0% found this document useful (0 votes)
175 views19 pages

Mathematics of Codes: Topics (And Subtopics)

This document discusses the mathematics of codes. It covers topics like codes and coding schemes, ciphers, modular arithmetic, decoding and deciphering, cryptology, cryptography, and cryptanalysis. It provides examples of codes throughout history, including Caesar ciphers, the Rosetta Stone, Morse code, ASCII, and the Enigma machine. It also discusses coding in qualitative research and provides instructions for encrypting and decrypting messages using a cipher wheel.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
175 views19 pages

Mathematics of Codes: Topics (And Subtopics)

This document discusses the mathematics of codes. It covers topics like codes and coding schemes, ciphers, modular arithmetic, decoding and deciphering, cryptology, cryptography, and cryptanalysis. It provides examples of codes throughout history, including Caesar ciphers, the Rosetta Stone, Morse code, ASCII, and the Enigma machine. It also discusses coding in qualitative research and provides instructions for encrypting and decrypting messages using a cipher wheel.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Mathematics of Codes

Topics (and Subtopics)

 Codes and Coding Schemes (e.g. Binary Codes and other


Identification/Privacy/Security Codes such as ISBN, check
digit in a UPC or Barcode, Credit Card Numbers, etc.)
 Ciphers (e.g. Caesar Cipher, Decimation Cipher, etc.)
 Modular Arithmetic (in Number Theory, a topic which may
also be introduced under Problem Solving and Reasoning,
as well as Mathematical Systems)
 Decoding and Deciphering
 Cryptology, Cryptography and Cryptanalysis
 Cryptograms and Cryptorithms
HEB
ON MATH OF CODES

HEB
The movie THE DA VINCI CODE (a 2006 film based from
Dan Brown’s novel):

…illustrates the use of the Fibonacci sequence (to find a


safe deposit box that contains the CRYPTEX, a cylindrical
container that can only be safely opened by turning dials
to spell a CODE word. Inside it is the clue to finding the
Holy Grail.
Clue: “’neath the Ross = Rosslyn (Chapel in Scotland)”

Coding (in its simplest sense) involves substituting one


for another; just like in
‘neath the Ross = Rosslyn
HEB
Some obvious and basic occurrences/uses:

1. “color coding of yarns or threads” in a laundry shop


– before laundry, items would be coded to prevent
mixing up of different items belonging to different
persons (e.g. all your laundry = red yarn; another
person’s laundry = yellow yarn, etc.)

2. “coding” in a qualitative inquiry.


In Research, a Code is most often a word or short phrase that
symbolically assigns a summative, salient, essence-capturing,
and/or evocative attribute for a portion of language-based or
visual data (Saldana, 2013).
HEB
HEB
Cryptography is the study of enciphering
and encoding and deciphering and decoding
(Hipschman, 2017)

HEB
Note: to decode or decipher is to “crack down” the code.
Hackers of computer-enabled transactions are excellent
decoders!

Didn’t you know: Basic Cryptography was used/applied as


early as 47 B.C. by a great conqueror!

Julius Caesar, ruler of Rome and its territories, is fighting


to conquer Egypt. After months of fighting, Caesar cannot
defeat his enemy. Something must be done. He prepares a
secret message to send to his allies. He is careful to
DISGUISE the message so that only his allies could
understand his message. He used what is now known as the
Ceasar’s Cipher.
HEB
Julius Ceasar used or did something like this:

Plaintext: BEWARE!
Ciphertext: EHZDUH!
 KEY: Encrypted by shifting each letter of the English alphabet
three positions to the right. In modern notation (i.e. Number
Theory and Modulo), encrypted by applying the congruence
c ≡ (p + 3) mod 26.
Note: Ceasar’s Cipher in the form of a Cipher Wheel will be shown later.
HEB
Some popular codes and
Ciphers

Hieroglyphs on the Rosetta Stone

HEB
The International Morse Code

HEB
The ASCII Binary Codes

HEB
The Pig Pen Cipher

HEB
• The WWII German Enigma Machine
(successfully “hacked” by mathematician Alan
Turing and other code breakers)

• Cryptocurrency/Bitcoin
HEB
Let’s watch
a video clip

to learn how to
create and “crack down”
secret messages through a
Cipher Wheel

(Note: After watching this video


clip, you will be using a Cypher
Wheel to answer 3 questions
HEB
HEB
Encrypt using a Cipher Wheel:

“Launch Attack!”
(Use Wp as index)

HEB
Encrypt using a Cipher Wheel:

“Destroy the territory!”


(Use Fu as index)

HEB
Decrypt using a Cipher Wheel:

“SWPYD KQP!
BNAJAIEAO WDAWZ!”
(index is Xb)

HEB
My primary references for Topic 5 and Topic 6:
Aufmann, R. N., Lockwood, J. S., Nation, R. D., & Clegg, D. K. (2013). Mathematical excursions (3 rd ed.). Belmont, CA:
Brooks / Cole Cengage Learning.
Baltazar, E, Ragasa, C., & Evangelista, J. (2018). Mathematics in the modern world. QuezonCity: C & E Publishing, Inc.
and others.
http://www.touchgraph.com/news
and other websites.

HEB

You might also like