O'Reilly logo

A Course in Mathematical Cryptography by Gerhard Rosenberger, Martin Kreuzer, Benjamin Fine, Gilbert Baumslag

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

9 Basic Concepts from Group Theory

9.1 Groups and Group Theory

Up to this point we have been using algebraic objects arising from number theory, such as the modular rings imagen and elliptic curve groups, to do encryption. These objects are all commutative and hence we can call the type of encryption we have already done as commutative cryptography. In an effort to improve upon cryptographic security, non-commutative cryptography was introduced. Non-commutative cryptography is essentially group based cryptography. In group based cryptography, non-abelian groups and their properties are used in encryption and decryption. There are two primary sources ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required