Number Theory and Cryptography

  • W. D. Wallis


When we think of secret information, the first image in our minds may be the spy in a dirty raincoat lurking around corners in the sleazy part of a central European city. But nowadays secret messages are more likely to be sent by computer, or broadcast. The emphasis is no longer on keeping the messages secret. The enemy will almost certainly be able to read your messages; your aim is to stop your adversaries from understanding them.


Secret Message Sample Problem Great Common Divisor Chinese Remainder Theorem Euclidean Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media New York 2003

Authors and Affiliations

  • W. D. Wallis
    • 1
  1. 1.Department of MathematicsSouthern Illinois UniversityCarbondaleUSA

Personalised recommendations