Course 6 Number Theory & Cryptology

advertisement
Course 6: Number Theory and Cryptology for Middle-Level Teachers
Graduate Credit Hours: 3
Usual Delivery Format: On-site summer course. Designed to be completed in one
week, meeting M – F from 8:00 – 5:00 (with one hour break for lunch).
Texts/Materials:
1. Course notebook containing handouts and problems (see Course Notebook
section )
2. The Mathematical Universe, by William W. Dunham; Chapters A, F and P are
assigned as readings.
3. NOVA movies N is a Number, The Proof, and Decoding Nazi Secrets
Description: This course focuses on basic number theory results which are needed to
understand the number theoretic RSA cryptography algorithm (an encryption algorithm
which is in use today to secure information sent via the internet). As the number theory
results are developed, connections to middle level curricula are emphasized and proofs
are carefully selected so that those which are included in the course are particularly
relevant and accessible to middle level teachers. This portion of the course promotes a
deep understanding of the integers and their properties in connection with the operations
of multiplication and division. Elementary ciphers (methods for encoding and decoding)
are included to introduce the nature of cryptology in preparation for understanding the
RSA method. The cryptology related activities are readily adaptable as enrichment
activities for middle level students. The connection of number theory to the RSA
encryption algorithm allows the participants to see and understand a very relevant, realworld application of mathematics.
Course Goals: The goals of the course are to introduce the teacher participants to: (1)
the basic results of elementary number theory, (2) the rigor of mathematical definitions,
reasoning and proof, (3) the application of number theory to cryptology, (4) and the
connections between Number Theory and the middle school curriculum.
Topics:
Day Topics
1
Course Introduction
Section 1: Integers and Divisibility
Section 2: Primes and Factorization
2
Introduction to Cryptology (substitution and transposition ciphers)
Section 3: Linear Diophantine Equations
3
Section 4: Congruence
Section 5: Linear Congruence Equations
4
Section 6: Fermat’s and Wilson’s Theorems
Section 7: Euler Phi-Function
5
Other Number Bases
RSA Public Key Cryptography
References:
1. Dudley, Underwood, Elementary Number Theory, Second Edition, W. H.
Freeman and Company, 1978.
2. Walker, Judy (University of Nebraska – Lincoln), The Joy of Numbers
Instructional Style: The course is designed in an interactive-lecture style (similar to a
Socratic method) with problem sessions, examples and activities designed for cooperative
groups distributed consistently throughout.
Download