Cryptography Applied to Linear Functions

advertisement
Cryptography Applied to
Linear Functions
Louena L. Manluctao
East Early College High School
Houston Independent School District
Dr. Guofei Gu
Assistant Professor
College of Computer Science and
Engineering
Texas A & M University
Roadmap
• Introduction
•
•
•
•
- Bridging Research to Lesson
- STAAR/TEKS Objective
The Classroom Project
Samples of Pre-Test/Post-Test
Acknowledgements
Q&A
Research Interest
•Network and system security such as
Internet malware detection, defense,
and analysis
• Intrusion detection, anomaly detection
• Network security
• Web and social networking security
Relevance of the Research
• http://www.youtube.com/watch?v=Mh1tf
KyC-bY
Sony Pictures hacked by Luiz Security,
1,000,000 passwords claimed stolen
(update)
http://consumerist.com/2011/06/how-hackers-stole-200000-citiaccounts-by-exploiting-basic-browser-vulnerability.html
Bridging Research to Lesson in
Algebra 1
Research Lab
Cryptography
Probability and Statistics
Number Theory
Abstract Algebra
Programming
Algebra 1
Linear
Functions
and Sequences
STAAR/TEKS OBJECTIVES
A1.3
& A1.4 (C) Linear Functions:
(A) use symbols to represent unknowns and
variables; and
(B) look for patterns and represent eneralizations
algebraically.
(C)
connect equation notation with function
notation, such as y = x + 1 and f(x) = x + 1.
STAAR/TEKS OBJECTIVE
(7) Linear functions. The student
formulates equations and inequalities
based on linear functions,
(A) analyze situations involving linear
functions and formulate linear equations
or inequalities to solve problems;
THE CLASSROOM PROJECT :
CRYPTOGRAPHY APPLIED TO LINEAR
FUNCTION
• Day 1:
• Pre-Test
• Hook
• Power Point Presentation on Computer
Network Security and Cryptography
• Explain ( How to encrypt and decrypt)
• Worksheets on finding the function key
HOOK
• Find the sum of 5 sets of 4-digit numbers
without using the calculator.
• I am texting this message, -4, -13, 2, -22,
-1, -46, -46, -73
what do you think is it?
• Do you think your computers are safe
from cyber attack in your own homes?
Power Point on Cryptography
• What is cryptography?
• Different Kinds of Cryptography
• How to Encrypt and Decrypt
Encrypt/Decrypt
Finding The Key (Linear Equation)
• The key will be the equation from a given
sequence:
• Consider: 3, 6, 9, 12, 15
5,9,13,17,21
9,7,5,3,1,-1
-3,3,9,15,21
Cont.
• The common difference is the multiplier of
n (the position of the term)
• To find out what should be added or
subtracted, find the zero term
• We are now going to develop a formula
• First let us define our variables:
• T = the nth term
z = the zero term
• d= the common difference
• n = position in the sequence
Cont.
Sequence
Difference
of terms
Difference
Multiplied by
Position n
The zero
The
term
Equation
(1st term-d)
3,6,9,12,15
3
3n
3-3=0
T = 3n+0
5,9,13,17,21
4
4n
5-4=1
T = 4n+1
9,7,5,3,1,-1
-2
-2n
9—2=11
T = -2n+11
-3,3,9,15,21
6
6n
-3-6=-9
T = 6n - 9
The equation is T = dn + z or
y = mx + b
Write an equation to describe
the following sequences
1. 9, 8, 7, 6, 5
2. 13, 17 , 21, 25, 29
3. 6, 11, 16, 21, 26
4. 112, 100, 88, 76
Day 2:
• Review of Previous Lesson
• Discussion of Finding the Inverse of the
equation of the line.
• Decoding Activity
• Post-Test
To Find the Inverse of an
Equation
• Exchange x and y
• Solve for y in terms of x
Ex. Y = 3x
x = 3y
x/3 = y
Find the inverse of the following
equations
• 1.
• 2.
• 3.
• 4.
y
y
y
y
=
=
=
=
3x + 5
-2x -4
4x – 6
3/4x + 2
The Decoding Activity
• Students will be grouped by two’s
• Each pair will be given a sequence where
they will need to find the key.
• Use the key to find the encrypted code
• Decipher using inverse equation.
• Use : Space = 0 ; A = 1; B=2; C=3…Z=26
• Give the message.
What is the text message?
-4, -13, 2, -22, -1, -46, -46, -73
• Key: -1, -4, -7, -10, . . .
• What is the encrypted key? y = -3x+2
• What is the decrypted key? Y = -(x-2)/3
• What is the deciphered message?
2, 5 , 0, 8, 1, 16, 16, 25
Plaintext message is:
BE HAPPY
Decoding Activity: What is the message?
• -21 3 -35 -11 5 -13 -33 5 - 37 -33 -5 -7 -37 -15
•
5 3 -23 -3 5 -7 -37 -23
KEY: 3, 1, -1, -3, …
• What is the encrypted key? ( y = mx+b)
•
•
•
•
___________________
What is the decrypted key? ________
What is the deciphered message?__________
Remember : Space = 0 A = 1 B =2 C =3…
Z = 26
Plaintext Message:
_________________________________
Assessment: Pre-Test/Post Test
Sample Questions
1. The nth term of a sequence is defined
to be 3n +7. The 35th term is how much
less than the 39th term?
A)4
B) 12 C) 19
D) 33
2. Given the sequence -5, -2, 1, 4 … which
equation best represents the sequence?
A) y =3x-5
C) y = 3x-8
B) y = -3x-5
D) y = -3x-8
Acknowledgements
Dr. Robin Autenrieth, Dr. Cheryl Page, Dr. Arun Srinivasa
Matthew Pariyothorn, Ashwin Rao, Roberto Dimaliwat,
Stephen Hudson
Dr. Guofei Gu, Chao Yang,
Jialong Zhang , Wilber Rivas
Question and Answer
Thanks to Chao Yang’s Presentation
Download