In Chapter 4, we applied number theory to cryptography. Many techniques and tools in cryptography are based on primality, factorization, and radomness, and we have already seen how Euclid’s algorithm works. In this chapter, we present in more depth the concepts and ideas behind them, as well as more advanced techniques that deal with characteristics of integer numbers.
This chapter is more technical and contains more mathematics. The definitions and results presented in this chapter are ...