Abstract
Now that so much information is transmitted over the Internet, it has become very important to develop secure methods of sending and receiving information. Security concerns are widespread because so much personal information is stored on computers. Eavesdroppers try to intercept online transactions, hoping to steal your credit card information or even your identity. Over the years, governments have relayed vital information to allies while attempting to keep enemies from obtaining it. Entire agencies, such as the National Security Agency, employ hundreds of mathematicians to keep their government’s information a secret while trying to intercept and decode information belonging to other governments or groups. This chapter introduces examples of both private key and public key codes, including the RSA public key code.
The problem of distinguishing prime numbers from composites, and of resolving composite numbers into their prime factors, is one of the most important and useful in all of arithmetic.
—Carl Friedrich Gauss, 1777–1855
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Sylvia Forman and Agnes M. Rash
About this chapter
Cite this chapter
Forman, S., Rash, A.M. (2015). Cryptology. In: The Whole Truth About Whole Numbers. Springer, Cham. https://doi.org/10.1007/978-3-319-11035-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-11035-6_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11034-9
Online ISBN: 978-3-319-11035-6
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)