2 fundmental ways of cryptography asymeteric and symeteric

  • Thread starter Thread starter hell18
  • Start date Start date
  • Tags Tags
    Cryptography
AI Thread Summary
Cryptography fundamentally consists of asymmetric and symmetric methods, each serving distinct purposes in encryption systems. While there are no simple formulas that encapsulate the complexity of cryptography, historical methods like one-time pads have proven effective. For practical applications and algorithms, Bruce Schneier's "Applied Cryptography" is recommended, although it lacks in-depth explanations of system usage. For a more theoretical approach, books like "Modern Cryptography: Theory and Practice" by Wenbo Mao and "Cryptography" by Nigel Smart offer mathematical insights. Understanding cryptography requires exploring various resources to grasp its intricate concepts and applications.
hell18
Messages
21
Reaction score
0
i know that there are 2 fundmental ways of cryptography

asymeteric and symeteric

is there any formulas for cryptography? i know its for a encryption system, but there must be formulas?

thanks
 
Mathematics news on Phys.org
If there is a formula, eventually someone else will discover what it is and break your cipher. Historically the best cryptograms have been based on physical duplication of random keys (one time pads).
 
Cryptography is a complex field, you can't really sum up the methods of it in one equation (At least I can't), but there's an excellent book available by Simon Singh that's called "The Code Book" that tells you how cryptography was invented, how it was developed, how the modern cryptography systems work (The RSA system) and what people think will replace RSA in the future. It's very interesting, there's not much math to follow, the math isn't hard and it's a very good read.
 
There are actually lots of forms of cryptography.

If you actually want algorithms and practical tools to build cryptographic systems, forget paperbacks. The best book, IMO, is Bruce Schneier's "Applied Cryptography."

- Warren
 
Schneier's book doesn't tell you why the systems are used that way, infact it just tells you in a rather coarse way to "do this and do that"...

Try "Modern Cryptography: Theory and Practice" by Wenbo Mao
or "Cryptography" by Nigel Smart for a more mathematical look on crypto.
 
Thread 'Video on imaginary numbers and some queries'
Hi, I was watching the following video. I found some points confusing. Could you please help me to understand the gaps? Thanks, in advance! Question 1: Around 4:22, the video says the following. So for those mathematicians, negative numbers didn't exist. You could subtract, that is find the difference between two positive quantities, but you couldn't have a negative answer or negative coefficients. Mathematicians were so averse to negative numbers that there was no single quadratic...
Insights auto threads is broken atm, so I'm manually creating these for new Insight articles. In Dirac’s Principles of Quantum Mechanics published in 1930 he introduced a “convenient notation” he referred to as a “delta function” which he treated as a continuum analog to the discrete Kronecker delta. The Kronecker delta is simply the indexed components of the identity operator in matrix algebra Source: https://www.physicsforums.com/insights/what-exactly-is-diracs-delta-function/ by...
Thread 'Unit Circle Double Angle Derivations'
Here I made a terrible mistake of assuming this to be an equilateral triangle and set 2sinx=1 => x=pi/6. Although this did derive the double angle formulas it also led into a terrible mess trying to find all the combinations of sides. I must have been tired and just assumed 6x=180 and 2sinx=1. By that time, I was so mindset that I nearly scolded a person for even saying 90-x. I wonder if this is a case of biased observation that seeks to dis credit me like Jesus of Nazareth since in reality...
Back
Top