1. (Difficult) The most difficult part of this reading was getting used to reading theorems and proofs again. I haven't taken a real math class in over two years, and so 3.1 was a nice re-introduction. I could understand most of the theorems and proofs, but I had a hard time following the proof of the last corollary of the section. I understand what the corollary is saying, but I am barely understanding the proof.
2. (Reflective) I have learned a little bit about cryptography in an information security class I took as part of my program, so reading this section made me excited to approach cryptography from a mathematical standpoint instead of an information security standpoint. In programming basic business applications, we have tried to include some checks for data integrity and authentication, but being able to incorporate more cryptography will be beneficial.
No comments:
Post a Comment