I'm just starting the chapter on what it calls "cryptology", so I don't
know yet whether it'll be part of the discussion.  And as for the rest of
the book, I'll glance through it eventually but my interest in number
theory in general is very casual - not non-existent, but it wanes quickly
after the first hour or so.

---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313

/* Perhaps the most valuable result of all education is the ability to make
yourself to do the thing you have to do when it ought to be done whether
you like it or not.  -Thomas Huxley (British biologist) */

-----Original Message-----
From: IBM Mainframe Discussion List <IBM-MAIN@LISTSERV.UA.EDU> On Behalf Of
Seymour J Metz
Sent: Wednesday, August 24, 2022 08:48

Does the book get into the connection with Complex Analysis (roughly,
Calculus on complex numbers)?

________________________________________
From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of
Bob Bridges [robhbrid...@gmail.com]
Sent: Tuesday, August 23, 2022 4:50 PM

I got to talking with a church friend about encryption, and at lunch
yesterday he lent me a book on number theory that has a chapter on
asymmetric encryption.  Cryptography has long been a hobby of mine, but
it's only recently that I came to understand a little of how asymmetric
encryption can work.

The chapter I'm perusing will get into asymmetric encryption eventually,
but it's starting with simple rotational ciphers.  Expanding on the simple
rotation, it then talks about something it calls "affine transformations",
which introduce an additional term into the formula used to encrypt or
decrypt the text:

  C ≡ <a>P+<b> (mod 26)     0 ≤ C ≤ 25

...where, it specifies, "(a, 26) = 1".  Here's where I pause:  What
operation is indicated by "(m, n)"?

It goes on to say that for 26 letters in the cipher, "there are ф(26) = 12
choices for <a>".  I can see that <a> and 26 must have no factors in common
for this to work, and without actually working out how many choices there
are I can easily believe the answer is 12, but what function is implied by
phi?

Someone here probably knows, wouldn't you think?

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to