Cryptography: Assignment On Finite Fields
Cryptography: Assignment On Finite Fields
Finite Fields
n
Finite Field
Multiplication ()
GF(28)
Use GF(28 ) Z 2 [ X ](mod X 8 X 4 X 3 X 1) as an example. Every
element can be represented uniquely as a polynomial
b7 X 7 b6 X 6 b5 X 5 b4 X 4 b3 X 3 b2 X 2 b1 X b0 ,
where each bi is 0 or 1. The 8 bits b7 b6b5b4b3b2b1b0 represent a byte. For
example, X 7 X 6 X 3 X 1 becomes 11001011 . Addition is the XOR
of the bits :
X 7 X 6 X 3 X 1X 4 X 3 1 11001011 XOR00011001
11010010 X 7 X 6 X 4 X .
Multiplication is
X 7 X 6 X 3 X 1
( X ) 11001011(shift left and append a 0)
110010110 110010110 XOR100011011(subtract X 8 X 4 X 3
X 1, if the first bit is 1) 010001101 .
In summary, we see that the operations in GF (28 ) is efficiently.
{02}
{04}
{08}
{10}
=
=
=
=
xtime({57}) = {ae}
xtime({ae}) = {47}
xtime({47}) = {8e}
xtime({8e}) = {07}
Thank
You..