Chapter 4
Chapter 4
Cryptography
Chapter 4
Copyright © McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Chapter Motivation
● Number theory is the part of mathematics devoted to the study of the
integers and their properties.
● Key ideas in number theory include divisibility and the primality of
integers.
● Representations of integers, including binary and hexadecimal
representations, are part of number theory.
● Number theory has long been studied because of the beauty of its
ideas, its accessibility, and its wealth of open questions.
● We’ll use many ideas developed in Chapter 1 about proof methods
and proof strategy in our exploration of number theory.
● Mathematicians have long considered number theory to be pure
mathematics, but it has important applications to computer science
and cryptography studied in Sections 4.5 and 4.6.
Chapter Summary
● Divisibility and Modular Arithmetic
● Integer Representations and Algorithms
● Primes and Greatest Common Divisors
● Solving Congruences
● Applications of Congruences
● Cryptography
Divisibility and Modular
Arithmetic
Section 4.1
Section Summary
● Division
● Division Algorithm
● Modular Arithmetic
Division
Definition: If a and b are integers with a ≠ 0, then
a divides b if there exists an integer c such that b = ac.
● When a divides b we say that a is a factor or divisor of b
and that b is a multiple of a.
● The notation a | b denotes that a divides b.
● If a | b, then b/a is an integer.
● If a does not divide b, we write a ∤ b.
Solution:
● 17 ≡ 5 (mod 6) because 6 divides 17 − 5 = 12.
● 24 ≢ 14 (mod 6) since 24 − 14 = 10 is not divisible by 6.
More on Congruences
Theorem 4: Let m be a positive integer. The integers a
and b are congruent modulo m if and only if there is
an integer k such that a = b + km.
Proof:
● If a ≡ b (mod m), then (by the definition of congruence)
m | a – b. Hence, there is an integer k such that a – b =
km and equivalently a = b + km.
● Conversely, if there is an integer k such that a = b + km,
then km = a – b. Hence, m | a – b and a ≡ b (mod m).
The Relationship between (mod
m) and mod m Notations
● The use of “mod” in a ≡ b (mod m) and a mod m = b
are different.
● a ≡ b (mod m) is a relation on the set of integers.
● In a mod m = b, the notation mod denotes a function.
continued →
Arithmetic Modulo m
● Additive inverses: If a≠ 0 belongs to Zm , then m− a is the additive
inverse of a modulo m and 0 is its own additive inverse.
● a +m (m− a ) = 0 and 0 +m 0 = 0
● Distributivity: If a, b, and c belong to Zm , then
● a ·m (b +m c) = (a ·m b) +m (a ·m c) and
(a +m b) ·m c = (a ·m c) +m (b ·m c).
● Exercises 42-44 ask for proofs of these properties.
● Multiplicatative inverses have not been included since they do not always
exist. For example, there is no multiplicative inverse of 2 modulo 6.
● (optional) Using the terminology of abstract algebra, Zm with +m is a
commutative group and Zm with +m and ·m is a commutative ring.
Integer Representations
and Algorithms
Section 4.2
Section Summary
● Integer Representations
● Base b Expansions
● Binary Expansions
● Octal Expansions
● Hexadecimal Expansions
● This formula is valid since the integer on the right (of the equals sign)
divides both a and b. No larger integer can divide both a and b.
Example: 120 = 23 ·3 ·5 500 = 22 ·53
gcd(120,500) = 2min(3,2) ·3min(1,0) ·5min(1,3) = 22 ·30 ·51 = 20
● Finding the gcd of two positive integers using their prime
factorizations is not efficient because there is no efficient algorithm for
finding the prime factorization of a positive integer.
Least Common Multiple
Definition: The least common multiple of the positive integers a and b is the smallest positive integer that is divisible by both a and b. It is denoted by lcm(a,b).
● The least common multiple can also be computed from the prime factorizations.
● 91 = 14 · 6 + 7 Divide 91 by 14
Divide 14 by 7
● 14 = 7 · 2 + 0 Stopping
condition
● Eventually, a remainder of zero occurs in the sequence of terms: a = r0 > r1 > r2 > · · · ≥ 0.
The sequence can’t contain more than a terms.
● By Lemma 1
gcd(a,b) = gcd(r0,r1) = · · · = gcd(rn-1,rn) = gcd(rn , 0) = rn.
● Hence the greatest common divisor is the last nonzero remainder in the sequence of divisions.
Étienne Bézout
(1730-1783)
● The solutions to a linear congruence ax≡ b( mod m) are all integers x that
satisfy the congruence.
● Proof: We’ll show that a solution exists by describing a way to construct the
solution. Showing that the solution is unique modulo m is Exercise 30.
continued →
The Chinese Remainder Theorem
To construct a solution first let Mk=m/mk for k = 1,2,…,n and m = m1m2 · · · mn.
