Topics in Advanced Mathematics for Teachers | Spring 2014 |
Number Theory with Applications to Cryptography | |
Mondays 5:00 - 8:00 | 612 SEO |
Instructor Bonnie Saunders | |
Printed version of Class Syllabus |
This course presents applications of number theory for teaching cryptography in the middle school or high school mathematics setting. No previous knowledge of number theory or cryptography is necessary. Because of the mathematical nature of cryptography and because students often have a natural interest in secret messages, the topic is a motivating setting for learning and applying mathematics skills. It is also true that the serious study of numbers can be as fascinating for students as it is useful for cryptography. Unfortunately both, despite the accessibility to most students, are rarely taught with any seriousness in the high school math curriculum. We will be exploring how the schools might expose students to cryptography and number theory. Mathematical topics include prime numbers, GCF, LCM, division algorithm, the Euclidean algorithm and the extended Euclidean algorithm. We will discuss Caesar, affine, and Vigenere ciphers; and RSA encryption. The course will run as a student seminar. Each student (and the instructor) will research and present aspects of cryptography and/or number theory to the class. Topics will be chosen and assigned accoridng to student interest and previous experiences. It is anticipated that each student will have the opportunity for three presentations. Cryptography demands the use of appropriate technology to encrypt, decrypt and crack secret messages. As well, computational power can facilitate the understanding of number theory. Students without previous experience in cryptography will be learning the classical ciphers online at CryptoClub.org. We will also explore other computer applications that can be used in high school. Required materials: |
||
The CryptoClub Cipher Handbook by Janet Beissinger and Bonnie Saunders. Number Theory for Teachers with Curricular Supplements |
||
Recommended: |
||
The Cryptoclub: Using Mathematics to Make and Break Secret Codes by Janet Beissinger and Vera Pless. |
||
Workbook for The Cryptoclub: Using Mathematics to Make and Break Secret Codes by Janet Beissinger and Vera Pless. |
||
TI-83/84 or TI-83/84 Plus or equivalent graphing calculator. | ||
Links to online activities: |
||
CryptoClub.org A webpage with games, messages to crack and other activities for learning cryptography. |
||
The CryptoClub Webpage An older, unsupported webpage of Cryptograpy activities that still has some interesting things. |
Online materials: | ||
August 27 | Number Theory for Teachers by B Saunders. Print double sided if possible. This is an interactive workbook that we will use throughout the course. You should always bring it to class |
|
November 17 | Multiplication Table This is an EXCEL file to use for making multiplication tables using different mods. |
|
September 24 | Combination Charts This is an EXCEL file to use for making Combination Charts |
|
December 3 | Mod Powers Table This is an EXCEL file to use for making power tables using different mods. |
|
November 17 | CryptoClub Leader Manual This manual includes teaching guide, answers, games and sample messages to accompany The CryptoClub CipherHandbook. |
|
August 27 | Course Description | |
The following are materials designed for middle and high school teaching. They are sources for possible class presentations. Because these are copyrighted materials, the links are not currently active. | ||
August 27 | Maneuvers on Number Lines by David Page | |
September 17 | Looking at Combinations from the Mathematics in Context MS Curriculum | |
October 8 | Why does a negative X a negative = a positive? by I.M. Gelfand | |
November 19 | Exponents from the CME HS Curriculum | |
The following are excerpts from the book, The Cryptoclub: Using Mathematics to Make and Break Secret Codes by Janet Beissinger and Vera Pless. The book is recommended reading if you plan on teaching cryptography to children. These sections are provided for this course for those who wish to use the material for class presentations. |
||
October 15 | From The Cryptoclub: Chapter 9 Factoring | |
October 8 | From The Cryptoclub: Chapter 11 Modular Arithmetic | |
October 8 | From The Cryptoclub: Chapter 12 Applications of Modular Arithmetic |
--Last updated December, 2013 by Bonnie Saunders