Cryptography Reference
In-Depth Information
Theorem 8.2.1
The set
Z n which consists of all integers i = 0 , 1 ,..., n
1 for which
gcd( i , n )=1 forms an abelian group under multiplication modulo
n. The identity element is e = 1 .
Let us verify the validity of the theorem by considering the following example:
Z n consists of the elements
{
1 , 2 , 4 , 5 , 7 , 8
}
Example 8.3. If we choose n = 9,
.
Z 9
Table 8.1 Multiplication table for
×
mod 9 124578
1
124578
2
248157
4
487215
5
512784
7
751842
8
875421
Z 9 , depicted in Table 8.1, we can eas-
ily check most conditions from Definition 8.2.1. Condition 1 (closure) is satisfied
since the table only consists of integers which are elements of
By computing the multiplication table for
Z 9 . For this group
Conditions 3 (identity) and 4 (inverse) also hold since each row and each column
of the table is a permutation of the elements of
Z 9 . From the symmetry along the
main diagonal, i.e., the element at row i and column j equals the element at row j
and column i , we can see that Condition 5 (commutativity) is satisfied. Condition
2 (associativity) cannot be directly derived from the shape of the table but follows
immediately from the associativity of the usual multiplication in
Z n .
Finally, the reader should remember from Section 6.3.1 that the inverse a 1
of
Z n can be computed by using the extended Euclidean algorithm.
each element a
8.2.2 Cyclic Groups
In cryptography we are almost always concerned with finite structures. For instance,
for AES we needed a finite field. We provide now the straightforward definition of
a finite group:
Search WWH ::




Custom Search