Juan  Luis  Cordero

41%
Flag icon
modern encryption, for instance, secret primes known only to the sender and recipient get multiplied together to create huge composite numbers that can be transmitted publicly without fear, since factoring the product would take any eavesdropper way too long to be worth attempting. Thus virtually all secure communication online—be it commerce, banking, or email—begins with a hunt for prime numbers.
Algorithms to Live By: The Computer Science of Human Decisions
Rate this book
Clear rating
Open Preview