Original Article
Essentials of Number Theory for Cryptography
|
Sujit K. Bose 1* 1 S.N. Bose National Centre for Basic Sciences, Salt Lake City,
Kolkata 700106, India |
|
|
|
ABSTRACT |
||
|
In the communication era, secure transmission of digital data through networks of communication channels and their storage is carried out by encrypting the data. It transpires that the encryption methods heavily depend on The Theory of Numbers - a fancied topic of Higher Algebra. The discreteness inherent in this algebra employs special constructs, setting it apart from other topics of the subject. Its logical development requires careful understanding of the theory. On the other hand, Cryptography as a subject freely employs the concepts and methods of Number Theory, and a number of books have appeared on the subject. The reading of these texts however is not smooth for readers not conversant with the certain specialities of Number Theory. This survey in simple terms, is a compendium of these specialities that may ease the study of Cryptography. Keywords: Cryptography, Number Theory, Primes,
Congruence, Elliptic Curves |
||
INTRODUCTION
Natural numbers and in general the entire set
of integers, has been a subject of study for millennia, unveiling a host of
algebraic properties possessing bewilderingly elegant structures. The quest for
finding these properties shrouded in right earnest began with the notings of
Pierre de Fermat (CE 1601-1665), Euler (CE 1707-1783), Gauss (CE 1777-1855),
and numerous other famous mathematicians, continuing to the present era. The
subject however remained a special topic in text books of Higher Algebra, such as
those by Chrystal (1906) and
Bernard and Child (1965) in English
language, but the topic gained limelight with the appearance of the tome by Hardy
and Wright (1938)followed by a
number of other books. Until the mid-nineteen seventies, the subject remained a
fancied subject of puree. mathematicians devoid of any practical application.
The
invention of the digital computer heralded first as a number crunching machine
and then as a coded text editor post 1975 followed by their communication from
one computer to another over long distances in a secure manner avoiding any
corruption, led to discovering the means of encryption. The subject of
Cryptography thus came in to being at that juncture, and as a tool of
encryption of stored and transmitted data, the vast knowledge of Number Theory
at last found a very effective application; the essential reason for this
development being discreteness of digital data.
At
present the development of the cryptographic methods are treated in several
books. Their presentations can be broadly categorised in to two types. Firstly,
excellent introductory texts on Cryptography are those by Paar and Pelzl (2010), McAndrew
(2011), Hoffstein
et al. (2008). and by Buchmann
(2002). These books
begin with introductory Number Theory, freely employing its special tools, in
order to develop various cryptographic methods, many of which employed in
practice. Yet the reading such texts is exhausting because of the special
features of the Number Theoretic Algebra. The second category of books are on
Number Theory, succinctly presenting some Cryptographic methods. Notable among
these texts are those by Rosen
(2005) and by Niven et
al. (1991). The array of
the elegant Number Theoretic results are then applied to special Cryptographic
methods. As an aid for easily following the literature on Cryptography, the
present survey presents the essentials of Number Theory that may be useful as
as a ready reference, The details of this presentation is kept as simple as
possible as the goal is to understand the cryptographic methods.
The Theory of Numbers exclusively deals with whole
numbers or integers consisting of the natural numbers
The theory develops the special properties of
these numbers, in particular those of the natural numbers. Algebraically the
elements of the set
DIVISIBILITY
Definition: Let
Examples.
Theorem 2.1
(ii) If
(iii) If
Proof.
Theorem 2.2 (Division Algorithm).
Given two integers
Moreover if
Proof. Consider the sequence in Arithmetic
Progression
Any integer
Examples.
Greatest Common Divisor
Let
Lemma. Let
Proof. Actually all
of the common divisors of
Theorem 2.3 (Euclidean Algorithm).
Given integers
in which
Proof. From the result of the Lemma given
above
The theorem was also stated
independently by Aryabhat in verse form as was the custom in Sanskrit
literature. This algorithm is particularly useful for calculating the gcd
of large integers.
Example. Find
By division using a calculator
Hence
The following theorem is also useful.
