Number Theory and Advanced Cryptography 2' Primes - PowerPoint PPT Presentation

1 / 56
About This Presentation
Title:

Number Theory and Advanced Cryptography 2' Primes

Description:

Primes distribution & testing, DL background & applications. Chih-Hung Wang. Feb. 2006 ... The Man-in-the-Middle Attack (2) 47. The DH Problem and DL Problem (1) 48 ... – PowerPoint PPT presentation

Number of Views:140
Avg rating:3.0/5.0
Slides: 57
Provided by: can73
Category:

less

Transcript and Presenter's Notes

Title: Number Theory and Advanced Cryptography 2' Primes


1
Number Theory and Advanced Cryptography 2.
Primes Discrete Logarithms --Primes
distribution testing, DL background
applications
Part I Introduction to Number Theory Part II
Advanced Cryptography
  • Chih-Hung Wang
  • Feb. 2006

2
The distribution of primes
  • The natural way of measuring the density of
    primes is to count the number of primes up to a
    bound x, where x is a real number. For a real
    number x 0, the function ?(x) is defined to be
    the number of primes up to x. Thus, ?(1) 0,
    ?(2) 1, ?(75) 4, and so on.

3
Some values of ?(x)
4
The Sieve of Eratosthenes
  • This is an algorithm for generating all the
    primes up to a given bound k.

5
The prime number theorem
6
The error term in the prime number theory (1)
7
The error term in the prime number theory (2)
8
Sophie Germain primes
9
Probabilistic primality testing
  • Trial Division

10
Trial division
11
The Miller-Rabin test
12
Error parameter (1)
13
Error parameter (2)
14
Carmichael numbers
15
Good Primality testing (1)
16
Good Primality testing (2)
17
Error parameter
18
Generating random primes using the Miller-Rabin
Test
19
Sieving up to a small bound
20
Generating a random k-bit prime
21
Perfect power testing (1)
22
Perfect power testing (2)
23
Perfect power testing (3)
24
Deterministic Primality Testing
  • The basic idea

25
AKS algorithm
26
Running time
27
Notes
28
Primality testing in Java
  • Public BigInteger ( int bitLength,int
    certainty,Random rnd )
  • Public boolean isProbablePrime (int certainty)

29
Cyclic groups
  • Order of group element

30
Order of group element
31
(Example)Powers of Integers, Modulo 19
32
Cyclic group Group generator
33
Example of Cyclic Group
34
Theorem of Cyclic Group
35
Prime Order group
36
The Multiplicative Group Zn
37
The Multiplicative Group Zn
38
Example of The Multiplicative Group
39
Finding Primitive Root
Page 166
40
Application 1 Diffie-Hellman Key Exchange
  • Diffie and Hellman 1976
  • A number of commercial products employ this key
    exchange technique
  • This algorithm enables two users to exchange key
    securely

41
The Diffie-Hellman Key Exchange Protocol
42
Example of D-H Key Exchange (1)
5
XA 36 XB58
q97
YA53650 mod 97 YB55844 mod 97
K(YB)XA mod 97 4436 75 nod 97 K(YA)XB mod
97 5058 75 nod 97
43
Example of D-H Key Exchange (2)
44
Hybrid Encryption
  • Diffie-Hellman based hybrid encryption system

A
B
YA
K(YB)xA (YA)xB Mod q SKh(K)
YB
ESK(M)
128 256 bits
SK can be a key of the AES symmetric cryptosystem
45
The Man-in-the-Middle Attack (1)
46
The Man-in-the-Middle Attack (2)
47
The DH Problem and DL Problem (1)
48
The DH Problem and DL Problem (2)
Example a loggh log3 5 mod 19 4
49
Importance of Arbitrary Instances for
Intractability Assumptions
CRT
akiqiai ri g(p-1)/qi mod p
riairia (mod qi) h(p-1)/qi mod p
50
Chinese Remainder Theorem (1)
51
Chinese Remainder Theorem (2)
52
Chinese Remainder Theorem (3)
53
Example of CRT
54
ElGamal (1)
55
ElGamal (2)
56
Meet-in-the-middle attack Active attack of
ElGamal
  • See Page 277
Write a Comment
User Comments (0)
About PowerShow.com