Elliptic Curves: How The National Security Agency Hacked Our E-mail

Item

Title

Elliptic Curves: How The National Security Agency Hacked Our E-mail

Description

Elliptic Curves will be explored from a mathematical perspective as well as from a cryptographic perspective, where they have important applications to modern information security. We will address what elliptic curves are, explore integer and rational solutions to elliptic curves, and explain how the National Security Agency hacked our e-mail. A computer program written in Octave will be used throughout to elucidate these concepts.
Joseph Witkowski

Contributor

Keene State College

Creator

Kegan Landfair

Date

2015-04-11

Identifier

http://hdl.handle.net/20.500.12088/7624

Abstract

Elliptic Curves will be explored from a mathematical perspective as well as from a cryptographic perspective, where they have important applications to modern information security. We will address what elliptic curves are, explore integer and rational solutions to elliptic curves, and explain how the National Security Agency hacked our e-mail. A computer program written in Octave will be used throughout to elucidate these concepts.

Language

en_US

Subject

Computer Sciences
Mathematics

Type

Presentation

Rights

http://rightsstatements.org/vocab/InC/1.0/

Item sets

Site pages