Theorem 2.4 (Extended Euclidean Theorem). If
the numbers
Proof. Consider the
linear combination
or
which is a linear combination of
In
order to show that
PRIME NUMBERS
Prime
numbers are also known as Primes.
Definition: A positive
integer which has no divisors except itself and
Thus,
for example,
Definition: Two integers
Theorem 3.1 A prime number
Proof. Let
Theorem 3.2 Every
composite number
Proof. Since
Theorem 3.3 Every
composite integer
Proof. Since
Thus,
in general, a composite number
Theorem 3.4 (Fundamental Theorem of
Arithmetic) The factorisation of a composite number
Proof. Let
where
Theorem 3.5 There are
infinitely many primes.
Proof. Let
Theorem 3.6 If
Proof. Let
Example 1. Find all the
primes less than
Here
Example 2. Find all the primes less than
Here
Examples 1 and 2 illustrate the Seive of Eratosthenes for
generating prime numbers.
The prime numbers appear to
be distributed randomly. Estimation of their distribution was a major problem
which was finally resolved by Chebyshev as stated below.
Theorem 3.7 (Prime Number Theorem).
Let
or,
The proof of this theorem is very technical and outside the scope
of this article.
CONGRUENCE
Definition: Let
where
Theorem 4.1
Proof. If
Thus, letting
called the residue class
modulo
Example 1. Let
Example 2. Let
Theorem 4.2 If
Proof. By the division algorithm Eq. (2.2)
if
Theorem 4.3 Let
(iv) If
Proof. By hypothesis
which proves
in which
Remark. In particular, if
To summarise, in dealing
with integers modulo
Theorem 4.4 If
Proof. By the binomial theorem
or,
The binomial coefficient on the right-hand side isa multiple of
Remark. The above theorem can be easily
generalised to any number of terms
by successively increasing the number of terms to
From the above theorem
follows one of the most basic theorem of number theory’
Theorem 4.5 (Fermat’s Little Theorem)
If
Proof. Partitioning
where there are
Dividing by
Remark. The theorem can also be stated as
the congruence (4.6).
Theorem 4.6 If
Proof.
that is,
EULER’S PHI FUNCTION
Euler generalised Fermat’s little theorem for any integer
Definition. Let
Theorem 5.1 If
that are prime to
Proof. Let these numbers be divided by
Theorem 5.2 If
Proof. Let the numbers
Since
Remark. The theorem can evidently be
extended to any number of terms
Theorem 5.3 (Euler’s Theorem) If
Proof. Let
If these products are divided by
Dividing by
Remark. Let
Theorem 5.4 If
Proof. When
Theorem 5.5 If any number
Proof.
Theorem 5.6 (Wilson’s Theorem) If
Proof. Let
or
which proves the result (5.5).
Remark. The theorem is true only when
FAST EXPONENTIATION
In Cryptography the raising of power of a number (or
exponentiation) as in Fermat’s and Euler’s theorem for large values of the
power is common place. In such cases straight forward calculation even with the
aid of a computer becomes prohibitive. To overcome this difficulty, a Fast
Exponentiation algorithm has been developed, which is described below.
Suppose one has to
calculate
where
Thus,
Now the sequence
which yields
in which the product on the right-hand side of (6.2) can be
computed by at most
LINEAR CONGRUENCE
Definition: A congruence of the form
where
In a linear congruence, it
is to be noted that if
Theorem 7.1 If
Proof. With modulo
Theorem 7.2 Let
Proof. Let
Theorem 7.3 (Simultaneous Congruences: Chinese Remainder Theorem)
Let
is given by the solution of
Proof. From the first congruence relation
of (7.2), one gets
where
Remark. The theorem can be generalised to
three, four. · · · · · · congruences in steps and in general to
where
PRIMALITY TESTING
In Cryptography testing a given number
Trial Division
According to theorem 3.6, if
Example. Test
In the first case using a calculator
Remark. In the RSA cryptosystems employed in
practice, primes greater than
Fermat Test
According to Fermat’s little theorem (Theorem 4.5), if for an
integer
then
The smallest number which shows the inadequacy of the Fermat test
is
Worst is the case of
First Step; Modulo 3: If
Second Step; Modulo 11: If
Third Step; Modulo 17: If
Hence by the Chinese remainder theorem 7.3 for all
Numbers such as
Theorem 8.1 If
Proof. Let
Miller-Rabin Test
Here Fermat’s theorem is so modified as to exclude the possibility
of Carmichael numbers.
