Canonical Forms Some questions to be explored by high school investigators William J. Martin, WPI

Size: px
Start display at page:

Download "Canonical Forms Some questions to be explored by high school investigators William J. Martin, WPI"

Transcription

1 MME 529 June 2017 Canonical Forms Some questions to be explored by high school investigators William J. Martin, WPI Here are some exercises based on various ideas of canonical form in mathematics. Perhaps a few can be used with students. I think we subconsciously use canonical forms in many parts of mathematics, mainly as a sort of language tool. In order to communicate with one another, we must agree to write things in the same way, as we agree on spelling conventions. Rational numbers are written with relatively prime numerator and denominator, with the denominator always positive; algebraic numbers never have square roots in their denominators; integers in modular arithmetic are always reduced to their smallest non-negative remainder; etc. But the importance of canonical forms can be lost if we simply view them as notational conventions. The more important point is that canonical forms give us algorithms to determine if two mathematical objects are the same. If two students have fractions such as 105/35 and 51/( 17), one way to have them determine if the numbers are equal is to ask each student to reduce their fraction: they will both arrive at 3/1 and will immediately see that they are equal. We also do this if we are comparing f(x) = x 3 13x+12 against g(x) = (x 3)(x 1)(x+4) or h(x) = (x + 4)(x 2 + 2x 3). Expanding the three polynomials and writing them each in the canonical form a 3 x 3 + a 2 x 2 + a 1 x + a 0, we may quickly check which two are equal. Analogously, suppose you and your friend are trying to locate one another on a busy summer day at Quincy Market in Boston. Supppose you are just a few hundred yards away from one another and are in touch via cell phone. She might say she is next to the T-shirt salesman and you might say that she can easily find you next to the busker. One way to meet up is to agree that both of you will go to the Sam Adams statue just west of Faneuil Hall. There is exactly one Sam Adams statue and you can both find it easily. Isn t that sort of what reducing fractions is like? Rather than either one of you finding the other, you agree to move to an agreed-upon location. With this in mind, here is a worksheet about canonical forms in arithmetic, linear algebra, number theory (with a brief excursion into an easy-to-explain cryptosystem), graph theory and knot theory. 1 Not so hard Write these numbers in standard form: 1. a = b =

2 7 3. c = 3 2 In each case, two of the three numbers are equal; reduce to some canonical form to determine which two. 4. a = 18 12, A = 24 9, α = b = , B = , β = / c = 3 C = σ = In arithmetic modulo 12, write the result of each computation in canonical form (i.e., using only one of 0, 1,..., 11): ( 7 3) + ( 5 5) The next few problems involve planes and lines in three-space. 10. Show that the parametric system {(x, y, z) x = 2s 4t, y = s + 4t, z = s t for some s, t R} describes the same plane as {(x, y, z) x + 2y + 4z = 0} 11. The equations 7x 2y + 13z = 0 and 14x + 4y 26z = 0 describe the same plane since the two normal vectors are parallel: [ 7, 2, 13] = 1 [14, 4, 26]. 2 So which among these equations describe the same plane? 12. How about these? 4x 6y 10z = 0, 2x + 3z = 5y, 5z = 2x 3y. 2 3 x + 5y 5 3 z = 4, 2 3 x + 5y = z, 3y z 2 = 2 (x + 1) Given are three systems of two equations, each system aligned vertically. Use the reduced row echelon form (rref) button on a calculator to determine which two of these systems describe the same line through the origin in R 3 : x + y + z = 0, 2x y + 8z = 0, x + 3z = 0 2x + 4y 2z = 0, 3x + 2y 8z = 0, y 2z = 0 2

3 14. Suppose we are now given descriptions of three lines in R 3 l 1 : 3x + 2y z = 5, x y + 5z = 18 ; l 2 : 2x + 2y 11z = 45, 7x + 4y = 20 ; l 3 : 3x + 2y z = 5, x + 2z = 10. (Sorry now the pairs of equations describing each line are aligned horizontally.) Two of these three systems describe exactly the same line. Which two? 2 A Simple Cryptosystem Alice and Bob agree on a secret modulus m and send only messages in the number system R = {0, 1, 2, 3,..., m 1} Their algorithms are as follows. Encrypt: To encrypt message x R, generate a random integer k and send ciphertext c = x + km Decrypt: To decrypt ciphertext c, reduce modulo the secret m to find the unique x in R with x = c (i.e., x c mod m ) Now suppose that Alice encrypts x = 5 as c = 2007 and encrypts x = 8 as c = 190. What can you say about her secret integer m? If you also know that Alice could encrypt x = 3 as c = 725 and x = 2 as c = 2290, can you decipher this message?: 129, 223, 109, 85, 249, 280, 347, 32 How would you attack Alice s system if you knew none of her messages, but only a sequence of millions of ciphertexts? 3 Hard 1. Almost all equations (in variables x and y) of the form Ax 2 + Bxy + Cy 2 + Dx + Ey + F = 0 are conic sections the shape of the solution set is obtained by intersecting some plane with the cone x 2 + y 2 = z 2. But not all of them have this form.for what values of A, B, C, D, E, F is the solution set not of such shape? 2. The six diagrams in Figure 2 represent only three distinct graphs up to isomorphism. Which ones are equivalent? 3. Use Read s canonization method to reduce each of the 12 trees in Figure 3 to canonical form. Are they all different? 3

4 4. Carefully write down the sequence of Reidemeister moves (see below) that reduce the first knot diagram in Figure 4 to the second one. (The second one is the right-handed trefoil.) 5. Can you find a short sequence of Reidemeister moves that transform the knot diagram in Figure 5 into the unknot (a simple loop, or O, in three-space)? 6. Research the unknotting problem, starting with the introduction on wikipedia. 4 Read s Canonical Form for Trees Ron Read s naming convention for trees is described in Wikipedia (see canonization). The algorithm gives a name to each tree in such a way that two trees receive the same name if and only if they are isomorphic (i.e., are drawings of the same tree). This name is a very long string of zeros and ones. To understand the algorithm, you need to know a few pieces of terminology. The empty string ε is the unique string of length zero. With the convention that 0 comes before 1 in our alphabet of two letters, we can put all strings in lexicographic order (dictionary order). For strings of length four or less, this order is ε < 0 < 00 < 000 < 0000 < 0001 < 001 < 0010 < 0011 < 01 < 010 < 0100 < 0101 < 011 < 0110 < 0111 < 1 < 10 < 100 < 1000 < 1001 < 101 < 1010 < 1011 < 11 < 110 < 1100 < 1101 < 111 < 1110 < 1111 Next we learn to concatenate strings by just gluing them one after the other. For example, the concatenation of ε, 0011 and 01 (in that order) is (since the empty string becomes invisible). In a graph, two vertices are adjacent if they are joined by an edge. A leaf in a tree is a vertex which is adjacent to only one other vertex. We begin building our name by labelling every node in the tree with the string 01. Then we keep repeating the following step until only one or two nodes remain: choose any non-leaf vertex; call it v. Delete the leading 0 and trailing 1 from the current label of v. Then build the list of this label and the labels of all leaves adjacent to v. (This is really boring if v is not adjacent to any leaves; so don t choose such a v.) Sort this list in lexicographic order. Now concatenate all labels in the sorted list, add a 0 to the front of this long string and tag a 1 onto the end of it. Make this the new label for node v and delete all leaves adjacent to v. Choosing v appropriately, this reduces the number of vertices by one or more in each step. If we reach a graph with only one vertex, we take the label of this vertex as the name of the original tree. If we end with two adjacent vertices, we put their labels in lexicographic order, concatenate these and take this concatenated string as the name of our tree. Read proved that two trees get the same name if and only if they are isomorphic. (What can you learn about a tree from seeing only its name?) 4

5 5 Knots and Reidemeister Moves A knot is a drawing of a circle in 3-space; i.e., a continuous one-to-one function from the unit circle to R 3. (To be precise, we should rule out wild knots by making our function piecewise linear.) Knots are represented by knot diagrams which are drawings in the plane with each crossing clearly indicating which of two strands is on top and which is underneath. The same knot can be drawn in infinitely many different ways via knot diagrams, but we say that all these diagrams are equivalent. In general, it is extremely hard to determine if two knot diagrams are equivalent, or even to decide if a knot diagram is a drawing of the unknot O. In 1927, Kurt Reidemeister proved that if two diagrams are diagrams of the same knot, then there are three simple diagram manipulations that can be used to transform one into the other. (If you are familiar with linear algebra, liken these to the three basic row operations on a matrix.) These Reidemeister moves are Type I: creating or removing a loop Type II: sliding one strand across another or sliding them apart Type III: sliding a strand across a crossing of two other strands and are depicted in Figure 1. These are explained further on websites such as wikipedia. Reidemeister s amazing theorem is that two diagrams are diagrams of the same knot if and only if! one can be transformed into the other by a finite sequence of Reidemeister moves. But unfortunately, no one has ever found a canonical form for knot diagrams, so we still do not know how to carry out these Reidemeister moves to efficiently demonstrate such an equivalence. 5

6 Figure 1: The three Reidemeister moves for transforming knot diagrams. Figure 2: Six graphs on 10 vertices, but really only three different ones. 6

7 Figure 3: Twelve trees on 7 vertices. Figure 4: Two knot diagrams. 7

8 Figure 5: Can you untie this knot using Reidemeister moves? 8

SKILL BUILDER TEN. Graphs of Linear Equations with Two Variables. If x = 2 then y = = = 7 and (2, 7) is a solution.

