Unit 3 Day 4. Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In.

Slides:



Advertisements
Similar presentations
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Advertisements

Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Security & Encryption Thomas Fenske & Joseph Minter.
Bell Work 1/20/15 Write in slope-intercept form the equation of the line passing through the given point and PERPENDICULAR to the given line.
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Easy Encryption: OS X and Windows 2K/Xp Shawn Sines OARTech August 8, 2007.
Section 3.6: An Introduction to Cryptography
8-1 Relations and Functions. RELATIONS Relation: A set of ordered pairs. Domain: The x values of the ordered pairs. Also known as the input value. Range:
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Relation Input Output Function Domain Range Scatter Plot Linear Equation x - intercept y- intercept Slope Rise Run.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Lessons 7.1 Students learn about a function through trying to un-code a message ◦ They will notice that unambiguous encoding requires a function.
Lec. 5 : History of Cryptologic Research II
Chapter 4.8: Determine if the Relation is a Function.
Formalizing Relations and Functions
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Copyright © 2010 Pearson Education, Inc. All rights reserved Sec
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
PRE-ALGEBRA. Lesson 8-1 Warm-Up PRE-ALGEBRA Relations and Functions (8-1) What is a relation? What is the “domain” of a relation? What is the “range”
A relation is an operation, or series of operations, that maps one number onto another.
FUNCTIONS AND MODELS 1. The fundamental objects that we deal with in calculus are functions.
Thursday. Relations and Functions Chapter 2 Section 2-1 Pages
The Storyboard stage. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender,
Intro to Cryptography Lesson Introduction
SOLUTION EXAMPLE 1 Represent relations Consider the relation given by the ordered pair (–2, –3), (–1, 1), (1, 3), (2, –2), and (3, 1). a. Identify the.
Unit 3: An Introduction to Functions
I CAN DETERMINE WHETHER A RELATION IS A FUNCTION AND I CAN FIND DOMAIN AND RANGE AND USE FUNCTION NOTATION. 4.6 Formalizing Relations and Functions.
CRYPTOGRAPHY. DEFINITION Cryptography is the science of writing in secret code The earliest documented use began around 2,000 B.C in Egypt (Hieroglyphics)
5.2 Relations and Functions. Identifying Relations and Functions Relation: A set of ordered pairs. You can list the set of ordered pairs in a relation.
Warm Up 1) Solve: -2(x + 9) + 13 = -11 2) A triangle has side lengths of 5, 15, and 14. Is the triangle a right triangle? Why or Why not?
1. Write the recursive sequence. Next = Now + 2; start at 8 2. Write the Input-Output equation. Output = Input * Write the rule using x and y.
Goal: Identify and graph functions..  Relation: mapping or pairing, of input values with output values.  Domain: Set of input values.  Range: set of.
LESSON 7.1 Functions To investigate the concept of function through secret codes.
Graphs and Functions Chapter 5. Introduction  We will build on our knowledge of equations by relating them to graphs.  We will learn to interpret graphs.
Algebra 2 June 18, 2016 Goals:   Identify functions in coordinate, table, or graph form   Determine domain and range of given functions.
Algebra 2 Relations and Functions Lesson 2-1 Part 1.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Chapter 2 Linear Equations and Functions. Sect. 2.1 Functions and their Graphs Relation – a mapping or pairing of input values with output values domain.
Section 7.6 Functions Math in Our World. Learning Objectives  Identify functions.  Write functions in function notation.  Evaluate functions.  Find.
Notes:Relations and Functions Section 1-6 Student Objective: The students will be able to identify relations and functions and evaluate functions. 1.Definitions:
Warm Up Use the graph for Problems 1–2.
Input/Output tables.
Relations and Functions
Relations and Functions Pages
Algebra 2 September 16, 2018 Goals:
EXAMPLE 1 Represent relations
Warm-Up Fill in the tables below for each INPUT-OUTPUT rule. 3)
Notes Over 2.1 Function {- 3, - 1, 1, 2 } { 0, 2, 5 }
VOCABULARY! EXAMPLES! Relation: Domain: Range: Function:
Relations vs. Functions Function Notation, & Evaluation
VOCABULARY! EXAMPLES! Relation: Domain: Range: Function:
Relations and Functions
Formalizing Relations & Functions
An Introduction to Functions
How would you use your calculator to solve 52?
5.2 Relations and Functions
2.1: Represent Relations and Functions HW: p.76 (4-20 even, all)
DISSERTATION ON CRYPTOGRAPHY.
VOCABULARY! EXAMPLES! Relation: Domain: Range: Function:
2.1: Relations and Functions
RELATIONS & FUNCTIONS CHAPTER 4.
Objectives Identify functions.
Unit 3 Day 4.
Objectives Identify functions.
Modern Cryptography.
Unit 3 Day 3.
Presentation transcript:

