- 66 Views
- Uploaded on
- Presentation posted in: General

Calculus Cryptology

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Calculus Cryptology

Caitlin Bryant

Jennifer Davis

Laura Tinney

- Given a simple polynomial for our key such as
Find the y values when x is 1,2,3,4,……,25,26.

(1-26 = Alphabet)

- The y values found now become cipher text for the alphabet. For example, if we want to use the polynomial above and encrypt the word MATH, our cipher text to send would now be 2379,3,8420,584.

- In order for bob to decrypt the message Alice has sent, he must take the anti-derivative of the key polynomial he received. Ex:
- Now all Bob has to do is plug in the numbers sent to him in for the ‘y’ value of his integrated polynomial to get the x values .
- Now he can decipher his message using the table on the previous slide

- Alice must take the derivative of our polynomial using the rules she has learned in Calculus class.
- The message Bob receives should look something like this:
(2379,3,84200,584)

- Students should create their own polynomial using the worksheets from “Finite Differences”. After this is complete, have each student encrypt their own message and send to a classmate. (Be sure to include the derivative)
- Decrypt your classmates message using the derivative and anti-derivative rules we have learned in class so far.
- This assignment will be used as a review for the AP Calculus Exam.