Applications to Public Key Cryptography

  • Alko R. Meijer
Part of the Springer Undergraduate Texts in Mathematics and Technology book series (SUMAT)


In this chapter we describe, at an elementary level, some of the applications of the Group Theory and Number Theory we have developed so far to Cryptology. We emphasise that these “textbook versions” of the applications do not do justice to the complexities that arise in practice, and warn the reader that implementing the mechanisms that we discuss in the form given here would lead to severe vulnerabilities of the schemes. The reader is encouraged to start by reading the paper on Why textbook ElGamal and RSA encryption are insecure.


Signature Scheme Discrete Logarithm Problem Chinese Remainder Theorem Elliptic Curve Discrete Logarithm Problem Digital Signature Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Alko R. Meijer
    • 1
  1. 1.Tokai, Cape TownSouth Africa

Personalised recommendations