Monday, January 29, 2007
Week 4, Tuesday 4.1-4.2
Thursday, January 25, 2007
Week 3, Thursday 3.11
Tuesday, January 23, 2007
Week 3, Tuesday 3.3-3.4
I found the chinese remainder theorem intersting and it was quite useful to have the T.A. go over it before we did the reading. It made the reading a lot more interesting and understandable. The examples in the book also make the theorem easier to understand. The only concern is, when are you coming back? The midterm is approaching rapidly and I feel my questions haven't been answered and a review by you would be most helpful. Your way of explaining things makes the information click. Let me know if you have extra sessions when you get back. I will surely attend!
Sunday, January 21, 2007
Week 3, Sunday 3.1-3.2
Thursday, January 18, 2007
Week 2, Thursday 2.8-2.11
Tuesday, January 16, 2007
Week 2, Tuesday 2.5-2.8
Wednesday, January 10, 2007
Week 1, Thursday, 2.1-2.4 Rough Draft
7. The most difficult material was understanding how to break the Vigenere Cipher. I understood exactly how the encoded the plaintext but got lost trying to understand the second method used to find the key. I think an example using the second method would clear my confusion up. Examples I've learned are a great tool for learning cryptography. First off, the first chapter and the first four sections of chapter 2 were awesome! I did not fathom how many ways there are to encrypt plaintext and that it went back to julius ceasar. The T.A. was great! And the initial part of chapter 2 went by quickly. It is interesting to note that Julius Ceasar, with such important messages, didn't pick a more compiclicated encryption algorithum. Second, I completely understand what mod 26 is thanks to Pic 10a,b,c and it is interesting to note that you must make sure all numbers in the code are between 0 and 25, and can be done by mod, a cool trick. In addition, it is interesting how we have extended the definition of inverse, when introducing mod. With respect to the Affine Cipher the multiplicative inverse for 9 (mod 26) is 3. I really like how the book introduces the topic and the order that it is in. For example, as I was reading the Affine Cipher I questioned its validity, what if there was more than 1 input that gave the same output. The book went on to describe how to assure one-to-one, which can be shown if and only if gcd(a, 26)=1. Moreover, I find that understanding how to break the code using different techniques and thought processes is interesting. It is sometimes amazing how complicated these codes can seem, yet how easy, if in the right mind-set, one can break them.