Buy Textbooks  |  Rent Textbooks  |  Sell Textbooks  |  eTextbooks
Help  |  Questions? 1-877-292-6442
Hello, Sign In
Your Account
0

Cryptological Mathematics - 00 edition

Cryptological Mathematics (ISBN10: 0883857197; ISBN13: 9780883857199)
ISBN13: 978-0883857199
ISBN10: 0883857197

Summary: Cryptological Mathematics introduces the reader to elementary yet rigorous mathematics from several different branches of the subject including number theory, abstract algebra, matrix algebra, probability and statistics, all of which play a role in enciphering and deciphering secret messages. And it does so in a light-hearted fashion, thanks to the carryings-on of the book's three main characters, Beth, Stephanie and Molly.

The book can be used at several d
ifferent levels. Those interested in learning how to encipher messages using a variety of symmetric and asymmetric schemes will learn those techniques in this volume. Those interested in learning the mathematical foundations of these techniques will learn how and why the enciphering schemes actually work. And those who are looking for some challenging computer programming exercises will also find exercises in this book to keep them busy. So, the book may be used profitably by amateur cryptographers, motivated liberal arts students, and mathematics or computer science majors alike.

The book begins by considering simple monoalphabetic substitution ciphers (additive, multiplicative, affine and keyword) and then moves through a polyalphabetic substitution cipher (the Vignere Square) and on to polygraphic substitution ciphers (including Hill's system). Finally the RSA Public Key Encryption System is introduced along with several of its variations. At each step the mathematics required to understand these systems is introduced in a thorough yet gentle manner.

The book also invites those readers who may be interested to program the algorithms it describes. Some exercises can be done using a simple spreadsheet program; others are best handled by a symbolic algebra system.

In addition, the book contains biographical sketches of some lesser-known yet fascinating personalities who had been involved with cryptography.

Whether a reader is interested in cryptology, mathematics, or computer science, he or she will discover engaging and delightful material in this volume.
...show more
Summary: Cryptological Mathematics introduces the reader to elementary yet rigorous mathematics from several different branches of the subject including number theory, abstract algebra, matrix algebra, probability and statistics, all of which play a role in enciphering and deciphering secret messages. And it does so in a light-hearted fashion, thanks to the carryings-on of the book's three main characters, Beth, Stephanie and Molly.

The book can be used at several different levels. Those interested in learning how to encipher messages using a variety of symmetric and asymmetric schemes will learn those techniques in this volume. Those interested in learning the mathematical foundations of these techniques will learn how and why the enciphering schemes actually work. And those who are looking for some challenging computer programming exercises will also find exercises in this book to keep them busy. So, the book may be used profitably by amateur cryptographers, motivated liberal arts students, and mathematics or computer science majors alike.

The book begins by considering simple monoalphabetic substitution ciphers (additive, multiplicative, affine and keyword) and then moves through a polyalphabetic substitution cipher (the Vignere Square) and on to polygraphic substitution ciphers (including Hill's system). Finally the RSA Public Key Encryption System is introduced along with several of its variations. At each step the mathematics required to understand these systems is introduced in a thorough yet gentle manner.

The book also invites those readers who may be interested to program the algorithms it describes. Some exercises can be done using a simple spreadsheet program; others are best handled by a symbolic algebra system.

In addition, the book contains biographical sketches of some lesser-known yet fascinating personalities who had been involved with cryptography.

Whether a reader is interested in cryptology, mathematics, or computer science, he or she will discover engaging and delightful material in this volume. ...show less

Edition/Copyright: 00
Cover:
Publisher: Mathematical Association of America
Year Published: 2000
International: No



List Price: $0.00
Used  Currently Sold Out
New  Currently Sold Out
Close
Close
Close