rsa the chinese remainder theorem and remote coin flipping
play

RSA, the Chinese Remainder Theorem, and Remote Coin Flipping CS70 - PowerPoint PPT Presentation

RSA, the Chinese Remainder Theorem, and Remote Coin Flipping CS70 Summer 2016 - Lecture 7B David Dinh 02 August 2016 UC Berkeley Agenda RSA The Chinese remainder theorem Eulers Criterion Blums coin-flipping scheme Slides marked with


  1. p 2 is! OTP: Pros and Cons k sending them my CC number, why not just go to a store? need to walk into Amazon HQ to give them a secret key before • Needs a key to be shared before the transmission is done. If I Information leaked! k . Then NSA can easily figure out what p 1 and p 2 • Can’t reuse key twice without leaking info. Let’s say I send p 1 Why is OTP secure? blueprints for your next supervillain base... card numbers, maybe not so fine for a few TB of top-secret • Need a really long key. Same length as input! Fine for credit What’s wrong with OTP? For every possible plaintext p , there exists a key k such that I find out anything about the plaintext?No! Suppose I have the ciphertext c , but not the key or the plaintext. Can 4 c = p ⊕ k . Why? Just let k = c ⊕ p .

  2. OTP: Pros and Cons Why is OTP secure? sending them my CC number, why not just go to a store? need to walk into Amazon HQ to give them a secret key before • Needs a key to be shared before the transmission is done. If I Information leaked! blueprints for your next supervillain base... card numbers, maybe not so fine for a few TB of top-secret • Need a really long key. Same length as input! Fine for credit What’s wrong with OTP? For every possible plaintext p , there exists a key k such that I find out anything about the plaintext?No! Suppose I have the ciphertext c , but not the key or the plaintext. Can 4 c = p ⊕ k . Why? Just let k = c ⊕ p . • Can’t reuse key twice without leaking info. Let’s say I send p 1 ⊕ k and p 2 ⊕ k . Then NSA can easily figure out what p 1 ⊕ p 2 is!

  3. OTP: Pros and Cons Why is OTP secure? sending them my CC number, why not just go to a store? need to walk into Amazon HQ to give them a secret key before • Needs a key to be shared before the transmission is done. If I Information leaked! blueprints for your next supervillain base... card numbers, maybe not so fine for a few TB of top-secret • Need a really long key. Same length as input! Fine for credit What’s wrong with OTP? For every possible plaintext p , there exists a key k such that I find out anything about the plaintext?No! Suppose I have the ciphertext c , but not the key or the plaintext. Can 4 c = p ⊕ k . Why? Just let k = c ⊕ p . • Can’t reuse key twice without leaking info. Let’s say I send p 1 ⊕ k and p 2 ⊕ k . Then NSA can easily figure out what p 1 ⊕ p 2 is!

  4. Addressing OTP Shortcomings Long keys can be addressed with ”pseudorandom generators” that take short random strings and turn them into longer strings that ”look random”. Beyond the scope of this course (take CS276). Address the security concerns with public key crypto (now). Big idea: Amazon gives everyone a mathematical safe that they can put stuff into, but can’t unlock. 5

  5. Addressing OTP Shortcomings Long keys can be addressed with ”pseudorandom generators” that take short random strings and turn them into longer strings that ”look random”. Beyond the scope of this course (take CS276). Address the security concerns with public key crypto (now). Big idea: Amazon gives everyone a mathematical safe that they can put stuff into, but can’t unlock. 5

  6. Addressing OTP Shortcomings Long keys can be addressed with ”pseudorandom generators” that take short random strings and turn them into longer strings that ”look random”. Beyond the scope of this course (take CS276). Address the security concerns with public key crypto (now). Big idea: Amazon gives everyone a mathematical safe that they can put stuff into, but can’t unlock. 5

  7. Addressing OTP Shortcomings Long keys can be addressed with ”pseudorandom generators” that take short random strings and turn them into longer strings that ”look random”. Beyond the scope of this course (take CS276). Address the security concerns with public key crypto (now). Big idea: Amazon gives everyone a mathematical safe that they can put stuff into, but can’t unlock. 5

  8. mod x e N and sends it to mod c d N . We’ll show (next RSA Algorithm 1 . slide) this actually gives the plaintext x back. Decrypt: Amazon computes D c Amazon (over an open channel that NSA may be watching). E x computes the ciphertext c Encrypt: Given plaintext x (say, a credit card number), David of corporate HQ. pq and e on their website. Locks up d deep in the bowels Puts N 1 q Formally: Amazon broadcasts a public key that anyone can use to mod p 1 e (normally small, say, 3), and then computes d 1 1 q pq . It also chooses some e relatively prime to p N Key generation: Amazon picks two large primes, p and q , and lets key. they can use to decrypt data that’s been encrypted with the public encrypt data with. Amazon has (and keeps secret) a private key that 6

  9. mod x e N and sends it to mod c d N . We’ll show (next RSA Algorithm of corporate HQ. slide) this actually gives the plaintext x back. Decrypt: Amazon computes D c Amazon (over an open channel that NSA may be watching). E x computes the ciphertext c Encrypt: Given plaintext x (say, a credit card number), David pq and e on their website. Locks up d deep in the bowels Formally: Amazon broadcasts a public key that anyone can use to Puts N Key generation: Amazon picks two large primes, p and q , and lets key. they can use to decrypt data that’s been encrypted with the public encrypt data with. Amazon has (and keeps secret) a private key that 6 N = pq . It also chooses some e relatively prime to ( p − 1 )( q − 1 ) (normally small, say, 3), and then computes d = e − 1 mod ( p − 1 )( q − 1 ) .

  10. mod x e N and sends it to mod c d N . We’ll show (next RSA Algorithm Encrypt: Given plaintext x (say, a credit card number), David slide) this actually gives the plaintext x back. Decrypt: Amazon computes D c Amazon (over an open channel that NSA may be watching). E x computes the ciphertext c of corporate HQ. Formally: Amazon broadcasts a public key that anyone can use to Key generation: Amazon picks two large primes, p and q , and lets key. they can use to decrypt data that’s been encrypted with the public encrypt data with. Amazon has (and keeps secret) a private key that 6 N = pq . It also chooses some e relatively prime to ( p − 1 )( q − 1 ) (normally small, say, 3), and then computes d = e − 1 mod ( p − 1 )( q − 1 ) . Puts N = pq and e on their website. Locks up d deep in the bowels

  11. mod c d N . We’ll show (next RSA Algorithm Formally: Amazon broadcasts a public key that anyone can use to slide) this actually gives the plaintext x back. Decrypt: Amazon computes D c Amazon (over an open channel that NSA may be watching). Encrypt: Given plaintext x (say, a credit card number), David of corporate HQ. 6 Key generation: Amazon picks two large primes, p and q , and lets key. they can use to decrypt data that’s been encrypted with the public encrypt data with. Amazon has (and keeps secret) a private key that N = pq . It also chooses some e relatively prime to ( p − 1 )( q − 1 ) (normally small, say, 3), and then computes d = e − 1 mod ( p − 1 )( q − 1 ) . Puts N = pq and e on their website. Locks up d deep in the bowels computes the ciphertext c = E ( x ) = mod ( x e , N ) and sends it to

  12. RSA Algorithm Formally: Amazon broadcasts a public key that anyone can use to slide) this actually gives the plaintext x back. Amazon (over an open channel that NSA may be watching). Encrypt: Given plaintext x (say, a credit card number), David of corporate HQ. 6 Key generation: Amazon picks two large primes, p and q , and lets key. they can use to decrypt data that’s been encrypted with the public encrypt data with. Amazon has (and keeps secret) a private key that N = pq . It also chooses some e relatively prime to ( p − 1 )( q − 1 ) (normally small, say, 3), and then computes d = e − 1 mod ( p − 1 )( q − 1 ) . Puts N = pq and e on their website. Locks up d deep in the bowels computes the ciphertext c = E ( x ) = mod ( x e , N ) and sends it to Decrypt: Amazon computes D ( c ) = mod ( c d , N ) . We’ll show (next

  13. 1 . Correctness of RSA 1 1 1 , as desired. • Case 2: p doesn’t divide x . Then x k p 1 q 1 x p 1 k q Applying Fermat’s little theorem, x p 1 1 mod p . So x k p q 1 1 1 1 k q 1 1 0 mod p , so x x k p 1 q 1 1 must be a multiple of p . Argument for q is exactly the same. Therefore p x ed x . q x x k p Theorem: For the encryption/decryption protocol on the previous • Case 1: p divides x . Then obviously it also divides Proof: It suffices to show: p e d p mod n for all p 0 1 n 1 . Consider the exponent ed . We kow that ed 1 mod p 1 q 1 by definition, so ed 1 k p 1 q 1 for some integer k . Therefore, x ed 1 a multiple of both p and q . We will show it’s a multiple of p . Suffices to show that this expression is 0 mod N for all x , i.e. that it’s 1 1 q x x k p x x 1 q 1 k p x 1 7 slide, D ( E ( x )) = x ( mod N ) for all x ∈ { 0 , 1 , ... n − 1 } .

  14. 1 . Correctness of RSA q • Case 2: p doesn’t divide x . Then x k p 1 q 1 x p 1 k q Applying Fermat’s little theorem, x p 1 1 mod p . So x k p 1 1 1 1 1 k q 1 1 0 mod p , so x x k p 1 q 1 1 must be a multiple of p . Argument for q is exactly the same. Therefore p x ed x . 1 , as desired. q Theorem: For the encryption/decryption protocol on the previous 1 Consider the exponent ed . We kow that ed 1 mod p 1 q 1 by definition, so ed 1 k p 1 q 1 for some integer k . Therefore, x ed x x 1 k p 1 q 1 x x x k p 1 q 1 1 Suffices to show that this expression is 0 mod N for all x , i.e. that it’s a multiple of both p and q . We will show it’s a multiple of p . • Case 1: p divides x . Then obviously it also divides x x k p 7 slide, D ( E ( x )) = x ( mod N ) for all x ∈ { 0 , 1 , ... n − 1 } . Proof: It suffices to show: ( p e ) d = p ( mod n ) for all p ∈ { 0 , 1 , ... n − 1 } .

  15. 1 . Correctness of RSA 1 1 x p 1 k q Applying Fermat’s little theorem, x p 1 1 mod p . So x k p 1 q 1 1 1 k q 1 1 0 mod p , so x x k p 1 q 1 1 must be a multiple of p . Argument for q is exactly the same. Therefore p x ed x . q • Case 2: p doesn’t divide x . Then x k p Theorem: For the encryption/decryption protocol on the previous x x k p Therefore, x ed x x 1 k p 1 q 1 1 , as desired. x 1 q 1 1 Suffices to show that this expression is 0 mod N for all x , i.e. that it’s a multiple of both p and q . We will show it’s a multiple of p . • Case 1: p divides x . Then obviously it also divides x x k p 1 q 1 7 slide, D ( E ( x )) = x ( mod N ) for all x ∈ { 0 , 1 , ... n − 1 } . Proof: It suffices to show: ( p e ) d = p ( mod n ) for all p ∈ { 0 , 1 , ... n − 1 } . Consider the exponent ed . We kow that ed ≡ 1 mod ( p − 1 )( q − 1 ) by definition, so ed = 1 + k ( p − 1 )( q − 1 ) for some integer k .

  16. 1 . 1 1 mod p . So x k p 1 q 1 1 1 k q Correctness of RSA 1 0 mod p , so x x k p 1 q 1 1 must be a multiple of p . Argument for q is exactly the same. Therefore p x ed x . 1 Applying Fermat’s little theorem, x p Theorem: For the encryption/decryption protocol on the previous q Suffices to show that this expression is 0 mod N for all x , i.e. that it’s a multiple of both p and q . We will show it’s a multiple of p . • Case 1: p divides x . Then obviously it also divides x x k p 1 k q 1 1 1 , as desired. • Case 2: p doesn’t divide x . Then x k p 1 q 1 x p 7 slide, D ( E ( x )) = x ( mod N ) for all x ∈ { 0 , 1 , ... n − 1 } . Proof: It suffices to show: ( p e ) d = p ( mod n ) for all p ∈ { 0 , 1 , ... n − 1 } . Consider the exponent ed . We kow that ed ≡ 1 mod ( p − 1 )( q − 1 ) by definition, so ed = 1 + k ( p − 1 )( q − 1 ) for some integer k . Therefore, x ed − x = x 1 + k ( p − 1 )( q − 1 ) − x = x ( x k ( p − 1 )( q − 1 ) − 1 ) .

  17. 1 . 1 1 mod p . So x k p 1 q 1 1 1 k q Correctness of RSA 1 0 mod p , so x x k p 1 q 1 1 must be a multiple of p . Argument for q is exactly the same. Therefore p x ed x . 1 Applying Fermat’s little theorem, x p Theorem: For the encryption/decryption protocol on the previous q Suffices to show that this expression is 0 mod N for all x , i.e. that it’s a multiple of both p and q . We will show it’s a multiple of p . • Case 1: p divides x . Then obviously it also divides x x k p 1 k q 1 1 1 , as desired. • Case 2: p doesn’t divide x . Then x k p 1 q 1 x p 7 slide, D ( E ( x )) = x ( mod N ) for all x ∈ { 0 , 1 , ... n − 1 } . Proof: It suffices to show: ( p e ) d = p ( mod n ) for all p ∈ { 0 , 1 , ... n − 1 } . Consider the exponent ed . We kow that ed ≡ 1 mod ( p − 1 )( q − 1 ) by definition, so ed = 1 + k ( p − 1 )( q − 1 ) for some integer k . Therefore, x ed − x = x 1 + k ( p − 1 )( q − 1 ) − x = x ( x k ( p − 1 )( q − 1 ) − 1 ) .

  18. Correctness of RSA Suffices to show that this expression is 0 mod N for all x , i.e. that it’s must be a multiple of p . • Case 1: p divides x . Then obviously it also divides Theorem: For the encryption/decryption protocol on the previous a multiple of both p and q . We will show it’s a multiple of p . 7 slide, D ( E ( x )) = x ( mod N ) for all x ∈ { 0 , 1 , ... n − 1 } . Proof: It suffices to show: ( p e ) d = p ( mod n ) for all p ∈ { 0 , 1 , ... n − 1 } . Consider the exponent ed . We kow that ed ≡ 1 mod ( p − 1 )( q − 1 ) by definition, so ed = 1 + k ( p − 1 )( q − 1 ) for some integer k . Therefore, x ed − x = x 1 + k ( p − 1 )( q − 1 ) − x = x ( x k ( p − 1 )( q − 1 ) − 1 ) . x ( x k ( p − 1 )( q − 1 ) − 1 ) , as desired. • Case 2: p doesn’t divide x . Then x k ( p − 1 )( q − 1 ) = ( x p − 1 ) k ( q − 1 ) . Applying Fermat’s little theorem, x p − 1 ≡ 1 ( mod p ) . So x k ( p − 1 )( q − 1 ) − 1 ≡ 1 k ( q − 1 ) − 1 ≡ 0 ( mod p ) , so x ( x k ( p − 1 )( q − 1 ) − 1 ) Argument for q is exactly the same. Therefore p | ( x ed − x ) .

