{"title":"RSA密码术","authors":"K. Bryan","doi":"10.1090/mbk/121/65","DOIUrl":null,"url":null,"abstract":"Private communication has been a concern throughout history. People have developed many clever ways to send secret messages to their partners in business, politics, war, and adultery. In the age of computer communication, we assume that anyone may examine the bits flying around the internet, and we use mathematical techniques to scramble the bits in our message so that it is intelligible only at the endpoints of the transmission.","PeriodicalId":423691,"journal":{"name":"100 Years of Math Milestones","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"RSA encryption\",\"authors\":\"K. Bryan\",\"doi\":\"10.1090/mbk/121/65\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Private communication has been a concern throughout history. People have developed many clever ways to send secret messages to their partners in business, politics, war, and adultery. In the age of computer communication, we assume that anyone may examine the bits flying around the internet, and we use mathematical techniques to scramble the bits in our message so that it is intelligible only at the endpoints of the transmission.\",\"PeriodicalId\":423691,\"journal\":{\"name\":\"100 Years of Math Milestones\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"100 Years of Math Milestones\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1090/mbk/121/65\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"100 Years of Math Milestones","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1090/mbk/121/65","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Private communication has been a concern throughout history. People have developed many clever ways to send secret messages to their partners in business, politics, war, and adultery. In the age of computer communication, we assume that anyone may examine the bits flying around the internet, and we use mathematical techniques to scramble the bits in our message so that it is intelligible only at the endpoints of the transmission.