Aims/Objectives. This course (which builds on my second year introductory Number Theory course) aims to introduce the student to some fundamental applications of Number Theory to the age-old subject of cryptography, and to impart an understanding of the fundamental difference between 'private-key' and 'public-key' cryptography; that understanding is further developed by practical Maple-lab work. The course also introduces the student to some further related topics in Number Theory, especially primality testing and factorisation methods (the difficulty of the latter being the critical underpinning of the current security of the revolutionary Rivest-Shamir-Adelman public-key cryptographic method, which is studied in this course).
Students taking this course will have already acquired a respectable facility in the use of Maple (the Computer Algebra System) in their first and second year of studies, and will further add to their expertise in this course.
Learning outcomes. At the end of this course, a student should have a sound knowledge of some fundamental ideas in this important and fast changing intellectual discipline. (Incidentally, three of our recent graduates - two BEd and one BA, all young women - have developed their interest in 'Information Security' by proceeding to postgraduate studies at Royal Holloway College's Masters Course in Information Security, and the first of them - who was awarded a PhD scholarship - has just completed her PhD thesis there. I shall make an announcement when she successfully 'defends her thesis'.)
A good summary of the essential content of my third year Number Theory and Cryptography course may be found in my paper Number Theory and Cryptography (using Maple), which was published in:
David Joyner (Editor, and Organiser of the United States Naval Academy Conference on Coding Theory, Cryptography, and Number Theory, 1998), Coding Theory and Cryptography: From Enigma and Geheimschreiber to Quantum Theory, Springer-Verlag, 2000, 124-143. (Added Nov. 2003: All papers from that conference are now available here)
My 3rd year Number Theory and Cryptography course consists of a study of:
After August 31st 2007 please use the following Gmail address: jbcosgrave at gmail.com
This page was last updated 01 December 2006 20:10:13 -0000