Number Theory and Cryptography
When we think of secret information, the first image in our minds may be the spy in a dirty raincoat lurking around corners in the sleazy part of a central European city. But nowadays secret messages are more likely to be sent by computer, or broadcast. The emphasis is no longer on keeping the messages secret. The enemy will almost certainly be able to read your messages; your aim is to stop your adversaries from understanding them.
KeywordsSecret Message Sample Problem Great Common Divisor Chinese Remainder Theorem Euclidean Algorithm
Unable to display preview. Download preview PDF.