The table following the torus rule will not always be filled.

The placing is the action of a map

The Chinese Remainders Theorem

When filling a table going down diagonally, we follow the torus rule If and are relatively prime, then the map is

  1. bijective
  2. an isomorphism with respect to and

Theorem

With and be distinct prime numbers and let be a multiple of both and

Using both fermat’s theorem and the chinses remainders theorem. For every integers , and every non-negative integer

RSA

Stands for Rivest, Shamir, Adleman

Using 3 integers , and , we have for any plaintext

The encoder encrypts the cryptogram

To decode, we run

m

To find , we generate 2 random large primes and . We have

e

To find , we find a number which has no common divisor with , which is a multiple of and

d

Using Bézout, the receiver produces , such that

Hash function

A hash function is a many-to-one function, that maps a sequence to a fixed length sequence.

Digital Signature

If we want to sign a document — to verify authenticity of the document — we use a hash function

We have the digital signature of the document , where is the public trapdoor hash function specific to the signer

Trusted Agency

How do we know that a key that we receive to encrypt/decrypt a document has not been tampered with ?

We have a trusted agency (hardcoded) which signs keys, we can then verify that the key is authentic.