Beneath the literal encrypting the decrypted, decrypting the encrypted

Date of Publication

2008

Document Type

Bachelor's Thesis

Degree Name

Bachelor of Science in Mathematics with specialization in Business Applications

Subject Categories

Mathematics

College

College of Science

Department/Unit

Mathematics and Statistics

Thesis Adviser

Arlene A. Pascasio

Defense Panel Chair

Jose Tristan F. Reyes

Defense Panel Member

Edmundo R. Perez
Ederlina G. Nocon

Abstract/Summary

This paper mainly discusses Cryptography, a well-known application of number theory. Although it touches on some examples of conventional cryptosystem, the main focus of this paper is all about the second kind of cryptosystem, the private-key cryptosystems. The researchers studied the Mathematics behind popular private-key cryptosystems such as the Knapsack Algorithm and the Rivest-Shamir-Adleman (RSA) Algorithm.

A program is also included in this paper as the researchers found it necessary to automate the step-by-step computations. A user-documentation is also provided to guide users in understanding the programming behind and how to use the automation program.

Abstract Format

html

Language

English

Format

Print

Accession Number

TU15417

Shelf Location

Archives, The Learning Commons, 12F, Henry Sy Sr. Hall

Physical Description

vi, 76 leaves, illustrations, 28 cm.

Keywords

Cryptography; Number theory

Embargo Period

3-29-2021

This document is currently not available here.

Share

COinS