Theorem 8.2 Let
Proof. By Fermat’s theorem,
which form elements of a sequence of the previous powers. Hence
This test is often used in
practice.
Example. Show that
The number
None of the above values equal
AKS Test
The Agrawal, Kayal, Saxena test was discovered in recent years
(2022). It is based on Theorem 3.4 in the form that if
by Fermat’s little theorem (4.6). It was shown that the modulus
when
1) Find
the smallest power
2) Find
the smallest
3) If
4) If
5) For
if
then
6)
The Proof of this method is
given in Dietzfellinger (2004). Although the
method appears quite intricate, it has been shown that its algorithm has a
polynomial complexity.
FACTORISING
Given a composite number
Poallard’s p-1 Method
Since
by Fermat’s theorem, in which
in which
In practice
Example. Factorise
Choose
If
If
Hence
If
If
Hence,
Pollard’s Rho Method
Let
with seed
f
generates the required type of sequence from (9.3).
This sequence is cyclic
composed of
and
then the sequence is also cyclic modulo
The length of the sub-cycle is
in which the sub-cycle is underlined for identification.
In order to detect the
sub-cycle
The cycle for
Alternatively, one may consider the iteration generated by the
sequence
and consider the
The other factor
The method has been found
to be of practical use when
DISCRETE LOGARITHM
Let
then
A very simple but expensive
method of finding
Shank’s Baby Step - Giant Step Method
In this method, the upper integer part of
where
by the division algorithm, in which
or,
In the above Eq. (10.5), compute the set of baby steps:
Now, in the set
If in the set
so that
Example. Find
Here
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
None of the values in the second column equals
|
|
|
|
|
|
|
2 |
|
Therefore, the solution is
Pohlig - Hellman Method
In this method in order to find
Also, for each prime divisor
then it follows that
exists,
Now consider the
simultaneous congruences
whose solution by the Chinese Remainder Theorem is of modulus
Hence,
or,
Now, the number
have no common factor except
Thus, multiplying both sides of (10.12) by
or,
Remark. In the above method, if
to find
where
and so,
Similarly,
or,
and in general,
The iterations
ELLIPTIC CURVES IN REAL DOMAIN
The number theoretic applications of elliptic curves have far
reaching consequences like the historic proof of Fermat’s Last Theorem
by Andrew Wiles in 1995. It provides a powerful tool in Cryptography. The
genesis of the study of these curves lies in the development of the elliptic
function
in the complex domain. Instead of dwelling in that subject, there
arises the study of Elliptic Curves in the
From the Theory of Equations, if
In order to construct an algebra of points
|
Figure 1 |
|
Figure 1 Elliptic Curve form |
so that
For brevity
The algebra of points (or
number pairs) on the elliptic curve is developed in the following manner. Let
In the particular case
or,
and therefore
In order to find the coordinates of
or,
whose roots are
Equating the coefficients of
or,
Eq. (11.7) gives the value of
or,
which yields the value of
In the above construct, if
Finite Field Elliptic Curves
The algebraic construct of the elliptic curves in the domain of
real numbers can be restricted to a finite field
with the algebraic properties that
where
It can also be shown that the addition law is a associative, that
is
Example. Find the set of points in
The points can be found by setting
For
For
For
For
For
Proceeding in this manner, for
In general, it is clear that the set of points
where
It can be foreseen that the
complicated way of deciphering the number pairs of an elliptic curve in prime
field
Conclusion
Cryptographic methods for securing digital data is heavily dependent on some Number Theoretic results. This survey article presents the essentials of this algebraic topic in a simple, clear manner, in aid of studying the subject of Cryptography. In summary, the algebra of congruences, prime numbers and several theorems related to them are covered. These topics include, representation of the division algorithm as a congruence, Euclid’s algorithm for calculating GCD, properties of prime numbers leading to the theorems of Fermat and Euler, developing the properties of the latter’s phi function, linear congruences and the Chinese remainder theorem; primality tests, factorisation of composite numbers and discrete logarithms. Finally, a description of the elliptic curve prime field is presented, which has lately come in to prominence. A quick study of this survey, it is hoped will be a useful aid for a prospective reader of the subject of Cryptography.
ACKNOWLEDGMENTS
The author is
sincerely thankful to Ajijul Hoque, Department of Mathematics, IIT Kharagpur
for helping preparation of this article.
Declarations
There are no conflicts of interest in the research reported in this paper. And no data were generated or analysed by AI or otherwise in the presented research.
REFERENCES
Bernard, S., and Child, G. M. (1965). Higher Algebra. Macmillan.
Buchmann, J. A. (2002). Introduction to Cryptography. Springer. https://doi.org/10.1007/978-1-4684-0496-8
Chrystal, G. (1906). Algebra: An Elementary Text-Book, Part II. Adam and Charles Black.
Dietzfellinger, M. (2004). Primality Testing in Polynomial Time (Lecture Notes in Computer Science, Vol. 3000). Springer-Verlag. https://doi.org/10.1007/b12334
Hardy,
G. H., and Wright, E. M. (1938). An Introduction to the Theory of Numbers. Clarendon Press.
Hoffstein, J., Pipher, J., and Silverman, J. H. (2008). An Introduction to Mathematical
Cryptography. Springer.
McAndrew, A. (2011). Introduction to Cryptography with Open Source Software. CRC Press.
Niven, I., Zuckerman, H. S., and Montgomery, H. L. (1991). An Introduction to the Theory of numbers. John Wiley and Sons.
Paar, C., and Pelzl, J. (2010). Understanding Cryptography. Springer. https://doi.org/10.1007/978-3-642-04101-3
Rosen, K. H. (2005). Elementary Number Theory and its Applications. Pearson/Addison Wesley.
Original Article
Essentials of Number Theory for Cryptography
|
Sujit K. Bose 1* 1 S.N. Bose National Centre for Basic Sciences, Salt Lake City,
Kolkata 700106, India |
|
|
|
ABSTRACT |
||
|
In the communication era, secure transmission of digital data through networks of communication channels and their storage is carried out by encrypting the data. It transpires that the encryption methods heavily depend on The Theory of Numbers - a fancied topic of Higher Algebra. The discreteness inherent in this algebra employs special constructs, setting it apart from other topics of the subject. Its logical development requires careful understanding of the theory. On the other hand, Cryptography as a subject freely employs the concepts and methods of Number Theory, and a number of books have appeared on the subject. The reading of these texts however is not smooth for readers not conversant with the certain specialities of Number Theory. This survey in simple terms, is a compendium of these specialities that may ease the study of Cryptography. Keywords: Cryptography, Number Theory, Primes,
Congruence, Elliptic Curves |
||
INTRODUCTION
Natural numbers and in general the entire set
of integers, has been a subject of study for millennia, unveiling a host of
algebraic properties possessing bewilderingly elegant structures. The quest for
finding these properties shrouded in right earnest began with the notings of
Pierre de Fermat (CE 1601-1665), Euler (CE 1707-1783), Gauss (CE 1777-1855),
and numerous other famous mathematicians, continuing to the present era. The
subject however remained a special topic in text books of Higher Algebra, such as
those by Chrystal (1906) and
Bernard and Child (1965) in English
language, but the topic gained limelight with the appearance of the tome by Hardy
and Wright (1938)followed by a
number of other books. Until the mid-nineteen seventies, the subject remained a
fancied subject of puree. mathematicians devoid of any practical application.
The
invention of the digital computer heralded first as a number crunching machine
and then as a coded text editor post 1975 followed by their communication from
one computer to another over long distances in a secure manner avoiding any
corruption, led to discovering the means of encryption. The subject of
Cryptography thus came in to being at that juncture, and as a tool of
encryption of stored and transmitted data, the vast knowledge of Number Theory
at last found a very effective application; the essential reason for this
development being discreteness of digital data.
