Develop Coding Operations by Improving Applications of Matrix Algebra in Cross Mathematical Notation

Authors

  • Azhar Malik Computer Engineering Department / University of Technology- Iraq

Keywords:

mathematical notation, RSA algorithm, encryption

Abstract

Currently encryption methods are much more sophisticated , among them the most used is the RSA algorithm, created by Rivest, Shamir, Adleman pblished in 1977 in the journal Scientific American, based on prime numbers of great magnitude, the which uses the model of a public and a private key (asymmetric encryption) . The reliability offered by the RSA algorithm allowed Phil Zimmerman in 1991, develop PGP (Pretty Good Privacy) which is an encryption algorithm that works easily on home computers. PGP uses classical cryptography concepts and combines them with the RSA algorithm .

In most classical ciphers, the algorithms developed are based on mathematical foundations, for example, modular arithmetic, the fundamental theorem of arithmetic and its applications to prime numbers, such as the Euler function and the Chinese remainder theorem, among others. others. For the transposition encryption system, an encryption and decryption algorithm can be determined whose mathematical basis is based on matrix algebra .

Downloads

Download data is not yet available.

References

B. Stroustrup, OOPS Messenger, 1995, an addendum to the OOPSLA ’95 Proceedings.

J. R. Cary, S. G. Shasharina, J. C. Cummings, J. V. W. Reynders, and P. J. Hinker, Comput. Phys. Commun. ~submitted!; available at http:// jove.colorado.edu/˜ cary/CompCPP–F90SciOOP.html.

Y. Dubois-Pe`lerin and Th. Zimmermann, Comput. Methods Appl. Mech. Eng. 108, 165 ~1993!.

J-L. Liu, I.-J. Lin, M.-Z. Shih, R.-C. Chen, and M.-C. Hseih, Appl. Numer. Math. 21, 439 ~1996!.

Th. Zimmermann, Y. Dubois-Pe`lerin, and P. Bomme, Comput. Methods Appl. Mech. Eng. 98, 291 ~1992!.

L. Machiels and M. O. Deville, ACM Trans. Math. Softw. 23, 32 ~1997!.

Th. Zimmermann and D. Eyheramendy, Comput. Methods Appl. Mech. Eng. 132, 259 ~1996!. 14. D. Eyheramendy and Th. Zim

P. Moyer, Are we having fun yet? How teachers use manipulatives to teach mathematics, Educ. Stud. Math. 47 (2) (2001) 175–197, http://dx.doi.org/ 10.1023/A:1014596316942.

P. Moyer, G. Salkind, J. Bolyard, Virtual manipulatives used by K-8 teachers for mathematics instruction: The influence of mathematical, cognitive, and pedagogical fidelity, Contemp. Issues Technol. Teach. Educ. 8 (3) (2008) 202–218.

J.L. Cross, B. Brewer, E. Hamner, L. Zito, S. Speer, M. Tasota, Pilot results of a digital manipulative for elementary mathematics, in: AERA Annual Meeting, San Francisco, CA, 2020, URL http://tinyurl.com/sxgvcuy Conference Cancelled.

S. Suh, M. Lee, E. Law, How do we design for concreteness fading? Survey, general framework, and design dimensions, in: Proceedings of the Interaction Design and Children Conference, in: IDC ’20, Association for Computing Machinery, New York, NY, USA, ISBN: 9781450379816, 2020, pp. 581–588, http://dx.doi.org/10.1145/3392063.3394413.

Mirghafoori S H, Sayyadi Toranlu H, Dehghani Ashkezari J. Provision of a Model to Spread the Use of Information Technology in Serving. sjis 2020; 2 (1) :1-6

Downloads

Published

13.02.2023

How to Cite

Malik, A. . (2023). Develop Coding Operations by Improving Applications of Matrix Algebra in Cross Mathematical Notation. International Journal of Intelligent Systems and Applications in Engineering, 11(4s), 01–06. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2566

Issue

Section

Research Article