SKILL BUILDER TEN. Graphs of Linear Equations with Two Variables. If x = 2 then y = = = 7 and (2, 7) is a solution. SKILL BUILDER TEN Graphs of Linear Equations with Two Variables A first degree equation is called a linear equation, since its graph is a straight line. In a linear equation, each term is a constant or

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 10 February 19, 2013 CPSC 467b, Lecture 10 1/45 Primality Tests Strong primality tests Weak tests of compositeness Reformulation

More information

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 13 (rev. 2) Professor M. J. Fischer October 22, 2008 53 Chinese Remainder Theorem Lecture Notes 13 We

More information

10 Modular Arithmetic and Cryptography

10 Modular Arithmetic and Cryptography 10 Modular Arithmetic and Cryptography 10.1 Encryption and Decryption Encryption is used to send messages secretly. The sender has a message or plaintext. Encryption by the sender takes the plaintext and

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 9 February 6, 2012 CPSC 467b, Lecture 9 1/53 Euler s Theorem Generating RSA Modulus Finding primes by guess and check Density of

More information

Cryptography. P. Danziger. Transmit...Bob...

Cryptography. P. Danziger. Transmit...Bob... 10.4 Cryptography P. Danziger 1 Cipher Schemes A cryptographic scheme is an example of a code. The special requirement is that the encoded message be difficult to retrieve without some special piece of

More information

8 Elliptic Curve Cryptography

8 Elliptic Curve Cryptography 8 Elliptic Curve Cryptography 8.1 Elliptic Curves over a Finite Field For the purposes of cryptography, we want to consider an elliptic curve defined over a finite field F p = Z/pZ for p a prime. Given

More information

Public Key Cryptography

Public Key Cryptography Public Key Cryptography Spotlight on Science J. Robert Buchanan Department of Mathematics 2011 What is Cryptography? cryptography: study of methods for sending messages in a form that only be understood

More information

6. ELLIPTIC CURVE CRYPTOGRAPHY (ECC)

6. ELLIPTIC CURVE CRYPTOGRAPHY (ECC) 6. ELLIPTIC CURVE CRYPTOGRAPHY (ECC) 6.0 Introduction Elliptic curve cryptography (ECC) is the application of elliptic curve in the field of cryptography.basically a form of PKC which applies over the

More information

Number theory (Chapter 4)

Number theory (Chapter 4) EECS 203 Spring 2016 Lecture 12 Page 1 of 8 Number theory (Chapter 4) Review Compute 6 11 mod 13 in an efficient way What is the prime factorization of 100? 138? What is gcd(100, 138)? What is lcm(100,138)?

More information

1 What is the area model for multiplication?

1 What is the area model for multiplication? for multiplication represents a lovely way to view the distribution property the real number exhibit. This property is the link between addition and multiplication. 1 1 What is the area model for multiplication?

More information

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2 Contents 1 Recommended Reading 1 2 Public Key/Private Key Cryptography 1 2.1 Overview............................................. 1 2.2 RSA Algorithm.......................................... 2 3 A Number

More information

The Laws of Cryptography Zero-Knowledge Protocols

The Laws of Cryptography Zero-Knowledge Protocols 26 The Laws of Cryptography Zero-Knowledge Protocols 26.1 The Classes NP and NP-complete. 26.2 Zero-Knowledge Proofs. 26.3 Hamiltonian Cycles. An NP-complete problem known as the Hamiltonian Cycle Problem

More information

Public-key Cryptography and elliptic curves

Public-key Cryptography and elliptic curves Public-key Cryptography and elliptic curves Dan Nichols nichols@math.umass.edu University of Massachusetts Oct. 14, 2015 Cryptography basics Cryptography is the study of secure communications. Here are

More information

Lecture Notes, Week 6

Lecture Notes, Week 6 YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Week 6 (rev. 3) Professor M. J. Fischer February 15 & 17, 2005 1 RSA Security Lecture Notes, Week 6 Several

More information

MATH 158 FINAL EXAM 20 DECEMBER 2016

MATH 158 FINAL EXAM 20 DECEMBER 2016 MATH 158 FINAL EXAM 20 DECEMBER 2016 Name : The exam is double-sided. Make sure to read both sides of each page. The time limit is three hours. No calculators are permitted. You are permitted one page

More information

RSA RSA public key cryptosystem

RSA RSA public key cryptosystem RSA 1 RSA As we have seen, the security of most cipher systems rests on the users keeping secret a special key, for anyone possessing the key can encrypt and/or decrypt the messages sent between them.

More information

Elliptic Curve Computations (1) View the graph and an elliptic curve Graph the elliptic curve y 2 = x 3 x over the real number field R.

Elliptic Curve Computations (1) View the graph and an elliptic curve Graph the elliptic curve y 2 = x 3 x over the real number field R. Elliptic Curve Computations (1) View the graph and an elliptic curve Graph the elliptic curve y 2 = x 3 x over the real number field R. >> v = y^2 - x*(x-1)*(x+1) v = y^2 - x*(x-1)*(x+1) >> ezplot(v, [-1,3,-5,5])

More information

North Carolina State University

North Carolina State University North Carolina State University MA 141 Course Text Calculus I by Brenda Burns-Williams and Elizabeth Dempster August 7, 2014 Section1 Functions Introduction In this section, we will define the mathematical

More information

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution CS 70 Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution 1. Polynomial intersections Find (and prove) an upper-bound on the number of times two distinct degree

More information

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups

More information

The Roots of Higher Mathematics Computing Square Roots and the Rabin Cryptosystem William J. Martin, WPI

The Roots of Higher Mathematics Computing Square Roots and the Rabin Cryptosystem William J. Martin, WPI The Roots of Higher Mathematics Computing Square Roots and the Rabin Cryptosystem William J. Martin, WPI Abstract: We explore thought experiments dealing with the computation of square roots in various

More information

Projects in Geometry for High School Students

Projects in Geometry for High School Students Projects in Geometry for High School Students Goal: Our goal in more detail will be expressed on the next page. Our journey will force us to understand plane and three-dimensional geometry. We will take

More information

Exam Security January 19, :30 11:30

Exam Security January 19, :30 11:30 Exam Security January 19, 2016. 8:30 11:30 You can score a maximum of 100. Each question indicates how many it is worth. You are NOT allowed to use books or notes, or a (smart) phone. You may answer in

More information

Elliptic Curves. Giulia Mauri. Politecnico di Milano website:

Elliptic Curves. Giulia Mauri. Politecnico di Milano   website: Elliptic Curves Giulia Mauri Politecnico di Milano email: giulia.mauri@polimi.it website: http://home.deib.polimi.it/gmauri May 13, 2015 Giulia Mauri (DEIB) Exercises May 13, 2015 1 / 34 Overview 1 Elliptic

More information

One can use elliptic curves to factor integers, although probably not RSA moduli.

One can use elliptic curves to factor integers, although probably not RSA moduli. Elliptic Curves Elliptic curves are groups created by defining a binary operation (addition) on the points of the graph of certain polynomial equations in two variables. These groups have several properties

More information

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment. CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES A selection of the following questions will be chosen by the lecturer to form the Cryptology Assignment. The Cryptology Assignment is due by 5pm Sunday 1

More information

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used. UNIVERSITY OF EAST ANGLIA School of Mathematics May/June UG Examination 2010 2011 CRYPTOGRAPHY Time allowed: 2 hours Attempt THREE questions. Candidates must show on each answer book the type of calculator

More information

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups

More information

Pure Math 30: Explained! 81

Pure Math 30: Explained!   81 4 www.puremath30.com 81 Part I: General Form General Form of a Conic: Ax + Cy + Dx + Ey + F = 0 A & C are useful in finding out which conic is produced: A = C Circle AC > 0 Ellipse A or C = 0 Parabola

More information

Introduction to Elliptic Curve Cryptography. Anupam Datta

Introduction to Elliptic Curve Cryptography. Anupam Datta Introduction to Elliptic Curve Cryptography Anupam Datta 18-733 Elliptic Curve Cryptography Public Key Cryptosystem Duality between Elliptic Curve Cryptography and Discrete Log Based Cryptography Groups

More information

ALGEBRA 2 Summer Review Assignments Graphing

ALGEBRA 2 Summer Review Assignments Graphing ALGEBRA 2 Summer Review Assignments Graphing To be prepared for algebra two, and all subsequent math courses, you need to be able to accurately and efficiently find the slope of any line, be able to write

More information

. As x gets really large, the last terms drops off and f(x) ½x

. As x gets really large, the last terms drops off and f(x) ½x Pre-AP Algebra 2 Unit 8 -Lesson 3 End behavior of rational functions Objectives: Students will be able to: Determine end behavior by dividing and seeing what terms drop out as x Know that there will be

More information

Jane and Joe are measuring the circumference of a dime with a string. Jane' s result is: 55 mm Joe's result is: 58 mm

Jane and Joe are measuring the circumference of a dime with a string. Jane' s result is: 55 mm Joe's result is: 58 mm A LESSON ON ABSOLUTE VALUE Jane and Joe are measuring the circumference of a dime with a string. Jane' s result is: 55 mm Joe's result is: 58 mm Tom knows the true length of the circumference: 56 mm. He

More information

Encryption: The RSA Public Key Cipher

Encryption: The RSA Public Key Cipher Encryption: The RSA Public Key Cipher Michael Brockway March 5, 2018 Overview Transport-layer security employs an asymmetric public cryptosystem to allow two parties (usually a client application and a

More information

Public Key Encryption

Public Key Encryption Public Key Encryption KG October 17, 2017 Contents 1 Introduction 1 2 Public Key Encryption 2 3 Schemes Based on Diffie-Hellman 3 3.1 ElGamal.................................... 5 4 RSA 7 4.1 Preliminaries.................................

