CS4HS Workshop @ Columbia University Injecting CS into High School Math and Science Classes Adam Cannon Department of Computer Science Columbia University July 8, 2011 CS@CU Outline Binary numbers Information theory Hiding information Digital Signatures Error Detection and Correction Binary Numbers We use binary numbers to represent information in computer systems Why? It’s just more natural On/Off Positive/Negative Charges N-S/S-N Magnetic Fields CS@CU Information Theory How do we measure information? Example: Text message that reads: “See you at Starbucks later?” or “cu @ *$ l8r?” CS@CU Information Theory Both convey the same information so measuring the length of the message is not really useful if we are trying to measure the amount of information conveyed. CS@CU Information Theory Both convey the same information so measuring the length of the message is not really useful if we are trying to measure the amount of information conveyed. So how do we do it? CS@CU Information Theory Both convey the same information so measuring the length of the message is not really useful if we are trying to measure the amount of information conveyed. So how do we do it? We play 20 questions. CS@CU Information Theory The amount of information in a message can be quantified by how hard it is to “guess” what’s there. CS@CU Information Theory The amount of information in a message can be quantified by how hard it is to “guess” what’s there. Example: Pick a number CS@CU Information Theory The amount of information in a message can be quantified by how hard it is to “guess” what’s there. Example: Pick a number Between 1-10 CS@CU Information Theory The amount of information in a message can be quantified by how hard it is to “guess” what’s there. Example: Pick a number Between 1-10 Between 1-100 CS@CU Worksheet Activity: Decision Trees Information Theory If you already know the strategy for asking the questions, you can tran message without having to ask anything. Guessing a number between 0-7: Here is a chart called a ‘decision tree’ for guessing a number between From csunplugged.org What are the yes/no decisions needed to ‘guess’ the number 5? CS@CU Information Theory Understanding how much information is really contained in any kind of message is the cornerstone of compression technologies. These technologies are used for everything from email to digital voice communication to streaming video. CS@CU Hiding Information Sharing information online is a common and increasingly necessary activity today. CS@CU Hiding Information Sharing information online is a common and increasingly necessary activity today. How can we share information and still maintain a reasonable level of privacy? CS@CU Hiding Information Techniques like these may be used to guard information during online transactions. Ecommerce Medical Data Personal Data CS@CU Digital Signatures How can we “trust” someone online? CS@CU Digital Signatures How can we “trust” someone online? When would we need to do this? CS@CU Digital Signatures How can we “trust” someone online? When would we need to do this? Online contracts CS@CU Digital Signatures How can we “trust” someone online? When would we need to do this? Online contracts Identity verification CS@CU Digital Signatures How can we “trust” someone online? When would we need to do this? Online contracts Identity verification Online gaming CS@CU Digital Signature Example: How can we flip a coin over the phone? CS@CU Digital Signature Example: How can we flip a coin over the phone? The math behind this is simple. The key is to find a function that is easy to compute but whose inverse is tough! CS@CU Digital Signatures Function / Inverse-Function pairs like this are a primary tool in modern public key cryptography. CS@CU Digital Signatures Function / Inverse-Function pairs like this are a primary tool in modern public key cryptography. Examples like these can be used to motivate the study of functions and inverses in high school algebra! CS@CU Error Detection and Correction Often noise corrupts digital communication. This can be due to all kinds of natural or unnatural sources. CS@CU Error Detection and Correction Often noise corrupts digital communication. This can be due to all kinds of natural or unnatural sources. How can I know that the message I received is the message you sent? CS@CU Error Checking and Correction Techniques like these are used on everything from internet message transmissions to credit card fraud detection. CS@CU Games and Puzzles That Teach These activities can be challenging and a lot of fun They stimulate curiosity They are relevant to everyday life in today’s world. Will your students respond to these? CS@CU Want to learn more? Check out CS Unplugged at: http://csunplugged.org If you do choose to use any activities like these, I would love to hear your feedback. cannon@cs.columbia.edu Thanks! CS@CU