Key fe ab tetters 4g | Plate abededghijkimnopqrstuvw xyz. cipher dk vg sf bjwPesexhtmya uolyqaan. | Plaintext : tHe Il o ciphertext | SF SSH Advan tages: — Guessing Key value is dedflule "26! possible woauys Dis Advaniages — Monealphatii substitution tiphers do not change. Yeative letter frequencies Humen languages Gre veduntant Fg: Mose commen fetter’ in Frglith SE” | deltawedd by TF, Ris 1,O1ArS- Fairly used letters 5 Z,J, kK: &,x- | | Phas Fat Kexy Matrix: G7 EXS matin Q) letters basecl on A keyword] di Fin letters GQ Keysoore| | O17 Fill vest of matrix with other letters fy Osing the keyword " MonAReHY! R D Et a eaael Gisela aaat a z wb TF oa patr fs vepeatec| Letter: theert diller Uke ~ x db TF both tetlers Jatt hh the Same vow , voplace. e4th with etter ty night Curapping bax tb Siart From end) SO Ty both tetlers datl fn the Same tcolimn ; replace each with leter below tv ie Caguin wrapping tw top Fivm bottom). dw Othorwise. each letter fs replaced by the Letter th the Same row And th the Same twlumn 6] the. Other leer | the patr: Advan tages dy Seunity much imprved over monoalphabelu Zine tt have 2b x 267 b1b endy diagram should have. te by dd = moncalphabeti 26 VE Playdair bie [DBAd vantages ul wb TE fan be inpken igiren a dew hundred letters of | Cipher dext Aye generally Buddiuéne GW Leaws muth 4 plaintext language mac Example : Enuyet the platriexe “tetto” wsing The gotlowing Key Servet Key Pa Oe Sa QQ M ig fe aren G) R N {ly beer clades ZG y w ena Plain tect hello Step see He io Vv nserk Xx" Repeated Cra Lee eee he 9 €©¢ fit ae ee jo > Bx: slep 3 hello 2 Ccqe Bx | [HIN Cipher 2 . In hull cipher pthe Key A Square marix. 4% spe Mxm fry whith m & the gize of the blour. the substitution fe cleterminad by om linear equations te whi each charade f assigned a humenicel yeclue . For m=3, +the system tan be Cys (Kn) + ki Pe + Kg Ps) moe 26 | Co = (ko) P) + Koo Pe + Kon P3) modat 63 = (Kay) 4 Kao P27 Kaa Py) mod2u. This @n be ve presented as, eect aa ky Kp ks) Cp Cr | = | Koy ker Fes] ] | med 26 tas Kay Kao Kas | | op | oR ere KP moel 26 E le: | Xarmp ‘ | Fnoype the plaintext “Pay More Money” | ) ie ge by psing the entryphion Kay k= i” : a J ay ie 2 | ete CS) Step Numeric velue | assignee - pS Oe ys - Ih -.y -0 ) ag 1 { Ss tos so = 3 @ 3S 3 \ a aS the key ts 3x3 letters oy the plain Ci = kp mod ¢) plaintext character ave matix °° $0 the dirst dhree ret, ave represented bythe vector’ 2b ie o ie 4 [is > 24) [wrens] pe) 2 Pui ect ise nee all oy te ale ‘| 2 WA) ipa - (255404120 315401504 BOF TEL mod 26 315) Ww gig |mol26. =) 13; | N 4 Bb I ei Step a. Nevb Three letters In My 1 Ot of iW 1S | 2) is 21 ea 14 | moc 26 Glessner 2eneen) ey) es 521 | jag a fe coi = Hise | aD | gb) a 815 4 Step 3 Next three fetes CEM oD > C4 12 HD. 57 tz: eee 4 ° 2) Ww -2 ie. | med 26 pe eee) M ee eine tec Step 4: is i | Nest thee, leteys pn @ y > 03 4 2 Cy NW 5) Raq 2, Ig +29 3] ¥ 24 Mod 26 = | 5 | a oy = fae a ce | 84q] mod 2 = Jig [7] ez 4% 1 Wl, Ties Upher text ts LNS HoLEWMtTRW Decryption: Devryprion requires | the Unverse g maix k* Peete Teale caters 1s Tnrthie ase ete 4 a 1s UF é 2h o It 4 4 iS fia 43h mon 2b i ip wes B z= 4a dn 0 "1 Ig 510 a > fe = ia ay | LY sce ae gee | 12s a 24 oO It Liz Uy D re 69, us a 14 re wy . is it 6b 14 ree | tea feca 24 a it] | 22 2. 