The design of algorithms for sending confidential messages (i.e. messages that no one can read, except the intended receiver) goes back to the beginning of our civilization. However, before the widespread of modern computers, cryptography was practiced by few people: soldiers, or diplomats, or scientists fascinated by the problem of confidential communication. Cryptography algorithms designed in the past were ingenious transformations but were lacking a sound mathematical basis. Recently, the development of computers and of the Internet has opened up new applications of cryptography in business and society. To answer these needs, new algorithms have been developed that use sound mathematical techniques and have produced surprising results, which have opened up impressive possibilities that were considered unrealistic before.We will see examples of algorithms that use modular arithmetic (in which operations are performed modulo an integer) that are based on using functions that are easy to compute but difficult to invert. © Springer-Verlag Berlin Heidelberg 2013. All rights reserved.

Algorithms for secure communication / MARCHETTI SPACCAMELA, Alberto. - STAMPA. - (2013), pp. 139-165. [10.1007/978-3-642-39652-6_6].

Algorithms for secure communication

MARCHETTI SPACCAMELA, Alberto
2013

Abstract

The design of algorithms for sending confidential messages (i.e. messages that no one can read, except the intended receiver) goes back to the beginning of our civilization. However, before the widespread of modern computers, cryptography was practiced by few people: soldiers, or diplomats, or scientists fascinated by the problem of confidential communication. Cryptography algorithms designed in the past were ingenious transformations but were lacking a sound mathematical basis. Recently, the development of computers and of the Internet has opened up new applications of cryptography in business and society. To answer these needs, new algorithms have been developed that use sound mathematical techniques and have produced surprising results, which have opened up impressive possibilities that were considered unrealistic before.We will see examples of algorithms that use modular arithmetic (in which operations are performed modulo an integer) that are based on using functions that are easy to compute but difficult to invert. © Springer-Verlag Berlin Heidelberg 2013. All rights reserved.
2013
The Power of Algorithms: Inspiration and Examples in Everyday Life
9783642396526
Social Sciences (all); Computer Science (all)
02 Pubblicazione su volume::02a Capitolo o Articolo
Algorithms for secure communication / MARCHETTI SPACCAMELA, Alberto. - STAMPA. - (2013), pp. 139-165. [10.1007/978-3-642-39652-6_6].
File allegati a questo prodotto
File Dimensione Formato  
VE_2013_11573-951154.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 274.62 kB
Formato Adobe PDF
274.62 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/951154
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact