Loading [MathJax]/jax/output/HTML-CSS/jax.js
Skip to main content
Library homepage
 

Text Color

Text Size

 

Margin Size

 

Font Type

Enable Dyslexic Font
Mathematics LibreTexts

Search

  • Filter Results
  • Location
  • Classification
    • Article type
    • Stage
    • Author
    • Cover Page
    • License
    • Show Page TOC
    • Transcluded
    • PrintOptions
    • OER program or Publisher
    • Autonumber Section Headings
    • License Version
    • Print CSS
    • Screen CSS
    • Number of Print Columns
  • Include attachments
Searching in
About 3 results
  • https://math.libretexts.org/Bookshelves/Combinatorics_and_Discrete_Mathematics/Elementary_Number_Theory_(Raji)/08%3A_Other_Topics_in_Number_Theory/8.01%3A_Cryptography
    coded) into another integer b by using a congruence of the form b=ak(mod m) for some chosen k and m, as described below, with k unknown except to the sender and receiver. b i...coded) into another integer b by using a congruence of the form b=ak(mod m) for some chosen k and m, as described below, with k unknown except to the sender and receiver. b is then sent to the receiver who decodes it into a again by using a congruence of the form a=bˉk(mod m), where ˉk is related to k and is itself only known to the sender and receiver, and then simply transforms the integers in a back to letters and reveals the messag…
  • https://math.libretexts.org/Courses/Florida_SouthWestern_State_College/MGF_1131%3A_Mathematics_in_Context__(FSW)/01%3A__Number_Representation_in_Different_Bases_and_Cryptography/1.05%3A_Cryptography
    This section explores various cryptographic techniques, including substitution and transposition ciphers like the Caesar and Bifid ciphers. It emphasizes the significance of key security and the vulne...This section explores various cryptographic techniques, including substitution and transposition ciphers like the Caesar and Bifid ciphers. It emphasizes the significance of key security and the vulnerabilities of these methods to frequency analysis. The evolution of encryption standards from DES to AES is highlighted, showcasing improvements in security.
  • https://math.libretexts.org/Bookshelves/Combinatorics_and_Discrete_Mathematics/Yet_Another_Introductory_Number_Theory_Textbook_-_Cryptology_Emphasis_(Poritz)/04%3A_Cryptology
    Beware that cryptography is widely (but inappropriately!) used as a synecdoche for cryptology. (This is not unlike the widely understood incorrect usage of the word hacker.) We will try to use these w...Beware that cryptography is widely (but inappropriately!) used as a synecdoche for cryptology. (This is not unlike the widely understood incorrect usage of the word hacker.) We will try to use these words more carefully. There will be very little number theory, but we will set up some terminology and simple examples of cryptography and the corresponding cryptanalysis, with an emphasis on the old, historic, systems which are no longer viable in the modern age.

Support Center

How can we help?