Cryptographic Mathematics
Security built on mathematical hardness.
Modular Arithmetic
Prime Numbers
RSA
Discrete Logarithm
Hash Functions
Requirements
A cryptographic hash \(H: \{0,1\}^* \to \{0,1\}^n\) must satisfy:
| Property | Definition |
|---|---|
Preimage resistance |
Given h, hard to find m where \(H(m) = h\) |
Second preimage |
Given m, hard to find \(m' \neq m\) where \(H(m) = H(m')\) |
Collision resistance |
Hard to find any \(m \neq m'\) where \(H(m) = H(m')\) |
Related
-
Applied Mathematics — Overview
-
Security — Practical applications
-
Mathematics — Foundations