Cryptography: Keeping Secrets Using Algebra and Geometry

28
Cryptography: Keeping Secrets Using Algebra and Geometry André Mathurin Bellarmine College Preparatory (San Jose, CA) Contact & Resource Information [email protected] http://tinyurl.com/Crypto-NCTM2014 With the increasing reliance on e-mail and texting, how can mathematics help ensure that these communications remain private? Come learn ways to do so and get ideas for engaging students in the basic ideas of cryptography within the context of algebra and geometry topics.

Transcript of Cryptography: Keeping Secrets Using Algebra and Geometry

Page 1: Cryptography: Keeping Secrets Using Algebra and Geometry

Cryptography: Keeping Secrets Using Algebra and GeometryAndré MathurinBellarmine College Preparatory (San Jose, CA)

Contact & Resource Information

[email protected]://tinyurl.com/Crypto-NCTM2014

With the increasing reliance on e-mail and texting, how canmathematics help ensure that these communications remain private?Come learn ways to do so and get ideas for engaging students in thebasic ideas of cryptography within the context of algebra andgeometry topics.

Page 2: Cryptography: Keeping Secrets Using Algebra and Geometry

PreliminariesGoals

Spark Ideas for Teaching Functions Introduce Cryptography using Algebra & Geometry

Format Audience Participation + Presenter GuidanceHighlight Connections/Extensions

Disclaimers Requires Modular Arithmetic Do Not Expect Highly Secure

Cryptography: Keeping Secrets Using Algebra & Geometry

Page 3: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Make the phrase “show me the math”difficult to read by scrambling up the letters. 

Page 4: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Make the phrase “show me the math”difficult to read by scrambling up the letters. 

VS.

• Which side is more difficult to read? (Cryptography)

• How many different scrambles are possible? (Combinatorics)

• Which of the scramble is the worst/best? (Cryptography)

Page 5: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

The Best 

• Disadvantages to this method? (Cryptography)

Random Scramble MethodWrite each letter on a slip of paper, put slips in a hat, and 

randomly select one at a time.

Page 6: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Unscramble This Phrase

Page 7: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Scrambled Version

The Unscrambled Version

Page 8: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

How do you get this

from this?

• What is the a pattern? (Cryptanalysis)

Page 9: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Modular Scramble Methodcreates a pseudo‐random “mixing up” of the phrase

Define the function   as the character that appears in the  th position of the message.

1,2,3,4,5,6,7,8,9,10,11,12,13 , , , , , , ,

example:

Page 10: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Modular Scramble Methodcreates a pseudo‐random “mixing up” of the phrase

1,2,3,4,5,6,7,8,9,10,11,12,13 1,2,3,4,5,6,7,8,9,10,11,12,13

example:

Define the function   as a scramble of the position values  .

Page 11: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Modular Scramble Method

example:

Page 12: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Modular Scramble Methodpseudo‐random scramble of the phrase characters

5 13

Page 13: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Scramble the phrase “inverse functions”

Page 14: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Scramble the phrase “inverse functions”

Page 15: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Modular Un‐Scramble MethodUse 

Page 16: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Modular Un‐Scramble Method

example:

Page 17: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Modular Un‐Scramble Method

)

8 13

Page 18: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Unscramble the phrase

Page 19: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Unscramble the phrase

Page 20: Cryptography: Keeping Secrets Using Algebra and Geometry

GeometryCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Unscramble This Phrase

Page 21: Cryptography: Keeping Secrets Using Algebra and Geometry

GeometryCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Unscramble This Phrase

Page 22: Cryptography: Keeping Secrets Using Algebra and Geometry

GeometryCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Unscramble This Phrase

Page 23: Cryptography: Keeping Secrets Using Algebra and Geometry

GeometryCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Unscramble This Phrase

Page 24: Cryptography: Keeping Secrets Using Algebra and Geometry

GeometryCryptography: Keeping Secrets

Scramble It! (aka Transposition)

Scramble the Phrase“Cryptography can become addictive”

• How many different ways are there? (Combinatorics)• What other shapes could you use? (Number Theory)

Page 25: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Replace It! (aka Substitution)

Disguise a message by replacing characters

Define a function for converting characters to numbers

, , , , , … , , , 1,2,3,4,5, … , 24,25,26

example:

• How is this similar to before? (Functions)• How is this different than before? (Functions)

Page 26: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Replace It! (aka Substitution)

Disguise a message by replacing characters

Compose functions to replace characters with characters

Page 27: Cryptography: Keeping Secrets Using Algebra and Geometry

AlgebraCryptography: Keeping Secrets

Replace It! (aka Substitution)

Disguise a message by replacing characters

Compose functions to replace characters with characters

Page 28: Cryptography: Keeping Secrets Using Algebra and Geometry

Rate this presentation on the conference app! www.nctm.org/confapp

Download available presentation handouts from the Online Planner! www.nctm.org/planner

Join the conversation! Tweet us using the hashtag #NCTMNOLA