Description

Colorful_Squiggle5050.gif (558 bytes)

Cryptological Mathematics introduces the reader to elementary yet rigorous mathematics from several different branches of the subject including number theory, abstract algebra, matrix algebra, probability and statistics, all of which play a role in enciphering and deciphering secret messages. And it does so in a light-hearted fashion, thanks to the carryings-on of the book's three main characters, Beth, Stephanie and Molly.

The book can be used at several different levels. Those interested in learning how to encipher messages using a variety of symmetric and asymmetric schemes will learn those techniques in this volume. Those interested in learning the mathematical foundations of these techniques will learn how and why the enciphering schemes actually work. And those who are looking for some challenging computer programming exercises will also find exercises in this book to keep them busy. So, the book may be used profitably by amateur cryptographers, motivated liberal arts students, and mathematics or computer science majors alike.

The book begins by considering simple monoalphabetic substitution ciphers (additive, multiplicative, affine and keyword) and then moves through a polyalphabetic substitution cipher (the Vigenère Square) and on to polygraphic substitution ciphers (including Hill's system). Finally the RSA Public Key Encryption System is introduced along with several of its variations. At each step the mathematics required to understand these systems is introduced in a thorough yet gentle manner.

The book also invites those readers who may be interested to program the algorithms it describes. Some exercises can be done using a simple spreadsheet program; others are best handled by a symbolic algebra system.

In addition, the book contains biographical sketches of some lesser-known yet fascinating personalities who have been involved with cryptography.

Whether a reader is interested in cryptology, mathematics, or computer science, he or she will discover engaging and delightful material in this volume.

TABLE OF CONTENTS

 

Chapter One - Monoalphabetic Substitution Ciphers

 

 

 

 

 

 

 

Chapter Two - Polyalphabetic Substitution Ciphers

 

 

 

 

 

 

Chapter Three - Polygraphic Substitution Ciphers

 

 

 

 

Chapter Four - Public Key Cryptography

 

 

 

 

 

Appendices

 

Catalog Code: CPT/W
xxx pp., Paperbound, 2000
ISBN 0-88385-719-7

Home