Item Successfully Added to Cart
An error was encountered while trying to add the item to the cart. Please try again.
OK
Please make all selections above before adding to cart
OK
Share this page via the icons above, or by copying the link below:
Copy To Clipboard
Successfully Copied!
The Mathematics of Encryption: An Elementary Introduction
 
Margaret Cozzens DIMACS, Rutgers University, Piscataway, NJ
Steven J. Miller Williams College, Williamstown, MA
The Mathematics of Encryption
Softcover ISBN:  978-0-8218-8321-1
Product Code:  MAWRLD/29
List Price: $65.00
MAA Member Price: $58.50
AMS Member Price: $52.00
eBook ISBN:  978-1-4704-1594-5
Product Code:  MAWRLD/29.E
List Price: $55.00
MAA Member Price: $49.50
AMS Member Price: $44.00
Softcover ISBN:  978-0-8218-8321-1
eBook: ISBN:  978-1-4704-1594-5
Product Code:  MAWRLD/29.B
List Price: $120.00 $92.50
MAA Member Price: $108.00 $83.25
AMS Member Price: $96.00 $74.00
The Mathematics of Encryption
Click above image for expanded view
The Mathematics of Encryption: An Elementary Introduction
Margaret Cozzens DIMACS, Rutgers University, Piscataway, NJ
Steven J. Miller Williams College, Williamstown, MA
Softcover ISBN:  978-0-8218-8321-1
Product Code:  MAWRLD/29
List Price: $65.00
MAA Member Price: $58.50
AMS Member Price: $52.00
eBook ISBN:  978-1-4704-1594-5
Product Code:  MAWRLD/29.E
List Price: $55.00
MAA Member Price: $49.50
AMS Member Price: $44.00
Softcover ISBN:  978-0-8218-8321-1
eBook ISBN:  978-1-4704-1594-5
Product Code:  MAWRLD/29.B
List Price: $120.00 $92.50
MAA Member Price: $108.00 $83.25
AMS Member Price: $96.00 $74.00
  • Book Details
     
     
    Mathematical World
    Volume: 292013; 332 pp
    MSC: Primary 94; 68; 01

    How quickly can you compute the remainder when dividing \(109837^{97}\) by 120143? Why would you even want to compute this? And what does this have to do with cryptography?

    Modern cryptography lies at the intersection of mathematics and computer sciences, involving number theory, algebra, computational complexity, fast algorithms, and even quantum mechanics. Many people think of codes in terms of spies, but in the information age, highly mathematical codes are used every day by almost everyone, whether at the bank ATM, at the grocery checkout, or at the keyboard when you access your email or purchase products online.

    This book provides a historical and mathematical tour of cryptography, from classical ciphers to quantum cryptography. The authors introduce just enough mathematics to explore modern encryption methods, with nothing more than basic algebra and some elementary number theory being necessary. Complete expositions are given of the classical ciphers and the attacks on them, along with a detailed description of the famous Enigma system. The public-key system RSA is described, including a complete mathematical proof that it works. Numerous related topics are covered, such as efficiencies of algorithms, detecting and correcting errors, primality testing and digital signatures. The topics and exposition are carefully chosen to highlight mathematical thinking and problem solving. Each chapter ends with a collection of problems, ranging from straightforward applications to more challenging problems that introduce advanced topics. Unlike many books in the field, this book is aimed at a general liberal arts student, but without losing mathematical completeness.

    A complete solution key is available for instructors upon request. Send email to Steven.J.Miller@williams.edu or Steven.Miller.MC.96@ya.yale.edu.

    Readership

    Undergraduate students interested in cryptography and elementary number theory.

  • Table of Contents
     
     
    • Chapters
    • 1. Historical introduction
    • 2. Classical cryptology: Methods
    • 3. Enigma and Ultra
    • 4. Classical cryptography: Attacks I
    • 5. Classical cryptography: Attacks II
    • 6. Modern symmetric encryption
    • 7. Introduction to public-channel cryptography
    • 8. Public-channel cryptography
    • 9. Error detecting and correcting codes
    • 10. Modern cryptography
    • 11. Primality testing and factorization
    • 12. Solutions to selected exercises
  • Reviews
     
     
    • The authors have done an excellent job of presenting this material in as painless and accessible way as possible.

      MAA Reviews
  • Requests
     
     
    Review Copy – for publishers of book reviews
    Desk Copy – for instructors who have adopted an AMS textbook for a course
    Examination Copy – for faculty considering an AMS textbook for a course
    Permission – for use of book, eBook, or Journal content
    Accessibility – to request an alternate format of an AMS title
Volume: 292013; 332 pp
MSC: Primary 94; 68; 01

How quickly can you compute the remainder when dividing \(109837^{97}\) by 120143? Why would you even want to compute this? And what does this have to do with cryptography?

Modern cryptography lies at the intersection of mathematics and computer sciences, involving number theory, algebra, computational complexity, fast algorithms, and even quantum mechanics. Many people think of codes in terms of spies, but in the information age, highly mathematical codes are used every day by almost everyone, whether at the bank ATM, at the grocery checkout, or at the keyboard when you access your email or purchase products online.

This book provides a historical and mathematical tour of cryptography, from classical ciphers to quantum cryptography. The authors introduce just enough mathematics to explore modern encryption methods, with nothing more than basic algebra and some elementary number theory being necessary. Complete expositions are given of the classical ciphers and the attacks on them, along with a detailed description of the famous Enigma system. The public-key system RSA is described, including a complete mathematical proof that it works. Numerous related topics are covered, such as efficiencies of algorithms, detecting and correcting errors, primality testing and digital signatures. The topics and exposition are carefully chosen to highlight mathematical thinking and problem solving. Each chapter ends with a collection of problems, ranging from straightforward applications to more challenging problems that introduce advanced topics. Unlike many books in the field, this book is aimed at a general liberal arts student, but without losing mathematical completeness.

A complete solution key is available for instructors upon request. Send email to Steven.J.Miller@williams.edu or Steven.Miller.MC.96@ya.yale.edu.

Readership

Undergraduate students interested in cryptography and elementary number theory.

  • Chapters
  • 1. Historical introduction
  • 2. Classical cryptology: Methods
  • 3. Enigma and Ultra
  • 4. Classical cryptography: Attacks I
  • 5. Classical cryptography: Attacks II
  • 6. Modern symmetric encryption
  • 7. Introduction to public-channel cryptography
  • 8. Public-channel cryptography
  • 9. Error detecting and correcting codes
  • 10. Modern cryptography
  • 11. Primality testing and factorization
  • 12. Solutions to selected exercises
  • The authors have done an excellent job of presenting this material in as painless and accessible way as possible.

    MAA Reviews
Review Copy – for publishers of book reviews
Desk Copy – for instructors who have adopted an AMS textbook for a course
Examination Copy – for faculty considering an AMS textbook for a course
Permission – for use of book, eBook, or Journal content
Accessibility – to request an alternate format of an AMS title
You may be interested in...
Please select which format for which you are requesting permissions.