  19. On the Security of RSA Why is RSA secure? Even without the private key, we have enough information to decrypt anything we see (we could just take the public key, encrypt every possible string representable as a number under N , and see which one matches the ciphertext). The security RSA, like all almost all encryption schemes, relies on hardness assumptions . We need to assume something is hard in order to show that decrypting something, or even getting some information about the plaintext, even with full information , is hard. 8

  20. On the Security of RSA Why is RSA secure? Even without the private key, we have enough information to decrypt anything we see (we could just take the public key, encrypt every possible string representable as a number under N , and see which one matches the ciphertext). The security RSA, like all almost all encryption schemes, relies on hardness assumptions . We need to assume something is hard in order to show that decrypting something, or even getting some information about the plaintext, even with full information , is hard. 8

  21. Pr A E 1 k PK 1 k PK E 1 k PK m 1 Pr A E 1 k PK 1 k PK E 1 k PK m 0 Message Indistinguishability* attack”. plaintexts. “Message indistinguishability under chosen plaintext that can distinguish between the ciphertexts for two different access to the public key) that runs in a reasonable amount of time Intuitively? There is no algorithm (even if we allow the algorithm is “negligible” in k . 1 k k 1 How do we formalize this notion of ”hard to get information about Formally: public key, the probability that A returns 1 given the public key and time (”PPT”) algorithm A that knows the length of the strings and the Quasi-formally: under some hardness assumptions, this must hold the plaintext”? 9 for all pairs of strings m ( 1 ) , m ( 0 ) : for any probabilistically polynomial the encryption of m ( 1 ) must be ”extremely close” to the probability that it returns 1 on m ( 0 ) .

  22. Message Indistinguishability* How do we formalize this notion of ”hard to get information about attack”. “Message indistinguishability under chosen plaintext plaintexts. that can distinguish between the ciphertexts for two different access to the public key) that runs in a reasonable amount of time Intuitively? There is no algorithm (even if we allow the algorithm is “negligible” in k . 9 time (”PPT”) algorithm A that knows the length of the strings and the public key, the probability that A returns 1 given the public key and Quasi-formally: under some hardness assumptions, this must hold the plaintext”? for all pairs of strings m ( 1 ) , m ( 0 ) : for any probabilistically polynomial the encryption of m ( 1 ) must be ”extremely close” to the probability that it returns 1 on m ( 0 ) . Formally: � � � Pr [ A E ( 1 k , PK ) ( 1 k , PK , E ( 1 k , PK , m ( 1 ) k ) = 1 ] − Pr [ A E ( 1 k , PK ) ( 1 k , PK , E ( 1 k , PK , m ( 0 ) k ) = 1 ] � � �

  23. Message Indistinguishability* How do we formalize this notion of ”hard to get information about attack”. plaintexts. “Message indistinguishability under chosen plaintext that can distinguish between the ciphertexts for two different access to the public key) that runs in a reasonable amount of time Intuitively? There is no algorithm (even if we allow the algorithm is “negligible” in k . 9 time (”PPT”) algorithm A that knows the length of the strings and the public key, the probability that A returns 1 given the public key and Quasi-formally: under some hardness assumptions, this must hold the plaintext”? for all pairs of strings m ( 1 ) , m ( 0 ) : for any probabilistically polynomial the encryption of m ( 1 ) must be ”extremely close” to the probability that it returns 1 on m ( 0 ) . Formally: � � � Pr [ A E ( 1 k , PK ) ( 1 k , PK , E ( 1 k , PK , m ( 1 ) k ) = 1 ] − Pr [ A E ( 1 k , PK ) ( 1 k , PK , E ( 1 k , PK , m ( 0 ) k ) = 1 ] � � �

  24. many values of x - 2 x . Can’t do this efficiently. Hardness Assumptions 1 . Reduces to factoring. Why? integers. Security of breaking RSA requires on hardness of factoring large q and pq are. Trivial to solve for p and q from here. what p 1, you now know q p pq 1 1 q If you compute p 1 q What hardness assumptions are we making for RSA? • Direct computation of p efficiently. Factoring large numbers is considered impossible to do would allow NSA to compute d the same way Amazon did. • Factoring: Try determining d by factoring N into p and q , which • Brute force: try encrypting every possible string x . There are too How would the NSA guess x ? determining x .” mod N , there is on efficient algorithm for x e “Given N , e , c 10

  25. many values of x - 2 x . Can’t do this efficiently. Hardness Assumptions If you compute p integers. Security of breaking RSA requires on hardness of factoring large q and pq are. Trivial to solve for p and q from here. what p 1, you now know q p pq 1 1 q 1 . Reduces to factoring. Why? What hardness assumptions are we making for RSA? 1 q • Direct computation of p efficiently. Factoring large numbers is considered impossible to do would allow NSA to compute d the same way Amazon did. • Factoring: Try determining d by factoring N into p and q , which • Brute force: try encrypting every possible string x . There are too How would the NSA guess x ? determining x .” 10 “Given N , e , c = x e ( mod N ) , there is on efficient algorithm for

  26. Hardness Assumptions If you compute p integers. Security of breaking RSA requires on hardness of factoring large q and pq are. Trivial to solve for p and q from here. what p 1, you now know q p pq 1 1 q 1 . Reduces to factoring. Why? What hardness assumptions are we making for RSA? 1 q • Direct computation of p efficiently. Factoring large numbers is considered impossible to do would allow NSA to compute d the same way Amazon did. • Factoring: Try determining d by factoring N into p and q , which • Brute force: try encrypting every possible string x . There are too How would the NSA guess x ? determining x .” 10 “Given N , e , c = x e ( mod N ) , there is on efficient algorithm for many values of x - 2 | x | . Can’t do this efficiently.

  27. Hardness Assumptions If you compute p integers. Security of breaking RSA requires on hardness of factoring large q and pq are. Trivial to solve for p and q from here. what p 1, you now know q p pq 1 1 q 1 . Reduces to factoring. Why? What hardness assumptions are we making for RSA? 1 q • Direct computation of p efficiently. Factoring large numbers is considered impossible to do would allow NSA to compute d the same way Amazon did. • Factoring: Try determining d by factoring N into p and q , which • Brute force: try encrypting every possible string x . There are too How would the NSA guess x ? determining x .” 10 “Given N , e , c = x e ( mod N ) , there is on efficient algorithm for many values of x - 2 | x | . Can’t do this efficiently.

  28. Hardness Assumptions What hardness assumptions are we making for RSA? integers. Security of breaking RSA requires on hardness of factoring large efficiently. Factoring large numbers is considered impossible to do would allow NSA to compute d the same way Amazon did. • Factoring: Try determining d by factoring N into p and q , which • Brute force: try encrypting every possible string x . There are too How would the NSA guess x ? determining x .” 10 “Given N , e , c = x e ( mod N ) , there is on efficient algorithm for many values of x - 2 | x | . Can’t do this efficiently. • Direct computation of ( p − 1 )( q − 1 ) . Reduces to factoring. Why? If you compute ( p − 1 )( q − 1 ) = pq − p − q + 1, you now know what p + q and pq are. Trivial to solve for p and q from here.

