Beneath the literal encrypting the decrypted, decrypting the encrypted

This paper mainly discusses Cryptography, a well-known application of number theory. Although it touches on some examples of conventional cryptosystem, the main focus of this paper is all about the second kind of cryptosystem, the private-key cryptosystems. The researchers studied the Mathematics be...

Full description

Saved in:
Bibliographic Details
Main Authors: Dykimching, Reagan W., San Pedro, Lorraine Anne T.
Format: text
Language:English
Published: Animo Repository 2008
Subjects:
Online Access:https://animorepository.dlsu.edu.ph/etd_bachelors/5053
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: De La Salle University
Language: English
id oai:animorepository.dlsu.edu.ph:etd_bachelors-5625
record_format eprints
spelling oai:animorepository.dlsu.edu.ph:etd_bachelors-56252021-03-30T02:57:29Z Beneath the literal encrypting the decrypted, decrypting the encrypted Dykimching, Reagan W. San Pedro, Lorraine Anne T. This paper mainly discusses Cryptography, a well-known application of number theory. Although it touches on some examples of conventional cryptosystem, the main focus of this paper is all about the second kind of cryptosystem, the private-key cryptosystems. The researchers studied the Mathematics behind popular private-key cryptosystems such as the Knapsack Algorithm and the Rivest-Shamir-Adleman (RSA) Algorithm.A program is also included in this paper as the researchers found it necessary to automate the step-by-step computations. A user-documentation is also provided to guide users in understanding the programming behind and how to use the automation program. 2008-01-01T08:00:00Z text https://animorepository.dlsu.edu.ph/etd_bachelors/5053 Bachelor's Theses English Animo Repository Cryptography Number theory Mathematics
institution De La Salle University
building De La Salle University Library
continent Asia
country Philippines
Philippines
content_provider De La Salle University Library
collection DLSU Institutional Repository
language English
topic Cryptography
Number theory
Mathematics
spellingShingle Cryptography
Number theory
Mathematics
Dykimching, Reagan W.
San Pedro, Lorraine Anne T.
Beneath the literal encrypting the decrypted, decrypting the encrypted
description This paper mainly discusses Cryptography, a well-known application of number theory. Although it touches on some examples of conventional cryptosystem, the main focus of this paper is all about the second kind of cryptosystem, the private-key cryptosystems. The researchers studied the Mathematics behind popular private-key cryptosystems such as the Knapsack Algorithm and the Rivest-Shamir-Adleman (RSA) Algorithm.A program is also included in this paper as the researchers found it necessary to automate the step-by-step computations. A user-documentation is also provided to guide users in understanding the programming behind and how to use the automation program.
format text
author Dykimching, Reagan W.
San Pedro, Lorraine Anne T.
author_facet Dykimching, Reagan W.
San Pedro, Lorraine Anne T.
author_sort Dykimching, Reagan W.
title Beneath the literal encrypting the decrypted, decrypting the encrypted
title_short Beneath the literal encrypting the decrypted, decrypting the encrypted
title_full Beneath the literal encrypting the decrypted, decrypting the encrypted
title_fullStr Beneath the literal encrypting the decrypted, decrypting the encrypted
title_full_unstemmed Beneath the literal encrypting the decrypted, decrypting the encrypted
title_sort beneath the literal encrypting the decrypted, decrypting the encrypted
publisher Animo Repository
publishDate 2008
url https://animorepository.dlsu.edu.ph/etd_bachelors/5053
_version_ 1772834613054406656