1 / 29

LONG TERM GOAL

LONG TERM GOAL. To develop a strategy based on 21 st century approaches and to apprise the students about latest trends & applications of Mathematics in the best possible way. SHORT TERM GOALS.

nia
Download Presentation

LONG TERM GOAL

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. LONG TERM GOAL To develop a strategy based on 21st century approaches and to apprise the students about latest trends & applications of Mathematics in the best possible way

  2. SHORT TERM GOALS

  3. A polynomial is a mathematical expression involving a sum of powers in one or more variables multiplied by coefficients. A polynomial in one variable (i.e., a univariate polynomial) with constant coefficients is given by • TOPIC TO BE DISCUSSED • POLYNOMIALS

  4. TYPES OF POLYNOMIALS

  5. The degree of a polynomial with only one variable is the largest exponent of that variable. For example degree of given polynomial is “3” 4x3-x+5 • DEGREE OF A POLYNOMIAL

  6. NOMENCLATURE OF POLYNOMIALS

  7. CRYPTOGRAPHY

  8. Cryptography: The cryptographic practices are in use by the mankind since the ancient times due to the basic instinct of human beings to keep their communication secret and on the other hand their curiosity about what others are talking. In older times the cryptographic practices were limited to particular organizations specially military and secret services. Initially the symmetric key cryptography concept was adapted where the keys were forwarded to the recipient of the message prior sending the message. These keys were onwards used to cipher and decipher the messages. Some of these symmetric systems were Ceaser’s cipher, Enigma and other rotor machines. Symmetric systems are still considered as the most rapid way of cryptographic communication if the joint key exchange is established successfully.

  9. CRYPTOGRAPHY

  10. CRYPTOGRAPHY FLOW DIAGRAM USER A ENCRYPTION COMMUNICATION MEDIUM USER B DECRYPTION

  11. ALGORITHM

  12. ENCRYPTION

  13. DECRYPTION

  14. CRYPTOGRAPHY ALGORITHMS

  15. CRYPTOGRAPHY ALGORITHMS

  16. CRYPTOGRAPHY ALGORITHMS

  17. CRYPTOGRAPHY ALGORITHMS

  18. CRYPTOGRAPHY ALGORITHMS

  19. CRYPTOGRAPHY ALGORITHMS • EXERCISE # 1 • LETS TRY TO ENCRYPT YOUR OWN NAME WITH THIS ALGORITHM

  20. CRYPTOGRAPHY ALGORITHMS

  21. CRYPTOGRAPHY ALGORITHMS • EXERCISE # 2 • LETS TRY TO DECRYPT THIS • 1451 0047 2699 0971 0047 0341 0971 2699 0506 0362

  22. CRYPTOGRAPHY ALGORITHMS • EXERCISE # 3 • LETS TRY TO CREATE YOUR OWN ALGORITHM FROM TH EQUATION • f(x)=x2 +x+1 • WITH INCREMENTAL CODING OF ORDER 1 IN ASCENDING ORDER

  23. INSTRUCTIONAL STRATEGIES

  24. REFERENCES • “Handbook of Elliptic and Hyper Elliptic Curve Cryptography” by Henri Cohen & Gerhard Frey • “Handbook of Applied Cryptography” by Alfred J. Menezes, Paul C. van Oorschot & Scott A. Vanstone • www.wikipedia.org/wiki/Cryptography • www.wikipedia.org/wiki/Polynomial • www.mathworld.wolfram.com › Algebra › Polynomials

More Related