SlideShare una empresa de Scribd logo
1 de 44
Chapter 4  Finite Fields
❏  To review the concept of algebraic structures ❏  To define and give some examples of groups ❏  To define and give some examples of rings ❏  To define and give some examples of fields ❏  To emphasize the finite fields of type GF(2 n )   that make it possible to perform operations such   as addition, subtraction, multiplication, and   division on  n -bit words in modern block ciphers Objectives Chapter 4
4-1  ALGEBRAIC STRUCTURES Cryptography requires sets of integers and specific operations that are defined for those sets. The combination of the set and the operations that are applied to the elements of the set is called an  algebraic structure . In this chapter, we will define three common algebraic structures: groups, rings, and fields. Topics discussed in this section: 4.1.1   Groups 4.1.2   Rings 4.1.3   Fields
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
4.1   Continued Figure 4.1  Common algebraic structure
Group: {G,   } ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4.1.1   Continued Figure 4.2  Group
4.1.1   Continued Application Although a group involves a single operation, the properties imposed on the operation allow the use of a pair of operations as long as they are inverses of each other.  The set of residue integers with the addition operator, G = < Z n  , +>,  is a commutative group. We can perform addition and subtraction on the elements of this set without moving out of the set.  Example 4.1
4.1.1   Continued The set Z n * with the multiplication operator, G = <Z n *, ×>, is also an abelian group.  Example 4.2 Let us define a set G = < { a ,  b ,  c ,  d }, •> and the operation as shown in Table 4.1. Example 4.3
Cyclic Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ring: {R, +,   } ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4.1.2  Ring A ring, R = <{…}, •, >, is an algebraic structure with two operations.  Figure 4.4  Ring
4.1.2   Continued Example 4.11 The set Z with two operations, addition and multiplication, is a commutative ring. We show it by R = <Z, +, ×>. Addition satisfies all of the five properties; multiplication satisfies only three properties.
Field {F, +,   } ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4.1.3  Field A field, denoted by F = <{…}, •, > is a commutative ring in which the second operation satisfies all five properties defined for the first operation except that the identity of the first operation has no inverse.  Figure 4.5  Field
4.1.3   Continued Galois showed that for a field to be finite, the number of elements should be  p n , where  p  is a prime and  n  is a positive integer.  Finite Fields  A Galois field, GF( p n ), is a finite field with  p n  elements. Note
4.1.3   Continued When  n  = 1, we have GF( p ) field. This field can be the set Z p , {0, 1, …, p − 1}, with two arithmetic operations. GF( p ) Fields
4.1.2   Continued Example 4.12 A very common field in this category is GF(2) with the set {0, 1} and two operations, addition and multiplication, as shown in Figure 4.6. Figure 4.6  GF(2) field
4.1.2   Continued Example 4.13 We can define GF(5) on the set Z 5  (5 is a prime) with addition and multiplication operators as shown in Figure 4.7. Figure 4.7  GF(5) field
4.1.3   Continued Table 4.3   Summary Summary
4.2   Continued Example 4.14 Let us define a GF(2 2 ) field in which the set has four 2-bit words: {00, 01, 10, 11}. We can redefine addition and multiplication for this field in such a way that all properties of these operations are satisfied, as shown in Figure 4.8. Figure 4.8  An example of GF(2 2 ) field
4.2.1   Continued GF( 2 n ) Fields Polynomials representing  n -bit words use two fields: GF(2) and GF(2 n ). Note
Modular Arithmetic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Divisors ,[object Object],[object Object],[object Object],[object Object],[object Object]
Properties 2.1.4  Continued Property 1: if a|1, then a = ±1. Property 2: if a|b and b|a, then a = ±b. Property 3: if a|b and b|c, then a|c. Property 4: if a|b and a|c, then    a|(m × b + n × c), where m   and n are arbitrary integers
Modular Arithmetic Operations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modular Operator Properties ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Modular Arithmetic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Residue classes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Residue class continue.. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multiplicative inverse(w -1 ): w  z  ≡  1 mod n
 
