Algorithms for Public Key Cryptography
c Eli Biham - May 3, 2005 408 Algorithms for Public Key Cryptography (15)
Algorithms for Public Key Cryptography Eli Biham - May 3, 2005 c - - PowerPoint PPT Presentation
Algorithms for Public Key Cryptography Eli Biham - May 3, 2005 c 408 Algorithms for Public Key Cryptography (15) Computing Square Roots Modulo a Prime We have already seen how to compute square roots modulo primes of the form p = 4 k + 3:
c Eli Biham - May 3, 2005 408 Algorithms for Public Key Cryptography (15)
p+1 4 ≡ αk+1
p+1 2 ≡ αα p−1 2 ≡ α1 ≡ α
p+1 4 ≡ 33 ≡ 27 ≡ 5
c Eli Biham - May 3, 2005 409 Algorithms for Public Key Cryptography (15)
−1
≡ (−1)(p−1)/2 ≡ (−1)(4k+1−1)/2 ≡
c Eli Biham - May 3, 2005 410 Algorithms for Public Key Cryptography (15)
−a
= −1
· a
= 1 · a
= a
.
c Eli Biham - May 3, 2005 411 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 412 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 413 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 414 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 415 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 416 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 417 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 418 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 419 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 420 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 421 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 422 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 423 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 424 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 425 Algorithms for Public Key Cryptography (15)
coRP.
c Eli Biham - May 3, 2005 426 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 427 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 428 Algorithms for Public Key Cryptography (15)
a
c Eli Biham - May 3, 2005 429 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 430 Algorithms for Public Key Cryptography (15)
a
c Eli Biham - May 3, 2005 431 Algorithms for Public Key Cryptography (15)
a
b
c Eli Biham - May 3, 2005 432 Algorithms for Public Key Cryptography (15)
b
= b
b
b
b
. . . b
b
b
= 1.
c Eli Biham - May 3, 2005 433 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 434 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 435 Algorithms for Public Key Cryptography (15)
b
= b
b
b
. . . b
= (−1) · 1 · 1 . . . · 1 = −1
c Eli Biham - May 3, 2005 436 Algorithms for Public Key Cryptography (15)
b
c Eli Biham - May 3, 2005 437 Algorithms for Public Key Cryptography (15)
wi
ui
c Eli Biham - May 3, 2005 438 Algorithms for Public Key Cryptography (15)
ui
b
wi
wi
b
c Eli Biham - May 3, 2005 439 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 440 Algorithms for Public Key Cryptography (15)
c Eli Biham - May 3, 2005 441 Algorithms for Public Key Cryptography (15)