aina_final

56
A Project Report On New Encryption and Decryption Techniques on Z N (3) and Z N (4) Submitted by Aina Gupta 13MSM001 Department of Applied Sciences ITM University, Gurgaon Haryana, India

Upload: chandramowliswaran-narayanaswamy

Post on 12-Apr-2017

249 views

Category:

Documents


2 download

TRANSCRIPT

A Project Report

On

New Encryption and Decryption Techniques on ZN(3) and ZN

(4)

Submitted by

Aina Gupta

13MSM001

Department of Applied Sciences

ITM University, Gurgaon

Haryana, India

A Project Report

On

New Encryption and Decryption Techniques on ZN(3) and ZN

(4)

submitted in partial fulfillment of the requirement for the award of the degree

In

Master of Science (Mathematics)

by

Aina Gupta

13MSM001

Under the supervision of

Prof. N. Chandramowliswaran

and

Dr. Gaurav Gupta

(Assistant Professor)

Department of Applied Sciences

ITM University, Gurgaon,

Haryana, India

May 2015

DECLARATION

I certify that the work contained in this dissertation is original and has been done

by me in the Department of Applied Sciences, ITM University Gurgaon under the

guidance of my supervisor Dr. Gaurav Gupta and Prof N. Chandramowliswaran.

The matter presented in this dissertation has not been submitted by me for the

award of any other degree of this or any other Institute. I have conformed to the

norms and guidelines given in the Ethical Code of Conduct of the Institute.

Whenever I have used information (theoretical analysis, text) from other sources, I

have given due credit to them by citing them in the report.

Signature of the student

CERTIFICATE

This is to certify that the Dissertation Report entitled “New Encryption and

Decryption Techniques on ZN(3)

and ZN(4)

” submitted by “Ms. AINA

GUPTA” to ITM University, Gurgaon, India is a record of bona fide project work

carried out by her under my supervision and guidance and is worthy of

consideration for the award of the degree in MASTER OF SCIENCE

(MATHEMATICS) of the Institute.

Prof. N. Chandramowliswaran Dr. Gaurav Gupta

(Assistant Professor)

Date:

To

Mummy - Papa

&

My brother

Pranav

ACKNOWLEDGEMENTS

I am thankful and grateful to my guide Dr. Gaurav Gupta and Prof. N.

Chandramowliswaran for giving me such a project which allows me to show my

dexterity and my adroitness. This topic may be different but there are many keys to

open this lock and I have used it. There are many books by which I am helped a lot

and some help provided by internet too.

Besides my guide, I would like to thank all the faculty members of Applied

Sciences, friends and family for their continuous support.

ABSTRACT

As the field of cryptography grows to incorporate new ideas and strategies

for encryption, decryption, key exchange problems and zero knowledge transfer

protocols lot of algebraic and Number theory methods have been heavily used. In

this dissertation we came up with new encryption, decryption bijective functions.

We generated a family of new encryption functions on Z(3)N and Z

(4)N .

Contents

1 Introduction 1

1.1 Why Cryptography? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

1.2 Encryption and Decryption: . . . . . . . . . . . . . . . . . . . . . . . . 4

1.2.1 Cryptography is partitioned into two classifications: . . . . . 5

2 Premilinaries 10

2.1 Bijective Functions: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

2.2 GCD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

2.2.1 The gcd has the following properties: . . . . . . . . . . . . . . 11

2.3 Prime Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

2.4 Fundamental theorem of arithmetic . . . . . . . . . . . . . . . . . . . 12

2.5 Definition and basic properties of congruences . . . . . . . . . . . . . 12

2.5.1 Properties of Congruence: . . . . . . . . . . . . . . . . . . . . . 13

2.5.2 Lemma (N. Chandramowliswaran et al.): . . . . . . . . . . . . . 14

2.6 Linear Congruences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

2.7 Eulers phi function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

2.7.1 Properties: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

2.8 Euler- Fermat Theorem . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

2.9 Fermats Little Theorem . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

2.10 Chinese Remainder Theorem . . . . . . . . . . . . . . . . . . . . . . . 19

2.11 Möbius function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

2.11.1 Properties: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

3 Encryption and Decryption on Z(3)N and Z

(4)N 21

3.1 A: Find a new bijective map f : Z(4)N −→ Z

(4)N . . . . . . . . . . . . . . 21

3.1.1 Composition: . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

3.2 B: Find a new bijective map f : Z(4)N −→ Z

(4)N . . . . . . . . . . . . . . . 27

2

3.2.1 f is bijective? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

3.2.2 Composition: . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

3.3 C: Find a new bijective map f : Z(3)N −→ Z

(3)N . . . . . . . . . . . . . . 32

3.3.1 Total Number of Bijective Functions . . . . . . . . . . . . . . . 37

3.4 D: Find a new bijective map f : Z(4)N −→ Z

(4)N . . . . . . . . . . . . . . 38

4 Conclusion and Future Work 44

4.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

4.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Bibliography 45

Chapter 1

Introduction

Cryptography is a logical blend of numerical hypothesis and computational ap-

plication which permits the classified exchange of data. It empowers you to store

delicate data or transmit it crosswise over unstable systems (like the Internet) so

that it can’t be read by anybody with the exception of the proposed beneficiary.

Cryptography is the accumulation of systems and methodologies for cover-

ing data in interchanges from the entrance by uninvited or unapproved gather-

ings. A consistent craftsmanship for managing this issue is known from right

on time vestige and it grew along the hundreds of years, generally in the cas-

ing in which two gatherings, say aristocrat and general imparted in composed

by sending one another messages which could just be comprehended when know-

ing some extra information, mystery keys and the points of interest for the tech-

nique of encoding and decoding the messages calculation. Calculations were fre-

quently collected from a gathering of helpful fundamental thoughts, known by

tradition.Today, cryptography is a foundation of the present day security advance-

ments used to secure data and assets on both open and shut systems.

Advanced cryptography is intensely taking into account numerical hypothe-

sis and software engineering practice; cryptographic calculations are composed

around computational hardness suspicions, making such calculations difficult to

break by and by any enemy. It is hypothetically conceivable to break such a frame-

work, yet it is infeasible to do as such by any known useful means. These plans

are subsequently termed computationally secure; hypothetical advances, e.g., en-

hancements in number factorization calculations, and speedier figuring innovation

1

require these answers for be consistently adjusted. There exist data hypothetically

secure plans that provably can’t be equaled the initial investment with boundless

figuring power−a case is the one−time pad yet these plans are more hard to exe-

cute than the best hypothetically flimsy however computationally secure compo-

nents.

An one-time Pad (OTP) is an encryption system that can’t be split if utilized

effectively. In this strategy, a plaintext is combined with an irregular mystery key

. At that point, every bit or character of the plaintext is encoded by consolidating

it with the relating bit or character from the pad utilizing measured expansion.

