Search
- https://math.libretexts.org/Bookshelves/Combinatorics_and_Discrete_Mathematics/Elementary_Number_Theory_(Raji)/08%3A_Other_Topics_in_Number_Theory/8.01%3A_Cryptographycoded) into another integer b by using a congruence of the form b=ak(mod m) for some chosen k and m, as described below, with k unknown except to the sender and receiver. b i...coded) into another integer b by using a congruence of the form b=ak(mod m) for some chosen k and m, as described below, with k unknown except to the sender and receiver. b is then sent to the receiver who decodes it into a again by using a congruence of the form a=bˉk(mod m), where ˉk is related to k and is itself only known to the sender and receiver, and then simply transforms the integers in a back to letters and reveals the messag…
- https://math.libretexts.org/Courses/Florida_SouthWestern_State_College/MGF_1131%3A_Mathematics_in_Context__(FSW)/01%3A__Number_Representation_in_Different_Bases_and_Cryptography/1.05%3A_CryptographyThis section explores various cryptographic techniques, including substitution and transposition ciphers like the Caesar and Bifid ciphers. It emphasizes the significance of key security and the vulne...This section explores various cryptographic techniques, including substitution and transposition ciphers like the Caesar and Bifid ciphers. It emphasizes the significance of key security and the vulnerabilities of these methods to frequency analysis. The evolution of encryption standards from DES to AES is highlighted, showcasing improvements in security.
- https://math.libretexts.org/Bookshelves/Combinatorics_and_Discrete_Mathematics/Yet_Another_Introductory_Number_Theory_Textbook_-_Cryptology_Emphasis_(Poritz)/04%3A_CryptologyBeware that cryptography is widely (but inappropriately!) used as a synecdoche for cryptology. (This is not unlike the widely understood incorrect usage of the word hacker.) We will try to use these w...Beware that cryptography is widely (but inappropriately!) used as a synecdoche for cryptology. (This is not unlike the widely understood incorrect usage of the word hacker.) We will try to use these words more carefully. There will be very little number theory, but we will set up some terminology and simple examples of cryptography and the corresponding cryptanalysis, with an emphasis on the old, historic, systems which are no longer viable in the modern age.