Beneath the literal encrypting the decrypted, decrypting the encrypted

This paper mainly discusses Cryptography, a well-known application of number theory. Although it touches on some examples of conventional cryptosystem, the main focus of this paper is all about the second kind of cryptosystem, the private-key cryptosystems. The researchers studied the Mathematics be...

Full description

Saved in:
Bibliographic Details
Main Authors: Dykimching, Reagan W., San Pedro, Lorraine Anne T.
Format: text
Language:English
Published: Animo Repository 2008
Subjects:
Online Access:https://animorepository.dlsu.edu.ph/etd_bachelors/5053
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: De La Salle University
Language: English
Description
Summary:This paper mainly discusses Cryptography, a well-known application of number theory. Although it touches on some examples of conventional cryptosystem, the main focus of this paper is all about the second kind of cryptosystem, the private-key cryptosystems. The researchers studied the Mathematics behind popular private-key cryptosystems such as the Knapsack Algorithm and the Rivest-Shamir-Adleman (RSA) Algorithm.A program is also included in this paper as the researchers found it necessary to automate the step-by-step computations. A user-documentation is also provided to guide users in understanding the programming behind and how to use the automation program.