In the event that the key is really irregular, is at any rate the length of the plain-

text, is never reused in entire or to some extent, and is kept totally mystery, then

the subsequent ciphertext will be difficult to unscramble. It has additionally been

demonstrated that any figure with the ideal mystery property must utilize keys

with adequately the same necessities as OTP keys. Notwithstanding, functional

issues have kept one-time pad from being generally utilized.

1.1 Why Cryptography?

Cryptography is vital in ordinary life. When you purchase from a site, for exam-

ple, flipkart you are depending upon public key cryptography to keep your credit

card points of interest safe. At the point when your working programming con-

sequently redesigns over the web it too will utilize an public key calculation to

watch that the redesign it is going to introduce was truly distributed by the right

individuals, and not by somebody attempting to get into your PC.

Without cryptography money machines would not be conceivable, as the ma-

chines would not have the capacity to dependably speak with the bank PCs. With-

out cryptography, even the thought of electronic voting would not be conceivable.

Cryptographic thoughts can likewise be utilized as a part of making message

2

simpler to decipher without these thoughts we would not have mistake checking

capacities on correspondences lines, and the web would run significantly more

gradually. We would not have the capacity to decrease excess in a message and

thus pack it, accordingly invalidating prevalent archival projects, for example,

’zip’.

These thoughts, making messages minimized, mistake safe, secure (or the ma-

jority of the above) are identified with cryptography.

We need cryptography due to many reasons

Suppose Alice wants to send a message to Bob then things to be taken care of

are [12]

1. Authentication: Affirmation that the imparting substance is the one asserted

as it were Bob realizes that Alice could have sent the message he has recently got-

ten.

2. Access control: When verification is provided,access control is the adminis-

tration of controlling/restricting access to host frameworks and applications in a

system.

3. Data Confidentiality: Insurance of information from unapproved divulgence.

As such a message sent from Alice to Bob can’t be read by any other person.

4. Data Integrity: Confirmation that information got is as sent by an approved

element. As such Bob realizes that the message from Alice has not been altered

inside of travel.

5. Non-Repudiation: Security against disavowal by one of the gatherings in a

correspondence. As such it is outlandish for Alice to pivot later and say she didn’t

send the message.

3

Notwithstanding these,availability is likewise vital and hard to give. Assets

ought to dependably be accessible to those with fitting access benefits. An aggres-

sor ought not have the capacity to interfere, or pointlessly ease off, access to the

asset.

1.2 Encryption and Decryption:

In today’s advanced world, encryption is developing as a disintegrable piece of

all correspondence systems and data handling frameworks, for ensuring both put

away also, in travel information world .Security has turn into an progressively

critical component with the development of complex electronic correspondence.

Encryption is the change of plain information (known as plaintext) into indis-

cernible information (known as cipher content) through a calculation alluded to as

figure. Encryption is the change of information into a frame that is as near to incon-

ceivable as could reasonably be expected to peruse without the fitting information

(a key). Its objective is to guarantee security by keeping data avoided anybody

for whom it is most certainly not planned, even the individuals who have entry

to the encoded information.Decryption is the procedure of changing over cipher

text back to plain text.A cipher is a couple of calculations that make the encryption

and the decoding. The itemized operation of a cipher is controlled both by the cal-

culation and in every occurrence by a "key". This is a mystery (in a perfect world

known just to the communicants), ordinarily a short series of characters, which is

expected to decode the ciphertext.

The AES otherwise called the Rijndael calculation was chosen as a Standard

by National Foundation of Standards and Technology (NIST).Advanced Encryp-

tion Standard (Rijndael Block Cipher) turned into the new US Federal Information

Processing Standard on November 26, 2001[17, 5] to supplant the Data Encryption

Standard (DES) which was utilized for more than 20 a long time as a typical key

4

piece figure for FIPS.

Cryptography has a fundamental part in inserted frameworks outline. To-

day innovation going on profound submicron innovation as the quantity of gad-

gets and applications which send and get information are expanding quickly the

information exchange rates are getting to be higher. In numerous applications,

this information obliges a secured association which is generally accomplished by

cryptography.[14]

1.2.1 Cryptography is partitioned into two classifications:

1. Conventional Cryptography: In conventional cryptography, likewise called

secret key or symmetric-key encryption, one key is utilized both for encryption

and unscrambling. An amazingly straightforward illustration of traditional cryp-

tography is a substitution figure. A substitution figure substitutes one bit of data

for another. This is most as often as possible done by balancing letters of the alpha-

bet,for case: Julius Caesar’s cipher.The calculation is to balance the letter set and

the key is the quantity of characters to counterbalance it.

Case in point, on the off chance that we encode "SECRET" utilizing Caesar’s key

estimation of 3, we balance the letters in order so that the 3rd letter down (D) starts

the letter set.

So beginning with

ABCDEFGHIJKLMNOPQRSTUVWXYZ

also, sliding everything up by 3, you get

DEFGHIJKLMNOPQRSTUVWXYZABC where D=A, E=B, F=C, etc

Utilizing this plan, the plain text, "SECRET" scrambles as "VHFUHW." To per-

mit another person to peruse the cipher text, you let them know that the key is 3.

Clearly, this is exceedingly feeble cryptography by all accounts.

5

2. Public Key Cryptography: The issues of key circulation are comprehended

by Public key cryptography.Public key cryptography is a hilter kilter plan that uses

a couple of keys for encryption: an open key, which scrambles information, and a

relating private, or mystery key for decoding. You distribute your open key to

the world while keeping your private key secret.It is computationally infeasible to

reason the private key from general society key. Any individual who has an open

key can scramble data however can’t unscramble it. Just the individual who has

the relating private key can decode the data.

Public key cryptography relies on the presence of one-way capacities, or nu-

merical capacities that are anything but difficult to figure while their reverse ca-

pacity is generally hard to register.

Here are two basic cases:

1. Multiplication versus factorization: Suppose we have two prime numbers,

5 and 11, and that we need to ascertain the product; it ought to take no time to

figure that esteem, which is 55. Presently assume, rather, we have a number, 55,

and we need which combine of prime numbers are duplicated together to acquire

that number. We will in the long run concoct the arrangement yet while figuring

the product took seconds, factorization will take longer. The issue turns out to be

much harder on the off chance that we begin with primes that have 500 digits or

somewhere in the vicinity, in light of the fact that the product will have 1000 digits.

2. Exponentiation versus logarithms: Suppose we need to take the number 4 to

the 5th power; once more, it is moderately simple to figure 45 = 1024. Anyhow, we

have the number 1024 and needs to know the two whole numbers that are utilized,

x and y so that logx1024 = y, it will take more time to locate the two numbers.

While the samples above are unimportant, they do speak to two of the use-

ful sets that are utilized with open key cryptography; in particular, the simplicity

6

of duplication and exponentiation versus the relative trouble of factorization and

figuring logarithms, separately.

A few samples of open key cryptosystems are Elgamal (named for its creator,

Taher Elgamal), RSA (named for its creators, Ron Rivest, Adi Shamir, and Leonard

Adleman).

Cryptanalysis : [15] The objective of cryptanalysis is to discover some shortcom-

ing or instability in a cryptographic plan, consequently allowing its subversion

or avoidance. It is a typical confusion that each encryption strategy can be bro-

ken. Regarding his WWII work at Bell Labs, Claude Shannon demonstrated that

the one-time pad figure is unbreakable, if the key material is genuinely irregular,

never reused, kept mystery from all conceivable aggressors, and of equivalent or

more noteworthy length than the message. Most ciphers, aside from the one-time

pad, can be broken with enough computational exertion by savage power assault,

yet the measure of exertion required may be exponentially reliant on the key size,

when contrasted with the exertion required to make utilization of the cipher .

Now, I would like to come to my pivotal topic, that is, Algebra. As the field

of cryptography grows to incorporate new ideas and methods, the cryptographic

applications of number theory have likewise widened. Notwithstanding logical

number theory, increasing use has been made of algebraic number hypothesis and

algebraic geometry. Key dissemination is a chief issue in cryptographic structures

and is a genuine piece of the security subsystem of correspondence structures and

data frameworks. If customers of a social event wish to impart using symmetric

encryption,they must share an ordinary key. Secret sharing insinuates the frame-

work for scattering a riddle amongst a group, each of whom is appointed with

shares of secret. The puzzle can be recovered exactly when sufficient number of

shares are combined together. Secret sharing was created autonomously by Adi

7

Shamir[1] and George Blakley[2]. Secret sharing arrangements is ideal for secur-

ing information that is exceptionally sensitive. If customers of a social occasion

wish to pass on using symmetric encryption, they have to share a commonplace

key. A protected secret sharing arrangement disperses confers so that anyone less

than p shares has no extra information about the secret than some individual with

0 shares.

A percentage of the late applications of number theory and algebraic methods

to cryptography - the number field seive strategy for factoring large numbers, uti-

lizing bijective capacities with the end goal of encryption and decoding. We get

from it what we desire for and it is very useful in all the manner.

Why do we need bijective functions for Encryption? An encryption calculation

is not so much a well defined function, in the numerical sense. Regardless, it is

fundamental that under no situation the calculation delineate diverse inputs to

the same yield else unscrambling is inconceivable. In this way, if the encryption

calculation is deterministic, it is no less than an injective function. Also, if the de-

coding calculation can acknowledge any string as a ciphertext, then the encryption

calculation should likewise be surjective, and in this case it is bijective.

case in point

In the event that Alice needs to transmit a vital private message to Bob, it would

be shrewd of her to scramble it with an encryption capacity,

e :< messages >→< encodedmessage > (1.1)

Obviously, this capacity must be invertible for deciphering to be conceivable and

is subsequently a bijection. Its converse is the decoding capacity d(.).

8

Trapdoor functions: An open key cryptosystem has the property that somebody

who knows just how to encipher can’t utilize the enciphering key to locate the

decoding key without a restrictively extensive calculation. At the end of the day

the enciphering capacity g : X −→ Y is easy to figure once the enciphering key

E is known, yet it is hard practically speaking to register the converse capacity

g−1 : Y −→ X. That is, from the outlook of practical processability, g is not in-

vertible (without some extra data - the translating key D). Such a capacity g is

known as a trapdoor capacity. That is, a trapdoor capacity g is a capacity which is

anything but difficult to process however whose opposite g−1 is difficult to figure

without having some extra assistant data past what is important to register g. The

backwards g−1 is anything but difficult to figure, nonetheless, for somebody who

has this data D.

N. Chandramowliswaran et.al proposed a new key generation algorithms us-

ing theory of numbers in 2012[11], using Pells equation in 2013 [7] , using given

set of primes 2014 [6] , using non-homogenous equations [9]. A large portion of

the specialized terms can be found there or in the course readings, for example,

Apostol (1976)[13], Koblitz (1994)[10], Stallings[16], An Introduction to the Theory

of Numbers by Ivan Niven, Herbert S. Zuckerman and Hugh L. Montgomery [3].

Many basic concepts can be found in the above mentioned books or in the talk

given by N. Chandramowliswaran [8] or Number Theory as given by Naoki Sato

[4].

9

Chapter 2

Premilinaries

2.1 Bijective Functions:

A bijection is a capacity between the components of two sets, where each com-

ponent of one set is matched with precisely one component of the other set, and

each component of the other set is combined with precisely one component of the

first set. There are no unpaired components.Mathematically, a bijective function

f : A −→ B is a one-to-one (injective) and onto (surjective) mapping of a set A to a

set B.

A bijection from the set A to the set B has a converse capacity from B to A. On

the off chance that A and B are limited sets, then the presence of a bijection implies

they have the same number of components.

For a mapping between 2 sets A and B to be a bijection, four properties must

hold:

• every component of A absolute necessity be combined with no less than one

component of B

• no component of A may be combined with more than one component of B

• every component of B must be combined with no less than one component

of A

• no component of B may be combined with more than one component of A

10

Example: The function f(x) = x from the set of integers to integers is injective

and surjective. Thus it is also bijective.

2.2 GCD

Theorem: Given any two integers a and b, there is one and only one number d

with the following properties:

• d ≥ 0

• d|a and d|b

• e|a and e|b =⇒ e|d

Note. d = 0 if, and only if a = b = 0 . Otherwise d ≥ 1

• The number d of the above theorem is called the greatest common divisor

(GCD) of a and b.

• It is denoted by (a, b)

• If (a, b) = 1 then a and b are said to be relatively prime.

2.2.1 The gcd has the following properties:

1. (a, b) = (b, a) (commutative)

2. (a, (b, c)) = ((a, b), c) (associative)

3. (ac, bc) = |c|(a, b) (distributive)

4. (a, 1) = (1, a) = 1 and (a, 0) = (0, a) = 0

5. If a|bc and if (a, b) = 1 , then a|c

11

6. Let (a, b) = 1 and d be any divisor of a + b , that is, d|a + b. then (a, d) =

(b, d) = 1

7. If (a, b) = 1 =⇒ (am, bn) = 1 for m ≥ 1 and n ≥ 1

8. (a, b) = 1,(a, c) = 1 and (b, c) = 1 if, and only if (abc, ab+ ac+ bc) = 1

2.3 Prime Numbers

Definition : An integer p is called prime if p > 1 and if the only positive divisors

of p are 1 and p. When an integer p is not prime, we say that p is composite.

• If a prime p does not divide a, then (p, a) = 1

• If a prime p divides ab, then p|a or p|b

• Any two consecutive integers are relatively prime.

