1 / 42

UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Fall, 2006

UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Fall, 2006. Wednesday, 29 November Number-Theoretic Algorithms Chapter 31. Chapter Dependencies. Ch 31 Number-Theoretic Algorithms RSA. Math: Number Theory.

knut
Télécharger la présentation

UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Fall, 2006

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. UMass Lowell Computer Science 91.503Analysis of AlgorithmsProf. Karen DanielsFall, 2006 Wednesday, 29 November Number-Theoretic Algorithms Chapter 31

  2. Chapter Dependencies Ch 31 Number-Theoretic Algorithms RSA Math: Number Theory You’re responsible for material in this chapter that we discuss in lecture. (Note that this does not include sections 31.8 or 31.9.)

  3. Overview • Motivation: RSA • Basics • Euclid’s GCD Algorithm • Chinese Remainder Theorem • Powers of an Element • RSA Details

  4. Motivation: RSA

  5. 31.5 RSA Encryption source: 91.503 textbook Cormen et al.

  6. 31.6 RSA Digital Signature ? assume Alice also sends her name so Bob knows whose public key to use source: 91.503 textbook Cormen et al.

  7. (31.19) (31.26) RSA Cryptosystem source: 91.503 textbook Cormen et al. to be explained later…. (31.36) (31.35) decode encode + EXAMPLE need efficient ways to compute P(M), S(C)

  8. RSA Dependence • Correctness: • Euler’s f Function • Fermat’s Theorem • Chinese Remainder Theorem • Efficiency: • Modular Exponentiation • Primality Testing • Security: • Difficulty of Factoring Large Integers Need to show: see chart of result dependencies on next slide (courtesy of Mark Micire)…

  9. Basic Concepts *Indicates that result is on chart of result dependencies

  10. Division & Remainders 31.1 + EXAMPLE * (3.8) source: 91.503 textbook Cormen et al.

  11. Equivalence Class Modulo n (31.1) (31.2) + EXAMPLE source: 91.503 textbook Cormen et al.

  12. Common Divisors (31.3) * (31.4) * (31.5) + EXAMPLE source: 91.503 textbook Cormen et al.

  13. Greatest Common Divisor (31.6) (31.7) (31.8) * (31.9) (31.10) * 31.2 (3.8) + EXAMPLE (31.4) source: 91.503 textbook Cormen et al.

  14. Greatest Common Divisor * 31.3 (31.4) 31.2 31.4 + EXAMPLE source: 91.503 textbook Cormen et al.

  15. Relatively Prime Integers * 31.6 31.2 31.2 + EXAMPLE source: 91.503 textbook Cormen et al.

  16. Relatively Prime Integers 31.7 31.6 * 31.1-6 + EXAMPLE source: 91.503 textbook Cormen et al.

  17. 31.9 (31.5) (3.8) (31.4) (31.3) (31.14) (31.4) (31.3) (31.15) (31.5) (31.14) (31.15) Greatest Common Divisor * + EXAMPLE source: 91.503 textbook Cormen et al.

  18. Euclid’s GCD Algorithm

  19. Euclid’s GCD Algorithm * + EXAMPLE Also see Java code on course web site source: 91.503 textbook Cormen et al.

  20. Extended Euclid * (31.16) * 31.1 + EXAMPLE source: 91.503 textbook Cormen et al.

  21. Chinese Remainder Theorem

  22. Modular Arithmetic source: 91.503 textbook Cormen et al.

  23. Additive group mod 6 Multiplicative group mod 15 31.2 Finite Groups size of this group is 6 size of this group is 8 source: 91.503 textbook Cormen et al. elements relatively prime to n

  24. Finite Groups 31.12 source: 91.503 textbook Cormen et al.

  25. Finite Groups 31.13 31.6 31.12 31.26 source: 91.503 textbook Cormen et al.

  26. Euler’s Phi Function * (31.19) + EXAMPLE source: 91.503 textbook Cormen et al.

  27. Lagrange’s Theorem 31.15 * source: 91.503 textbook Cormen et al.

  28. * 31.18 * 31.19 source: 91.503 textbook Cormen et al. Finite Groups * 31.17 additive subgroup generated by a where k + EXAMPLE

  29. Solving Modular Linear Eq * 31.20 + EXAMPLE (31.4) source: 91.503 textbook Cormen et al.

  30. Solving Modular Linear Eq * 31.22 31.18 + EXAMPLE * 31.24 31.18 31.22 source: 91.503 textbook Cormen et al.

  31. Solving Modular Linear Eq * + EXAMPLE * 31.26 source: 91.503 textbook Cormen et al.

  32. Chinese Remainder Theorem * 31.27 (31.23) + EXAMPLE (31.23) (31.24) (31.25) (31.26) source: 91.503 textbook Cormen et al.

  33. Chinese Remainder Theorem * 31.29 source: 91.503 textbook Cormen et al.

  34. Powers of an Element

  35. Theorems of Euler & Fermat * 31.30 * 31.31 source: 91.503 textbook Cormen et al.

  36. Modular Exponentiation * + EXAMPLE Also see Java code on course web site source: 91.503 textbook Cormen et al.

  37. RSA Details

  38. 31.5 RSA Encryption source: 91.503 textbook Cormen et al.

  39. 31.6 RSA Digital Signature ? assume Alice also sends her name so Bob knows whose public key to use source: 91.503 textbook Cormen et al.

  40. (31.19) (31.26) RSA Cryptosystem source: 91.503 textbook Cormen et al. (31.36) (31.35) decode encode + EXAMPLE need efficient ways to compute P(M), S(C)

  41. RSA Correctness (31.35) (31.36) 31.31 by Thm 31.31 (Fermat) 31.29 source: 91.503 textbook Cormen et al.

More Related