14.07.2013 Views

dissertacao.pdf

dissertacao.pdf

dissertacao.pdf

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.5 Mathematical Basis<br />

In this section we start by presenting definitions for some of the symbols used<br />

throughout the work. Then we present the definitions necessary to understand<br />

what is the efficiency of an algorithm. Next we introduce the reader to modular<br />

arithmetic, the basis of RSA, along with some useful theorems and algorithms.<br />

Finally we present some advanced results used in the attacks against RSA with<br />

low exponents.<br />

1.5.1 Notation<br />

We will use the following symbols whenever a, b, N are positive integers, p a<br />

prime number, m = p α1<br />

1 pα2 2 ...pαn n is an odd integer with prime factors p1, ..., pn<br />

and ( a<br />

b ) is referred to as the Legendre symbol.<br />

Symbol Definition<br />

Table 1: Notation<br />

(a,b) greatest common divisor between a and b<br />

lcm(a,b) least common multiple of a and b<br />

φ(N) number of positive integers smaller than and co-<br />

prime to N<br />

λ(N) smallest positive integer m such that<br />

<br />

a<br />

p<br />

a m ∼ = 1 (mod N) ∀a ∈ ZN : (a, N) = 1<br />

⎧<br />

⎪⎨<br />

⎪⎩<br />

0 , if p|a<br />

1 , if a is a quadratic residue modulo p<br />

−1 , if a is a quadratic nonresidue modulo p<br />

( a<br />

a<br />

m ) = [ p1 ]α1 [ a<br />

p2 ]α2 ...[ a<br />

pn ]αn<br />

5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!