ESSENTIALS OF NUMBER THEORY FOR CRYPTOGRAPHY
DOI:
https://doi.org/10.29121/granthaalayah.v13.i11.2025.6517Keywords:
Cryptography, Number Theory, Primes, Congruence, Elliptic CurvesAbstract [English]
In the communication era, secure transmission of digital data through networks of communication channels and their storage is carried out by encrypting the data. It transpires that the encryption methods heavily depend on The Theory of Numbers - a fancied topic of Higher Algebra. The discreteness inherent in this algebra employs special constructs, setting it apart from other topics of the subject. Its logical development requires careful understanding of the theory. On the other hand, Cryptography as a subject freely employs the concepts and methods of Number Theory, and a number of books have appeared on the subject. The reading of these texts however is not smooth for readers not conversant with the certain specialities of Number Theory. This survey in simple terms, is a compendium of these specialities that may ease the study of Cryptography.
Downloads
References
Bernard, S., and Child, G. M. (1965). Higher Algebra. Macmillan.
Buchmann, J. A. (2002). Introduction to Cryptography. Springer. https://doi.org/10.1007/978-1-4684-0496-8 DOI: https://doi.org/10.1007/978-1-4684-0496-8
Chrystal, G. (1906). Algebra: An Elementary Text-Book, Part II. Adam and Charles Black.
Dietzfellinger, M. (2004). Primality Testing in Polynomial Time (Lecture Notes in Computer Science, Vol. 3000). Springer-Verlag. https://doi.org/10.1007/b12334 DOI: https://doi.org/10.1007/b12334
Hardy, G. H., and Wright, E. M. (1938). An Introduction to the Theory of Numbers. Clarendon Press.
Hoffstein, J., Pipher, J., and Silverman, J. H. (2008). An Introduction to Mathematical Cryptography. Springer. DOI: https://doi.org/10.1007/978-0-387-77993-5_6
McAndrew, A. (2011). Introduction to Cryptography with Open Source Software. CRC Press.
Niven, I., Zuckerman, H. S., and Montgomery, H. L. (1991). An Introduction to the Theory of numbers. John Wiley and Sons.
Paar, C., and Pelzl, J. (2010). Understanding Cryptography. Springer. https://doi.org/10.1007/978-3-642-04101-3 DOI: https://doi.org/10.1007/978-3-642-04101-3
Rosen, K. H. (2005). Elementary Number Theory and its Applications. Pearson/Addison Wesley.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Sujit K. Bose

This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.





















