Research Output

Discrete Logarithms within Computer and Network Security.

  As we move into an Information Age, the requirement for computer security increases by the day, only in terms of privacy, but also in terms of proving identity and in verifying the integrity of data. Unfortunately many of the most widely used public key methods struggle against increasing computing power, and it is now becoming difficult to manage the ever increasing requirements for encryption keys. With logarithm cryptography, though, we have the scope to provide a bed rock of identity checking, key exchanges and for electronic signatures. This talk will thus provide an overview of how John Napier’s legacy is still an active, and growing, part of protecting our digital infrastructure, along with providing other areas where his legacy is still alive within networking.

  • Type:

    Other

  • Date:

    01 April 2014

  • Publication Status:

    Unpublished

  • Library of Congress:

    QA76 Computer software

  • Dewey Decimal Classification:

    005.8 Data security

Citation

Buchanan, W. J. (2014, April). Discrete Logarithms within Computer and Network Security. Presented at Napier 400 - Numerical Algorithms and Intelligent Software Symposium, International Centre for Mathematical Sciences, University of Edinburgh

Authors

Monthly Views:

Available Documents