Upcoming SlideShare
Loading in …5
×

# Beauty of Mathematic

420 views

Published on

This slide is about the beauty of mathematics through one of the interesting case of study, CRYPTOGRAPHY

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
• Full Name
Comment goes here.

Are you sure you want to Yes No
Your message goes here
• Be the first to comment

• Be the first to like this

No Downloads
Views
Total views
420
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
16
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

### Beauty of Mathematic

1. 1. http://www.sharingnewz.com LOGO
2. 2. Outlines1 Introduction2 The theories3 Further explanation4 Closure
3. 3. Introduction Apa itu Cryptograpy  Berasal daripada Cryptology dan graphein yang bermaksud “tersembunyi/secret” dan “penulisan”.  Kajian dan pembelajaran tentang teknik untuk menghasilkan komunikasi rahsia daripada orang yang ketiga. Macam mana ia berfungsi?  Cryptographic algorithm(cipher) berfungsi melalui proses encryption dan decryption mathematical function.
4. 4. Introduction Apa itu Encryption?  Cara untuk menyamarkan sesuatu textbiasa(plaintext) untuk melindungi isi kandungan. Apa itu Decryption?  Proses untuk reverse ciphertext(ayat tersembunyi) kepada original plaintext(text biasa)  Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.
5. 5. Secure CommunicationGerman Lorenz cipher WorldWar II generalstaff
6. 6. Jenis-jenis CryptographyOne-time • Menghasilkan mesej melalui konsep bits. pad • Hanya boleh digunakan 1 kali sahaja. • Menghasilkan mesej melalui konsepCaesar shift. • Antara teknik encrypt paling senangcipher dan paling diketahui umum. • Menghasilkan mesej melalui konsep Hill linear algebra. • Teknik Encrypt pertama yang paling Cipher praktikal dan susah di decrypt kan.
7. 7. One-time pad DecryptEncrypt
8. 8. Caesar cipher Example: Encryption of a letter can be describe as: Decrypt is perform similarly
9. 9. Hill CipherHills cipher machine, from figure 4 of the patent
10. 10. Hill Cipher
11. 11. Add your company slogan www.sharingnewz.com LOGO