GEMATMW - Midterms

Ace your homework & exams now with Quizwiz!

RSA Cryptosystem

- Rivest-Shamir-Adleman cryptosystem - Based on factorising large integers

isometries of the plane

- a pattern has symmetry if there is an isometry of the plane that preserves the pattern

dialtion

- change in size

translation

- copying; process which shift points of the plane to possibly new location - a slide moves a shape in a given direction by sliding up down sideways or diagonally

Quick Response Code (QR code)

- developed by Denso-Wave in 1994 - allow high speed component scanning - detected as 2dimensional image by a semi-conductor image sensor

GOAL of coding theory

- error detection - error correction - improve reliability of digital communication

reflection

- flip - mirror image

cyclic pattern

- has n fold rotational symmetry and no reflection

International Standard Book Number (ISBN)

- identify properties of each book - 1-9 digits = information (language, publisher, title) - digit 10 - check digit

rsa

- implemented - public key and digital signatures - useful for electronic transactions

frieze pattern

- infinitely long strip imprinted with a design given by a repeating pattern motif

Fibonacci sequence

- invented by the italian leonardo Pisano Bigollo - outcome of mathematical problem about rabbit breeding

rotation

- turns - an angle

product tagging

- used for easy identification of products - tracking and inventory

Pigpen Cipher

- uses geometric shapes

encryption

- using algorithm to transform information into a format that cannot be read

12 digit UPC

1 - specific use 2-6 - identifies manufacturer 7-11 - identifies the product 12 - check digit = 0mod10

golden ration

1.618

Public key cryptosystem

1976 - by w. diffie and m. hellman - uses a pair of keys - message encrypted by public key and decrypted by private key - asymmetric - each in

detection and correction capability of a code

2e+1 be min hamming distance 2e errors = detect e errors = correct

universal product code formula

3(x1) + x2 + 3(x3) + x4 + 3(x5) + x6 + 3(x7) .... x12 = 0 mod 10

jump twin transmission error

303455. - 202455

Objectives of Encryption

Confidentiality, Integrity, Authenticity, Non-repudiation

trap door function

One-way, difficult to solve, uses factorization, private key can compute the public key

Binet's Formula

The advantage of this formula over the recursive formula 𝐅𝐧 = 𝐅𝐧−𝟏 + 𝐅𝐧−𝟐 is that you can determine the nth Fibonacci number without finding the two preceding Fibonacci numbers.

glided reflection

a reflection followed by a translation or vice versa

modular arithmetic

a-b = divisible by n

Universal Product Code (UPC)

bar code printed on a label that has information about the item to which it is attached - track inventory

Dilation

changes the size of an object

Source Coding

changing the message source (data terminal or human voice) to a suitable code for transmission through channel - there is like a corresponding table

encrypted version

cipher text

nearest neighbor decoding

compute the hamming distance between y and each codeword - fewest hamming distance then nearest possible word

types of rosette pattern

cyclic and dihedral

Coding Theory

deals with the design of error-correcting codes for the reliable transmission of information across noisy channels

fe=fe-1+fe-2

fibonacci sequence formula

dihedral

has n fold rotational and reflectional

noise in communication

information media (comm systems and storage device) are not absolutely reliable in practice bc of noise or interference

encode

message becomes codeword

basic problem of coding theory

messages are transmitted over a communication channel which is subject to noise -> distorting the message resulting into errors

Hamming Distance

number of bit positions in which two codewords differ how many difference ex. (0010, 1100) = 3 different places

original information

plain text

transformation

process which shifts point of the plane to possible new locations - all in all - different movements

decode

received word is reverted back to a message

twin transmission error

replace numbers w/ similar double numbers 302455. - 302433

single digit transmission error

replace other digit 302455 - 302955

phonetic transmission error

replace to what sounds similar 302455 - 132455

types of symmetric patterns

rosette, frieze, wallpaper

repetition codes

send message = 1010, repeating each letter a certain number of times ex. r=3 111 000 111 000

code

set of all codewords

golden ratio in arts

shapes proportioned to golden ratio - aesthetically pleasing- to ancient greece

Caesar's Cipher

shifts the alphabet by some number of characters - moves the letter either to the left or right

parity check codes

single bit is appended to a bit string so total number of 1s is even or odd - simplest form of error detection

codeword

string of 0s and 1s representing actual messages - specifically assigned

jump transposition transmission error

switching numbers but skips middle 302455 - 305425

transposition transmission error

switching of numbers 302455 - 302545

rosetter pattern

taking motif or an element and rotating and/or reflecting that element

Minimum Distance of a code

the minimum distance of a code is the smallest - hamming distance of everything mixed then the smallest is the min.

symmetric encryption

the same key is used to encode and decode = secret key encryption

source encoder

transforms the output into a sequence of symbols which we call a message - so parang transforms the output to 0s and 1s ?

asymmetric encryption

used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.

Vigenere Cipher

uses numbers and letter start w/ 0-25 has a keyword that u add to the message = end result is the cipher

decryption

using another algorithm to transfer encrypted information to readable format

ISBN old Formula

x1 + 2x2 + 3x3 + 4x4 + 5x5 .... + 10x10 = 0 mod 11

ISBN - Jan 1, 2007 formula

x1 + 3x2 + x3 +3x4 +x5 + 3x6 + 3x12 + x13 = 0mod 10


Related study sets

The Paragraph Unity and Development

View Set

Exam AI-900_01 Overview | Microsoft Azure AI Fundamentals: AI Overview | 01 Fundamental AI Concepts

View Set

Either or fallacy/ false dilemma

View Set