Warm Up 1) Solve: -2(x + 9) + 13 = -11 2) A triangle has side lengths of 5, 15, and 14. Is the triangle a right triangle? Why or Why not?

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Computer Science 101 Data Encryption And Computer Networks.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Security & Encryption Thomas Fenske & Joseph Minter.
Cryptography The science of writing in secret code.
Secure communication Informatics for economists II Jan Přichystal
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
FUNCTIONS Lesson Two.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Easy Encryption: OS X and Windows 2K/Xp Shawn Sines OARTech August 8, 2007.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Introduction to Information Security Chapter II : Classical Ciphers.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Famous Firsts in Computation MSE 2400 Evolution & Learning
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Lessons 7.1 Students learn about a function through trying to un-code a message ◦ They will notice that unambiguous encoding requires a function.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Cryptography, Authentication and Digital Signatures
Encryption Encryption is the process of obscuring information to make it unreadable without special knowledge. information
Lec. 5 : History of Cryptologic Research II
Chapter 4.8: Determine if the Relation is a Function.
Encryption: A Brief History Author: Margery Waldron.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Functions. Warm Up Solve each equation. 1.2x – 6 = x = X + 29 = x – 5 – 4x = 17 x = 14 x = - 7 x = -15 x = 11.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Unit 3 Day 4. Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In.
ISEP / Fakulta Elektrotecknika 1 Project Of Telecommunication Subject: Describe following “ MAC - Message Authentication Code " modes: Describe following.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Public Key Encryption.
Cryptography is the process of encryption and decryption a message or data. Examples: Banking to keep peoples money safe Schools so we can keep students.
Lecture 2: Introduction to Cryptography
Warm Up. Lesson 25: Differentiating Between Relations and Functions Functions.
The Storyboard stage. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender,
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
WARM UP. ALGEBRA 3 CHAPTER 9: RATIONAL EQUATIONS AND FUNCTIONS LESSON 2: GRAPHING SIMPLE RATIONAL FUNCTIONS.
AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
CRYPTOGRAPHY. DEFINITION Cryptography is the science of writing in secret code The earliest documented use began around 2,000 B.C in Egypt (Hieroglyphics)
Some of these PowerPoint pages were created by my friend Shawna Haider.
LESSON 7.1 Functions To investigate the concept of function through secret codes.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Functions Warm Up Warm Up Lesson Presentation Lesson Presentation Problem of the Day Problem of the Day Lesson Quizzes Lesson Quizzes.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
Crypto in information security
Cryptography.
Chapter 3:Cryptography (16M)
Security through Encryption
Simple Encryption- Lesson 5
Warm Up Problem of the Day Lesson Presentation Lesson Quizzes.
Welcome to semester 2. Midterm Pass-back tomorrow
DISSERTATION ON CRYPTOGRAPHY.
By Sean O’Mahoney from the Computing Society at Futures Friday
Modern Cryptography.
Basics Of Symmetric Encryption
Presentation transcript:

Warm Up 1) Solve: -2(x + 9) + 13 = -11 2) A triangle has side lengths of 5, 15, and 14. Is the triangle a right triangle? Why or Why not?

HW Check 3.6

Page 5 of the Unit 3 packet

You have studied many relationships between quantities. In this lesson you will learn about a special type of relationship called a function. In this lesson you will: use a coding grid to write a coded message create and use a letter-shift code determine whether given relationships are functions

Function Relation – set of ordered pairs (input and output values) Function – a relationship between a set of inputs and outputs **For any input, the function will have exactly one output. Domain – the set of all x values (input values) in a relation Range – the set of all y values (output values) in a relation

The study of secret codes is called cryptography. In cryptography, encryption is the process of transforming information using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information. The reverse process, i.e., to make the encrypted information readable again, is referred to as decryption (i.e., to make it unencrypted).

The history of cryptography began thousands of years ago. The earliest known use of cryptography is found in non-standard hieroglyphs carved into monuments from the Old Kingdom of Egypt circa 1900 BC. Until recent decades, it has been the story of what might be called classic cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids.

In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.

Until the 1970s, secure cryptography was largely the preserve of governments. Two events have since brought it squarely into the public domain: the creation of a public encryption standard and the invention of public- key cryptography. Modern encryption protects our information – especially when dealing with money – ATMs, credit cards, etc.

Secret Codes Investigation – pages 2 & 3

Stand up/Sit Down For each of the following stand if the relation is a function, stay seated if it is not a function. Be ready to justify your choice!

1)

2)

3)

4)

Coming up… Homework tonight – 3.7 QUIZ tomorrow!! Midterm coming up next Wednesday. Start looking over Units 1 – 3 materials.