Lucas Sequences, Permutation Polynomials, and Inverse Polynomials

Total Page:16

File Type:pdf, Size:1020Kb

Lucas Sequences, Permutation Polynomials, and Inverse Polynomials Lucas Sequences, Permutation Polynomials, and Inverse Polynomials Qiang (Steven) Wang School of Mathematics and Statistics Carleton University IPM 20 - Combinatorics 2009, Tehran, May 16-21, 2009. logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Outline 1 Lucas Sequences Fibonacci numbers, Lucas numbers Lucas sequences Dickson polynomials Generalized Lucas Sequences 2 Permutation polynomials (PP) over finite fields Introduction of permutation polynomials Permutation binomials and sequences 3 Inverse Polynomials Compositional inverse polynomial of a PP Inverse polynomials of permutation binomials 4 Summary logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Outline 1 Lucas Sequences Fibonacci numbers, Lucas numbers Lucas sequences Dickson polynomials Generalized Lucas Sequences 2 Permutation polynomials (PP) over finite fields Introduction of permutation polynomials Permutation binomials and sequences 3 Inverse Polynomials Compositional inverse polynomial of a PP Inverse polynomials of permutation binomials 4 Summary logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Fibonacci numbers, Lucas numbers Fibonacci numbers Origin Ancient India: Pingala (200 BC). West: Leonardo of Pisa, known as Fibonacci (1170-1250), in his Liber Abaci (1202). He considered the growth of an idealised (biologically unrealistic) rabbit population. Liber Abaci, 1202 0; 1; 1; 2; 3; 5; 8; 13; 21; 34; 55; ··· F0 = 0, F1 = 1, Fn = Fn−1 + Fn−2 for n ≥ 2. logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Fibonacci numbers, Lucas numbers Leonardo of Pisa, Fibonacci (1170-1250) Figure: Fibonacci (1170-1250) logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Fibonacci numbers, Lucas numbers Fibonacci (1170-1250) Figure: A statue of Fibonacci in Pisa logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Fibonacci numbers, Lucas numbers Lucas numbers Lucas numbers (Edouard Lucas) 2; 1; 3; 4; 7; 11; 18; 29; 47; 76; ··· L0 = 2, L1 = 1, Ln = Ln−1 + Ln−2 for n ≥ 2. logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Fibonacci numbers, Lucas numbers Edouard Lucas (1842-1891) Figure: Edouard Lucas (1842-1891) logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Lucas sequences Lucas sequences Let P; Q be integers and 4 = P2 − 4Q be a nonsquare. Fibonacci type U0(P; Q) = 0, U1(P; Q) = 1, Un(P; Q) = PUn−1(P; Q) − QUn−2(P; Q) for n ≥ 2. Lucas type V0(P; Q) = 2, V1(P; Q) = P, Vn(P; Q) = PVn−1(P; Q) − QVn−2(P; Q) for n ≥ 2. Un(1; −1) - Fibonacci numbers Vn(1; −1) - Lucas numbers Un(2; −1) - Pell numbers Vn(2; −1) - Pell-Lucas numbers logo Un(1; −2) - Jacobsthal numbers Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Lucas sequences basic properties characteristic equation: x2 − Px + Q = 0. p p P+ 4 P− 4 p a = 2 and b = 2 2 Q[ 4] an−bn Un(P; Q) = a−b : n n Vn(P; Q) = a + b . logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Lucas sequences Applications RSA n = pq, p and q are distinct primes. k = (p − 1)(q − 1). gcd(e; k) = 1 and ed ≡ 1 (mod k). Here e is called a public key and d a private key. Each party has a pair of keys, i.e., (eA; dA) and (eB; dB). c ≡ meB (mod n) Alice −! Bob cdB ≡ (meB )dB ≡ meBdB ≡ m (mod n): logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Lucas sequences Applications LUC n = pq, p and q are distinct primes. k = (p2 − 1)(q2 − 1). gcd(e; k) = 1 and ed ≡ 1 (mod k). VeB (m; 1) Alice −! Bob Vd (Ve(m; 1); 1) ≡ Vde(m; 1) ≡ m (mod n): logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Dickson polynomials Dickson polynomials Dickson polynomials of the first kind of degree n bn=2c X n n − j S = αn + βn = (−1)j (αβ)j (α + β)n−2j : n n − j j j=0 bn=2c X n n − j D (x; a) = (−a)j xn−2j ; n ≥ 1: n n − j j j=0 a an D (α + ; a) = αn + : n α αn logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Dickson polynomials Dickson polynomials Dickson polynomials of the first kind of degree n bn=2c X n n − j S = αn + βn = (−1)j (αβ)j (α + β)n−2j : n n − j j j=0 bn=2c X n n − j D (x; a) = (−a)j xn−2j ; n ≥ 1: n n − j j j=0 a an D (α + ; a) = αn + : n α αn logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Dickson polynomials Dickson polynomials Dickson polynomials of the first kind of degree n bn=2c X n n − j S = αn + βn = (−1)j (αβ)j (α + β)n−2j : n n − j j j=0 bn=2c X n n − j D (x; a) = (−a)j xn−2j ; n ≥ 1: n n − j j j=0 a an D (α + ; a) = αn + : n α αn logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Dickson polynomials Dickson polynomials Dickson polynomials of the first kind of degree n αn + βn = (α + β)(αn−1 + βn−1) − (αβ)(αn−2 + βn−2): Dn(x; a) = xDn−1(x; a) − aDn−2(x; a): D0(x; a) = 2; D1(x; a) = x: Dn(P; a) = Vn(P; a). logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Dickson polynomials Dickson polynomials Dickson polynomials of the first kind of degree n αn + βn = (α + β)(αn−1 + βn−1) − (αβ)(αn−2 + βn−2): Dn(x; a) = xDn−1(x; a) − aDn−2(x; a): D0(x; a) = 2; D1(x; a) = x: Dn(P; a) = Vn(P; a). logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Dickson polynomials Dickson polynomials Dickson polynomials of the first kind of degree n αn + βn = (α + β)(αn−1 + βn−1) − (αβ)(αn−2 + βn−2): Dn(x; a) = xDn−1(x; a) − aDn−2(x; a): D0(x; a) = 2; D1(x; a) = x: Dn(P; a) = Vn(P; a). logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Dickson polynomials Dickson polynomials Dickson polynomials of the first kind of degree n αn + βn = (α + β)(αn−1 + βn−1) − (αβ)(αn−2 + βn−2): Dn(x; a) = xDn−1(x; a) − aDn−2(x; a): D0(x; a) = 2; D1(x; a) = x: Dn(P; a) = Vn(P; a). logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Dickson polynomials Dickson polynomials Dickson polynomials of second kind of degree n bn=2c X n − j E (x; a) = (−a)j xn−2j : n j j=0 E0(x; a) = 1, E1(x; a) = x, En(x; a) = xEn−1(x; a) − aEn−2(x; a) n+1 n+1 E (x; a) = α −β for x = α + β and β = a and α2 6= a. n α−βp p α n Moreover, En(±2 a; a) = (n + 1)(± a) . En(P; Q) = Un+1(P; Q). logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Dickson polynomials Dickson polynomials Dickson polynomials of second kind of degree n bn=2c X n − j E (x; a) = (−a)j xn−2j : n j j=0 E0(x; a) = 1, E1(x; a) = x, En(x; a) = xEn−1(x; a) − aEn−2(x; a) n+1 n+1 E (x; a) = α −β for x = α + β and β = a and α2 6= a. n α−βp p α n Moreover, En(±2 a; a) = (n + 1)(± a) . En(P; Q) = Un+1(P; Q). logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Dickson polynomials Dickson polynomials Dickson polynomials of second kind of degree n bn=2c X n − j E (x; a) = (−a)j xn−2j : n j j=0 E0(x; a) = 1, E1(x; a) = x, En(x; a) = xEn−1(x; a) − aEn−2(x; a) n+1 n+1 E (x; a) = α −β for x = α + β and β = a and α2 6= a. n α−βp p α n Moreover, En(±2 a; a) = (n + 1)(± a) . En(P; Q) = Un+1(P; Q). logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Dickson polynomials Dickson polynomials Dickson polynomials of second kind of degree n bn=2c X n − j E (x; a) = (−a)j xn−2j : n j j=0 E0(x; a) = 1, E1(x; a) = x, En(x; a) = xEn−1(x; a) − aEn−2(x; a) n+1 n+1 E (x; a) = α −β for x = α + β and β = a and α2 6= a. n α−βp p α n Moreover, En(±2 a; a) = (n + 1)(± a) . En(P; Q) = Un+1(P; Q). logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Generalized Lucas Sequences Vn(1; −1) Lucas numbers Vn(1; −1) p p 1+ 5 n 1− 5 n 2; 1; 3; 4; 7; ··· =) Vn(1; −1) = ( 2 ) + ( 2 ) . p 1 + 5 π − π π a = = 2 cos( ) = e 5 + e 5 : 2 5 p 1 − 5 3π − 3π 3π b = = 2 cos( ) = e 5 + e 5 : 2 5 Let η be a primitive 10th root of unity. Then a = η + η−1 and b = η3 + η−3: Hence −1 n 3 −3 n Vn(1; −1) = (η + η ) + (η + η ) : logo Lucas Sequences Permutation polynomials (PP) over finite fields Inverse Polynomials Summary Generalized Lucas Sequences Definition Generalized Lucas sequence (Akbary, W., 2006) For any odd integer ` = 2k + 1 ≥ 3 and η be a fixed primitive 2`th root of unity.
