[an error occurred while processing this directive]
[an error occurred while processing this directive] [an error occurred while processing this directive]

MAM 2006 Theme Announcement

The American Mathematical Society, the American Statistical Association, the Mathematical Association of America, and the Society for Industrial and Applied Mathematics announce that the theme for Mathematics Awareness Month 2006 is Mathematics and Internet Security.

When you use your home computer to log on to your bank account and pay a bill, to buy a book from Amazon, or to buy or sell something on eBay, you assume your personal details--your social security number, your bank account access password, or your credit card number--cannot be read by an unauthorized third party. What makes this possible is mathematics.

Pure mathematics, in fact. For, by a surprising twist of fate, today's Internet commerce makes heavy use of encryption techniques that depend upon results in number theory, a branch of mathematics that until relatively recently was thought of as strictly "pure mathematics," with no real-world applications. In his book A Mathematician's Apology, the famous British number theorist G. H. Hardy declared "The 'real' mathematics of the 'real' mathematicians, the mathematics of Fermat and Euler and Gauss and Abel and Riemann, is almost wholly 'useless'." Yet it is mathematics developed by those very mathematicians, along with Hardy himself, that keeps today's Internet transactions secure.

According to Bruce Schneier, one of the world's foremost security experts and the author of the influential book Applied Cryptography, "Cryptographic security comes from mathematics, not from people and not from machines. Mathematical security is available to everyone, both the weak and the powerful alike, and gives ordinary people a very powerful tool to protect their privacy. That's the cryptographic ideal of security." See Netcraft site for full interview

But number-theory-based encryption is not the only case where mathematics plays an important role in Internet security. Several of the essays presented on this Website describe other examples. And if history is any guide, we can expect more in the years to come.

[an error occurred while processing this directive]