290 likes | 445 Views
LONG TERM GOAL. To develop a strategy based on 21 st century approaches and to apprise the students about latest trends & applications of Mathematics in the best possible way. SHORT TERM GOALS.
E N D
LONG TERM GOAL To develop a strategy based on 21st century approaches and to apprise the students about latest trends & applications of Mathematics in the best possible way
A polynomial is a mathematical expression involving a sum of powers in one or more variables multiplied by coefficients. A polynomial in one variable (i.e., a univariate polynomial) with constant coefficients is given by • TOPIC TO BE DISCUSSED • POLYNOMIALS
The degree of a polynomial with only one variable is the largest exponent of that variable. For example degree of given polynomial is “3” 4x3-x+5 • DEGREE OF A POLYNOMIAL
Cryptography: The cryptographic practices are in use by the mankind since the ancient times due to the basic instinct of human beings to keep their communication secret and on the other hand their curiosity about what others are talking. In older times the cryptographic practices were limited to particular organizations specially military and secret services. Initially the symmetric key cryptography concept was adapted where the keys were forwarded to the recipient of the message prior sending the message. These keys were onwards used to cipher and decipher the messages. Some of these symmetric systems were Ceaser’s cipher, Enigma and other rotor machines. Symmetric systems are still considered as the most rapid way of cryptographic communication if the joint key exchange is established successfully.
CRYPTOGRAPHY FLOW DIAGRAM USER A ENCRYPTION COMMUNICATION MEDIUM USER B DECRYPTION
CRYPTOGRAPHY ALGORITHMS • EXERCISE # 1 • LETS TRY TO ENCRYPT YOUR OWN NAME WITH THIS ALGORITHM
CRYPTOGRAPHY ALGORITHMS • EXERCISE # 2 • LETS TRY TO DECRYPT THIS • 1451 0047 2699 0971 0047 0341 0971 2699 0506 0362
CRYPTOGRAPHY ALGORITHMS • EXERCISE # 3 • LETS TRY TO CREATE YOUR OWN ALGORITHM FROM TH EQUATION • f(x)=x2 +x+1 • WITH INCREMENTAL CODING OF ORDER 1 IN ASCENDING ORDER
REFERENCES • “Handbook of Elliptic and Hyper Elliptic Curve Cryptography” by Henri Cohen & Gerhard Frey • “Handbook of Applied Cryptography” by Alfred J. Menezes, Paul C. van Oorschot & Scott A. Vanstone • www.wikipedia.org/wiki/Cryptography • www.wikipedia.org/wiki/Polynomial • www.mathworld.wolfram.com › Algebra › Polynomials