1 / 20

Programming and cryptography

Programming and cryptography. Wilber R. Rivas Del Rio High School San Felipe Del Rio CISD Dr . Guofei Gu Director of SUCCESS laboratory Secure Communication and Computer Systems Department of Computer Science & Engineering. Road map. Faculty Mentor Research Area

arlo
Download Presentation

Programming and cryptography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Programming and cryptography Wilber R. Rivas Del Rio High School San Felipe Del Rio CISD Dr. GuofeiGu Director of SUCCESS laboratory Secure Communication and Computer Systems Department of Computer Science & Engineering

  2. Road map • Faculty Mentor • Research Area • Research Area and Classroom Project • Classroom Project: Program using TI-84 Graphing Calculator • Show how to program the quadratic formula as an example • Mathematical application: Cryptography (extra) • Acknowledgements

  3. Director • Guofei Gu • Assistant Professor • Department of Computer Science & Engineering • Director, SUCCESS LAB • 2010 NSF CAREER award • Ph.d. Georgia Tech

  4. Research Area • Internet malware detection, defense, and analysis • Intrusion detection, anomaly detections • Network security • Web and social networking security

  5. Secure Communication is important • Citicard Users Lost Around $2.7 Million from Security Breach • The losses incurred by the Citigroup during a recent attack by hackers cost around $2.7 million after Citicard numbers were stolen from the website of the company

  6. Relationship between research and project Research: Developing algorithms for secure communication Classroom project : Students will learn to develop algorithms to solve mathematical problems. They will learn to program mathematical formulas on the TI-84

  7. TEKS §111.34. Geometry • (b) Knowledge and skills. • (1) Geometric structure. The student understands the structure of, and relationships within, an axiomatic system. The student is expected to: • (A) develop an awareness of the structure of a mathematical system, connecting definitions, postulates, logical reasoning, and theorems; • (3) Geometric structure. The student applies logical reasoning to justify and prove mathematical statements. The student is expected to: • (A) determine the validity of a conditional statement, its converse, inverse, and contrapositive; • (C) use logical reasoning to prove statements are true and find counter examples to disprove statements that are false; • (D) use inductive reasoning to formulate a conjecture; and • (E) use deductive reasoning to prove a statement.

  8. Classroom project • Simple programming using a graphing calculator

  9. Programming • Students will work in groups of 2 • Formulas and mathematical problems will be provided • Students will write program on paper and then test on the calculator

  10. Computers can do five basic things: • Take input • Arithmetic • Repetition • Make decision based of input information • Give output

  11. Quadratic formula program

  12. Programming PRGM

  13. Programming cont.

  14. Programming cont.

  15. For example: Name of program is quad D E

  16. Do you know how to keep secrets?Computers don’t!!!!

  17. (extra) Cryptography • Cryptography comes from the Greek for “secret writing.” • Students will use matrices to encrypt and decrypt plain text messages • [space] = 0, A=1, B=2, C=3, D=4, E=5, F=6, G=7, H=8, I=9, J=10, K=11, L=12 ,M=13, N=14, O=15, P=16, Q=17, R=18, S=19, T=20, U=21, V=22, W=23, X=24,Y=25, Z=26 Matrix

  18. Cryptography

  19. Cryptography cont.

  20. Acknowledgements Dr. Guofei Gu and staff E3 program coordinators Master teachers: Stephen Hudson and Roberto Dimaliwat E3 participants James Milender for encouraging me to apply

More Related