calculus cryptology n.
Skip this Video
Download Presentation
Calculus Cryptology

Loading in 2 Seconds...

play fullscreen
1 / 5

Calculus Cryptology - PowerPoint PPT Presentation

  • Uploaded on

Calculus Cryptology. Caitlin Bryant Jennifer Davis Laura Tinney. How it Works…. Given a simple polynomial for our key such as Find the y values when x is 1,2,3,4,……,25,26. (1-26 = Alphabet)

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Calculus Cryptology' - temira

Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
calculus cryptology

Calculus Cryptology

Caitlin Bryant

Jennifer Davis

Laura Tinney

how it works
How it Works…
  • Given a simple polynomial for our key such as

Find the y values when x is 1,2,3,4,……,25,26.

(1-26 = Alphabet)

  • The y values found now become cipher text for the alphabet. For example, if we want to use the polynomial above and encrypt the word MATH, our cipher text to send would now be 2379,3,8420,584.
now suppose alice wants to send bob our encrypted message
Now suppose Alice wants to send Bob our encrypted message….
  • In order for bob to decrypt the message Alice has sent, he must take the anti-derivative of the key polynomial he received. Ex:
  • Now all Bob has to do is plug in the numbers sent to him in for the ‘y’ value of his integrated polynomial to get the x values .
  • Now he can decipher his message using the table on the previous slide
  • Alice must take the derivative of our polynomial using the rules she has learned in Calculus class.
  • The message Bob receives should look something like this:


homework review worksheet
Homework: Review Worksheet
  • Students should create their own polynomial using the worksheets from “Finite Differences”. After this is complete, have each student encrypt their own message and send to a classmate. (Be sure to include the derivative)
  • Decrypt your classmates message using the derivative and anti-derivative rules we have learned in class so far.
  • This assignment will be used as a review for the AP Calculus Exam.