Since gcd(mk ,Mk ) = 1, by Theorem 1, there is an integer yk , an inverse of Mk modulo mk, such
that
Mk yk ≡ 1 ( mod mk ).
Form the sum
x = a1 M1 y1 + a2 M2 y2 + · · · + an Mn yn .
Note that because Mj ≡ 0 ( mod mk) whenever j ≠k , all terms except the kth term in this sum are
congruent to 0 modulo mk .
Because Mk yk ≡ 1 ( mod mk ), we see that x ≡ ak Mk yk ≡ ak( mod mk), for k = 1,2,…,n.
Hence, x is a simultaneous solution to the n congruences.
x ≡ a1 ( mod m1)
x ≡ a2 ( mod m2)
·
·
·
x ≡ an ( mod mn)
The Chinese Remainder Theorem
Example: Consider the 3 congruences from Sun-Tsu’s problem:
x ≡ 2 ( mod 3), x ≡ 3 ( mod 5), x ≡ 2 ( mod 7).
● Let m = 3· 5 · 7 = 105, M1 = m/3 = 35, M3 = m/5 = 21, M3
= m/7 = 15.
● We see that
● 2 is an inverse of M1 = 35 modulo 3 since 35 · 2 ≡ 2 · 2 ≡ 1 (mod 3)
● 1 is an inverse of M2 = 21 modulo 5 since 21 ≡ 1 (mod 5)
● 1 is an inverse of M3 = 15 modulo 7 since 15 ≡ 1 (mod 7)
● Hence,
x = a1M1y1 + a2M2y2 + a3M3y3
= 2 · 35 · 2 + 3 · 21 · 1 + 2 · 15 · 1 = 233 ≡ 23 (mod 105)
a. Suppose that the first 9 digits of the ISBN-10 are 007288008. What is the check digit?
b. Is 084930149X a valid ISBN10?
X is used
Solution:
a. X10 ≡ 1·0 + 2·0 + 3·7 + 4·2 + 5·8 + 6·8 + 7· 0 + 8·0 + 9·8 (mod 11). for the digit
X10 ≡ 0 + 0 + 21 + 8 + 40 + 48 + 0 + 0 + 72 (mod 11). 10.
X10 ≡ 189 ≡ 2 (mod 11). Hence, X10 = 2.
b. 1·0 + 2·8 + 3·4 + 4·9 + 5·3 + 6·0 + 7· 1 + 8·4 + 9·9 + 10·10 =
0 + 16 + 12 + 36 + 15 + 0 + 7 + 32 + 81 + 100 = 299 ≡ 2 ≢ 0 (mod 11)
Hence, 084930149X is not a valid ISBN-10.
● A single error is an error in one digit of an identification number and a transposition error is the accidental interchanging
of two digits. Both of these kinds of errors can be detected by the check digit for ISBN-10. (see text for more details)
Cryptography
Section 4.6
Section Summary
● Classical Cryptography
● Cryptosystems
● Public Key Cryptography
● RSA Cryptosystem
● Crytographic Protocols
● Primitive Roots and Discrete Logarithms
Caesar Cipher
Julius Caesar created secret messages by shifting each letter three letters forward in
the alphabet (sending the last three letters to the first three letters.) For example, the
letter B is replaced by E and the letter X is replaced by A. This process of making a
message secret is an example of encryption.
Here is how the encryption process works:
● Replace each letter by an integer from Z26, that is an integer from 0 to 25 representing one
less than its position in the alphabet.
● The encryption function is f(p) = (p + 3) mod 26. It replaces each integer p in the set {0,1,2,
…,25} by f(p) in the set {0,1,2,…,25} .
● Replace each integer p by the letter with the position p + 1 in the alphabet.
Example: Encrypt the message “MEET YOU IN THE PARK” using the Caesar cipher.
Solution: 12 4 4 19 24 14 20 8 13 19 7 4 15 0 17 10.
Now replace each of these numbers p by f(p) = (p + 3) mod 26.
15 7 7 22 1 17 23 11 16 22 10 7 18 3 20 13.
Translating the numbers back to letters produces the encrypted message
“PHHW BRX LQ WKH SDUN.”
Caesar Cipher
● To recover the original message, use f−1(p) = (p−3) mod 26. So,
each letter in the coded message is shifted back three letters in the
alphabet, with the first three letters sent to the last three letters.
This process of recovering the original message from the
encrypted message is called decryption.
● The Caesar cipher is one of a family of ciphers called shift
ciphers. Letters can be shifted by an integer k, with 3 being
just one possibility. The encryption function is
f(p) = (p + k) mod 26
and the decryption function is
f−1(p) = (p−k) mod 26
The integer k is called a key.
Shift Cipher
Example 1: Encrypt the message “STOP GLOBAL
WARMING” using the shift cipher with k = 11.