Recommended publications
  • Fast Tabulation of Challenge Pseudoprimes Andrew Shallue and Jonathan Webster
    THE OPEN BOOK SERIES 2 ANTS XIII Proceedings of the Thirteenth Algorithmic Number Theory Symposium Fast tabulation of challenge pseudoprimes Andrew Shallue and Jonathan Webster msp THE OPEN BOOK SERIES 2 (2019) Thirteenth Algorithmic Number Theory Symposium msp dx.doi.org/10.2140/obs.2019.2.411 Fast tabulation of challenge pseudoprimes Andrew Shallue and Jonathan Webster We provide a new algorithm for tabulating composite numbers which are pseudoprimes to both a Fermat test and a Lucas test. Our algorithm is optimized for parameter choices that minimize the occurrence of pseudoprimes, and for pseudoprimes with a fixed number of prime factors. Using this, we have confirmed that there are no PSW-challenge pseudoprimes with two or three prime factors up to 280. In the case where one is tabulating challenge pseudoprimes with a fixed number of prime factors, we prove our algorithm gives an unconditional asymptotic improvement over previous methods. 1. Introduction Pomerance, Selfridge, and Wagstaff famously offered $620 for a composite n that satisfies (1) 2n 1 1 .mod n/ so n is a base-2 Fermat pseudoprime, Á (2) .5 n/ 1 so n is not a square modulo 5, and j D (3) Fn 1 0 .mod n/ so n is a Fibonacci pseudoprime, C Á or to prove that no such n exists. We call composites that satisfy these conditions PSW-challenge pseudo- primes. In[PSW80] they credit R. Baillie with the discovery that combining a Fermat test with a Lucas test (with a certain specific parameter choice) makes for an especially effective primality test[BW80].
    [Show full text]
  • An Analysis of Primality Testing and Its Use in Cryptographic Applications
    An Analysis of Primality Testing and Its Use in Cryptographic Applications Jake Massimo Thesis submitted to the University of London for the degree of Doctor of Philosophy Information Security Group Department of Information Security Royal Holloway, University of London 2020 Declaration These doctoral studies were conducted under the supervision of Prof. Kenneth G. Paterson. The work presented in this thesis is the result of original research carried out by myself, in collaboration with others, whilst enrolled in the Department of Mathe- matics as a candidate for the degree of Doctor of Philosophy. This work has not been submitted for any other degree or award in any other university or educational establishment. Jake Massimo April, 2020 2 Abstract Due to their fundamental utility within cryptography, prime numbers must be easy to both recognise and generate. For this, we depend upon primality testing. Both used as a tool to validate prime parameters, or as part of the algorithm used to generate random prime numbers, primality tests are found near universally within a cryptographer's tool-kit. In this thesis, we study in depth primality tests and their use in cryptographic applications. We first provide a systematic analysis of the implementation landscape of primality testing within cryptographic libraries and mathematical software. We then demon- strate how these tests perform under adversarial conditions, where the numbers being tested are not generated randomly, but instead by a possibly malicious party. We show that many of the libraries studied provide primality tests that are not pre- pared for testing on adversarial input, and therefore can declare composite numbers as being prime with a high probability.