2.4 Fundamental theorem of arithmetic

Every integer n > 1 can be represented as a product of prime factors in only one

way, apart from the order of the factors.

2.5 Definition and basic properties of congruences

Given integers a,b,m with m > 0. We say that a is congruent to b modulo m, and

we write

a ≡ b(Modm) (2.1)

if m divides the difference a− b or m|(a− b).

The number m is called the modulus of the congruence.

12

Example: 20 ≡ 3(Mod17)

2.5.1 Properties of Congruence:

1. Congruence is an equivalence relation,i.e.,

• a ≡ a(Modm) (reflexivity)

• a ≡ b(Modm) =⇒ b ≡ a(Modm) (symmetry)

• a ≡ b(Modm) and b ≡ c(Modm) =⇒ a ≡ c(Modm) (transitivity)

2. If a ≡ b(Modm) and c ≡ d(Modm). then

3. ax+ cy ≡ bx+ dy(Modm) for all integers x and y.

4. ac ≡ bd(Modm)

5. an ≡ bn(Modm) for every positive integer n.

6. f(a) ≡ f(b)(Modm) for every polynomial f with integer coefficients.

7. if c > 0 then a ≡ b(Modm) if and only if ac ≡ bc(Modmc).

8. Assume a ≡ b(Modm). If d|m and d|a then d|b.

9. If a ≡ b(Modm) then (a,m) = (b,m)

10. If a ≡ b(Modm) and if 0 ≤ |b− a| ≤ m , then a = b.

11. If a ≡ b(Modm) and a ≡ b(Modn) where (m,n) = 1,then a ≡ b(Modmn).

12. Let a,b,c be positive integers such that

(a, b) = 1, (a, c) = 1, (b, c) = 1 (2.2)

13

13. Let x,y be any given integers.

x ≡ y(Moda), x ≡ y(Modb), x ≡ y(Modc) (2.3)

then

x ≡ y(Modabc) (2.4)

14. Let p,q be two distinct primes. Then

pq−1 + qp−1 ≡ 1(Modpq) (2.5)

We can generalize the above result for any three primes p,q,r with

qr−1 + rq−1 ̸≡ 0(Modp) (2.6)

rp−1 + pr−1 ̸≡ 0(Modq) (2.7)

pq−1 + qp−1 ̸≡ 0(Modr) (2.8)

2.5.2 Lemma (N. Chandramowliswaran et al.):

[6]

Let p,q and r be three given distinct odd primes. Then there exist integers k1, k2

and k3 such that

k1p(qr−1 + rq−1) + k2q(p

r−1 + rp−1) + k3r(pq−1 + qp−1) + 2 ≡ 0(Modpqr) (2.9)

14

Proof: Define X = pq−1 + qp−1 + pr−1 + rp−1 + qr−1 + rq−1 − 2.

Then,

X ≡ (qr−1 + rq−1)(Modp) (2.10)

X ≡ (pr−1 + rp−1)(Modq) (2.11)

and,

X ≡ (pq−1 + qp−1)(Modr) (2.12)

By CRT,the above system of congruences has exactly one solution modulo the

product pqr.

Define M = pqr then Mp = M/p = qr,Mq = M/q = pr and Mr = M/r = pq.

Since (Mp, p) = 1, then there is a unique Mp1 such that MpMp1 = 1(Modp).

Similarly there are unique Mq1 and Mr1 such that MqMq1 = 1(Modq) and MrMr1 =

1(Modr).

Consider

X ≡ ((pq−1 + qp−1)MrMr1 + (pr−1 + rp−1)MqMq1 + (qr−1 + rq−1)MpMp1)(Modpqr)

(2.13)

that is,

pq−1+qp−1+pr−1+rp−1+qr−1+rq−1−2 ≡ ((pq−1+qp−1)MrMr1+(pr−1+rp−1)MqMq1

(2.14)

+(qr−1 + rq−1)MpMp1)(Modpqr)

15

=⇒ −2 ≡ ((pq−1 + qp−1)(MrMr1 − 1) + (pr−1 + rp−1)(MqMq1 − 1)+ (2.15)

(qr−1 + rq−1)(MpMp1 − 1))(Modpqr)

Thus,

k1p(qr−1 + rq−1) + k2q(p

r−1 + rp−1) + k3r(pq−1 + qp−1) + 2 ≡ 0(Modpqr) (2.16)

2.6 Linear Congruences

A equation of the form

ax ≡ b(Modm) (2.17)

where a,b,m are positive integers and x is a variable is called a Linear Congruence.

Example 2x ≡ 3(Mod4) has no solutions, since 2x − 3 is odd for every x and

therefore cannot be divisible by 4.

Theorem 1: Assume (a,m) = 1. Then the linear congruence

ax ≡ b(Modm) (2.18)

has exactly one solution.

Theorem 2: Assume (a,m) = d. Then the linear congruence

ax ≡ b(Modm) (2.19)

has solutions, if and only if, d|b.

16

Theorem 3: If (a, b) = d there exist integers x and y such that

ax+ by = d (2.20)

2.7 Eulers phi function

Φ(n) is an arithmetic function that counts the number of positive integers less than

or equal to n that are relatively prime to n.

• Φ(n) = |{k : 1 ≤ k ≤ n, gcd(n, k) = 1}|

• Φ(n) = nΠp|n(1− 1/p) where the product is over the distinct prime numbers

dividing n.

• Φ(pk) = pk − pk−1 = pk − 1(p− 1) = pk(1− 1/p)

Examples:

• let n = 9. Then gcd(9, 3) = gcd(9, 6) = 3 and gcd(9, 9) = 9.

The other six numbers in the range 1 ≤ k ≤ 9 , that is, {1, 2, 4, 5, 7, 8} are

relatively prime to 9.

Therefore, Φ(9) = 6.

As another example, gcd(1) = 1 since gcd(1, 1) = 1.

• Φ(36) = Φ(2232) = 36(1− 1/2)(1− 1/3) = 36.1/2.2/3 = 12

2.7.1 Properties:

1. The phi function is a multiplicative function, meaning that if two numbers m

and n are relatively prime (gcd(m,n) = 1), then

Φ(mn) = Φ(m)Φ(n) (2.21)

17

2. The phi function is important mainly because it gives the order of the multi-

plicative group of integers modulo n (the group of units of the ring Z/nZ).

3. The phi function also plays a key role in the definition of the RSA encryption

system.