  29. Hardness Assumptions What hardness assumptions are we making for RSA? integers. Security of breaking RSA requires on hardness of factoring large efficiently. Factoring large numbers is considered impossible to do would allow NSA to compute d the same way Amazon did. • Factoring: Try determining d by factoring N into p and q , which • Brute force: try encrypting every possible string x . There are too How would the NSA guess x ? determining x .” 10 “Given N , e , c = x e ( mod N ) , there is on efficient algorithm for many values of x - 2 | x | . Can’t do this efficiently. • Direct computation of ( p − 1 )( q − 1 ) . Reduces to factoring. Why? If you compute ( p − 1 )( q − 1 ) = pq − p − q + 1, you now know what p + q and pq are. Trivial to solve for p and q from here.

  30. Prime-Finding RSA also relies on the ability to find large primes p and q . How do we do that? Prime number theorem: Let x denote the number of prime numbers less than or equal to x . Then as x goes to infinity, x converges to x ln x . Proof: Many of them, but all of them require math far beyond the scope of this course. Main takeaway: primes aren’t too uncommon. If we select a few hundred 512-bit numbers, there will probably be a prime among them. Problem: how do we figure out if something’s a prime? 11

  31. Prime-Finding RSA also relies on the ability to find large primes p and q . How do we do that? Proof: Many of them, but all of them require math far beyond the scope of this course. Main takeaway: primes aren’t too uncommon. If we select a few hundred 512-bit numbers, there will probably be a prime among them. Problem: how do we figure out if something’s a prime? 11 Prime number theorem: Let π ( x ) denote the number of prime numbers less than or equal to x . Then as x goes to infinity, π ( x ) converges to x / ln x .

  32. Prime-Finding RSA also relies on the ability to find large primes p and q . How do we do that? Proof: Many of them, but all of them require math far beyond the scope of this course. Main takeaway: primes aren’t too uncommon. If we select a few hundred 512-bit numbers, there will probably be a prime among them. Problem: how do we figure out if something’s a prime? 11 Prime number theorem: Let π ( x ) denote the number of prime numbers less than or equal to x . Then as x goes to infinity, π ( x ) converges to x / ln x .

  33. Prime-Finding RSA also relies on the ability to find large primes p and q . How do we do that? Proof: Many of them, but all of them require math far beyond the scope of this course. Main takeaway: primes aren’t too uncommon. If we select a few hundred 512-bit numbers, there will probably be a prime among them. Problem: how do we figure out if something’s a prime? 11 Prime number theorem: Let π ( x ) denote the number of prime numbers less than or equal to x . Then as x goes to infinity, π ( x ) converges to x / ln x .

  34. b l are a Fermat liar. Then A Simple Primality Test k 1 a k 1 b k 1 i a k 1 1 1 mod k So we have a list of l Fermat witnesses. If we pick random a and k is composite: probability that we say “prime” is a k 1 1 mod k is at least 1 2. Pick n random numbers to reduce false prime reporting rate to 1 2 n . ab i Let’s say a is a Fermat witness and b 1 12 mod k What if we see that a k 1 1 mod k ? Then k can’t be prime! a k 1 1 Suppose k is composite. Call a such that a k witness for each Fermat liar. Why? 1 1 mod k “Fermat witnesses” and a such that a k 1 1 mod k “Fermat liars”. Suppose we have one Fermat witness. There must be at least one Fermat Recall Fermat’s little theorem: if p is prime and 1 ≤ a ≤ p , then a p − 1 ≡ 1 ( mod p ) .

  35. b l are a Fermat liar. Then 1 1 a k 1 b k 1 i a k 1 1 mod k ab i So we have a list of l Fermat witnesses. If we pick random a and k is composite: probability that we say “prime” is a k 1 1 mod k is at least 1 2. Pick n random numbers to reduce false prime reporting rate to 1 2 n . k A Simple Primality Test 12 Let’s say a is a Fermat witness and b 1 Then k can’t be prime! a k 1 1 mod k Suppose k is composite. Call a such that a k 1 1 mod k “Fermat witnesses” and a such that a k 1 1 mod k “Fermat liars”. Suppose we have one Fermat witness. There must be at least one Fermat witness for each Fermat liar. Why? Recall Fermat’s little theorem: if p is prime and 1 ≤ a ≤ p , then a p − 1 ≡ 1 ( mod p ) . What if we see that a k − 1 ̸≡ 1 ( mod k ) ?

  36. b l are a Fermat liar. Then 1 1 a k 1 b k 1 i a k 1 1 mod k ab i So we have a list of l Fermat witnesses. If we pick random a and k is composite: probability that we say “prime” is a k 1 1 mod k is at least 1 2. Pick n random numbers to reduce false prime reporting rate to 1 2 n . k A Simple Primality Test 12 Let’s say a is a Fermat witness and b 1 a k 1 1 mod k Suppose k is composite. Call a such that a k 1 1 mod k “Fermat witnesses” and a such that a k 1 1 mod k “Fermat liars”. Suppose we have one Fermat witness. There must be at least one Fermat witness for each Fermat liar. Why? Recall Fermat’s little theorem: if p is prime and 1 ≤ a ≤ p , then a p − 1 ≡ 1 ( mod p ) . What if we see that a k − 1 ̸≡ 1 ( mod k ) ? Then k can’t be prime!

  37. b l are a Fermat liar. Then A Simple Primality Test 1 to reduce false prime reporting rate to 1 2 n . mod k is at least 1 2. Pick n random numbers 1 1 “prime” is a k If we pick random a and k is composite: probability that we say So we have a list of l Fermat witnesses. mod k 1 1 1 a k i a k 1 b k 1 k ab i Let’s say a is a Fermat witness and b 1 witness for each Fermat liar. Why? we have one Fermat witness. There must be at least one Fermat Suppose 12 Recall Fermat’s little theorem: if p is prime and 1 ≤ a ≤ p , then a p − 1 ≡ 1 ( mod p ) . What if we see that a k − 1 ̸≡ 1 ( mod k ) ? Then k can’t be prime! a k − 1 ̸≡ 1 ( mod k ) Suppose k is composite. Call a such that a k − 1 ̸≡ 1 ( mod k ) “Fermat witnesses” and a such that a k − 1 ≡ 1 ( mod k ) “Fermat liars”.

  38. b l are a Fermat liar. Then A Simple Primality Test 1 to reduce false prime reporting rate to 1 2 n . mod k is at least 1 2. Pick n random numbers 1 1 “prime” is a k If we pick random a and k is composite: probability that we say So we have a list of l Fermat witnesses. mod k 1 1 1 a k i 1 b k a k 1 k ab i Let’s say a is a Fermat witness and b 1 witness for each Fermat liar. Why? we have one Fermat witness. There must be at least one Fermat 12 Recall Fermat’s little theorem: if p is prime and 1 ≤ a ≤ p , then a p − 1 ≡ 1 ( mod p ) . What if we see that a k − 1 ̸≡ 1 ( mod k ) ? Then k can’t be prime! a k − 1 ̸≡ 1 ( mod k ) Suppose k is composite. Call a such that a k − 1 ̸≡ 1 ( mod k ) “Fermat witnesses” and a such that a k − 1 ≡ 1 ( mod k ) “Fermat liars”. Suppose

  39. A Simple Primality Test So we have a list of l Fermat witnesses. to reduce false prime reporting rate to 1 2 n . mod k is at least 1 2. Pick n random numbers 1 1 “prime” is a k If we pick random a and k is composite: probability that we say i we have one Fermat witness. There must be at least one Fermat witness for each Fermat liar. Why? 12 Recall Fermat’s little theorem: if p is prime and 1 ≤ a ≤ p , then a p − 1 ≡ 1 ( mod p ) . What if we see that a k − 1 ̸≡ 1 ( mod k ) ? Then k can’t be prime! a k − 1 ̸≡ 1 ( mod k ) Suppose k is composite. Call a such that a k − 1 ̸≡ 1 ( mod k ) “Fermat witnesses” and a such that a k − 1 ≡ 1 ( mod k ) “Fermat liars”. Suppose Let’s say a is a Fermat witness and b 1 , ..., b l are a Fermat liar. Then ( ab i ) k − 1 ≡ a k − 1 b k − 1 ≡ a k − 1 1 ̸≡ 1 ( mod k ) .

