Goto: Prof. K at UF.    Or: Teaching Page.    Or: JK Contradance program.
Page: http://www.jonathanking.org/Include/thispage.shtml


Schedule Teaching PAST-COURSES
SeLo 2024g Plex 2024g
past SeLo
past LinA
past DfyQ
past Plex
past Abstract Algebra
past NT&Crypto
Combinatorics 2017-2018

Fonts
Articles Michael Dyck's Contradance Index
Michael Dyck's Contradance Index

Jonathan's dances Dances/Composers (contradance) Tunes/Bands (contradance)
L0 Contradance program L1 Contradance program L2 Contradance program L3 Contradance program L4 Contradance program L5 Contradance program


Navigation JK Top
MAT4930 0329 (25286) Number Theory & Cryptography MWF7 [13:55-14:45]
Spr2023: LittleHall 219(SW)

Number Theory & Mathematical Cryptography We may use more advanced computing devices...

Nostalgic? See 2019g, 2016g, 2014g, 2013g (with photos), 2011g (photos), 2007t.
There is a closely allied Number Theory course.

Web Cryptographic resources


Our Teaching Page has important information for my students. (It has the Notes, Exams and Links from all of my previous courses.)
The Teaching Page has my schedule, LOR guidelines, and Usually Useful Pamphlets. One of them is the Further information is at our class-archive URL (I email this private URL directly to students).
In all of my courses, attendance is absolutely required (excepting illness and religious holidays). In the unfortunate event that you miss a class, you are responsible to get all Notes / Announcements / TheWholeNineYards from a classmate, or several. All my classes have a substantial class-participation grade.

Photo of text cover Our textbook is An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics).
Authors: Jeffrey Hoffstein, Jill Pipher, J.H. Silverman ISBN: 978-0-387-77993-5
Year: 2008 Publisher: Springer
Marston: QA268 .H64 2008

Students can read the book for free by VPNing to UF, then clicking Intro to Modern Cryptography.

Homepage of  Intro... Mathematical Cryptography, with a link to its Errata sheet.



NT&Cryptography topic list






End-of-semester NT&Crypto   Individual (Optional) Project (IP)


Prof. ...will be due, typed, stapled, slid completely under my office door (402 Little Hall, northeast corner, top floor) no later than 2PM, Thursday, 27Apr2023.

The Project must be carefully typed, but diagrams may be hand-drawn and scanned into the PDF.

The first page is to be the Problem Sheet, with Honor Code signed and blanks filled in.

At all times have a paper copy you can hand-in; I do NOT accept electronic versions. Print out a copy each day, so that you always have the latest version to hand-in; this, in case your printer or computer fails. (You are too old for My dog ate my homework.)

Please follow the guidelines on the Checklist Checklist (pdf, 3pages) to earn full credit.


The following is abridged from Wikipedia, the free encyclopedia

Diophantus of Alexandria - (Greek: Διόφαντος ὁ Ἀλεξανδρεύς , circa 200/214 – circa 284/298)  was a Greek mathematician of the Hellenistic era. Little is known of his life except that he lived in Alexandria, Egypt ...

He was known for his study of equations with variables which take on rational values and these Diophantine equations are named after him. Diophantus is sometimes known as the father of Algebra. He wrote a total of thirteen books on these equations. Diophantus also wrote a treatise on polygonal numbers.

In 1637, while reviewing his translated copy of Diophantus' Arithmetica (pub. ca.250) Pierre de Fermat wrote his famous Last Theorem in the page's margins. His copy with his margin-notes survives to this day.

Although little is known about his life, some biographical information can be computed from his epitaph. He lived in Alexandria and he died when he was 84 years old. Diophantus was probably a Hellenized Babylonian.

A 5th and 6th century math puzzle involving Diophantus' age: He was a boy for one-sixth of his life. After one-twelfth more, he acquired a beard. After another one-seventh, he married. In the fifth year after his marriage his son was born. The son lived half as many as his father. Diophantus died 4 years after his son. How old was Diophantus when he died?


What is the answer, with reasoning?   (It is in the source-file.)

The following is from Wikipedia, the free encyclopedia

Cryptography (or cryptology; derived from Greek κρυπτός kryptós "hidden," and the verb γράφω gráfo "write") is the study of message secrecy. In modern times, it has become a branch of information theory, as the mathematical study of information...

... Steganography (i.e., hiding even the existence of a message so as to keep it confidential) was also first developed in ancient times. An early example, from Herodotus, concealed a message - a tattoo on a slave's shaved head - by regrown hair. More modern examples of steganography include the use of invisible ink, microdots, and digital watermarks to conceal information .

Ciphertexts produced by classical ciphers always reveal statistical information about the plaintext, which can often be used to break them. After the Arab discovery of frequency analysis (around the year 1000), nearly all such ciphers became more or less readily breakable by an informed attacker. ... Essentially all ciphers remained vulnerable to cryptanalysis using this technique until the invention of the polyalphabetic cipher by Leon Battista Alberti around the year 1467. Alberti's innovation was to use different ciphers (ie, substitution alphabets) for various parts of a message (often each successive plaintext letter). He also invented what was probably the first automatic cipher device, a wheel which implemented a partial realization of his invention. In the polyalphabetic Vigenère cipher, encryption uses a key word, which controls letter substitution depending on which letter of the key word is used.


Prerequisites: A grade of B in UF's Sets & Logic [MHF3202]  or  Discrete Structures [COT3100] course (or equivalent)  OR  permission of the professor.

(I would like you to know: What a prime number is, and What mathematical induction is and What an equivalence relation is. Helpful is knowing how to: Add/multiply two numbers mod-N, and how to compute mod-N reciprocals, i.e, the Extended Euclidean Algorithm. Helpful, but not required, is the definition of the Euler phi function.)

See Useful NT Texts, below, for self-study suggestions.


Assignment for first week of class.
  1. To help you self-evaluate, take up to 65 minutes to solve as many problem as you can, on this test of high-school mathematics, with a touch of Sets&Logic(pdf).
  2. Memorize the useful Math-Greek alphabet (pdf).
  3. Get the basics of w:Set-builder notation (up through “Equivalent predicates...”). Important: For us, the (double-bar N) symbol ℕ={0,1,2,...}; i.e zero is a natural number, a natnum.
    We use +={1,2,3,4,...} for the set of positive integers; the posints.
Encryption



Various math czars who help out.

Time Computer/Proj Lights Blackboard Humor EN-Problems
Austin Brandon Luke everyone Alejandro Brandon D.



ENCODING: a b c d e f g h i j k l m n o p q r s t u v w x y z ' . ? ! , 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Three Examples of simple ciphers:
    CAESAR: Shift by 9:   x ↦ x+9 (mod 32).
a b c d e f g h i j k l m n o p q r s t u v w x y z ' . ? ! , 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 0 1 2 3 4 5 6 7 8
    MULTIPLICATIVE-CIPHER; Mult by 5:   x ↦ [5*x] (mod 32).   [Uses that 5 is coprime to 32]:
a b c d e f g h i j k l m n o p q r s t u v w x y z ' . ? ! , 0 5 10 15 20 25 30 3 8 13 18 23 28 1 6 11 16 21 26 31 4 9 14 19 24 29 2 7 12 17 22 27
    AFFINE-CIPHER; Mult by 5, then add 9:   x ↦ [5*x]+9 (mod 32).
a b c d e f g h i j k l m n o p q r s t u v w x y z ' . ? ! , 9 14 19 24 29 2 7 12 17 22 27 0 5 10 15 20 25 30 3 8 13 18 23 28 1 6 11 16 21 26 31 4

The following, from Wikipedia (Enigma_machine), is edited and abbreviated.

In December 1932, the Polish Cipher Bureau first broke Germany's Enigma ciphers. Five weeks before the outbreak of World War II, on 25 July 1939, in Warsaw, the Polish Cipher Bureau gave Enigma-decryption techniques and equipment to French and British military intelligence. [A]llied codebreakers were able to decrypt a vast number of messages that had been enciphered using the Enigma. The intelligence gleaned from this source was codenamed “Ultra” by the British.

[After World War II] Winston Churchill told Britain's King George VI: It was thanks to Ultra that we won the war.

Though the Enigma cipher had cryptographic weaknesses, in practice it was only in combination with other factors (procedural flaws, operator mistakes, occasional captured hardware and key tables, etc.) that those weaknesses allowed Allied cryptographers to be so successful.




Horizontal rule

JK Home page Goto jk HomePage


____End: Number Theory