2.8 Euler- Fermat Theorem

Assume (a,m)=1. Then we have

aΦ(m) ≡ 1(Modm) (2.22)

It also follows that

aΦ(m)+1 ≡ a(Modm) (2.23)

Example: If a = 5 ,m = 6 and (5, 6) = 1 Then Φ(6) = (2 − 1) ∗ (3 − 1) = 2 So,

5Φ(6) = 52 = 25 and 25 ≡ 1(Mod6)

2.9 Fermats Little Theorem

If p is a prime number, then for any integer a, the number ap − a is an integer

multiple of p.

ap ≡ a(Modp) (2.24)

If a is not divisible by p, Fermat’s little theorem is equivalent to the statement

that ap−1 − 1 is an integer multiple of p, or in symbols

ap−1 ≡ 1(Modp) (2.25)

18

Example: take p = 7, a = 2

27 = 128 ≡ 2(Mod7)

and since 2 does not divide 7, therefore,

27−1 = 26 = 64 ≡ 1(Mod7)

2.10 Chinese Remainder Theorem

If m1,m2, .......,mk are pair wise relatively prime positive integers, and if a1, a2, ....., ak

are any integers, then the simultaneous congruences

x ≡ a1(Modm1), x ≡ a2(Modm2), ..., x ≡ ak(Modmk) (2.26)

have a solution, and the solution is unique modulo m,

where m = m1m2.......mk

Example:

m1 ≡ 2(Mod3),m2 ≡ 1(Mod5) (2.27)

then x(unique) ∈ {1, 2, 3, ..., 14}

here x= 11

2.11 Möbius function

The Möbius function µ is defined as follows:

• µ(1) = 1

• µ(p1.p2.p3.......pk) = (−1)k where p1.p2.p3.......pk are all distinct primes.

• µ(n) = 0, otherwise

therefore, µ(n) = 0 if,and only if n has a square factor > 1.

19

2.11.1 Properties:

1. For any positive integer N > 1,

Σd,d|Nµ(d) = 0

2. µ(N) = ΣNk=1,(k,N)=1e

2Πik/N

20

Chapter 3

Encryption and Decryption on Z(3)N and Z

(4)N

3.1 A: Find a new bijective map f : Z(4)N −→ Z

(4)N

STEP 1: Let N be a given positive integer.

Define the matrix A an B as

A =

a b 0 0

0 0 a b

c d 0 0

0 0 c d

here (a,N) = 1,(b,N) = 1,(c,N) = 1,(d,N) = 1

B =

m1 b12 b13 b14

b21 b22 m3 b24

b31 b32 b33 m4

b41 m2 b43 b44

where bi,j ∈ {0, 1, 2, ....., N − 1}

and message m as

m =

m1

m2

m3

m4

where mi,j ∈ {0, 1, 2, ....., N − 1}

21

Define C = AB

Cij =

a b 0 0

0 0 a b

c d 0 0

0 0 c d

m1 b12 b13 b14

b21 b22 m3 b24

b31 b32 b33 m4

b41 m2 b43 b44

STEP 2:

f

m1

m2

m3

m4

=

am1 + bb21

ab32 + bm2

cb13 + dm3

cm4 + db44

f is bijective?

f is one-one?

f

m1

m2

m3

m4

= f

n1

n2

n3

n4

am1 + bb21

ab32 + bm2

cb13 + dm3

cm4 + db44

=

an1 + bb21

ab32 + bn2

cb13 + dn3

cn4 + db44

On comparing

am1 + bb21 = an1 + bb21 =⇒ am1 = an1 =⇒ m1 = n1 (3.1)

22

ab32 + bm2 = ab32 + bn2 =⇒ bm2 = bn2 =⇒ m2 = n2 (3.2)

cb13 + dm3 = cb13 + dn3 =⇒ dm3 = dn3 =⇒ m3 = n3 (3.3)

cm4 + db44 = cn4 + db44 =⇒ cm4 = cn4 =⇒ m4 = n4 (3.4)

m1

m2

m3

m4

=

n1

n2

n3

n4

Therefore, f is one-one

f is onto because Z(4)N is finite and f is one-one

STEP 3: Calculating f−1

f

m1

m2

m3

m4

=

am1 + bb21

ab32 + bm2

cb13 + dm3

cm4 + db44

f−1

m1

m2

m3

m4

=

n1

n2

n3

n4

now

23

an1 + bb21 = m1 =⇒ an1 = m1 − bb21 =⇒ n1 = a1m1 − a1bb21 (3.5)

where a1a ≡ 1(ModN)

ab32 + bn2 = m2 =⇒ bn2 = m2 − ab32 =⇒ n2 = b1m2 − b1ab32 (3.6)

where b1b ≡ 1(ModN)

cb13 + dn3 = m3 =⇒ dn3 = m3 − cb13 =⇒ n3 = d1m3 − d1cb13 (3.7)

where d1d ≡ 1(ModN)

cn4 + db44 = m4 =⇒ cn4 = m4 − db44 =⇒ n4 = c1m4 − c1db44 (3.8)

where c1c ≡ 1(ModN)

f−1

m1

m2

m3

m4

=

n1

n2

n3

n4

=

a1m1 − a1bb21

b1m2 − b1ab32

d1m3 − d1cb13

c1m4 − c1db44

m1

m2

m3

m4

= f

n1

n2

n3

n4

=

an1 + bb21

ab32 + bn2

cb13 + dn3

cn4 + db44

Example: Take N = 4. Define A and B as

24

A =

1 2 0 0

0 0 1 2

3 1 0 0

0 0 3 1

B =

x 2 1 2

2 0 z 2

3 1 1 w

3 y 3 1

then,

f(x, y, z, w) = (x+ 4, 1 + 2y, 3 + z, 3w + 1) (3.9)

It can be easily proved that f is bijective and inverse can be easily computed.

Hence, the message (0, 2, 1, 3) can be encrypted as (4, 5, 4, 10)

3.1.1 Composition:

(fog)

m1

m2

m3

m4

= f

a2m1 + b2b21

a2b32 + b2m2

c2b13 + d2m3

c2m4 + d2b44

=

a1a2m1 + a1b2b21 + b1b21

a1b32 + b1a2b32 + b1b2m2

c1b13 + d1c2b13 + d1d2m3

c1c2m4 + c1d2b44 + d1b44

Inverse of Composition:

(fog)−1

m1

m2

m3

m4

=

n1

n2

n3

n4

a1a2n1 + a1b2b21 + b1b21 = m1 =⇒ a1a2n1 = m1 − a1b2b21 − b1b21 (3.10)

=⇒ n1 = A2A1m1 − A2A1a1b2b21 − A2A1b1b21 (3.11)

25

where A1a1 ≡ 1(ModN) and A2a2 ≡ 1(ModN)

a1b32 + b1a2b32 + b1b2n2 = m2 =⇒ b1b2n2 = m2 − a1b32 − b1a2b32 (3.12)

=⇒ n2 = B2B1m2 −B2B1a1b32 −B2B1b1a2b32 (3.13)

where B1b1 ≡ 1(ModN) and B2b2 ≡ 1(ModN)

c1b13 + d1c2b13 + d1d2n3 = m3 =⇒ d1d2n3 = m3 − c1b13 − d1c2b13 (3.14)