  40. A Simple Primality Test witness for each Fermat liar. Why? to reduce false prime reporting rate to 1 2 n . Pick n random numbers If we pick random a and k is composite: probability that we say So we have a list of l Fermat witnesses. i 12 we have one Fermat witness. There must be at least one Fermat Recall Fermat’s little theorem: if p is prime and 1 ≤ a ≤ p , then a p − 1 ≡ 1 ( mod p ) . What if we see that a k − 1 ̸≡ 1 ( mod k ) ? Then k can’t be prime! a k − 1 ̸≡ 1 ( mod k ) Suppose k is composite. Call a such that a k − 1 ̸≡ 1 ( mod k ) “Fermat witnesses” and a such that a k − 1 ≡ 1 ( mod k ) “Fermat liars”. Suppose Let’s say a is a Fermat witness and b 1 , ..., b l are a Fermat liar. Then ( ab i ) k − 1 ≡ a k − 1 b k − 1 ≡ a k − 1 1 ̸≡ 1 ( mod k ) . “prime” is a k − 1 ̸≡ 1 ( mod k ) is at least 1 / 2.

  41. A Simple Primality Test we have one Fermat witness. There must be at least one Fermat If we pick random a and k is composite: probability that we say So we have a list of l Fermat witnesses. i witness for each Fermat liar. Why? 12 Recall Fermat’s little theorem: if p is prime and 1 ≤ a ≤ p , then a p − 1 ≡ 1 ( mod p ) . What if we see that a k − 1 ̸≡ 1 ( mod k ) ? Then k can’t be prime! a k − 1 ̸≡ 1 ( mod k ) Suppose k is composite. Call a such that a k − 1 ̸≡ 1 ( mod k ) “Fermat witnesses” and a such that a k − 1 ≡ 1 ( mod k ) “Fermat liars”. Suppose Let’s say a is a Fermat witness and b 1 , ..., b l are a Fermat liar. Then ( ab i ) k − 1 ≡ a k − 1 b k − 1 ≡ a k − 1 1 ̸≡ 1 ( mod k ) . “prime” is a k − 1 ̸≡ 1 ( mod k ) is at least 1 / 2. Pick n random numbers to reduce false prime reporting rate to 1 / 2 n .

  42. Carmichael Numbers What if we can’t assume that there is a Fermat ? Carmichael numbers! Composites where all a for which gcd a k 1 are Fermat liars. Carmichael numbers are a good deal rarer than primes but can still be a problem. There are better primality tests that extend Fermat’s to deal with Carmichael numbers: Miller-Rabin, Bailie-PSW, Solovay-Strassen. Often Fermat’s primality test is used to filter out obvious non-primes before one of these other (slower) tests is used. 13

  43. Carmichael Numbers What if we can’t assume that there is a Fermat ? Carmichael liars. Carmichael numbers are a good deal rarer than primes but can still be a problem. There are better primality tests that extend Fermat’s to deal with Carmichael numbers: Miller-Rabin, Bailie-PSW, Solovay-Strassen. Often Fermat’s primality test is used to filter out obvious non-primes before one of these other (slower) tests is used. 13 numbers! Composites where all a for which gcd ( a , k ) = 1 are Fermat

  44. Carmichael Numbers What if we can’t assume that there is a Fermat ? Carmichael liars. Carmichael numbers are a good deal rarer than primes but can still be a problem. There are better primality tests that extend Fermat’s to deal with Carmichael numbers: Miller-Rabin, Bailie-PSW, Solovay-Strassen. Often Fermat’s primality test is used to filter out obvious non-primes before one of these other (slower) tests is used. 13 numbers! Composites where all a for which gcd ( a , k ) = 1 are Fermat

  45. Carmichael Numbers What if we can’t assume that there is a Fermat ? Carmichael liars. Carmichael numbers are a good deal rarer than primes but can still be a problem. There are better primality tests that extend Fermat’s to deal with Carmichael numbers: Miller-Rabin, Bailie-PSW, Solovay-Strassen. Often Fermat’s primality test is used to filter out obvious non-primes before one of these other (slower) tests is used. 13 numbers! Composites where all a for which gcd ( a , k ) = 1 are Fermat

  46. Aside: Derandomization and Complexity* Can you find big primes without randomness? Yes! AKS primality test [Agrawal–Kayal–Saxena ’02]: you can find primes “efficiently” (roughly # of bits to the sixth power) without using randomness. Fundamental question in computer science: how much additional computational power does randomness give you? Can you do things with randomness efficiently that you can’t without randomness? Major open problem! There are problems that we know how to solve with randomness, but we don’t know how to solve deterministically. 14

  47. Aside: Derandomization and Complexity* Can you find big primes without randomness? Yes! AKS primality test [Agrawal–Kayal–Saxena ’02]: you can find primes “efficiently” (roughly # of bits to the sixth power) without using randomness. Fundamental question in computer science: how much additional computational power does randomness give you? Can you do things with randomness efficiently that you can’t without randomness? Major open problem! There are problems that we know how to solve with randomness, but we don’t know how to solve deterministically. 14

  48. Aside: Derandomization and Complexity* Can you find big primes without randomness? Yes! AKS primality test [Agrawal–Kayal–Saxena ’02]: you can find primes “efficiently” (roughly # of bits to the sixth power) without using randomness. Fundamental question in computer science: how much additional computational power does randomness give you? Can you do things with randomness efficiently that you can’t without randomness? Major open problem! There are problems that we know how to solve with randomness, but we don’t know how to solve deterministically. 14

  49. Aside: Derandomization and Complexity* Can you find big primes without randomness? Yes! AKS primality test [Agrawal–Kayal–Saxena ’02]: you can find primes “efficiently” (roughly # of bits to the sixth power) without using randomness. Fundamental question in computer science: how much additional computational power does randomness give you? Can you do things with randomness efficiently that you can’t without randomness? Major open problem! There are problems that we know how to solve with randomness, but we don’t know how to solve deterministically. 14

  50. The Chinese Remainder Theorem, Euler’s Criterion, and an Application to Flipping Coins

  51. Simultaneous Congruences c mod mn ; this is a unique solution to the equations mod mn . nk m c mnk , i.e. x mc a nk m c a So x nk . c integer k such that t mod n . So there exists determine t uniquely mod n . Let’s say t 15 a Proof: To satisfy the first equation: we must have x a mt for some integer t . To satisfy the second equation we must have x mt 1, m has a multiplicative inverse mod n , so we can b mod n , or mt b a mod n . Since gcd m n Theorem: Suppose gcd ( m , n ) = 1. Then the two equations x ≡ a ( mod m ) and x ≡ b ( mod n ) have a unique solution mod mn .

