MAT 1000 Mathematics in Today's World Winter 2015.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
Calculating in Other Bases
7.1Variable Notation.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
The Integers and Division. Outline Division: Factors, multiples Exercise 2.3 Primes: The Fundamental Theorem of Arithmetic. The Division Algorithm Greatest.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
Public Key Encryption Algorithm
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
COMP 170 L2 Page 1 Part 2 of Course Chapter 2 of Textbook.
CSE 321 Discrete Structures Winter 2008 Lecture 8 Number Theory: Modular Arithmetic.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
An Introduction to Hill Ciphers Using Linear Algebra Brian Worthington University of North Texas MATH /10/2010.
Introduction to Cryptography
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
 It is the numerical factor that contains a variable.  In other words, it is a number in a math sentence that has a letter right by it.
CSE 504 Discrete Mathematics & Foundations of Computer Science
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
MAT 1000 Mathematics in Today's World Winter 2015.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Systems of Equations as Matrices and Hill Cipher.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
When dividing a decimal by a whole number, place the decimal point in the quotient directly above the decimal point in the dividend. Then divide as you.
Chapter The Integers and Division Division
Introduction to Numerical Analysis I MATH/CMPSC 455 Binary Numbers.
Public Key (RSA) Day 27. Objective Students will be able to… …understand how RSA is used for encryption and decryption. …understand some of the challenges.
Measurement Multiplying and Dividing Fractions.  We can add and subtract fractions with the same (common) denominator easily. Adding and Subtracting.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Encryption on the Internet Eirik Albrigtsen. Encryption & Decryption Text Unreadable Text key + encryption method Unreadable Text Text key + decryption.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
Web Tools for Classical Cryptology Tristan Beeble.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
Governor’s School for the Sciences Mathematics Day 5.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
RSA Encryption © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Unit 2 Modular Arithmetic and Cryptography IT Disicipline ITD1111 Discrete Mathematics & Statistics STDTLP 1 Unit 2 Modular Arithmetic and Cryptography.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Introduction to Elliptic Curves CSCI 5857: Encoding and Encryption.
Decimals Day 2 Multiply and Divide Decimals. DO NOT line up decimals Multiply with first number, then continue with next number Place decimal point in.
CSE 311: Foundations of Computing Fall 2013 Lecture 11: Modular arithmetic and applications.
Combining Functions MCC9-12.F.BF.1b Combine standard function types using arithmetic operations.
Algebra is a branch of mathematics that uses letters and symbols to represent numbers. It behaves the same way arithmetic does when it comes to addition,
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Future Middle School Teachers Janet Beissinger and Bonnie Saunders University of Illinois at Chicago
Dr. Saatchi, Seyed Mohsen 1 Arab Open University - AOU T209 Information and Communication Technologies: People and Interactions Sixth Session.
CSE 311 Foundations of Computing I Lecture 12 Modular Arithmetic and Applications Autumn 2012 CSE
FractionsDecimalsPowers Answer  This is how you add fractions.
Genetic Algorithms and Evolutionary Programming A Brief Overview.
Grade Seven – Pre-Algebra - Unit 5
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Computer and Data Security 4th Class
Polyalphabetic Ciphers
Encryption on the Internet
National Cipher Challenge
ALGEBRA. ALGEBRA VARIABLES AND EXPRESSIONS Algebra – Uses symbols to represent quantities that are unknown or that vary. You can represent mathematical.
Simple Encryption- Lesson 5
Chapter 1-1 Variables and expressions
Multiply & Divide with Scientific Notation
High School – Pre-Algebra - Unit 5
National Cipher Challenge
Review Mathematics Skills
Homophonic Substitution Cipher
Warm up Yes; common difference = -0.2 No; common ratio = -1
Multiplying and Dividing Decimals
Presentation transcript:

MAT 1000 Mathematics in Today's World Winter 2015

Last Time We looked at the Caesar cipher and modular arithmetic

Today We will take a look at the decimation cipher, linear cipher and Vigenère cipher.

Decimation cipher For the Caesar cipher we added a set number and worked mod 26. For the decimation cipher we will multiply by a number (called the key) and work mod 26. To encode: Multiply the assigned number by the key and find the mod 26 representative.

Decoding with the decimation cipher To decode: Add multiples of 26 to the assigned number until we get to a multiple of the key. Divide by the key to get the decoded number (which can be used to find the decoded letter)

Let’s do some examples

Linear Cipher The linear cipher is a combination of the Caesar Cipher and decimation cipher We take the numerical representative of each letter (we will denote as x) and replace it with the letter represented by kx+s mod 26 We call k the key and s the shift To decrypt, work backwards

Examples

Vigenere Cipher For the Vigenere Cipher we pick a key word or phrase We determine the numerical value of each letter to see how much each letter of our encrypted message will be shifted. If necessary, we repeat the key word or phrase.

Examples