Math for Liberal Studies.  When we studied ID numbers, we found that many of these systems use remainders to compute the check digits  Remainders have.

Slides:



Advertisements
Similar presentations
Using Matrices in Real Life
Advertisements

Solving Absolute-Value Equations
Modular Arithmetic Several important cryptosystems make use of modular arithmetic. This is when the answer to a calculation is always in the range 0 –
Calendar.
Learn all about the year.
ASP Date and Time Function List It's important to test that your data is valid before you work with it. These variable testing functions do the trick!
Section 3.2: Using Check Digits
Adding and Subtracting Integers
Arithmetic of random variables: adding constants to random variables, multiplying random variables by constants, and adding two random variables together.
Math for Liberal Studies. This graph does not have an Euler circuit. This graph does have an Euler circuit.
Microsoft® Small Basic
The Nature of Mathematical Reasoning
390 Codes, Ciphers, and Cryptography
Chapter 4 Systems of Linear Equations; Matrices
Objective: To convert numbers into standard index form
Math for Liberal Studies.  Problems can occur when data is transmitted from one place to another  The two main problems are  transmission errors: the.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
What is Elliptic Curve Cryptography?
CSC1016 Coursework Clarification Derek Mortimer March 2010.
2012 CALENDAR. JANUARY 2012 Sunday 日 Monday 月 Tuesday 火 Wednesday 水 Thursday 木 Friday 金 Saturday 土
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
January 2012 Monday Tuesday Wednesday Thursday Friday Sat/ Sun / /8 14/15 21/22 28/
CSI 101 Elements of Computing Spring 2009 Lecture #1 – From Math to Computers Wednesday, January 21, 2009.
LIAL HORNSBY SCHNEIDER
Coming up: Today: Section 2.4 Next class period: Review for Online Quiz 2 Class period after that: Review for Gateway Quiz 2(taken right after Spring Break)
MONDAYTUESDAYWEDNESDAYTHURSDAYFRIDAYSATURDAYSUNDAY WEEK WEEK WEEK WEEK WEEK CALENDAR PROJECT.
Binary Arithmetic Math For Computers.
Section 3.6: An Introduction to Cryptography
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography Programming Lab
Positional Number Systems
Mathematics of Cryptography Part I: Modular Arithmetic
Standard Form.
POWERPOINT THE SECOND In which you will learn about: Scientific notation +/-/x/÷ with sig figs Rounding.
CONFIDENTIAL1 Good Afternoon! Today we will be learning about Temperature, changes, & negative numbers Let’s warm up : Complete the conversion tables:
Numeral Systems Subjects: Numeral System Positional systems Decimal
Welcome back! It’s spring…or supposed to be MAT199: Math Alive Cryptography Ian Griffiths Mathematical Institute, University of Oxford, Department of.
MAT 1000 Mathematics in Today's World Winter 2015.
It is physically impossible for any data recording or transmission medium to be 100% perfect 100% of the time over its entire expected useful life. As.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Section 1.1: Integer Operations and the Division Algorithm
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Lecture 11.   Modular arithmetic is arithmetic in which numbers do not continue forever.  Modulo 7 has numbers 0, 1, 2, 3, 4, 5, and 6.  Modulo 5.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
What is Divisibility? Divisibility means that after dividing, there will be No remainder.
Ways to Check for Divisibility Dividing By 1 All numbers are divisible by 1.
1 Data Representation Characters, Integers and Real Numbers Binary Number System Octal Number System Hexadecimal Number System Powered by DeSiaMore.
WORD JUMBLE. Months of the year Word in jumbled form e r r f b u y a Word in jumbled form e r r f b u y a february Click for the answer Next Question.
Click the button to begin. 12:25 What time does this clock show? 5:00 4:00.
MAT 1000 Mathematics in Today's World Winter 2015.
Solving an equation with one unknown From arithmetic to algebra Modifying equations in algebra.
Rules to Remember When solving an equation, the goal is to get the variable by itself. Addition and Subtraction are inverse operations. (opposites) Multiplication.
Chapter 12: Cryptography MAT 320 Spring Cryptography: Basic Ideas We want to encode information so that no one other than the intended recipient.
Key Stone Problem… Key Stone Problem… Set 17 Part 2 © 2007 Herbert I. Gross next.
Analog and Digital Signals Binary Code 7th Grade Science.
TOOL CHECK. Adding and Subtracting FRACTIONS Unit 4 Lesson 4.
Ways to Check for Divisibility Dividing by 2 All even numbers are divisible by 2 Even numbers are numbers that end with either 2, 4, 6, 8, or 0.
Math Review 4 th Grade. Dates There are 52 weeks in one year. There are 365 days in one year. January, March, May, July, August, October, and December.
The Calendar.
CONFIDENTIAL1 Good Afternoon! Today we will be learning about Calendar and Years Let’s warm up : Complete the conversion tables: Hours478 Minutes 1) Calculate.
Step 1: Find a common denominator Scale up fractions in order for them to be out of the same number of parts. You need to find the least common multiple.
2.8 Error Detection and Correction
Modular Arithmetic with Applications to Cryptography
Chapter 2 Basic Encryption and Decryption
Error Detection and Correction
Fundamentals of Data Representation
Solving One and Two Step Equations
What Is Wrong With This Simple Code?
2.8 Error Detection and Correction
Presentation transcript:

Math for Liberal Studies

 When we studied ID numbers, we found that many of these systems use remainders to compute the check digits  Remainders have many applications beyond check digit systems

 Suppose today is Monday, and you want to know what day of the week it will be 72 days from now  Since there are 7 days in a week, every 7 days we will return to Monday  If we divide 72 by 7, we get a remainder of 2, so in 72 days it will be Wednesday

 Suppose it is currently April; what month was it 27 months ago?  There are 12 months in a year, so every 12 months, we return to April  When we divide 27 by 12, we get a remainder of 3. So we count 3 months back from April and get January

 We want to create a new arithmetic based on remainders  We always have to keep in mind the number that we’re dividing by to get the remainders  This number is called the modulus

 If we are talking about a “days of the week problem,” the modulus is 7  The possible remainders we can get are 0, 1, 2, 3, 4, 5, and 6  Each of these remainders represents a different day of the week

 We can number the days of the week 0 through 6  The question “Today is Thursday, what day is it 5 days from now?” can be represented by the equation “4 + 5 = ?”

 Now in regular arithmetic, = 9  Since 9 isn’t a valid remainder, we divide by 7 and get a remainder of 2; so the answer to the original question is Tuesday

 Today is Thursday… what day is it 1000 days from today?  = 1004… divide by 7, we get a remainder of 3, so the answer is Wednesday

 If we’re working with months of the year instead of days of the week, the modulus is 12  We can number the months with our possible remainders, 0 through 11  We could start with 0 for January, 1 for February, etc., but this wouldn’t match up with our standard numbering

 Instead we’ll start with 1 for January, 2 for February, etc., up to 11 for November  We can’t use 12 for December because 12 isn’t a valid remainder  We’ll use 0 for December

 Now consider this question: If it is currently March, what month was it 8 months ago?  We can represent this question with the equation “3 – 8 = ?”  In normal arithmetic, the answer would be -5  But -5 isn’t a valid remainder

 We could try to divide -5 by 12 and determine the remainder, but this is tricky with negative numbers  Instead, remember that we can always add or subtract 12 from any number, and that won’t change the remainder when the number is divided by 12

 So we take -5 and add 12, getting 7  This tells us that the answer to the original question is July  Our equation looks like “3 – 8 = 7”

 This modular arithmetic works with any modulus greater than 1  We are going to apply these ideas to cryptography, so we’ll be using a modulus of 26  Each letter of the alphabet will be represented by a number from 0 to 25

 0  A  1  B  2  C  3  D  etc.  25  Z  Recall that the Caesar cipher adds 3 to each letter of a message  We can think of this as “adding D” to each letter

 Our encoding process now looks like this:  To compute C + D, for example, we convert C and D to numbers and get = 5, then convert 5 back into a letter (F)

 Our encoding process now looks like this:  To compute Y + D, we get = 27, but 27 is too big, so we find the remainder, which is 1, so Y + D = B

 Since adding D to every letter is our encoding process, the decoding process should be to subtract D from every letter  Again we replace the letters with the corresponding numbers, and perform the calculation in modular arithmetic

 The decoding process looks like this:

 Uses the same idea  Based on a keyword  Instead of adding the same letter to each letter of our message, we repeat the keyword over and over

 For example, let’s encode the message “It was Earth all along” with the keyword “APES”

 Notice that this is no longer a substitution cipher: the first two letters both get encoded as I

 To decode the message, we simply subtract the repeated code word

 Since this is not a substitution cipher, it is not possible to use simple frequency analysis to try to break the code  However, since the keyword is repeated, it is possible to use a modified form of frequency analysis if the message is long enough

 This cipher also uses modular arithmetic and a keyword  However, this time we simply write down the code word once  For the rest of the second line, we write the original message

 For example, let’s encode the message “Bruce Willis is dead” with the keyword “SIXTH”

 Decoding using this cipher is trickier  We know we need to subtract, but other than the keyword, we need to know the original message to know what to subtract!

 We can at least start with the keyword  But now we know the first 5 letters of the real message!

 Copy those first 5 letters onto the second line and continue decoding  Now we know the next 5 letters

 Keep going in this way to decode the entire message