 
Formula for Finding Inverse. ,[object Object],[object Object],[object Object],[object Object]
Modular Arithmetic ,[object Object],[object Object]
Greatest Common Divisor (GCD) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Euclid's GCD Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example GCD(1970,1066) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modular Arithmetic ,[object Object],[object Object],[object Object],[object Object],[object Object]
Galois Fields ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Galois Fields GF(p) ,[object Object],[object Object],[object Object],[object Object]
Finding Inverses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Inverse of 550 in GF(1759)

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Finite fields
Finite fields Finite fields
Finite fields
 
Galois field
Galois fieldGalois field
Galois field
 
Asymptotic notations
Asymptotic notationsAsymptotic notations
Asymptotic notations
 
Strassen's matrix multiplication
Strassen's matrix multiplicationStrassen's matrix multiplication
Strassen's matrix multiplication
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
 
Asymptotic notation
Asymptotic notationAsymptotic notation
Asymptotic notation
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Unit 1 chapter 1 Design and Analysis of Algorithms
Unit 1   chapter 1 Design and Analysis of AlgorithmsUnit 1   chapter 1 Design and Analysis of Algorithms
Unit 1 chapter 1 Design and Analysis of Algorithms
 
Graph theory presentation
Graph theory presentationGraph theory presentation
Graph theory presentation
 
Recurrence relations
Recurrence relationsRecurrence relations
Recurrence relations
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Greedy Algorithms
Greedy AlgorithmsGreedy Algorithms
Greedy Algorithms
 
Functions in discrete mathematics
Functions in discrete mathematicsFunctions in discrete mathematics
Functions in discrete mathematics
 
Fuzzy Set Theory
Fuzzy Set TheoryFuzzy Set Theory
Fuzzy Set Theory
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
Context free grammar
Context free grammar Context free grammar
Context free grammar
 
Minimum spanning tree
Minimum spanning treeMinimum spanning tree
Minimum spanning tree
 
Hamming codes
Hamming codesHamming codes
Hamming codes
 
Design and Analysis of Algorithms
Design and Analysis of AlgorithmsDesign and Analysis of Algorithms
Design and Analysis of Algorithms
 

Destacado

Ch01
Ch01Ch01
Ch01n C
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & AnalysisPawandeep Kaur
 
Adjacency Decomposition Method: Breaking up problems
Adjacency Decomposition Method: Breaking up problemsAdjacency Decomposition Method: Breaking up problems
Adjacency Decomposition Method: Breaking up problemsJayant Apte, PhD
 
Presentation-Alex-20150421
Presentation-Alex-20150421Presentation-Alex-20150421
Presentation-Alex-20150421alexfang2014
 
A Short Study of Galois Field
A Short Study of Galois FieldA Short Study of Galois Field
A Short Study of Galois FieldHazratali Naim
 
Spin-Seeback Effect: a review
Spin-Seeback Effect: a reviewSpin-Seeback Effect: a review
Spin-Seeback Effect: a reviewDongwook Go
 
A crash course on group theory
A crash course on group theoryA crash course on group theory
A crash course on group theoryDongwook Go
 
Star Polygons - Application of Cyclic Group
Star Polygons - Application of Cyclic GroupStar Polygons - Application of Cyclic Group
Star Polygons - Application of Cyclic GroupDivyansh Verma
 
X2 t01 09 de moivres theorem
X2 t01 09 de moivres theoremX2 t01 09 de moivres theorem
X2 t01 09 de moivres theoremNigel Simmons
 
Cyclic group- group theory
Cyclic group- group theoryCyclic group- group theory
Cyclic group- group theoryAyush Agrawal
 

Destacado (20)

Ch08
Ch08Ch08
Ch08
 
Chapter 22 Finite Field
Chapter 22 Finite FieldChapter 22 Finite Field
Chapter 22 Finite Field
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Ch01
Ch01Ch01
Ch01
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Thara
TharaThara
Thara
 
Adjacency Decomposition Method: Breaking up problems
Adjacency Decomposition Method: Breaking up problemsAdjacency Decomposition Method: Breaking up problems
Adjacency Decomposition Method: Breaking up problems
 
Finite fields
Finite fieldsFinite fields
Finite fields
 
Presentation-Alex-20150421
Presentation-Alex-20150421Presentation-Alex-20150421
Presentation-Alex-20150421
 
A Short Study of Galois Field
A Short Study of Galois FieldA Short Study of Galois Field
A Short Study of Galois Field
 
Spin-Seeback Effect: a review
Spin-Seeback Effect: a reviewSpin-Seeback Effect: a review
Spin-Seeback Effect: a review
 
A crash course on group theory
A crash course on group theoryA crash course on group theory
A crash course on group theory
 
Star Polygons - Application of Cyclic Group
Star Polygons - Application of Cyclic GroupStar Polygons - Application of Cyclic Group
Star Polygons - Application of Cyclic Group
 
Group Theory
Group TheoryGroup Theory
Group Theory
 
X2 t01 09 de moivres theorem
X2 t01 09 de moivres theoremX2 t01 09 de moivres theorem
X2 t01 09 de moivres theorem
 
Cyclic group- group theory
Cyclic group- group theoryCyclic group- group theory
Cyclic group- group theory
 
Chapter 4 Cyclic Groups
Chapter 4 Cyclic GroupsChapter 4 Cyclic Groups
Chapter 4 Cyclic Groups
 

Similar a Chap4

Similar a Chap4 (20)

Number theory
Number theoryNumber theory
Number theory
 
CH04.ppt
CH04.pptCH04.ppt
CH04.ppt
 
Cryptography and Network Security chapter 4.ppt
Cryptography and Network Security chapter 4.pptCryptography and Network Security chapter 4.ppt
Cryptography and Network Security chapter 4.ppt
 
GTR final project
GTR final projectGTR final project
GTR final project
 
2.ppt
2.ppt2.ppt
2.ppt
 
Ayush Jajoo(MCA2501622) AOA .pptx
Ayush Jajoo(MCA2501622) AOA .pptxAyush Jajoo(MCA2501622) AOA .pptx
Ayush Jajoo(MCA2501622) AOA .pptx
 
Hay hay
Hay hayHay hay
Hay hay
 
Information Security Seminar #2
Information Security Seminar #2Information Security Seminar #2
Information Security Seminar #2
 
Number theory lecture (part 1)
Number theory lecture (part 1)Number theory lecture (part 1)
Number theory lecture (part 1)
 
11848 ch04(1) (1)
11848 ch04(1) (1)11848 ch04(1) (1)
11848 ch04(1) (1)
 
11848 ch04
11848 ch0411848 ch04
11848 ch04
 
11848 ch04(1)
11848 ch04(1)11848 ch04(1)
11848 ch04(1)
 
CRYPTOGRAPHY AND NUMBER THEORY, he ha huli
CRYPTOGRAPHY AND NUMBER THEORY, he ha huliCRYPTOGRAPHY AND NUMBER THEORY, he ha huli
CRYPTOGRAPHY AND NUMBER THEORY, he ha huli
 
Recursive Definitions in Discrete Mathmatcs.pptx
Recursive Definitions in Discrete Mathmatcs.pptxRecursive Definitions in Discrete Mathmatcs.pptx
Recursive Definitions in Discrete Mathmatcs.pptx
 
Modular arithmetic
Modular arithmeticModular arithmetic
Modular arithmetic
 
Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...
Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...
Module 13: Arithmetic Function: Multiplicative Function; Definition and Basic...
 
