Mathematical preliminaries of crypto More Concepts of Number Theory

نویسنده

  • Peeter Laud
چکیده

Theorem 1 (Chinese Remainder Theorem). If ni ⊥ nj for each 1 ≤ i < j ≤ k, then the system of congruences (1) has a unique solution modulo N = ∏k i=1 ni. The proof of the existence of the solution will also give us an algorithm for finding that solution. Proof. For each i ∈ {1, . . . , k} let mi = N/ni. The numbers mi are natural numbers, because ni was one of the factors of N . We have ni ⊥ mi, because (1) mi is the product of all nj, where i 6= j, and (2) ni ⊥ nj for all these nj . Let ri be the inverse of mi modulo ni. In other words, ri is such that rimi ≡ 1 (mod ni). Such an ri exists because mi is invertible in the ring Zni . We can use the extended Euclid’s algorithm to compute ri. Define x0 = k

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mathematical preliminaries of crypto Discrete Logarithm

is the exponentiation operation. Moreover, if h = gx then we say that x is the discrete logarithm of h on basis g, and write x = logg h. The discrete logarithm assumption in a cyclic finite group G of order p is that given a generator g of G and a randomly generated element h of G, it is computationally infeasible to find logg h. To formalize this, we need to define infeasibility. Thus, more fo...

متن کامل

New concepts on the fuzzy linear systems and an ‎application

A‎s we know, developing mathematical models and numerical procedures that would appropriately treat and solve systems of linear equations where some of the system's parameters are proposed as fuzzy numbers is very important in fuzzy set theory. For this reason, many researchers have used various numerical methods to solve fuzzy linear systems. In this paper, we define the concepts of midpoint a...

متن کامل

Computational problems in supersingular elliptic curve isogenies

We give a brief survey of elliptic curve isogenies and the computational problems relevant for supersingular isogeny crypto. Supersingular isogeny cryptography is attracting attention due to the fact that there are no quantum attacks known against it that are significantly faster than classical attacks. However, the underlying computational problems have not been sufficiently studied by quantum...

متن کامل

Beyond first order logic: From number of structures to structure of numbers: Part II

We study the history and recent developments in nonelementarymodel theory focusing on the framework of abstractelementary classes. We discuss the role of syntax and semanticsand the motivation to generalize first order model theory to nonelementaryframeworks and illuminate the study with concrete examplesof classes of models. This second part continues to study the question of catecoricitytrans...

متن کامل

Design of crypto primitives based on quasigroups

Today, the security of the modern world is undoubtedly dependent on the cryptographic primitives built into the various protocols used for secure communication. Let us mention here the most important, like block ciphers, stream ciphers, digital signatures and encryption schemes, hash functions, pseudo random number generators, ... The design of these, and many other crypto primitives, uses di e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012