Solution: Replace each letter with the corresponding
element of Z26.
18 19 14 15 6 11 14 1 0 11 22 0 17 12 8 13 6.
Apply the shift f(p) = (p + 11) mod 26, yielding
3 4 25 0 17 22 25 12 11 22 7 11 2 23 19 24 17.
Translating the numbers back to letters produces the
ciphertext
“DEZA RWZMLW HLCXTYR.”
Shift Cipher
Example 2: Decrypt the message “LEWLYPLUJL PZ H
NYLHA ALHJOLY” that was encrypted using the shift
cipher with k = 7.
Solution: Replace each letter with the corresponding
element of Z26.
11 4 22 11 24 15 11 20 9 11 15 25 7 13 24 11 7 0 0 11 7 9 14 11 24.
Shift each of the numbers by −k = −7 modulo 26, yielding
4 23 15 4 17 8 4 13 2 4 8 18 0 6 17 4 0 19 19 4 0 2 7 4 17.
Translating the numbers back to letters produces the
decrypted message
“EXPERIENCE IS A GREAT TEACHER.”
Affine Ciphers
● Shift ciphers are a special case of affine ciphers which use functions of the form
f(p) = (ap + b) mod 26,
where a and b are integers, chosen so that f is a bijection.
The function is a bijection if and only if gcd(a,26) = 1.
● Example: What letter replaces the letter K when the function f(p) = (7p + 3)
mod 26 is used for encryption.
Solution: Since 10 represents K, f(10) = (7·10 + 3) mod 26 =21, which is then
replaced by V.
● To decrypt a message encrypted by a shift cipher, the congruence c ≡ ap + b
(mod 26) needs to be solved for p.
● Subtract b from both sides to obtain c− b ≡ ap (mod 26).
● Multiply both sides by the inverse of a modulo 26, which exists since gcd(a,26) = 1.
● ā(c− b) ≡ āap (mod 26), which simplifies to ā(c− b) ≡ p (mod 26).
● p ≡ ā(c− b) (mod 26) is used to determine p in Z26.
Cryptanalysis of Affine Ciphers
● The process of recovering plaintext from ciphertext without knowledge both of the
encryption method and the key is known as cryptanalysis or breaking codes.
● An important tool for cryptanalyzing ciphertext produced with a affine ciphers is the
relative frequencies of letters. The nine most common letters in the English texts are E
13%, T 9%, A 8%, O 8%, I 7%, N 7%, S 7%, H 6%, and R 6%.
● To analyze ciphertext:
● Find the frequency of the letters in the ciphertext.
● Hypothesize that the most frequent letter is produced by encrypting E.
● If the value of the shift from E to the most frequent letter is k, shift the ciphertext by −k
and see if it makes sense.
● If not, try T as a hypothesis and continue.
● Example: We intercepted the message “ZNK KGXRE HOXJ MKZY ZNK CUXS” that
we know was produced by a shift cipher. Let’s try to cryptanalyze.
● Solution: The most common letter in the ciphertext is K. So perhaps the letters were
shifted by 6 since this would then map E to K. Shifting the entire message by −6 gives us
“THE EARLY BIRD GETS THE WORM.”
Block Ciphers
● Ciphers that replace each letter of the alphabet by another letter are
called character or monoalphabetic ciphers.
● They are vulnerable to cryptanalysis based on letter frequency. Block
ciphers avoid this problem, by replacing blocks of letters with other
blocks of letters.
● A simple type of block cipher is called the transposition cipher. The key
is a permutation σ of the set {1,2,…,m}, where m is an integer, that is a
one-to-one function from {1,2,…,m} to itself.
● To encrypt a message, split the letters into blocks of size m, adding
additional letters to fill out the final block. We encrypt p1,p2,…,pm as
c1,c2,…,cm = pσ(1),pσ(2),…,pσ(m).
● To decrypt the c1,c2,…,cm transpose the letters using the inverse
permutation σ−1.
Block Ciphers
Example: Using the transposition cipher based on the
permutation σ of the set {1,2,3,4} with σ(1) = 3, σ(2) = 1, σ(3)
= 4, σ(4) = 2,
a. Encrypt the plaintext PIRATE ATTACK
b. Decrypt the ciphertext message SWUE TRAEOEHS, which was
encryted using the same cipher.
Solution:
a. Split into four blocks PIRA TEAT TACK.
Apply the permutation σ giving IAPR ETTA AKTC.
b. σ−1 : σ −1(1) = 2, σ −1(2) = 4, σ −1(3) = 1, σ −1(4) = 3.
Apply the permutation σ−1 giving USEW ATER HOSE.
Split into words to obtain USE WATER HOSE.
Cryptosystems
Definition: A cryptosystem is a five-tuple (P,C,K,E,D), where
● P is the set of plainntext strings,
● C is the set of ciphertext strings,
● K is the keyspace (set of all possible keys),
● E is the set of encription functions, and
● D is the set of decryption functions.
