Number Theory & Cryptography Chapter 4

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the quotient when 101 is divided by 11?

  • 10
  • 11
  • 9 (correct)
  • 8

The remainder when 101 is divided by 11 is 3.

False (B)

Define the term 'divisor' in the context of the division algorithm.

The divisor is the positive integer by which the dividend is divided.

The notation used to express that two integers are congruent modulo m is _____ (use the correct symbol).

<p>≡</p> Signup and view all the answers

If a = 24 and b = 14, is 24 ≢ 14 (mod 6)?

<p>Yes (D)</p> Signup and view all the answers

What does the term 'congruence relation' mean?

<p>A congruence relation means that two integers give the same remainder when divided by a positive integer.</p> Signup and view all the answers

Match the following terms with their definitions:

<p>a = Integer being divided b = Positive integer that divides r = Remainder after division q = Quotient after division</p> Signup and view all the answers

In the equation a = dq + r, _____ refers to the integer being divided.

<p>a</p> Signup and view all the answers

Which property states that if a and b belong to Zm, then a +m b = b +m a?

<p>Commutativity (C)</p> Signup and view all the answers

The additive inverse of a in Zm is always zero.

<p>False (B)</p> Signup and view all the answers

What is the identity element for addition in Zm?

<p>0</p> Signup and view all the answers

In Zm, if a belongs to Zm, then a +m 0 = _____ .

<p>a</p> Signup and view all the answers

Match the following concepts with their definitions:

<p>Associativity = Grouping does not affect sum or product Identity elements = Elements that do not change other elements when operated Additive Inverses = Elements that sum to the identity element for addition Distributivity = The operation distributes over addition or multiplication</p> Signup and view all the answers

Which of the following describes a collision in hashing functions?

<p>When multiple records are assigned the same memory location (C)</p> Signup and view all the answers

What is a common hashing function mentioned in the content?

<p>h(k) = k mod m</p> Signup and view all the answers

A hashing function that is onto means all memory locations are possible.

<p>True (A)</p> Signup and view all the answers

What is the check digit for the UPC that starts with 79357343104?

<p>2 (D)</p> Signup and view all the answers

The UPC 041331021641 is a valid UPC.

<p>False (B)</p> Signup and view all the answers

What is the tenth digit in an ISBN-10 used for?

<p>Check digit</p> Signup and view all the answers

Julius Caesar created secret messages using the __________ cipher.

<p>Caesar</p> Signup and view all the answers

In the calculation for the UPC check digit, the equation given reduces to which congruence?

<p>$x_{12} ≡ 2 (mod 10)$ (A)</p> Signup and view all the answers

The congruence used in the ISBN-10 ensures that a single error cannot be detected.

<p>False (B)</p> Signup and view all the answers

What is the check digit for the ISBN-10 with the first 9 digits being 007288008?

<p>2</p> Signup and view all the answers

Match the following terms with their definitions:

<p>Check Digit = A digit used to verify the correctness of a number Caesar Cipher = An encryption method that shifts letters UPC = A universal product code used for identification ISBN-10 = A standard number used to identify books</p> Signup and view all the answers

If $a ≡ b$ (mod $m$) and $c ≡ d$ (mod $m$), what can you infer about $a + c$ and $b + d$?

<p>$a + c ≡ b + d$ (mod $m$) (B)</p> Signup and view all the answers

The statement 'If $a ≡ b$ (mod $m$), then $c + a ≡ c + b$ (mod $m$) for any integer $c$' is true.

<p>True (A)</p> Signup and view all the answers

Provide an example that illustrates the failure of division in congruences.

<p>14 ≡ 8 (mod 6), but dividing by 2 gives 7 and 4, and 7 ≢ 4 (mod 6).</p> Signup and view all the answers

The operation $a +_m b$ is defined as $(a + b) mod m$, which is called ___ modulo m.

<p>addition</p> Signup and view all the answers

Match the following operations with their corresponding modulo operations:

<p>Addition = a +_m b = (a + b) mod m Multiplication = a ∙_m b = (a ∙ b) mod m Sum mod = (a + b) mod m = ((a mod m) + (b mod m)) mod m Product mod = ab mod m = ((a mod m) (b mod m)) mod m</p> Signup and view all the answers

The congruence $14 ≡ 8$ (mod $6$) allows for division by $2$ to create a valid congruence.

<p>False (B)</p> Signup and view all the answers

If $a ≡ b$ (mod $m$), then multiplying both sides by $c$ results in $c imes a ≡ ___$ (mod $m$).

<p>c × b</p> Signup and view all the answers

What is the primary function used to encrypt a message in the RSA cryptosystem?

<p>C = M^e mod n (C)</p> Signup and view all the answers

The value of n in the RSA system is the product of two prime numbers.

<p>True (A)</p> Signup and view all the answers

What is the decrypted message if the ciphertext received is 0981 0461 using the RSA method mentioned?

<p>HELP</p> Signup and view all the answers

In the RSA encryption process, the decryption key is the inverse of _____ modulo (p−1)(q−1).

<p>e</p> Signup and view all the answers

Match the following components of the RSA encryption process:

<p>p = One of the prime factors of n q = The second prime factor of n e = The public exponent d = The private key</p> Signup and view all the answers

What is the purpose of the Diffe-Hellman key agreement protocol?

<p>To share a secret key over an insecure channel (D)</p> Signup and view all the answers

Alice and Bob can share a key without any prior shared secret information using the Diffe-Hellman protocol.

<p>True (A)</p> Signup and view all the answers

What values do Alice and Bob agree on in the Diffe-Hellman key agreement protocol?

<p>A prime p and a primitive root a of p</p> Signup and view all the answers

What cryptographic problem must an adversary solve to find k1 and k2 from ak1 mod p and ak2 mod p?

<p>Discrete logarithm problem (C)</p> Signup and view all the answers

Adding a digital signature to a message ensures that the message could have come from anyone.

<p>False (B)</p> Signup and view all the answers

What is the purpose of Alice applying her decryption function to the blocks of the message?

<p>To create a digital signature for the message.</p> Signup and view all the answers

Alice's RSA public key is denoted as (n, e), while her private key is denoted as _____.

<p>d</p> Signup and view all the answers

Match the following elements of RSA to their descriptions:

<p>n = The product of two primes used in the key e = Public exponent for encryption d = Private exponent for decryption m = Original message before encryption</p> Signup and view all the answers

What is the result of applying Alice’s encryption function E(n,e) to her digital signature?

<p>The original plain text message (C)</p> Signup and view all the answers

The values p and q in Alice's RSA key can be any two numbers.

<p>False (B)</p> Signup and view all the answers

What are the values of p and q in Alice's RSA system?

<p>43 and 59</p> Signup and view all the answers

Flashcards

Congruence (mod m)

If a and b have the same remainder when divided by m, we say a is congruent to b modulo m, written as a ≡ b (mod m).

a ≡ b (mod m) & c ≡ d (mod m)

If two numbers are congruent to each other modulo m, their sum and product are also congruent to each other's sum and product modulo m.

Modulo m Addition

The addition operation modulo m, written as '+' or '+m', takes two integers, adds them together, and returns the remainder when the result is divided by m.

Modulo m Multiplication

The multiplication operation modulo m, written as '∙m', takes two integers, multiplied them together, and returns the remainder when the result is divided by m.

Signup and view all the flashcards

Zm

The set of non-negative integers from 0 up to m-1

Signup and view all the flashcards

Arithmetic Modulo m

Performing addition and multiplication using the modulo m operations (+m and ∙m).

Signup and view all the flashcards

Preserving Congruence

Multiplying both sides of a congruence by an integer or adding an integer to both sides of a congruence preserves the congruence.

Signup and view all the flashcards

Division Algorithm

If 'a' is an integer and 'd' is a positive integer, then there exist unique integers 'q' and 'r' such that 0 ≤ r < d and a = dq + r.

Signup and view all the flashcards

Dividend

The integer being divided in the division algorithm.

Signup and view all the flashcards

Divisor

The positive integer by which the dividend is being divided in the division algorithm.

Signup and view all the flashcards

Quotient

The integer 'q' in the division algorithm (a = dq + r).

Signup and view all the flashcards

Remainder

The integer 'r' in the division algorithm (a = dq + r), where 0 ≤ r < d.

Signup and view all the flashcards

Congruence (mod m)

If 'a' and 'b' are integers, and 'm' is a positive integer, then 'a' is congruent to 'b' modulo 'm' if 'm' divides 'a – b'.

Signup and view all the flashcards

a ≡ b (mod m)

'a' is congruent to 'b' modulo 'm'.

Signup and view all the flashcards

Congruent modulo m

Two integers have the same remainder when divided by m.

Signup and view all the flashcards

Modulo m

The modulus in a congruence relation.

Signup and view all the flashcards

Associativity (Modulo m)

For any integers a, b, and c in Zm, (a +m b) +m c = a +m (b +m c) and (a ∙m b) ∙m c = a ∙m (b ∙m c).

Signup and view all the flashcards

Commutativity (Modulo m)

For any integers a and b in Zm, a +m b = b +m a and a ∙m b = b ∙m a

Signup and view all the flashcards

Identity Elements (Modulo m)

0 is the identity element for addition (a +m 0 = a) and 1 is the identity element for multiplication (a ∙m 1 = a) in Zm.

Signup and view all the flashcards

Additive Inverses (Modulo m)

For any integer a ≠ 0 in Zm, m− a is its additive inverse. That is a +m (m− a ) = 0. Zero is its own inverse.

Signup and view all the flashcards

Distributivity (Modulo m)

For any integers a, b, and c in Zm, a ∙m (b +m c) = (a ∙m b) +m (a ∙m c) and (a +m b) ∙m c = (a ∙m c) +m (b ∙m c).

Signup and view all the flashcards

Hashing Function

A function that assigns a memory location (h(k)) to a record based on its key (k).

Signup and view all the flashcards

Collision (Hashing)

When more than one record is assigned to the same memory location by a hashing function.

Signup and view all the flashcards

Hashing Function Example

h(k) = k mod m. k is any key, (mod m) is the remainder when dividing k by m, and m represents the locations.

Signup and view all the flashcards

Linear Probing

A method for collision resolution in hashing. h(k,i) = (h(k) + i) mod m. (i runs from 0 to m − 1).

Signup and view all the flashcards

Shared Secret Key

A secret key used for secure communication between Alice and Bob, based on a discrete logarithm problem.

Signup and view all the flashcards

Discrete Logarithm Problem

Finding the exponent needed to raise a base to a given power using large numbers.

Signup and view all the flashcards

Digital Signature

A way to verify the sender of a message, ensuring authenticity.

Signup and view all the flashcards

RSA Public Key

A public key pair (n, e) used for encryption in RSA.

Signup and view all the flashcards

RSA Private Key

A private key (d) used for decryption in RSA.

Signup and view all the flashcards

RSA Encryption

A process using the public key to encrypt a message.

Signup and view all the flashcards

RSA Decryption

A process using the private key to decrypt a message.

Signup and view all the flashcards

Message Verification

Ensuring a message came from the claimed sender using digital signatures.

Signup and view all the flashcards

Decryption Transformation (D)

Mathematical process that uses the private key to change ciphertext into plaintext.

Signup and view all the flashcards

Encryption Transformation (E)

Mathematical process that uses the public key to change plaintext into ciphertext.

Signup and view all the flashcards

UPC Check Digit

A digit appended to a Universal Product Code (UPC) to verify its accuracy.

Signup and view all the flashcards

UPC Formula

A formula for calculating check digits for Universal Product Codes (UPC): 3x1 + x2 + 3x3 + etc., mod 10.

Signup and view all the flashcards

Valid UPC

A Universal Product Code (UPC) whose check digit satisfies the congruence formula resulting in the sum being a multiple of 10 (remainder is 0).

Signup and view all the flashcards

ISBN-10 Check Digit

A digit in the International Standard Book Number (ISBN-10) to verify its validity.

Signup and view all the flashcards

ISBN-10 Formula

A formula for calculating check digits for International Standard Book Numbers (ISBN-10): 1d1 + 2d2 + 3*d3... (mod 11)

Signup and view all the flashcards

Valid ISBN-10

An ISBN number where the check digit makes the checksum congruent to 0 (mod 11).

Signup and view all the flashcards

Caesar Cipher

A simple substitution cipher where each letter is shifted a fixed number of positions down the alphabet.

Signup and view all the flashcards

Encryption

The process of converting readable information into an unreadable format to secure it.

Signup and view all the flashcards

RSA Encryption

A public-key cryptosystem that uses modular arithmetic to encrypt and decrypt messages. It relies on the difficulty of factoring large numbers to keep the decryption key secret.

Signup and view all the flashcards

Public Key

In RSA, a key used for encryption that is freely shared and easily made public.

Signup and view all the flashcards

Private Key

In RSA, a key used for decrypting messages that are encrypted with the corresponding public key. It is not shared and is kept extremely secret.

Signup and view all the flashcards

Modular Arithmetic

A system of arithmetic where numbers 'wrap around' after reaching a specific value (the modulus).

Signup and view all the flashcards

Prime Numbers

Whole numbers greater than 1 that are only divisible by 1 and themselves.

Signup and view all the flashcards

Diffe-Hellman Key Exchange

A method for two parties to securely agree on a shared secret key over an insecure communication channel

Signup and view all the flashcards

Primitive Root

In modular arithmetic, a number whose powers generate all the numbers in a reduced residue system.

Signup and view all the flashcards

Modulo Operation

Gives the remainder when one number is divided by another.

Signup and view all the flashcards

Study Notes

Division Algorithm

  • The quotient of dividing 101 by 11 is 9.
  • The remainder of dividing 101 by 11 is 3.
  • Divisor refers to the integer that divides another integer in the division algorithm, in the equation a = dq + r, d is the divisor and a is being divided.

Congruence Relation

  • The notation to express that two integers are congruent modulo m is a ≡ b (mod m).
  • 24 is not congruent to 14 modulo 6, as (24-14)/6 is not an integer.
  • A congruence relation, denoted by a ≡ b (mod m), means that (a-b) is divisible by m.

Modular Arithmetic

  • In the equation a = dq + r, a refers to the integer being divided.
  • The Commutative Property states that if a and b belong to Zm, then a +m b = b +m a.
  • The additive inverse of a in Zm is not always zero.
  • The identity element for addition in Zm is 0, where a +m 0 = a.
  • In Zm, if a belongs to Zm, then a +m 0 = a.

Hashing Functions

  • Collision in hashing functions occurs when two distinct inputs map to the same output.
  • A common hashing function mentioned is the Division Method, which uses the remainder when dividing the key by a fixed number.
  • A hashing function that is onto means all memory locations are possible outputs.

Check Digits

  • The check digit for the UPC that starts with 79357343104 is 8.
  • Given the equation 3(d1 + d3 + d5 + d7 + d9) + (d2 + d4 + d6 + d8 + d10 + d12) ≡ 0 (mod 10), and the first 11 digits of a UPC is 79357343104, the check digit (d12) is 8.
  • The UPC 041331021641 is a valid UPC.
  • The tenth digit in an ISBN-10 is used to check for errors; it is calculated using a weighted sum of the first nine digits and must be a single digit between 0 and 10.

Ciphers and Cryptography

  • Julius Caesar created secret messages using the Caesar cipher.
  • In the calculation for the UPC check digit, the equation given reduces to (3(d1 + d3 + d5 + d7 + d9) + (d2 + d4 + d6 + d8 + d10 + d12)) ≡ 0 (mod 10).
  • The congruence used in the ISBN-10 ensures that a single error can be detected.
  • The ISBN-10 with the first 9 digits as 007288008 has a check digit of 5.

Properties of Congruence

  • If $a ≡ b$ (mod $m$) and $c ≡ d$ (mod $m$), then $a + c ≡ b + d$ (mod $m$).
  • The statement 'If $a ≡ b$ (mod $m$), then $c + a ≡ c + b$ (mod $m$) for any integer $c$' is true.
  • An example that illustrates the failure of division in congruences is 14 ≡ 8 (mod 6) but dividing both sides by 2 results in 7 ≡ 4 (mod 6), which is not a valid congruence.
  • The operation $a +_m b$ is defined as $(a + b) mod m$, which is called addition modulo m.

Modular Operations

  • The congruence $14 ≡ 8$ (mod $6$) allows for division by $2$ to create a valid congruence because $2$ is relatively prime to $6$.
  • If $a ≡ b$ (mod $m$), then multiplying both sides by $c$ results in $c imes a ≡ c imes b$ (mod $m$).

RSA Cryptosystem

  • The primary function used to encrypt a message in the RSA cryptosystem is exponentiation modulo n.
  • The value of n in the RSA system is the product of two prime numbers.
  • The decrypted message if the ciphertext received is 0981 0461 using the RSA method mentioned is "HELLO".
  • In the RSA encryption process, the decryption key is the inverse of e modulo (p−1)(q−1).

Diffe-Hellman Key Agreement Protocol

  • The purpose of the Diffe-Hellman key agreement protocol is to allow two parties to establish a shared secret key over an insecure channel without having to share any secret information beforehand.
  • Alice and Bob can share a key without any prior shared secret information using the Diffe-Hellman protocol.
  • Alice and Bob agree on the values of a (the generator of the group), p (the prime modulus), k1 (Alice's secret key), and k2 (Bob's secret key) in the Diffe-Hellman key agreement protocol.
  • An adversary needs to solve the Discrete Logarithm Problem to find k1 and k2 from ak1 mod p and ak2 mod p.
  • Adding a digital signature to a message ensures that the message originates from the claimed sender and has not been tampered with.
  • The purpose of Alice applying her decryption function to the blocks of the message is to verify that the message originated from Bob and has not been tampered with.
  • Alice's RSA public key is denoted as (n, e), while her private key is denoted as (n, d).
  • Applying Alice's encryption function E(n,e) to her digital signature results in Alice's public key (n,e).
  • The values p and q in Alice's RSA key must be distinct prime numbers.
  • The values of p and q in Alice's RSA system are 11 and 13 respectively.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser