O'Reilly logo

A Course in Mathematical Cryptography by Gerhard Rosenberger, Martin Kreuzer, Benjamin Fine, Gilbert Baumslag

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

12 Further Applications Using Group Theory

12.1 Finitely Presented Groups and Cryptography

In the previous several chapters we have seen how group theory, specifically the combinatorial group theory of finitely presented groups, can be utilized in a cryptographic setting. The basic idea is that a finitely presented group can be described by a finite amount of data. This provides techniques to enormously compress and hide information. The body of knowledge, learned in more than 150 years of intense study of finitely presented groups, provides a far reaching tool when applied to cryptology.

Numbers and words are often used as a means of identification, authorization, access to information, record keeping, the control of devices and so on. They ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required