  52. Simultaneous Congruences mod n . So there exists mod mn ; this is a unique solution to the equations mod mn . nk m c mnk , i.e. x mc a nk m c a So x nk . c integer k such that t c determine t uniquely mod n . Let’s say t 1, m has a multiplicative inverse mod n , so we can Since gcd m n mod n . a b mod n , or mt b mt a To satisfy the second equation we must have x some integer t . 15 Theorem: Suppose gcd ( m , n ) = 1. Then the two equations x ≡ a ( mod m ) and x ≡ b ( mod n ) have a unique solution mod mn . Proof: To satisfy the first equation: we must have x = a + mt for

  53. Simultaneous Congruences nk . mod mn ; this is a unique solution to the equations mod mn . nk m c mnk , i.e. x mc a nk m c a So x c integer k such that t mod n . So there exists c determine t uniquely mod n . Let’s say t 1, m has a multiplicative inverse mod n , so we can Since gcd m n some integer t . 15 Theorem: Suppose gcd ( m , n ) = 1. Then the two equations x ≡ a ( mod m ) and x ≡ b ( mod n ) have a unique solution mod mn . Proof: To satisfy the first equation: we must have x = a + mt for To satisfy the second equation we must have x ≡ a + mt ≡ b ( mod n ) , or mt ≡ b − a ( mod n ) .

  54. Simultaneous Congruences a mod mn ; this is a unique solution to the equations mod mn . nk m c mnk , i.e. x mc a nk m c So x some integer t . 15 Theorem: Suppose gcd ( m , n ) = 1. Then the two equations x ≡ a ( mod m ) and x ≡ b ( mod n ) have a unique solution mod mn . Proof: To satisfy the first equation: we must have x = a + mt for To satisfy the second equation we must have x ≡ a + mt ≡ b ( mod n ) , or mt ≡ b − a ( mod n ) . Since gcd ( m , n ) = 1, m has a multiplicative inverse mod n , so we can determine t uniquely mod n . Let’s say t ≡ c ( mod n ) . So there exists integer k such that t = c + nk .

  55. Simultaneous Congruences some integer t . 15 Theorem: Suppose gcd ( m , n ) = 1. Then the two equations x ≡ a ( mod m ) and x ≡ b ( mod n ) have a unique solution mod mn . Proof: To satisfy the first equation: we must have x = a + mt for To satisfy the second equation we must have x ≡ a + mt ≡ b ( mod n ) , or mt ≡ b − a ( mod n ) . Since gcd ( m , n ) = 1, m has a multiplicative inverse mod n , so we can determine t uniquely mod n . Let’s say t ≡ c ( mod n ) . So there exists integer k such that t = c + nk . So x = a + m ( c + nk ) = ( a + mc ) + mnk , i.e. x ≡ m ( c + nk ) ( mod mn ) ; this is a unique solution to the equations mod mn .

  56. m k . 1 is relatively prime to each of m k m k Chinese Remainder Theorem m k , i.e. 1 . theorem, there is a unique solution mod m 1 m 2 m k . So by the previous m k , it is relatively prime to m 1 m 2 m 1 Add the last equation back. Since m k mod m 1 m 2 t x inductive hypothesis) have a unique solution mod m 1 m 2 We can generalize this to multiple primes! 1st equation. We have k equations, which (by Remove the k 1 equavions. equations. We wish to show that it holds for k Now suppose for induction that the theorem holds for up to k page. 2. This is just the theorem on the previous For the base case, let k Proof: by induction on k . 16 Chinese Remainder Theorem: Let m 1 , ..., m k be relatively prime numbers. Then the k equations x ≡ a 1 ( mod m 1 ) , ..., x ≡ a k ( mod m k ) have a unique solution mod m 1 m 2 ... m k .

  57. m k . 1 is relatively prime to each of m k m k Chinese Remainder Theorem m k , i.e. 1 . theorem, there is a unique solution mod m 1 m 2 m k . So by the previous m k , it is relatively prime to m 1 m 2 m 1 Add the last equation back. Since m k mod m 1 m 2 t x inductive hypothesis) have a unique solution mod m 1 m 2 We can generalize this to multiple primes! 1st equation. We have k equations, which (by Remove the k 1 equavions. equations. We wish to show that it holds for k Now suppose for induction that the theorem holds for up to k page. 2. This is just the theorem on the previous For the base case, let k by induction on k . Proof: 16 Chinese Remainder Theorem: Let m 1 , ..., m k be relatively prime numbers. Then the k equations x ≡ a 1 ( mod m 1 ) , ..., x ≡ a k ( mod m k ) have a unique solution mod m 1 m 2 ... m k .

  58. m k . 1 is relatively prime to each of m k m k Chinese Remainder Theorem m k , i.e. 1 . theorem, there is a unique solution mod m 1 m 2 m k . So by the previous m k , it is relatively prime to m 1 m 2 m 1 Add the last equation back. Since m k mod m 1 m 2 t x inductive hypothesis) have a unique solution mod m 1 m 2 We can generalize this to multiple primes! 1st equation. We have k equations, which (by Remove the k 1 equavions. equations. We wish to show that it holds for k Now suppose for induction that the theorem holds for up to k page. 2. This is just the theorem on the previous For the base case, let k Proof: by induction on k . 16 Chinese Remainder Theorem: Let m 1 , ..., m k be relatively prime numbers. Then the k equations x ≡ a 1 ( mod m 1 ) , ..., x ≡ a k ( mod m k ) have a unique solution mod m 1 m 2 ... m k .

  59. m k . 1 is relatively prime to each of m k m k Chinese Remainder Theorem x 1 . theorem, there is a unique solution mod m 1 m 2 m k . So by the previous m k , it is relatively prime to m 1 m 2 m 1 Add the last equation back. Since m k mod m 1 m 2 t m k , i.e. We can generalize this to multiple primes! inductive hypothesis) have a unique solution mod m 1 m 2 1st equation. We have k equations, which (by Remove the k 1 equavions. equations. We wish to show that it holds for k Now suppose for induction that the theorem holds for up to k page. Proof: by induction on k . 16 Chinese Remainder Theorem: Let m 1 , ..., m k be relatively prime numbers. Then the k equations x ≡ a 1 ( mod m 1 ) , ..., x ≡ a k ( mod m k ) have a unique solution mod m 1 m 2 ... m k . For the base case, let k = 2. This is just the theorem on the previous

  60. m k . 1 is relatively prime to each of m k m k Chinese Remainder Theorem x 1 . theorem, there is a unique solution mod m 1 m 2 m k . So by the previous m k , it is relatively prime to m 1 m 2 m 1 Add the last equation back. Since m k mod m 1 m 2 t m k , i.e. We can generalize this to multiple primes! inductive hypothesis) have a unique solution mod m 1 m 2 1st equation. We have k equations, which (by Remove the k Now suppose for induction that the theorem holds for up to k page. Proof: by induction on k . 16 Chinese Remainder Theorem: Let m 1 , ..., m k be relatively prime numbers. Then the k equations x ≡ a 1 ( mod m 1 ) , ..., x ≡ a k ( mod m k ) have a unique solution mod m 1 m 2 ... m k . For the base case, let k = 2. This is just the theorem on the previous equations. We wish to show that it holds for k + 1 equavions.

  61. 1 is relatively prime to each of m k m k Chinese Remainder Theorem We can generalize this to multiple primes! 1 . theorem, there is a unique solution mod m 1 m 2 m k . So by the previous m k , it is relatively prime to m 1 m 2 m 1 Add the last equation back. Since m k 16 Now suppose for induction that the theorem holds for up to k page. Proof: by induction on k . Chinese Remainder Theorem: Let m 1 , ..., m k be relatively prime numbers. Then the k equations x ≡ a 1 ( mod m 1 ) , ..., x ≡ a k ( mod m k ) have a unique solution mod m 1 m 2 ... m k . For the base case, let k = 2. This is just the theorem on the previous equations. We wish to show that it holds for k + 1 equavions. Remove the k + 1st equation. We have k equations, which (by inductive hypothesis) have a unique solution mod m 1 m 2 ... m k , i.e. x = t ( mod m 1 m 2 ... m k ) .

  62. Chinese Remainder Theorem Proof: by induction on k . We can generalize this to multiple primes! page. Now suppose for induction that the theorem holds for up to k 16 Chinese Remainder Theorem: Let m 1 , ..., m k be relatively prime numbers. Then the k equations x ≡ a 1 ( mod m 1 ) , ..., x ≡ a k ( mod m k ) have a unique solution mod m 1 m 2 ... m k . For the base case, let k = 2. This is just the theorem on the previous equations. We wish to show that it holds for k + 1 equavions. Remove the k + 1st equation. We have k equations, which (by inductive hypothesis) have a unique solution mod m 1 m 2 ... m k , i.e. x = t ( mod m 1 m 2 ... m k ) . Add the last equation back. Since m k + 1 is relatively prime to each of m 1 , ..., m k , it is relatively prime to m 1 m 2 ... m k . So by the previous theorem, there is a unique solution mod ( m 1 m 2 ... m k ) m k + 1 .

  63. Euler’s Criterion 17

  64. Flipping Coins Remotely Suppose Alex and David want flip a coin, but they’re a country apart. Alex bets on heads and David bets on tails. How do they flip a coin fairly? Problem: suppose neither side trusts the other to be honest. David: “I flipped a coin and got tails.” Alex: “You’re just saying that because you want tails.” How do you do this in a way that doesn’t require trust on both sides? Number theory to the rescue! 18

  65. Flipping Coins Remotely Suppose Alex and David want flip a coin, but they’re a country apart. Alex bets on heads and David bets on tails. How do they flip a coin fairly? Problem: suppose neither side trusts the other to be honest. David: “I flipped a coin and got tails.” Alex: “You’re just saying that because you want tails.” How do you do this in a way that doesn’t require trust on both sides? Number theory to the rescue! 18

  66. Flipping Coins Remotely Suppose Alex and David want flip a coin, but they’re a country apart. Alex bets on heads and David bets on tails. How do they flip a coin fairly? Problem: suppose neither side trusts the other to be honest. David: “I flipped a coin and got tails.” Alex: “You’re just saying that because you want tails.” How do you do this in a way that doesn’t require trust on both sides? Number theory to the rescue! 18

  67. Flipping Coins Remotely Suppose Alex and David want flip a coin, but they’re a country apart. Alex bets on heads and David bets on tails. How do they flip a coin fairly? Problem: suppose neither side trusts the other to be honest. David: “I flipped a coin and got tails.” Alex: “You’re just saying that because you want tails.” How do you do this in a way that doesn’t require trust on both sides? Number theory to the rescue! 18

  68. a p a p a p a p a p Square Roots in Modular Arithmetic mod p are given by x 1 4 mod p . Why? 1 4 2 1 fact, if the solutions to x 2 2 1 2 a 1 a a mod p . a mod 4 , then we can find square roots easily. In Theorem (Euler’s Criterion): Suppose p is an odd prime and a is 3 otherwise. Proof: If direction: 1 2 x 2 p 1 2 x p 1 1 mod p by Fermat’s little theorem. Only if direction: more complicated, but we won’t use (or prove) it here. Notice that if a 19 some integer relatively prime to p . Then a ( p − 1 ) / 2 is 1 if and only if there exists some integer x such that a ≡ x 2 ( mod p ) and − 1

  69. a p a p a p a p a 1 a 2 a 1 1 2 1 mod p 4 2 1 . mod p . Why? 4 Square Roots in Modular Arithmetic Theorem (Euler’s Criterion): Suppose p is an odd prime and a is here. otherwise. Proof: If direction: by Fermat’s little theorem. mod p are given by x Only if direction: more complicated, but we won’t use (or prove) it Notice that if a 3 mod 4 , then we can find square roots easily. In fact, if the solutions to x 2 a 19 some integer relatively prime to p . Then a ( p − 1 ) / 2 is 1 if and only if there exists some integer x such that a ≡ x 2 ( mod p ) and − 1 a ( p − 1 ) / 2 = ( x 2 ) ( p − 1 ) / 2 = x p − 1 ≡ 1 ( mod p )

  70. a p a p a p a p a 1 a 2 a 1 4 2 1 mod p 4 2 1 . mod p . Why? Square Roots in Modular Arithmetic 1 Theorem (Euler’s Criterion): Suppose p is an odd prime and a is mod p are given by x a fact, if the solutions to x 2 In here. Only if direction: more complicated, but we won’t use (or prove) it by Fermat’s little theorem. Proof: If direction: otherwise. 19 some integer relatively prime to p . Then a ( p − 1 ) / 2 is 1 if and only if there exists some integer x such that a ≡ x 2 ( mod p ) and − 1 a ( p − 1 ) / 2 = ( x 2 ) ( p − 1 ) / 2 = x p − 1 ≡ 1 ( mod p ) Notice that if a ≡ 3 ( mod 4 ) , then we can find square roots easily.

  71. Square Roots in Modular Arithmetic by Fermat’s little theorem. . here. Theorem (Euler’s Criterion): Suppose p is an odd prime and a is Only if direction: more complicated, but we won’t use (or prove) it Proof: If direction: otherwise. 19 some integer relatively prime to p . Then a ( p − 1 ) / 2 is 1 if and only if there exists some integer x such that a ≡ x 2 ( mod p ) and − 1 a ( p − 1 ) / 2 = ( x 2 ) ( p − 1 ) / 2 = x p − 1 ≡ 1 ( mod p ) Notice that if a ≡ 3 ( mod 4 ) , then we can find square roots easily. In fact, if the solutions to x 2 ≡ a ( mod p ) are given by x ≡ ± a ( p + 1 ) / 4 ( mod p ) . Why? ( ± a ( p + 1 ) / 4 ) 2 ≡ a ( p + 1 ) / 2 ≡ a ( p − 1 ) / 2 a ≡ 1 a ≡ a ( mod p )

  72. Square roots mod pq Four square roots mod pq ! “Blum integers”. mod 4 are called Products of distinct primes both congruent to 3 mod 4 . to 3 compute square roots of numbers mod pq where p q are congruent mod 4 with trick here gives us an easy way to congruent to 3 Combine sqare root formula on previous slide for single prime remainder theorem. One unique solution to each set of equations by the Chinese Four sets of equations (choose a sign for the p , and the q .) mod q . x 2 x mod p ; the second gives us x 1 The first congruence gives us x 20 Suppose x 2 ≡ a ( mod pq ) . Then we must have x 2 ≡ a ( mod p ) and x 2 ≡ a ( mod q ) .

  73. Square roots mod pq congruent to 3 “Blum integers”. mod 4 are called Products of distinct primes both congruent to 3 mod 4 . to 3 compute square roots of numbers mod pq where p q are congruent mod 4 with trick here gives us an easy way to Combine sqare root formula on previous slide for single prime Four square roots mod pq ! remainder theorem. One unique solution to each set of equations by the Chinese Four sets of equations (choose a sign for the p , and the q .) 20 Suppose x 2 ≡ a ( mod pq ) . Then we must have x 2 ≡ a ( mod p ) and x 2 ≡ a ( mod q ) . The first congruence gives us x ≡ ± x 1 ( mod p ) ; the second gives us x ≡ ± x 2 ( mod q ) .

