Primality Proving
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Classics Revisited: El´ Ements´ De Geom´ Etrie´ Algebrique´
Noname manuscript No. (will be inserted by the editor) Classics Revisited: El´ ements´ de Geom´ etrie´ Algebrique´ Ulrich Gortz¨ Received: date / Accepted: date Abstract About 50 years ago, El´ ements´ de Geom´ etrie´ Algebrique´ (EGA) by A. Grothen- dieck and J. Dieudonne´ appeared, an encyclopedic work on the foundations of Grothen- dieck’s algebraic geometry. We sketch some of the most important concepts developed there, comparing it to the classical language, and mention a few results in algebraic and arithmetic geometry which have since been proved using the new framework. Keywords El´ ements´ de Geom´ etrie´ Algebrique´ · Algebraic Geometry · Schemes Contents 1 Introduction . .2 2 Classical algebraic geometry . .3 2.1 Algebraic sets in affine space . .3 2.2 Basic algebraic results . .4 2.3 Projective space . .6 2.4 Smoothness . .8 2.5 Elliptic curves . .9 2.6 The search for new foundations of algebraic geometry . 10 2.7 The Weil Conjectures . 11 3 The Language of Schemes . 12 3.1 Affine schemes . 13 3.2 Sheaves . 15 3.3 The notion of scheme . 20 3.4 The arithmetic situation . 22 4 The categorical point of view . 23 4.1 Morphisms . 23 4.2 Fiber products . 24 4.3 Properties of morphisms . 28 4.4 Parameter Spaces and Representable Functors . 30 4.5 The Yoneda Lemma . 33 4.6 Group schemes . 34 5 Moduli spaces . 36 5.1 Coming back to moduli spaces of curves . 36 U. Gortz¨ University of Duisburg-Essen, Fakultat¨ fur¨ Mathematik, 45117 Essen, Germany E-mail: [email protected] 2 Ulrich Gortz¨ 5.2 Deformation theory . -
Radix-8 Design Alternatives of Fast Two Operands Interleaved
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.02, 2019 Radix-8 Design Alternatives of Fast Two Operands Interleaved Multiplication with Enhanced Architecture With FPGA implementation & synthesize of 64-bit Wallace Tree CSA based Radix-8 Booth Multiplier Mohammad M. Asad Qasem Abu Al-Haija King Faisal University, Department of Electrical Department of Computer Information and Systems Engineering, Ahsa 31982, Saudi Arabia Engineering e-mail: [email protected] Tennessee State University, Nashville, USA e-mail: [email protected] Ibrahim Marouf King Faisal University, Department of Electrical Engineering, Ahsa 31982, Saudi Arabia e-mail: [email protected] Abstract—In this paper, we proposed different comparable researches to propose different solutions to ensure the reconfigurable hardware implementations for the radix-8 fast safe access and store of private and sensitive data by two operands multiplier coprocessor using Karatsuba method employing different cryptographic algorithms and Booth recording method by employing carry save (CSA) and kogge stone adders (KSA) on Wallace tree organization. especially the public key algorithms [1] which proved The proposed designs utilized robust security resistance against most of the attacks family with target chip device along and security halls. Public key cryptography is with simulation package. Also, the proposed significantly based on the use of number theory and designs were synthesized and benchmarked in terms of the digital arithmetic algorithms. maximum operational frequency, the total path delay, the total design area and the total thermal power dissipation. The Indeed, wide range of public key cryptographic experimental results revealed that the best multiplication systems were developed and embedded using hardware architecture was belonging to Wallace Tree CSA based Radix- modules due to its better performance and security. -
Primality Testing for Beginners
