Download presentation
Presentation is loading. Please wait.
Published byVirginia Hopkins Modified over 9 years ago
5
Some of these PowerPoint pages were created by my friend Shawna Haider
6
Cryptology What is it? The science of making and breaking secure codes & ciphers and the math that creates it.
7
Cryptology Cryptography is the science of adversarial information protection (making secure codes & ciphers.) Cryptanalysis is the science of breaking secure codes & ciphers.
8
We see examples of codes in many places. Slang Phrases Text Messaging UPC & Postal Codes Credit Cards HTML and ASCII Codes
9
LOL BFF L8R J/K AWHFY MOS T@YL 404
11
Modern Cryptography Uses Computers ASCII HTML Data encryption
12
First of all, let's review the difference between encoding and encryption. Encoding is the process of changing information from one representational form into another. Anyone who knows the encoding method can read the information. Examples of encoding include Morse Code, Braille, and Code 39.
13
Encryption, on the other hand, is the process of hiding information using a password, sometimes called a "key." Only someone with the correct key can "unlock" the encrypted information and reveal the original message. Examples of encryption (TLS), used for secure Web browsing, and (AES), which is used by the United States federal government.
15
POSTNET POSTal Numeric Encoding Technique
17
123455
19
08 4 X 3 = 12+ 10= 22+ ? to get a multiple of 10?
21
Transposition Ciphers In classical cryptography, a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is, the order of the characters is changed. Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt.
22
bijective function Math Matters students → age Math Matters students → phone # Math Matters students → SSN Math Matters students → states
23
Substitution Ciphers In substitution ciphers, units of the plaintext (generally single letters or pairs of letters) are replaced with other symbols or groups of symbols, which need not be the same as those used in the plaintext.
24
A Variety of Encryption Schemes Wheel or slide (Ceasar, Jefferson) Freemason (Pig Pen) Ancient Writings Vigenere Square
25
ABCDEFGHIJKLMNOPQRSTUVWXYZ ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZ ZSJJ YVJRZ!
26
PIG PEN CIPHER
27
What tools would be useful in a math class?
28
Ancient writings
29
Why was the math book unhappy?
30
Vigenere Square What are math teachers’ favorite animals? (1, 1) (4, 3) (4, 9) (0, 4) (4, 5) (2, 6) (1, 5)
31
The Enigma
33
Where Do Cryptologists Work? Google, Microsoft, AOL etc. Credit card companies, online payment companies such as PayPal, and just about any company responsible for managing private personal customer information. law enforcement agencies government agencies the armed forces universities and research institutes.
34
www.nsa.gov/kids
35
The Cryptoclub
36
http://www.cryptoclub.org/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.