Welcome to Department of Mathematics
logo

Mail Us
mathoff[AT]iitg.ac.in

Call Us
+91-361-2582650

Number Theory and Cryptography

Code: MA506 | L-T-P-C: 3-0-0-6

Congruence, Chinese Remainder Theorem, Primitive Roots, Quadratic reciprocity, Finite fields, Arithmetic functions Primality Testing and factorization algorithms, Pseudo-primes, Fermat's pseudo-primes, Pollard?s rho method for factorization, Continued fractions, Continued fraction method Hash Functions, Public Key cryptography, Diffie-Hellmann key exchange, Discrete logarithm-based crypto-systems, RSA crypto-system, Signature Schemes, Digital signature standard, RSA Signature schemes, Knapsack problem. Introduction to elliptic curves, Group structure, Rational points on elliptic curves, Elliptic Curve Cryptography. Applications in cryptography and factorization, Known attacks.

Texts:

  1. N. Koblitz, A Course in Number Theory and Cryptography, Springer 2006.
  2. I. Niven, H.S. Zuckerman, H.L. Montgomery, An Introduction to theory of numbers, Wiley, 2006.
  3. L. C. Washington, Elliptic curves: number theory and cryptography, Chapman & Hall/CRC, 2003.

References:

  1. J. Silverman and J. Tate, Rational Points on Elliptic Curves, Springer-Verlag, 2005.
  2. D. Hankerson, A. Menezes and S. Vanstone, Guide to elliptic curve cryptography, Springer-Verlag, 2004.
  3. J. Pipher, J. Hoffstein and J. H. Silverman , An Introduction to Mathematical Cryptography, Springer-Verlag, 2008.
  4. G.A. Jones and J.M. Jones, Elementary Number Theory, Springer-Verlag, 1998.
  5. R.A. Mollin, An Introduction to Cryptography, Chapman & Hall, 2001.