SlideShare uma empresa Scribd logo
1 de 44
Chapter 4  Finite Fields
❏  To review the concept of algebraic structures ❏  To define and give some examples of groups ❏  To define and give some examples of rings ❏  To define and give some examples of fields ❏  To emphasize the finite fields of type GF(2 n )   that make it possible to perform operations such   as addition, subtraction, multiplication, and   division on  n -bit words in modern block ciphers Objectives Chapter 4
4-1  ALGEBRAIC STRUCTURES Cryptography requires sets of integers and specific operations that are defined for those sets. The combination of the set and the operations that are applied to the elements of the set is called an  algebraic structure . In this chapter, we will define three common algebraic structures: groups, rings, and fields. Topics discussed in this section: 4.1.1   Groups 4.1.2   Rings 4.1.3   Fields
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
4.1   Continued Figure 4.1  Common algebraic structure
Group: {G,   } ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4.1.1   Continued Figure 4.2  Group
4.1.1   Continued Application Although a group involves a single operation, the properties imposed on the operation allow the use of a pair of operations as long as they are inverses of each other.  The set of residue integers with the addition operator, G = < Z n  , +>,  is a commutative group. We can perform addition and subtraction on the elements of this set without moving out of the set.  Example 4.1
4.1.1   Continued The set Z n * with the multiplication operator, G = <Z n *, ×>, is also an abelian group.  Example 4.2 Let us define a set G = < { a ,  b ,  c ,  d }, •> and the operation as shown in Table 4.1. Example 4.3
Cyclic Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ring: {R, +,   } ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4.1.2  Ring A ring, R = <{…}, •, >, is an algebraic structure with two operations.  Figure 4.4  Ring
4.1.2   Continued Example 4.11 The set Z with two operations, addition and multiplication, is a commutative ring. We show it by R = <Z, +, ×>. Addition satisfies all of the five properties; multiplication satisfies only three properties.
Field {F, +,   } ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4.1.3  Field A field, denoted by F = <{…}, •, > is a commutative ring in which the second operation satisfies all five properties defined for the first operation except that the identity of the first operation has no inverse.  Figure 4.5  Field
4.1.3   Continued Galois showed that for a field to be finite, the number of elements should be  p n , where  p  is a prime and  n  is a positive integer.  Finite Fields  A Galois field, GF( p n ), is a finite field with  p n  elements. Note
4.1.3   Continued When  n  = 1, we have GF( p ) field. This field can be the set Z p , {0, 1, …, p − 1}, with two arithmetic operations. GF( p ) Fields
4.1.2   Continued Example 4.12 A very common field in this category is GF(2) with the set {0, 1} and two operations, addition and multiplication, as shown in Figure 4.6. Figure 4.6  GF(2) field
4.1.2   Continued Example 4.13 We can define GF(5) on the set Z 5  (5 is a prime) with addition and multiplication operators as shown in Figure 4.7. Figure 4.7  GF(5) field
4.1.3   Continued Table 4.3   Summary Summary
4.2   Continued Example 4.14 Let us define a GF(2 2 ) field in which the set has four 2-bit words: {00, 01, 10, 11}. We can redefine addition and multiplication for this field in such a way that all properties of these operations are satisfied, as shown in Figure 4.8. Figure 4.8  An example of GF(2 2 ) field
4.2.1   Continued GF( 2 n ) Fields Polynomials representing  n -bit words use two fields: GF(2) and GF(2 n ). Note
Modular Arithmetic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Divisors ,[object Object],[object Object],[object Object],[object Object],[object Object]
Properties 2.1.4  Continued Property 1: if a|1, then a = ±1. Property 2: if a|b and b|a, then a = ±b. Property 3: if a|b and b|c, then a|c. Property 4: if a|b and a|c, then    a|(m × b + n × c), where m   and n are arbitrary integers
Modular Arithmetic Operations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modular Operator Properties ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Modular Arithmetic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Residue classes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Residue class continue.. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multiplicative inverse(w -1 ): w  z  ≡  1 mod n
 
 
Formula for Finding Inverse. ,[object Object],[object Object],[object Object],[object Object]
Modular Arithmetic ,[object Object],[object Object]
Greatest Common Divisor (GCD) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Euclid's GCD Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example GCD(1970,1066) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modular Arithmetic ,[object Object],[object Object],[object Object],[object Object],[object Object]
Galois Fields ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Galois Fields GF(p) ,[object Object],[object Object],[object Object],[object Object]
Finding Inverses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Inverse of 550 in GF(1759)

Mais conteúdo relacionado

Mais procurados

daa-unit-3-greedy method
daa-unit-3-greedy methoddaa-unit-3-greedy method
daa-unit-3-greedy methodhodcsencet
 
Greedy Algorithm - Knapsack Problem
Greedy Algorithm - Knapsack ProblemGreedy Algorithm - Knapsack Problem
Greedy Algorithm - Knapsack ProblemMadhu Bala
 
Asymptotic Notation and Complexity
Asymptotic Notation and ComplexityAsymptotic Notation and Complexity
Asymptotic Notation and ComplexityRajandeep Gill
 
Data Structures- Part5 recursion
Data Structures- Part5 recursionData Structures- Part5 recursion
Data Structures- Part5 recursionAbdullah Al-hazmy
 
Message authentication
Message authenticationMessage authentication
Message authenticationCAS
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 
sum of subset problem using Backtracking
sum of subset problem using Backtrackingsum of subset problem using Backtracking
sum of subset problem using BacktrackingAbhishek Singh
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Data Structures and Algorithm Analysis
Data Structures  and  Algorithm AnalysisData Structures  and  Algorithm Analysis
Data Structures and Algorithm AnalysisMary Margarat
 
EULER AND FERMAT THEOREM
EULER AND FERMAT THEOREMEULER AND FERMAT THEOREM
EULER AND FERMAT THEOREMankita pandey
 
Greedy algorithms
Greedy algorithmsGreedy algorithms
Greedy algorithmsRajendran
 
Asymptotic Notations
Asymptotic NotationsAsymptotic Notations
Asymptotic NotationsRishabh Soni
 

Mais procurados (20)

daa-unit-3-greedy method
daa-unit-3-greedy methoddaa-unit-3-greedy method
daa-unit-3-greedy method
 
Greedy Algorithm - Knapsack Problem
Greedy Algorithm - Knapsack ProblemGreedy Algorithm - Knapsack Problem
Greedy Algorithm - Knapsack Problem
 
Finite fields
Finite fields Finite fields
Finite fields
 
Asymptotic Notation and Complexity
Asymptotic Notation and ComplexityAsymptotic Notation and Complexity
Asymptotic Notation and Complexity
 
Data Structures- Part5 recursion
Data Structures- Part5 recursionData Structures- Part5 recursion
Data Structures- Part5 recursion
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Asymptotic Notation
Asymptotic NotationAsymptotic Notation
Asymptotic Notation
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
sum of subset problem using Backtracking
sum of subset problem using Backtrackingsum of subset problem using Backtracking
sum of subset problem using Backtracking
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Basics of coding theory
Basics of coding theoryBasics of coding theory
Basics of coding theory
 
Greedy Algorihm
Greedy AlgorihmGreedy Algorihm
Greedy Algorihm
 
Complexity of Algorithm
Complexity of AlgorithmComplexity of Algorithm
Complexity of Algorithm
 
Data Structures and Algorithm Analysis
Data Structures  and  Algorithm AnalysisData Structures  and  Algorithm Analysis
Data Structures and Algorithm Analysis
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
Automata theory -RE to NFA-ε
Automata theory -RE to  NFA-εAutomata theory -RE to  NFA-ε
Automata theory -RE to NFA-ε
 
EULER AND FERMAT THEOREM
EULER AND FERMAT THEOREMEULER AND FERMAT THEOREM
EULER AND FERMAT THEOREM
 
Greedy algorithms
Greedy algorithmsGreedy algorithms
Greedy algorithms
 
Asymptotic Notations
Asymptotic NotationsAsymptotic Notations
Asymptotic Notations
 

Destaque

Ch01
Ch01Ch01
Ch01n C
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & AnalysisPawandeep Kaur
 
Adjacency Decomposition Method: Breaking up problems
Adjacency Decomposition Method: Breaking up problemsAdjacency Decomposition Method: Breaking up problems
Adjacency Decomposition Method: Breaking up problemsJayant Apte, PhD
 
Presentation-Alex-20150421
Presentation-Alex-20150421Presentation-Alex-20150421
Presentation-Alex-20150421alexfang2014
 
A Short Study of Galois Field
A Short Study of Galois FieldA Short Study of Galois Field
A Short Study of Galois FieldHazratali Naim
 
Spin-Seeback Effect: a review
Spin-Seeback Effect: a reviewSpin-Seeback Effect: a review
Spin-Seeback Effect: a reviewDongwook Go
 
A crash course on group theory
A crash course on group theoryA crash course on group theory
A crash course on group theoryDongwook Go
 
Star Polygons - Application of Cyclic Group
Star Polygons - Application of Cyclic GroupStar Polygons - Application of Cyclic Group
Star Polygons - Application of Cyclic GroupDivyansh Verma
 
X2 t01 09 de moivres theorem
X2 t01 09 de moivres theoremX2 t01 09 de moivres theorem
X2 t01 09 de moivres theoremNigel Simmons
 
Cyclic group- group theory
Cyclic group- group theoryCyclic group- group theory
Cyclic group- group theoryAyush Agrawal
 

Destaque (20)

Ch08
Ch08Ch08
Ch08
 
Chapter 22 Finite Field
Chapter 22 Finite FieldChapter 22 Finite Field
Chapter 22 Finite Field
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Ch01
Ch01Ch01
Ch01
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Thara
TharaThara
Thara
 
Adjacency Decomposition Method: Breaking up problems
Adjacency Decomposition Method: Breaking up problemsAdjacency Decomposition Method: Breaking up problems
Adjacency Decomposition Method: Breaking up problems
 
Ch04
Ch04Ch04
Ch04
 
Finite fields
Finite fieldsFinite fields
Finite fields
 
Presentation-Alex-20150421
Presentation-Alex-20150421Presentation-Alex-20150421
Presentation-Alex-20150421
 
A Short Study of Galois Field
A Short Study of Galois FieldA Short Study of Galois Field
A Short Study of Galois Field
 
Spin-Seeback Effect: a review
Spin-Seeback Effect: a reviewSpin-Seeback Effect: a review
Spin-Seeback Effect: a review
 
A crash course on group theory
A crash course on group theoryA crash course on group theory
A crash course on group theory
 
Star Polygons - Application of Cyclic Group
Star Polygons - Application of Cyclic GroupStar Polygons - Application of Cyclic Group
Star Polygons - Application of Cyclic Group
 
Group Theory
Group TheoryGroup Theory
Group Theory
 
X2 t01 09 de moivres theorem
X2 t01 09 de moivres theoremX2 t01 09 de moivres theorem
X2 t01 09 de moivres theorem
 
Cyclic group- group theory
Cyclic group- group theoryCyclic group- group theory
Cyclic group- group theory
 

Semelhante a Chap4

Semelhante a Chap4 (20)

CH04.ppt
CH04.pptCH04.ppt
CH04.ppt
 
Cryptography and Network Security chapter 4.ppt
Cryptography and Network Security chapter 4.pptCryptography and Network Security chapter 4.ppt
Cryptography and Network Security chapter 4.ppt
 
GTR final project
GTR final projectGTR final project
GTR final project
 
2.ppt
2.ppt2.ppt
2.ppt
 
Ayush Jajoo(MCA2501622) AOA .pptx
Ayush Jajoo(MCA2501622) AOA .pptxAyush Jajoo(MCA2501622) AOA .pptx
Ayush Jajoo(MCA2501622) AOA .pptx
 
Hay hay
Hay hayHay hay
Hay hay
 
Information Security Seminar #2
Information Security Seminar #2Information Security Seminar #2
Information Security Seminar #2
 
Number theory lecture (part 1)
Number theory lecture (part 1)Number theory lecture (part 1)
Number theory lecture (part 1)
 
11848 ch04
11848 ch0411848 ch04
11848 ch04
 
11848 ch04(1)
11848 ch04(1)11848 ch04(1)
11848 ch04(1)
 
11848 ch04(1) (1)
11848 ch04(1) (1)11848 ch04(1) (1)
11848 ch04(1) (1)
 
CRYPTOGRAPHY AND NUMBER THEORY, he ha huli
CRYPTOGRAPHY AND NUMBER THEORY, he ha huliCRYPTOGRAPHY AND NUMBER THEORY, he ha huli
CRYPTOGRAPHY AND NUMBER THEORY, he ha huli
 
Recursive Definitions in Discrete Mathmatcs.pptx
Recursive Definitions in Discrete Mathmatcs.pptxRecursive Definitions in Discrete Mathmatcs.pptx
Recursive Definitions in Discrete Mathmatcs.pptx
 
Modular arithmetic
Modular arithmeticModular arithmetic
Modular arithmetic
 
Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...
Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...
Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...
 
