Finite Fields
The next morning at daybreak, Star flew indoors, seemingly keen for a lesson. I said, "Tap eight." She did a brilliant exhibition, first tapping it in 4, 4, then giving me a hasty glance and doing it in 2, 2, 2, 2, before coming for her nut.It is astonishing that Star learned to count up to 8 with no difficulty, and of her own accord discovered that each number could be given with various different divisions, this leaving no doubt that she was consciously thinking each number. In fact, she did mental arithmetic, although unable, like humans, to name the numbers. But she learned to recognize their spoken names almost immediately and was able to remember the sounds of the names. Star is unique as a wild bird, who of her own free will pursued the science of numbers with keen interest and astonishing intelligence.Living with Birds, Len Howard
Key Points
|
Finite fields have become increasingly important in
cryptography. A number of cryptographic algorithms rely heavily on properties of
finite fields, notably the Advanced Encryption Standard (AES) and elliptic curve
cryptography.
The chapter begins with a brief overview of the concepts of
group, ring, and field. This section is somewhat abstract; the reader may prefer
to quickly skim this section on a first reading. Next, we need some elementary
background in modular arithmetic and the Euclidean algorithm. We are then
ready to discuss finite fields of the form GF(p),
where p is a prime number. Next, we need some additional
background, this time in polynomial arithmetic. The chapter concludes with a
discussion of finite fields of the form GF(2n) where n is a
positive integer.
No comments:
Post a Comment