Item Successfully Added to Cart
An error was encountered while trying to add the item to the cart. Please try again.
OK
Please make all selections above before adding to cart
OK
Share this page via the icons above, or by copying the link below:
Copy To Clipboard
Successfully Copied!
Mathematical Ciphers: From Caesar to RSA
 
Anne L. Young Loyola College in Maryland, Baltimore, MD
Mathematical Ciphers
Softcover ISBN:  978-0-8218-3730-6
Product Code:  MAWRLD/25
List Price: $49.00
MAA Member Price: $44.10
AMS Member Price: $39.20
eBook ISBN:  978-1-4704-1195-4
Product Code:  MAWRLD/25.E
List Price: $45.00
MAA Member Price: $40.50
AMS Member Price: $36.00
Softcover ISBN:  978-0-8218-3730-6
eBook: ISBN:  978-1-4704-1195-4
Product Code:  MAWRLD/25.B
List Price: $94.00 $71.50
MAA Member Price: $84.60 $64.35
AMS Member Price: $75.20 $57.20
Mathematical Ciphers
Click above image for expanded view
Mathematical Ciphers: From Caesar to RSA
Anne L. Young Loyola College in Maryland, Baltimore, MD
Softcover ISBN:  978-0-8218-3730-6
Product Code:  MAWRLD/25
List Price: $49.00
MAA Member Price: $44.10
AMS Member Price: $39.20
eBook ISBN:  978-1-4704-1195-4
Product Code:  MAWRLD/25.E
List Price: $45.00
MAA Member Price: $40.50
AMS Member Price: $36.00
Softcover ISBN:  978-0-8218-3730-6
eBook ISBN:  978-1-4704-1195-4
Product Code:  MAWRLD/25.B
List Price: $94.00 $71.50
MAA Member Price: $84.60 $64.35
AMS Member Price: $75.20 $57.20
  • Book Details
     
     
    Mathematical World
    Volume: 252006; 159 pp
    MSC: Primary 11; 94

    A cipher is a scheme for creating coded messages for the secure exchange of information. Throughout history, many different coding schemes have been devised. One of the oldest and simplest mathematical systems was used by Julius Caesar. This is where Mathematical Ciphers begins. Building on that simple system, Young moves on to more complicated schemes, ultimately ending with the RSA cipher, which is used to provide security for the Internet.

    This book is structured differently from most mathematics texts. It does not begin with a mathematical topic, but rather with a cipher. The mathematics is developed as it is needed; the applications motivate the mathematics. As is typical in mathematics textbooks, most chapters end with exercises. Many of these problems are similar to solved examples and are designed to assist the reader in mastering the basic material. A few of the exercises are one-of-a-kind, intended to challenge the interested reader.

    Implementing encryption schemes is considerably easier with the use of the computer. For all the ciphers introduced in this book, JavaScript programs are available from the Web.

    In addition to developing various encryption schemes, this book also introduces the reader to number theory. Here, the study of integers and their properties is placed in the exciting and modern context of cryptology. Mathematical Ciphers can be used as a textbook for an introductory course in mathematics for all majors. The only prerequisite is high school mathematics.

    Readership

    Undergraduate students interested in number theory, cryptology, and discrete mathematics.

  • Table of Contents
     
     
    • Chapters
    • Chapter 1. Introduction
    • Chapter 2. Caesar cipher
    • Chapter 3. Terminology and results from number theory
    • Chapter 4. Modular arithmetic
    • Chapter 5. Describing the Caesar cipher mathematically
    • Chapter 6. Cryptanalysis for the Caesar cipher
    • Chapter 7. Multiplication cipher
    • Chapter 8. Cryptanalysis for the multiplication cipher
    • Chapter 9. Multiplication-shift cipher
    • Chapter 10. Cryptanalysis for the multiplication-shift cipher
    • Chapter 11. Non-mathematical substitution ciphers
    • Chapter 12. Preparing to generalize
    • Chapter 13. Finding inverses modulo $n$
    • Chapter 14. General multiplication-shift cipher
    • Chapter 15. Security of the general multiplication-shift cipher
    • Chapter 16. Introduction to the exponential cipher
    • Chapter 17. Deciphering the exponential cipher
    • Chapter 18. Cryptanalysis for the exponential cipher
    • Chapter 19. Mathematical basis for the exponential cipher
    • Chapter 20. Public key ciphers
    • Chapter 21. RSA cipher
    • Chapter 22. Signatures
    • Chapter 23. Security and implementation of the RSA cipher
    • Chapter 24. Computer programs
    • Chapter 25. Further reading
    • Chapter 26. Answers to selected exercises
    • 27. Index
  • Requests
     
