Beneath the literal encrypting the decrypted, decrypting the encrypted
Date of Publication
2008
Document Type
Bachelor's Thesis
Degree Name
Bachelor of Science in Mathematics with specialization in Business Applications
Subject Categories
Mathematics
College
College of Science
Department/Unit
Mathematics and Statistics
Thesis Adviser
Arlene A. Pascasio
Defense Panel Chair
Jose Tristan F. Reyes
Defense Panel Member
Edmundo R. Perez
Ederlina G. Nocon
Abstract/Summary
This paper mainly discusses Cryptography, a well-known application of number theory. Although it touches on some examples of conventional cryptosystem, the main focus of this paper is all about the second kind of cryptosystem, the private-key cryptosystems. The researchers studied the Mathematics behind popular private-key cryptosystems such as the Knapsack Algorithm and the Rivest-Shamir-Adleman (RSA) Algorithm.
A program is also included in this paper as the researchers found it necessary to automate the step-by-step computations. A user-documentation is also provided to guide users in understanding the programming behind and how to use the automation program.
Abstract Format
html
Language
English
Format
Accession Number
TU15417
Shelf Location
Archives, The Learning Commons, 12F, Henry Sy Sr. Hall
Physical Description
vi, 76 leaves, illustrations, 28 cm.
Keywords
Cryptography; Number theory
Recommended Citation
Dykimching, R. W., & San Pedro, L. T. (2008). Beneath the literal encrypting the decrypted, decrypting the encrypted. Retrieved from https://animorepository.dlsu.edu.ph/etd_bachelors/5053
Embargo Period
3-29-2021