Skip to main content

Home/ Integrated Mathematics 10+/ Group items tagged log table

Rss Feed Group items tagged

Elizabeth Durkin

Log tables - 0 views

  •  
    How log values were obtained in the "olden days". Through use of a table of values. Includes a dynamic tutorial on how to use the log tables.
Elizabeth Durkin

Mathematical Advances Strengthen IT Security - 1 views

  • Elliptic curves are equations with two variables, say x and y, including terms where both x and y are raised to powers of two or more (in the form y2 = x3 + ax + b)
  • recent workshop organised by the European Science Foundation (ESF), which set the stage for development of a programme of European-wide research on the field.
  • google_hints = "Math Puzzles; Hacking; Encryption; Information Technology; Mathematics; Computer Programming"; google_ad_channel = "9363733909+4685929003+5855393847+0524954116+7497946760+8476969570"; Science News Share   Blog   Cite Print   Bookmark   Email Mathematical Advances Strengthen IT Security ScienceDaily (May 12, 2009) — Rapidly rising cyber crime and the growing prospect of the Internet being used as a medium for terrorist attacks pose a major challenge for IT security. Cryptography is central to this challenge, since it underpins privacy, confidentiality, and identity, which together provide the fabric for e-commerce and secure communications.
  • ...11 more annotations...
  • Information Technology Mathematics Computer Programming Reference Cryptography Security engineering Algebraic geometry Cyber security standards Cryptography since the beginning of the Internet has been based extensively on the RSA public key system, used for digital signatures and the exchange of private keys that in turn encrypt message content. The
  • See Also: Computers & Math Math Puzzles Hacking Encryption
  • RSA cryptosystem, introduced by Rivest, Shamir, and Adlement in 1977, relies for its security on the difficulty of working out the factors dividing large integers (whole numbers).
  • protection it provides has been eroded
  • Elliptic curves are equations with two variables, say x and y, including terms where both x and y are raised to powers of two or more (in the form y2 = x3 + ax + b).
  • Fermat’s Last Theorem,
    • Elizabeth Durkin
       
      Students can relate to this early on in the article.
  • ecent workshop organised by the European Science Foundation (ESF), which set the stage for development of a programme of European-wide research on the field.
  • Indeed it so happened that elliptic curves started to be applied to both number factorisation and cryptography at about the same time, in the late 1980s. At first the application to factorisation advanced much more quickly, while the technical difficulty involved held back elliptic curve cryptography. But the very success of elliptic curve factorisation started to undermine the security of RSA, since this relies on the difficulty of factorising the product of two prime numbers. This in turn has stimulated development of elliptic curve cryptography in more recent years, said Kohel. So having first undermined the prevailing RSA method of cryptography, the sophisticated mathematics of elliptic curves has itself come to the rescue.
  • Indeed keys 160 bits long provide ECC with the same level of security as 1024 bit keys for RSA.
  • In effect then ECC will make it easier to stay a step ahead of the hackers without undue load on computers
    • Elizabeth Durkin
       
      This is all very current. Good for kids to see.
  • he ESF workshop was highly successful in bringing together mathematicians and computer specialists whose combined expertise is required to implement complex cryptographic algorithms.
    • Elizabeth Durkin
       
      Good to get the history of the cryptography. Quite confusing though if you don't understand it.
  •  
    Great links between math and cryptography, elliptical relations, current research.
  •  
    Great link to advanced algebra
  •  
    This article shows how algebra is used in current internet cryptography.
1 - 2 of 2
Showing 20 items per page