More information

Chapter 8B - Trigonometric Functions (the first part)

Chapter 8B - Trigonometric Functions (the first part) Fry Texas A&M University! Spring 2016! Math 150 Notes! Section 8B-I! Page 79 Chapter 8B - Trigonometric Functions (the first part) Recall from geometry that if 2 corresponding triangles have 2 angles of

More information

f(x) x

f(x) x 2 Function 2.1 Function notation The equation f(x) = x 2 + 3 defines a function f from the set R of real numbers to itself (written f : R R). This function accepts an input value x and returns an output

More information

MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY

MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY In this meeting we go through the foundations of modular arithmetic. Before the meeting it is assumed that you have watched the videos and worked

More information

MODULAR ARITHMETIC KEITH CONRAD

MODULAR ARITHMETIC KEITH CONRAD MODULAR ARITHMETIC KEITH CONRAD. Introduction We will define the notion of congruent integers (with respect to a modulus) and develop some basic ideas of modular arithmetic. Applications of modular arithmetic

More information

Homework 4 for Modular Arithmetic: The RSA Cipher

Homework 4 for Modular Arithmetic: The RSA Cipher Homework 4 for Modular Arithmetic: The RSA Cipher Gregory V. Bard April 25, 2018 This is a practice workbook for the RSA cipher. It is not suitable for learning the RSA cipher from scratch. However, there

More information

Theory of Computation Chapter 12: Cryptography

Theory of Computation Chapter 12: Cryptography Theory of Computation Chapter 12: Cryptography Guan-Shieng Huang Dec. 20, 2006 0-0 Introduction Alice wants to communicate with Bob secretely. x Alice Bob John Alice y=e(e,x) y Bob y??? John Assumption

More information

What is proof? Lesson 1

What is proof? Lesson 1 What is proof? Lesson The topic for this Math Explorer Club is mathematical proof. In this post we will go over what was covered in the first session. The word proof is a normal English word that you might

More information

Background: Lattices and the Learning-with-Errors problem

Background: Lattices and the Learning-with-Errors problem Background: Lattices and the Learning-with-Errors problem China Summer School on Lattices and Cryptography, June 2014 Starting Point: Linear Equations Easy to solve a linear system of equations A s = b

More information

2. If the values for f(x) can be made as close as we like to L by choosing arbitrarily large. lim

2. If the values for f(x) can be made as close as we like to L by choosing arbitrarily large. lim Limits at Infinity and Horizontal Asymptotes As we prepare to practice graphing functions, we should consider one last piece of information about a function that will be helpful in drawing its graph the

More information

Functions. If x 2 D, then g(x) 2 T is the object that g assigns to x. Writing the symbols. g : D! T

Functions. If x 2 D, then g(x) 2 T is the object that g assigns to x. Writing the symbols. g : D! T Functions This is the second of three chapters that are meant primarily as a review of Math 1050. We will move quickly through this material. A function is a way of describing a relationship between two

More information

Answers for Calculus Review (Extrema and Concavity)

Answers for Calculus Review (Extrema and Concavity) Answers for Calculus Review 4.1-4.4 (Extrema and Concavity) 1. A critical number is a value of the independent variable (a/k/a x) in the domain of the function at which the derivative is zero or undefined.

More information

Unit 1 Lesson 6: Seeing Structure in Expressions

Unit 1 Lesson 6: Seeing Structure in Expressions Unit 1 Lesson 6: Seeing Structure in Expressions Objective: Students will be able to use inductive reasoning to try to solve problems that are puzzle like in nature. CCSS: A.SSE.1.b, A.SSE.2 Example Problems

More information

Learning Packet. Lesson 5b Solving Quadratic Equations THIS BOX FOR INSTRUCTOR GRADING USE ONLY

Learning Packet. Lesson 5b Solving Quadratic Equations THIS BOX FOR INSTRUCTOR GRADING USE ONLY Learning Packet Student Name Due Date Class Time/Day Submission Date THIS BOX FOR INSTRUCTOR GRADING USE ONLY Mini-Lesson is complete and information presented is as found on media links (0 5 pts) Comments:

More information

Lecture 22: RSA Encryption. RSA Encryption

Lecture 22: RSA Encryption. RSA Encryption Lecture 22: Recall: RSA Assumption We pick two primes uniformly and independently at random p, q $ P n We define N = p q We shall work over the group (Z N, ), where Z N is the set of all natural numbers

