IMPORTANCE OF NUMBER THEORY IN CRYPTOGRAPHY

Similar documents
Introduction to cryptography

Cryptosystems. Truong Tuan Anh CSE-HCMUT

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

An overview and Cryptographic Challenges of RSA Bhawana

Channel Coding and Cryptography Part II: Introduction to Cryptography

NUMB3RS Activity: Creating Codes. Episode: Backscatter

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Primes and Codes. Dr Bill Lionheart, Department of Mathematics, UMIST. October 4, 2001

Encryption Providing Perfect Secrecy COPYRIGHT 2001 NON-ELEPHANT ENCRYPTION SYSTEMS INC.

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Modern Cryptography Activity 1: Caesar Ciphers

Hardware Design and Software Simulation for Four Classical Cryptosystems

Chapter 9. Public Key Cryptography, RSA And Key Management

Some Stuff About Crypto

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

Enhanced Asymmetric Public Key Cryptography based on Diffie-Hellman and RSA Algorithm

A nice outline of the RSA algorithm and implementation can be found at:

A Tour of Classical and Modern Cryptography

CS669 Network Security

RSA. Public Key CryptoSystem

RSA (material drawn from Avi Kak Lecture 12, Lecture Notes on "Computer and Network Security" Used in asymmetric crypto.

CPSC 467b: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security

Topics. Number Theory Review. Public Key Cryptography

Cryptography: Matrices and Encryption

CRYPTOGRAPHY & DIGITAL SIGNATURE

Lecture 2 Applied Cryptography (Part 2)

CPSC 467b: Cryptography and Computer Security

Overview. Public Key Algorithms I

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

Cryptography Worksheet

Chapter 17: Information Science Lesson Plan

LECTURE 4: Cryptography

RSA (algorithm) History

Public Key Cryptography and the RSA Cryptosystem

CS Network Security. Nasir Memon Polytechnic University Module 7 Public Key Cryptography. RSA.

Elliptic Curve Cryptography

Lecture 6: Overview of Public-Key Cryptography and RSA

Public-key encipherment concept

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Lecture IV : Cryptography, Fundamentals

Cryptography. Cryptography is much more than. What is Cryptography, exactly? Why Cryptography? (cont d) Straight encoding and decoding

Chapter 3 Public Key Cryptography

What did we talk about last time? Public key cryptography A little number theory

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS

Public Key Algorithms

Lecture 6 - Cryptography

Secrets & Lies, Knowledge & Trust. (Modern Cryptography) COS 116 4/20/2006 Instructor: Sanjeev Arora

The Hill Cipher. In 1929 Lester Hill, a professor at Hunter College, published an article in the American

Computers and Security

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017

- 0 - CryptoLib: Cryptography in Software John B. Lacy 1 Donald P. Mitchell 2 William M. Schell 3 AT&T Bell Laboratories ABSTRACT

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Cryptography Introduction to Computer Security. Chapter 8

Side-Channel Attacks on RSA with CRT. Weakness of RSA Alexander Kozak Jared Vanderbeck

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

BLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

Cryptography Lesson Plan

Programming Techniques in Computer Algebra

ASYMMETRIC CRYPTOGRAPHY

A Proposed Method for Cryptography using Random Key and Rotation of Text

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

Elementary number theory

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

Network Security. Chapter 4 Public Key Cryptography. Public Key Cryptography (4) Public Key Cryptography

Science & Technology (DCRUST), Sonepat

LAB: Public-Key Encryption

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 158

PAijpam.eu SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL S EQUATION P. Muralikrishna 1, S. Srinivasan 2, N. Chandramowliswaran 3

Public Key Encryption. Modified by: Dr. Ramzi Saifan

CSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology

Cryptography. What is Cryptography?

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Lecture 1: Perfect Security

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Applied Cryptography and Network Security

10.1 Introduction 10.2 Asymmetric-Key Cryptography Asymmetric-Key Cryptography 10.3 RSA Cryptosystem

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

A Combined Encryption Compression Scheme Using Chaotic Maps

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security

Public-Key Cryptanalysis

RSA Cryptography in the Textbook and in the Field. Gregory Quenell

Uzzah and the Ark of the Covenant

Cryptography and Network Security. Sixth Edition by William Stallings

IS 2150 / TEL 2810 Information Security and Privacy

CPSC 467: Cryptography and Computer Security

Ref:

Project Report. Title: Finding and Implementing Auto Parallelization in RSA Encryption and Decryption Algorithm

Keywords Security, Cryptanalysis, RSA algorithm, Timing Attack

Introduction to Cryptology

CS 332 Computer Networks Security

Number Theory and RSA Public-Key Encryption

Computer Security 3/23/18

Transcription:

IMPORTANCE OF NUMBER THEORY IN CRYPTOGRAPHY Pawanveer Singh 1, Dr. Amanpreet Singh 2, Shelja Jhamb 3 1 Post Graduate Department of Mathematics, Lajpat Rai D. A. V. College Jagraon, (India) 2 Post Graduate Department of Mathematics, SGTB Khalsa College Anandpur Sahib Punjab, (India) 3 Research Scholar I.K.G Punjab Technical Universiy, Jalandhar (India) ABSTRACT Number Theory plays an important role in encryption algorithm. Cryptography is the practice of hiding information, converting some secret information to not readable texts. The paper aims to introduce the reader to applications of Number Theory in cryptography. We will briefly talk about an idea of encryption in Caesar ciphering and RSA public key cryptography. Many tools in Number Theory like primes, divisors, congruencies and Euler s function are used in cryptography for security. Keywords: Cryptography, Divisors, Euler ' ' function. I. INTRODUCTION For thousands of years people have searched for the way to send a message secretly. There is a story that, in ancient time, a king needed to send a secret message to his general in battle. The king took a servant, shaved his head and wrote the message on his head. He waited for the servant s hair to grow back and then sent the servant to the general. The general then shaved the servant s head and read the message. If the enemy had captured the servant, they presumably would not have known to shave his head and message would have been safe. Cryptography is the study of methods to send and receive the secret messages. In general we have a sender who is trying to send a message to receiver. There is also an adversary, who wants to steal the message. We are successful if sender is able to communicate a message to the receiver without adversary learning what the message was. We will use some important concepts of Number Theory and Cryptography which are given below: Important concepts in Number Theory Prime Numbers- A positive integer p is said to be a prime if it has only two factors namely 1 and p itself. For Example: Primes are 2, 3, 5, 7, 11, 13, 17 Divisors: A positive integer a written asa b. is said to divide an integer b if there exist an integer c such that b a. c and For Example 2 10 as 10 = 2.5 but 3 do not divide 10 as there does not exist any integer c such that 10 = 3. c Greatest Common Divisor: Let a andb be two positive integers then an integer d is called greatest common divisor of a and b if d a and d b i.e. d is common divisor of a andb. 117 P a g e

And if any integer c is such that divide d it is denoted by d ( a, b) For Example: 6 (24,30) c a and c b then c d i.e. any other common divisor of a and b will Two numbers a and b are said to relatively prime or co prime if their greatest common divisor is 1 i.e. ( a, b) 1 For Example: 10 and 11 are co prime Congruence: Let a and b be two integers and m is any positive integer then a is said to congruent to b modulo m if m divide difference of a and b i.e. m a b. It is denoted by a b(mod m) For Example: 27 13(mod 4) Euler s Function : An arithmetic function Euler s Toitent function is defined as n = number of positive integers less than or equal to n and co prime to n i.e. n = number of positive integers a such that 1 a n and g.c.d. a, n 1 For Example: 15 8 as primes relative to 15 are given by 1, 2, 4, 7, 8, 11, 13, and 14. And ( mn) ( m) ( n) where m and n are relatively prime. Some simple properties of congruence are given below: (1) a b(mod m) iff b a(mod m) (2) a b c(mod m) iff a c b(mod m) (3) a1 b1 (mod m) and a2 b2(mod m) then a1 a2 b1 b2 (mod m) (4) a b(mod m) and c is any integer then ca cb (mod m) (5) a mk a(mod m) where k is any integer Important concepts in Cryptography (1) Cryptography is the study of methods to send and receive secret message. (2) The sender wants to send a message to receiver. (3) The adversary wants to steal the message. (4) In private key cryptography, the sender and receiver agree in advance on a secret code, and then send message using that code. (5) In public key cryptography the encoding method can be published. Each person has a public key used to encrypt message and a secret key used to encrypt an encrypted message. (6) The original message is called the Plain text. (7) The encoded text is called Cipher text. (8) A Caesar cipher is one in which each letter of the alphabet is shifted by a fixed point. II. CAESAR CIPHER KEY CRYPTOGRAPHY One of the earliest cryptographic system was used by great Roman emperor Julius Caesar around 50 (B.C.). Caesar wrote to Marcus Cicero using a rudimentary substitution cipher in which each letter of the alphabet is 118 P a g e

replaced by letter that occurs three places down the alphabet. With the last three letters cycled back to the first three letters. Underneath the plain text letter the substitution alphabet for Caesar cipher is given by A B C D E F G H I J K L M N O P Q R S D E F G H I J K L M N O P Q R S T U V T U V W X Y Z W X Y Z A B C For Example: NUMBER THEORY IS EASY is transformed into QXPEHU WKHRUB LV HDVB With the help of congruence theory Caesar cipher can be easily described. Any plaintext is first expressed numerically by transforming the character of the text into digit by means of some correspondence such as A B C D E F G H I J K L M N O P Q R 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 S T U V W X Y Z 18 19 20 21 22 23 24 25 Now if P is the plain text and C is the cipher text then C P 3(mod 26) For Example: NUMBER THEORY IS EASY 1320121417 1974141724 818 401824 Using congruence C P 3(mod 26), for each alphabet and corresponding digit we get 1623154720 2210717201 1121 73211 QXPEHU WKHRUB LV HDVB To recover plain text this procedure is reversed by using C 3 P(mod 26) i.e. P C 3(mod 26). III. RSA PUBLIC KEY CRYPTOGRAPHY In 1977; R. Rivest, A. Shamir and L. Adelman proposed a public key system that includes only elementary ideas from Number Theory. Their enciphering system is called RSA. Public key cryptography overcomes the problems associated with using codebook. In a public key cryptosystem, the sender and receiver (often called Alice and Bob respectively) do not have to agree in advance on a secret code. In fact they each publish part of their code in public directory. Further an adversary with access to the encoded message and the public directory still cannot decode message. More precisely Alice and Bob will each have two keys a public key and a secret key In RSA cryptosystem Bob choose two prime numbers p and q (which in practice each nave at least hundred digits) and compute the number n p. q. He also chooses a number e 1which indeed not have large number of digits but is relative prime to p q 1 n 1, so that it has inverse with modulo 119 P a g e

p q 1 n 1 and compute called his public key. 1 d e with given modulo. Bob publish e and n. The number d is The encryption process begins with the conversion of message to be sent into an integer M by means of digit alphabet in which each letter, number or punctuation mark of the plaintext is replaced by two digit integer For Instance: A B C D E F G H I J K L M N O P Q 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 R S T U V W X Y Z,. Ɂ 0 1 2 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 3 4 5 6 7 8 9! 32 33 34 35 36 37 38 39 Here it is assumed M n, otherwise M is broken up into blocks of digits M 1, M2..., Ms of the approximate size. And each block is encrypted separately. The sender disguises the plaintext number M as a cipher text number r by raising e power to M and by taking modulus n i.e. M e r (mod n) At other end the authorized recipient decipher transmitted information by first determining the integer j, the secret recovery exponent for which e. j 1 mod n Raising the cipher text number to the j power and reducing it modulo n recovers the original plain text number M i. e. r j M (mod n) For Example: We select two primes p 59 and q 41 n and n 2419 59 41 58.40 2320 And 2419 59. 41 We may choose e 3 to be enciphering exponent where 3 and 2320 are co prime to each other j and j 1547 Then recovery exponent the unique integer j satisfying the congruence 3. 1 mod 2320 satisfy the given congruence The given message is GOLD MEDAL The plain text number is 061411031204030011 Since M n, so split M into blocks of three digit numbers i.e. 061 411 031 204 030 011 061 3 2014(mod 2419) 411 3 1231(mod 2419) 031 3 0763(mod 2419) 204 3 1393(mod 2419) 030 3 0391(mod 2419) 011 3 1331(mod 2419) The encrypting of the given message is 2014 1231 0763 1393 0391 1331 120 P a g e

IV. USES OF CRYPTOGRAPHY Cryptography has remained important over the centuries, used mainly for military and diplomatic communication with the advent of internet and electronic commerce. Cryptography has become vital for the functioning of the global economy. Sensitive information such as bank records, credit card reports, password or private is encrypted modified in such a way that hopefully, it is only understandable to people who should be allowed to have access to it, and undecipherable to others. Cryptography is also known practical means for protecting information transmitted through public communication networks, such as those using telephone lines, microwaves or satellites. V. CONCLUSION In this paper we perceive that every Number Theory tool plays an important role in cryptography to hide information. Many tools in Number Theory like primes, divisors, congruencies and Euler s function plays important role in cryptography for security purpose. The congruencies are used in Caesar ciphering key cryptography and also in RSA public key cryptography. This gives an idea of cryptosystem in the context of Algebra and Number Theory. REFERENCES [1] David, M. Burton, Elementary Number Theory, 2nd Edition, UBS Publishers. [2] G. H. Hardy, and E. M. Wright, An Introduction to the Theory of Numbers, 5th ed., Clarendon Press, 1979 [3] Gilles Brasssard, Modern Cryptography : A Tutorial, Lecture Notes in Computer Science, Vol.325, Springer-verlag,1988 [4] Niven, Zuckerman and Montgomery, An Introduction to the Theory of Numbers, 5th ed., New York: John Wiley and Sons,1991 [5] Neal Koblitz, A course in Number Theory and Cryptography, New York: Springer Verlag,1994 [6] R. Cramer and V. shoup, A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Cipher text Attack. In crypto 98, LNCS1716, pages13-25, Springer-Verlag, Berlin,1998 [7] Simon Singh, The codebook, Anchor Books, 1999. [8] T. M. Apostol, Introduction to Analytic Number Theory, Springer-Verlag (New York),1976 121 P a g e