02-Basic Structures .ppt
02-Basic Structures .ppt02-Basic Structures .ppt
02-Basic Structures .ppt
 
sheet6.pdf
sheet6.pdfsheet6.pdf
sheet6.pdf
 
doc6.pdf
doc6.pdfdoc6.pdf
doc6.pdf
 
paper6.pdf
paper6.pdfpaper6.pdf
paper6.pdf
 
lecture5.pdf
lecture5.pdflecture5.pdf
lecture5.pdf
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Chap4

  • 1. Chapter 4 Finite Fields
  • 2. ❏ To review the concept of algebraic structures ❏ To define and give some examples of groups ❏ To define and give some examples of rings ❏ To define and give some examples of fields ❏ To emphasize the finite fields of type GF(2 n ) that make it possible to perform operations such as addition, subtraction, multiplication, and division on n -bit words in modern block ciphers Objectives Chapter 4
  • 3. 4-1 ALGEBRAIC STRUCTURES Cryptography requires sets of integers and specific operations that are defined for those sets. The combination of the set and the operations that are applied to the elements of the set is called an algebraic structure . In this chapter, we will define three common algebraic structures: groups, rings, and fields. Topics discussed in this section: 4.1.1 Groups 4.1.2 Rings 4.1.3 Fields
  • 4.
  • 5. 4.1 Continued Figure 4.1 Common algebraic structure
  • 6.
  • 7. 4.1.1 Continued Figure 4.2 Group
  • 8. 4.1.1 Continued Application Although a group involves a single operation, the properties imposed on the operation allow the use of a pair of operations as long as they are inverses of each other. The set of residue integers with the addition operator, G = < Z n , +>, is a commutative group. We can perform addition and subtraction on the elements of this set without moving out of the set. Example 4.1
  • 9. 4.1.1 Continued The set Z n * with the multiplication operator, G = <Z n *, ×>, is also an abelian group. Example 4.2 Let us define a set G = < { a , b , c , d }, •> and the operation as shown in Table 4.1. Example 4.3
  • 10.
  • 11.
  • 12. 4.1.2 Ring A ring, R = <{…}, •, >, is an algebraic structure with two operations. Figure 4.4 Ring
  • 13. 4.1.2 Continued Example 4.11 The set Z with two operations, addition and multiplication, is a commutative ring. We show it by R = <Z, +, ×>. Addition satisfies all of the five properties; multiplication satisfies only three properties.
  • 14.
  • 15. 4.1.3 Field A field, denoted by F = <{…}, •, > is a commutative ring in which the second operation satisfies all five properties defined for the first operation except that the identity of the first operation has no inverse. Figure 4.5 Field
  • 16. 4.1.3 Continued Galois showed that for a field to be finite, the number of elements should be p n , where p is a prime and n is a positive integer. Finite Fields A Galois field, GF( p n ), is a finite field with p n elements. Note
  • 17. 4.1.3 Continued When n = 1, we have GF( p ) field. This field can be the set Z p , {0, 1, …, p − 1}, with two arithmetic operations. GF( p ) Fields
  • 18. 4.1.2 Continued Example 4.12 A very common field in this category is GF(2) with the set {0, 1} and two operations, addition and multiplication, as shown in Figure 4.6. Figure 4.6 GF(2) field
  • 19. 4.1.2 Continued Example 4.13 We can define GF(5) on the set Z 5 (5 is a prime) with addition and multiplication operators as shown in Figure 4.7. Figure 4.7 GF(5) field
  • 20. 4.1.3 Continued Table 4.3 Summary Summary
  • 21. 4.2 Continued Example 4.14 Let us define a GF(2 2 ) field in which the set has four 2-bit words: {00, 01, 10, 11}. We can redefine addition and multiplication for this field in such a way that all properties of these operations are satisfied, as shown in Figure 4.8. Figure 4.8 An example of GF(2 2 ) field
  • 22. 4.2.1 Continued GF( 2 n ) Fields Polynomials representing n -bit words use two fields: GF(2) and GF(2 n ). Note
  • 23.
  • 24.
  • 25. Properties 2.1.4 Continued Property 1: if a|1, then a = ±1. Property 2: if a|b and b|a, then a = ±b. Property 3: if a|b and b|c, then a|c. Property 4: if a|b and a|c, then a|(m × b + n × c), where m and n are arbitrary integers
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. Multiplicative inverse(w -1 ): w  z ≡ 1 mod n
  • 33.  
  • 34.  
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. Inverse of 550 in GF(1759)