Notes on Number Theory and Cryptography
نویسنده
چکیده
Many interesting and useful properties of the set of integers Z (the whole numbers . . . ,−3,−2,−1, 0, 1, 2, 3, 4, 5, . . . ) can be studied by thinking in terms of divisibility by a particular base or modulus, a positive integer m. For example, it is frequently important to know whether a given number k is even or odd, that is to say, whether or not k is (evenly) divisible by 2. (An even number of young swimmers can be paired off in a buddy system, but if there are an odd number, a problem arises.) The entire set Z of integers breaks into two disjoint subsets, the evens and the odds. Note that two numbers x and y are in the same class if and only if their difference is even, that is, 2 divides x − y. Further, the sum of any two even numbers is even, the sum of any two odd numbers is even, and the sum of an even number and an odd number is odd. This allows us to do arithmetic with the two classes of even and odd numbers. Similar statements hold for divisibility by any positive integer modulus m, and we now give those statements formally.
منابع مشابه
The Mathematical Theory of Information , and Applications ( Version 2 . 0 )
These lecture notes introduce some basic concepts from Shannon’s information theory, such as (conditional) Shannon entropy, mutual information, and Rényi entropy, as well as a number of basic results involving these notions. Subsequently, well-known bounds on perfectly secure encryption, source coding (i.e. data compression), and reliable communication over unreliable channels are discussed. We...
متن کاملComputational Methods in Public Key Cryptology
These notes informally review the most common methods from computational number theory that have applications in public key cryptology.
متن کاملImproving security of double random phase encoding with chaos theory using fractal images
This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...
متن کاملOn the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes
In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...
متن کاملLecture Notes in Secret Sharing
Preface These are basically the lecture notes for the short course Applications of Combinatorics to 2012. With the objective of covering a full course on secret sharing, additional content will be added in subsequent versions of these lecture notes. Secret sharing, which was independently introduced in 1979 by Shamir [49] and Blak-ley [6], is one of the most widely studied topics in information...
متن کاملNoisy channels and cryptography
These notes were written for a combined undergraduate/graduate cryptography course. This material can mostly be found in the text assigned to the graduate students, Codes and Cryptography by Dominic Welsh, but not in the text assigned to the undergraduates, Introduction to Cryptography with Coding Theory by Trappe and Washington. These notes are meant to fill the gap for the undergraduate stude...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003