Understanding the Mathematics Behind Cryptography

carrollscholars.object.degreeBachelor'sen_US
carrollscholars.object.departmentMathematicsen_US
carrollscholars.object.departmentComputer Scienceen_US
carrollscholars.object.majorMathematicsen_US
carrollscholars.object.majorComputer Scienceen_US
carrollscholars.object.seasonSpringen_US
dc.contributor.advisorWendt, Theodore
dc.contributor.advisorAyers, Kimberly
dc.contributor.advisorScott, Shaun
dc.contributor.authorKyriacos, Nicolas
dc.date.accessioned2021-07-07T17:45:24Z
dc.date.available2021-07-07T17:45:24Z
dc.date.issued2021
dc.description.abstractToday the internet is being used more than ever in order to store, transfer and access information. As a result, our private information is vulnerable to malicious parties who wish to use it for their own personal benefit. Cryptography uses mathematics in order to hide our private data so that it cannot be accessed by anybody other than ourselves. We begin this paper by exploring the most basic kinds of cryptosystems such as shift transformations, linear transformations and affine transformations as well as the how these cryptosystems are cracked using frequency analysis. We then take a look at how these concepts translate to enciphering matrices. Furthermore, we explain the differences between private and public key cryptography and investigate the RSA cryptosystem which is one of the most common types of public key cryptosystems in use today.en_US
dc.identifier.urihttps://scholars.carroll.edu/handle/20.500.12647/10473
dc.language.isoen_USen_US
dc.titleUnderstanding the Mathematics Behind Cryptographyen_US
dc.typeThesisen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Kyriacos_Final_2021.pdf
Size:
279.03 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.79 KB
Format:
Item-specific license agreed upon to submission
Description: