Number theory
Co-prime numbers
We say two numbers are co-prime if they share only one common divisor, and that divisor is 1. For example, 4 and 7 are co-prime.
Euler’s phi function
It is also called the phi function, it counts the number of positive integers less than that are co-prime with . The phi function is denoted using greek letter . Consider the below example: Numbers that are co-prime to 8 are: 1, 3, 5, 7.
When with and are prime, and , we have can obtain phi with the below equation:
Greatest Common Divisor (GCD)
The greatest common divisor of and is the largest integer that divides both and . For example:
Euclidean algorithm
Euclidean algorithm is a procedure for determining the Greatest Common Divisor (GCD) of two positive integer.
Finite fields
A finite field or Galois field is a mathematical structure consisting of a finite set of numbers where you can perform addition, subtraction, multiplication, and division (except by zero), and the results remain within the field. Finite fields are commonly denoted as for prime , where the set contains the integers , and all arithmetic is done modulo .
Prime Fields : The simplest type of finite fields has a prime number of elements. Arithmetic in this field is done modulo , meaning the result of any operation is reduced by .
Example: In , the numbers are , and would be 1 (since )
Primitive root (generator)
A primitive root of a prime number is a integer such that every nonzero element in can be written as a power of modulo . In more formal terms, is a primitive root or generator if the powers generate all the elements of the group which consists of the integers
Example: In , 3 is a primitive root because:
This show that the power of 3 generate all the elements , so 3 is a primitive root or generator.
Discrete Logarithm Problem (DLP)
According to the trapdoor property, it is computationally infeasible to compute the discrete logarithm equation below, where , and are given, is a primitive root of , and is extremely large (greater than 2048 bits to represent ).
Abstract algebra
Back to parent page: Cyber Security and Security Engineering