# Mathematics for Cryptography?

vegetaholic
Member Posts:

**38**■■□□□□□□□□
I see all security certs have objective related to cryptography.I have few questions regarding:

1)What Maths I should know for cryptography?

2)Should I really need to know mathematics for cryptography or I only need to know

structure of cryptography or how crypto-system works?

I know maths which will help me writing exploits and brute-force attacks.

I have little mathematics background.I know matrix,a little number theory,sets , logic,groups,

curve fitting,a bit of calculus.That's all.

I know Keatron you will take care of my problem. :P

best regards,

Vegeta

1)What Maths I should know for cryptography?

2)Should I really need to know mathematics for cryptography or I only need to know

structure of cryptography or how crypto-system works?

I know maths which will help me writing exploits and brute-force attacks.

I have little mathematics background.I know matrix,a little number theory,sets , logic,groups,

curve fitting,a bit of calculus.That's all.

I know Keatron you will take care of my problem. :P

best regards,

Vegeta

You can't kill Java because he is sun of king C.

#### Categories

- 111.6K All Categories
- 310 Welcome Center
- 64 Announcements
- 6 Forum Rules of Engagement
- 176 Introduce Yourself
- 51 TechExams Support
- 88.5K Certification Preparation
- 131 Check Point: CCSA & CCSE
- 32.9K Cisco
- 21.6K CCNA & CCENT
- 370 CCDA & CCDP
- 9K CCNP
- 6 Cisco CyberOps
- 1.7K CCIE
- 520 Cloud Certifications
- 191 Amazon Web Services (AWS)
- 35 Azure
- 118 CCSP
- 78 Cloud+ & Cloud Essentials
- 15.5K CompTIA
- 5K A+
- 243 CASP+
- 112 CySA+
- 972 Linux+
- 4.4K Network+
- 34 PenTest+
- 266 Project+
- 3.9K Security+
- 331 Server+
- 251 Other CompTIA Certifications
- 1.2K EC-Council
- 586 CHFI
- 624 CEH
- 1.4K GIAC
- 44 IAPP
- 1K ISACA
- 25 CRISC
- 283 CISA
- 704 CISM
- 4.3K (ISC)²
- 658 CISSP
- 34 CSSLP
- 3.6K SSCP
- 925 Juniper
- 736 LPI, Red Hat & Linux Foundation
- 18.6K Microsoft
- 150 MCSA 2016 / MCSE 2016
- 161 Windows 10 exams
- 139 Windows 8 exams
- 1.4K Windows 7 exams
- 1.6K MCSA / MCSE on Windows 2012 General
- 2.3K MCTS / MCITP on Windows 2008 General
- 828 Exchange Server & Office Communications Server Exams
- 536 Other Microsoft Electives
- 349 MCSA/MCSE: Security
- 300 Microsoft Developers Certifications
- 485 SQL Server exams
- 160 Offensive Security: OSCP & OSCE
- 2K Other Security Certifications
- 344 Virtualization Certifications
- 231 Citrix Certifications
- 104 VMware
- 1.9K Other Certifications
- 13 Business Analyst Certifications
- 390 CWNP Certifications
- 873 ITIL Certifications
- 219 Project Management Certifications
- 85 Apple Mac OS X Certifications
- 62 Novell Certification
- 81 Oracle Certifications
- 52 Sun Microsystems Java Certification
- 113 Storage Certifications
- 6.6K General Certification
- 17.9K Education & Development
- 60 Colleges & Schools
- 85 Educational Resources
- 17.6K IT Jobs / Degrees
- 64 Professional Development
- 335 Cybersecurity
- 17 Auditing & Compliance
- 15 Cloud Security & IoT
- 14 Cryptography & PKI
- 32 Cybersecurity Management
- 5 Data Science & Machine Learning
- 9 Forensics
- 8 ICS/SCADA Security
- 22 Incident Response
- 7 Linux Security
- 11 OWASP
- 31 Pentesting
- 41 Security Awareness & Training
- 52 Security News & Breaches
- 9 Windows Security
- 20.1K General
- 29 Conferences & Events
- 19 Computer Gaming
- 7 Data Center
- 80 Classifieds
- 50 For Sale
- 6 Wanted (ISO)
- 16 Help Wanted
- 15 Just for Fun
- 13 Networking
- 17.5K Off-Topic
- 20 Scripting
- Show Us Your Tech!
- 19 Troubleshooting
- 2.4K Virtualization

