Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-gvh9x Total loading time: 0 Render date: 2024-07-23T04:34:17.890Z Has data issue: false hasContentIssue false

3 - Cryptography based on the integer ring

Published online by Cambridge University Press:  05 April 2014

Richard E. Blahut
Affiliation:
University of Illinois, Urbana-Champaign
Get access

Summary

All cryptographic systems require some form of key exchange. If there are only a few users engaged in a long-term relationship, then it may be possible to exchange keys over a secure private channel, such as by the use of a trusted courier. Then the security of the system is no better than the security of the private channel. If there are a great number of users in a network, however, and their relationships are unpredictable, unforeseen, and brief, then it is inappropriate to have a single shared key, and it is unreasonable to have an individual private key for each pair of users. Consequently, public-key cryptosystems are unavoidable. The keys must be exchanged, or created, over a public channel, but in a way that cannot be reproduced or broken by an adversary.

The earliest public-key cryptographers used the fact that the factoring of large composite integers is apparently very hard. The historical evidence for this premise was compelling and remains so; mathematicians had been searching for suitable integer-factoring algorithms for hundreds of years with very limited success. Since the introduction of such public-key cryptosystems, there has been a continuing intense effort to find methods of factoring large composite integers. Accordingly, improved methods of factoring integers have been found, but these improvements are modest. For large n, even these improved methods of factoring are still impractical.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×