APPLICATION OF MATHEMATICAL ELEMENTS IN CRYPTOGRAPHY

Authors

  • Sanjarbek Noraliyev

Keywords:

Discrete mathematic, modular arithmetic, prime number theory, discrete logarithm, elliptic curves, finite fields, combinatorics, probability theory

Abstract

Discrete mathematics is one of the most important scientific areas that form the theoretical basis of modern cryptography. Discrete areas such as prime number theory, modular arithmetic, finite fields, combinatorics, probability theory, graph structures, lattice theory, logical algebra, and algorithm theory form the internal mechanisms of modern encryption algorithms. Each mathematical operation used in the encryption process consists of bounded, discrete arithmetic performed on bits, and it is this discreteness that ensures that cryptosystems are deterministic, reliable, and secure. This article provides a comprehensive analysis of the role of discrete mathematics in various areas of cryptography.

References

R. L. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.

N. Koblitz, A Course in Number Theory and Cryptography, 2nd ed. New York, NY, USA: Springer, 1994.

W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976.

T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469–472, 1985.

V. S. Miller, “Use of elliptic curves in cryptography,” in Advances in Cryptology — CRYPTO’85, Springer, 1986, pp. 417–426.

N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987.

J. Daemen and V. Rijmen, The Design of Rijndael: AES—The Advanced Encryption Standard, Springer, 2002.

National Institute of Standards and Technology (NIST), “FIPS PUB 197: Advanced Encryption Standard (AES),” 2001.

S. Lin and D. J. Costello, Error Control Coding, 2nd ed. Prentice-Hall, 2004.

J. L. Massey, “Shift-register synthesis and BCH decoding,” IEEE Transactions on Information Theory, vol. 15, no. 1, pp. 122–127, 1969.

Published

2025-12-18

How to Cite

Noraliyev, S. (2025). APPLICATION OF MATHEMATICAL ELEMENTS IN CRYPTOGRAPHY. The Descendants of Al-Fargani, 1(4), 107–110. Retrieved from https://al-fargoniy.uz/index.php/journal/article/view/956

Issue

Section

Статьи

Categories