Beneath the literal encrypting the decrypted, decrypting the encrypted
This paper mainly discusses Cryptography, a well-known application of number theory. Although it touches on some examples of conventional cryptosystem, the main focus of this paper is all about the second kind of cryptosystem, the private-key cryptosystems. The researchers studied the Mathematics be...
Saved in:
Main Authors: | , |
---|---|
Format: | text |
Language: | English |
Published: |
Animo Repository
2008
|
Subjects: | |
Online Access: | https://animorepository.dlsu.edu.ph/etd_bachelors/5053 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Language: | English |
id |
oai:animorepository.dlsu.edu.ph:etd_bachelors-5625 |
---|---|
record_format |
eprints |
spelling |
oai:animorepository.dlsu.edu.ph:etd_bachelors-56252021-03-30T02:57:29Z Beneath the literal encrypting the decrypted, decrypting the encrypted Dykimching, Reagan W. San Pedro, Lorraine Anne T. This paper mainly discusses Cryptography, a well-known application of number theory. Although it touches on some examples of conventional cryptosystem, the main focus of this paper is all about the second kind of cryptosystem, the private-key cryptosystems. The researchers studied the Mathematics behind popular private-key cryptosystems such as the Knapsack Algorithm and the Rivest-Shamir-Adleman (RSA) Algorithm.A program is also included in this paper as the researchers found it necessary to automate the step-by-step computations. A user-documentation is also provided to guide users in understanding the programming behind and how to use the automation program. 2008-01-01T08:00:00Z text https://animorepository.dlsu.edu.ph/etd_bachelors/5053 Bachelor's Theses English Animo Repository Cryptography Number theory Mathematics |
institution |
De La Salle University |
building |
De La Salle University Library |
continent |
Asia |
country |
Philippines Philippines |
content_provider |
De La Salle University Library |
collection |
DLSU Institutional Repository |
language |
English |
topic |
Cryptography Number theory Mathematics |
spellingShingle |
Cryptography Number theory Mathematics Dykimching, Reagan W. San Pedro, Lorraine Anne T. Beneath the literal encrypting the decrypted, decrypting the encrypted |
description |
This paper mainly discusses Cryptography, a well-known application of number theory. Although it touches on some examples of conventional cryptosystem, the main focus of this paper is all about the second kind of cryptosystem, the private-key cryptosystems. The researchers studied the Mathematics behind popular private-key cryptosystems such as the Knapsack Algorithm and the Rivest-Shamir-Adleman (RSA) Algorithm.A program is also included in this paper as the researchers found it necessary to automate the step-by-step computations. A user-documentation is also provided to guide users in understanding the programming behind and how to use the automation program. |
format |
text |
author |
Dykimching, Reagan W. San Pedro, Lorraine Anne T. |
author_facet |
Dykimching, Reagan W. San Pedro, Lorraine Anne T. |
author_sort |
Dykimching, Reagan W. |
title |
Beneath the literal encrypting the decrypted, decrypting the encrypted |
title_short |
Beneath the literal encrypting the decrypted, decrypting the encrypted |
title_full |
Beneath the literal encrypting the decrypted, decrypting the encrypted |
title_fullStr |
Beneath the literal encrypting the decrypted, decrypting the encrypted |
title_full_unstemmed |
Beneath the literal encrypting the decrypted, decrypting the encrypted |
title_sort |
beneath the literal encrypting the decrypted, decrypting the encrypted |
publisher |
Animo Repository |
publishDate |
2008 |
url |
https://animorepository.dlsu.edu.ph/etd_bachelors/5053 |
_version_ |
1772834613054406656 |