123457890 268903478 347 357 26890 24890 4 6 1234567890 6123457890 15 61 247890 693478 29 48 123457890 268903478 347 357 26890 24890 4 6 1234567890 6123457890.

Slides:



Advertisements
Similar presentations
Notes 6.6 Fundamental Theorem of Algebra
Advertisements

GREATEST COMMON FACTOR
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.3 Basic Number Theory.
Cryptography and Network Security
WS Algorithmentheorie 03 – Randomized Algorithms (Primality Testing) Prof. Dr. Th. Ottmann.
Section 4.1: Primes, Factorization, and the Euclidean Algorithm Practice HW (not to hand in) From Barr Text p. 160 # 6, 7, 8, 11, 12, 13.
Thinking Mathematically
Chapter 8 More Number Theory. Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime.
Chapter Primes and Greatest Common Divisors ‒Primes ‒Greatest common divisors and least common multiples 1.
Lecture 8: Primality Testing and Factoring Piotr Faliszewski
Approximate a square root EXAMPLE 2 FURNITURE The top of a folding table is a square whose area is 945 square inches. Approximate the side length of the.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
Gummithon Sep Challenge Build two structures that meet specifications (attached) Carry out (up to) three trials –Push a racquetball to initiate.
Standards Unit A7: Interpreting Functions, Graphs and Tables Matching different representations of functions. At least 1 hour. Teams of2 or 3. Camera needed.
CSE 311 Foundations of Computing I Lecture 12 Primes, GCD, Modular Inverse Spring
Fall 2002CMSC Discrete Structures1 Let us get into… Number Theory.
Peter Lam Discrete Math CS.  Sometimes Referred to Clock Arithmetic  Remainder is Used as Part of Value ◦ i.e Clocks  24 Hours in a Day However, Time.
LECTURE 5 Learning Objectives  To apply division algorithm  To apply the Euclidean algorithm.
Lesson 2.5 The Fundamental Theorem of Algebra. For f(x) where n > 0, there is at least one zero in the complex number system Complex → real and imaginary.
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
Computer Science: A Structured Programming Approach Using C1 3-7 Sample Programs This section contains several programs that you should study for programming.
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright © The McGraw-Hill Companies, Inc. Permission required.

