Trine professor’s journal article explains popular encryption method

October 01, 2019

Bill BargeA Trine University faculty member recently authored an article on the mathematics supporting a common data encryption method published in a peer-reviewed journal.

William Barge, Ph.D., associate professor in Trine’s Department of Computer Science and Information Technology, wrote "The Mathematics Behind RSA Encryption," published in the May 2019 issue of the Information Systems Security Association (ISSA) Journal.

The ISSA is a not-for-profit, international organization of information security professionals and practitioners, dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Barge, an ISSA member, has taught information security at Trine since 2008. In 2013, he wrote a program in the Java programming language to check students’ solutions to an assignment involving the Rivest, Shamir, and Adleman (RSA) cryptosystem, an encryption algorithm commonly used to securely hide confidential information in online transactions and to encrypt user ids and passwords on most websites using Secure Hypertext Transfer Protocol (https).

“I found that Java could not accommodate the value of exponential expressions applied to large prime numbers,” he said. “I knew my PC’s browser did not throw an error when I made a web purchase.  The ‘how does this work in real life’ quest led me to start learning an area of mathematics called Number Theory. Using a few proofs and theorems, and a lot of trial and error, I was able to incorporate mathematical shortcuts into my Java code. I thought others might benefit from seeing these shortcuts.

“My target audience was a programmer looking for ideas on how to keep the value of an exponential expression from getting too large, a mathematician who is interested in Number Theory, or anyone interested in learning the mathematics behind RSA.”

Barge said without systems like RSA, people would not be able to communicate securely and confidentially over the Internet with businesses or others with whom they did not have some prior relationship. As an example of the dangers of communicating over an unencrypted system, he noted students in Trine’s Computer Science & Information Technology (CSIT) practice how to capture Internet traffic and extract the messages being sent.

“In the labs done in class, I have had students find messages, reassemble photographs and other files, and track me as I have navigated through the Internet,” he said. “The students have not only had to identify what web sites I visited, but also identify the user ids and passwords I used. It is getting harder every year to find websites that do not adequately protect user ids and passwords.”

News Information

Read More

All News
Dr. Angel Jennings

Trine University innovating to meet nursing education needs

May 8, 2026

As we celebrate National Nurses Week, the nursing workforce is under pressure across the country. Staff shortages, high patient acuity and increasing complexity of care delivery are besetting our healthcare systems. Nursing education programs are being asked to provide graduates who will step directly into practice - faster, more efficiently and with the ability to cope at an increasingly fast pace with changing environments.

1/3
Dr. Kline presenting award to Dr. Liu

Trine faculty receive annual awards

May 6, 2026

Trine University honored faculty members during its annual year-end awards ceremony, held prior to Commencement on Saturday, May 2.

2/3
Mitch Daniels speaking at podium

Daniels offers graduates advice for promising, uncertain times

May 4, 2026

Mitch Daniels, former governor of the state of Indiana and former president of Purdue University, shared advice with graduates he said were entering a world he described as “the most promising and most uncertain and treacherous” as Trine University held Commencement ceremonies on May 2.

3/3