STUDENT MATHEMATICAL LIBRARY Volume 70 Primality Testing for Beginners Lasse Rempe-Gillen Rebecca Waldecker http://dx.doi.org/10.1090/stml/070 Primality Testing for Beginners STUDENT MATHEMATICAL LIBRARY Volume 70 Primality Testing for Beginners Lasse Rempe-Gillen Rebecca Waldecker American Mathematical Society Providence, Rhode Island Editorial Board Satyan L. Devadoss John Stillwell Gerald B. Folland (Chair) Serge Tabachnikov The cover illustration is a variant of the Sieve of Eratosthenes (Sec- tion 1.5), showing the integers from 1 to 2704 colored by the number of their prime factors, including repeats. The illustration was created us- ing MATLAB. The back cover shows a phase plot of the Riemann zeta function (see Appendix A), which appears courtesy of Elias Wegert (www.visual.wegert.com). 2010 Mathematics Subject Classification. Primary 11-01, 11-02, 11Axx, 11Y11, 11Y16. For additional information and updates on this book, visit www.ams.org/bookpages/stml-70 Library of Congress Cataloging-in-Publication Data Rempe-Gillen, Lasse, 1978– author. [Primzahltests f¨ur Einsteiger. English] Primality testing for beginners / Lasse Rempe-Gillen, Rebecca Waldecker. pages cm. — (Student mathematical library ; volume 70) Translation of: Primzahltests f¨ur Einsteiger : Zahlentheorie - Algorithmik - Kryptographie. Includes bibliographical references and index. ISBN 978-0-8218-9883-3 (alk. paper) 1. Number theory. I. Waldecker, Rebecca, 1979– author. II. Title. QA241.R45813 2014 512.72—dc23 2013032423 Copying and reprinting. Individual readers of this publication, and nonprofit libraries acting for them, are permitted to make fair use of the material, such as to copy a chapter for use in teaching or research. Permission is granted to quote brief passages from this publication in reviews, provided the customary acknowledgment of the source is given. -
P-Adic Class Invariants
LMS J. Comput. Math. 14 (2011) 108{126 C 2011 Author doi:10.1112/S1461157009000175e p-adic class invariants Reinier Br¨oker Abstract We develop a new p-adic algorithm to compute the minimal polynomial of a class invariant. Our approach works for virtually any modular function yielding class invariants. The main algorithmic tool is modular polynomials, a concept which we generalize to functions of higher level. 1. Introduction Let K be an imaginary quadratic number field and let O be an order in K. The ring class field HO of the order O is an abelian extension of K, and the Artin map gives an isomorphism s Pic(O) −−! Gal(HO=K) of the Picard group of O with the Galois group of HO=K. In this paper we are interested in explicitly computing ring class fields. Complex multiplication theory provides us with a means of doing so. Letting ∆ denote the discriminant of O, it states that we have j HO = K[X]=(P∆); j where P∆ is the minimal polynomial over Q of the j-invariant of the complex elliptic curve j C=O. This polynomial is called the Hilbert class polynomial. It is a non-trivial fact that P∆ has integer coefficients. The fact that ring class fields are closely linked to j-invariants of elliptic curves has its ramifications outside the context of explicit class field theory. Indeed, if we let p denote a j prime that is not inert in O, then the observation that the roots in Fp of P∆ 2 Fp[X] are j j-invariants of elliptic curves over Fp with endomorphism ring O made computing P∆ a key ingredient in the elliptic curve primality proving algorithm [12]. -
Advanced Synthesis Cookbook
Advanced Synthesis Cookbook Advanced Synthesis Cookbook 101 Innovation Drive San Jose, CA 95134 www.altera.com MNL-01017-6.0 Document last updated for Altera Complete Design Suite version: 11.0 Document publication date: July 2011 © 2011 Altera Corporation. All rights reserved. ALTERA, ARRIA, CYCLONE, HARDCOPY, MAX, MEGACORE, NIOS, QUARTUS and STRATIX are Reg. U.S. Pat. & Tm. Off. and/or trademarks of Altera Corporation in the U.S. and other countries. All other trademarks and service marks are the property of their respective holders as described at www.altera.com/common/legal.html. Altera warrants performance of its semiconductor products to current specifications in accordance with Altera’s standard warranty, but reserves the right to make changes to any products and services at any time without notice. Altera assumes no responsibility or liability arising out of the application or use of any information, product, or service described herein except as expressly agreed to in writing by Altera. Altera customers are advised to obtain the latest version of device specifications before relying on any published information and before placing orders for products or services. Advanced Synthesis Cookbook July 2011 Altera Corporation Contents Chapter 1. Introduction Blocks and Techniques . 1–1 Simulating the Examples . 1–1 Using a C Compiler . 1–2 Chapter 2. Arithmetic Introduction . 2–1 Basic Addition . 2–2 Ternary Addition . 2–2 Grouping Ternary Adders . 2–3 Combinational Adders . 2–3 Double Addsub/ Basic Addsub . 2–3 Two’s Complement Arithmetic Review . 2–4 Traditional ADDSUB Unit . 2–4 Compressors (Carry Save Adders) . 2–5 Compressor Width 6:3 . -
Obtaining More Karatsuba-Like Formulae Over the Binary Field
1 Obtaining More Karatsuba-Like Formulae over the Binary Field Haining Fan, Ming Gu, Jiaguang Sun and Kwok-Yan Lam Abstract The aim of this paper is to find more Karatsuba-like formulae for a fixed set of moduli polynomials in GF (2)[x]. To this end, a theoretical framework is established. We first generalize the division algorithm, and then present a generalized definition of the remainder of integer division. Finally, a previously generalized Chinese remainder theorem is used to achieve our initial goal. As a by-product of the generalized remainder of integer division, we rediscover Montgomery’s N-residue and present a systematic interpretation of definitions of Montgomery’s multiplication and addition operations. Index Terms Karatsuba algorithm, polynomial multiplication, Chinese remainder theorem, Montgomery algo- rithm, finite field. I. INTRODUCTION Efficient GF (2n) multiplication operation is important in cryptosystems. The main advantage of subquadratic multipliers is that their low asymptotic space complexities make it possible to implement VLSI multipliers for large values of n. The Karatsuba algorithm, which was invented by Karatsuba in 1960 [1], provides a practical solution for subquadratic GF (2n) multipliers [2]. Because time and space complexities of these multipliers depend on low-degree Karatsuba-like formulae, much effort has been devoted to obtain Karatsuba-like formulae with low multiplication complexity. Using the Chinese remainder theorem (CRT), Lempel, Seroussi and Winograd obtained a quasi-linear upper bound of the multiplicative complexity of multiplying Haining Fan, Ming Gu, Jiaguang Sun and Kwok-Yan Lam are with the School of Software, Tsinghua University, Beijing, China. E-mails: {fhn, guming, sunjg, lamky}@tsinghua.edu.cn 2 two polynomials over finite fields [3]. -
Cs51 Problem Set 3: Bignums and Rsa
CS51 PROBLEM SET 3: BIGNUMS AND RSA This problem set is not a partner problem set. Introduction In this assignment, you will be implementing the handling of large integers. OCaml’s int type is only 64 bits, so we need to write our own way to handle very 5 large numbers. Arbitrary size integers are traditionally referred to as “bignums”. You’ll implement several operations on bignums, including addition and multipli- cation. The challenge problem, should you choose to accept it, will be to implement part of RSA public key cryptography, the protocol that encrypts and decrypts data sent between computers, which requires bignums as the keys. 10 To create your repository in GitHub Classroom for this homework, click this link. Then, follow the GitHub Classroom instructions found here. Reminders. Compilation errors: In order to submit your work to the course grading server, your solution must compile against our test suite. The system will reject 15 submissions that do not compile. If there are problems that you are unable to solve, you must still write a function that matches the expected type signature, or your code will not compile. (When we provide stub code, that code will compile to begin with.) If you are having difficulty getting your code to compile, please visit office hours or post on Piazza. Emailing 20 your homework to your TF or the Head TFs is not a valid substitute for submitting to the course grading server. Please start early, and submit frequently, to ensure that you are able to submit before the deadline. Testing is required: As with the previous problem sets, we ask that you ex- plicitly add tests to your code in the file ps3_tests.ml. -
Kummer Surfaces for Primality Testing
Kummer surfaces for primality testing Eduardo Ru´ız Duarte & Marc Paul Noordman Universidad Nacional Aut´onoma de M´exico, University of Groningen [email protected], [email protected] Abstract We use the arithmetic of the Kummer surface associated to the Jacobian of a hyperelliptic curve to study the primality of integersof the form 4m25n 1. We providean algorithmcapable of proving the primality or compositeness of most of the− integers in these families and discuss in detail the necessary steps to implement this algorithm in a computer. Although an indetermination is possible, in which case another choice of initial parameters should be used, we prove that the probability of reaching this situation is exceedingly low and decreases exponentially with n. Keywords: Primality, Jacobians, Hyperelliptic Curves, Kummer Surface 2020 MSC: 11G25, 11Y11, 14H40, 14H45 Introduction Determining the primality of an arbitrary integer n is a fundamental problem in number theory. The first deterministic polynomial time primality test (AKS) was developed by Agrawal, Kayal and Saxena [3]. Lenstra and Pomerance in [25] proved that a variant of AKS has running time (log n)6(2+log log n)c where c isaneffectively computablereal number. The AKS algorithm has more theoretical relevance than practical. If rather than working with general integers, one fixes a sequence of integers, for example Fermat or Mersenne numbers, one can often find an algorithm to determine primality using more efficient methods; for these two examples P´epin’s and Lucas-Lehmer’s tests respectively provide fast primality tests. Using elliptic curves, in 1985, Wieb Bosma in his Master Thesis [5] found analogues of Lucas tests for elements in Z[i] or Z[ζ] (with ζ a third root of unity) by replacing the arithmetic of (Z/nZ)× with the arithmetic of elliptic curves modulo n with complex multiplication (CM). -
Quadratic Frobenius Probable Prime Tests Costing Two Selfridges
Quadratic Frobenius probable prime tests costing two selfridges Paul Underwood June 6, 2017 Abstract By an elementary observation about the computation of the difference of squares for large in- tegers, deterministic quadratic Frobenius probable prime tests are given with running times of approximately 2 selfridges. 1 Introduction Much has been written about Fermat probable prime (PRP) tests [1, 2, 3], Lucas PRP tests [4, 5], Frobenius PRP tests [6, 7, 8, 9, 10, 11, 12] and combinations of these [13, 14, 15]. These tests provide a probabilistic answer to the question: “Is this integer prime?” Although an affirmative answer is not 100% certain, it is answered fast and reliable enough for “industrial” use [16]. For speed, these various PRP tests are usually preceded by factoring methods such as sieving and trial division. The speed of the PRP tests depends on how quickly multiplication and modular reduction can be computed during exponentiation. Techniques such as Karatsuba’s algorithm [17, section 9.5.1], Toom-Cook multiplication, Fourier Transform algorithms [17, section 9.5.2] and Montgomery expo- nentiation [17, section 9.2.1] play their roles for different integer sizes. The sizes of the bases used are also critical. Oliver Atkin introduced the concept of a “Selfridge Unit” [18], approximately equal to the running time of a Fermat PRP test, which is called a selfridge in this paper. The Baillie-PSW test costs 1+3 selfridges, the use of which is very efficient when processing a candidate prime list. There is no known Baillie-PSW pseudoprime but Greene and Chen give a way to construct some similar counterexam- ples [19]. -
ATKIN's ECPP (Elliptic Curve Primality Proving) ALGORITHM
ATKIN’S ECPP (Elliptic Curve Primality Proving) ALGORITHM OSMANBEY UZUNKOL OCTOBER 2004 ATKIN’S ECPP (Elliptic Curve Primality Proving ) ALGORITHM A THESIS SUBMITTED TO DEPARTMENT OF MATHEMATICS OF TECHNICAL UNIVERSITY OF KAISERSLAUTERN BY OSMANBEY UZUNKOL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN THE DEPARTMENT OF MATHEMATICS October 2004 abstract ATKIN’S ECPP ALGORITHM Uzunkol, Osmanbey M.Sc., Department of Mathematics Supervisor: Prof. Dr. Gerhard Pfister October 2004, cxxiii pages In contrast to using a strong generalization of Fermat’s theorem, as in Jacobi- sum Test, Goldwasser and Kilian used some results coming from Group Theory in order to prove the primality of a given integer N ∈ N. They developed an algorithm which uses the group of rational points of elliptic curves over finite fields. Atkin and Morain extended the idea of Goldwasser and Kilian and used the elliptic curves with CM (complex multiplication) to obtain a more efficient algorithm, namely Atkin’s ECPP (elliptic curve