Encryption Algorithms with Linear Algebra and Number Theory
dc.contributor.author | Watler, Orion | |
dc.date.accessioned | 2023-08-14T17:20:44Z | |
dc.date.available | 2023-08-14T17:20:44Z | |
dc.date.issued | 2021 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12648/12305 | |
dc.description.abstract | Although there are highly sophisticated encryption schemes that have been developed in the past, such as Elliptical Curve Encryption, Secure-Hash-Algorithm and Data Encryption Standard, there is still much to explore in cryptography. The goal of this research is to explore encryption techniques that use methods from linear algebra and number theory, starting at a rudimentary model to more complex algorithms that provide more security. The simpler model, Square Matrix Encryption, relies on the inverse of a square matrix, while a more complex algorithm, Rectangular Matrix Encryption, uses the pseudo-inverse of a rectangular matrix. This paper describes the nuances of both schemes and discusses what makes the latter stronger than the former. This research suggests using a special kind of generalized inverses in encryption that can turn into developing an even stronger encryption scheme. The implementation of all algorithms, which include various linear transformations and modular arithmetic on rational numbers, is done in Java. | |
dc.subject | First Reader Knarik Tunyan | |
dc.subject | Senior Project | |
dc.subject | Semester Spring 2021 | |
dc.title | Encryption Algorithms with Linear Algebra and Number Theory | |
dc.type | Senior Project | |
refterms.dateFOA | 2023-08-14T17:20:44Z | |
dc.description.institution | Purchase College SUNY | |
dc.description.department | Mathematics & Computer Science | |
dc.description.degreelevel | Bachelor of Arts | |
dc.description.advisor | Tunyan, Knarik | |
dc.date.semester | Spring 2021 | |
dc.accessibility.statement | Purchase College - State University of New York (PC) is committed to ensuring that people with disabilities have an opportunity equal to that of their nondisabled peers to participate in the College's programs, benefits, and services, including those delivered through electronic and information technology. If you encounter an access barrier with a specific item and have a remediation request, please contact lib.ir@purchase.edu. |