Publication Date
In 2025 | 0 |
Since 2024 | 5 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 13 |
Descriptor
Coding | 13 |
Technology | 8 |
College Mathematics | 7 |
Mathematics Instruction | 7 |
Mathematical Concepts | 4 |
Student Projects | 4 |
Information Security | 3 |
Mathematics Education | 3 |
Teaching Methods | 3 |
Undergraduate Students | 3 |
Algebra | 2 |
More ▼ |
Source
PRIMUS | 13 |
Author
Ciganik, Shari | 1 |
Cline, K. | 1 |
Coggins, Porter E., III | 1 |
David P. Bunde | 1 |
Fasteen, J. | 1 |
Francis, A. | 1 |
Glatzer, Tim | 1 |
Gurski, Katharine F. | 1 |
Jeffrey Ehme | 1 |
John F. Dooley | 1 |
Karls, Michael A. | 1 |
More ▼ |
Publication Type
Journal Articles | 13 |
Reports - Descriptive | 13 |
Education Level
Higher Education | 13 |
Postsecondary Education | 10 |
Elementary Education | 1 |
Audience
Teachers | 3 |
Location
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Jeffrey Ehme – PRIMUS, 2024
The Miller-Rabin test is a useful probabilistic method for finding large primes. In this paper, we explain the method in detail and give three variations on this test. These variations were originally developed as student projects to supplement a course in error correcting codes and cryptography.
Descriptors: Probability, Numbers, Coding, Algorithms
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Schembari, N. Paul – PRIMUS, 2020
Ciphers based on rotor machines were the state-of-the-art in the mid-1900s, with arguably the most famous being the German Enigma. We have found that students have great interest in the Enigma and its cryptanalysis, so we created our own rotor cipher that is simulated with shifting tables and can be cryptanalyzed. Ours and the historic rotor…
Descriptors: Mathematics Instruction, Equipment, Technology, Teaching Methods
Cline, K.; Fasteen, J.; Francis, A.; Sullivan, E.; Wendt, T. – PRIMUS, 2020
We consider the use of projects in math courses as a mechanism for promoting coding, communication, and interdisciplinary application of math skills. Final projects play an important role, but we also discuss several alternate types of projects. We describe a model that incorporates projects at all stages across the undergraduate mathematics…
Descriptors: Student Projects, Mathematics Curriculum, Mathematics Activities, Mathematics Skills
Coggins, Porter E., III; Glatzer, Tim – PRIMUS, 2020
We present an algorithm for a matrix-based Enigma-type encoder based on a variation of the Hill Cipher as an application of 2 × 2 matrices. In particular, students will use vector addition and 2 × 2 matrix multiplication by column vectors to simulate a matrix version of the German Enigma Encoding Machine as a basic example of cryptography. The…
Descriptors: Mathematics Instruction, Matrices, Technology, Addition
Ciganik, Shari; McDaniel, Michael – PRIMUS, 2021
Prospective teachers and cryptography students use programming, statistics and guile to enrich both their courses.
Descriptors: Preservice Teachers, Elementary School Teachers, Technology, Problem Solving
Strickland, S.; Rand, B. – PRIMUS, 2016
This paper describes a framework for identifying, classifying, and coding student proofs, modified from existing proof-grading rubrics. The framework includes 20 common errors, as well as categories for interpreting the severity of the error. The coding scheme is intended for use in a classroom context, for providing effective student feedback. In…
Descriptors: Guidelines, Undergraduate Students, Classification, Mathematics Instruction
Gurski, Katharine F. – PRIMUS, 2009
We describe two short group projects for finite mathematics students that incorporate matrices and linear programming into fictional consulting requests presented as a letter to the students. The students are required to use mathematics to decrypt secret messages in one project involving matrix multiplication and inversion. The second project…
Descriptors: Mathematical Applications, Mathematics Instruction, Learner Engagement, Student Projects
Karls, Michael A. – PRIMUS, 2010
At the suggestion of a colleague, I read "The Code Book", [32], by Simon Singh to get a basic introduction to the RSA encryption scheme. Inspired by Singh's book, I designed a Ball State University Honors Colloquium in Mathematics for both majors and non-majors, with material coming from "The Code Book" and many other sources. This course became…
Descriptors: College Mathematics, Mathematics Instruction, Mathematical Concepts, Homework
Kaur, Manmohan – PRIMUS, 2008
In order to get undergraduates interested in mathematics, it is necessary to motivate them, give them good reasons to spend time on a subject that requires hard work, and, if possible, involve them in undergraduate research. This article discusses how cryptography can be used for all these purposes. In particular, a special topics course on…
Descriptors: College Mathematics, Mathematics Instruction, Student Motivation, Learning Motivation