=⇒ n3 = D2D1m3 −D2D1c1b13 −D2D1d1c2b13 (3.15)

where D1d1 ≡ 1(ModN) and D2d2 ≡ 1(ModN)

c1c2n4 + c1d2b44 + d1b44 = m4 =⇒ c1c2n4 = m4 − c1d2b44 − d1b44 (3.16)

=⇒ n4 = C2C1m4 − C2C1c1d2b44 − C2C1d1b44 (3.17)

where C1c1 ≡ 1(ModN) and C2c2 ≡ 1(ModN)

(fog)−1

m1

m2

m3

m4

=

n1

n2

n3

n4

=

A2A1m1 − A2A1a1b2b21 − A2A1b1b21

B2B1m2 −B2B1a1b32 −B2B1b1a2b32

D2D1m3 −D2D1c1b13 −D2D1d1c2b13

C2C1m4 − C2C1c1d2b44 − C2C1d1b44

26

m1

m2

m3

m4

= (fog)

n1

n2

n3

n4

3.2 B: Find a new bijective map f : Z(4)N −→ Z

(4)N

STEP 1: Let N be a given positive integer.

Define the matrix A an B as

A =

a 0 0 b

0 a b 0

c 0 0 d

0 c d 0

here (a,N) = 1,(b,N) = 1,(c,N) = 1,(d,N) = 1

B =

b11 b12 m3 b14

b21 m2 b23 b24

b31 b32 b33 m4

m1 b42 b43 b44

where bi,j ∈ {0, 1, 2, ....., N − 1}

and message m as

m =

m1

m2

m3

m4

where mi,j ∈ {0, 1, 2, ....., N − 1}

27

Define C = AB

Cij =

a 0 0 b

0 a b b

c 0 0 d

0 c d 0

b11 b12 m3 b14

b21 m2 b23 b24

b31 b32 b33 m4

m1 b42 b43 b44

STEP 2:

f

m1

m2

m3

m4

=

ab11 + bm1

am2 + bb32

cm3 + db43

cb24 + dm4

3.2.1 f is bijective?

f is one-one?

f

m1

m2

m3

m4

= f

n1

n2

n3

n4

ab11 + bm1

am2 + bb32

cm3 + db43

cb24 + dm4

=

ab11 + bn1

an2 + bb32

cn3 + db43

cb24 + dn4

On comparing

ab11 + bm1 = ab11 + bn1 =⇒ bm1 = bn1 =⇒ m1 = n1 (3.18)

am2 + bb32 = an2 + bb32 =⇒ am2 = an2 =⇒ m2 = n2 (3.19)

28

cm3 + db43 = cn3 + db43 =⇒ cm3 = cn3 =⇒ m3 = n3 (3.20)

cb24 + dm4 = cb24 + dn4 =⇒ dm4 = dn4 =⇒ m4 = n4 (3.21)

m1

m2

m3

m4

=

n1

n2

n3

n4

Therefore, f is one-one

f is onto because Z(4)N is finite and f is one-one

therefore, f is bijective

STEP 3: Calculating f−1

f

m1

m2

m3

m4

=

ab11 + bm1

am2 + bb32

cm3 + db43

cb24 + dm4

f−1

m1

m2

m3

m4

=

n1

n2

n3

n4

now

ab11 + bn1 = m1 =⇒ bn1 = m1 − ab11 =⇒ n1 = b1m1 − b1ab11 (3.22)

29

where b1b ≡ 1(ModN)

an2 + bb32 = m2 =⇒ an2 = m2 − bb32 =⇒ n2 = a1m2 − a1bb32 (3.23)

where a1a ≡ 1(ModN)

cn3 + db43 = m3 =⇒ cn3 = m3 − db43 =⇒ n3 = c1m3 − c1db43 (3.24)

where c1c ≡ 1(ModN)

cb24 + dn4 = m4 =⇒ dn4 = m4 − cb24 =⇒ n4 = d1m4 − d1cb24 (3.25)

where d1d ≡ 1(ModN)

f−1

m1

m2

m3

m4

=

n1

n2

n3

n4

=

b1m1 − b1ab11

a1m2 − a1bb32

c1m3 − c1db43

d1m4 − d1cb24

m1

m2

m3

m4

= f

n1

n2

n3

n4

=

ab11 + bn1

an2 + bb32

cn3 + db43

cb24 + dn4

3.2.2 Composition:

(fog)

m1

m2

m3

m4

= f

a2b11 + b2m1

a2m2 + b2b32

c2m3 + d2b43

c2b24 + d2m4

=

a1b11 + b1a2b11 + b1b2m1

a1a2m2 + a1b2b32 + b1b32

c1c2m3 + c1d2b43 + d1b43

c1b24 + d1c2b24 + d1d2m4

30

Inverse of Composition:

(fog)−1

m1

m2

m3

m4

=

n1

n2

n3

n4

a1b11 + b1a2b11 + b1b2n1 = m1 =⇒ b1b2n1 = m1 − a1b11 − b1a2b11 (3.26)

=⇒ n1 = B2B1m1 −B2B1a1b11 −B2B1b1a2b11 (3.27)

where B1b1 ≡ 1(ModN) and B2b2 ≡ 1(ModN)

a1a2n2 + a1b2b32 + b1b32 = m2 =⇒ a1a2n2 = m2 − a1b2b32 − b1b32 (3.28)

=⇒ n2 = A2A1m2 − A2A1a1b2b32 − A2A1b1b32 (3.29)

where A1a1 ≡ 1(ModN) and A2a2 ≡ 1(ModN)

c1c2n3 + c1d2b43 + d1b43 = m3 =⇒ c1c2n3 = m3 − c1d2b43 − d1b43 (3.30)

=⇒ n3 = C2C1m3 − C2C1c1d2b43 − C2C1d1b43 (3.31)

where C1c1 ≡ 1(ModN) and C2c2 ≡ 1(ModN)

c1b24 + d1c2b24 + d1d2n4 = m4 =⇒ d1d2n4 = m4 − c1b24 − d1c2b24 (3.32)

31

=⇒ n4 = D2D1m4 −D2D1c1b24 −D2D1d1c2b24 (3.33)

where D1d1 ≡ 1(ModN) and D2d2 ≡ 1(ModN)

(fog)−1

m1

m2

m3

m4

=

n1

n2

n3

n4

=

B2B1m1 −B2B1a1b11 −B2B1b1a2b11

A2A1m2 − A2A1a1b2b32 − A2A1b1b32

C2C1m3 − C2C1c1d2b43 − C2C1d1b43

D2D1m4 −D2D1c1b24 −D2D1d1c2b24

m1

m2

m3

m4

= (fog)

n1

n2

n3

n4

3.3 C: Find a new bijective map f : Z(3)N −→ Z

(3)N

STEP 1: Let N be a given positive integer. Define the matrix A and B as follows.

