LONG TERM GOAL

of 24
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Information Report
Category:

Documents

Published:

Views: 15 | Pages: 24

Extension: PDF | Download: 0

Share
Description
LONG TERM GOAL. To develop a strategy based on 21 st century approaches and to apprise the students about latest trends & applications of Mathematics in the best possible way. SHORT TERM GOALS.
Transcript
LONG TERM GOALTo develop a strategy based on 21st century approaches and to apprise the students about latest trends & applications of Mathematics in the best possible waySHORT TERM GOALSA polynomial is a mathematical expression involving a sum of powers in one or more variables multiplied by coefficients. A polynomial in one variable (i.e., a univariate polynomial) with constant coefficients is given by
  • TOPIC TO BE DISCUSSED
  • POLYNOMIALS
  • TYPES OF POLYNOMIALSThe degree of a polynomial with only one variable is the largest exponent of that variable.For example degree of given polynomial is “3”4x3-x+5
  • DEGREE OF A POLYNOMIAL
  • NOMENCLATURE OF POLYNOMIALSCRYPTOGRAPHYCryptography:The cryptographic practices are in use by the mankind since the ancient times due to the basic instinct of human beings to keep their communication secret and on the other hand their curiosity about what others are talking. In older times the cryptographic practices were limited to particular organizations specially military and secret services. Initially the symmetric key cryptography concept was adapted where the keys were forwarded to the recipient of the message prior sending the message. These keys were onwards used to cipher and decipher the messages. Some of these symmetric systems were Ceaser’s cipher, Enigma and other rotor machines. Symmetric systems are still considered as the most rapid way of cryptographic communication if the joint key exchange is established successfully.CRYPTOGRAPHYCRYPTOGRAPHY FLOW DIAGRAMUSER AENCRYPTIONCOMMUNICATION MEDIUMUSER BDECRYPTIONALGORITHMENCRYPTIONDECRYPTIONCRYPTOGRAPHY ALGORITHMSCRYPTOGRAPHY ALGORITHMSCRYPTOGRAPHY ALGORITHMSCRYPTOGRAPHY ALGORITHMSCRYPTOGRAPHY ALGORITHMSCRYPTOGRAPHY ALGORITHMS
  • EXERCISE # 1
  • LETS TRY TO ENCRYPT YOUR OWN NAME WITH THIS ALGORITHM
  • CRYPTOGRAPHY ALGORITHMSCRYPTOGRAPHY ALGORITHMS
  • EXERCISE # 2
  • LETS TRY TO DECRYPT THIS
  • 1451 0047 2699 0971 0047 0341 0971 2699 0506 0362
  • CRYPTOGRAPHY ALGORITHMS
  • EXERCISE # 3
  • LETS TRY TO CREATE YOUR OWN ALGORITHM FROM TH EQUATION
  • f(x)=x2 +x+1
  • WITH INCREMENTAL CODING OF ORDER 1 IN ASCENDING ORDER
  • INSTRUCTIONAL STRATEGIESREFERENCES
  • “Handbook of Elliptic and Hyper Elliptic Curve Cryptography” by Henri Cohen & Gerhard Frey
  • “Handbook of Applied Cryptography” by Alfred J. Menezes, Paul C. van Oorschot & Scott A. Vanstone
  • www.wikipedia.org/wiki/Cryptography
  • www.wikipedia.org/wiki/Polynomial
  • www.mathworld.wolfram.com › Algebra › Polynomials
  • We Need Your Support
    Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

    Thanks to everyone for your continued support.

    No, Thanks
    SAVE OUR EARTH

    We need your sign to support Project to invent "SMART AND CONTROLLABLE REFLECTIVE BALLOONS" to cover the Sun and Save Our Earth.

    More details...

    Sign Now!

    We are very appreciated for your Prompt Action!

    x