4 Plantext = Fay more no neg » Polyalphabelti Ciphers: ~ Improve Feeuridy using multiple Cipher eclphatels "Make cryptanalysis harder with more, alphabets te GQ Mess and dlatier frequency olism bution ~ Ube a Koy te Select whtihy alphabet fs rsed dor earh lelley 6 the meceage ~ Use eath alphabee th tw ~ Repeat Frsm stare after end 6) key i reached. a Vig eneve cipher Cv Auto or Sytem di vernam phew - |Vigoneve Gpher' | | = Simplest polyalphabelii. Axbsitedion cipher ce Piven evel mulbiple cacsa7 efphors. ae — Bo multiple. letters long kee Krrke- > Ka ~ f9h letter spectdies fthalphabes og the Key to wse, — Repeat Jom start adler “d* letters Un message ~ Dewyprion Simply wore tn Teverte. Example: plaintext weare diswvered Save goumelt Key ; oleteptive We are ais vered fave. your se It Pi caicoay pivedecepetvedecepti ve Ciphertexts ZIOVTWEN GRZEVT WOVE HCAYELM GJ- Advareage ' lane mauep = cuntiee leters for each plauntexe tetler db Repeated letter frequentutes aye obstuved Dishdvantoye * rhexk By obiaining the me peated worels th Rpher | to Guess the Key value Length. Auto key System: <= Tdeatly want a key as kong as The message = Vigeneve proposed Th aubkey ufpher ~ with keyword t predixed bo mecsage a3 KY — Knowing Reyorel can weaver “a derek. Pot ARS ~ Use these fn fern 6” the vesk Of the message » Example: key » eleceptive Plaintext » We are distovered Save gourseld ° We ave discovered save your sels eu Geli! Pveweare disco yvered sev Cipherdext: Z1VVTW RNG KZ ETT Geers VU Vernam ttpher dy The message is vepresented as & binany shning Caseauene. 4 o's and U's using Asatt wocling). atoding mechanism Such 1s di Key 1s also 4 prucky random Sequence. 4 ols and i's of the Same Length og. message My the enuyprion B cone by eing “OR eparoin ol b c= a@e ° o 1 I ° ! I O 0 { I Oo” Example 4 Let the message be LF" then Pe Asct) code be (/eolo0) Ipocllo? ane ithe «ey be Clololio aljaool). Entypton * l|oo1oeo0}] [000 Ito tolo tin er aoe} VOY Nola ys lesee teal gO Wile) Decryption Ooltiii titolo tp olool (ood l1d Catia O11 6000 ~ Dnedime pad: = Ranelom Key as long as the mosage. fs used, the cipher wilt be Sewre Example: Plath text Hello } plauitext, Key ghoul Koy XMCKLE haw same Length HOD BGs)! ie Ci) Lon) ocey) XUP miy 002 KO LU % 30 be a 13 a jah “os mod 2b is iy is 2! 25 a Mv v ee Cipher text Be Advantages > Unbreakable Algorithm > fandom Key generalzon £0 quessing Not Possible Limitations: > Practial probem gy makina lange quan tite & sandom Keys pale te Qoverab Key hewirg aame. length | = ids message : Trans positon TFechntque: A ‘trans posidion cipher cloee NOE Aupsty tee. . bolt. one dor Another, instead it changes the Lomliow qub ages Railed Fence Technique |. The plain text & written dowh as & Sequene & duagonals and themead YJ- aS A Sequenw 4] ows: Bample: Message : Meek me ayer the Joga. Party ee. m a t ooh ee ot oe Ape h oe toy tate ee) Ee Fruy pied Message’ Mem pr RHy 6 PRYETEFFTE OfOT Royo Transposition ecphers: 2th plaere Edt Pat veto |! vow by %W and He Veacl message cotrmn by column Order 6] the ewtounn become “the Key tw Ugorithm. Ke ree 2) | yed Trancposition epher | The Koy ncee] dor enor prion and [detyjpafon, & a permutnitin Roy pwhih shows how dhe character are permutated , | Message : Enemy attacks to nighbe . Key > 314 52 Enemy atiac kKslon ightz. ¢ z. 1 4 o 2 4} ve ee Ory PALE © gave t fea gt i REM YN TARCT TRONS Hiik22- me ieiseaT e | to deopypt Hu ciphertext bs divicled Initp 5 chenacler group MING the Kay fn the severe. orcler the plasittext & yetrieveel Steganography 4 A plaintext may be hidden th one mo tuays ~The methods a steganography whieal the exfetene oY the Message , whereas ‘the methode oJ oypto graphy vender the message unin teltgible to oudticlens by Varions Wans{ormabion 6) “jhe wx’ Character Mar King» Selerted letters 4] Printed vty pe wri Ten kext are drerwriten Uh pends The marke ordinal are pot Visible. nnless the paper & held atan angie lo bight hight . | Unisible Mink: A number o] Subsinnics an be nsed Sor weriting bub leave no wisibre Irae unt heat jo Some chemecal fs appliid fo Hu paper Pin punctate VS! Ima pir punctures on gebeited biters are Grdinavily nee véible unless the paper Ps held up fn drsne qe light: Typewitien wrecker vibbon: tseel between Ihes typed width a black sei pbon) Hie vesules cy dyping qgith the tornedtion fape ase. visi ble tuly under a atony Light Trtwducton to Number Theory : Asymmehic = fey Uypiogaphy uses primes | extensi vely 5‘ | Degini tion = The sit rs aclecl (nto positive integers can be civicled three. groupe humber (, primes and wmpesites Pesitive integers ——_{- eal Number { primes compesites. Fractty | divisor Exactly 2dinser Morvecthan: &clivisers A pesrtive integer a prime if and ony fe | eradhly clingbe by liso Inkegers, land iksetd «A twompesite. |B a — pesittve (niegpo with more than wo diussre | 1 smallest prime is 2 2. Ligh all phows Amatter than Io | There are 4 prme tess than (0: & 3, 5,7. The perencage Gf ppmes ip The range Uo lo te goy. ° the cleureaws Os the TaANge fplreases, Pemten tage \ \Co pn mes: | Two pesitive integers @ and b are relative ly TNO. \P > co phme, if ged aj 62+). The number | b relabcvely pnme with any inkeges - Tf pis & prime, then aul lngers | te Pot re rolalcve ly phme Ww P Cardinality primes: Frdinite number g pames: The number of primes ¢% ipdinite . Nerve ii an tndoymal preos Srppose tha “the Jee G) pPhmes js dinite, with pt the Largest prime. Mutleply the set og primes and cau the result pe 8x3x...XP. The Integer CPTP Cannot hae a dader 42? we Know thak, 4 dlivicks Por 9 alio dindes (pHs then q divieles pj) ~pe). We cnty number that eeveles | re 1, whith fs net a prime, Theredore. QZ va Sarges than p Number 9 primes: A. deme ncn) fr eledined that dinds the lumber of pames 4matter than br equal te The doilo ~ wing Bhows the valucs ep this qguvdeon ov clifperent r's | AC). SOyeATODS) NG) +2 ACO a AQ0) #8, KCED='5, Rlt00) =k us If n fs very large wean we an apprximalten tn) Calulate ACD? [nan aol gmcn? <[n] In ne asbb)) . clis voveree{ The Gauss disovered the upper lumi » Lagrange. Power Umit checking gor primeness: Given & number n,n prime, if tne humbes & clivsible by atl PPrmee Less than Vn Fg 1 prme? na torr Guta aa Ten Gues ace | ioe) ATs Saar z, dinsibk by any we need w See we aie °] these Puunbers Bill ehes so ana Sie priee Format! litte Theorem: Little Theorem pleye a VOY (mpothar Two versions Ue, Ferme E'S qele th number theory and oyptography Fins version: | The divst version Acugs Hae a eee eee h that P does Nok divide & The | and a hf an integer ane pape Wateae = emocla exone) version : | The Setond version vemos the condlilion on a | | 3k ways thas Pp i a prime aad a uy tnleger then: | P= @ med Applications t The theorem vs Very wuedul gor solving problems Exponenttation: Fermect (¢ [ttle theorem sometimes 0 helpyet gor quickly, dinding a apiwtion ty Some exponentiiateon Fg Fined the result of b"medn soln we have mod wed thie & dhe drs version g Format 1s Vithle theovem where Pci Eq’ Find the peswit 0 3 moe ir: Bol * Heye he exponente*Ci2? ancl the modules Lip are Note the Same wh. Substitution ths GN be solved using format tat theorem - 3? mod = (3x3) moel Us = (a medi Us ned u) > @xgymeedn q Multeplicahve tnverses: A very interesting a pptccation EM thooven vv dincting ome mutlpliatwve theres quickly the modules ia pme 2) HP ma prime anda & an intuger Auch Mat p does not clivicdle aC plad ythen a-tmod p= al Fimedt This an be easily proved] jg we. multiply book Gicles q the 0 quality by @ aNd use the inst version 4 Fevmat (g Gttle theorem axa mode =a xal med r = al mod P moet P- Ther appliakin climinates the We op extn ded euckdean algonshm Sir Jinding some. mullipweritve fin vee: fg I 12 8 med tt = g! med Ul = ra mod It = 1S mod 7 sl 2 al 5) mod 43 E oo mod 23 ~ 9 mod a3 = mod &3 a) lot -2 ata bo med 101 Sian md (0) = 60 med lo} | = 3a mod (ol “| gu 2 | aa’ mocl Qu Sg mola = teen - Ag med Bl! Following Darel proog s Q two theorems relake| to Fermat's | ttle theorem 4 Theorem |: Td pfs a prme and a \ o pettne wieger relly prme to Pr then a?! = | Cmed P Proof: qe a@n be proven that the mesiclucs 4 “Ihe perms G, aa, > CPA meduto F are U2, > CP), buk Not Newessawly fn the same creler The Wel Gg AK2AA cela ts [eP-y) alice The wsult Gy bX? x - CPD & [opoyt his means [epi al = [ce-0 Jt (mod p? Tr 2. al mame al = (mod p) , when we dinde forth aides by [VAQ) thie theorem js the dist vesion ©) Fermatls little theorem Theorem 2: If pt a prime anc a & a positive tinegen, then P= atmed p) Pront: T§ @ and Pp ame w-Prime ;we multhply both silts oy the congrucnic. wing The Tesi OF the previous theorem te fee al = atmed P? T? Pla ,then abz azo mod PP < This dhaovem. (a The cesond versions 4] Fermet's little the 3 Euler's ‘Theorem: 1 Euler! stheorwm (an be theught of as2 e n peleuli “generalization oy Fermatls tritlle theorem . The modu Vee ee heme crema raogale modulus fp Fuler's rippers ts an Integes Two versions cy} thts theorem cto, Fixst version: The diet vevsion 5 Fuler(s theorem (i simik qo dhe inst version 04 dne_ format ls Le theorem. 14 anol nN are (opnme , dren ane nae Sewnd veri on The Seine] Veosion 7 Fuley ts Theorem f& aimila to Seen) version q Ferme ts litle theorem ite Temoves the condition that a and n Should be wpnme TS N= Pxq as Kx Pin) HI a < and KR an thteger ¢ then acmodn) . TS 4X , three. cares ave possible 0 at a ff neste a mullplecy Titian yrectecple 4) 4 then a ane n ave wprimes meio! (se) a mod n uk xc amod nh mod nN * =q mod aif a Ba multiple og pca=Lxp) , bubnok a multiple g 4- Pee gl a ea ¢ med 4 ~@ mod q pei eA a kro) qu» 2 le modq > C4 mmodaJSinedg ~tpak~ Pm wn af me eee KxTU) 14 Gxq, Crnter pretation Q congrrente) - xan Fe a Beal Gl xa ag jemi tad Tt Kx Tl Hy =att£+j) xn. s Kx guntl = OA+lixj) xn so ne ea mo Ceongrue nee, ve ANT: It¢ a i a mutteple 9 4 Cast xq) bub nok a | mutteple 4 Py