Abstract
Cryptology is about communication in the presence of adversaries or potential adversaries. A classical goal of cryptography is privacy. Authentication is another goal of cryptography which is any process by which you verify that someone is indeed who they claim they are. Digital signatures are a special technique for achieving authentication. Nowadays cryptography has matured and it is addressing an ever increasing number of other goals like secret sharing, fingerprinting, etc. In this chapter after a brief historical introduction where we present some most known secret-key cryptosystems—like the one-time pad, the affine and Hill’s cryptosystems—we explain the main idea of modern public-key cryptosystems whose security is based on complexity. We look in detail at the complexity of Euclidean algorithm, exponentiation and factoring of integers showing that the complexity of the first two tasks is linear while the naive trial and error method of factoring integers have exponential complexity. All this allow us then to explain in detail RSA cryptosystem. In the last section we also deal with testing primality and explain how the two primes needed for the RSA cryptosystem can be found. Several topics in cryptography will also appear in subsequent chapters: Elgamal cryptosystems in Chaps. 3 and 4, secret sharing in Chap. 6 and fingerprinting in Chap. 7.
Enigmatic words—they are all full of meaning.
Nikolai Roerich (1874–1947)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Read about this exciting project and many other historical information about Colossus at http://www.codesandcyphers.org.uk/lorenz/rebuild.htm.
- 2.
Auguste Kerckhoffs (1935–1903) was a Dutch linguist and cryptographer who was professor of languages at the Ecole des Hautes Etudes Commerciales in Paris.
- 3.
This choice reflects author’s fascination with Dickinson’s poetry.
- 4.
Velemir Khlebnikov (1885–1922) was one of the key poets in the Russian Futurist movement but his work and influence stretch far beyond it. He was educated as a mathematician and his poetry is very abstract and mathematical. He experimented with the Russian language, drawing deeply upon its roots.
- 5.
See, http://eprint.iacr.org/2010/006.pdf for details.
- 6.
Sequence A002997 from The On-Line Encyclopedia of Integer Sequences http://oeis.org/.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Slinko, A. (2020). Cryptology. In: Algebra for Applications. Springer Undergraduate Mathematics Series. Springer, Cham. https://doi.org/10.1007/978-3-030-44074-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-44074-9_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-44073-2
Online ISBN: 978-3-030-44074-9
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)