Skip to main content

Cryptology

  • Chapter
  • First Online:
Algebra for Applications

Part of the book series: Springer Undergraduate Mathematics Series ((SUMS))

  • 2794 Accesses

Abstract

Cryptology is about communication in the presence of adversaries or potential adversaries. A classical goal of cryptography is privacy. Authentication is another goal of cryptography which is any process by which you verify that someone is indeed who they claim they are. Digital signatures are a special technique for achieving authentication. Nowadays cryptography has matured and it is addressing an ever increasing number of other goals like secret sharing, fingerprinting, etc. In this chapter after a brief historical introduction where we present some most known secret-key cryptosystems—like the one-time pad, the affine and Hill’s cryptosystems—we explain the main idea of modern public-key cryptosystems whose security is based on complexity. We look in detail at the complexity of Euclidean algorithm, exponentiation and factoring of integers showing that the complexity of the first two tasks is linear while the naive trial and error method of factoring integers have exponential complexity. All this allow us then to explain in detail RSA cryptosystem. In the last section we also deal with testing primality and explain how the two primes needed for the RSA cryptosystem can be found. Several topics in cryptography will also appear in subsequent chapters: Elgamal cryptosystems in Chaps. 3 and 4, secret sharing in Chap. 6 and fingerprinting in Chap. 7.

Enigmatic words—they are all full of meaning.

Nikolai Roerich (1874–1947)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 37.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Read about this exciting project and many other historical information about Colossus at http://www.codesandcyphers.org.uk/lorenz/rebuild.htm.

  2. 2.

    Auguste Kerckhoffs (1935–1903) was a Dutch linguist and cryptographer who was professor of languages at the Ecole des Hautes Etudes Commerciales in Paris.

  3. 3.

    This choice reflects author’s fascination with Dickinson’s poetry.

  4. 4.

    Velemir Khlebnikov (1885–1922) was one of the key poets in the Russian Futurist movement but his work and influence stretch far beyond it. He was educated as a mathematician and his poetry is very abstract and mathematical. He experimented with the Russian language, drawing deeply upon its roots.

  5. 5.

    See, http://eprint.iacr.org/2010/006.pdf for details.

  6. 6.

    Sequence A002997 from The On-Line Encyclopedia of Integer Sequences http://oeis.org/.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arkadii Slinko .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Slinko, A. (2020). Cryptology. In: Algebra for Applications. Springer Undergraduate Mathematics Series. Springer, Cham. https://doi.org/10.1007/978-3-030-44074-9_2

Download citation

Publish with us

Policies and ethics