At
present the development of the cryptographic methods are treated in several
books. Their presentations can be broadly categorised in to two types. Firstly,
excellent introductory texts on Cryptography are those by Paar and Pelzl (2010), McAndrew
(2011), Hoffstein
et al. (2008). and by Buchmann
(2002). These books
begin with introductory Number Theory, freely employing its special tools, in
order to develop various cryptographic methods, many of which employed in
practice. Yet the reading such texts is exhausting because of the special
features of the Number Theoretic Algebra. The second category of books are on
Number Theory, succinctly presenting some Cryptographic methods. Notable among
these texts are those by Rosen
(2005) and by Niven et
al. (1991). The array of
the elegant Number Theoretic results are then applied to special Cryptographic
methods. As an aid for easily following the literature on Cryptography, the
present survey presents the essentials of Number Theory that may be useful as
as a ready reference, The details of this presentation is kept as simple as
possible as the goal is to understand the cryptographic methods.
The Theory of Numbers exclusively deals with whole
numbers or integers consisting of the natural numbers
The theory develops the special properties of
these numbers, in particular those of the natural numbers. Algebraically the
elements of the set
DIVISIBILITY
Definition: Let
Examples.
Theorem 2.1
(ii) If
(iii) If
Proof.
Theorem 2.2 (Division Algorithm).
Given two integers
Moreover if
Proof. Consider the sequence in Arithmetic
Progression
Any integer
Examples.
Greatest Common Divisor
Let
Lemma. Let
Proof. Actually all
of the common divisors of
Theorem 2.3 (Euclidean Algorithm).
Given integers
in which
Proof. From the result of the Lemma given
above
The theorem was also stated
independently by Aryabhat in verse form as was the custom in Sanskrit
literature. This algorithm is particularly useful for calculating the gcd
of large integers.
Example. Find
By division using a calculator
Hence
The following theorem is also useful.
Theorem 2.4 (Extended Euclidean Theorem). If
the numbers
Proof. Consider the
linear combination
or
which is a linear combination of
In
order to show that
PRIME NUMBERS
Prime
numbers are also known as Primes.
Definition: A positive
integer which has no divisors except itself and
Thus,
for example,
Definition: Two integers
Theorem 3.1 A prime number
Proof. Let
Theorem 3.2 Every
composite number
Proof. Since
Theorem 3.3 Every
composite integer
Proof. Since
Thus,
in general, a composite number
Theorem 3.4 (Fundamental Theorem of
Arithmetic) The factorisation of a composite number
Proof. Let
where
Theorem 3.5 There are
infinitely many primes.
Proof. Let
Theorem 3.6 If
Proof. Let
Example 1. Find all the
primes less than
Here
Example 2. Find all the primes less than
Here
Examples 1 and 2 illustrate the Seive of Eratosthenes for
generating prime numbers.
The prime numbers appear to
be distributed randomly. Estimation of their distribution was a major problem
which was finally resolved by Chebyshev as stated below.
Theorem 3.7 (Prime Number Theorem).
Let
or,
The proof of this theorem is very technical and outside the scope
of this article.
CONGRUENCE
Definition: Let
where
Theorem 4.1
Proof. If
Thus, letting
called the residue class
modulo
Example 1. Let
Example 2. Let
Theorem 4.2 If
Proof. By the division algorithm Eq. (2.2)
if
Theorem 4.3 Let
(iv) If
Proof. By hypothesis
which proves
in which
Remark. In particular, if
To summarise, in dealing
with integers modulo
Theorem 4.4 If
Proof. By the binomial theorem
or,
The binomial coefficient on the right-hand side isa multiple of
Remark. The above theorem can be easily
generalised to any number of terms
by successively increasing the number of terms to
From the above theorem
follows one of the most basic theorem of number theory’
Theorem 4.5 (Fermat’s Little Theorem)
If
Proof. Partitioning
where there are
Dividing by
Remark. The theorem can also be stated as
the congruence (4.6).
Theorem 4.6 If
Proof.
that is,
EULER’S PHI FUNCTION
Euler generalised Fermat’s little theorem for any integer
Definition. Let
Theorem 5.1 If
that are prime to
Proof. Let these numbers be divided by
Theorem 5.2 If
Proof. Let the numbers
Since
Remark. The theorem can evidently be
extended to any number of terms
Theorem 5.3 (Euler’s Theorem) If
Proof. Let
If these products are divided by
Dividing by
Remark. Let
Theorem 5.4 If
Proof. When
Theorem 5.5 If any number
Proof.
Theorem 5.6 (Wilson’s Theorem) If
Proof. Let
or
which proves the result (5.5).
Remark. The theorem is true only when
FAST EXPONENTIATION
In Cryptography the raising of power of a number (or
exponentiation) as in Fermat’s and Euler’s theorem for large values of the
power is common place. In such cases straight forward calculation even with the
aid of a computer becomes prohibitive. To overcome this difficulty, a Fast
Exponentiation algorithm has been developed, which is described below.
Suppose one has to
calculate
where
Thus,
Now the sequence
which yields
in which the product on the right-hand side of (6.2) can be
computed by at most
LINEAR CONGRUENCE
Definition: A congruence of the form
where
In a linear congruence, it
is to be noted that if
Theorem 7.1 If
Proof. With modulo
Theorem 7.2 Let
Proof. Let
Theorem 7.3 (Simultaneous Congruences: Chinese Remainder Theorem)
Let
is given by the solution of
Proof. From the first congruence relation
of (7.2), one gets
where
Remark. The theorem can be generalised to
three, four. · · · · · · congruences in steps and in general to
where
PRIMALITY TESTING
In Cryptography testing a given number
Trial Division
According to theorem 3.6, if
Example. Test
In the first case using a calculator
Remark. In the RSA cryptosystems employed in
practice, primes greater than
Fermat Test
According to Fermat’s little theorem (Theorem 4.5), if for an
integer
then
The smallest number which shows the inadequacy of the Fermat test
is
Worst is the case of
First Step; Modulo 3: If
Second Step; Modulo 11: If
Third Step; Modulo 17: If
Hence by the Chinese remainder theorem 7.3 for all
Numbers such as
Theorem 8.1 If
Proof. Let
Miller-Rabin Test
Here Fermat’s theorem is so modified as to exclude the possibility
of Carmichael numbers.
Theorem 8.2 Let
Proof. By Fermat’s theorem,
which form elements of a sequence of the previous powers. Hence
This test is often used in
practice.
Example. Show that
The number
None of the above values equal
AKS Test
The Agrawal, Kayal, Saxena test was discovered in recent years
(2022). It is based on Theorem 3.4 in the form that if
by Fermat’s little theorem (4.6). It was shown that the modulus
when
1) Find
the smallest power
2) Find
the smallest
3) If
4) If
5) For
if
then
6)
The Proof of this method is
given in Dietzfellinger (2004). Although the
method appears quite intricate, it has been shown that its algorithm has a
polynomial complexity.
FACTORISING
Given a composite number
Poallard’s p-1 Method
Since
by Fermat’s theorem, in which
in which
In practice
Example. Factorise
Choose
If
If
Hence
If
If
Hence,
Pollard’s Rho Method
Let
with seed
f
generates the required type of sequence from (9.3).
This sequence is cyclic
composed of
and
then the sequence is also cyclic modulo
The length of the sub-cycle is
in which the sub-cycle is underlined for identification.
In order to detect the
sub-cycle
The cycle for
Alternatively, one may consider the iteration generated by the
sequence
and consider the
The other factor
The method has been found
to be of practical use when
DISCRETE LOGARITHM
Let
then
A very simple but expensive
method of finding
Shank’s Baby Step - Giant Step Method
In this method, the upper integer part of
where
by the division algorithm, in which
or,
In the above Eq. (10.5), compute the set of baby steps:
Now, in the set
If in the set
so that
Example. Find
Here
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
None of the values in the second column equals
|
|
|
|
|
|
|
2 |
|
Therefore, the solution is
Pohlig - Hellman Method
In this method in order to find
Also, for each prime divisor
then it follows that
exists,
Now consider the
simultaneous congruences
whose solution by the Chinese Remainder Theorem is of modulus
Hence,
or,
Now, the number
have no common factor except
Thus, multiplying both sides of (10.12) by
or,
Remark. In the above method, if
to find
where
and so,
Similarly,
or,
and in general,
The iterations
ELLIPTIC CURVES IN REAL DOMAIN
The number theoretic applications of elliptic curves have far
reaching consequences like the historic proof of Fermat’s Last Theorem
by Andrew Wiles in 1995. It provides a powerful tool in Cryptography. The
genesis of the study of these curves lies in the development of the elliptic
function
in the complex domain. Instead of dwelling in that subject, there
arises the study of Elliptic Curves in the
From the Theory of Equations, if
In order to construct an algebra of points
|
Figure 1 |
|
Figure 1 Elliptic Curve form |
so that
For brevity
The algebra of points (or
number pairs) on the elliptic curve is developed in the following manner. Let
In the particular case
or,
and therefore
In order to find the coordinates of
or,
whose roots are
Equating the coefficients of
or,
Eq. (11.7) gives the value of
or,
which yields the value of
In the above construct, if
Finite Field Elliptic Curves
The algebraic construct of the elliptic curves in the domain of
real numbers can be restricted to a finite field
with the algebraic properties that
where
It can also be shown that the addition law is a associative, that
is
Example. Find the set of points in
The points can be found by setting
For
For
For
For
For
Proceeding in this manner, for
In general, it is clear that the set of points
where
It can be foreseen that the
complicated way of deciphering the number pairs of an elliptic curve in prime
field
Conclusion
Cryptographic methods for securing digital data is heavily dependent on some Number Theoretic results. This survey article presents the essentials of this algebraic topic in a simple, clear manner, in aid of studying the subject of Cryptography. In summary, the algebra of congruences, prime numbers and several theorems related to them are covered. These topics include, representation of the division algorithm as a congruence, Euclid’s algorithm for calculating GCD, properties of prime numbers leading to the theorems of Fermat and Euler, developing the properties of the latter’s phi function, linear congruences and the Chinese remainder theorem; primality tests, factorisation of composite numbers and discrete logarithms. Finally, a description of the elliptic curve prime field is presented, which has lately come in to prominence. A quick study of this survey, it is hoped will be a useful aid for a prospective reader of the subject of Cryptography.
ACKNOWLEDGMENTS
The author is
sincerely thankful to Ajijul Hoque, Department of Mathematics, IIT Kharagpur
for helping preparation of this article.
Declarations
There are no conflicts of interest in the research reported in this paper. And no data were generated or analysed by AI or otherwise in the presented research.
REFERENCES
Bernard, S., and Child, G. M. (1965). Higher Algebra. Macmillan.
Buchmann, J. A. (2002). Introduction to Cryptography. Springer. https://doi.org/10.1007/978-1-4684-0496-8
Chrystal, G. (1906). Algebra: An Elementary Text-Book, Part II. Adam and Charles Black.
Dietzfellinger, M. (2004). Primality Testing in Polynomial Time (Lecture Notes in Computer Science, Vol. 3000). Springer-Verlag. https://doi.org/10.1007/b12334
Hardy,
G. H., and Wright, E. M. (1938). An Introduction to the Theory of Numbers. Clarendon Press.
Hoffstein, J., Pipher, J., and Silverman, J. H. (2008). An Introduction to Mathematical
Cryptography. Springer.
McAndrew, A. (2011). Introduction to Cryptography with Open Source Software. CRC Press.
Niven, I., Zuckerman, H. S., and Montgomery, H. L. (1991). An Introduction to the Theory of numbers. John Wiley and Sons.
Paar, C., and Pelzl, J. (2010). Understanding Cryptography. Springer. https://doi.org/10.1007/978-3-642-04101-3
Rosen, K. H. (2005). Elementary Number Theory and its Applications. Pearson/Addison Wesley.
This work is licensed under a: Creative Commons Attribution 4.0 International License
© Granthaalayah 2014-2025. All Rights Reserved.