XXXIII SMS' Session Number theory and cryptographySzczyrk, 23rd  25th November 2012

 
The leading topic of the session is Number theory and cryptography. We will shortly upload some exemplary topics; for now we provide the following references (in Polish and English): In Polish:A. Czogała, M. Szyjewski  Teoria liczb (wraz z kryptografi±), W. Sierpiński  Arytmetyka teoretyczna (bardziej algebraicznoteoriomnogo¶ciowa), W. Sierpiński  Teoria liczb, W. Narkiewicz  Teoria liczb In English:G.H. Hardy, E.M. Wright  Introduction to the Theory of Numbers (A rather difficult book with a multitude of tangential lemmas), H. Cohn  Advanced Number Theory (rather algebraic, standard), R.K. Guy  Unsolved Problems in Number Theory (from the session viewpoint probably the most interesting  the title speaks for itself) Song Y. Yan  "Number theory for computing" (not a very difficult or mathematical book, one can find many topics concerning applications of number theory in computer technology) Below we list possible topics from number theory, computational number theory and cryptography, which may be of interest to you: Number theory: Distribution of prime numbers: approximating the $pi(X)$ function, Riemann zeta function, the prime number theorem, Elliptic curves: elementary notions like operations on points and intuitions connected to it, or something more serious like the TaniyamaShimuraWeil conjecture, Diophantine equations: some examples and methods of solving them (e.g. Pell equations), Fermat's Last Theorem (along with its history, as it is very interesting), connection between FLT and TaniyamaShimuraWeil hypothesis, Waring problem, Goldbach conjecture, WaringGoldbach problem, Elementary tools of algebraic number theory: algebraic numbers, integer algebraic numbers, number fields, Probabilistic number theory: TuranKubilius inequality, ErdosKac theorem.
Computational number theory:
Simple number theoretic algorithms, e.g. modular raising to powers, group operations on elliptic curves etc., Primality tests: deterministic primality tests, Fermat test, the strong pseudoprimality test, Lucas test, tests using elliptic curves, Factorisation of integers: the continued fraction method (CFRAC), QS, NFS, ECM method, Computing discrete logarithms: Shanks method, SilverPohligHellman algorithm, computing discrete logarithms on elliptic curves, Quantum algorithms: quantum algorithms of integer factorisation (Shore scheme), quantum algorithms of computing discrete logarithms.
Cryptography and applications of number theory in cryptography:
Cryptosystems with a private key (symmetric cryptography): AES, Twofish, Blowfish, Serpent, IDEA, Cryptosystems with a public key (asymmetric cryptography): RSA, cryptosystems based on discrete logarithms (e.g. ElGamal), cryptosystems based on elliptic curves, Mixing (hashing) functions, Algorithms for generation of pseudorandom numbers, Quantum cryptography: quantum key distribution, quantum commitment, security of quantum algorithms in the bounded magazine of data model and bounded magazine of data with noise, Postquantum cryptography (i.e. cryptosystems immune to attacks by methods of quantum cryptoanalysis): McEliece cryptosystem, cryptosystems based on lattices (GoldreichGoldwasserHaley cryptosystem, NTRUEncrypt), the Lamport signature method, the Merkle signature method.
last update: 02.12.2012