More information

9 Knapsack Cryptography

9 Knapsack Cryptography 9 Knapsack Cryptography In the past four weeks, we ve discussed public-key encryption systems that depend on various problems that we believe to be hard: prime factorization, the discrete logarithm, and

More information

For your quiz in recitation this week, refer to these exercise generators:

For your quiz in recitation this week, refer to these exercise generators: Monday, Oct 29 Today we will talk about inverses in modular arithmetic, and the use of inverses to solve linear congruences. For your quiz in recitation this week, refer to these exercise generators: GCD

More information

Cryptography and Number Theory

Cryptography and Number Theory Chapter 2 Cryptography and Number Theory 2.1 Cryptography and Modular Arithmetic 2.1.1 Introduction to Cryptography For thousands of years people have searched for ways to send messages in secret. For

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 33 The Diffie-Hellman Problem

More information

Cryptography. pieces from work by Gordon Royle

Cryptography. pieces from work by Gordon Royle Cryptography pieces from work by Gordon Royle The set-up Cryptography is the mathematics of devising secure communication systems, whereas cryptanalysis is the mathematics of breaking such systems. We

More information

Continuing discussion of CRC s, especially looking at two-bit errors

Continuing discussion of CRC s, especially looking at two-bit errors Continuing discussion of CRC s, especially looking at two-bit errors The definition of primitive binary polynomials Brute force checking for primitivity A theorem giving a better test for primitivity Fast

More information

Answers. 2. List all theoretically possible rational roots of the polynomial: P(x) = 2x + 3x + 10x + 14x ) = A( x 4 + 3x 2 4)

Answers. 2. List all theoretically possible rational roots of the polynomial: P(x) = 2x + 3x + 10x + 14x ) = A( x 4 + 3x 2 4) CHAPTER 5 QUIZ Tuesday, April 1, 008 Answers 5 4 1. P(x) = x + x + 10x + 14x 5 a. The degree of polynomial P is 5 and P must have 5 zeros (roots). b. The y-intercept of the graph of P is (0, 5). The number

More information

MATH3302 Cryptography Problem Set 2

MATH3302 Cryptography Problem Set 2 MATH3302 Cryptography Problem Set 2 These questions are based on the material in Section 4: Shannon s Theory, Section 5: Modern Cryptography, Section 6: The Data Encryption Standard, Section 7: International

More information

Classical Cryptography

Classical Cryptography Classical Cryptography CSG 252 Fall 2006 Riccardo Pucella Goals of Cryptography Alice wants to send message X to Bob Oscar is on the wire, listening to communications Alice and Bob share a key K Alice

More information

The RSA public encryption scheme: How I learned to stop worrying and love buying stuff online

The RSA public encryption scheme: How I learned to stop worrying and love buying stuff online The RSA public encryption scheme: How I learned to stop worrying and love buying stuff online Anthony Várilly-Alvarado Rice University Mathematics Leadership Institute, June 2010 Our Goal Today I will

More information

Math 299 Supplement: Modular Arithmetic Nov 8, 2013

Math 299 Supplement: Modular Arithmetic Nov 8, 2013 Math 299 Supplement: Modular Arithmetic Nov 8, 2013 Numbers modulo n. We have previously seen examples of clock arithmetic, an algebraic system with only finitely many numbers. In this lecture, we make

More information

Discrete Mathematics and Probability Theory Summer 2014 James Cook Midterm 1 (Version B)

Discrete Mathematics and Probability Theory Summer 2014 James Cook Midterm 1 (Version B) CS 70 Discrete Mathematics and Probability Theory Summer 2014 James Cook Midterm 1 (Version B) Instructions: Do not turn over this page until the proctor tells you to. Don t write any answers on the backs

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 18 November 6, 2017 CPSC 467, Lecture 18 1/52 Authentication While Preventing Impersonation Challenge-response authentication protocols

More information

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other.

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other. Public Key Cryptography All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other. The thing that is common among all of them is that each

More information

Math 90 Lecture Notes Chapter 1

Math 90 Lecture Notes Chapter 1 Math 90 Lecture Notes Chapter 1 Section 1.1: Introduction to Algebra This textbook stresses Problem Solving! Solving problems is one of the main goals of mathematics. Think of mathematics as a language,

More information

Finite Mathematics : A Business Approach

Finite Mathematics : A Business Approach Finite Mathematics : A Business Approach Dr. Brian Travers and Prof. James Lampes Second Edition Cover Art by Stephanie Oxenford Additional Editing by John Gambino Contents What You Should Already Know

More information

University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009)

University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009) Make sure that this examination has 10 numbered pages University of Regina Department of Mathematics & Statistics Final Examination 200910 (April 21, 2009) Mathematics 124 The Art and Science of Secret

More information

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m. Final Exam Math 10: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 0 April 2002 :0 11:00 a.m. Instructions: Please be as neat as possible (use a pencil), and show

More information

ELLIPTIC CURVES BJORN POONEN

ELLIPTIC CURVES BJORN POONEN ELLIPTIC CURVES BJORN POONEN 1. Introduction The theme of this lecture is to show how geometry can be used to understand the rational number solutions to a polynomial equation. We will illustrate this

More information

Math 308 Midterm Answers and Comments July 18, Part A. Short answer questions

Math 308 Midterm Answers and Comments July 18, Part A. Short answer questions Math 308 Midterm Answers and Comments July 18, 2011 Part A. Short answer questions (1) Compute the determinant of the matrix a 3 3 1 1 2. 1 a 3 The determinant is 2a 2 12. Comments: Everyone seemed to

More information

Solving Equations Quick Reference

Solving Equations Quick Reference Solving Equations Quick Reference Integer Rules Addition: If the signs are the same, add the numbers and keep the sign. If the signs are different, subtract the numbers and keep the sign of the number

More information

Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks

Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks 1 Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks Michael Albert michael.albert@cs.otago.ac.nz 2 This week Arithmetic Knapsack cryptosystems Attacks on knapsacks Some

More information

1/ 17 2/20 3/19 4/12 5/14 6/13 7/10 Total /105. Please do not write in the spaces above.

1/ 17 2/20 3/19 4/12 5/14 6/13 7/10 Total /105. Please do not write in the spaces above. 1/ 17 2/20 3/19 4/12 5/14 6/13 7/10 Total /105 % Please do not write in the spaces above. Directions: You have 50 minutes in which to complete this exam. Please make sure that you read through this entire

More information

1 Introduction. 2 Solving Linear Equations

1 Introduction. 2 Solving Linear Equations 1 Introduction This essay introduces some new sets of numbers. Up to now, the only sets of numbers (algebraic systems) we know is the set Z of integers with the two operations + and and the system R of

More information

Discrete Mathematics GCD, LCM, RSA Algorithm

Discrete Mathematics GCD, LCM, RSA Algorithm Discrete Mathematics GCD, LCM, RSA Algorithm Abdul Hameed http://informationtechnology.pk/pucit abdul.hameed@pucit.edu.pk Lecture 16 Greatest Common Divisor 2 Greatest common divisor The greatest common

More information

The Hill Cipher A Linear Algebra Perspective

The Hill Cipher A Linear Algebra Perspective The Hill Cipher A Linear Algebra Perspective Contents 1 Introduction to Classical Cryptography 3 1.1 Alice, Bob & Eve................................. 3 1.2 Types of Attacks.................................

More information

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems CPE 776:DATA SECURITY & CRYPTOGRAPHY Some Number Theory and Classical Crypto Systems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Some Number Theory

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 3 January 22, 2013 CPSC 467b, Lecture 3 1/35 Perfect secrecy Caesar cipher Loss of perfection Classical ciphers One-time pad Affine

More information

1 Introduction. 2 Solving Linear Equations. Charlotte Teacher Institute, Modular Arithmetic

1 Introduction. 2 Solving Linear Equations. Charlotte Teacher Institute, Modular Arithmetic 1 Introduction This essay introduces some new sets of numbers. Up to now, the only sets of numbers (algebraic systems) we know is the set Z of integers with the two operations + and and the system R of

More information

Elliptic Curve Cryptography

Elliptic Curve Cryptography Elliptic Curve Cryptography Elliptic Curves An elliptic curve is a cubic equation of the form: y + axy + by = x 3 + cx + dx + e where a, b, c, d and e are real numbers. A special addition operation is

More information

Practice Assignment 2 Discussion 24/02/ /02/2018

Practice Assignment 2 Discussion 24/02/ /02/2018 German University in Cairo Faculty of MET (CSEN 1001 Computer and Network Security Course) Dr. Amr El Mougy 1 RSA 1.1 RSA Encryption Practice Assignment 2 Discussion 24/02/2018-29/02/2018 Perform encryption

More information

Chapter 3: Inequalities, Lines and Circles, Introduction to Functions

Chapter 3: Inequalities, Lines and Circles, Introduction to Functions QUIZ AND TEST INFORMATION: The material in this chapter is on Quiz 3 and Exam 2. You should complete at least one attempt of Quiz 3 before taking Exam 2. This material is also on the final exam and used

More information

PreCalculus: Semester 1 Final Exam Review

PreCalculus: Semester 1 Final Exam Review Name: Class: Date: ID: A PreCalculus: Semester 1 Final Exam Review Short Answer 1. Determine whether the relation represents a function. If it is a function, state the domain and range. 9. Find the domain

More information

during transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL

during transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL THE MATHEMATICAL BACKGROUND OF CRYPTOGRAPHY Cryptography: used to safeguard information during transmission (e.g., credit card number for internet shopping) as opposed to Coding Theory: used to transmit

More information

Jay Daigle Occidental College Math 401: Cryptology

Jay Daigle Occidental College Math 401: Cryptology 3 Block Ciphers Every encryption method we ve studied so far has been a substitution cipher: that is, each letter is replaced by exactly one other letter. In fact, we ve studied stream ciphers, which produce

More information

Standard Form of Conics

Standard Form of Conics When we teach linear equations in Algebra1, we teach the simplest linear function (the mother function) as y = x. We then usually lead to the understanding of the effects of the slope and the y-intercept

More information

Latin Squares and Their Applications

Latin Squares and Their Applications Latin Squares and Their Applications Jason Tang Mentor: Wendy Baratta October 27, 2009 1 Introduction Despite Latin Squares being a relatively unknown aspect of mathematics, there are many interesting

More information

1.2 The Role of Variables

1.2 The Role of Variables 1.2 The Role of Variables variables sentences come in several flavors true false conditional In this section, a name is given to mathematical sentences that are sometimes true, sometimes false they are

More information

{ }. The dots mean they continue in that pattern to both

{ }. The dots mean they continue in that pattern to both INTEGERS Integers are positive and negative whole numbers, that is they are;... 3, 2, 1,0,1,2,3... { }. The dots mean they continue in that pattern to both positive and negative infinity. Before starting

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer 1 Lecture 13 October 16, 2017 (notes revised 10/23/17) 1 Derived from lecture notes by Ewa Syta. CPSC 467, Lecture 13 1/57 Elliptic Curves

More information

Math 2 Variable Manipulation Part 7 Absolute Value & Inequalities

Math 2 Variable Manipulation Part 7 Absolute Value & Inequalities Math 2 Variable Manipulation Part 7 Absolute Value & Inequalities 1 MATH 1 REVIEW SOLVING AN ABSOLUTE VALUE EQUATION Absolute value is a measure of distance; how far a number is from zero. In practice,

More information

CRYPTOGRAPHY AND NUMBER THEORY

CRYPTOGRAPHY AND NUMBER THEORY CRYPTOGRAPHY AND NUMBER THEORY XINYU SHI Abstract. In this paper, we will discuss a few examples of cryptographic systems, categorized into two different types: symmetric and asymmetric cryptography. We

More information

Solutions to Math 41 First Exam October 18, 2012

Solutions to Math 41 First Exam October 18, 2012 Solutions to Math 4 First Exam October 8, 202. (2 points) Find each of the following its, with justification. If the it does not exist, explain why. If there is an infinite it, then explain whether it

More information

Carmen s Core Concepts (Math 135)

Carmen s Core Concepts (Math 135) Carmen s Core Concepts (Math 135) Carmen Bruni University of Waterloo Week 8 1 The following are equivalent (TFAE) 2 Inverses 3 More on Multiplicative Inverses 4 Linear Congruence Theorem 2 [LCT2] 5 Fermat

More information

Public Key Cryptography

Public Key Cryptography Public Key Cryptography Introduction Public Key Cryptography Unlike symmetric key, there is no need for Alice and Bob to share a common secret Alice can convey her public key to Bob in a public communication:

More information

MEI Core 1. Basic Algebra. Section 1: Basic algebraic manipulation and solving simple equations. Manipulating algebraic expressions

MEI Core 1. Basic Algebra. Section 1: Basic algebraic manipulation and solving simple equations. Manipulating algebraic expressions MEI Core Basic Algebra Section : Basic algebraic manipulation and solving simple equations Notes and Examples These notes contain subsections on Manipulating algebraic expressions Collecting like terms

More information

Lecture Notes, Week 10

Lecture Notes, Week 10 YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Week 10 (rev. 2) Professor M. J. Fischer March 29 & 31, 2005 Lecture Notes, Week 10 1 Zero Knowledge Interactive

More information

The RSA cryptosystem and primality tests

The RSA cryptosystem and primality tests Mathematics, KTH Bengt Ek November 2015 Supplementary material for SF2736, Discrete mathematics: The RSA cryptosystem and primality tests Secret codes (i.e. codes used to make messages unreadable to outsiders

More information

An Introduction to Cryptography

An Introduction to Cryptography An Introduction to Cryptography Spotlight on Science J. Robert Buchanan Department of Mathematics Spring 2008 What is Cryptography? cryptography: study of methods for sending messages in a form that only

More information

Lecture 11: Hash Functions, Merkle-Damgaard, Random Oracle

Lecture 11: Hash Functions, Merkle-Damgaard, Random Oracle CS 7880 Graduate Cryptography October 20, 2015 Lecture 11: Hash Functions, Merkle-Damgaard, Random Oracle Lecturer: Daniel Wichs Scribe: Tanay Mehta 1 Topics Covered Review Collision-Resistant Hash Functions

More information