02-Basic Structures .ppt
02-Basic Structures .ppt02-Basic Structures .ppt
02-Basic Structures .ppt
 
sheet6.pdf
sheet6.pdfsheet6.pdf
sheet6.pdf
 
doc6.pdf
doc6.pdfdoc6.pdf
doc6.pdf
 
paper6.pdf
paper6.pdfpaper6.pdf
paper6.pdf
 

Último

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Chap4

  • 1. Chapter 4 Finite Fields
  • 2. ❏ To review the concept of algebraic structures ❏ To define and give some examples of groups ❏ To define and give some examples of rings ❏ To define and give some examples of fields ❏ To emphasize the finite fields of type GF(2 n ) that make it possible to perform operations such as addition, subtraction, multiplication, and division on n -bit words in modern block ciphers Objectives Chapter 4
  • 3. 4-1 ALGEBRAIC STRUCTURES Cryptography requires sets of integers and specific operations that are defined for those sets. The combination of the set and the operations that are applied to the elements of the set is called an algebraic structure . In this chapter, we will define three common algebraic structures: groups, rings, and fields. Topics discussed in this section: 4.1.1 Groups 4.1.2 Rings 4.1.3 Fields
  • 4.
  • 5. 4.1 Continued Figure 4.1 Common algebraic structure
  • 6.
  • 7. 4.1.1 Continued Figure 4.2 Group
  • 8. 4.1.1 Continued Application Although a group involves a single operation, the properties imposed on the operation allow the use of a pair of operations as long as they are inverses of each other. The set of residue integers with the addition operator, G = < Z n , +>, is a commutative group. We can perform addition and subtraction on the elements of this set without moving out of the set. Example 4.1
  • 9. 4.1.1 Continued The set Z n * with the multiplication operator, G = <Z n *, ×>, is also an abelian group. Example 4.2 Let us define a set G = < { a , b , c , d }, •> and the operation as shown in Table 4.1. Example 4.3
  • 10.
  • 11.
  • 12. 4.1.2 Ring A ring, R = <{…}, •, >, is an algebraic structure with two operations. Figure 4.4 Ring
  • 13. 4.1.2 Continued Example 4.11 The set Z with two operations, addition and multiplication, is a commutative ring. We show it by R = <Z, +, ×>. Addition satisfies all of the five properties; multiplication satisfies only three properties.
  • 14.
  • 15. 4.1.3 Field A field, denoted by F = <{…}, •, > is a commutative ring in which the second operation satisfies all five properties defined for the first operation except that the identity of the first operation has no inverse. Figure 4.5 Field
  • 16. 4.1.3 Continued Galois showed that for a field to be finite, the number of elements should be p n , where p is a prime and n is a positive integer. Finite Fields A Galois field, GF( p n ), is a finite field with p n elements. Note
  • 17. 4.1.3 Continued When n = 1, we have GF( p ) field. This field can be the set Z p , {0, 1, …, p − 1}, with two arithmetic operations. GF( p ) Fields
  • 18. 4.1.2 Continued Example 4.12 A very common field in this category is GF(2) with the set {0, 1} and two operations, addition and multiplication, as shown in Figure 4.6. Figure 4.6 GF(2) field
  • 19. 4.1.2 Continued Example 4.13 We can define GF(5) on the set Z 5 (5 is a prime) with addition and multiplication operators as shown in Figure 4.7. Figure 4.7 GF(5) field
  • 20. 4.1.3 Continued Table 4.3 Summary Summary
  • 21. 4.2 Continued Example 4.14 Let us define a GF(2 2 ) field in which the set has four 2-bit words: {00, 01, 10, 11}. We can redefine addition and multiplication for this field in such a way that all properties of these operations are satisfied, as shown in Figure 4.8. Figure 4.8 An example of GF(2 2 ) field
  • 22. 4.2.1 Continued GF( 2 n ) Fields Polynomials representing n -bit words use two fields: GF(2) and GF(2 n ). Note
  • 23.
  • 24.
  • 25. Properties 2.1.4 Continued Property 1: if a|1, then a = ±1. Property 2: if a|b and b|a, then a = ±b. Property 3: if a|b and b|c, then a|c. Property 4: if a|b and a|c, then a|(m × b + n × c), where m and n are arbitrary integers
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. Multiplicative inverse(w -1 ): w  z ≡ 1 mod n
  • 33.  
  • 34.  
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. Inverse of 550 in GF(1759)