● K = Z26,
Leonard
Ronald Rivest Adi Shamir Adelman
(Born 1948) (Born 1952) (Born 1945)
Example: Encrypt the message STOP using the RSA cryptosystem with key(2537,13).
● 2537 = 43· 59,
● p = 43 and q = 59 are primes and gcd(e,(p−1)(q −1)) = gcd(13, 42· 58) = 1.
Solution: Translate the letters in STOP to their numerical equivalents 18 19 14 15.
● Divide into blocks of four digits (because 2525 < 2537 < 252525) to obtain 1819 1415.
● Encrypt each block using the mapping C = M13 mod 2537.
● Since 181913 mod 2537 = 2081 and 141513 mod 2537 = 2182, the encrypted message is 2081
2182.
RSA Decryption
● To decrypt a RSA ciphertext message, the decryption key d, an inverse of e
modulo (p−1)(q −1) is needed. The inverse exists since gcd(e,(p−1)(q −1)) =
gcd(13, 42· 58) = 1.
● With the decryption key d, we can decrypt each block with the computation M=
C mod p·q. (see text for full derivation)
d
● RSA works as a public key system since the only known method of finding d
is based on a factorization of n into primes. There is currently no known
feasible method for factoring large numbers into primes.
Example: The message 0981 0461 is received. What is the decrypted message
if it was encrypted using the RSA cipher from the previous example.
Solution: The message was encrypted with n = 43· 59 and exponent 13. An inverse
of 13 modulo 42· 58 = 2436 (exercise 2 in Section 4.4) is d = 937.
● To decrypt a block C, M = C937 mod 2537.
● Since 0981937 mod 2537 = 0704 and 0461937 mod 2537 = 1115, the decrypted message is
0704 1115. Translating back to English letters, the message is HELP.
Cryptographic Protocols: Key
Exchange
● Cryptographic protocols are exchanges of messages carried out by two or more parties to
achieve a particular security goal.
● Key exchange is a protocol by which two parties can exchange a secret key over an insecure
channel without having any past shared secret information. Here the Diffe-Hellman
key agreement protcol is described by example.
i. Suppose that Alice and Bob want to share a common key.
ii. Alice and Bob agree to use a prime p and a primitive root a of p.
iii. Alice chooses a secret integer k1 and sends ak1 mod p to Bob.
iv. Bob chooses a secret integer k2 and sends ak2 mod p to Alice.
v. Alice computes (ak2)k1 mod p.
vi. Bob computes (ak1)k2 mod p.
At the end of the protocol, Alice and Bob have their shared key
(ak2)k1 mod p = (ak1)k2 mod p.
● To find the secret information from the public information would require the adversary to
find k1 and k2 from ak1 mod p and ak2 mod p respectively. This is an instance of the
discrete logarithm problem, considered to be computationally infeasible when p and a are
sufficiently large.
Cryptographic Protocols: Digital
Signatures
Adding a digital signature to a message is a way of ensuring the recipient
that the message came from the purported sender.
● Suppose that Alice’s RSA public key is (n,e) and her private key is d.
Alice encrypts a plain text message x using E(n,e) (x)= xd mod n. She
decrypts a ciphertext message y using D(n,e) (y)= yd mod n.
● Alice wants to send a message M so that everyone who receives the
message knows that it came from her.
1. She translates the message to numerical equivalents and splits into
blocks, just as in RSA encryption.
2. She then applies her decryption function D(n,e) to the blocks and sends the
results to all intended recipients.
3. The recipients apply Alice’s encryption function and the result is the
original plain text since E(n,e) (D(n,e) (x))= x.
Everyone who receives the message can then be certain that it came
from Alice.
Cryptographic Protocols: Digital
Signatures
Example: Suppose Alice’s RSA cryptosystem is the same as in the earlier
example with key(2537,13), 2537 = 43· 59, p = 43 and q = 59 are primes and
gcd(e,(p−1)(q −1)) = gcd(13, 42· 58) = 1.
Her decryption key is d = 937.
She wants to send the message “MEET AT NOON” to her friends so that they
can be certain that the message is from her.
Solution: Alice translates the message into blocks of digits 1204 0419 0019 1314
1413.
1. She then applies her decryption transformation D(2537,13) (x)= x937 mod 2537 to each
block.
2. She finds (using her laptop, programming skills, and knowledge of discrete
mathematics) that 1204937 mod 2537 = 817, 419937 mod 2537 = 555 , 19937 mod 2537 =
1310, 1314937 mod 2537 = 2173, and 1413937 mod 2537 = 1026.
3. She sends 0817 0555 1310 2173 1026.
When one of her friends receive the message, they apply Alice’s encryption
transformation E(2537,13) to each block. They then obtain the original message
which they translate back to English letters.