Cryptography, Information Theory, and Error-Correction. Aiden A. Bruen
Чтение книги онлайн.

Читать онлайн книгу Cryptography, Information Theory, and Error-Correction - Aiden A. Bruen страница 37

СКАЧАТЬ following principle to get the remainder of a product of two numbers.

      Let us calculate 4 1 Superscript 23 and get the remainder upon division by 55.

      In detail, x Superscript 1 Baseline equals 41, nothing more to do. Then, x squared equals 4 1 squared equals 1681 gives a remainder of 31 when divided by 55. Proceeding, instead of calculating x Superscript 4 Baseline equals 168 1 squared by squaring x squared, we need only calculate 3 1 squared and get the remainder on division by 55 which is 26. Now, to get the next term in the product (namely x Superscript 16) instead of squaring x Superscript 4to get x Superscript 8and then squaring again to get x Superscript 16we need only square 26, get the remainder and square the remainder again and finally get the remainder on division by 55 which is 36. So the four remainders for x comma x squared comma x Superscript 4 Baseline comma x Superscript 16 are 41, 31, 26, 36. In principle, now we have to multiply 41 by 31 by 26 by 36 and get the remainder on division by 55. Again, we can take shortcuts using Principle 2. We can multiply 41 by 31 and get the remainder. We calculate left-parenthesis 26 right-parenthesis left-parenthesis 36 right-parenthesis and get the remainder (on division by 55). Multiplying the 2 remainders together, and getting the remainder, on division by 55, gives us the answer. The two remainders are 6 and 1. Then left-parenthesis 6 right-parenthesis left-parenthesis 1 right-parenthesis equals 6 and B ends up recovering the message which is 6. Note that in the example above, upper N is the product p q of two distinct primes p and q with p equals 11 and q equals 5. The enciphering index e is 7, M is 6, the cipher text upper C is 41, and the deciphering index d is 23.

       Several remarks are in order.

      1 The fact that B deciphers to recover the message by simply using the deciphering algorithm explained above is proved in Chapter 19.

      2 Having found a decryption index by the official (hard) way, let us find an easier method. All we need is the unique integer, let us call it , between 1 and 20, such that gives a remainder of 1 when divided by 20. Why 20? Well, instead of using , we can use any positive integer divisible by both and . With and , we choose the number 20, and get . Then it is easy to check that the remainder of upon division by 55 is 6. It is much easier to use the decryption index 3 instead of the decryption index 23.

      3 The security of RSA rests on the mathematically unproven assumption that, even given , , , an individual (other than B) cannot recover in a reasonable amount of time if and are large.

      Given e and the two factors p comma q of upper N it is easy to calculate d and thus to obtain upper M from upper C (see Chapter 19). Thus, if one can solve the problem of factoring upper N quickly one can calculate d quickly and thus СКАЧАТЬ