What is a Relation https://www.youtube.com/watch?v=1v0qH4l9A2c&list=PLg8ZEeSiXsjgoQJzRcq60GjK0UrkMsA3-&index=12 What is an Equivalence Relation https://www.youtube.com/watch?v=o-PhSZztHC0&list=PLg8ZEeSiXsjgoQJzRcq60GjK0UrkMsA3-&index=13 Modular Arithmetic (a little advanced but its good support until I find something simpler) https://www.youtube.com/watch?v=d-n92Ml1iu0&list=PLDDGPdw7e6Ag1EIznZ-m-qXu4XX3A0cIz&index=78 Fundamentals npub12eml5kmtrjmdt0h8shgg32gye5yqsf2jha6a70jrqt82q9d960sspky99g AverageGary npub160t5zfxalddaccdc7xx30sentwa5lrr3rq4rtm38x99ynf8t0vwsvzyjc9 In this episode, we delve into the intricate world of cryptography, focusing on the mathematical foundations that underpin modern cryptographic systems. We start by exploring the AES chapter from the "Understanding Cryptography" PDF, discussing the layers beyond the mathematical sections. Our conversation highlights the importance of understanding both the cryptographic implementations and the mathematical relevance behind them, particularly in the context of public and private key cryptography, such as RSA and elliptic curve cryptography. We emphasize the significance of modular arithmetic, describing it as a fundamental substrate for cryptography. The discussion includes personal anecdotes about internalizing modular arithmetic and the continuous learning journey in understanding its applications. We also touch upon the Euclidean algorithm and its role in finding the greatest common divisor, which is crucial for cryptographic functions. The episode further explores the concept of cyclic groups and their relevance in cryptography, particularly in how they can reorder elements to enhance security. We discuss the importance of understanding linear combinations and equivalence relationships, which are foundational in mathematical modeling and cryptographic analysis. We also address some errata from previous episodes, clarifying definitions related to binary operations and cyclic groups. The conversation is enriched with practical examples, such as prime factorization and its role in cryptographic algorithms. Finally, we express gratitude to our listeners and those who have supported the podcast through boosts, encouraging them to engage with the material at their own pace and to explore additional resources provided in the show notes.