ma111 contemporary mathematics
play

MA111: Contemporary mathematics Entrance Slip (due 5 min past the - PowerPoint PPT Presentation

MA111: Contemporary mathematics Entrance Slip (due 5 min past the hour): 1 21 2 20 3 B C D Y Z What key is used to shift feedback to 19 4 X F KOOHCEFT ? What is going on? 18 1 5 W A G 5 2 17 6 U E V H T J 16 O I 7 4


  1. MA111: Contemporary mathematics Entrance Slip (due 5 min past the hour): 1 21 2 20 3 B C D Y Z What key is used to shift feedback to 19 4 X F KOOHCEFT ? What is going on? 18 1 5 W A G 5 2 17 6 U E V H T J 16 O I 7 4 3 S K Schedule: R L 15 8 Q M HW 1 is due 10am Thursday, Oct 9th, 2014 P N 14 9 Mini-Exam 2 is in-class on Thursday, Oct 9th, 2014 13 10 12 11 HW 2 is due 7am Wednesday, Oct 15th, 2014 HW 3 is due 7am Wednesday, Oct 22nd, 2014 Exam 2 is in-class on Thursday, Oct 23rd, 2014 Today we use numbers to make a new cipher.

  2. While we are passing out the worksheet... Please turn in your entrance slips. We will do this every non-exam day. Please bring your own 3x5 index cards. 1 21 2 20 3 B C D Y Z 19 4 X F 18 1 5 Might be easier to use numbers: W A G 4,2,2,3,1,1,2,8 5 2 feedback 17 6 U E V H ↓ ↓ T J 16 O I 7 S 4 3 K 8,4,4,6,2,2,4,16 KOOHCEFT R L 15 8 Q M P N 14 9 If we rearrange we get: 13 10 12 11 1,2,3,4,8,1,2 bcdfkae ↓ ↓ 2,4,6,8,16,2,4 CFHKTEO What is going on?

  3. Old words plaintext (plain message, “ can you keep a secret ”) ciphertext (hidden version, “ DEP ZUA LIIQ E TIDSIV ”) encryption (how to convert plaintext to ciphertext) decryption (the reverse, cipher to plain) cipher (both encryption and decryption methods) key (a small secret that lets you change the cipher) numbers (are used to represent consonants and vowels) shift cipher (use addition and subtraction with wrap around)

  4. New words: double-it cipher 1 21 2 To encrypt with double-it cipher, 20 3 double the number, B C D Y Z 19 4 using wrap-around if too big X F 18 1 5 W A G (subtract 5 if a vowel, or 5 2 17 U E 6 V H subtract 21 if a consonant) T J 16 O I 7 4 3 S K To decrypt with double-it cipher, 15 R L 8 Q divide the number by two, M P N 14 9 using wrap-around if odd, 13 10 12 11 (add 5 if a vowel, or add 21 if a consonant) To encrypt, g = 5 → M =10, since 5 + 5 = 10 and w =18 → S =15, since 18 + 18 = 36 and 36 − 21 = 15. And to decrypt, M =10 → G = 5, since 10 / 2 = 5 and S =15 → W =18, since 36 / 2 = 18 and 15 + 21 = 36.

  5. New words Cryptanalysis is the study of ciphers, usually with the intention of easily encrypting or decrypting without the key, or easily finding the key We almost always assume you know which cipher is in use, but not what key Frequency analysis - you know some CIPHERTEXT and what language the plaintext came from, but not exactly what the plaintext is. Known-plaintext - you know a little plaintext and the CIPHERTEXT it encrypts to. These are the main ones we can do on the exam

  6. Optional new words Here are some other situations: Brute-force - just try all keys (takes too long on an exam) Chosen-plaintext - you get to choose plaintext and they tell you what it encrypts to Surprisingly it is often possible to trick someone into encrypting a few messages for you Send someone a text and wait for an encrypted message of the right length to show up

  7. Optional new words Chosen-ciphertext - you get to choose CIPHERTEXT and they tell you what it decrypts to More surprisingly it is often possible to trick someone into decrypting a few messages for you In real life, one sends garbage to a wireless router and looks at the error message to see what part it didn’t like Side-channel - you watch the person encrypting or decrypting in a chosen-whatever situation, and based on how long they take to do it you get more information This is a popular modern mechanism. For us, you might ask them to encrypt bdlty and see which letter is the first one that takes a long time. That is probably the first time it wraps around.

  8. Exit quiz Decrypt this message knowing that it is encrypted with the double-it cipher: “ WATO E CILL ” 1 21 2 20 3 B C D Y Z 19 4 X F 18 1 5 W A G 5 2 17 U E 6 V H T J 16 O I 7 4 3 S K 15 R L 8 Q M P N 14 9 13 10 12 11

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend