CS4HS Workshop @ Columbia University Injecting CS into High School Adam Cannon

advertisement
CS4HS Workshop @ Columbia University
Injecting CS into High School
Math and Science Classes
Adam Cannon
Department of Computer Science
Columbia University
July 8, 2011
CS@CU
Outline





Binary numbers
Information theory
Hiding information
Digital Signatures
Error Detection and Correction
Binary Numbers


We use binary numbers to represent
information in computer systems
Why?




It’s just more natural
On/Off
Positive/Negative Charges
N-S/S-N Magnetic Fields
CS@CU
Information Theory


How do we measure information?
Example: Text message that reads:
“See you at Starbucks later?”
or
“cu @ *$ l8r?”
CS@CU
Information Theory

Both convey the same information so
measuring the length of the message is
not really useful if we are trying to
measure the amount of information
conveyed.
CS@CU
Information Theory


Both convey the same information so
measuring the length of the message is
not really useful if we are trying to
measure the amount of information
conveyed.
So how do we do it?
CS@CU
Information Theory

Both convey the same information so
measuring the length of the message is
not really useful if we are trying to
measure the amount of information
conveyed.
So how do we do it?

We play 20 questions.

CS@CU
Information Theory

The amount of information in a
message can be quantified by how hard
it is to “guess” what’s there.
CS@CU
Information Theory


The amount of information in a
message can be quantified by how hard
it is to “guess” what’s there.
Example: Pick a number
CS@CU
Information Theory


The amount of information in a
message can be quantified by how hard
it is to “guess” what’s there.
Example: Pick a number

Between 1-10
CS@CU
Information Theory


The amount of information in a
message can be quantified by how hard
it is to “guess” what’s there.
Example: Pick a number


Between 1-10
Between 1-100
CS@CU
Worksheet Activity: Decision Trees
Information
Theory
If you already know the strategy for asking the questions, you can tran
message without having to ask anything.
Guessing a number between 0-7:
Here is a chart called a ‘decision tree’ for guessing a number between
From csunplugged.org
What are the yes/no decisions needed to ‘guess’ the number 5?
CS@CU
Information Theory

Understanding how much information is
really contained in any kind of message
is the cornerstone of compression
technologies. These technologies are
used for everything from email to digital
voice communication to streaming
video.
CS@CU
Hiding Information

Sharing information online is a common
and increasingly necessary activity
today.
CS@CU
Hiding Information


Sharing information online is a common
and increasingly necessary activity
today.
How can we share information and still
maintain a reasonable level of privacy?
CS@CU
Hiding Information

Techniques like these may be used to
guard information during online
transactions.



Ecommerce
Medical Data
Personal Data
CS@CU
Digital Signatures

How can we “trust” someone online?
CS@CU
Digital Signatures

How can we “trust” someone online?

When would we need to do this?
CS@CU
Digital Signatures

How can we “trust” someone online?

When would we need to do this?

Online contracts
CS@CU
Digital Signatures

How can we “trust” someone online?

When would we need to do this?


Online contracts
Identity verification
CS@CU
Digital Signatures

How can we “trust” someone online?

When would we need to do this?



Online contracts
Identity verification
Online gaming
CS@CU
Digital Signature

Example:
How can we flip a coin over the phone?
CS@CU
Digital Signature

Example:
How can we flip a coin over the phone?
The math behind this is simple. The key is
to find a function that is easy to compute
but whose inverse is tough!
CS@CU
Digital Signatures

Function / Inverse-Function pairs like
this are a primary tool in modern public
key cryptography.
CS@CU
Digital Signatures


Function / Inverse-Function pairs like
this are a primary tool in modern public
key cryptography.
Examples like these can be used to
motivate the study of functions and
inverses in high school algebra!
CS@CU
Error Detection and Correction

Often noise corrupts digital
communication. This can be due to all
kinds of natural or unnatural sources.
CS@CU
Error Detection and Correction


Often noise corrupts digital
communication. This can be due to all
kinds of natural or unnatural sources.
How can I know that the message I
received is the message you sent?
CS@CU
Error Checking and Correction

Techniques like these are used on
everything from internet message
transmissions to credit card fraud
detection.
CS@CU
Games and Puzzles That Teach




These activities can be challenging and
a lot of fun
They stimulate curiosity
They are relevant to everyday life in
today’s world.
Will your students respond to these?
CS@CU
Want to learn more?
Check out CS Unplugged at:
http://csunplugged.org
If you do choose to use any activities like these, I would
love to hear your feedback.
cannon@cs.columbia.edu
Thanks!
CS@CU
Download