    [Show full text]
  • Triangular Numbers /, 3,6, 10, 15, ", Tn,'" »*"
    TRIANGULAR NUMBERS V.E. HOGGATT, JR., and IVIARJORIE BICKWELL San Jose State University, San Jose, California 9111112 1. INTRODUCTION To Fibonacci is attributed the arithmetic triangle of odd numbers, in which the nth row has n entries, the cen- ter element is n* for even /?, and the row sum is n3. (See Stanley Bezuszka [11].) FIBONACCI'S TRIANGLE SUMS / 1 =:1 3 3 5 8 = 2s 7 9 11 27 = 33 13 15 17 19 64 = 4$ 21 23 25 27 29 125 = 5s We wish to derive some results here concerning the triangular numbers /, 3,6, 10, 15, ", Tn,'" »*". If one o b - serves how they are defined geometrically, 1 3 6 10 • - one easily sees that (1.1) Tn - 1+2+3 + .- +n = n(n±M and (1.2) • Tn+1 = Tn+(n+1) . By noticing that two adjacent arrays form a square, such as 3 + 6 = 9 '.'.?. we are led to 2 (1.3) n = Tn + Tn„7 , which can be verified using (1.1). This also provides an identity for triangular numbers in terms of subscripts which are also triangular numbers, T =T + T (1-4) n Tn Tn-1 • Since every odd number is the difference of two consecutive squares, it is informative to rewrite Fibonacci's tri- angle of odd numbers: 221 222 TRIANGULAR NUMBERS [OCT. FIBONACCI'S TRIANGLE SUMS f^-O2) Tf-T* (2* -I2) (32-22) Ti-Tf (42-32) (52-42) (62-52) Ti-Tl•2 (72-62) (82-72) (9*-82) (Kp-92) Tl-Tl Upon comparing with the first array, it would appear that the difference of the squares of two consecutive tri- angular numbers is a perfect cube.
    [Show full text]
  • Primes and Primality Testing
    Primes and Primality Testing A Technological/Historical Perspective Jennifer Ellis Department of Mathematics and Computer Science What is a prime number? A number p greater than one is prime if and only if the only divisors of p are 1 and p. Examples: 2, 3, 5, and 7 A few larger examples: 71887 524287 65537 2127 1 Primality Testing: Origins Eratosthenes: Developed “sieve” method 276-194 B.C. Nicknamed Beta – “second place” in many different academic disciplines Also made contributions to www-history.mcs.st- geometry, approximation of andrews.ac.uk/PictDisplay/Eratosthenes.html the Earth’s circumference Sieve of Eratosthenes 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 Sieve of Eratosthenes We only need to “sieve” the multiples of numbers less than 10. Why? (10)(10)=100 (p)(q)<=100 Consider pq where p>10. Then for pq <=100, q must be less than 10. By sieving all the multiples of numbers less than 10 (here, multiples of q), we have removed all composite numbers less than 100.
    [Show full text]
  • On the Discriminator of Lucas Sequences
    Ann. Math. Québec (2019) 43:51–71 https://doi.org/10.1007/s40316-017-0097-7 On the discriminator of Lucas sequences Bernadette Faye1,2 · Florian Luca3,4,5 · Pieter Moree4 Received: 18 August 2017 / Accepted: 28 December 2017 / Published online: 12 February 2018 © The Author(s) 2018. This article is an open access publication Abstract We consider the family of Lucas sequences uniquely determined by Un+2(k) = (4k+2)Un+1(k)−Un(k), with initial values U0(k) = 0andU1(k) = 1andk ≥ 1anarbitrary integer. For any integer n ≥ 1 the discriminator function Dk(n) of Un(k) is defined as the smallest integer m such that U0(k), U1(k),...,Un−1(k) are pairwise incongruent modulo m. Numerical work of Shallit on Dk(n) suggests that it has a relatively simple characterization. In this paper we will prove that this is indeed the case by showing that for every k ≥ 1there is a constant nk such that Dk(n) has a simple characterization for every n ≥ nk. The case k = 1 turns out to be fundamentally different from the case k > 1. FRENCH ABSTRACT Pour un entier arbitraire k ≥ 1, on considère la famille de suites de Lucas déterminée de manière unique par la relation de récurrence Un+2(k) = (4k + 2)Un+1(k) − Un(k), et les valeurs initiales U0(k) = 0etU1(k) = 1. Pour tout entier n ≥ 1, la fonction discriminante Dk(n) de Un(k) est définie comme le plus petit m tel que U0(k), U1(k),...,Un−1(k) soient deux à deux non congruents modulo m.
    [Show full text]
  • And Its Properties on the Sequence Related to Lucas Numbers
    Mathematica Aeterna, Vol. 2, 2012, no. 1, 63 - 75 On the sequence related to Lucas numbers and its properties Cennet Bolat Department of Mathematics, Art and Science Faculty, Mustafa Kemal University, 31034, Hatay,Turkey Ahmet I˙pek Department of Mathematics, Art and Science Faculty, Mustafa Kemal University, 31034, Hatay,Turkey Hasan Köse Department of Mathematics, Science Faculty, Selcuk University 42031, Konya,Turkey Abstract The Fibonacci sequence has been generalized in many ways, some by preserving the initial conditions, and others by preserving the recur- rence relation. In this article, we study a new generalization {Lk,n}, with initial conditions Lk,0 = 2 and Lk,1 = 1, which is generated by the recurrence relation Lk,n = kLk,n−1 + Lk,n−2 for n ≥ 2, where k is integer number. Some well-known sequence are special case of this generalization. The Lucas sequence is a special case of {Lk,n} with k = 1. Modified Pell-Lucas sequence is {Lk,n} with k = 2. We produce an extended Binet’s formula for {Lk,n} and, thereby, identities such as Cassini’s, Catalan’s, d’Ocagne’s, etc. using matrix algebra. Moreover, we present sum formulas concerning this new generalization. Mathematics Subject Classi…cation: 11B39, 15A23. Keywords: Classic Fibonacci numbers; Classic Lucas numbers; k-Fibonacci numbers; k-Lucas numbers, Matrix algebra. 64 C. Bolat, A. Ipek and H. Kose 1 Introduction In recent years, many interesting properties of classic Fibonacci numbers, clas- sic Lucas numbers and their generalizations have been shown by researchers and applied to almost every …eld of science and art.
    [Show full text]
  • The Bivariate (Complex) Fibonacci and Lucas Polynomials: an Historical Investigation with the Maple's Help
    Volume 9, Number 4, 2016 THE BIVARIATE (COMPLEX) FIBONACCI AND LUCAS POLYNOMIALS: AN HISTORICAL INVESTIGATION WITH THE MAPLE´S HELP Francisco Regis Vieira Alves, Paula Maria Machado Cruz Catarino Abstract: The current research around the Fibonacci´s and Lucas´ sequence evidences the scientific vigor of both mathematical models that continue to inspire and provide numerous specializations and generalizations, especially from the sixthies. One of the current of research and investigations around the Generalized Sequence of Lucas, involves it´s polinomial representations. Therefore, with the introduction of one or two variables, we begin to discuss the family of the Bivariate Lucas Polynomias (BLP) and the Bivariate Fibonacci Polynomials (BFP). On the other hand, since it´s representation requires enormous employment of a large algebraic notational system, we explore some particular properties in order to convince the reader about an inductive reasoning that produces a meaning and produces an environment of scientific and historical investigation supported by the technology. Finally, throughout the work we bring several figures that represent some examples of commands and algebraic operations with the CAS Maple that allow to compare properties of the Lucas´polynomials, taking as a reference the classic of Fibonacci´s model that still serves as inspiration for several current studies in Mathematics. Key words: Lucas Sequence, Fibonacci´s polynomials, Historical investigation, CAS Maple. 1. Introduction Undoubtedly, the Fibonacci sequence preserves a character of interest and, at the same time, of mystery, around the numerical properties of a sequence that is originated from a problem related to the infinite reproduction of pairs of rabbits. On the other hand, in several books of History of Mathematics in Brazil and in the other countries (Eves, 1969; Gullberg, 1997; Herz, 1998; Huntley, 1970; Vajda, 1989), we appreciate a naive that usually emphasizes eminently basic and trivial properties related to this sequence.
