Skip to main content

An Introduction to Cryptography

  • Chapter
  • First Online:
Book cover An Introduction to Mathematical Cryptography

Abstract

As Julius Caesar surveys the unfolding battle from his hilltop outpost, an exhausted and disheveled courier bursts into his presence and hands him a sheet of parchment containing gibberish:

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The plaintext is the original message in readable form and the ciphertext is the encrypted message.

  2. 2.

    A cipher wheel with mixed up alphabets and with encryption performed using different offsets for different parts of the message is featured in a fifteenth century monograph by Leon Batista Alberti [63].

  3. 3.

    The word cryptic, meaning hidden or occult, appears in 1638, while crypto- as a prefix for concealed or secret makes its appearance in 1760. The term cryptogram appears much later, first occurring in 1880.

  4. 4.

    In cryptography, it is traditional for Bob and Alice to exchange confidential messages and for their adversary Eve, the eavesdropper, to intercept and attempt to read their messages. This makes the field of cryptography much more personal than other areas of mathematics and computer science, whose denizens are often X and Y !

  5. 5.

    Do you see how we got 1013 years? There are 60 ⋅ 60 ⋅ 24 ⋅ 365 s in a year, and 26! divided by 106 ⋅ 60 ⋅ 60 ⋅ 24 ⋅ 365 is approximately 1013. 107.

  6. 6.

    The assertion that a large number of possible keys, in and of itself, makes a cryptosystem secure, has appeared many times in history and has equally often been shown to be fallacious.

  7. 7.

    A Study in Scarlet (Chap. 2), Sir Arthur Conan Doyle.

  8. 8.

    The first known recorded description of the fast powering algorithm appeared in India before 200 BC, while the first reference outside India dates to around 950 AD. See [66, page 441] for a brief discussion and further references.

  9. 9.

    Note that log2(A) means the usual logarithm to the base 2, not the so-called discrete logarithm that will be discussed in Chap. 2.

  10. 10.

    Finite fields are also sometimes called Galois fields, after Évariste Galois, who studied them in the nineteenth century. Yet another notation for \(\mathbb{F}_{p}\) is \(\mathrm{GF}(p)\), in honor of Galois. And yet one more notation for \(\mathbb{F}_{p}\) that you may run across is \(\mathbb{Z}_{p}\), although in number theory the notation \(\mathbb{Z}_{p}\) is more commonly reserved for the ring of \(p\)-adic integers.

  11. 11.

    You may wonder why Theorem 1.24 is called a “little” theorem. The reason is to distinguish it from Fermat’s “big” theorem, which is the famous assertion that \(x^{n} + y^{n} = z^{n}\) has no solutions in positive integers x, y, z if n ≥ 3. It is unlikely that Fermat himself could prove this big theorem, but in 1996, more than three centuries after Fermat’s era, Andrew Wiles finally found a proof.

  12. 12.

    The prime factorization of m is \(m = 15485207 = 3853 \cdot 4019\).

  13. 13.

    We earlier defined the order of p in a to be the exponent of p when a is factored into primes. Thus unfortunately, the word “order” has two different meanings. You will need to judge which one is meant from the context.

  14. 14.

    In classical terminology, a code is a system in which each word of the plaintext is replaced with a code word. This requires sender and receiver to share a large dictionary in which plaintext words are paired with their ciphertext equivalents. Ciphers operate on the individual letters of the plaintext, either by substitution, transposition, or some combination. This distinction between the words “code” and “cipher” seems to have been largely abandoned in today’s literature.

  15. 15.

    A bit is a 0 or a 1. The word “bit” is an abbreviation for binary digit.

  16. 16.

    ASCII is an acronym for American Standard Code for Information Interchange.

  17. 17.

    There are in fact many primes in the interval 2159 < p < 2160. The prime number theorem implies that almost 1 % of the numbers in this interval are prime. Of course, there is also the question of identifying a number as prime or composite. There are efficient tests that do this, even for very large numbers. See Sect. 3.4.

  18. 18.

    The history is actually somewhat more complicated than this; see our brief discussion in Sect. 2.1 and the references listed there for further reading.

  19. 19.

    If the number of letters in the message is not an even multiple of 25, then extra random letters are appended to the end of the message.

References

  1. H. Davenport, The Higher Arithmetic (Cambridge University Press, Cambridge, 1999)

    MATH  Google Scholar 

  2. W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory IT-22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  3. G.H. Hardy, E.M. Wright, An Introduction to the Theory of Numbers, 5th edn. (The Clarendon Press/Oxford University Press, New York, 1979)

    MATH  Google Scholar 

  4. K. Ireland, M. Rosen, A Classical Introduction to Modern Number Theory. Volume 84 of Graduate Texts in Mathematics (Springer, New York, 1990)

    Google Scholar 

  5. D. Kahn, The Codebreakers: The Story of Secret Writing (Scribner Book, New York, 1996)

    Google Scholar 

  6. D. Knuth, The Art of Computer Programming, Vol. 2: Seminumerical Algorithms, 2nd edn. (Addison-Wesley, Reading, 1981)

    Google Scholar 

  7. I. Niven, H.S. Zuckerman, H.L. Montgomery, An Introduction to the Theory of Numbers (Wiley, New York, 1991)

    Google Scholar 

  8. K.H. Rosen, Elementary Number Theory and Its Applications, 4th edn. (Addison-Wesley, Reading, 2000)

    MATH  Google Scholar 

  9. J.H. Silverman, A Friendly Introduction to Number Theory, 4th edn. (Pearson, Upper Saddle River, 2013)

    Google Scholar 

  10. S. Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography Reprint edn. (Anchor, New York, 2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Hoffstein, J., Pipher, J., Silverman, J.H. (2014). An Introduction to Cryptography. In: An Introduction to Mathematical Cryptography. Undergraduate Texts in Mathematics. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-1711-2_1

Download citation

Publish with us

Policies and ethics