Guess My Word Mr. Nan Wang, C2PRISM Fellow Mr. Gerardo Stricker, Pre-CalculusTeacher Add extra privacy to our communications! – how is it done?

Slides:



Advertisements
Similar presentations
Using Matrices in Real Life
Advertisements

Chapter 4 Systems of Linear Equations; Matrices
Chapter 4 Systems of Linear Equations; Matrices
 Suppose for a moment that you were asked to perform a task and were given the following list of instructions to perform:
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Digital Signatures. Anononymity and the Internet.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
An Introduction to Cryptography TEA fellows February 9, 2012 Dr. Kristen Abernathy.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Guess My Word part 2 Add extra privacy to our communications! – how is it done?
4-5 Matrix Inverses and Solving Systems Warm Up Lesson Presentation
Finding the Inverse of a Matrix
4.3 The Inverse of a Matrix Warm-up (IN)
By: Taylor Schultz MATH  George Polya was a teacher and mathematician.  Lived from  Published a book in 1945: How To Solve It, explaining.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
4-6 3x3 Matrices, Determinants, & Inverses
2.4 Inverse of Linear Transformations For an animation of this topic visit: Is the transformation.
Alan Turing and Code Breaking
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Systems of Equations as Matrices and Hill Cipher.
The Turing machine Olena Lastivka. Definition Turing machine is a theoretical device that manipulates symbols on a strip of tape according to a table.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Matrices This chapter is not covered By the Textbook 1.
Lesson 4.7. Identity Matrix:  If you multiply a matrix by an identity matrix (I) the result is the same as the original matrix.  If Matrix A is a square.
Recursion.
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Encryption: A Brief History Author: Margery Waldron.
Holt Algebra Matrix Inverses and Solving Systems A matrix can have an inverse only if it is a square matrix. But not all square matrices have inverses.
4-5 Matrix Inverses and Solving Systems Warm Up Lesson Presentation
4.7 Identity and Inverse Matrices
Chapter 9 Matrices and Determinants Copyright © 2014, 2010, 2007 Pearson Education, Inc Multiplicative Inverses of Matrices and Matrix Equations.
Do Now: Evaluate: 3AB. Algebra II 3.7: Evaluate Determinants HW: p.207 (4-14 even) Test : Friday, 12/6.
Using Inverse Matrices in Real Life
What you will learn 1. What an identity matrix is
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
MA/CSSE 473 Day 10 Primality testing summary Data Encryption RSA.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Mr Barton’s Maths Notes Algebra 9. Inequalities
4.4 Identity and Inverse Matrices
Learning Objectives for Section 4.5 Inverse of a Square Matrix
Copyright © Cengage Learning. All rights reserved. 7 Linear Systems and Matrices.
Cryptography and Coding Theory
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
Notes Over 10.5 Using Cramer’s Rule for a 2 x 2 System
Notes Over 4.4 Finding the Inverse of 2 x 2 Matrix.
Cryptography Cryptography is the use of mathematics to encode messages and prevent them from being read by anyone who doesn’t know the code. One way that.
Warm UP: Review of Inequalities What do each of the symbols represent: 1. > 2. < Greater Than 2. Less than 3. Less than or equal to 4. Greater.
Warm Up Multiple the matrices. 1. Find the determinant –1 0.
Investigating Identity and Inverse Matrices QUESTION: What are some properties of identity and inverse matrices? 1 Let A =, B =, and C=. Consider the 2.
2012 MATH FIELD DAY MENTAL ARITHMETIC No Calculators No Pencil/Paper Computation There are 20 questions on the test. Each one will be flashed on the screen.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Chapter 4 Systems of Linear Equations; Matrices
Digital Signatures.
Warm-up 1. Find A-1 , A = 2. Solve AX = B when B =
Applications of Matrices
Section 6.4 Multiplicative Inverses of Matices and Matrix Equations
4-5 Matrix Inverses and Solving Systems Warm Up Lesson Presentation
Applications of Inverse Matrices
Lesson 55 - Inverse of Matrices & Determinants
Section 9.4 Multiplicative Inverses of Matices and Matrix Equations
Learning Objectives for Section 4.5 Inverse of a Square Matrix
Mr F’s Maths Notes Algebra 9. Inequalities.
Chapter 4 Systems of Linear Equations; Matrices
SLOT Week 9 – Day 1.
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Chapter 4 Systems of Linear Equations; Matrices
Presentation transcript:

Guess My Word Mr. Nan Wang, C2PRISM Fellow Mr. Gerardo Stricker, Pre-CalculusTeacher Add extra privacy to our communications! – how is it done?

Motivation Class if I asked you how World War II was won what would you say? (possible responses: strategy, planning, superior armaments, etc.) Well all that is true but I would say that it was won by MATH. What you say? Yes by MATH. You see, there was a secret war going on behind the scenes. A war to intercept enemy communications and figure out the plans of the enemy before they were actually carried out. This saved lives and helped us to carry out successful battlefield strategies. This required many mathematicians and this work eventually led to the invention of the first computer which was kept secret after the war for about 30 years For more on this, rent the video THE ENIGMA MACHINE, a good World War II film Today we will discover how to use MATRICES and MATRIX MATH to encode and decode secret messages.

Code Table A1H8O15V22 B2I9P16W23 C3J10Q17X24 D4K11R18Y25 E5L12S19Z26 F6M13T20space0 G7N14U21 Code Table: Translate between English and numbers. “GOOD”  [7, 15, 15, 4] [13, 1, 20, 8]  “Math”

[-6, 16, -10, 36 ] Use matrix A to solve the word:  “HARD” [8, 1, 18, 4 ]

[-8, 36, -4, 44, ] [?, ?, ?, ? ] Matrix A works like a “key”. [#1, #2, #3, #4 ]  “REVIEW” A1H8O15V22 B2I9P16W23 C3J10Q17X24 D4K11R18Y25 E5L12S19Z26 F6M13T20space0 G7N14U21

How is it done? Math is working behind the scene! If than

1.Pick a 4 to 6 letter word. [ ] 2.Pick a simple 2x2 matrix – call it matrix “S” for secret. (Make sure your matrix “S” is invertible!) A1H8O15V22 B2I9P16W23 C3J10Q17X24 D4K11R18Y25 E5L12S19Z26 F6M13T20space0 G7N14U21

4.Put the result above in sequence into a new 1xN matrix – matrix “E” for Encrypted. My E=[ ] 5.Calculate the inverse matrix of “S” – the inverse of “S” is matrix “K” for Key. 3.Multiply matrix S to your original word, two letters at a time. (Note: If your word has odd number of letters, add a space in the end to make it even.)

Now give the encoded sequence “E” and your key matrix “K” to others and see whether they can figure out what your original word is! A1H8O15V22 B2I9P16W23 C3J10Q17X24 D4K11R18Y25 E5L12S19Z26 F6M13T20space0 G7N14U21