1 / 5

Calculus Cryptology

Calculus Cryptology. Caitlin Bryant Jennifer Davis Laura Tinney. How it Works…. Given a simple polynomial for our key such as Find the y values when x is 1,2,3,4,……,25,26. (1-26 = Alphabet)

temira
Download Presentation

Calculus Cryptology

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Calculus Cryptology Caitlin Bryant Jennifer Davis Laura Tinney

  2. How it Works… • Given a simple polynomial for our key such as Find the y values when x is 1,2,3,4,……,25,26. (1-26 = Alphabet) • The y values found now become cipher text for the alphabet. For example, if we want to use the polynomial above and encrypt the word MATH, our cipher text to send would now be 2379,3,8420,584.

  3. Now suppose Alice wants to send Bob our encrypted message…. • In order for bob to decrypt the message Alice has sent, he must take the anti-derivative of the key polynomial he received. Ex: • Now all Bob has to do is plug in the numbers sent to him in for the ‘y’ value of his integrated polynomial to get the x values . • Now he can decipher his message using the table on the previous slide • Alice must take the derivative of our polynomial using the rules she has learned in Calculus class. • The message Bob receives should look something like this: (2379,3,84200,584)

  4. Homework: Review Worksheet • Students should create their own polynomial using the worksheets from “Finite Differences”. After this is complete, have each student encrypt their own message and send to a classmate. (Be sure to include the derivative) • Decrypt your classmates message using the derivative and anti-derivative rules we have learned in class so far. • This assignment will be used as a review for the AP Calculus Exam.

More Related