Unit 3 Day 4

Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In right triangle ABC, side AC is longer than side BC. The boxed numbers represent the possible side lengths of triangle ABC. Identify three boxed numbers that could be the side lengths of triangle ABC. Enter the number you chose to represent the length of each side. a. BC =_____b. AC =_____c. AB =_____ Input-346 Output13-46

HW Check

On the lined side of the index card: 1.Create a table of Input/Output Values that can be represented by an equation 2.Give at least 4 terms in your sequence. 3.Write your name on the lined side of the index card.Ex. Review of Input-Output Functions Input (x) Output (y)

Find a partner NOT at your table. 1.Write the partners name on the white side of the index card. 2.Have your partner create the now/next function for your sequence. 3.Partners turn in the index card to the bin at the front of the room. Equation: y = x Partner’s Name

Secret Codes You have studied many relationships between quantities. In this lesson you will learn about a special type of relationship called a function. In this lesson you will ● use a coding grid to write a coded message ● create and use a letter-shift code ● determine whether given relationships are functions

The study of secret codes is called cryptography. In cryptography, encryption is the process of transforming information using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.informationalgorithmcipherkey The result of the process is encrypted information. The reverse process, i.e., to make the encrypted information readable again, is referred to as decryption (i.e., to make it unencrypted).

The history of cryptography began thousands of years ago. The earliest known use of cryptography is found in non- standard hieroglyphs carved into monuments from the Old Kingdom of Egypt circa 1900 BC.Old Kingdom of Egypt Until recent decades, it has been the story of what might be called classic cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids.

In the early 20th century, the invention of complex mechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption. The introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.

The development of cryptography has been paralleled by the development of cryptanalysis — the "breaking" of codes and ciphers. The discovery and application, early on, of frequency to the reading of encrypted communications has, on occasion, altered the course of history. Thus the Zimmermann Telegram* triggered the United States' entry into World War I; and Allied reading of Nazi Germany's ciphers shortened World War II, in some evaluations by as much as two years.

Until the 1970s, secure cryptography was largely the preserve of governments. Two events have since brought it squarely into the public domain: the creation of a public encryption standard the invention of public-key cryptography. Modern encryption protects our information – especially when dealing with money – ATMs, credit cards, etc.

InputABCDEFGHIJKLMNOPQRSTUVWXYZ Out- put FGHIJKLMNOPQRSTUVWXYZABCDE The table shows that the letter A is coded to the letter F, letter B is coded to G, and so on. It also shows that the letter S is coded to the letter X. This code is called a letter-shift code. Can you see why? How would you use the code to write a message?

For this code, the letters are shifted 5 places backwards. Think of the letters A through Z as the numbers 1 through 26. How can we write a rule to represent the letter-shift code? Input Output

You can also represent the code with a grid. Note that the input letters run across the x-axis. To code a letter, look for the shaded square directly above it. Then find the coded output by looking across to the letters that are on the y-axis. In this case, we can see that the letter O maps to the letter T. How is the shift of 5 letters revealed on the graph?

Write a Short Coded message. Ex. YWD IJHTINL YMNX Is code for TRY DECODING THIS.

This code is called a letter-shift code. Can you see why? How would you use the code to write a message?

A RELATION is a set of ordered pairs (input/output values)

DOMAIN The DOMAIN of a relation is the set of first coordinates of the ordered pairs. ***The X values are the DOMAIN*** ***Input Values***

RANGE The RANGE is the set of second coordinates. ***The Y values are the RANGE*** ***Output Values***

Function A FUNCTION is a relation that assigns exactly one value in the range to each value in the domain. ***Meaning X values CANNOT Repeat***

a) Domain: _______________________ b) Range: _________________________ c) Is the relation a function? Why or Why not. _________________________ XY

EXAMPLE Tell whether each table represents a function. Explain why or why not.

Domain ValuesRange Values Domain values “map” to its matching range value

Create a Mapping Diagram for the relation Is the relation a function? Why or Why not.

HW 3.4