  74. Square roots mod pq congruent to 3 “Blum integers”. mod 4 are called Products of distinct primes both congruent to 3 mod 4 . to 3 compute square roots of numbers mod pq where p q are congruent mod 4 with trick here gives us an easy way to Combine sqare root formula on previous slide for single prime Four square roots mod pq ! remainder theorem. One unique solution to each set of equations by the Chinese Four sets of equations (choose a sign for the p , and the q .) 20 Suppose x 2 ≡ a ( mod pq ) . Then we must have x 2 ≡ a ( mod p ) and x 2 ≡ a ( mod q ) . The first congruence gives us x ≡ ± x 1 ( mod p ) ; the second gives us x ≡ ± x 2 ( mod q ) .

  75. Square roots mod pq congruent to 3 “Blum integers”. mod 4 are called Products of distinct primes both congruent to 3 mod 4 . to 3 compute square roots of numbers mod pq where p q are congruent mod 4 with trick here gives us an easy way to Combine sqare root formula on previous slide for single prime Four square roots mod pq ! remainder theorem. One unique solution to each set of equations by the Chinese Four sets of equations (choose a sign for the p , and the q .) 20 Suppose x 2 ≡ a ( mod pq ) . Then we must have x 2 ≡ a ( mod p ) and x 2 ≡ a ( mod q ) . The first congruence gives us x ≡ ± x 1 ( mod p ) ; the second gives us x ≡ ± x 2 ( mod q ) .

  76. Square roots mod pq congruent to 3 “Blum integers”. mod 4 are called Products of distinct primes both congruent to 3 mod 4 . to 3 compute square roots of numbers mod pq where p q are congruent mod 4 with trick here gives us an easy way to Combine sqare root formula on previous slide for single prime Four square roots mod pq ! remainder theorem. One unique solution to each set of equations by the Chinese Four sets of equations (choose a sign for the p , and the q .) 20 Suppose x 2 ≡ a ( mod pq ) . Then we must have x 2 ≡ a ( mod p ) and x 2 ≡ a ( mod q ) . The first congruence gives us x ≡ ± x 1 ( mod p ) ; the second gives us x ≡ ± x 2 ( mod q ) .

  77. Square roots mod pq Four sets of equations (choose a sign for the p , and the q .) One unique solution to each set of equations by the Chinese remainder theorem. Four square roots mod pq ! Combine sqare root formula on previous slide for single prime “Blum integers”. 20 Suppose x 2 ≡ a ( mod pq ) . Then we must have x 2 ≡ a ( mod p ) and x 2 ≡ a ( mod q ) . The first congruence gives us x ≡ ± x 1 ( mod p ) ; the second gives us x ≡ ± x 2 ( mod q ) . congruent to 3 ( mod 4 ) with trick here gives us an easy way to compute square roots of numbers mod pq where p , q are congruent to 3 ( mod 4 ) . Products of distinct primes both congruent to 3 ( mod 4 ) are called

  78. Blum’s Coin-Flipping Scheme Here’s how to flip a coin over the telephone [Blum-’82]: 2. David chooses x 0 n relatively prime to n and sends a x 2 mod n to Alex. 3. Alex, armed with knowledge of p , q , computes the square roots x y of a , mod n , and sends one to David. 4. If David got x , then he says Bob guessed correctly. Otherwise, if he gets y , he can factor n and use that to prove that he won. 21 1. Alex chooses distinct primes p , q congruent to 3 ( mod 4 ) , and computes n = pq . He sends n (but not p and q ) to David.

  79. Blum’s Coin-Flipping Scheme Here’s how to flip a coin over the telephone [Blum-’82]: 3. Alex, armed with knowledge of p , q , computes the square roots x y of a , mod n , and sends one to David. 4. If David got x , then he says Bob guessed correctly. Otherwise, if he gets y , he can factor n and use that to prove that he won. 21 1. Alex chooses distinct primes p , q congruent to 3 ( mod 4 ) , and computes n = pq . He sends n (but not p and q ) to David. 2. David chooses x ∈ ( 0 , n ) relatively prime to n and sends a = x 2 ( mod n ) to Alex.

  80. Blum’s Coin-Flipping Scheme Here’s how to flip a coin over the telephone [Blum-’82]: 3. Alex, armed with knowledge of p , q , computes the square roots 4. If David got x , then he says Bob guessed correctly. Otherwise, if he gets y , he can factor n and use that to prove that he won. 21 1. Alex chooses distinct primes p , q congruent to 3 ( mod 4 ) , and computes n = pq . He sends n (but not p and q ) to David. 2. David chooses x ∈ ( 0 , n ) relatively prime to n and sends a = x 2 ( mod n ) to Alex. ± x , ± y of a , mod n , and sends one to David.

  81. Blum’s Coin-Flipping Scheme Here’s how to flip a coin over the telephone [Blum-’82]: 3. Alex, armed with knowledge of p , q , computes the square roots 21 1. Alex chooses distinct primes p , q congruent to 3 ( mod 4 ) , and computes n = pq . He sends n (but not p and q ) to David. 2. David chooses x ∈ ( 0 , n ) relatively prime to n and sends a = x 2 ( mod n ) to Alex. ± x , ± y of a , mod n , and sends one to David. 4. If David got ± x , then he says Bob guessed correctly. Otherwise, if he gets ± y , he can factor n and use that to prove that he won.

  82. Blum’s Coin-Flipping Scheme: Analysis y n and gcd x integers and check that they’re primes. David asks Alex for the factors p q to make sure they’re Blum After the game is over each side can verify the other’s honesty: than brute force (which is hard). x : he’s learned nothing, so he can’t factor p any better If David got y and run EGCD twice! y x x y 2 x 2 two prime factors. All David has to do is compute y n provide the y but not both. So gcd x x y or y , so each prime divides either x y x distinct), pq x mod n (with x y y 2 a Now he can use this to factor n : since x 2 mod n . y : he now has two different square roots of a If David got of picking x . 22 Alex has no idea whether David chose x or y , so he has a 1 / 2 chance

  83. Blum’s Coin-Flipping Scheme: Analysis of picking x . two prime factors. All David has to do is compute If David got x : he’s learned nothing, so he can’t factor p any better than brute force (which is hard). After the game is over each side can verify the other’s honesty: David asks Alex for the factors p q to make sure they’re Blum integers and check that they’re primes. 22 Alex has no idea whether David chose x or y , so he has a 1 / 2 chance If David got ± y : he now has two different square roots of a ( mod n ) . Now he can use this to factor n : since x 2 ≡ a ≡ y 2 ( mod n ) (with x , y distinct), pq | ( x + y )( x − y ) , so each prime divides either ( x + y ) or ( x − y ) but not both. So gcd ( x + y , n ) and gcd ( x − y , n ) provide the x 2 − y 2 = ( x + y )( x − y ) and run EGCD twice!

  84. Blum’s Coin-Flipping Scheme: Analysis of picking x . two prime factors. All David has to do is compute than brute force (which is hard). After the game is over each side can verify the other’s honesty: David asks Alex for the factors p q to make sure they’re Blum integers and check that they’re primes. 22 Alex has no idea whether David chose x or y , so he has a 1 / 2 chance If David got ± y : he now has two different square roots of a ( mod n ) . Now he can use this to factor n : since x 2 ≡ a ≡ y 2 ( mod n ) (with x , y distinct), pq | ( x + y )( x − y ) , so each prime divides either ( x + y ) or ( x − y ) but not both. So gcd ( x + y , n ) and gcd ( x − y , n ) provide the x 2 − y 2 = ( x + y )( x − y ) and run EGCD twice! If David got ± x : he’s learned nothing, so he can’t factor p any better

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend