Cryptography Definition and 63 Threads
-
S
Creating Entropy For Cryptographic Purposes
Hello, My name is Mason C. Turner and I work in the cybersecurity field. My background includes both military communications as well as private sector experience. According to the laws of physics, to the best of my understanding information and energy are directly interchangeable in a...- StarHunter
- Thread
- Cryptography Encryption Entropy Random number Randomness
- Replies: 3
- Forum: Computing and Technology
-
Comp Sci Solve ax+by=GCD(a,b) for RSA Algorithm Cryptography
It starts at 6:16 It's the part where he's pointing his hand in this picture. I didn't get it although it's pretty mechanical, so I'd like to learn that technique as this is really useful in RSA algorithm(rather than having to memorize some values). I've been searching for a method like that...- shivajikobardan
- Thread
- Algorithm Cryptography
- Replies: 2
- Forum: Engineering and Comp Sci Homework Help
-
A
MHB Accelerate Zero-Knowledge Cryptography with ZPrize!
I would like to invite your members to participate in the ZPrize competition. ZPrize is an industry-wide competition, modeled after the XPrize, to accelerate zero-knowledge cryptography. We have over 39 leading zero-knowledge technology companies contributing to this effort donating $7 million...- April_BIG
- Thread
- Accelerate Cryptography
- Replies: 1
- Forum: Programming and Computer Science
-
I Space Group Symmetry: What is F d3m Spinel Structure?
What does mean spinel structure has F d3m space group? I know F is for face centred cubic, 3 is 3-fold symmetry and m is mirror, but I don't know what means "d"?- Rzbs
- Thread
- Cryptography Group Space Symmetry
- Replies: 2
- Forum: Atomic and Condensed Matter
-
S
Nobel prize in physics for quantum cryptography?
Is it likely that this year's Nobel prize could be awarded to the field of quantum cryptography with Charles H Bennet, Gilles Brassard and Artur Ekert as possible nobel laureate candidates?- Suekdccia
- Thread
- Cryptography Nobel prize Physics Quantum Quantum computing Quantum mechanics
- Replies: 1
- Forum: General Discussion
-
D
Cryptography - coin flipping protocol
Conditions of the problem: y =/= a^2 (mod pq) -y =/= a^2 (mod pq) p = 3 (mod 4) q = 3 (mod 4) (a) We assume y is both square (mod p) and (mod q). Then, b^2 = y (mod p) b^2 = y (mod q) b^2 = y + pk b^2 = y + qr pk = qr ? (should we assume b is the same between the two equations?) (b) -y = d^2...- docnet
- Thread
- Cryptography
- Replies: 3
- Forum: Calculus and Beyond Homework Help
-
D
Cryptography problem involving prime numbers
Here is my attempt When we raise both sides to the power (p-1)/2, we get x^(p-1)= -1^[(p-1)/2](modp) Looking at p=3(mod4), the possible values of p are {3, 7, 11, 19, 23, 31...}. Putting these values of p into (p-1)/2 we get odd integers. {1, 3, 5, 9, 11, 15...}. So we have x^(p-1) =...- docnet
- Thread
- Cryptography Numbers Prime Prime numbers
- Replies: 5
- Forum: Calculus and Beyond Homework Help
-
S
Comp Sci RSA system with p=17, q=11 and e=3. Find m corresponding to c=156
OFFICIAL SOLUTION: d=e^(-1) mod 160=107 mp= c^(d) mod p=7 mq:=c^(d) mod q=7 MY THOUGHTS: I understand how d = 107, but I got that by using m = (17-1)(11-1) = 160. What I don't understand is the next two lines (from the official solution). I am aware of the P = C^d mod n (decryption) formula...- s3a
- Thread
- Cryptography Security System
- Replies: 1
- Forum: Engineering and Comp Sci Homework Help
-
N
What is the role of Eve in a Man in the Middle attack?
I have some curiosity about MIM attack in a paper that I have been found before. The diagram shows the MIM attack between Alice and Bob: I found that the sentences state: "We consider that the transmittance of the quantum channel is t. If Alice sends pulses with a mean photon number of N...- Nur Ziadah
- Thread
- cryptography
- Replies: 6
- Forum: Quantum Physics
-
V
MHB How to Use Elliptic Curve Cryptography to Find Inverses and Points on the Curve?
May I know how to solve the equation as below: (1) y2 = x3 + x + 1 mod 17 Finding Inverses Finding Points on the Curve (2) y2 = x3 + 3x + 1 mod 13 Finding Inverses Finding Points on the Curve- vokoyo
- Thread
- Cryptography Curve
- Replies: 2
- Forum: General Math
-
H
Number Theory Cryptanalysis Books: Prerequisites for Beginners
Hey guys, I just bought the book Elementary Cryptanalysis: A Mathematical Approach by Abraham Sinkov, yet before I start it, I would like to know if there are any prerequisites I should know about as I am 16 and I still haven't even taken all of high school mathematics although I am self...- HRT-713
- Thread
- Beginner Books Cryptography Cryptology High school student
- Replies: 9
- Forum: Science and Math Textbooks
-
The Inner Workings of an Enigma Machine
Ever wonder how the famous Enigma Machine worked? Mathematician and cryptography expert Dr. James Grime takes one apart to demonstrate how it created complex codes.- Wrichik Basu
- Media item
- cryptography
- Comments: 1
- Category: Pop Science
-
MHB Cryptography: RSA Message decryption
I've been trying to solve this question for quite a while now. I watched a ton of videos on RSA. But whenever I try to solve it I get weird answers. Can some pls give me a hint or their method of solving it. An answer to the question also would be fine.- ertagon2
- Thread
- Cryptography
- Replies: 4
- Forum: General Math
-
T
Learning number theory for cryptography
Hi everyone, I am trying to learn the underlying number theory concepts behind cryptography, and I was wondering if anyone knows of good resources for learning about number theory as applied to cryptography. I was hoping to practice writing proofs as well. Thanks!- typer91
- Thread
- Cryptography Mathematics Number theory Practice problems Theory
- Replies: 1
- Forum: STEM Academic Advising
-
J
Cryptographic attacks as minimization of degree 4 polynomial
Cryptography is based on reason-result chains like hash functions: which are inexpensive to propagate in the intended direction, but seem hard to reverse. However, decomposing them into satisfaction of simple (direction-agnostic) relations like 3-SAT clauses, may bring a danger of existence of...- jarekduda
- Thread
- Cryptography Degree Minimization Polynomial
- Replies: 7
- Forum: Programming and Computer Science
-
T
I Can E(M,K) = C Replace Ek(M) = C in Cryptography Notation?
I was just reading a cryptography book and have a question about something the author states I highlighed the statement in yellow and included a pictures. So I was wondering if the function could be written as E(M,K) = C instead of Ek(M)=C since the fact that E is dependent on K. If not why...- Teachme
- Thread
- Cryptography Notation
- Replies: 3
- Forum: Set Theory, Logic, Probability, Statistics
-
I One Way vs. Entangled Cryptography
In a recent article (I've lost the reference, but it doesn't matter) it said that employing entangled photons is superior to the usual one way transmission of photons from Alice to Bob for creating a one time pad. It gave no justification for this claim. Can anyone provide me with one?- Zafa Pi
- Thread
- Cryptography Entangled
- Replies: 5
- Forum: Quantum Physics
-
C
What can be different options for a MS in applied Math ?
Where all can I apply to pursue a MS in applied Math after acquiring a BS in Math as I am not interested in doing a PhD.- Crystal!
- Thread
- Applied Applied math Cryptography Masters degree
- Replies: 3
- Forum: STEM Career Guidance
-
M
MHB Cryptography Topics: Electronic Voting, Lattice Reduction | Recommendation
Hey! :o I am taking the course cryptography this semester and I will have a presentation at the end of the semester. Could you give me some information about the following topics: - An electronic voting system - Lattices and lattice reduction What are these topics about?? Which one...- mathmari
- Thread
- Cryptography Topics
- Replies: 2
- Forum: Programming and Computer Science
-
How would observation of the state of qubits affect them?
Firstly, I apologise for any lack of understanding, incorrect assumptions or misinterpretations of the very little I know about physics, quantum mechanics & quantum computing. I am not an academic, scientist or mathematician, but a software engineer with an interest in quantum computing and...- ant0n
- Thread
- Cryptography Observation Quantum computing Qubit Qubits State Superposition
- Replies: 10
- Forum: Quantum Physics
-
R
Interested in Algebraic Geometry and Mathematical Cryptography? Let's Connect!
I'm finishing a B.S. in math and have been getting a bit more into physics lately. I'm on track for a second major in either physics or Russian, but not super concerned about finishing - I'm applying to grad programs in pure math. I'm particularly interested in algebraic geometry, combinatorics...- reuben
- Thread
- cryptography mathematical physics translation
- Replies: 1
- Forum: New Member Introductions
-
MHB A question on cryptography....
The recent case 'datagate' suggests me to prose to You a question I didn.t resolve completely. Let's suppose that we have a plaintext $p_{n}$ and we code it with a key $k_{n}$ generating a chipertext... $\displaystyle c_{n} = p_{n} + k_{n}\ (1)$ ... where the sum is modulo some 'large...- chisigma
- Thread
- Cryptography
- Replies: 2
- Forum: General Math
-
S
Some questions about cryptography
Hi I am a first year student studying mathematics. I have been experimenting with various subjects to find my thing, and I think I am interested in discrete mathematics, particulary in number theory and cryptography. 1) But it seems like, there aren't many companies that are explicitly...- set
- Thread
- Cryptography
- Replies: 2
- Forum: STEM Academic Advising
-
F
Cryptography, public key and private key
Hello Forum, If Alice wants to send a secret message to Bob, she has to encrypt it first to keep the message secure. Who issues the public key in this case and who uses the private key? thanks fisico30- fisico30
- Thread
- Cryptography
- Replies: 1
- Forum: Programming and Computer Science
-
M
What are some applications of prime numbers other than cryptography
I was just wondering what are some applications of prime numbers other than cryptography? Also i heard that there is no certain *equation or prediction of Prime numbers? For example, there is no way to explain prime numbers with an equation. What happens if one was able to find one...- michojek
- Thread
- Applications Cryptography Numbers Prime Prime numbers
- Replies: 2
- Forum: Linear and Abstract Algebra
-
P
Which Mathematicians Pioneered Prime Numbers for Cryptography?
Hello, This may seem like a random question but I'm doing a essay on cryptography and I'm wondering if anyone could tell me who was the mathematician(s) that done the original work in prime numbers that lead to the development of cryptography and the RSA and whatnot. Sorry if this is vague...- phospho
- Thread
- Cryptography
- Replies: 2
- Forum: Linear and Abstract Algebra
-
S
Which Mathematician's Theorem Linked Prime Numbers to Cryptography?
Hello, this is rather vague but I had a lecture around a year ago about prime numbers and how a mathematician (Hardy or Euler?) found a proof to do with prime numbers and then this lead on to cryptography and internet security... That's all I can particularly remember but I'm wondering on...- synkk
- Thread
- Cryptography Numbers Prime Prime numbers
- Replies: 4
- Forum: Linear and Abstract Algebra
-
N
Help with Cryptography | Read & Prerequisites
Dears, Hope everything is going fine with all of you; I hold a Bsc in communications and electronics engineering and a Diploma in Information security; I want to study cryptography, and I decided to have a Msc in Maths for this reason; Kindly, if you can recommend what books to read...- nourmina
- Thread
- Cryptography
- Replies: 4
- Forum: STEM Academic Advising
-
D
Need a Comprehensive Cryptography Text
As per the title, I need a cryptography book that does not shy away from math. To me it seems like many crypto books are scared of presenting the theory from a mathematician's perspective. I was recommended Cryptography : Theory and Practice by Stinson, can anyone comment on it? Any help is...- DivisionByZro
- Thread
- Cryptography Text
- Replies: 5
- Forum: Science and Math Textbooks
-
A
Linear Algebra Applications: Cryptography
If any of you guys are seeing or saw this app. for linear algebra in your classes, I could use a hand... Homework Statement A Hill 2-cipher is intercepted that starts with the pairs SL HK Find the deciphering and enciphering matrices, given that the plaintext is known to start with the...- aero_zeppelin
- Thread
- Algebra Applications Cryptography Linear Linear algebra
- Replies: 8
- Forum: Precalculus Mathematics Homework Help
-
D
Physics Research in quantum cryptography
Hello! I'm an undergraduate in physics engineering student who's thinking about his future. I would like to work in the field of quantum cryptography or communication with light, or -more or less- to do the same kind of research as Anton Zeilinger. Which kind of MSc and PhD should I take and...- DiracRules
- Thread
- Cryptography Quantum Research
- Replies: 1
- Forum: STEM Career Guidance
-
P
PhD in Cryptography: Private Sector Career Advice
So I'm getting to the point now where I need to start looking at graduate schools in mathematics. Being a pure math major my original plan has always been to get a phd in pure math and from there attempt to break into academia. But the more I learn about the current academic climate, the more...- Poopsilon
- Thread
- Cryptography Phd
- Replies: 10
- Forum: STEM Career Guidance
-
R
Cryptography - transposition cipher
Suppose m = 6 was encoded with ther permutation \pi = (13)(2546) Decrypt:- EESLSHSALSESLSHBLEHSYEETHRAEOS It turns out that the inverse of \pi is how you decrypt the message and apply the inverse permutaion which is (31)(6452) And the plaintext is she sells seashells... However I am...- Rubik
- Thread
- Cryptography
- Replies: 11
- Forum: General Math
-
R
Cryptography - modulo arithmetic
Finding log3(4) in Z(11).. Is that the same as finding log3(4)(mod11)?- Rubik
- Thread
- Arithmetic Cryptography
- Replies: 2
- Forum: Linear and Abstract Algebra
-
M
Quantum Cryptography Project Help.
Hello Every one! I am an electric engineering student, Doing my graduation project on the topic of quantum cryptography, i have read the literature and i think that i understand the topic quite well. In the literature review i am talking about classical cryptography, QKD, BB84 protocol, EPR...- mumaga
- Thread
- Cryptography Project Quantum
- Replies: 9
- Forum: Quantum Physics
-
M
What classes do I need to major in Cryptography?
What classes do I need to major in Cryptography?- Miss Rellum
- Thread
- Classes Cryptography Major
- Replies: 23
- Forum: STEM Career Guidance
-
M
Quantum Cryptography: Classes & Degree Programs
If I want to go into quantum cryptography, what classes should I take and what colleges are there that offer this degree? Thank you so much!- Miss Rellum
- Thread
- Cryptography Quantum
- Replies: 2
- Forum: STEM Academic Advising
-
F
How Do You Solve an Affine Cipher with Given Mappings?
Homework Statement 7) You are attempting to break an affine cipher. You believe that the ciphertext ‘a’ maps to the plaintext letter ‘E’ and that the ciphertext ‘v’ maps to the plaintext ‘T’. Determine the encryption function used based on these two pieces of information. Homework Equations...- Firestrider
- Thread
- Cryptography
- Replies: 1
- Forum: Precalculus Mathematics Homework Help
-
K
Hackers exploit quantom cryptography
Simple, ingenious, and effective. http://www.nature.com/news/2010/100829/full/news.2010.436.html http://www.youtube.com/watch?v=VMdf8Xwxvnw&p=5E45CC761E979839&index=2&playnext=2- Kidphysics
- Thread
- Cryptography hackers
- Replies: 4
- Forum: Quantum Physics
-
L
How can I break into the NSA's cryptography field before I graduate?
So here is my situation: I am planning on graduating March 2011 with a B.S in Mathematics, as well as a B.S. in Physics. My interest in physics has waned greatly, and my desire to go to grad school for either subject is non-existent right now. I took a look at the NSA, as I heard they hire...- Lucretius
- Thread
- Cryptography
- Replies: 12
- Forum: STEM Career Guidance
-
G
Is n Prime if Zero Products and Unique Solutions Exist in Modulo n Arithmetic?
I'm having some trouble addressing the following two questions in a text I am going through: 1. Show that n is a prime number iff whenever a,b ∈ Zn with ab=0, we must have that a=0 or b=0. 2. Show that n is a prime number iff for every a,b,c ∈ Zn satisfying a not =0, and ab=ac, we have...- guyfromnola
- Thread
- Cryptography Number theory Theory
- Replies: 1
- Forum: Linear and Abstract Algebra
-
E
What Degree Leads to Compsci/ Security/ Cryptography
What undergraduate degree will best prepare a person for one of these fields (comp security/cryptography)? - math - compsci ...out of the two, which one would better benefit me if I pursue a PhD with. I'm most interested in computer security and cryptography. Cryptography is...- emtakis
- Thread
- compsci Cryptography Degree Security
- Replies: 5
- Forum: Programming and Computer Science
-
M
[cryptography] quantum key distribution
I'm reading up on quantum key distribution schemes, mostly: BB84, B92 and the EPR Protocol, and I'm having some problems relating them. Is it correct to say that BB84 is a special case of B92(with extra specific states)? Is it also safe to say that both BB84 and B92 are special cases of EPR...- martman
- Thread
- Cryptography Distribution Quantum
- Replies: 1
- Forum: Quantum Physics
-
L
What Are the Best Beginner Resources for Learning Quantum Cryptography?
Hi, Can anyone recommend some good websites, or preferably books, which give an introduction to Quantum Cryptography? I'm looking for a level aimed at first year undergrad level, assuming little to no prior knowledge really, except for A-level quantum physics. Any suggestions would be very...- Littlemissshy
- Thread
- Cryptography
- Replies: 1
- Forum: Quantum Physics
-
T
Programming needed for Cryptography
I was wondering, what types of programming languages are used in the field of Cryptography? I'm a math major with a working knowledge of C/C++, Java, and Python. Would it be worthwhile to learn some assembly languages? Should I learn more high level languages? Or, should I hone my skills in the...- The|M|onster
- Thread
- Cryptography Programming
- Replies: 3
- Forum: Programming and Computer Science
-
M
Debunking the Hype: The Truth About Quantum Cryptography
I am extremely skeptical about quantum cryptography. First all of the articles I have read about the technology use the same mathematical concepts to encrypt and decrypt a message. Nothing about quantum cryptography actually changes physical characteristics of math. That is obvious. There...- MrGamma
- Thread
- Cryptography Quantum
- Replies: 22
- Forum: Quantum Physics
-
A
Which books are recommended for learning about RSA public-key cryptography?
public-key cryptography "RSA" Hi all, I want to ask about cryptology, What are the recommended books in this filed and i want to ask about public-key cryptography"RSA", I want some details.- Ahmadsh
- Thread
- Cryptography
- Replies: 2
- Forum: MATLAB, Maple, Mathematica, LaTeX
-
R
Quantum cryptography and uncertainty relations
Almost all the explanations of quantum cryptography I've come across simply say that the encryption is "protected by the Heisenberg uncertainty principle". I'm having a little difficulty getting any more detail than that without getting way out of my depth (I'm only an A-level student!). Does...- Rich19
- Thread
- Cryptography Quantum Relations Uncertainty
- Replies: 5
- Forum: Quantum Physics
-
M
Cryptography Forums: Recommended for Hobby/Puzzle Enthusiasts
Can anyone recommend a cryptography related forum? Particularly for hobby/puzzle enthusiasts.. I'm coming up dry.- mm71
- Thread
- Cryptography
- Replies: 2
- Forum: General Math
-
K
Solve Cryptography Exercises: Rabbin & RSA Protocols
Hi I have stuck at these two exercises ... 1) Suppose we use the Rabbin protocol and we have chosen p=31,q=51 and B=15. If we want to transmit the message M=20 which will be the encrypted message C?? Also what are the messages the recipient will receive decrypting C ?? 2)...- kopros
- Thread
- Cryptography
- Replies: 5
- Forum: Linear and Abstract Algebra