## Comments

346Unless you are planning to write cryptographic algorithms or perform cryptanalysis you like will not have much need to be heavily involved with the mathmatic aspect. Unless you plan to be a math expert and spend a lot of time with things such as frequency analysis a basic understanding is usually sufficient for Security purposes.

For any information related to Cryptography when it comes to InfoSec is knowing which algorithms have inherent flaws or weak keys that should be avoided. Knowing which algorithms are the strongest and their recommended key lengths is the most important thing to know. Also, Cryptography can be used for different purposes, such as Integrity, Confidentiality, or Non-Repudiation. Some devices needing encryption such as cell phones do not have the same processing capability of a PC. Do you need an entire communication channel to be encrypted or simply a credit card number exchanged over the internet? All of these factors will weigh into the decision and having a basic understanding of the algorithms available and how they work will be needed to make that decision.

As an example from a mathmatical example consider RSA. If you do any reading on RSA you will see that the math is basic factorization of numbers (with padding). It is very easy to understand for people not heavily involved in mathmatics. You don't even need to know how to factor numbers in order to use the algorithm successfully however as the software handles it for you. It is very easy to understand, but very difficult to break since the numbers used are very large using our current processing capability. Keys are typically 1024 or 2048 bits for safe use with RSA. As processing power increases the keys need to become longer. If you used RSA with a 256 bit key most personal computers today are certainly capable of cracking it. If someone finds a highly effective way for a computer to factor large numbers the entire algorithm will essentially be broken. You may want to read about TWIRL and the ability it could have (or already has) for a government or large organization to crack even 1024 bit keys on RSA in a short period of time if built.

As you study cryptography you will see several different methods being used such as Factoring, Elliptical Curves, Discrete Logarithms, and more. Cryptography will obviously continue to evolve with things such as Quantum Computing which can be used to possibly break many of the encryption methods we use today or even the use of Quantum Mechanics when applied to the transmission if light in a Fiber Optic line that was not previously possible. Personally I think it is amazing to see how far things have come already from simply substituting characters. The most important thing to understand with cryptography is that every algorithm/key combination can be cracked, it is only a matter of how long it will take. The goal is to make the time period so long that there is no point in attempting to crack it using our current processing power.

38■■□□□□□□□□analyze any crypto because I hate maths.

I will do security for that I only need to know weather crypto is good for security or not and

what big things you explained me as regards cryptography.

I think I had my answer , thanks.

So, for writing cryptography one must be math experts ,I am not and I don't want to. :P

12,543AdminWeb pages of interest to cryptography researchers

Forum Admin at www.techexams.net

--

LinkedIn: www.linkedin.com/in/jamesdmurray

Twitter: www.twitter.com/jdmurray

38■■□□□□□□□□Sir,I am not interested in creating/modifying/analyzing crypto algorithms and I will never want to do that because I hate maths and I don't have time to learn more maths.

I only want to know structures of already available algorithms.

What level of maths I Know is sufficient for my life-time.

12,543AdminForum Admin at www.techexams.net

--

LinkedIn: www.linkedin.com/in/jamesdmurray

Twitter: www.twitter.com/jdmurray

38■■□□□□□□□□929■■■■□□□□□□Have you study game theory, linear computation methods, numerical analysis....etc..?

These course will have you a better idea what type of math and knowledge that you need to know about encrypt and decrypt.

Kill All Suffer T "o" ReBorn