Mathematics of Cryptography Part I: Modular Arithmetic
February 24, 2015Applied Discrete Mathematics Week 4: Number Theory 1 Modular Arithmetic Let a be an integer and m be a positive integer. We denote by.
Mathematics of Cryptography Modular Arithmetic, Congruence,
Number Theory.  A prime number is a natural number greater than 1 that has exactly two factors (or divisors), itself and 1.  Prime numbers less than.
Lesson 4-1 Polynomial Functions.
Data Structures Chapter 1- Introduction Mohamed Mustaq.A.
Section 4.3 Zeros of Polynomials. Approximate the Zeros.
Computational Number Theory - traditional number theory Prime Numbers Factors Counting Factors D- functions.
Greatest Common Divisor Jordi Cortadella Department of Computer Science.
Graph and on a number line. Then copy and complete the statement with, or Example 2 Comparing Real Numbers 1 ? = SOLUTION Use a calculator.
Prime Factorization SWBAT find the prime factorization of a composite number.
CSE 311: Foundations of Computing Fall 2014 Lecture 12: Primes, GCD.
Topic: U4L5 Remainder and Factor Theorems EQ: Can I correctly apply the Remainder and Factor Theorems to help me factor higher order polynomials?
ALGEBRA 1 SECTION 10.4 Use Square Roots to Solve Quadratic Equations Big Idea: Solve quadratic equations Essential Question: How do you solve a quadratic.
8.4 Use Scientific Notation Algebra. Scientific Notation Numbers such as 1,000,000, 153,000 and are written in standard form. Another way to write.
Remainder and Factor Theorems
Slide Copyright © 2009 Pearson Education, Inc. Unit 1 Number Theory MM-150 SURVEY OF MATHEMATICS – Jody Harris.
Greatest Common Divisors & Least Common Multiples  Definition 4 Let a and b be integers, not both zero. The largest integer d such that d|a and d|b is.
The Marble Run Norwood Elementary Science Title- The Marble Run Purpose- What is a Prototype? Build an improvement.
9.1 Primes and Related Congruence Equations 23 Sep 2013.
CSE 311: Foundations of Computing Fall 2013 Lecture 12: Primes, GCD, modular inverse.
160 as a product of its prime factors is 2 5 x 5 Use this information to show that 160 has 12 factors.
Lecture 2-3 Basic Number Theory and Algebra. In modern cryptographic systems, the messages are represented by numerical values prior to being encrypted.
Building Boxes What is the largest volume open top box that you can build from an 8 ½ by 11 inch sheet of paper?
AF2. Turn off your phones Primes, gcd, some examples, reading.
Part I: Numbers and Operations Lesson 1: Numbers.
Ch04-Number Theory and Cryptography 1. Introduction to Number Theory Number theory is about integers and their properties. We will start with the basic.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 3. Mathematics of Cryptography.
Number Theory Lecture 1 Text book: Discrete Mathematics and its Applications, 7 th Edition.
Number Theory. Introduction to Number Theory Number theory is about integers and their properties. We will start with the basic principles of divisibility,
Greatest Common Divisor
Greatest Common Divisor
CMSC Discrete Structures
Thinking Critically 4.1 Divisibility Of Natural Numbers
MATH301- DISCRETE MATHEMATICS Copyright © Nahid Sultana Dr. Nahid Sultana Chapter 4: Number Theory and Cryptography.
(as opposed to fake numbers?)
Building the BEST Structure Challenge
Discrete Math for CS CMPSC 360 LECTURE 12 Last time: Stable matching
Solving Quadratic equations by graphing.
Algebra 2/Trigonometry Name __________________________
Introduction to Cryptography
Mathematical Background: Primes and (GF)
The Largest Known Prime Number
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
Topic Past Papers –Proofs
Lecture 2-3 Basic Number Theory and Algebra
Presentation transcript:

The Representation of Large Numbers How High Can You Go? George T. Heineman WPI Computer Science Department 10-Sep-2004

Integer as Abstractions Fundamental units for calculation Common representations –Short [-32768, 32767] –Int[ , ] –Long[ , ] Suitable for “small computations”

Number Theorists need more Mersenne Primes (May 15 th 2004) –2 24,036, contains 7,235,733 digits How to determine primality? –Agrawal, Kayal, Saxena, 2002 –Paper every grad student should at least attempt to read! How can computations be performed over integers of 1,000,000 digits? How can one calculate pi to 1,000,000,000 digits? –Software Engineering comes to the rescue! –Abstraction vs. Representation

Necessary Requirements Standard algebraic operators (+, -, *, /) Power functions (a b ), Greatest Common Divisor (gcd), square root, modulo

Necessary Requirements Standard algebraic operators (+, -, *, /) Power functions (a b ), Greatest Common Divisor (gcd), square root, modulo

Primality

Big Picture The Gummitron 2004

Design Challenge Materials 1.One Pack of Sealed Poker Playing Cards 2.Scotch Tape 3.Fifteen Gummi TM Bears 1.Phase One: Build a continuous structure using only the materials provided 2.Phase Two: Place structure on desktop at least six inches away from the Gummitron 3.Phase Three: Over 15 second period, team launches up to fifteen Gummi Bears. Wait 10 seconds, then judge assesses score as shown in Equation 1. Note that Gummi Bears who are lower than 3 inches receive zero points 6 inches (x i,y i ) (0, 0) Equation 1 3 inches  (x i + 3 * y i ) Scoring Rules 1.Gummi TM Bears lower than 3 inches in height receive 0 points 2.Measurements will be made from the highest and/or rightmost point of the GummiBear. Gummitron