A =

a11 a12 a13

a21 a22 a23

a31 a32 a33

where ai,j ∈ {0, 1, 2, ....., N − 1}

B =

b11 m1 m3

m2 m2 b23

m1 b32 m3

where bi,j ∈ {0, 1, 2, ....., N − 1}

32

and message m as

m =

m1

m2

m3

where mi,j ∈ {0, 1, 2, ....., N − 1}

Define C = AB

Cij =

a11 a12 a13

a21 a22 a23

a31 a32 a33

b11 m1 m3

m2 m2 b23

m1 b32 m3

STEP 2

f

m1

m2

m3

=

a11b11 + a12m2 + a13m1

a21m1 + a22m2 + a23b32

a31m3 + a32b23 + a33m3

=

d1

d2

d3

a13m1 + a12m2 = d1 − a11b11 (3.34)

a21m1 + a22m2 = d2 − a23b32 (3.35)

(a31 + a33)m3 = d3 − a32b23 (3.36)

that is,

a13 a12

a21 a22

m1

m2

=

d1 − a11b11

d2 − a23b32

where

33

((a13a22 − a12a21), N) = 1 (3.37)

and

(a31 + a33, N) = 1 (3.38)

In General the function f can be written as:

f : Z(3)N −→ Z

(3)N (3.39)

f(x, y, z) = (α+ ax+ by, β + cx+ dy, γ + kz) (3.40)

f is bijective? f is one-one?

Suppose,

f(x, y, z) = f(x1, y1, z1)

(α + ax+ by, β + cx+ dy, γ + kz) = (α + ax1 + by1, β + cx1 + dy1, γ + kz1) (3.41)

=⇒ α + ax+ by = α+ ax1 + by1 =⇒ ax+ by = ax1 + by1 (3.42)

and

=⇒ β + cx+ dy = β + cx1 + dy1 =⇒ cx+ dy = cx1 + dy1 (3.43)

a(x− x1) + b(y − y1) = 0(ModN) (3.44)

and

c(x− x1) + d(y − y1) = 0(ModN) (3.45)

34

that is,

a b

c d

x− x1

y − y1

=

0

0

Since

((ad− bc),ModN,N) = 1

therefore,

a b

c d

is invertible

x− x1 = 0 =⇒ x = x1 (3.46)

and

y − y1 = 0 =⇒ y = y1 (3.47)

also,

γ + kz = γ + kz1 =⇒ kz = kz1 =⇒ z = z1 (3.48)

that is, (x, y, z) = (x1, y1, z1)

f is one-one

f is onto because Z(3)N is finite and f is one-one.

Therefore, f is bijective.

Calculating f−1:

f−1(x, y, z) = (x1, y1, z1) (3.49)

35

(x, y, z) = f(x1, y1, z1) (3.50)

=⇒ (x, y, z) = (α + ax1 + by1, β + cx1 + dy1, γ + kz1) (3.51)

that is,

ax1 + by1 = x− α (3.52)

cx1 + dy1 = y − β (3.53)

and

kz1 = z − γ (3.54)

a b

c d

x1

y1

=

x− α

y − β

from here x1, y1 can be easily calculated.

and,

z1 = k−1(z − γ) = k1(z − γ) (3.55)

where, kk1 ≡ 1(ModN)

Example: Take N=3. then,

f : Z(3)N −→ Z

(3)N (3.56)

take α = 1, β = 2, γ = 0

36

then,

f(x, y, z) = (1 + ax+ by, 2 + cx+ dy, kz) (3.57)

now,

(ad− bc(Mod3), 3) = 1 and (k, 3) = 1

therefore, choosing a = 1, b = 1, c = 1, d = 2, k = 2

then,

f(x, y, z) = (1 + x+ y, 2 + x+ 2y, 2z) (3.58)

It can be easily proved that f is bijective and inverse can be easily computed.

Hence, a message (1, 2, 1) is encrypted as (4, 7, 2)

3.3.1 Total Number of Bijective Functions

Let N be a given fixed positive integer such that N ≥ 3

f : Z(3)N −→ Z

(3)N (3.59)

f(x, y, z)α,β,γ;a,b,c,d;,k = (α + ax+ by, β + cx+ dy, γ + kz)

Here ((ad− bc)(ModN), N) = 1 and (k,N) = 1

α, β, γ, a, b, c, d, r, k ∈ ZN

|f[α,β,γ;a,b,c,d;r,k] : Z(3)N −→ Z

(3)N | = N3Φ(N).Φ2(N) = N8Πp|N(1− 1/p)2.(1− 1/p2)

(3.60)

where p is a prime such that p|N

Φ(N) = NΠp|N(1− 1/p)

and

Φ2(N) = N4Πp|N(1− 1/p)(1− 1/p2)

37

3.4 D: Find a new bijective map f : Z(4)N −→ Z

(4)N

STEP 1: Let N be a given positive integer. Define the matrix A and B as follows.

A =

a11 a12 a13 a14

a21 a22 a23 a24

a31 a32 a33 a34

a41 a42 a43 a44

where ai,j ∈ {0, 1, 2, ....., N − 1}

B =

m1 b12 m1 m4

b21 m2 m2 m4

m2 m1 m3 b34

m3 m3 b43 m4

where bi,j ∈ {0, 1, 2, ....., N − 1}

and message m as

m =

m1

m2

m3

m4

where mi,j ∈ {0, 1, 2, ....., N − 1}

Define C = AB

Cij =

a11 a12 a13 a14

a21 a22 a23 a24

a31 a32 a33 a34

a41 a42 a43 a44

m1 b12 m1 m4

b21 m2 m2 m4

m2 m1 m3 b34

m3 m3 b43 m4

38

STEP 2

f

m1

m2

m3

m4

=

a11m1 + a21b21 + a31m2 + a41m3

a12b12 + a22m2 + a32m1 + a42m3

a13m1 + a23m2 + a33m3 + a43b43

a14m4 + a24m4 + a34b34 + a44m4

=

d1

d2

d3

d4

a11m1 + a31m2 + a41m3 = d1 − a21b21 (3.61)

a32m1 + a22m2 + a42m3 = d2 − a12b12 (3.62)

a13m1 + a23m2 + a33m3 = d3 − a43b43 (3.63)

(a14 + a24 + a44)m4 = d4 − a34b34 (3.64)

that is,

a11 a31 a41

a32 a22 a42

a13 a23 a33

m1

m2

m3

=

d1 − a21b21

d2 − a12b12

d3 − a43b43

where

(a11(a22a33 − a42a23)− a31(a32a33 − a42a13) + a41(a32a23 − a22a13), N) = 1 (3.65)

and

(a14 + a24 + a44, N) = 1 (3.66)

39

In General the function f can be written as:

f : Z(4)N −→ Z

(4)N (3.67)

f(x, y, z, w) = (α+ ax+ by + cz, β + dx+ ey + fz, γ + ix+ jy + kz, δ + pw) (3.68)

f is bijective? f is one-one?

Suppose,

f(x, y, z, w) = f(x1, y1, z1, w1)

(α + ax+ by + cz, β + dx+ ey + fz, γ + ix+ jy + kz, δ + pw) = (3.69)

(α + ax1 + by1 + cz1, β + dx1 + ey1 + fz1, γ + ix1 + jy1 + kz1, δ + pw1) (3.70)

that is,

α + ax+ by + cz = α+ ax1 + by1 + cz1 (3.71)

=⇒ ax+ by + cz = ax1 + by1 + cz1 (3.72)

β + dx+ ey + fz = β + dx1 + ey1 + fz1 (3.73)

=⇒ dx+ ey + fz = dx1 + ey1 + fz1 (3.74)

40

and

γ + ix+ jy + kz = γ + ix1 + jy1 + kz1 (3.75)

=⇒ ix+ jy + kz = ix1 + jy1 + kz1 (3.76)

that is,

a(x− x1) + b(y − y1) + c(z − z1) = 0(ModN) (3.77)

d(x− x1) + e(y − y1) + f(z − z1) = 0(ModN) (3.78)

and

i(x− x1) + j(y − y1) + k(z − z1) = 0(ModN) (3.79)

that is,

a b c

d e f

i j k

x− x1

y − y1

z − z1

=

0

0

0

Since

(a(ek − fj)− b(dk − fi) + c(dj − ei)), N) = 1 (3.80)

therefore,

41

a b c

d e f

i j k

is invertible

x− x1 = 0 =⇒ x = x1 (3.81)

y − y1 = 0 =⇒ y = y1 (3.82)

and

z − z1 = 0 =⇒ z = z1 (3.83)

also,

δ + pw = δ + pw1 =⇒ pw = pw1 =⇒ w = w1 (3.84)

that is, (x, y, z, w) = (x1, y1, z1, w1)

f is one-one

f is onto because Z(4)N is finite and f is one-one.

Therefore, f is bijective.

Calculating f−1:

f−1(x, y, z, w) = (x1, y1, z1, w1) (3.85)

(x, y, z, w) = f(x1, y1, z1, w1) (3.86)

42

=⇒ (x, y, z) = (α+ax1+by1+cz1, β+dx1+ey1+fz1, γ+ix1+jy1+kz1, δ+pw1) (3.87)

that is,

ax1 + by1 + cz1 = x− α (3.88)

dx1 + ey1 + fz1 = y − β (3.89)

ix1 + jy1 + kz1 = z − γ (3.90)

and

pw1 = w − δ (3.91)

a b c

d e f

i j k

x1

y1

z1

=

x− α

y − β

z − γ

from here x1, y1, z1 can be easily calculated.

and,

w1 = p−1(w − δ) = p1(w − δ) (3.92)

where, pp1 ≡ 1(ModN)

43

Chapter 4

Conclusion and Future Work

4.1 Conclusion

This thesis gives the fundamental methods to construct bijective functions on Z(3)N

and Z(4)N . Essential ideas regarding encryption and decryption have been pro-

vided. We have proposed novel encryption and decoding procedures utilizing

bijective functions, sparse matrices and simultaneous mathematical equations. Be-

sides, by utilizing these plans we can permit just better subsets to perform activity

in a framework. Every procedure is a novel in its own particular manner, which

may be suitable for diverse applications. The more challenging aspect is to find an

alternative public key cryptosystem.

4.2 Future Work

We will extend our result from Z(3)N , Z

(4)N to Z

(p)N . Likewise, we will figure out the

general formula for compositions, compute the general equation for the number

of bijective functions. f : Z(4)N −→ Z

(4)N and extend it to Z

(p)N .

We will attempt to discover new and proficient trap door functions.

44

Bibliography[1] Adi Shamir(1979), How to share a secret, Communications of the ACM, 22, 11,

612− 613.

[2] G.R. Blakley(1979), Safeguarding cryptographic keys, Proceedings of the National

Computer Conference, 48, 313-317.

[3] Ivan Niven, Herbert S. Zuckerman and Hugh L. Montgomery, An Introduction

to the Theory of Numbers, John Wiley.

[4] Naoki Sato, Number theory.

http : //artofproblemsolving.com/articles/files/SatoNT.pdf

[5] National Institute of Standards and Technology, Federal Information Process-

ing Standards Publication 197, (2001).

[6] N. Chandramowliswaran, S. Srinivasan and P. Muralikrishna, (2014), Authen-

ticated key distribution using given set of primes for secret sharing, Systems Science

and Control Engineering, 3, 1, 106− 112,

[7] N. Chandramowliswaran, S. Srinivasan and P. Muralikrishna, (2013), Secure

Schemes for Secret Sharing and Key Distribution using Pells equation, International

Journal of Pure and Applied Mathematics 85, 5, 933− 937.

[8] N. Chandramowliswaran, (2014), Secure Schemes for Secret Sharing and Key

Distribution using Graph Theory.

[9] N. Chandramowliswaran, S. Srinivasan, P. Muralikrishna, Secure schemes for

secret sharing and key distribution using non-homogeneous equation, Submitted.

[10] Neal Koblitz (1994), A course in number theory and cryptography, Springer.

45

[11] S. Srinivasan, P. Muralikrishna and N. Chandramowliswaran,(2014), Secret

key distribution technique using theory of numbers. Italian journal of pure and ap-

plied mathematics, 32, 325− 328

[12] Susan Strom and Oskar wiksten, (2013), Importance of cryptography in net-

work security 2D1441 Seminars in theioritical computer science.

[13] Tom Apostol (1976), Introduction to analytic number theory, Springer.

[14] Vedkiran Saini, Parvinder Bangar, Harjeet Singh Chauhan, (2014) Study and

Literature Survey of Advanced Encryption Algorithm for Wireless Application. Inter-

national journal of emerging science and engineering(IJESE), 2, 6, 33-37.

[15] Vikas Agrawal, Shruti Agrawal, Rajesh Deshmukh, (2014), Analysis and Re-

view of Encryption and Decryption for Secure Communication, International Journal

of Scientific Engineering and Research (IJSER), 2 , 2, 1-3.

[16] William Stallings, Cryptography and network security, Pearson.

[17] Xinmiao Zhang and Keshab K. Parhi, (2002), Implementation Approaches for the

Advanced Encryption Standard Algorithm IEEE , 2, 4, 24-46.

46

PROFILE

AINA GUPTA

Qualification: - Pursuing M.Sc. (Mathematics)

B.Sc. (Hons.) Mathematics

Contact Address: - H. No - 179, Sector-23, Gurgaon, Haryana

Email: - [email protected]

Phone No: - 08447351589