Drexel dragonThe Math ForumDonate to the Math Forum

The Math Forum Internet Mathematics Library

Browse and Search the Library
Home : Math Topics : Applications/Connections : Sciences : Computer Science : Cryptography

_____________________________________
Library Home || Search || Full Table of Contents || Suggest a Link || Library Help
_____________________________________


  Selected Sites   (see also All Sites in this category)

  1. "The Code War" - Beyond Discovery - Dana Mackenzie et al.; National Academy of Sciences
    An online science article from the Beyond Discovery series that explores the trail of developments in the branch of mathematics known as number theory that led to modern-day encryption techniques. Contents include: Early Ciphers; The Enigma Challenge; In Cryptography We Trust; The Method Behind the Magic; How Safe is Safe?; Facing the Future. more>>

  2. A Cryptographic Compendium - John Savard
    A book about cryptography with information about a large number of cipher systems and a limited coverage of cryptanalysis. It is mostly concerned with the various kinds of ciphers people have used and only mentions a few things about breaking ciphers. more>>

  3. Cryptography A-Z - SSH Communications Security
    An introduction to the basics of cryptography: Basic Terminology; Basic Cryptographic Algorithms; Digital Signatures; Cryptographic Hash Functions; Cryptographic Random Number Generators; Strength of Cryptographic Algorithms; Cryptanalysis and Attacks on Cryptosystems. Algorithms, Protocols and Standards, References, Online Resources. more>>

  4. Cryptonomicon.Net - Matthew S. Hamrick; PhP-Nuke
    A community portal site for amateurs and professionals with an interest in cryptography. The site has some original content and news stories, but the Web links section (with over 1100 links to crypto and security related sites) is most interesting. more>>


 
  All Sites - 86 items found, showing 1 to 50

  1. 42eXplore - Annette Lamb and Larry Johnson
    Web projects that offer definitions, activities, four good starting points, and many more links and resources for thematic topics such as charts and graphs; codes, ciphers and secret messages; fractals, tessellations, geometric shapes, and figures; number ...more>>

  2. Activity Group on Discrete Mathematics - Society for Industrial and Applied Mathematics (SIAM)
    The SIAG on Discrete Mathematics focuses on combinatorics, graph theory, cryptography, discrete optimization, mathematical programming, coding theory, information theory, game theory, and theoretical computer science, including algorithms, complexity, ...more>>

  3. The Alan Turing Home Page - Andrew Hodges
    A gateway and guide to a large site dedicated to Alan Turing (1912-1954); 25 pages of biographical information on this computer scientist, mathematician, and cryptographer, from the author of Alan Turing: the Enigma. ...more>>

  4. Alphametics - Mike Keith
    Alphametics (also known as alphametrics) are puzzles that combine mathematical and word play, the first modern example of which was Dudeney's SEND + MORE = MONEY. From the "alphamenu," choose traditional alphametics, the doubly-true genre, new literary ...more>>

  5. Alphametics - Torsten Sillke
    Cryptarithms are puzzles in which letters or symbols are substituted for the digits in an arithmetical calculation. If a cryptarithm uses letters in place of digits, and the letters form words or phrases, the puzzle is an alphametic. J. A. H. Hunter coined ...more>>

  6. The Bible Code That Wasn't - Keith Devlin (Devlin's Angle)
    Just over a year ago, journalist Michael Dronin's book The Bible Code hit the bookstores - and soon after that the television screens and review pages of national newspapers - and quickly became an international bestseller. Both author and publisher made ...more>>

  7. Big Integers in JavaScript - Leemon Baird
    A JavaScript library for arbitrary-precision integers. This page performs RSA in any base: binary, decimal, hexadecimal, base 64, and base 95 (whole keyboard), in which the message can be ordinary text. The library allows addition, subtraction, multiplication, ...more>>

  8. Bletchley Park - The Bletchley Park Trust
    Also known as Station X, Bletchley Park is the home of the United Kingdom's Government Code and Cipher School (GC&CS). Read about its history, including decrypting the German Enigma code, Alan Turing's contribution of the "Bombe," and the various huts ...more>>

  9. Can You Crack the Enigma Code? - Richard Belfield
    The official website accompanying Belfield's book, Can You Crack the Enigma Code? "As part of the book, Richard invited a team of experts from the Information Security Group at Royal Holloway, University of London, to create a challenging collection of ...more>>

  10. Centre for Innovation in Mathematics Teaching - University of Plymouth
    A focus for research and curriculum development in mathematics teaching and learning with the unifying aim of enhancing mathematical progress in schools and colleges. The site includes: The Mathematics Enhancement Programme; Resources: worksheets in HTML ...more>>

  11. Challenges - RSA Security
    Read about three cryptographic challenges: RSA Factoring Challenge, Secret-Key Challenge, and DES Challenge III. For the solution of these cryptographic challenges, RSA offers cash prizes as "... modest rewards for some of the hard work that goes into ...more>>

  12. Chinks in Digital Armor - Ivars Peterson - Science News Online
    Tampering with a smart card can force it into making errors in the calculations used for encrypting data, potentially allowing the code to be broken. ...more>>

  13. Cipher Challenge - University of Southampton
    A cipher challenge for cryptographers under the age of 19. With solutions and comments about the breaking of sets of encoded messages, or ciphertexts, of increasing difficulties. ...more>>

  14. Communication and Information, including Encryption - Dave Rusin; The Mathematical Atlas
    See the Report of the Working Group on Cryptology and Coding Theory National Science Foundation, April 17-18, 1997. History; applications and related fields and subfields; textbooks, reference works, and tutorials; software and tables; other web sites ...more>>

  15. Computation of Discrete Logarithms in Prime Fields - LaMacchia, Odlyzdo; AT&T Bell Laboratories, NJ
    The presumed difficulty of computing discrete logarithms in finite fields is the basis of several popular public key cryptosystems. The secure identification option of the Sun Network File System, for example, uses discrete logarithms in a field GF(p) ...more>>

  16. Courses I Teach - John Cosgrave; St. Patrick's College, Dublin, Ireland
    Lecture notes from three courses given at St Patrick's College, Dublin: Maple/Calculus/Analysis; Number Theory; Number Theory and Cryptography. ...more>>

  17. Cracking a Medieval Code - Ivars Peterson (MathTrek)
    The first printed book on cryptology was written by Johannes Trithemius (1462-1516), an abbot in Spanheim, Germany, who was one of the leading intellectuals of his day. Bearing the title Polygraphiae libri sex ("Six Books of Polygraphy"), it was published ...more>>

  18. Cryptarithmetic Puzzle Solver - Naoyuki Tamura
    Enter a cryptarithm or select an example, such as SEND + MORE = MONEY. Also, puzzle generators based on themes such as color names, fruits, vegetables, and numeral words in English, French, German, Spanish, and Italian. ...more>>

  19. Cryptarithms Online - Jorge Soares
    Mathematical puzzles in which the digits are replaced by letters of the alphabet or other symbols. Brain-teasers by the author; cryptarithms from the journal Sphinx; a primer; books on cryptarithms, and links to relevant sites on the Web. ...more>>

  20. Cryptoclub - Vera Pless, Janet Beissinger
    This website includes tools to encrypt and decrypt messages, an animated treasure hunt, a classroom message board to send and receive encrypted messages, and a place to explore mathematics topics related to cryptography, such as prime numbers and ...more>>

  21. The Crypto Drop Box of the American Cryptogram Association - Jerry Metzger
    The American Cryptogram Association (ACA) is a nonprofit volunteer organization devoted to disseminating cryptographic knowledge. Members make up and solve their own creations strictly for the fun of it. Every two months, the ACA journal, The Cryptogram, ...more>>

  22. Cryptography - Corey Reed
    An introduction to cryptography, in particular affine enciphering applied to the alphabet, focusing on the use of linear algebra. Includes a primer on bases and modulus algebra and extensions for deciphering an affine enciphered message, using keys to ...more>>

  23. Cryptography World - The Cryptography Introduction
    An introduction to cryptography and crypto-analysis. Includes space for a repository of papers on the subject; introductory text; cryptography news through Google; and links to providers. ...more>>

  24. CS22: Discrete Math - Brown University
    An introduction to discrete math with a focus on proof, logic, proof by induction, cryptography and networks of processors: lessons, homework, solutions, and information. "Discrete mathematics" refers to the distinction between discrete sets (for example, ...more>>

  25. David Bruce Wilson
    David Bruce Wilson researches probability, combinatorics, and theoretical computer science. Abstracts of his articles on these subjects are available on the web and may be downloaded in PostScript or .dvi formats. Software available for download includes ...more>>

  26. David Sumner's Home Page - David Sumner
    Study guides, exams, quizzes, problem sets, exam review materials, utilities, programs and simulations, syllabi, and other materials for courses such as calculus, sequences and series, graph theory, number theory and cryptography, and probability. The ...more>>

  27. Decimals and Logarithms in the Works? And a Dyer's Hand too? - Penn Leary
    Shakespeare, Decimals and Logarithms: What did Shakespeare know about mathematics, particularly logarithms and the decimal system? And when did he know it? An article partly from Leary's book, The Second Cryptographic Shakespeare. ...more>>

  28. Designs, Codes and Cryptography - Kluwer Online
    An international, searchable, archived, peer-reviewed technical journal publishing survey and original papers on design, codes, and cryptography. ...more>>

  29. DIMACS Research and Education Institute (DREI) - Rutgers University
    An institute from the Center for Discrete Mathematics and Theoretical Computer Science which takes the approach that research and education should work hand-in-hand, that collaborations between researchers and educators are formed by understanding each ...more>>

  30. DIMACS - Rutgers & Princeton Universities, AT&T Bell Labs, BellCore
    The Center for Discrete Mathematics and Theoretical Computer Science, an NSF Science and Technology Center. DIMACS is devoted to the development of the interrelated fields of discrete mathematics and theoretical computer science, among the most rapidly ...more>>

  31. ECC Tutorial - Certicom
    Elliptic Curve Cryptosystem Classroom introduces elliptic curves and how they are used to create a secure and powerful cryptosystem: elliptic curve groups over real numbers, over Fp, over F2m, and the discrete log problem. Certicom's 109-bit and other ...more>>

  32. The Enigma Machine - Russell Schwager
    This Java applet simulates the operation of an Enigma machine, based on the one used by the Germans in World War II to encrypt military messages. With information on the history and workings of the mechanical Enigma machine; a brief description of how ...more>>

  33. A Few Aspects of Cryptology - David Hamer
    Read about cipher machines such as Enigma, Geheimschreiber, NEMA, SIGABA and others; visit the gallery showrooms of the Crypto Simulation Group (CSG), a group of historians and researchers in the field of cryptology; download sample simulators and published ...more>>

  34. Fraction Message (SMILE) - Charles Harper, Goldblatt Elementary School
    A lesson designed to teach students to find pictorial representations of fractions and to decode messages. From the Arithmetic section of a collection of almost 200 single concept lessons by the Science and Mathematics Initiative for Learning Enhancement. ...more>>

  35. Geometric Algorithms - Susan Landau; Univ. of Massachusetts at Amherst
    Landau's interest in geometric algorithms has been in problems of an algebraic flavor: computer-aided design, robotics, and other geometric-related applications that have created a need for methods for embeddings, visualization, and algorithms for construction ...more>>

  36. Government Communications Headquarters - Government Communications Headquarters, United Kingdom
    British intelligence: take a brief, illustrated tour of GCHQ history through World War I, World War II and cracking the German Enigma code, the Cold War, and the post Cold War world; read about career opportunities for mathematicians and others; apply ...more>>

  37. Hiding in DNA - Ivars Peterson (MathTrek)
    Spies might have to start boning up on molecular biology to pass along and decipher secret messages. During World War II, German spies used microdots to hide information in plain view. Consisting of a greatly reduced photograph of a typed page, a microdot ...more>>

