Thursday, October 28, 2010

Section 7.2 Due Oct 29 2010

1. The processes that the text lays out aren't bad in themselves. However, I didn't understand HOW they were doing the processes. That is to say, I didn't understand where the text was pulling the numbers from. In some cases I saw the patterns and such, but in others I wasn't quite clear on the method behind the madness. For example, the second line on pg 205 where they raise 12 to the 20th power. And this was after a second reading of the processes. Also, why do they write x=x0+2x1+4x2 (mod 8). The choices of the number of xi's to use and the mod 8 are seemingly arbitrary.
2. The other issue I've been having with the reading is more of mild curiosity I'm thinking about. In all the processes for tomorrow's reading especially they work (mod p). I thought that in cryptography (primarily in  RSA) we would be working with (mod n) where n is the product of two primes. My question is, when will we be working ONLY mod p as opposed to mod n.

No comments:

Post a Comment