Complexity Theory - Cryptograp
Complexity Theory - Cryptography
by: Chuck
Introduction
One important, yet practical, application of complexity theory is cryptography. It has become one of the main tools for privacy, trust, electronic payments, and other forms of security. It is no longer just a military tool and the advantages it provides should be used to the fullest extent. This paper will discuss basic terminology and popular methods of cryptography.
Terminology
Cryptography is the science of scrambling text so
Is this Essay helpful? Join now to read this particular paper
and access over 480,000 just like this GET BETTER GRADES
and access over 480,000 just like this GET BETTER GRADES
Rabin, M.O. Probalistic algorithms. In Algorithms and Complexity: New Directions and Recent Results, J.F. Traub, Ed. Academic Press, 1976, 21-39.
5. Rivest, M.O., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21, 2 (1978), 120-126.
6. Spiser, M. Introduction to the Theory of Computation. PWS Publishing, 1997.
7. Stinson, D.R. Cryptography: Theory and Practice. CRC Press, 1995.
8. Turing, A. M. On computable numbers. In Proceedings, London Mathematical Society, (1936), 230-265.
Need a custom written paper? Let our professional writers save your time.