logo

Discrete Mathematics Report 2022

Students will work in groups to explore a mathematical problem and write a report on their findings.

8 Pages1497 Words27 Views
   

Added on  2022-10-13

Discrete Mathematics Report 2022

Students will work in groups to explore a mathematical problem and write a report on their findings.

   Added on 2022-10-13

ShareRelated Documents
Running head: DISCRETE MATHEMATICS
Discrete Mathematics
Name of the Student:
Name of University:
Discrete Mathematics Report 2022_1
DISCRETE MATHEMATICS2
Table of Contents
Introduction:...............................................................................................................................3
Problem Definition:....................................................................................................................3
Real World Application of Euclidean Algorithm:.....................................................................3
Solution to the problem:.............................................................................................................4
Computational Efficiency:.........................................................................................................5
Conclusion:................................................................................................................................5
References:.................................................................................................................................6
Discrete Mathematics Report 2022_2
DISCRETE MATHEMATICS3
Introduction:
The modern world functions a lot online. In fact, there are dystopian films made
exploring what might happen if the stable complex world we have built online
collapses. Euclidean Algorithm finds its uses in many surprising disciplines but
perhaps the most impact is felt in its use in cryptography. For example, The RSA
is one of the earliest public key cryptosystems that has been widely used for safe
data transmission. RSA works by letting the encryption key public but the
decryption key is kept as a secret. This involves calculating the modular inverse
which is done by the Euclidean algorithm. In El Gamal, finding modular inverse
using Euclidean algorithm is used as a step in decryption.
Problem Definition:
The RSA algorithm was invented to safe transaction online and in this report we
will explore one of the many algorithms that makes it work. Euclidean Algorithm
is a method used for calculating the greatest common divisor of two numbers.
Abbreviated as G.C.D it is the biggest number that divides both of the numbers
without leaving any remainder. The Greek mathematician, Euclid, first described
it in his classic book Elements. Anytime information needs to be securely shared
over the internet, roughly speaking, the method involves sending the information
with an encryption key that is publicly available but can only be accessed by the
receiver who knows how the decryption works.
Real World Application of Euclidean Algorithm:
Euclidean Algorithm has many practical and theoretical applications being one of the
foundations of mathematics. It can be used for simplifying fractions to their lowest forms,
solving Diophantine equations, constructing continued fractions and many important
applications in number theory such proving the Lagrange four square theorem or proving that
the factorization of the primes are unique.
An important use of Euclidean algorithm is for finding modular inverses. A modification of
the algorithm makes it possible, given two integers a,n to calculate integers x , y such that
ax + yn=g . c . d (a , n). In case g.c.d (a,n)=1 , this will enable us to find integers so that,
ax + yn=1 i.e ax 1 mod n. Therefore with the Euclidean algorithm it is possible to find the
inverse of a modulo n.
A part of RSA involves solving the congruence equation
ax 1 mod nthe equivalent linear diophantine equation ax +ny=1.
In fact, many cryptography systems need finding modular inverses as a foundation to do
further computations. In RSA we mainly need to find a modular inverse as a key generation.
In this report it will be explored how the algorithm works by taking a few examples.
Discrete Mathematics Report 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Symmetric Encryption Assignment
|5
|884
|175

Public Key Cryptography - Understanding the Process and Generating Private and Public Key
|12
|1302
|435

RSA vs ElGamal: A Comparison of Asymmetric Encryption Algorithms
|1
|654
|392

Factorization in Cryptography: Historical Perspective, Applications, and Cons
|14
|4170
|159

Cryptography and Key Generation using RSA Algorithm
|4
|766
|307

Cryptography: Algorithms, Key Management, and Protocols
|30
|7402
|319