Sample Essay on:
The Use of Prime Numbers in Cryptography

Here is the synopsis of our sample research paper on The Use of Prime Numbers in Cryptography. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 6 page paper examines the role and importance of prime numbers, or prime factors, in cryptology. The paper looks at public key cryptography (PKC) and the RSA algorithm demonstrating the way in which public and private keys are calculated with the use of prime numbers. The bibliography cites 5 sources.

Page Count:

6 pages (~225 words per page)

File: TS14_TEprimecyp.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

information technology has become more important in both social and commercial lives issues of security has risen to prominence. The ability to keep information secure, protecting it from unauthorised parties has increased the level of attention paid to cryptography. As technology has become more complex and processing power has increased the sophistication and robustness of cryptography has also had to adapt. Whereas in the past simple codes and ciphers could be effective, these are likely to be broken very easily today. Cryptography is based on the use of mathematical formulas and algorithms. With many forms cryptography complexity increasing the difficulty breaking the code is achieved with the use of prime numbers. Prime numbers are an essential element which needs to be understood by any cryptographer. To consider how or why the concept of prime numbers in cryptography should be understood we will first look briefly at the way in which cryptography works and then consider the role of prime numbers in cryptography. One most common forms of cryptography that is found today is that of public key cryptography (PKC) (Cormen, 2001). This is also nine as asymmetric photography as it takes a form which make use of two keys forming a pair. Of the two keys one is a private and one of the public key. The public key may be distributed widely, where as the private key is known only to the individual party. Each of these keys have a mathematical relationship with the other, but it is not possible to obtain the private key by studying the public key. The public key is used to encrypt the message before it is sent, the private key is used to decipher the message when it is received. This can be compared to secret key cryptography, a type of ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now