The table following the torus rule will not always be filled.
The placing is the action of a map
The Chinese Remainders Theorem
When filling a table going down diagonally, we follow the torus rule If and are relatively prime, then the map is
- bijective
- an isomorphism with respect to and
Theorem
With and be distinct prime numbers and let be a multiple of both and
Using both fermat’s theorem and the chinses remainders theorem. For every integers , and every non-negative integer
RSA
Stands for Rivest, Shamir, Adleman
Using 3 integers , and , we have for any plaintext
The encoder encrypts the cryptogram
To decode, we run
m
To find , we generate 2 random large primes and . We have
e
To find , we find a number which has no common divisor with , which is a multiple of and
d
Using Bézout, the receiver produces , such that
Hash function
A hash function is a many-to-one function, that maps a sequence to a fixed length sequence.
Digital Signature
If we want to sign a document — to verify authenticity of the document — we use a hash function
We have the digital signature of the document , where is the public trapdoor hash function specific to the signer
Trusted Agency
How do we know that a key that we receive to encrypt/decrypt a document has not been tampered with ?
We have a trusted agency (hardcoded) which signs keys, we can then verify that the key is authentic.