Presentation is loading. Please wait.

Presentation is loading. Please wait.

Some of these PowerPoint pages were created by my friend Shawna Haider.

Similar presentations


Presentation on theme: "Some of these PowerPoint pages were created by my friend Shawna Haider."— Presentation transcript:

1

2

3

4

5 Some of these PowerPoint pages were created by my friend Shawna Haider

6 Cryptology What is it? The science of making and breaking secure codes & ciphers and the math that creates it.

7 Cryptology  Cryptography is the science of adversarial information protection (making secure codes & ciphers.)  Cryptanalysis is the science of breaking secure codes & ciphers.

8 We see examples of codes in many places.  Slang Phrases  Text Messaging  UPC & Postal Codes  Credit Cards  HTML and ASCII Codes

9 LOL BFF L8R J/K AWHFY MOS T@YL 404

10

11 Modern Cryptography Uses Computers ASCII HTML Data encryption

12 First of all, let's review the difference between encoding and encryption. Encoding is the process of changing information from one representational form into another. Anyone who knows the encoding method can read the information. Examples of encoding include Morse Code, Braille, and Code 39.

13 Encryption, on the other hand, is the process of hiding information using a password, sometimes called a "key." Only someone with the correct key can "unlock" the encrypted information and reveal the original message. Examples of encryption (TLS), used for secure Web browsing, and (AES), which is used by the United States federal government.

14

15 POSTNET POSTal Numeric Encoding Technique

16

17 123455

18

19 08 4 X 3 = 12+ 10= 22+ ? to get a multiple of 10?

20

21 Transposition Ciphers In classical cryptography, a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is, the order of the characters is changed. Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt.

22 bijective function Math Matters students → age Math Matters students → phone # Math Matters students → SSN Math Matters students → states

23 Substitution Ciphers In substitution ciphers, units of the plaintext (generally single letters or pairs of letters) are replaced with other symbols or groups of symbols, which need not be the same as those used in the plaintext.

24 A Variety of Encryption Schemes Wheel or slide (Ceasar, Jefferson) Freemason (Pig Pen) Ancient Writings Vigenere Square

25 ABCDEFGHIJKLMNOPQRSTUVWXYZ ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZ ZSJJ YVJRZ!

26 PIG PEN CIPHER

27 What tools would be useful in a math class?

28 Ancient writings

29 Why was the math book unhappy?

30 Vigenere Square What are math teachers’ favorite animals? (1, 1) (4, 3) (4, 9) (0, 4) (4, 5) (2, 6) (1, 5)

31 The Enigma

32

33 Where Do Cryptologists Work? Google, Microsoft, AOL etc. Credit card companies, online payment companies such as PayPal, and just about any company responsible for managing private personal customer information. law enforcement agencies government agencies the armed forces universities and research institutes.

34 www.nsa.gov/kids

35 The Cryptoclub

36 http://www.cryptoclub.org/


Download ppt "Some of these PowerPoint pages were created by my friend Shawna Haider."

Similar presentations


Ads by Google