Catholic University of Zimbabwe Library
Online Public Access Catalogue
(OPAC)

Yet Another Introductory Number Theory Textbook (Cryptology Emphasis Version) Jonathan Poritz

Contributor(s): Poritz, Jonathan A [author] | Open Textbook Library [distributor]Material type: TextTextSeries: Open textbook libraryDistributor: Open Textbook Library Publisher: Jonathan Poritz Description: 1 online resourceISBN: Subject(s): Applied mathematics -- Textbooks | Cryptography -- TextbooksLOC classification: QA37.3Online resources: Access online version
Contents:
Chapter 1: Well-Ordering and Division -- Chapter 2: Congruences -- Chapter 3: Prime Numbers -- Chapter 4: Cryptology -- Chapter 5: Indices = Discrete Logarithms
Subject: This version of YAINTT has a particular emphasis on connections to cryptology. The cryptologic material appears in Chapter 4 and §§5.5 and 5.6, arising naturally (I hope) out of the ambient number theory. The main cryptologic applications - being the RSA cryptosystem, Diffie-Hellman key exchange, and the ElGamal cryptosystem - come out so naturally from considerations of Euler's Theorem, primitive roots, and indices that it renders quite ironic G.H. Hardy's assertion [Har05] of the purity and eternal inapplicability of number theory. Note, however, that once we broach the subject of these cryptologic algorithms, we take the time to make careful definitions for many cryptological concepts and to develop some related ideas of cryptology which have much more tenuous connections to the topic of number theory. This material therefore has something of a different flavor from the rest of the text - as is true of all scholarly work in cryptology (indeed, perhaps in all of computer science), which is clearly a discipline with a different culture from that of "pure"mathematics. Obviously, these sections could be skipped by an uninterested reader, or remixed away by an instructor for her own particular class approach.
Tags from this library: No tags from this library for this title.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number URL Status Date due Barcode Item holds
eBook eBook
Online Access
QA37.3 (Browse shelf(Opens below)) Link to resource Available
Total holds: 0

Chapter 1: Well-Ordering and Division -- Chapter 2: Congruences -- Chapter 3: Prime Numbers -- Chapter 4: Cryptology -- Chapter 5: Indices = Discrete Logarithms

This version of YAINTT has a particular emphasis on connections to cryptology. The cryptologic material appears in Chapter 4 and §§5.5 and 5.6, arising naturally (I hope) out of the ambient number theory. The main cryptologic applications - being the RSA cryptosystem, Diffie-Hellman key exchange, and the ElGamal cryptosystem - come out so naturally from considerations of Euler's Theorem, primitive roots, and indices that it renders quite ironic G.H. Hardy's assertion [Har05] of the purity and eternal inapplicability of number theory. Note, however, that once we broach the subject of these cryptologic algorithms, we take the time to make careful definitions for many cryptological concepts and to develop some related ideas of cryptology which have much more tenuous connections to the topic of number theory. This material therefore has something of a different flavor from the rest of the text - as is true of all scholarly work in cryptology (indeed, perhaps in all of computer science), which is clearly a discipline with a different culture from that of "pure"mathematics. Obviously, these sections could be skipped by an uninterested reader, or remixed away by an instructor for her own particular class approach.

Attribution-ShareAlike

In English.

Description based on online resource

There are no comments on this title.

to post a comment.

OPENING HOURS

Weekdays: 0815hrs - 1800hrs
Weekends:0900hrs - 1200hrs

Closed for Mass:

Mon, Thur: 1200hrs - 1300hrs
Sunday & Public Holiday’s

CALL SUPPORT

0242-570570, 0242-570169
09200664, +263 8644140602

LOCATION

18443, Cranborne Avenue, Hatfield, Harare

Other Links


©2021 | CUZ Library