    [Show full text]
  • On the Implementation of Pairing-Based Cryptosystems a Dissertation Submitted to the Department of Computer Science and the Comm
    ON THE IMPLEMENTATION OF PAIRING-BASED CRYPTOSYSTEMS A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE AND THE COMMITTEE ON GRADUATE STUDIES OF STANFORD UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Ben Lynn June 2007 c Copyright by Ben Lynn 2007 All Rights Reserved ii I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. Dan Boneh Principal Advisor I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. John Mitchell I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. Xavier Boyen Approved for the University Committee on Graduate Studies. iii Abstract Pairing-based cryptography has become a highly active research area. We define bilinear maps, or pairings, and show how they give rise to cryptosystems with new functionality. There is only one known mathematical setting where desirable pairings exist: hyperellip- tic curves. We focus on elliptic curves, which are the simplest case, and also the only curves used in practice. All existing implementations of pairing-based cryptosystems are built with elliptic curves. Accordingly, we provide a brief overview of elliptic curves, and functions known as the Tate and Weil pairings from which cryptographic pairings are derived. We describe several methods for obtaining curves that yield Tate and Weil pairings that are efficiently computable yet are still cryptographically secure.
    [Show full text]
  • Speeding up Subgroup Cryptosystems
    Speeding up Subgroup Cryptosystems Martijn Stam CIP-DATA LIBRARY TECHNISCHE UNIVERSITEIT EINDHOVEN Stam, Martijn Speeding up Subgroup Cryptosystems / by Martijn Stam. Eindhoven: Technische Universiteit Eindhoven, 2003 Proefschrift. { ISBN 90-386-0692-3 NUR 918 Subject headings: cryptology / finite fields / elliptic curves / recurrences 2000 Mathematics Subject Classification: 94A60, 11T71, 14H52, 94A55 Cover: Paul Verspaget Printed by Universiteitsdrukkerij Technische Universiteit Eindhoven Speeding up Subgroup Cryptosystems proefschrift ter verkrijging van de graad van doctor aan de Technische Universiteit Eindhoven, op gezag van de Rector Magnificus, prof.dr. R.A. van Santen, voor een commissie aangewezen door het College voor Promoties in het openbaar te verdedigen op woensdag 4 juni 2003 om 16.00 uur door Martijn Stam geboren te Tilburg Dit proefschrift is goedgekeurd door de promotoren: prof.dr. A.K. Lenstra en prof.dr.ir. H.C.A van Tilborg De totstandkoming van dit proefschrift is mede mogelijk gemaakt door de STW. Opgedragen aan mijn lieve oma Geertje den Ouden-Heijkoop Preface The title of this thesis contains the word cryptosystem. Originally cryptosys- tems were used to make messages unintelligible for prying eyes; only the intended receiver could make up what the message said. In the very early beginnings this could be done by heart, then by hand using pencil and paper and later using tables and sophisticated mechanical devices. Today computers are used most of the times to implement cryptosystems that can provide confidentiality but also authenticity and other services. Authenticity is comparable to signing a letter by hand; the re- ceiver wants to be sure that the message does originate from whom he thinks it does.
    [Show full text]
  • Independence of the Miller-Rabin and Lucas Probable Prime Tests
    Independence of the Miller-Rabin and Lucas Probable Prime Tests Alec Leng Mentor: David Corwin March 30, 2017 1 Abstract In the modern age, public-key cryptography has become a vital component for se- cure online communication. To implement these cryptosystems, rapid primality test- ing is necessary in order to generate keys. In particular, probabilistic tests are used for their speed, despite the potential for pseudoprimes. So, we examine the commonly used Miller-Rabin and Lucas tests, showing that numbers with many nonwitnesses are usually Carmichael or Lucas-Carmichael numbers in a specific form. We then use these categorizations, through a generalization of Korselt’s criterion, to prove that there are no numbers with many nonwitnesses for both tests, affirming the two tests’ relative independence. As Carmichael and Lucas-Carmichael numbers are in general more difficult for the two tests to deal with, we next search for numbers which are both Carmichael and Lucas-Carmichael numbers, experimentally finding none less than 1016. We thus conjecture that there are no such composites and, using multi- variate calculus with symmetric polynomials, begin developing techniques to prove this. 2 1 Introduction In the current information age, cryptographic systems to protect data have become a funda- mental necessity. With the quantity of data distributed over the internet, the importance of encryption for protecting individual privacy has greatly risen. Indeed, according to [EMC16], cryptography is allows for authentication and protection in online commerce, even when working with vital financial information (e.g. in online banking and shopping). Now that more and more transactions are done through the internet, rather than in person, the importance of secure encryption schemes is only growing.
