In this introduction to Cryptography, we start by giving some basic notions from elementary number theory and see how they can be applied to send ``secret'' messages. After introducing congruence theory, Fermat's little theorem and the Euler-Fermat theorem, we examine, from a historical point of view, some classic cryptographic systems. Then we give the main properties of modern cryptographic systems and, in particular, we define public key cryptography. One of the most important public-key systems (which exploits the fact that in $\Z$ primality algorithms are much ``faster'' than factorization ones) is presented: the R.S.A. cryptosystem. We also present another public key system which exploits the discrete logarithm problem and which is also consistently used as an alternative to R.S.A. (for example the U.S. government offices use it for their digital signature scheme). An analogue of the discrete logarithm problem is used in the so-called ``elliptic curves cryptosystems''. Unfortunately, the amount of mathematical theory needed to understand the elliptic curves method is too great to be explained here. So, we will say, in the last paragraph, just a few words on the differences between the discrete logarithm problem and its elliptic curve analogue. This article is geared toward the amateur interested in the subject.

An introduction to Cryptography

LANGUASCO, ALESSANDRO
2000

Abstract

In this introduction to Cryptography, we start by giving some basic notions from elementary number theory and see how they can be applied to send ``secret'' messages. After introducing congruence theory, Fermat's little theorem and the Euler-Fermat theorem, we examine, from a historical point of view, some classic cryptographic systems. Then we give the main properties of modern cryptographic systems and, in particular, we define public key cryptography. One of the most important public-key systems (which exploits the fact that in $\Z$ primality algorithms are much ``faster'' than factorization ones) is presented: the R.S.A. cryptosystem. We also present another public key system which exploits the discrete logarithm problem and which is also consistently used as an alternative to R.S.A. (for example the U.S. government offices use it for their digital signature scheme). An analogue of the discrete logarithm problem is used in the so-called ``elliptic curves cryptosystems''. Unfortunately, the amount of mathematical theory needed to understand the elliptic curves method is too great to be explained here. So, we will say, in the last paragraph, just a few words on the differences between the discrete logarithm problem and its elliptic curve analogue. This article is geared toward the amateur interested in the subject.
2000
The Curves Seminar at Queen's, vol 13
088911854X
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11577/1350803
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
  • OpenAlex ND
social impact