Next:
Introduction to Cryptography
Up:
Using Maple
Previous:
Bibliography
fsqFsHn sGGousG
Subsections
Introduction to Cryptography
Simple Ciphers
Simple substitution
The Caesar cipher, and the ASCII encoding
Treating characters as numbers
Render unto Caesar
Defining functions with proc; Local and global variables
Caesar cipher redux
Improved Caesar-like ciphers
The Vignère cipher
One-time pads
Multi-character alphabets
Reading and Writing from a file
Affine enciphering
When do affine encodings fail?
Implementing and using an affine encoding
Breaking an affine cipher
Enciphering matrices
Treating text as vectors
Affine encoding with matrices
A Known-plaintext attack on an affine matrix cipher
Modern cryptography
Secure cryptosystems
Message digests
Public Key cryptography
Some Number Theory
The greatest common divisor and the Euclidean algorithm
The Chinese Remainder Theorem
Powers modulo n
The Euler
-function and Euler's Theorem
The RSA Public key cryptosystem
Details of the RSA algorithm
Implementing RSA in Maple
Implementing the basics of RSA
Making it Useful
RSA encoding a file
Translated from LaTeX by Scott Sutherland
2002-08-29