    [Show full text]
  • On the Hastad's Attack to LUC4,6 Cryptosystem and Compared with Other RSA-Type Cryptosystem ABSTRACT
    Malaysian Journal of Mathematical Sciences 7(S): 1-17 (2013) Special Issue: The 3rd International Conference on Cryptology & Computer Security 2012 (CRYPTOLOGY2012) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES Journal homepage: http://einspem.upm.edu.my/journal On the Hastad's Attack to LUC 4,6 Cryptosystem and Compared with Other RSA-Type Cryptosystem 1,2*Wong Tze Jin, 3Hailiza Kamarulhaili and 2,4 Mohd. Rushdan Md Said 1Department of Basic Science and Engineering, Faculty of Agriculture and Food Sciences, Universiti Putra Malaysia Bintulu Campus, 97008 Bintulu, Sarawak, Malaysia 2Institute for Mathematical Research, Universiti Putra Malaysia, 43400 UPM Serdang, Selangor, Malaysia 3School of Mathematical Sciences, Universiti Sains Malaysia, 11800 Pulau Pinang, Penang, Malaysia 4Department of Mathematics, Faculty of Sciences, Universiti Putra Malaysia, 43400 Serdang, Selangor, Malaysia E-mail: [email protected] *Corresponding author ABSTRACT The LUC 4,6 cryptosystem is a system analogy to RSA cryptosystem and extended from LUC and LUC 3 cryptosystems. Therefore, the security problem of the LUC 4,6 cryptosystem is based on integer factorization which is similar to RSA, LUC and LUC 3 cryptosystems. The Hastad's attack is one of the polynomial attack which relied on the polynomial structure of RSA-type cryptosystem. In this paper, Hastad's Theorem will be used to solve a system of multivariate modular equations and Coppersmith Theorem will be used to find a root of a modular equation. Thus, the number of plaintexts which are required to succeed the attack can be found. Keywords: Hastad's Theorem, Coppersmith Theorem, Lucas Sequence, Dickson Polynomial. Wong Tze Jin, Hailiza Kamarulhaili & Mohd.
    [Show full text]
  • Arxiv:2001.11839V1 [Math.CO] 30 Jan 2020 Ihiiilvalues Initial with Ubr Aebcm N Ftems Oua Eune Ostudy by to Denoted Sequences Numbers, Combinatorics
    SOME RESULTS ON AVERAGE OF FIBONACCI AND LUCAS SEQUENCES DANIEL YAQUBI AND AMIRALI FATEHIZADEH Abstract. The numerical sequence in which the n-th term is the average (that is, arithmetic mean) of the of the first n Fibonacci numbers may be found in the OEIS (see A111035 ). An interesting question one might pose is which terms of the sequences n ∞ n ∞ 1 1 Fi and Li (0.1) n i=1 n=1 n i=1 n=1 X X are integers? The average of the first three Fibonacci sequence, (1 + 1 + 3)/3=4/3, is not whereas the 24 Pi=1 Fi average of the first 24 Fibonacci sequence, 24 = 5058 is. In this paper, we address this question and also present some properties of average Fibonacci and Lucas numbers using the Wall-Sun-Sun prime conjecture. 1. Introduction Fibonacci numbers originally arose in a problem in Liber Abaci, published in 1202, which was one of the first texts to describe the Hindu-Arabic numeral system. Since then Fibonacci numbers have become one of the most popular sequences to study, appearing in a wealth of problems not only in enumerative combinatorics. The Fibonacci numbers, denoted by F ∞ , are defined by the following recurrence relation { n}n=0 Fn+1 = Fn + Fn 1, (1.1) − with initial values F0 = 0 and F1 = 1 . The first elements of this sequence are given in (A000045 ), as 0 1 1 2 3 5 8 13 21 .... arXiv:2001.11839v1 [math.CO] 30 Jan 2020 The Fibonacci numbers are closely related to binomial coefficients; it is a well-known fact that they are given by the sums of the rising diagonal lines of Pascal’s triangle (see [1]) n ⌊ 2 ⌋ n i F = − .
    [Show full text]