Summary of Lecture 2
Binary relation: from to ,
Equivalence relation: a binary relation on a set .
- reflexive:
- symmetric:
- transitive:
- equivalence class
Congruence:
❌
✅
- or (iff )
s.t.
Arithmetic operations over the set
partition
- //not an equality of sets
has an inverse
DEFINITION: Let and . The residue class is called an inverse of if .
- The inverse of a residue class is unique (if exist). We denote .
- division: If , define
THEOREM: Let . has an inverse if and only if .
- Only if: such that ;
;
- If: such that
DEFINITION: Let . Define .
- If is prime, then
- If is composite, then
EXAMPLE:
Euler’s Phi Function
QUESTION: How many elements are there in
is the number of integers such that
DEFINITION (Euler’s Phi Function) .
- is the number of integers such that
//notation: - Gauss chose the symbol for Euler’s Phi function
THEOREM: Let be a prime. Then .
- Let .
- iff
iff
EXAMPLE:
EXAMPLE:
QUESTION: What is the formula of for a general integer ?
THEOREM: If for distinct primes and integers , then . Hence, .
- There are many proofs. We will see in the future.
- Principle of inclusion-exclusion
- Chinese remainder theorem
COROLLARY: If for two primes , then .
EXAMPLE:
Euler’s Theorem
THEOREM (Euler, 1760) Let and . Then
- are both residue classes modulo
- Suppose that for . Then is
- How to prove?
- Consider the map
- We show that is injective
- , this is because
- Suppose that
- , this is because
- , i. e.,
Equivalent form: Let . Then for any integer a such that
Fermat’s Little Theorem
EXAMPLE: Understand Euler’s theorem with .
- ,
- Consider the map
- ;
;
,
- is injective
Fermat’s Little Theorem (Euler, 1736) If is a prime and .Then .
- By Euler’s theorem,
Equivalent form: If is a prime, then for any integer .
Cryptography
- Confidentiality: The property that sensitive information is not disclosed to unauthorized individuals, entities, or processes.
–FIPS 140-2
Private-Key Encryption
- : key generation, encryption, decryption
- : plaintext (message), ciphertext, secret key
- : plaintext space, ciphertext space
- Correctness: for any
- Security: if is not known, it’s difficult to learn from
Public-Key Encryption
- : key generation, encryption, decryption
- : plaintext (message), ciphertext, public key, private key
- : plaintext space, ciphertext space
- Correctness: for any
- Security: if is not known, it’s difficult to learn from
RSA
CONSTRUCTION: , the message space is
- choose two -bit primes
- choose s.t. ,
- output
- :
- output
- :
- output
?
- s.t.
RSA is correct!
1977, Rivest, Shamir and Adleman: A method for obtaining digital signatures and public-key cryptosystems. MIT/LCS/TM-82. (Turing Award 2002)