  38. Hiding in Lattices - Ivars Peterson - Science News Online
    An improved mathematical strategy for encrypting data: the mathematics of lattices offers an alternative basis for a public-key cryptosystem. A lattice is a regular array of points, each one specified by a set of coordinates. Two coordinates would designate ...more>>

  39. HIME: Huge Integer Math and Encryption Library - DevOTechS
    Big number software library (dll) for huge integer mathematics. For encryption and number theory applications. This library also contains encryption functions for public and secret key encryption applications, hash functions, random number generators, ...more>>

  40. Homepage of Torsten Sillke - Torsten Sillke
    A collection of puzzles statements, with references, on a variety of topics: operations research, such as crossing the bridge; logic, including liars and truth tellers, mastermind, and age problems; lateral thinking, also known as "situation puzzles"; ...more>>

  41. How To Code Information With Error Detection - University of Toronto Mathematics Network
    A short essay and a description of "two out of five code," a special case of Hamming code. ...more>>

  42. Information and Communication, Circuits - Dave Rusin; The Mathematical Atlas
    A short article designed to provide an introduction to information and communication, circuits, which includes questions of particular interest to algebraists, especially coding theory (related to linear algebra and finite groups) and encryption (related ...more>>

  43. Institute of Discrete Mathematics - Prof. Dr. Harald Niederreiter; Austrian Academy of Sciences
    Current projects and research areas such as: Cryptology; Computer Algebra; Finite Fields and Their Applications; Global Function Fields; Quasi-Monte Carlo Methods; Construction of Low-Discrepancy Sequences; Numerical Integration; Pseudorandom Number Generation; ...more>>

  44. Internet Math Challenge - Dept. of Mathematics, University of Idaho
    A weekly K-12 math challenge from the math department at the University of Idaho, discontinued in 2004. Past puzzles and solutions are available. ...more>>

  45. Introduction To Cryptography - Lawrie Brown
    This site provides a summarization of cryptography, including: definitions of terms, basic concepts, history, techniques, tools, and applications. ...more>>

  46. Jeffrey C. Lagarias
    A member of the University of Michigan Department of Mathematics. List of publications, with many available for download in PostScript format; Lagarias' research interests include Number Theory, also Computational Complexity Theory, Cryptography, Discrete ...more>>

  47. Ken Shirriff
    A researcher at Sun Microsystems. Annotated bibliographies on fractals and cryptography, and related papers, which may be downloaded in PostScript format. Graphics of Voronoi fractals (dividing the plane into regions closest to a given point) and fractals ...more>>

  48. "Kryptos" - Central Intelligence Agency (CIA)
    This page showcases the history and mystery of "Kryptos," a sculpture at the CIA by artist James Sanborn. See the Flash video introduction, and learn more about the sculpture, the code, and the artist. Text-only version available. ...more>>

  49. Lava Lamp Randomness - Ivars Peterson (MathTrek)
    Researchers have come up with a novel application of the mesmerizing movements of the lava lamp's globules. They use them as the starting point for generating a sequence of random numbers. Called lavarand, the random-number generator is the tongue-in-cheek ...more>>

  50. License Codes - Ivars Peterson (MathTrek)
    Some states use complicated schemes for establishing driver's license identification numbers. The numbers may include check digits to detect errors or fraud, or they may encode such personal data as the month and date of birth, year of birth, and sex. ...more>>


 
Page:  1  2 [next>]


Search for these keywords:
               

Click only once for faster results:

all keywords, in any order at least one, that exact phrase
parts of words whole words


Power Search

[Privacy Policy] [Terms of Use]

_____________________________________
Home || The Math Library || Quick Reference || Search || Help
_____________________________________

© 1994-2014 Drexel University. All rights reserved.
http://mathforum.org/
The Math Forum is a research and educational enterprise of the Goodwin College of Professional Studies.The Math Forum is a research and educational enterprise of the Drexel University School of Education.