Goto: Prof. King's page at Univ. of Florida.    Or: JK Homepage.
Prof. King's site Modified: Tuesday, 02Aug2016     Printed: Tuesday, 25Apr2017
JK focus Articles Fonts
JK Contradance calling Dances/Composers (contradance) Tunes/Bands (contradance)
L0 Contradance program L1 Contradance program L2 Contradance program L3 Contradance program L4 Contradance program Jonathan's dances
testing Misc Navigation Schedule Teaching JK Students StanZas Melrose parade, 2016

Michael Dyck's Contradance Index LORs Pamphlets

Complex Vars 2017g SeLo 2017g
NumT 2016s NT & Math Crypto 2016g
LinA 2015t DfyQ 2015t
DfyQ 2015g (NO WEBPAGE) SeLo 2015g
Crypto 2014g SeLo 2013g
DfyQ 2013t SeLo 2013g Melrose Nemo Parade, 2015 Melrose Moon Parade, 2016
Spr2011: MAT4930 7554 Number Theory (Special Topics) MWF6 LIT219 (SW)

Number Theory & Cryptography We may use more advanced computing devices...

Welcome sign

This was a 1-semester course (Spring of 2011) for students who have had the rudiments of Number Theory, and would like to learn more, and to study applications of NT to Mathematical Cryptography, and to Coding in general [i.e, data-compression codes, isomorphism codes].

A good-looking 2011Spring NT&Cryptographers

Our Teaching Page has useful information for students in all of my classes. It has my schedule, LOR guidelines, and Usually Useful Pamphlets. One of them is the ChecklistThe checklist (pdf) which gives pointers on what I consider to be good mathematical writing. Further information is at our class-archive URL (I email this private URL directly to students).

The following, from Wikipedia (Enigma_machine), is edited and abbreviated.

In December 1932, the Polish Cipher Bureau first broke Germany's Enigma ciphers. Five weeks before the outbreak of World War II, on 25 July 1939, in Warsaw, the Polish Cipher Bureau gave Enigma-decryption techniques and equipment to French and British military intelligence. [A]llied codebreakers were able to decrypt a vast number of messages that had been enciphered using the Enigma. The intelligence gleaned from this source was codenamed “Ultra” by the British.

[After World War II] Winston Churchill told Britain's King George VI: It was thanks to Ultra that we won the war.

Though the Enigma cipher had cryptographic weaknesses, in practice it was only in combination with other factors (procedural flaws, operator mistakes, occasional captured hardware and key tables, etc.) that those weaknesses allowed Allied cryptographers to be so successful.

General Info

Our Cryp class has a LISTSERV archive. I will email to each student how to post-to and read-from the Archive. (The archive is at a private URL, only for the use of the folks in our class.)

Our Cryp syllabus has important URLs and eddresses, and a partial topic-list It also mentions the Class photo Day, and letters-of-recommendation.

Various math czars who help out.

Time Projector Blackboard Chalk Humor E-Probs
Kaitlin Julius & Jay Kyle Trevor Kyle Jay & ?

Photo of text cover Our textbook is An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics).
Authors: Jeffrey Hoffstein, Jill Pipher, J.H. Silverman ISBN: 978-0-387-77993-5
Year: 2008 Publisher: Springer
Marston: QA268 .H64 2008 Electronic: Chap. 1 and Chap. 2, Diffie-Hellman, etc. (Free for UF students)

The homepage of ... Mathematical Cryptography, with a link to its Errata sheet.
Here are links to this book at The Publisher's site and at

Web Resources on The Web

  1. Wikipedia. See also Primality testing and links to original AKS article and improvement.
  2. Historical Cryptography (Trinity College)>.
  3. MathPages. (I haven't reviewed this.)
  4. Sample chapters from the Handbook of Applied Cryptography. (I have not reviewed this book.)

Approx. Syllabus

End-of-semester NT Individual project


The EoS Project-Z (pdf) was due, slid u n d e r room 402 Little Hall my office door (Little Hall 402, Northeast corner) , no later than   noon, Friday, 22Apr2011.

The project must be carefully typed, but diagrams may be hand-drawn.

At all times have a paper copy you can hand-in; I do NOT accept electronic versions. Print out a copy each day, so that you always have the latest version to hand-in; this, in case your printer or computer fails. (You are too old for My dog ate my homework.)

Please follow the guidelines on the Checklist Checklist (pdf, 3pages) to earn full credit.

The smiling 2011Spring NT&Cryptography class

JK Home page Goto jk HomePage

____End: Number Theory