Future Middle School Teachers Janet Beissinger and Bonnie Saunders University of Illinois at Chicago

Slides:



Advertisements
Similar presentations
RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
Advertisements

Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
What is Elliptic Curve Cryptography?
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Solving Linear Equations Rule 7 ‑ 1: We can perform any mathematical operation on one side of an equation, provided we perform the same operation on the.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
Solving Linear Equations
Chapter 3 Math Vocabulary
1 Massachusetts Intel ® Mathematics Initiative (MIMI)
Introduction to Cryptography
© 2007 by S - Squared, Inc. All Rights Reserved.
Catalysts for Change Principles and standards for school mathematics (NCTM, 2000) Before It’s Too Late: Glenn Commission Report, (DOE, 2000) Mathematics.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
Number Talks Building student’s communication and number sense.
Mathematics of Cryptography Modular Arithmetic, Congruence,
Solving One Step Equations and Inequalities Math 7/8.
MAT 1000 Mathematics in Today's World Winter 2015.
Welcome To LCHS 7/8 Math Night
Systems of Equations as Matrices and Hill Cipher.
ONE STEP EQUATIONS AF 1.1 Objective: Students will solve one-step linear equations in one variable by performing inverse operations, identifying necessary.
CRYPTOGRAPHY AND THE MATH MAJOR Dr. Mihai Caragiu Mathematics Department Ohio Northern University.
Solving Linear Equations with a variable on only one side of the equation.
WHAT’S THE MISSING LETTER? Or How to solve Algebraic Equations 4y + 4 – y = y + 28 (they really won’t be this long)
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
Solve each equation. 1. 3b + 8 = –102. –12 = –3x – 9 3. – + 7 = 144. –x – 13 = 35 c4c4 –6 1 –28 –48 Math on the Mind.
MAT 1000 Mathematics in Today's World Winter 2015.
Ms. Drake 7th grade Math Number Theory Lesson 20 Solving Equations by Adding or Subtracting.
One step equations Add Subtract Multiply Divide  When we solve an equation, our goal is to isolate our variable by using our inverse operations.  What.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
Class 20, November 10, 2015 Lessons 3.6 & 3.7.  By the end of this lesson, you should understand that: ◦ Addition and subtraction are inverse operations.
Solving Equations Using Addition and Subtraction
Mathematics Enrichment Program 11/9 08 – 11/30/08.
Solving 1-Step Equations 2 An Equation is Like a Balance.
Solving Equations Using Addition or Subtraction Objective: Students will solve linear equations using addition and subtraction.
Solve 7n – 2 = 5n + 6. Example 1: Solving Equations with Variables on Both Sides To collect the variable terms on one side, subtract 5n from both sides.
Do Now: Please finish word wall before you start equations
Warm Up Solve each inequality. 1. x + 3 ≤ x ≤ 7 23 < –2x + 3
Algebra Review. Systems of Equations Review: Substitution Linear Combination 2 Methods to Solve:
Warm Up Simplify each expression. 1.10c + c 2. 5m + 2(2m – 7) 11c 9m – 14.
Lesson 8.1. » A statement where two mathematical expressions are. » Think of an equation as a balance scale or teeter-totter. The left side must always.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 3. Mathematics of Cryptography.
STEM AT WSU MATHEMATICS EDUCATION: TEACHING AND RESEARCH LIBBY KNOTT
Algebra 1 EOC Summer School Lesson 10: Solve Linear Equations and Inequalities.
SOLVING ONE-STEP EQUATIONS Integrated Math I Objective: Solve one-step linear equations in one variable with strategies involving inverse operations and.
Write, Interpret and Use Mathematical Expression and Equations.
3. 3 Solving Equations Using Addition or Subtraction 3
2-1 Solving 1 step equations
Solving Two-Step Equations
Solving Two-Step Equations
Solving Equations by Adding or Subtracting
ONE STEP EQUATIONS.
ONE STEP EQUATIONS.
NUMBER THEORY.
Math Standards Math 120—Algorithms for Arithmetic
Solve System by Linear Combination / Addition Method
Solving Algebraic Equations
Math Standards Math 120—Algorithms for Arithmetic
1.3 Equations with variables on both sides
High School – Pre-Algebra - Unit 5
Objective 3.4 solve equations with variables on both sides.
10/3/11 In your notebook, answer completely the following:
Learn to solve 2-step equations
ONE STEP EQUATIONS WHAT?!?!.
Solving Linear Equations
ONE STEP EQUATIONS.
Solving Equations by 2-1 Adding or Subtracting Warm Up
Chapter 3.2 and 3.3 – Solving One-Step Equations
ONE STEP EQUATIONS.
Presentation transcript:

