| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

Activity Tracking 5

Page history last edited by Chunming 11 years, 2 months ago

Topic:

Cryptography 

 

Student's name

Wong Chun Ming Wilson   1155029726

Choi Chun Chau Joe            1155029678

Yiu Tsz Shing Charles          1155029393

 

Welcome to your learning page. This page is for you to keep a register of your learning history.

 

Tutor Objective Activities Date Comment
 Julin
 Clearify what we have to do
Borrow related readings 
 
6/11   
 Julin
Find easier example Some Good Videos
http://www.sophia.org/cryptography-with-matrices/cryptography-with-matrices--4-tutorial 
http://www.sophia.org/cryptography-with-matrices/cryptography-with-matrices--5-tutorial 
I think we can use an easier example for poster.
We assign a number for each letter of the alphabet. For simplicity, let us associate each letter with its position in the alphabet: A is 1, B is 2, and so on. Also, we assign the number 27 (remember we have only 26 letters in the alphabet) to a space between two words. 
   
  Know the applications of Cryptography for poster

We think we can focus on Integrity in Transmission

Many of the users of communication systems are not as much concerned about secrecy as about integrity. In an electronic funds transfer, the amount sent from one account to another is often public knowledge. What the bank cares about is that only proper transfers can take place. If an active tapper could introduce a false transfer, funds would be moved illicitly. An error in a single bit could literally cause millions of dollars to be erroneously credited or debited. 

 
   
  doing the poster
discussion how to design the poster :which content need to be included
   

 

Poster:

 

 

 

Comments (1)

sidjaggi said

at 4:01 pm on Nov 18, 2012

i remember you saying you were having trouble with the mceliece cryptosystem. come talk to me during class break/after class.

You don't have permission to comment on this page.