Skip to main content

Cryptography

  • Chapter
  • First Online:
Guide to Discrete Mathematics

Part of the book series: Texts in Computer Science ((TCS))

Abstract

The field of cryptography is concerned with techniques by which information may be concealed in cipher texts and made unintelligible to all but the intended recipient. This ensures the privacy of the information sent, as any information intercepted will be meaningless to anyone other than the recipient. It employs theoretical results from number theory to convert the original message (or plaintext) into cipher text that is then transmitted over a secure channel to the intended recipient. The cipher text is meaningless to anyone other than the intended recipient, and the recipient uses a key to decrypt the received cipher text and to read the original message.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Turing made fundamental contributions to computing, including the theoretical Turing machine.

  2. 2.

    Here x and c are variables rather than the alphabetic characters ‘x’ and ‘c’.

  3. 3.

    This requirement is to ensure that the matrix A is invertible.

  4. 4.

    The NBS is now known as the National Institute of Standards and Technology (NIST).

References

  1. An Improved Algorithm for Computing Algorithms over GF(p) and its Cryptographic Significance. S. Pohlig and M. Hellman (1978). IEEE Transactions on Information Theory (24): 106–110.

    Google Scholar 

  2. Data Encryption Standard. FIPS-Pub 46. National Bureau of Standards. U.S. Department of Commerce. January 1977.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gerard O’Regan .

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

O’Regan, G. (2016). Cryptography. In: Guide to Discrete Mathematics. Texts in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-44561-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44561-8_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44560-1

  • Online ISBN: 978-3-319-44561-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics