did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540691990

Elementary Number Theory, Cryptography and Codes

by ; ;
  • ISBN13:

    9783540691990

  • ISBN10:

    3540691995

  • Format: Paperback
  • Copyright: 2009-02-03
  • Publisher: Springer Nature
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $79.99 Save up to $56.36
  • Digital
    $51.19
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

In this volume one finds basic techniques from algebra and number theory (e.g. congruences, unique factorization domains, finite fields, quadratic residues, primality tests, continued fractions, etc.) which in recent years have proven to be extremely useful for applications to cryptography and coding theory. Both cryptography and codes have crucial applications in our daily lives, and they are described here, while the complexity problems that arise in implementing the related numerical algorithms are also taken into due account. Cryptography has been developed in great detail, both in its classical and more recent aspects. In particular public key cryptography is extensively discussed, the use of algebraic geometry, specifically of elliptic curves over finite fields, is illustrated, and a final chapter is devoted to quantum cryptography, which is the new frontier of the field. Coding theory is not discussed in full; however a chapter, sufficient for a good introduction to the subject, has been devoted to linear codes. Each chapter ends with several complements and with an extensive list of exercises, the solutions to most of which are included in the last chapter. Though the book contains advanced material, such as cryptography on elliptic curves, Goppa codes using algebraic curves over finite fields, and the recent AKS polynomial primality test, the authors' objective has been to keep the exposition as self-contained and elementary as possible. Therefore the book will be useful to students and researchers, both in theoretical (e.g. mathematicians) and in applied sciences (e.g. physicists, engineers, computer scientists, etc.) seeking a friendly introduction to the important subjects treated here. The book will also be useful for teachers who intend to give courses on these topics.

Author Biography

M. Welleda Baldoni is full professor of higher geometry at the University of Roma Tor Vergata Ciro Ciliberto is full professor of higher geometry at the University of Roma Tor Vergata Giulia Maria Piacentini Cattaneo is full professor of higher geometry at the University of Roma Tor Vergata

Table of Contents

A round-up on numbersp. 1
Mathematical inductionp. 1
The concept of recursionp. 5
Fibonacci numbersp. 6
Further examples of population dynamicsp. 11
The tower of Hanoi: a non-homogeneous linear casep. 13
The Euclidean algorithmp. 14
Divisionp. 14
The greatest common divisorp. 16
Bezout's identityp. 17
Linear Diophantine equationsp. 20
Euclidean ringsp. 21
Polynomialsp. 23
Counting in different basesp. 30
Positional notation of numbersp. 30
Base 2p. 32
The four operations in base 2p. 33
Integer numbers in an arbitrary basep. 39
Representation of real numbers in an arbitrary basep. 40
Continued fractionsp. 43
Finite simple continued fractions and rational numbersp. 44
Infinite simple continued fractions and irrational numbersp. 48
Periodic continued fractionsp. 56
A geometrical model for continued fractionsp. 57
The approximation of irrational numbers by convergentsp. 58
Continued fractions and Diophantine equationsp. 61
Appendix to Chapter 1p. 62
Theoretical exercisesp. 62
Computational exercisesp. 73
Programming exercisesp. 84
Computational complexityp. 87
The idea of computational complexityp. 87
The symbol Op. 89
Polynomial time, exponential timep. 92
Complexity of elementary operationsp. 95
Algorithms and complexityp. 97
Complexity of the Euclidean algorithmp. 98
From binary to decimal representation: complexityp. 101
Complexity of operations on polynomialsp. 101
A more efficient multiplication algorithmp. 103
The Ruffini-Horner methodp. 105
Appendix to Chapter 2p. 107
Theoretical exercisesp. 107
Computational exercisesp. 109
Programming exercisesp. 113
From infinite to finitep. 115
Congruence: fundamental propertiesp. 115
Elementary applications of congruencep. 120
Casting out ninesp. 120
Tests of divisibilityp. 121
Linear congruencesp. 122
Powers modulo np. 126
The Chinese remainder theoremp. 128
Examplesp. 133
Perpetual calendarp. 133
Round-robin tournamentsp. 136
Appendix to Chapter 3p. 136
Theoretical exercisesp. 136
Computational exercisesp. 140
Programming exercisesp. 147
Finite is not enough: factoring integersp. 149
Prime numbersp. 149
The Fundamental Theorem of Arithmeticp. 150
The distribution of prime numbersp. 152
The sieve of Eratosthenesp. 157
Prime numbers and congruencesp. 160
How to compute Euler functionp. 160
Fermat's little theoremp. 162
Wilson's theoremp. 165
Representation of rational numbers in an arbitrary basep. 166
Fermat primes, Mersenne primes and perfect numbersp. 168
Factorisation of integers of the form b[superscript n] [plus or minus] 1p. 168
Fermat primesp. 170
Mersenne primesp. 172
Perfect numbersp. 173
Factorisation in an integral domainp. 173
Prime and irreducible elements in a ringp. 174
Factorial domainsp. 175
Noetherian ringsp. 177
Factorisation of polynomials over a fieldp. 179
Factorisation of polynomials over a factorial ringp. 182
Polynomials with rational or integer coefficientsp. 188
Lagrange interpolation and its applicationsp. 191
Kronecker's factorisation methodp. 195
Appendix to Chapter 4p. 198
Theoretical exercisesp. 198
Computational exercisesp. 204
Programming exercisesp. 211
Finite fields and polynomial congruencesp. 213
Some field theoryp. 213
Field extensionsp. 213
Algebrac extensionsp. 214
Splitting field of a polynomialp. 217
Roots of unityp. 218
Algebraic closurep. 219
Finite fields and their subfieldsp. 220
Automorphisms of finite fieldsp. 222
Irreducible polynomials over Z[subscript p]p. 222
The field F[subscript 4] of order fourp. 224
The field F[subscript 8] of order eightp. 225
The field F[subscript 16] of order sixteenp. 226
The field F[subscript 9] of order ninep. 226
About the generators of a finite fieldp. 227
Complexity of operations in a finite fieldp. 228
Non-linear polynomial congruencesp. 229
Degree two congruencesp. 234
Quadratic residuesp. 236
Legendre symbol and its propertiesp. 238
The law of quadratic reciprocityp. 243
The Jacobi symbolp. 245
An algorithm to compute square rootsp. 248
Appendix to Chapter 5p. 251
Theoretical exercisesp. 251
Computational exercisesp. 255
Programming exercisesp. 260
Primality and factorisation testsp. 261
Pseudoprime numbers and probabilistic testsp. 261
Pseudoprime numbersp. 261
Probabilistic tests and deterministic testsp. 263
A first probabilistic primality testp. 263
Carmichael numbersp. 264
Euler pseudoprimesp. 265
The Solovay-Strassen probabilistic primality testp. 268
Strong pseudoprimesp. 268
The Miller-Rabin probabilistic primality testp. 272
Primitive rootsp. 273
Primitive roots and indexp. 278
More about the Miller-Rabin testp. 279
A polynomial deterministic primality testp. 281
Factorisation methodsp. 290
Fermat factorisation methodp. 291
Generalisation of Fermat factorisation methodp. 292
The method of factor basesp. 294
Factorisation and continued fractionsp. 299
The quadratic sieve algorithmp. 300
The [rho] methodp. 309
Variation of [rho] methodp. 311
Appendix to Chapter 6p. 313
Theoretical exercisesp. 313
Computational exercisesp. 315
Programming exercisesp. 317
Secrets...and liesp. 319
The classic ciphersp. 319
The earliest secret messages in historyp. 319
The analysis of the ciphertextp. 325
Enciphering machinesp. 329
Mathematical setting of a cryptosystemp. 330
Some classic ciphers based on modular arithmeticp. 334
Affine ciphersp. 336
Matrix or Hill ciphersp. 340
The basic idea of public key cryptographyp. 341
An algorithm to compute discrete logarithmsp. 344
The knapsack problem and its applications to cryptographyp. 345
Public key cipher based on the knapsack problem, or Merkle-Hellman cipherp. 348
The RSA systemp. 349
Accessing the RSA systemp. 351
Sending a message enciphered with the RSA systemp. 352
Deciphering a message enciphered with the RSA systemp. 354
Why did it work?p. 356
Authentication of signatures with the RSA systemp. 360
A remark about the security of RSA systemp. 362
Variants of RSA system and beyondp. 363
Exchanging private keysp. 363
ElGamal cryptosystemp. 364
Zero-knowledge proof: persuading that a result is known without revealing its content nor its proofp. 365
Historical notep. 366
Cryptography and elliptic curvesp. 366
Cryptography in a groupp. 367
Algebraic curves in a numerical affine planep. 368
Liens and rational curvesp. 369
Hyperelliptic curvesp. 370
Elliptic curvesp. 372
Group law on elliptic curvesp. 374
Elliptic curves over R, C and Qp. 380
Elliptic curves over finite fieldsp. 381
Elliptic curves and cryptographyp. 384
Pollard's p - 1 factorisation methodp. 385
Appendix to Chapter 7p. 386
Theoretical exercisesp. 386
Computational exercisesp. 390
Programming exercisesp. 401
Transmitting without... fear of errorsp. 405
Birthday greetingsp. 406
Taking photos in space or tossing coins, we end up at codesp. 407
Error-correcting codesp. 410
Bounds on the invariantsp. 413
Linear codesp. 419
Cyclic codesp. 425
Goppa codesp. 429
Appendix to Chapter 8p. 436
Theoretical exercisesp. 436
Computational exercisesp. 439
Programming exercisesp. 443
The future is already here: quantum cryptographyp. 445
A first foray into the quantum world: Young's experimentp. 446
Quantum computersp. 449
Vernam's cipherp. 451
A short glossary of quantum mechanicsp. 454
Quantum cryptographyp. 460
Appendix to Chapter 9p. 467
Theoretical exercisesp. 467
Computational exercisesp. 468
Programming exercisesp. 469
Solution to selected exercisesp. 471
Exercises of Chapter 1p. 471
Exercises of Chapter 2p. 482
Exercises of Chapter 3p. 483
Exercises of Chapter 4p. 487
Exercises of Chapter 5p. 492
Exercises of Chapter 6p. 496
Exercises of Chapter 7p. 498
Exercises of Chapter 8p. 501
Exercises of Chapter 9p. 504
Referencesp. 507
Indexp. 511
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program