Skip to main content

Mathematical Fundamentals II: Abstract Algebra

  • Chapter
  • First Online:
Cryptography Arithmetic

Part of the book series: Advances in Information Security ((ADIS,volume 77))

  • 1483 Accesses

Abstract

Ordinary arithmetic has the basic operations of addition, subtraction, multiplication, and division defined over the integers and the real numbers. Similar operations can be defined over other mathematical structures—certain subsets of integers, polynomials, matrices, and so forth. This chapter is a short discussion on such generalizations. The first section of the chapter is an introduction to two types of abstract mathematical structures that are especially important in cryptography: groups and fields. The second section consists of a review of ordinary polynomial arithmetic. The third section draws on the first two sections and covers polynomial arithmetic over certain types of fields. And the last section is on the construction of some fields that are especially important in cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    One may view this as a generalization of the concept of primitive root of Part II of the text.

  2. 2.

    The field GF(3m) is also much studied but practical uses are relatively rare.

  3. 3.

    Note that in terms of powers of x, the binary strings are to be interpreted from right to left.

  4. 4.

    Replace α with the indeterminate x.

  5. 5.

    The terminology comes from linear algebra: a set of k linearly independent vectors is said to be a basis for a k-dimensional vector space if any vector in the space can be expressed as a linear combination of the vectors in the set. The structures here can be shown to be vector spaces in the standard sense.

  6. 6.

    This seemingly unusual choice is explained in Sect. 11.1.

  7. 7.

    What exactly constitutes a good basis depends on the complexity of arithmetic operations with the basis and is explained in Chap. 11.

  8. 8.

    The Types I and II bases are in fact just special cases of this class.

References

  1. J. B. Fraleigh. 2002. A First Course in Abstract Algebra. Addison-Wesley, Boston, USA.

    MATH  Google Scholar 

  2. R. Lidl and H. Niederreiter. 1994. Introduction to Finite Fields and their Applications. Cambridge University Press, Cambridge, UK.

    Book  Google Scholar 

  3. R. E. Blahut. 1983. Theory and Practice of Error Control Codes. Addison-Wesley, Reading, Massachusetts, USA.

    MATH  Google Scholar 

  4. D. E. Knuth. 1998. The Art of Computer Programming, Vol. 2. Addison-Wesley, Reading, Massachusetts, USA.

    MATH  Google Scholar 

  5. National Institute of Standards and Technology. 1999. Recommended Elliptic Curves for Federal Government Use. Gaithersburg, Maryland, USA.

    Google Scholar 

  6. D.W. Ash, I.F. Blake, and S.A. Vanstone. 1989. Low complexity normal bases. Discrete Applied Mathematics, 25:191–210.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

R. Omondi, A. (2020). Mathematical Fundamentals II: Abstract Algebra. In: Cryptography Arithmetic. Advances in Information Security, vol 77. Springer, Cham. https://doi.org/10.1007/978-3-030-34142-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34142-8_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34141-1

  • Online ISBN: 978-3-030-34142-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics