
Cryptography Cryptography  Practice and study of techniques for secure communication in the presence of adversaries 
 LinkBack  Thread Tools  Display Modes 
December 4th, 2007, 04:23 PM  #1 
Joined: Dec 2007 Posts: 187  Cryptography in Computer Science
What mathematical branch is most included in the cryptography part? Isn't it mostly number theory? I was interesting how the computer uses numbers to figure out the cryptography. Are there a lot of advanced algorithms programmed in the computer hardwares for the number theory system to work? 
My Computer Forum is free to register and we welcome everyone! 
December 4th, 2007, 08:00 PM  #2 
Joined: Dec 2007 Posts: 138  Re: Cryptography in Computer Science
It's mostly number theory, with a bit of combinatorics. the actual CS part of public/private key encryption is easy(tm), but the number theory is interesting. Basically, the way private key encryption works is you take all the data, encode it using a private hashing function. This hashing function, we'll call it k, has an interesting trait: k(x) = y, k(y) = x (It's a symmetric relation.) So you have two people with the key, and one person sends data, that has been hashed using k. The second person unhashes it using k. The problem with this is that it requires both parties to have the key ahead of time; the key must either be sent using a private channel (in which case why do you need a new key?) or a public channel, in which case the key isn't private. Public key encryption is similar, but there are a few important differences. Instead, you have two functions, we'll call f and g. f(x)=y and g(y)=x. which measn f(g(x))=g(f(x))=x You hold onto f, and send out g publicly. Everything you send out that you want to be certifiably from you, you put through f, and you tell anyone who wants to send you data (or read your data) to put it through g. Here's where it gets interesting. Person A has private key f, and public key g. Person B has private key j and public key k. Person A wants to send x to person B, so he applies k to it. k(x)=y, he then applies f to it f(y)=w. Then he sends it to B, along with a public message that says "I've sent you data." Person B then decrypts the data using g. g(w)=y. He then decrypts it again using j. j(y)=x. Person B then knows two things: It was sent from person A (since only a has access to f), and it couldn't have been read by anyone besides the sender and himself (since it was encrypted with his key before being encrypted with f). Now, generating these functions is where the number theory comes in... In practice, normally a private key is sent over a "public" encryption, and then data is transfered back and forth over this (now secure) connection. And I really don't know much beyond that. 
December 5th, 2007, 10:58 AM  #3 
Site Founder Joined: Dec 2007 Posts: 414  Re: Cryptography in Computer Science
In cryptography there's a lot of highlevel number theory, and more specifically algebraic number theory (finite fields, etc ...). There's quite a lot of complexity theory as well (as the question of security is clearly contingent upon the complexity of the algorithms required to crack the encryption).

February 17th, 2009, 03:18 AM  #4 
Joined: Dec 2008 Posts: 32  Re: Cryptography in Computer Science 
July 1st, 2009, 03:02 AM  #5 
Joined: Jun 2009 Posts: 21  Re: Cryptography in Computer Science
Yeah, It is really helpful to me get knowledge about Crytography. Thanks for sharing.

February 28th, 2011, 11:01 PM  #6 
Joined: Feb 2011 Posts: 8  Re: Cryptography in Computer Science
That is really a great source of information given, it would be interested to know how cryptography is used in the computers.


Tags 
computer, cryptography, science 
Thread Tools  
Display Modes  

Similar Threads  
Thread  Thread Starter  Forum  Replies  Last Post 
Computer Science Question.  Shamieh  Computer Science  1  September 14th, 2013 04:27 AM 
Curriculum of computer science  johnny  Computer Science  9  March 16th, 2011 07:22 AM 
New to forum am n00b with computer science  cyber snake  New Users  1  May 6th, 2010 07:15 AM 