1 / 24

Cryptography Applied to Linear Functions

Cryptography Applied to Linear Functions. Louena L. Manluctao East Early College High School Houston Independent School District Dr. Guofei Gu Assistant Professor College of Computer Science and Engineering Texas A & M University. Roadmap. Introduction

dea
Download Presentation

Cryptography Applied to Linear Functions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cryptography Applied to Linear Functions Louena L. Manluctao East Early College High School Houston Independent School District Dr. GuofeiGu Assistant Professor College of Computer Science and Engineering Texas A & M University

  2. Roadmap • Introduction - Bridging Research to Lesson - STAAR/TEKS Objective • The Classroom Project • Samples of Pre-Test/Post-Test • Acknowledgements • Q & A

  3. Research Interest • Network and system security such as Internet malware detection, defense, and analysis • Intrusion detection, anomaly detection • Network security • Web and social networking security

  4. Relevance of the Research • http://www.youtube.com/watch?v=Mh1tfKyC-bY Sony Pictures hacked by Luiz Security, 1,000,000 passwords claimed stolen (update) http://consumerist.com/2011/06/how-hackers-stole-200000-citi-accounts-by-exploiting-basic-browser-vulnerability.html

  5. Bridging Research to Lesson in Algebra 1 Research Lab Algebra 1 Cryptography Probability and StatisticsLinear Number TheoryFunctions Abstract Algebraand Sequences Programming

  6. STAAR/TEKS OBJECTIVES A1.3 & A1.4 (C) Linear Functions: (A)  use symbols to represent unknowns and variables; and (B)  look for patterns and represent eneralizations algebraically. (C)  connect equation notation with function notation, such as y = x + 1 and f(x) = x + 1.

  7. STAAR/TEKS OBJECTIVE (7)  Linear functions. The student formulates equations and inequalities based on linear functions, (A)  analyze situations involving linear functions and formulate linear equations or inequalities to solve problems;

  8. THE CLASSROOM PROJECT : CRYPTOGRAPHY APPLIED TO LINEAR FUNCTION • Day 1: • Pre-Test • Hook • Power Point Presentation on Computer Network Security and Cryptography • Explain ( How to encrypt and decrypt) • Worksheets on finding the function key

  9. HOOK • Find the sum of 5 sets of 4-digit numbers without using the calculator. • I am texting this message, -4, -13, 2, -22, -1, -46, -46, -73 what do you think is it? • Do you think your computers are safe from cyber attack in your own homes?

  10. Power Point on Cryptography • What is cryptography? • Different Kinds of Cryptography • How to Encrypt and Decrypt

  11. Encrypt/Decrypt

  12. Finding The Key (Linear Equation) • The key will be the equation from a given sequence: • Consider: 3, 6, 9, 12, 15 5,9,13,17,21 9,7,5,3,1,-1 -3,3,9,15,21

  13. Cont. • The common difference is the multiplier of n (the position of the term) • To find out what should be added or subtracted, find the zero term • We are now going to develop a formula • First let us define our variables: • T = the nth term z = the zero term • d= the common difference • n = position in the sequence

  14. Cont. The equation is T = dn + z or y = mx + b

  15. Write an equation to describe the following sequences • 9, 8, 7, 6, 5 • 13, 17 , 21, 25, 29 • 6, 11, 16, 21, 26 • 112, 100, 88, 76

  16. Day 2: • Review of Previous Lesson • Discussion of Finding the Inverse of the equation of the line. • Decoding Activity • Post-Test

  17. To Find the Inverse of an Equation • Exchange x and y • Solve for y in terms of x Ex. Y = 3x x = 3y x/3 = y

  18. Find the inverse of the following equations • 1. y = 3x + 5 • 2. y = -2x -4 • 3. y = 4x – 6 • 4. y = 3/4x + 2

  19. The Decoding Activity • Students will be grouped by two’s • Each pair will be given a sequence where they will need to find the key. • Use the key to find the encrypted code • Decipher using inverse equation. • Use : Space = 0 ; A = 1; B=2; C=3…Z=26 • Give the message.

  20. What is the text message? -4, -13, 2, -22, -1, -46, -46, -73 • Key: -1, -4, -7, -10, . . . • What is the encrypted key? y = -3x+2 • What is the decrypted key? Y = -(x-2)/3 • What is the deciphered message? 2, 5 , 0, 8, 1, 16, 16, 25 Plaintext message is: BE HAPPY

  21. Decoding Activity: What is the message? • -21 3 -35 -11 5 -13 -33 5 - 37 -33 -5 -7 -37 -15 5 3 -23 -3 5 -7 -37 -23 • KEY: 3, 1, -1, -3, … • What is the encrypted key? ( y = mx+b) ___________________ • What is the decrypted key? ________ • What is the deciphered message?__________ • Remember : Space = 0 A = 1 B =2 C =3… Z = 26 • Plaintext Message: _________________________________

  22. Assessment: Pre-Test/Post TestSample Questions 1. The nth term of a sequence is defined to be 3n +7. The 35th term is how much less than the 39th term? A)4 B) 12 C) 19 D) 33 2. Given the sequence -5, -2, 1, 4 … which equation best represents the sequence? A) y =3x-5 C) y = 3x-8 B) y = -3x-5 D) y = -3x-8

  23. Acknowledgements Dr. Robin Autenrieth, Dr. Cheryl Page, Dr. ArunSrinivasa Matthew Pariyothorn, AshwinRao, Roberto Dimaliwat, Stephen Hudson Dr. GuofeiGu, Chao Yang, Jialong Zhang , Wilber Rivas

  24. Question and Answer Thanksto Chao Yang’s Presentation

More Related