The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
    Vassar College
   
 
  Oct 23, 2017
 
 
    
Catalogue 2017-2018
[Add to Portfolio]

MATH 268 - Protecting Information: Applications of Abstract Algebra


1 unit(s)
In today’s information age, it is vital to secure messages against eavesdropping or corruption by noise. Our study begins by surveying some historical techniques and proceeds to examining some of the most important codes currently being used to protect information. These include various public key cryptographic schemes (RSA and its variants) that are used to safeguard sensitive internet communications, as well as linear codes, mathematically elegant and computationally practical means of correcting transmissions errors. The department.

Prerequisite(s): MATH 126  and MATH 127 , or permission of the department.

Not offered in 2017/18.



[Add to Portfolio]