the mood i the same as dor the Second (ase but the aoks 4G) pand q ae changed- The seand versions g Fuler ls theorem med in RS | Crypre system - | Applicatrons + The theorem fe Somottmes helpdal dur qusthly dinclurg o Solution te Solve exponen watiyns. Exponen tiation : Euler's theorem sometimes tr helpdul dow quickly Jinelng Aoluttisn to Some exponentturone , — es 9 67% med Bs = & mod 35°! bs oe mod 77. Let Esl On dhe -Setond vesion , 2 LD + ory mad 11 = C20 med 11) Ceo ve 11) mod TI ' = (207209 mod tt =F 4) | Muatepiiottre tnverses Ewley's dheorem can be wed tw ding multtplitatrve trverses Moditla a pnme ; Fults theovom lean we usec be dined mucttepual ye — Pnverses modulo & composite. ‘Id 7 and a. axe Copter, | an ques almod nr = & mod a sth giles Wequatitey the can be easily proved tp 0c multiply Po - un) nD axatmealn = 4% Been ed, cee a) gt gtr} 8 dan = ne men TT © go mad) = 24 ed A b) 47 1 gus) ee mod 15 > 7" mod is = 13 mod lS DP bo” = po Mle-l 4 o” mod lg = 60 ie \ ) ' 2 mod l21 = bo Ie ti = 53 mod 1s7 apie a 1) med toe lic) 29 MW, te i Modo mod 108 1 mod ‘Theorem: | | | T¢d A and a aie wr prime , then aie. | = (Lmecln, Proof Ascume that fy olemente 19 Zp are 1 7) 1H we create a : Mother Sek ary) ate, ...argin) by mullplying gach element te Zn* n® by @- 1b tan be proven thar eath elument vn Shi pew fet Li Congnuent te an iter A Sn* Cnot recess aily th dame erder. ‘ [Thus , ani Xara XL 1+ AAGUNT ET LTD. Xs - TN) Unody, un * we have, a ® Lay yap eo) TOU] = XTX. orqenycined Thorejore gi 5 i umod 1D - Generating primes: Mersente Primes: Mersenue cedine dermuta, ed q some enumorete Mersenmie members ; thar war Supposed tv JAW primes. | Py M = a | p a ad p fe pame, Mp thought yo be prime Later , ie was preven thar Net cull menrbers create d by Mersenre- dormula re primes. 2 Ly Teg Meee Ms My 2 20) 2127 Mg = g-1 = 4 My = 2-2 = 20n7. CNob a Pim 1B . Ms = 2%-] = 3) Mg = 27-1 = ANA A number of bee Mp: ght ts called x ketene peter Set eg et ee hoi be & prime Format: primes: Fermat med be primes. The dormuta dur c Fermeds lumber i gind a dormula to Gener abe Fre @ at- Bi Z F, = 3 foe ee Fs = 4294 %b1297 = E41 xb100 4 fo. = (il Fa = bss3t -~ Not a prume. Fermeals ecteel updo Fay, but Te termed outth Fo fs nok & pime . NO hunvber gieater than Fa ha. | | 4 > deck ‘been proven |” be a2 prime. As a matler q m numbers pte Fa 1 have been proven to be omposi cu | punrbers - cas Lact | An Wypregraphy, We often hued betonlepe 9) tongruems- Uns tecce) 4 equality . Mapping dnsm z to Zn A pot es te Me + Tginite huMbers 4 2 an map te bne member 9 Zn. For example the result @ mod wa, 12 moqio>: 99 mod lo = g and 20 ON tn modular arithmeb ; niegere like 2) 19, anclar ave lle tongnuent race] Llp. Jo Show that bw tinlegers ane longruent , wengnenée ‘epesator C=} fh used, The phrase tmod n> Ys aelded wm the aight side Oo) the Congrmerie. bo cedine, the value o modulus that makes the | Telatinship veltel » Za- antmodte) | 2 = wdmod Lo? a2 23 cmod 0) ie 2) Be atmede? es- eum a5 ee itm eo y $a n aie 22utmod | congruence Retations onep Ee: [Qe ctina : | ( the tohgmienic. eperouter Looks Uke the equally operate but there, are duferences . fist con-e4 wclley Opera tor Mops a member 6) z Ie ciseld- | dhe tongnunie. opecto Maps a member oy 2 t & mumber Of Zn + Sevonel 7 equality eperadsr (4 one te One * the congrienie. opera ma to One. The phrase (mod n> merited at tre aghe hand side S} the songmente operoctor is guste an éneli coon] th destthakion Set (Zn). This phrase f adeled tp Ahoto what modules ts weed Voth Mapping . the on Usecd here docs nob heme, Same meaning ak The binawy Operadse - In other ward he Sgmbo| red |? 12 moclte 1 An opereder 7 the phrase, (mod te) Q = IR (med to) means le clestrhetiom seb e210 ' | 8 Residue classes A wesidue class Lay or La}, Bde see S) / linkegens Congwents Mmecule h . dn ether words, (vs cetleg | the see yf att integers Suh drat 2 = almocl hn), | For ex, ample, ONES, thee ave Bsees (eo, 09, Ted 029 end Ly9 . BAS a. rs fe ee ical f ee | Cay nw get 2 HIS, lo § 9, 51 toys, ale ih en aay —&, 3) 2 F)leity > Y ane le ee BS By, By * . Gy athe TOF The Integers pp the aet Lo} ave AH Tecluec| © When medule & operation, fe cepptiedl on them. The integers dhe SepLt} ave au redurecl to] when module ¢ operation | AppLeec| on dem ,and so On. | TN eath Seu , tere One clement AUed te easis (non negatzve> residue . In the see Ce), thi Elemente fr 0% i) the Seelr} hit element ts 1) and so on The set 94 eu o) These. Least: vesiclues i whels Showh as AL = : 4 q ds, the See Xp_ (2 The ee fo, ip 2, 37 44 Iw othay words | Set 6) Sul least Yesidue modulo n- Fig Shows The whyarissh between the two a rele. Integers © be nel ave aspacd evenly oun ; AU wongnune integers modulo n BtLeLpy. the same, point M the dicle. . pogittre and. negatere, integers fram Zore erica” do the cirde fh such a Lody Peete Saeed “Yymmeny belwooeen them. <4 oo oo | ~(n-) 21 0 ) 2 n~| (hy | ae Laz gtmod np. ae using graphs - lemparigon % 2 and Zn haser heorem: i ab brid end ore erage sett 2° p Then a= b Uncding fp and only id there. exists an integer 4H that a ae | Pray LF AsebCmed n) Then n |ca -b) | cOohrila Mees thee & cn nkger 4 uth: ther a-b =4n. Therefore we have a2 4yxn th. TS there % an Un be ges Q such tha a=4%h +h, Then ab <4xh whch means hn] Ca-h Therefore , we have A= b cmod rd, Bae | TH ane, and n ane integers coith zo, | t ey Suth that a= blmod n J then a) adt = bre (med ) | by) qa-¢ = b-e Cmodn> | | © axe = pre Unednd prood* Note thet a= blmed nd > Mai’ | — by jap CHO = Cb ee) HIS b- Because, n/a-b Meet) | Thevegoreg , AFG = btc Lmed W 3) fant) — @b-6) = Ab Beravee NYA Meaney OO Theregone , AC = b-clmod nr) fe acca) loxe De Cabo XC Becauce ni exiesy Aas ‘Theregore , aXe = bxa Cmod nD, Theorem: (Pale ue nicl umalelrderonreettae goa: ecole Cae thak as bemecdnd and cx dtmod h 2 then, a) att. = bd el Creel n> bP) a-c = b-ol tmod Ww) t) AXC = pxel umod Proed : e (Node that ge= b (med h) > ¢ca~bd = kxn c= dtmedn) @ Ce~d) = 1xNn, a) atu — Cb+tel) = Cab) + 66-4 Kxng buen 2 Ckt+ Den | Theredre, gp te = ayes arr | ES Ea cia) oy eae) Ree) = Kxn — bxn = CR) x i: Pare AC = bo dtmedn>d [eo — bed = tate bo pe Cee | if -txk) ¢&éxpxn Thevegore arc = bxeallmelh, Finite Fields: | Aldhough » there ave dielels Gp vadinite orcle7 ony JSinite dields are Gctensively sec Vr oryprtegrepry , A dene dead 42 eld wikis Ha Seton 7) Clements; are veng Lin pow ane shuctwres vyprography « Gatos sheweel that dor aw dield to be mira Teta Na Be, fe a vine. andn fs ©) elements should, be po ; when, Pls ue 5 , j . Maually called la posittve thleger the dinite dields Oe .. | aalots dielas cana denokl as Gr CPM, eo - A Stats field , GeCpO, bs @ finite dielo| ae | Clements - GEUW? Fields: when fel, we ere OP? field - his djeld arthmeh& | | | | | | hove | fr boo | can be the See pa? ply wit Ope ragions Caelditton mulbepli error « | tn dui ces, At h element has an ecatell ttre / fvese an d thet non zere clements have. 4 mudtepltcatrre Civese (no mucltyplicative jovesre. dus O° loo Op ercd ions er (22 width the Set for LY &nel addition ef multpilation. GFl2 Joly Tex Laver es + a Cae a ) es ©? al dendity » 60 J : We . re area Fach wore je the nelditive. invene oy ifsc Every word Cexupt 60 Yhas a mutplicedeve. tnverse . The multe pli catve. wrest pats ct (01, Oldand Clty, ult p ! Addit’ 4 mMulleplication ae dediied by polypomudt Chinese Remaineler Theorem: The chinese. Rematincdesr Theovem 8 weel to Solve. & Sete fo congrretene equations with one Variable bur ckifevent module whith are velatrely prime as Shown belour, X =) ajlmod mi) mt = @ Lmed m2) kh = ae (mod Mk). 1s theover)? States That dhe above equations this the ces hat Ju qua howe a unique solutron Tf dhe moclule. are ve lateve ly prime The dollowiing fk an example Of set gJ | equatcons with ehfterent module: Y= 2tmod 32> 2L + _3 tmod S) A = &lmod bh The Solution to this Cee gy equations is gji ror —th the nexk Lectin . the solubion te the sez GY equations dollows these aveps’ D Fine Memixme €--- MR - The Behe tommen meclulss. &) Fine M, = mimo Mo - mln , eee sa Ae mime: 2) Find the. multtplica’ ve wnverse. GY Mc 7M. ~~ Mie: using el Lormes ponding moclulé Cm, 9M «=> Me) cal Hie inverses met) Mg, 1-- Paes 4g W) The golulte bo the simulkancous equations Te t= (a, xm, xMy! $4 XMz x mld tue X ME Ded Nele dhatt dhe det oF equatcoms can have a spluteisn even ft dhe modulé ate hok relativels, Prime bust, Meet ejb ce neitiones - waa med 3s, = %e amods Sone 2medlF . ie dine the soulsnm dus previous example, dour Steps tere. te be gollowed - SV eae ae Vita CCT fe NER (ES te Mea = tos ls = Slr Ms -~wslt = mile @, Moths Mglal. | 3. the tnverses are CM b= M, module mi). | | Ay cs = fi A> C&X3IE KO + Zxe2UCL F2xIEXD Modi los - = 2 mocl ws The cnswer te dhe seb Of eq ueteons fh ur23. F EQ: Finel an tniegey thar has memouneler 3 when | | civclee by 4 anel & put te divisible by 2. We can dorm thee &4 patins ond solve them tv ding the Value. qx: a= 3 mod Se mod B nee ae, mod lg. T4 we dello the four teps , we Sha” ee a, We can check thet 276 = 2 mocl ees 2 med 13, Qib ts divisible by 1@ Cthe quotiene Gb a3 and the yemacrcler fs zew- Assume we reed to Calta, z= Ary Where a= 1a2, d7 24 bik us system auepls aed nunmvbeas less than [00 45 Jollouss ; these hurmbes can be oe presented IC = 4 Cmecl 994) ye art (med 19). X- as (med 46) ye 40 Cmod 10). xr 2b Cmod ID y= 4B Cmod 1D). Adcatng each Congrucne ta x wrth the eorrespencling tongruenie inh y aes ary ob (mod AD > 2 > bl Cmod 99) Rey 5 bs Cmod 46) —> > = 65 (mod 28) Ady eee Cmed IP —> > — talwoday. these & equations wa be solved msing Ee chinese qematndsr theorem do Jind Z. XH A4S4: Applications: ae G2 The chinese wemanckr theorem has several ih oyyptography plone cong meen ce ane Appi calvons diz One fs do solve que other % integer in wims Ge liste Large to vepresente & very 5 pmail Untesprs

You might also like