This preview shows page 1. Sign up to view the full content.
Unformatted text preview: In particular, the following rules were examined: 1) if a b (mod n) and c d (mod n) then (a+c) (b+d) (mod n) 2) if a b (mod n) and c d (mod n) then ac bd (mod n) 3) if a b (mod n) then f(a) f(b) (mod n), where f is a polynomial with integer coefficients, and a and b are integers as well. Also, we discussed the difference between (mod n) and mod n. Whenever we do NOT use the parentheses, the result must lie in between 0 and n-1. The other mathematical background covered was Euclids algorithm and a proof of why it works. Then we used the algorithm to show that if the gcd(a,b) = c, then there exists integers x and y such that ax + by = c. After looking at the shift cipher, we took a look at the Affine cipher. Before the end of class we determined that in order for the Affine cipher to work, the secret key a would have to be relatively prime with the number of letters in the alphabet; in our case, 26....
View Full Document
- Summer '09