Introduction to Mathematical Cryptography

  • Mahima Ranjan Adhikari
  • Avishek Adhikari


Chapter 12 presents applications and initiates a study on cryptography. In the modern busy digital world, the word “cryptography” is well known. Every day, knowingly or unknowingly, in many places different techniques of cryptography are used. Starting from the log-in into a PC, sending e-mails, withdrawal of money from an ATM using a PIN code, operating the locker at a bank with the help of a designated person from the bank, sending message using a mobile phone, buying things through the Internet using a credit card, transferring money digitally from one account to another over Internet, every where cryptography is applied. Every such case requires to hide some information or it is necessary to transfer information secretly. So cryptography has something to do with security. Naturally, the questions that come are: What is cryptography? How important is it in daily life? In this chapter, cryptography is introduced and a brief overview of the subject with its basic goal is presented both intuitively and mathematically. More precisely, various cryptographic notions starting from the historical ciphers to modern cryptographic notions like public-key encryption schemes, signature schemes, secret sharing schemes, oblivious transfer etc. by using mathematical tools mainly based on modern algebra are explained. Finally, the implementation issues of three public key cryptographic schemes, namely RSA, ElGamal and Rabin, using the open source software SAGE are discussed.


Secret Message Access Structure Secret Image Secret Sharing Scheme Plain Text 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. Adhikari, A.: An overview of black and white visual cryptography using mathematics. J. Calcutta Math. Soc 2, 21–52 (2006) MathSciNetMATHGoogle Scholar
  2. Adhikari, A.: Linear algebraic techniques to construct black and white visual cryptographic schemes for general access structure and its applications to color images. Des. Codes Cryptogr. (2013). doi: 10.1007/s10623-013-9832-5 Google Scholar
  3. Adhikari, A., Adhikari, M.R.: Introduction to Linear Algebra with Application to Basic Cryptography. Asian Books, New Delhi (2007) Google Scholar
  4. Adhikari, A., Bose, M.: A new visual cryptographic scheme using Latin squares. IEICE Trans. Fundam. E 87-A (5), 1998–2002 (2004) Google Scholar
  5. Adhikari, A., Sikdar, S.: A new (2,n)-color visual threshold scheme for color images. In: Indocrypt’03. Lecture Notes in Computer Science, vol. 2904, pp. 148–161. Springer, Berlin (2003) Google Scholar
  6. Adhikari, A., Dutta, T.K., Roy, B.: A new black and white visual cryptographic scheme for general access structures. In: Indocrypt’04. Lecture Notes in Computer Science, vol. 3348, pp. 399–413. Springer, Berlin (2004) Google Scholar
  7. Adhikari, A., Kumar, D., Bose, M., Roy, B.: Applications of partially balanced and balanced incomplete block designs in developing visual cryptographic schemes. IEICE Trans. Fundam. E 90A (5), 949–951 (2007) CrossRefGoogle Scholar
  8. Adhikari, A., Adhikari, M.R., Chaubey, Y.P.: Contemporary Topics in Mathematics and Statistics with Applications. Asian Books, New Delhi (2013) Google Scholar
  9. Alexi, W., Chor, B., Goldreich, O., Schnorr, C.P.: RSA and Rabin functions: certain parts are as hard as the whole. SIAM J. Comput. 17(2), 194–209 (1988) MathSciNetCrossRefMATHGoogle Scholar
  10. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996a) CrossRefMATHGoogle Scholar
  11. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: auf der Heide, F.M., Monien, B. (eds.) 23rd International Colloquim on Automata, Languages and Programming (ICALP’96). Lecture Notes in Computer Science, vol. 1099, pp. 416–428. Springer, Berlin (1996b) CrossRefGoogle Scholar
  12. Blakley, G.R.: Safeguarding cryptographic keys. In: AFIPS 1979. National Computer Conference, vol. 48, pp. 313–317 (1979) Google Scholar
  13. Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. J. Cryptol. 12(4), 261–289 (1999) CrossRefMATHGoogle Scholar
  14. Blundo, C., D’arco, P., De Santis, A., Stinson, D.R.: Contrast optimal threshold visual cryptography. SIAM J. Discrete Math. 16(2), 224–261 (2003) MathSciNetCrossRefMATHGoogle Scholar
  15. Das, A., Adhikari, A.: An efficient multi-use multi-secret sharing scheme based on hash function. Appl. Math. Lett. 23(9), 993–996 (2010) MathSciNetCrossRefMATHGoogle Scholar
  16. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory IT-22(6), 644–654 (1976) MathSciNetCrossRefGoogle Scholar
  17. ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985) MathSciNetCrossRefMATHGoogle Scholar
  18. Hill, L.S.: Cryptography in an algebraic alphabet. Am. Math. Mon. 36, 306–312 (1929) CrossRefMATHGoogle Scholar
  19. Hoffstein, J., Pipher, J., Silverman, J.H.: An Introduction to Mathematical Cryptography. Springer, Berlin (2008) MATHGoogle Scholar
  20. Kahn, D.: The Codebreakers. Macmillan, New York (1967) Google Scholar
  21. Katz, J.: Digital Signatures. Springer, New York (2010) CrossRefMATHGoogle Scholar
  22. Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall/CRC, London/Boca Raton (2007) Google Scholar
  23. Menezes, A., van Orschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996) CrossRefGoogle Scholar
  24. Merkle, R.C.: Secure communications over insecure channels. In: Secure Communications and Asymmetric Cryptosystems. AAAS Sel. Sympos. Ser., vol. 69, pp. 181–196. Westview, Boulder (1982) Google Scholar
  25. Naor, M., Shamir, A.: Visual cryptography. In: Advance in Cryptography, Eurocrypt’94. Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer, Berlin (1994) Google Scholar
  26. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978) MathSciNetCrossRefMATHGoogle Scholar
  27. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979) MathSciNetCrossRefMATHGoogle Scholar
  28. Stinson, D.R.: Cryptography Theory and Practice, 2nd edn. CRC Press, Boca Raton (2002) Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  • Mahima Ranjan Adhikari
    • 1
  • Avishek Adhikari
    • 2
  1. 1.Institute for Mathematics, Bioinformatics, Information Technology and Computer Science (IMBIC)KolkataIndia
  2. 2.Department of Pure MathematicsUniversity of CalcuttaKolkataIndia

Personalised recommendations