     
    Review Copy – for publishers of book reviews
    Desk Copy – for instructors who have adopted an AMS textbook for a course
    Examination Copy – for faculty considering an AMS textbook for a course
    Permission – for use of book, eBook, or Journal content
    Accessibility – to request an alternate format of an AMS title
Volume: 252006; 159 pp
MSC: Primary 11; 94

A cipher is a scheme for creating coded messages for the secure exchange of information. Throughout history, many different coding schemes have been devised. One of the oldest and simplest mathematical systems was used by Julius Caesar. This is where Mathematical Ciphers begins. Building on that simple system, Young moves on to more complicated schemes, ultimately ending with the RSA cipher, which is used to provide security for the Internet.

This book is structured differently from most mathematics texts. It does not begin with a mathematical topic, but rather with a cipher. The mathematics is developed as it is needed; the applications motivate the mathematics. As is typical in mathematics textbooks, most chapters end with exercises. Many of these problems are similar to solved examples and are designed to assist the reader in mastering the basic material. A few of the exercises are one-of-a-kind, intended to challenge the interested reader.

Implementing encryption schemes is considerably easier with the use of the computer. For all the ciphers introduced in this book, JavaScript programs are available from the Web.

In addition to developing various encryption schemes, this book also introduces the reader to number theory. Here, the study of integers and their properties is placed in the exciting and modern context of cryptology. Mathematical Ciphers can be used as a textbook for an introductory course in mathematics for all majors. The only prerequisite is high school mathematics.

Readership

Undergraduate students interested in number theory, cryptology, and discrete mathematics.

  • Chapters
  • Chapter 1. Introduction
  • Chapter 2. Caesar cipher
  • Chapter 3. Terminology and results from number theory
  • Chapter 4. Modular arithmetic
  • Chapter 5. Describing the Caesar cipher mathematically
  • Chapter 6. Cryptanalysis for the Caesar cipher
  • Chapter 7. Multiplication cipher
  • Chapter 8. Cryptanalysis for the multiplication cipher
  • Chapter 9. Multiplication-shift cipher
  • Chapter 10. Cryptanalysis for the multiplication-shift cipher
  • Chapter 11. Non-mathematical substitution ciphers
  • Chapter 12. Preparing to generalize
  • Chapter 13. Finding inverses modulo $n$
  • Chapter 14. General multiplication-shift cipher
  • Chapter 15. Security of the general multiplication-shift cipher
  • Chapter 16. Introduction to the exponential cipher
  • Chapter 17. Deciphering the exponential cipher
  • Chapter 18. Cryptanalysis for the exponential cipher
  • Chapter 19. Mathematical basis for the exponential cipher
  • Chapter 20. Public key ciphers
  • Chapter 21. RSA cipher
  • Chapter 22. Signatures
  • Chapter 23. Security and implementation of the RSA cipher
  • Chapter 24. Computer programs
  • Chapter 25. Further reading
  • Chapter 26. Answers to selected exercises
  • 27. Index
Review Copy – for publishers of book reviews
Desk Copy – for instructors who have adopted an AMS textbook for a course
Examination Copy – for faculty considering an AMS textbook for a course
Permission – for use of book, eBook, or Journal content
Accessibility – to request an alternate format of an AMS title
Please select which format for which you are requesting permissions.