Notes Math
Notes Math
AMTI
EXAMPLE - SECRET KEY TRIANGLE
For example:
You pick two numbers (like 7 and 11) to build your lock. You calculate a special number using Euler's function,
NUMBER
ϕ(n)=(p−1)(q−1), THEORY
which .
helps design your secret key. Thanks to this math trick, only you can unlock the secret
messages! Euler's function is to make sure the lock and key system is super secure.
If n=10, the…………………………
totient function ϕ(10) = 4, meaning there are 4 numbers (1, 3, 7, 9) that are relatively prime to 10.
Here’s how it helps
Prime in RSA cryptography:
numbers are
the building
Step-by-Step blocks
Use of ϕ(10) in RSA:
1. of Prime
Pick Two all integers.
NumbersThey
p and q: Let's assume this is just an example, so n=10 is given (though in real RSA,
n is a product of largeonly
are divisible primes).
by
2. Calculate ϕ(10): As you found, ϕ(10) = 4, This is a critical value for choosing the encryption and decryption
1 and themselves.
keys.
3. Choose For
an example, 7 ise:aPick a number e such that: 1 < e < ϕ(10) (so 1 < e < 4). e must also be relatively
Encryption Key
prime prime
to ϕ(10)number
(so it has no common factors with 4). For example, you could choose e = 3.
4. Find the Decryption Key d: The decryption key d is the number that satisfies: d ⋅ e ≡ 1 (mod ϕ(10)). For e = 3:
because its only
Solve d ⋅ 3 ≡ 1 (mod 4). The solution is d = 3 (since 3 ⋅ 3 = 9, and 9 mod 4 = 1).
Public and divisors are 1 and 7.
Private Keys:
Understanding
Public key: (e, n) = (3, 10)
prime
Private key: (d,numbers is
n) = (3, 10)
essential
Encryption for
and Decryption:
cryptography.
To send a message m, encrypt it as: c = m^e mod n.
Decrypt it as: m = c^d
Numerical mod n.
Instance:
Example with Message m = 7:
2, 3, 5, 7, 11, 13 are
Encrypt: c = 7^3 mod 10 = 343 mod 10 = 3
prime
Decrypt: numbers.
m = 3^3 mod 10 = 27 mod 10 = 7
Thus, Euler's totient ϕ(n) ensures the encryption and decryption keys work securely together!
FUNDAMENTAL CONCEPTS OF NUMBER THEORY
NUMBER THEORY.
…………………………
Prime numbers are
the building blocks
of all integers. They
are divisible only by
1 and themselves.
For example, 7 is a
prime number
because its only
divisors are 1 and 7.
Understanding
prime numbers is
essential for
cryptography.
Numerical Instance:
AFTER RSA
2, 3, 5, 7, 11, 13 are
prime numbers.
FUNDAMENTAL CONCEPTS OF NUMBER THEORY
NUMBER THEORY.
…………………………
Prime numbers are
the building blocks
of all integers. They
are divisible only by
1 and themselves.
For example, 7 is a
prime number
because its only
divisors are 1 and 7.
Understanding
prime numbers is
essential for
cryptography.
Numerical Instance:
2, 3, 5, 7, 11, 13 are
prime numbers.
“CONCLUSION”
Number theory provides the
mathematical foundation for No need, keep it
modern cryptography, enabling
secure communication and data
aligns with the time
protection. limit
As technology advances,
cryptography continues to evolve,
with new algorithms and techniques
emerging to address evolving
security challenges.
MISCONCEPTION 3:UNBREAKABLE
ENCRYPTION
CODEMAKERS v.s. CODEBREAKERS
Key Exchange - ECC offers efficient key exchange methods like elliptic curve
Diffie-Hellman (ECDH), similar to the Diffie-Hellman protocol but using elliptic
curves.
Key Generation - ECC uses points on an elliptic curve to generate keys, offering
higher security with smaller key sizes.
>> Finance
Encryption - Safeguards online banking transactions
>>
Communication
Encryption - Scrambles messages before sending
SECURE PROTOCOLS
CRYPTOGRAPHIC ALGORITHMS