umass lowell computer science 91.503 analysis of algorithms prof. karen daniels spring, 2010

45
UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010 Tuesday, 27 April Tuesday, 27 April Number-Theoretic Algorithms Number-Theoretic Algorithms Chapter 31 Chapter 31

Upload: madonna-douglas

Post on 31-Dec-2015

32 views

Category:

Documents


0 download

DESCRIPTION

UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010. Tuesday, 27 April Number-Theoretic Algorithms Chapter 31. Chapter Dependencies. Ch 31 Number-Theoretic Algorithms RSA. Math: Number Theory. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

UMass Lowell Computer Science 91.503

Analysis of Algorithms Prof. Karen Daniels

Spring, 2010

UMass Lowell Computer Science 91.503

Analysis of Algorithms Prof. Karen Daniels

Spring, 2010

Tuesday, 27 AprilTuesday, 27 AprilNumber-Theoretic AlgorithmsNumber-Theoretic Algorithms

Chapter 31Chapter 31

Page 2: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Chapter DependenciesChapter Dependencies

Ch 31Number-Theoretic AlgorithmsRSA

Math: Number Theory

You’re responsible for material in this chapter that we discuss in lecture. (Note that this does not include sections 31.8 or 31.9.)

Page 3: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

OverviewOverview

• Motivation: RSAMotivation: RSA• BasicsBasics• Euclid’s GCD AlgorithmEuclid’s GCD Algorithm• Chinese Remainder TheoremChinese Remainder Theorem• Powers of an ElementPowers of an Element• RSA DetailsRSA Details

Page 4: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Motivation: RSA

Motivation: RSA

Page 5: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

RSA EncryptionRSA Encryption

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.531.5

MMSP AA ))(( MMPS AA ))((

Page 6: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

RSA Digital SignatureRSA Digital Signature

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.631.6

assume Alice also sends her name so Bob knows whose public key to useassume Alice also sends her name so Bob knows whose public key to use

'))'(( MMSP AA

?

Page 7: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

RSA CryptosystemRSA Cryptosystem

(31.19)(31.19)**

(31.26)(31.26)

)(mod)( nMMP e )(mod)( nCCS d(31.35)(31.35) (31.36)(31.36)

encodeencode decodedecode

source: 91.503 textbook Cormen et al., 3source: 91.503 textbook Cormen et al., 3 rdrd edition edition

to be explained later….

need efficient ways to compute P(M), S(C)

Assume M < n

(31.20)(31.20)

Page 8: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

RSA DependenceRSA Dependence

• Correctness:Correctness:• Euler’s Euler’s Function Function• Fermat’s TheoremFermat’s Theorem• Chinese Remainder TheoremChinese Remainder Theorem

• Efficiency:Efficiency:• Modular ExponentiationModular Exponentiation• Primality TestingPrimality Testing

• Security:Security:• Difficulty of Factoring Large IntegersDifficulty of Factoring Large Integers

)(mod))(())(( nMMSPMPS ed

see chart of result dependencies on next slide (courtesy of Mark Micire)see chart of result dependencies on next slide (courtesy of Mark Micire)

Need to show:Need to show:

)(mod nMM ed

Page 9: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

20022002

(Eqn. 31.20)(Eqn. 31.20)

with thanks to Mark Micire

EUCLID GCDEUCLID GCD EXTENDED-EUCLIDEXTENDED-EUCLID

Page 10: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Notes on Primality TestingNotes on Primality Testing

• Efficient primality testing has been goal for > 2,000 Efficient primality testing has been goal for > 2,000 years.years.

• Early attempts required exponential time.Early attempts required exponential time.• Miller-Rabin (Section 31.8) primality test is a Miller-Rabin (Section 31.8) primality test is a

randomized polynomial-time algorithm (1980’s).randomized polynomial-time algorithm (1980’s).• Agrawal, Kayal, Saxena provided a deterministic Agrawal, Kayal, Saxena provided a deterministic

polynomial-time algorithm (2002).polynomial-time algorithm (2002).

Page 11: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Basic Concepts

Basic Concepts

** Indicates that result is on chart of result dependenciesIndicates that result is on chart of result dependencies

Page 12: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Division & RemaindersDivision & Remainders

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.131.1

(3.8)(3.8) **

Page 13: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Equivalence Class Modulo nEquivalence Class Modulo n

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

(31.1)(31.1)

(31.2)(31.2)

Page 14: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Common DivisorsCommon Divisors

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

(31.3)(31.3)

(31.4)(31.4)

(31.5)(31.5)

**

**

Page 15: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Greatest Common DivisorGreatest Common Divisor

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

(31.6)(31.6)

(31.7)(31.7)

(31.8)(31.8)

(31.9)(31.9)

(31.10)(31.10)

31.231.2

(3.8)(3.8)

(31.4)(31.4)

**

**

Page 16: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Greatest Common DivisorGreatest Common Divisor

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.331.3

(31.4)(31.4)

31.231.2

31.431.4

**

Page 17: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Relatively Prime IntegersRelatively Prime Integers

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.631.6

31.231.2

31.231.2

**

Page 18: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Relatively Prime IntegersRelatively Prime Integers

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.731.7

31.631.6

31.1-631.1-6 **

Page 19: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Greatest Common DivisorGreatest Common Divisor

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.931.9

(31.5)(31.5)

(3.8)(3.8)

(31.4)(31.4)

(31.3)(31.3)

(31.4)(31.4)

(31.3)(31.3)

(31.5)(31.5) (31.14)(31.14) (31.15)(31.15)

(31.14)(31.14)

(31.15)(31.15)

**

Page 20: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Euclid’s GCD Algorithm

Euclid’s GCD Algorithm

Page 21: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Euclid’s GCD AlgorithmEuclid’s GCD Algorithm

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

**

Also see Java code on course web Also see Java code on course web sitesite

Page 22: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Extended EuclidExtended Euclid

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

(31.16)(31.16)

31.131.1

**

**

Page 23: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Chinese Remainder Theorem

Chinese Remainder Theorem

Page 24: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Modular ArithmeticModular Arithmetic

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

Page 25: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Finite GroupsFinite Groups

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

size of this group is 6size of this group is 6 size of this group is 8size of this group is 8

31.231.2

Additive group mod 6Additive group mod 6 Multiplicative group mod 15Multiplicative group mod 15

}1),gcd(:]{[* naZaZ nnn

elements relatively prime to elements relatively prime to nn

Page 26: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Finite GroupsFinite Groups

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.1231.12

Page 27: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Finite GroupsFinite Groups

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.1331.13

31.631.6

31.1231.12

31.2631.26

Page 28: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Euler’s Phi FunctionEuler’s Phi Function

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

(31.19)(31.19) **

Page 29: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Lagrange’s TheoremLagrange’s Theorem

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.1531.15**

Page 30: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Finite GroupsFinite Groups31.1731.17 **

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.1831.18

31.1931.19

**

**

}1:{ )( kaa k

additive subgroup additive subgroup generated by generated by aa

wherewhere

aaaa k )(

kk

Page 31: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Solving Modular Linear EqSolving Modular Linear Eq

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.2031.20

(31.4)(31.4)

**

Page 32: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Solving Modular Linear EqSolving Modular Linear Eq

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.2231.22

31.1831.18

31.1831.18

31.2231.22

31.2431.24

**

**

'' where,modsolution a as has mod then If :31.23 . 0 nyaxd nx'(b/d) x n)b (axd|bThm

Page 33: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Solving Modular Linear EqSolving Modular Linear Eq

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.2631.26

**

**

Page 34: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Chinese Remainder TheoremChinese Remainder Theorem

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

(31.23)(31.23)

31.2731.27

(31.23)(31.23)

(31.24)(31.24)

(31.25)(31.25)

(31.26)(31.26)

**

Page 35: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Chinese Remainder TheoremChinese Remainder Theorem

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.2931.29 **

Corollary 31.28Corollary 31.28. If . If nn11, , nn22, …, , …, nnkk are pairwise relatively prime and are pairwise relatively prime and n = n =

nn11nn22…n…nkk, then, for any integers , then, for any integers aa11, , aa22, …, , …, aakk, the set of simultaneous , the set of simultaneous

equations for equations for i = 1, 2, …, ki = 1, 2, …, k, has a unique solution , has a unique solution

modulo modulo nn for the unknown for the unknown xx..

x ai mod ni ,

Page 36: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

04/19/2304/19/23 3636

NumTheoryNumTheory

a 2 mod 5 , a 3 mod 13 ,ExampleExample. .

Given the Given the twotwo equations equations what is what is aa mod 65 mod 65? Note that ? Note that 65 = 5•1365 = 5•13..

The table of moduli wrt 5 and 13 for all integers in The table of moduli wrt 5 and 13 for all integers in ZZ6565..

source: 91.503 textbook Cormen et al. & Prof. Pecellisource: 91.503 textbook Cormen et al. & Prof. Pecelli

Table can be generated diagonally.

Page 37: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

04/19/2304/19/23 3737

NumTheoryNumTheory

Knowing that find Knowing that find aa mod 65 mod 65..

We have We have

aa11 = 2, n = 2, n11 = 5 , m = 5 , m11 = n/n = n/n11 = 13, = 13,

aa22 = 3, n = 3, n22 = 13, m = 13, m22 = n/n = n/n22 = 5 = 5..

We can compute: We can compute:

m1 1 13 1 2 mod 5 ; m2

1 5 1 8 mod13 .c1 13 2 mod 5 26; c2 5 8 mod13 40;

a 226 340 mod 65 52 120 mod 65 42 mod 65 .

a 2 mod 5 and a 3 mod13

source: 91.503 textbook Cormen et al. & Prof. Pecellisource: 91.503 textbook Cormen et al. & Prof. Pecelli

Page 38: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Powers of an Element

Powers of an Element

Page 39: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Theorems of Euler & FermatTheorems of Euler & Fermat

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.3031.30

31.3131.31

**

**

31.2031.20

Page 40: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

Modular ExponentiationModular Exponentiation

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

**

nab mod

Also see Java code on course web siteAlso see Java code on course web site

Page 41: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

RSA Details RSA Details

Page 42: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

RSA EncryptionRSA Encryption

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.531.5

MMSP AA ))(( MMPS AA ))((

Page 43: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

RSA Digital SignatureRSA Digital Signature

source: 91.503 textbook Cormen et al.source: 91.503 textbook Cormen et al.

31.631.6

assume Alice also sends her name so Bob knows whose public key to useassume Alice also sends her name so Bob knows whose public key to use

'))'(( MMSP AA

?

Page 44: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

RSA CryptosystemRSA Cryptosystem

(31.19)(31.19)

(31.26)(31.26)

)(mod)( nMMP e )(mod)( nCCS d(31.35)(31.35) (31.36)(31.36)

encodeencode decodedecode

source: 91.503 textbook Cormen et al., 3source: 91.503 textbook Cormen et al., 3 rdrd edition edition

need efficient ways to compute P(M), S(C)

(31.20)(31.20)

Page 45: UMass Lowell Computer Science 91.503 Analysis of Algorithms Prof. Karen Daniels Spring, 2010

RSA CorrectnessRSA Correctness

source: 91.503 textbook Cormen et al. 3source: 91.503 textbook Cormen et al. 3 rdrd edition edition

(31.37)(31.37) (31.38)(31.38)

31.31)31.31)

31.2931.29

by Thm 31.31 (Fermat)by Thm 31.31 (Fermat)

)(mod0 :Case pM

)(mod0 :Case pM pp

qq