Possible dialogues between power, mathematics and cryptography
نویسندگان
چکیده
In this text we discuss how power, mathematics and cryptography establish dialogues that are considered critical for the present, but which have influence from past concerns future. We contextualize our reflections a historical perspective, especially in Brazilian context, advance debates about cryptography, based on mathematical theories, influenced dynamized wars. Going little beyond present some concerning role of as means data security, one main discussions contemporary society. reflection, point out position power holders knowledge occupy, that, scope basic school, lacks important both teachers students.
منابع مشابه
The Uneasy Relationship Between Mathematics and Cryptography
D uring the first six thousand years— until the invention of public key in the 1970s—the mathematics used in cryptography was generally not very interesting. Well into the twentieth century cryptographers had little use for any of the concepts that were at the cutting edge of mathematics. Indeed, mathematicians looking at cryptography in those years might have found justification for Paul Halmo...
متن کاملMathematics for Cryptography
1.2 Definition (modular reduction). Suppose we divide a and b by m, obtaining integer quotients and remainders, where the remainders are between 0 and m − 1. That is, a = q1m + r1 and b = q2m+ r2, where 0 ≤ r1 ≤ m− 1 and 0 ≤ r2 ≤ m− 1. Then it is not difficult to see that a ≡ b (mod m) if and only if r1 = r2. We will use the notation a mod m (without parentheses) to denote the remainder when a ...
متن کاملMathematics of Public Key Cryptography
Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students and researchers in mathematics, computer science and electrical engineering. Carefully written t...
متن کاملMathematics of Isogeny Based Cryptography
These lectures notes were written for a summer school on Mathematics for post-quantum cryptography in Thiès, Senegal. They try to provide a guide for Masters’ students to get through the vast literature on elliptic curves, without getting lost on their way to learning isogeny based cryptography. They are by no means a reference text on the theory of elliptic curves, nor on cryptography; student...
متن کاملIdentifying power relationships in dialogues
Understanding power relationships is an important step towards building computers that can understand human social relationships. Power relationships can arise due to differences in the roles of the speakers, as between bosses and employees. Power can also affect the manner of communication between social equals, as between friends or acquaintances. There are numerous potential uses for an auto...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Prometeica
سال: 2023
ISSN: ['1852-9488']
DOI: https://doi.org/10.34024/prometeica.2023.27.15302