Trends in education, 2019 (vol. 12), issue 1

TVV 2019, 12(1):5-11 | DOI: 10.5507/tvv.2019.003


THE MATHEMATICS OF ASYMMETRIC CRYPTOGRAPHY

BÁRTEK Květoslav, ZDRÁHAL Tomáš
Katedra matematiky, Pedagogická fakulta UP v Olomouci

The RSA cryptosystem is the most widely-used public-key cryptography algorithm in the world. It can be used to encrypt a message without the need to exchange a secret key separately. Its security is based on the difficulty of factoring large integers.

Keywords: cryptography, asymmetric cryptography, RSA encryption, CAS Maxima

Received: June 3, 2019; Accepted: November 6, 2019; Prepublished online: December 18, 2019; Published: December 27, 2019  Show citation

ACS AIP APA ASA Harvard Chicago Chicago Notes IEEE ISO690 MLA NLM Turabian Vancouver
BÁRTEK, K., & ZDRÁHAL, T. (2019).
THE MATHEMATICS OF ASYMMETRIC CRYPTOGRAPHY. Trends in education12(1), 5-11. doi: 10.5507/tvv.2019.003
Download citation

References

  1. Burda, K. (2015). Úvod do kryptografie. Akademické nakladatelství CERM. Brno
  2. Monterde, J. & Vallejo, J. (2012). Implementing the RSA Cryptosystem with Maxima CAS. The Electronic Journal of Mathematics and Technology. Vol. 6, No. 1, pp. 34-53.
  3. Ribenboim, P. (1996). The New Book of Prime Number Records. New York: Springer-Verlag. Go to original source...
  4. Rosen, K. (2005). Elementary Number Theory and Its Applications. New York: Addison-Wesley.
  5. Singh, S. (2000). The Code Book. Fourth Estate. London.
  6. Smart, N. (2003). Cryptography: An Introduction. London: McGraw-Hill.
  7. Tlustý, P. (2006). Obecná algebra pro učitele. Jihočeská univerzita. České Budějovice.
  8. Velebil, J. (2007). Diskrétní matematika: Text k přednášce. [online] Praha: [s.n.],193 s. Dostupné z ftp://math.feld.cvut.cz/pub/velebil/y01dma/dma-notes.pdf.

This is an open access article distributed under the terms of the Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.