primality proving) Algorithm. Aim of this thesis is to introduce some primality tests and explain the Atkin’s ECPP Algorithm. Keywords: Cryptography, Algorithms, Algorithmic Number Theory. ii oz¨ Herg¨unbir yere konmak ne g¨uzel, Bulanmadan donmadan akmak ne ho¸s, D¨unleberaber gitti canca˘gızım! Ne kadar s¨ozvarsa d¨uneait, S¸imdi yeni ¸seylers¨oylemeklazım... ...............Mevlana Celaleddini’i Rumi............... iii I would like to thank first of all to my supervisor Prof. Dr . Gerhard Pfister for his help before and during this work. Secondly, I would like to thank also Hans Sch¨onemann and Ra¸sitS¸im¸sekfor their computer supports in computer algebra system SINGULAR and programming language C++, respectively. -
Modern Computer Arithmetic
Modern Computer Arithmetic Richard P. Brent and Paul Zimmermann Version 0.3 Copyright c 2003-2009 Richard P. Brent and Paul Zimmermann This electronic version is distributed under the terms and conditions of the Creative Commons license “Attribution-Noncommercial-No Derivative Works 3.0”. You are free to copy, distribute and transmit this book under the following conditions: Attribution. You must attribute the work in the manner specified • by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Noncommercial. You may not use this work for commercial purposes. • No Derivative Works. You may not alter, transform, or build upon • this work. For any reuse or distribution, you must make clear to others the license terms of this work. The best way to do this is with a link to the web page below. Any of the above conditions can be waived if you get permission from the copyright holder. Nothing in this license impairs or restricts the author’s moral rights. For more information about the license, visit http://creativecommons.org/licenses/by-nc-nd/3.0/ Preface This is a book about algorithms for performing arithmetic, and their imple- mentation on modern computers. We are concerned with software more than hardware — we do not cover computer architecture or the design of computer hardware since good books are already available on these topics. Instead we focus on algorithms for efficiently performing arithmetic operations such as addition, multiplication and division, and their connections to topics such as modular arithmetic, greatest common divisors, the Fast Fourier Transform (FFT), and the computation of special functions. -
Constructive and Computational Aspects of Cryptographic Pairings
Constructive and Computational Aspects of Cryptographic Pairings Michael Naehrig Constructive and Computational Aspects of Cryptographic Pairings PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Technische Universiteit Eindhoven, op gezag van de Rector Magnificus, prof.dr.ir. C.J. van Duijn, voor een commissie aangewezen door het College voor Promoties in het openbaar te verdedigen op donderdag 7 mei 2009 om 16.00 uur door Michael Naehrig geboren te Stolberg (Rhld.), Duitsland Dit proefschrift is goedgekeurd door de promotor: prof.dr. T. Lange CIP-DATA LIBRARY TECHNISCHE UNIVERSITEIT EINDHOVEN Naehrig, Michael Constructive and Computational Aspects of Cryptographic Pairings / door Michael Naehrig. – Eindhoven: Technische Universiteit Eindhoven, 2009 Proefschrift. – ISBN 978-90-386-1731-2 NUR 919 Subject heading: Cryptology 2000 Mathematics Subject Classification: 94A60, 11G20, 14H45, 14H52, 14Q05 Printed by Printservice Technische Universiteit Eindhoven Cover design by Verspaget & Bruinink, Nuenen c Copyright 2009 by Michael Naehrig Fur¨ Lukas und Julius Promotor: prof.dr. T. Lange Commissie: prof.dr.dr.h.c. G. Frey (Universit¨at Duisburg-Essen) prof.dr. M. Scott (Dublin City University) prof.dr.ir. H.C.A. van Tilborg prof.dr. A. Blokhuis prof.dr. D.J. Bernstein (University of Illinois at Chicago) prof.dr. P.S.L.M. Barreto (Universidade de S˜ao Paulo) Alles, was man tun muss, ist, die richtige Taste zum richtigen Zeitpunkt zu treffen. Johann Sebastian Bach Thanks This dissertation would not exist without the help, encouragement, motivation, and company of many people. I owe much to my supervisor, Tanja Lange. I thank her for her support; for all the efforts she made, even in those years, when I was not her PhD student; for taking care of so many things; and for being a really good supervisor.