NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 14 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Peer reviewed Peer reviewed
Direct linkDirect link
Schembari, N. Paul – PRIMUS, 2020
Ciphers based on rotor machines were the state-of-the-art in the mid-1900s, with arguably the most famous being the German Enigma. We have found that students have great interest in the Enigma and its cryptanalysis, so we created our own rotor cipher that is simulated with shifting tables and can be cryptanalyzed. Ours and the historic rotor…
Descriptors: Mathematics Instruction, Equipment, Technology, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Coggins, Porter E., III; Glatzer, Tim – PRIMUS, 2020
We present an algorithm for a matrix-based Enigma-type encoder based on a variation of the Hill Cipher as an application of 2 × 2 matrices. In particular, students will use vector addition and 2 × 2 matrix multiplication by column vectors to simulate a matrix version of the German Enigma Encoding Machine as a basic example of cryptography. The…
Descriptors: Mathematics Instruction, Matrices, Technology, Addition
Peer reviewed Peer reviewed
Direct linkDirect link
Ciganik, Shari; McDaniel, Michael – PRIMUS, 2021
Prospective teachers and cryptography students use programming, statistics and guile to enrich both their courses.
Descriptors: Preservice Teachers, Elementary School Teachers, Technology, Problem Solving
Peer reviewed Peer reviewed
Direct linkDirect link
Tech Directions, 2011
Cryptology, or cryptography, is the study of writing and deciphering hidden messages in codes, ciphers, and writings. It is almost as old as writing itself. Ciphers are messages in which letters are rearranged or substituted for other letters or numbers. Codes are messages in which letters are replaced by letter groups, syllables, or sentences.…
Descriptors: Technology, Writing (Composition), Communication (Thought Transfer), Coding
Peer reviewed Peer reviewed
Direct linkDirect link
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
McAndrew, Alasdair – International Journal of Mathematical Education in Science and Technology, 2008
The Hill cipher is the simplest example of a "block cipher," which takes a block of plaintext as input, and returns a block of ciphertext as output. Although it is insecure by modern standards, its simplicity means that it is well suited for the teaching of such concepts as encryption modes, and properties of cryptographic hash functions. Although…
Descriptors: Orthographic Symbols, Computation, Coding, Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Chua, Boon Liang – Mathematics Teaching in the Middle School, 2008
When students learn mathematics, they tend to understand and remember the mathematical processes that they find practical and relevant. It is not surprising then that "Principles and Standards for School Mathematics" (NCTM 2000) encourages teachers to help students discover the relevance of mathematics in their daily lives. To help young people…
Descriptors: Mathematical Concepts, Mathematics Instruction, Teaching Methods, Literature
Peer reviewed Peer reviewed
Direct linkDirect link
Kaur, Manmohan – PRIMUS, 2008
In order to get undergraduates interested in mathematics, it is necessary to motivate them, give them good reasons to spend time on a subject that requires hard work, and, if possible, involve them in undergraduate research. This article discusses how cryptography can be used for all these purposes. In particular, a special topics course on…
Descriptors: College Mathematics, Mathematics Instruction, Student Motivation, Learning Motivation
Peer reviewed Peer reviewed
Direct linkDirect link
Dence, Thomas P.; Heath, Steven – Mathematics and Computer Education, 2005
The number Pi has a rich and colorful history. The origin of Pi dates back to when Greek mathematicians realized that the ratio of the circumference to the diameter is the same for all circles. One is most familiar with many of its applications to geometry, analysis, probability, and number theory. This paper demonstrates several examples of how…
Descriptors: Technology, Probability, Number Concepts, Mathematical Concepts
Peer reviewed Peer reviewed
Sullivan, Megan – Science Teacher, 2005
For the general public, the field of cryptography has recently become famous as the method used to uncover secrets in Dan Brown's fictional bestseller, The Da Vinci Code. But the science of cryptography has been popular for centuries--secret hieroglyphics discovered in Egypt suggest that code-making dates back almost 4,000 years. In today's…
Descriptors: Information Skills, Programming, Internet, Computer Security