Untitled Document
You are from : ( )  
Untitled Document
Untitled Document

International Journal of Information Technology & Computer Science ( IJITCS )

Abstract :

Discussing computer applications and the sensitivity of the information that are continually exchanged across network and internet works of computers. We provide and overview of the theory behind secure exchange of this information, our discussion is particularly centered on Euclidean’s’ Algorithm an ancient but efficient theory. We discussed the theoretical concept behind the algorithm and implements with Java. We conclude by highlighting the various applications of the many techniques in number theory which includes Euclidean’s’ Algorithm in securing information and transactions over the network.

Keywords :

: Algorithm, Eculideans’ Algorithm, Number Theory.

References :

  1. Arjen K. Lestra and Citibank, N.A.(2002);“Computational Methods in Public Key Cryptology”, 1 North Gate Road, Mendham, NJ 07945-3104, U.S.A. 973 543 5091,973 5435094 (fax). Arjen.lenstra@citigroup.com. pp16.
  2. Christopher M. Bourke, Berthe Y(2006). Choueiry;“Number Theory: Application”; Computer Science & Engineering 235 Introduction to Discrete Mathematics Sections 2.4-2.6 of Rosen. Cse235@cse.unl.edu.
  3. Godfried Toussaint; “The Ecuclidean Algorithm Generates Traditional Musical Rhythms”, School of Computer Science, McGill University Montreal, Quebec,Canada. godfried@cs.mcgill.ca.
  4. Keith Conrad; “Divisibility and Greatest CommonDivisors”.
  5. Ivor Horton’s (2005); “Begining JavaTM 2, JDKTM 2,JDKTM 5 Edition”, Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256, www.wiley.com. Copyright©2005 by Ivor Horton.

Untitled Document
Untitled Document
  Copyright © 2013 IJITCS.  All rights reserved. IISRC® is a registered trademark of IJITCS Properties.