RUS  ENG
Full version
JOURNALS // Chebyshevskii Sbornik // Archive

Chebyshevskii Sb., 2018 Volume 19, Issue 3, Pages 61–73 (Mi cheb679)

Number theory and applications in cryptography

S. V. Vostokovab, R. P. Vostokovac, S. V. Bezzateevd

a Saint Petersburg State University
b Leonhard Euler's Fund of Russian Mathematics Support
c Baltic State Technical University "Voenmech"
d Saint-Petersburg State University of Aerospace Instrumentation

Abstract: The paper describes some elements of the number theory and shows how they are used in modern information security systems. As examples, the most famous protocols and algorithms such as the Diffie-Hellman Protocol for pair key generation, RSA and El Gamal public key encryption algorithms. The generalized Euclid algorithm is considered, as a one of the most common element of the number theory used in cryptography. Algorithms are given RSA and El Gamal signature algorithms are given. In conclusion, the algorithm of the electronic signature based on bilinear transformation uses a simplified case of the pairing in the explicit law of reciprocity.

Keywords: number theory, cryptography protocols, public key cryptographic algorithms, signature, bilinear transformation.

UDC: 511.313:511.331.1:511.526

Received: 01.09.2018
Accepted: 10.10.2018

DOI: 10.22405/2226-8383-2018-19-3-61-73



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2024