Thanks to visit codestin.com
Credit goes to link.springer.com

Skip to main content

Essential Algebra

  • Chapter
  • First Online:
Modern Cryptography
  • 2774 Accesses

Abstract

In order to understand cryptography, beyond the ancient ciphers, a certain level of mathematics is required. This involves number theory, abstract algebra, and linear algebra. One might think that algebra is a topic normally taught in secondary school. Algebra is much more than what is typically taught in secondary school. In Chap. 4, the essentials of number theory and discrete mathematics were covered. In this chapter, we will explore the essential facts of abstract algebra and linear algebra. You will find elements of abstract algebra used in many cryptographic algorithms including symmetric algorithms such as AES and asymmetric algorithms such as RSA. We will also explore linear algebra which is widely used in some cryptographic algorithms such as NTRU. Finally, we will discuss algorithm analysis, in a basic manner. The concepts in this chapter provide a foundation for understanding these algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+
from £29.99 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 39.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
GBP 49.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Bolker, E. D. (2012). Elementary number theory: an algebraic approach. Courier Corporation.

    MATH  Google Scholar 

  • Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2009). Introduction to algorithms. MIT press.

    MATH  Google Scholar 

  • Easttom, C. (2020). Quantum Computing Fundamentals. Pearson Press

    Google Scholar 

  • Greub, W. H. (2012). Linear algebra (Vol. 23). Springer Science & Business Media.

    MATH  Google Scholar 

  • Hua, L. K. (2012). Introduction to number theory.

    Google Scholar 

  • Lang, S. (2012). Introduction to linear algebra. Springer Science & Business Media.

    MATH  Google Scholar 

  • Neukirch, J. (2013). Algebraic number theory (Vol. 322). Springer Science & Business Media.

    MATH  Google Scholar 

  • Poole, D. (2014). Linear algebra: A modern introduction. Cengage Learning.

    Google Scholar 

  • Vinogradov, I. M. (2016). Elements of number theory. Courier Dover Publications.

    Google Scholar 

  • Weil, André. Basic number theory. Vol. 144. Springer Science & Business Media, 2013.

    MATH  Google Scholar 

  • Weiss, M. A. (2012). Data structures & algorithm analysis in C++. Pearson Education.

    Google Scholar 

  • Wilkinson, J. H., Bauer, F. L., & Reinsch, C. (2013). Linear algebra (Vol. 2). Springer.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Test Your Knowledge

Test Your Knowledge

  1. 1.

    A __________ is any equation for which you are interested only in the integer solutions to the equation.

  2. 2.

    A matrix which has all 1s in its main diagonal and the rest of the elements zero is a what?

    1. (a)

      Inverse matrix

    2. (b)

      Diagonal matrix

    3. (c)

      Identity matrix

    4. (d)

      Revers matrix

  3. 3.

    Omega notation is ____?

    1. (a)

      The asymptotic upper bound of an algorithm

    2. (b)

      The asymptotic lower bound of an algorithm

    3. (c)

      The average performance of an algorithm

    4. (d)

      Notation for the row and column of a matrix

  4. 4.

    A ____ is an algebraic system consisting of a set, an identity element, two operations, and the inverse operation of the first operation.

    1. (a)

      Ring

    2. (b)

      Field

    3. (c)

      Group

    4. (d)

      Galois field

  5. 5.

    A ____ is an algebraic system consisting of a set, an identity element for each operation, two operations, and their respective inverse operations.

    1. (a)

      Ring

    2. (b)

      Field

    3. (c)

      Group

    4. (d)

      Galois field

  6. 6.

    Is the set of integers a group with reference to multiplication? ____

  7. 7.

    Is the set of natural numbers a subgroup of the set of integers with reference to addition? ____

  8. 8.

    If a | b and a | c, then ____.

  9. 9.

    A group that also has the commutative property is an abelian group.

  10. 10.

    ___________ is a process used to measure the performance of computer algorithm.

  11. 11.

    Solve this determinant |A|\( \left[\begin{array}{cc}2& 1\\ {}1& 3.\end{array}\right] \)

    1. (a)

      8

    2. (b)

      6

    3. (c)

      0

    4. (d)

      5

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Easttom, C. (2022). Essential Algebra. In: Modern Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-031-12304-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-12304-7_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-12303-0

  • Online ISBN: 978-3-031-12304-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Keywords

Publish with us

Policies and ethics