Equations of Freedom (Money)

Foundations of Cryptography: Groups, Rings, and Finite Fields
Building Blocks of Secure Systems
To understand the cryptographic principles underpinning decentralized systems like Bitcoin and Monero, we begin with three mathematical pillars: groups, rings, and fields. These structures enable the privacy, security, and trustlessness of modern cryptocurrencies.
[NOTE: Written by DeepSeek R1. Still learning about this topic myself; these are my notes so far.]
1. Cryptographic Essentials: Groups, Rings, and Fields
Groups: Operations with Structure
A group is a set G paired with an operation (e.g., addition, multiplication) satisfying:
- Closure: For all a, b β G, the result of a Β· b stays in G.
- Associativity: a Β· (b Β· c) = (a Β· b) Β· c.
- Identity: An element e β G exists such that a Β· e = e Β· a = a.
- Inverses: For every a β G, there exists b β G where a Β· b = e.
Examples:
- Integers β€ under addition: Identity is 0; inverse of 5 is -5.
- Elliptic curve groups: The basis of Bitcoinβs ECDSA, where solving k Β· G = P (finding scalar k from public point P) is computationally infeasible.
Rings: Dual Operations
A ring adds a second operation to a group:
- Addition is commutative (abelian group).
- Multiplication is associative and distributive over addition.
Examples:
- Integers β€ with addition and multiplication.
- Polynomial rings β€[x], crucial for constructing finite fields.
Fields: Division and Perfection
A field is a ring where every non-zero element has a multiplicative inverse. Key examples:
- Prime fields: Integers modulo a prime p (e.g., β€/7β€: 3β»ΒΉ = 5 in mod 7).
- Extension fields: Built by extending prime fields with irreducible polynomials (e.g., π½ββΈ used in AES).
2. Finite Fields: Cryptographyβs Workhorse
Finite fields (Galois*
fields) enable secure computation:
- Prime fields: Arithmetic modulo p, like Bitcoinβs β€/pβ€ for large primes.
- Polynomial extensions: Construct π½ββΏ by adjoining roots of irreducible polynomials.
Example: π½β
- Base field: π½β = {0, 1}.
- Define π½β = π½β[x]/(xΒ² + x + 1). Elements: {0, 1, x, x+1}.
- x behaves like a root: xΒ² β‘ x + 1 in this field.
3. Cryptography in Practice: Bitcoin and Monero
Bitcoin: ECDSA over Prime Fields
- Private keys: Integers k in β€/pβ€.
- Public keys: Points K = k Β· G on an elliptic curve (e.g., secp256k1).
Monero: Privacy Through Algebra
- Ring Signatures: Combine signatures using group operations.
- Stealth Addresses: Generate one-time keys via field arithmetic.
4. Sovereignty Through Mathematics
Bitcoin and Monero use openly verifiable structures:
- Prime fields for collision-resistant hashing.
- Elliptic curve groups for unforgeable signatures.
- Polynomial rings for efficient zero-knowledge proofs.
Conclusion: Equations of Freedom
Groups (β€, elliptic curves), rings (β€[x]), and fields (π½β) are tools of liberation. By encoding rights into mathematical protocols, Bitcoin and Monero shift power from intermediaries to individuals.
Trust math, not middlemen.
Notes
*
Γvariste Galois, French mathematician. His last name is pronounced "Gal-wah" (/Ι‘alΛwa/ in IPA).
Sources
- DeepSeek R1 synthesis of its own training data plus the following additional sources:
- https://people.csail.mit.edu/madhu/ST12/scribe/lect03.pdf
- https://www-users.cse.umn.edu/~brubaker/docs/152/152groups.pdf
- https://people.maths.ox.ac.uk/flynn/genus2/sheets0405/grfnotes1011.pdf
- https://people.engr.tamu.edu/andreas-klappenecker/629/finite_fields.pdf
- https://www.geeksforgeeks.org/group-rings-and-fields-in-group-theory/
Inspired by: "Motivate The Math" Podcast, by Fundamentals and average_gary
- Motivate The Math: https://serve.podhome.fm/motivate-the-math_638723836566573210