Future Middle School Teachers Janet Beissinger and Bonnie Saunders University of Illinois at Chicago Cryptography and Mathematics for and inservice The Cryptoclub Project is funded by the National Science Foundation Grant # Prior funding was from NSF Grant #

Common courses for Middle School Math Endorsement Geometry Calculus Number Theory November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 5 College level math Connections to middle school Peer-teaching experiences College level math Connections to middle school Peer-teaching experiences

Common courses for Middle School Math Endorsement Geometry Calculus Number Theory and Cryptography lcm, gcd, factoring, prime numbers combination problems, modular arithmetic reasoning and proof negative numbers -- number sense – solving linear equations -- functions November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 6

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 7 problem solving middle school teaching number theory emphasizing explanation moving from simple- minded, tedious solutions to efficient and elegant ones algebraic and abstract thinking

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 8 middle school teaching emphasizing explanation

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 9

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 10

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 11

Additive Cipher: key 7 November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 12 crypto

Additive Cipher: key 7 – switch to numbers November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 13 crypto abcdefghijklmnopqrstuvwxyz

Additive Cipher: key 7 – switch to numbers – To encrypt, add 7 November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 14 crypto abcdefghijklmnopqrstuvwxyz

Additive Cipher: key 7 – switch to numbers – To encrypt, add 7 – Reduce mod 26 November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 15 crypto abcdefghijklmnopqrstuvwxyz

Additive Cipher: key 7 November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference abcdefghijklmnopqrstuvwxyz

Additive Cipher: key 7 – To decrypt, subtract 7 November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference abcdefghijklmnopqrstuvwxyz

Additive Cipher: key 7 – To decrypt, subtract 7 November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference abcdefghijklmnopqrstuvwxyz

Additive Cipher: key 7 – To decrypt, subtract 7 – Reduce mod 26 November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference abcdefghijklmnopqrstuvwxyz

Additive Cipher: key 7 – To decrypt, subtract 7 – Reduce mod 26 – Switch to letters November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 20 club abcdefghijklmnopqrstuvwxyz

Additive Cipher: key 7 – To decrypt, add 26 – 7 = 19 November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference abcdefghijklmnopqrstuvwxyz

Additive Cipher: key 7 – To decrypt, add 26 – 7 = 19 November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference abcdefghijklmnopqrstuvwxyz

Additive Cipher: key 7 – To decrypt, add 26 – 7 = 19 – Switch to letters November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 23 club abcdefghijklmnopqrstuvwxyz

Additive Ciphers – To encrypt add the key k – To decrypt add the additive inverse mod 26 of k 26 – k or – k November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 24

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 25 number theory algebraic and abstract thinking

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 26 problem solving moving from simple- minded, tedious solutions to efficient and elegant ones

Combination Problem – What weights can be measured with a balance and 5-oz and 12-oz weights? November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 27

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 28 Number of 12-oz weights Number of 5-oz weights Combination Chart

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 29 Negative Combination

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 30

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 31

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 32 Number of 12-oz weights Number of 5-oz weights Combination Chart

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 33 number theory algebraic and abstract thinking

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 34

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 35

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 36

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 37

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 38

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 39

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 40

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference is the multiplicative inverse of 5: multiplying by 21 “undoes” multiplying by 5. To decrypt the times 5 cipher, multiply by 21

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 42

Multiplicative Cipher key k – Encrypt by multiplying by k mod 26 – Decrypt by multiplying by the multiplicative inverse of k mod 26 – Find the inverse of k by solving: k  m – 26  n = 1 November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 43

November 29, 2012 National Council of Teachers of Mathematics 2012 Regional Conference 44 problem solving middle school teaching number theory emphasizing explanation moving from simple- minded, tedious solutions to efficient and elegant ones algebraic and abstract thinking

Resources Bonnie Saunders Materials for preservice and/or inservice course: Problem Set, Project descriptions, syllabus, etc Number Theory for Teachers workbook Janet Beissinger For more information about CryptoClub Project and Summer Leader Workshop opportunities. The Cryptoclub: Using Mathematics to Make and Break Secret Codes by Janet Beissinger and Vera Pless, CRC Press cryptoclub.org Under construction but has lots of activities for students and others The CryptoClub Project is funded by the National Science Foundation Grant # Prior funding was from NSF Grant #