Prof. George Purdy's Webpage

Recent papers in the subject of Discete & Computational Geometry

Books and Chapters in Discrete and Computational Geometry

Papers in Security and Cryptography

G. Purdy, 1974 paper in The Communications of the ACM , .A High Security Login Procedure.


The author introduces a lacunary (Purdy) polynomial P(x) of degree d ~ 10^50 modulo a prime p ~ 10^200. The original purpose of P(x) was to protect passwords on the Arpanet. ( Google .Purdy Polynomial. for description of its use in the VAX VMS system of DEC) but it has been used way beyond this, particularly in the defense industry and in (proprietary) software protection. A top secret clearance would be required to learn the details of its use in defense. Suffice it to say that its extremely high security makes it suitable for protecting the codes that are used to arm nuclear weapons in missiles and bombers.

EECS Graduate Students


Desch Award, 2014