|
![]() |
|||
|
||||
OverviewHow quickly can you compute the remainder when dividing $109837^{97}$ by 120143? Why would you even want to compute this? And what does this have to do with cryptography? Modern cryptography lies at the intersection of mathematics and computer sciences, involving number theory, algebra, computational complexity, fast algorithms, and even quantum mechanics. Many people think of codes in terms of spies, but in the information age, highly mathematical codes are used every day by almost everyone, whether at the bank ATM, at the grocery checkout, or at the keyboard when you access your email or purchase products online. This book provides a historical and mathematical tour of cryptography, from classical ciphers to quantum cryptography. The authors introduce just enough mathematics to explore modern encryption methods, with nothing more than basic algebra and some elementary number theory being necessary. Complete expositions are given of the classical ciphers and the attacks on them, along with a detailed description of the famous Enigma system. The public-key system RSA is described, including a complete mathematical proof that it works. Numerous related topics are covered, such as efficiencies of algorithms, detecting and correcting errors, primality testing and digital signatures. The topics and exposition are carefully chosen to highlight mathematical thinking and problem solving. Each chapter ends with a collection of problems, ranging from straightforward applications to more challenging problems that introduce advanced topics. Unlike many books in the field, this book is aimed at a general liberal arts student, but without losing mathematical completeness. Full Product DetailsAuthor: Margaret Cozzens , Steven J. MillerPublisher: American Mathematical Society Imprint: American Mathematical Society Volume: 29 Dimensions: Width: 18.20cm , Height: 1.80cm , Length: 25.10cm Weight: 0.620kg ISBN: 9780821883211ISBN 10: 0821883216 Pages: 332 Publication Date: 30 October 2013 Audience: College/higher education , Undergraduate Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsPreface Historical introduction Classical cryptology: Methods Enigma and Ultra Classical cryptography: Attacks I Classical cryptography: Attacks II Modern symmetric encryption Introduction to public-channel cryptography Public-channel cryptography Error detecting and correcting codes Modern cryptography Primality testing and factorization Solutions to selected exercises Bibliography IndexReviewsThe authors have done an excellent job of presenting this material in as painless and accessible way as possible. -- MAA The authors have done an excellent job of presenting this material in as painless and accessible way as possible. -- MAA oThe authors have done an excellent job of presenting this material in as painless and accessible way as possible.o -- MAA oThe authors have done an excellent job of presenting this material in as painless and accessible way as possible.o -- MAA Author InformationMargaret Cozzens, DIMACS, Rutgers University, Piscataway, NJ, USA Steven J. Miller, Williams College, Williamstown, MA, USA Tab Content 6Author Website:Countries AvailableAll regions |