Академический Документы
Профессиональный Документы
Культура Документы
MATH 002 REVIEWER (Midterms) encrypting information that will be sent to an individual.
People can use that individual's public key to decrypt
Cryptography is a method of protecting information information sent by him.
and communications through the use of codes so that
only those for whom the information is intended can The private key, on the other hand, is accessible only to
read and process the individual. The individual can use his private key to
decrypt any message encrypted with his public key.
In cryptography, a cipher (or cypher) is an algorithm for Or he can use his private key to encrypt messages, so
performing encryption or decryption—a series of well- that the messages can only be decrypted with his
defined steps that can be followed as a procedure. corresponding public key.
When using a cipher the original information is known
ASCII - American Standard Code for Information
as plaintext, and the encrypted form as ciphertext.
Interchange; is a character set which uses just 8 bits (1
byte) for each character. These characters are letters,
Encryption (to encrypt or encipher) is the process of
punctuations, graphics symbols,
using an algorithm to transform information into a
mathematical symbols, etc.
format that cannot be read.
Modular arithmetic - is the mathematical statement
Decryption (to decrypt, decode or decipher) is the
a ≡ b (mod n) which means that the difference a – b is
process of using another algorithm to transform
divisible by the integer n. (think b as a remainder)
encrypted information back into a readable format.
Example: 23 ≡ b (mod 12)
The goal of Cryptography:
Answer: b = 11 since, 23 = (12)(1) + 11
CONFIDENTIALITY
54 ≡ b (mod 19)
The sender (let us call her Alice) and receiver (let us call
Answer: b = 16 since, 54 = (19)(2) + 16
him Bob) can be assured that no third party can read
the message.
Modular arithmetic properties:
a ≡ a (mod n) Example:
INTEGRITY
23 ≡ 23 (mod 12)
Alice and Bob can be sure that no third party can make
changes in the message.
If a ≡ b (mod n), Example:
AUTHENTICITY then b ≡ a (mod n) If 23 ≡ 11 (mod 12)
Bob can be sure that it is Alice who sent the message. then 11 ≡ 23 (mod 12)
2. Convert the hexadecimal number F6 to binary. 13. An environmentalist collects a liter of water from 45
3. What is the hexadecimal representation of 11010? different locations along the banks of a stream. He
4. Convert the decimal number 29 to hexadecimal. measures the amount of dissolved oxygen in each
5. Convert the hexadecimal number 5B to decimal. specimen. The mean oxygen level is 4.62 mg, with the
overall standard deviation of 0.92. A water purifying
6. Identify the population and the sample: company claims that the mean level of oxygen in the
a) A survey of 1353 American households found that water is 5 mg. You conducted a hypothesis test with
18% of the households own a computer. alpha=0.01 to determine whether the mean oxygen
b) A recent survey of 2625 elementary school level is less than 5 mg. The result is as follows: t-test
children found that 28% of the children could be statistic = -2.7708; the one-tailed t-test critical value is
classified obese. -2.4141. The correct conclusion _________.
7. Determine whether the numerical value is a A. is to reject Ho; there is evidence that the true
parameter or a statistic: mean amount is less than 5 mg.
a) A recent survey by the alumni of a major B. is not to reject Ho, there is no significant
university indicated that the average salary of 10,000 of difference between the hypothesized mean 5
its 300,000 graduates was 125,000. mg and the sample mean 4.62 mg.
b) The average salary of all assembly-line employees C. cannot be determined.
at a certain car manufacturer is $33,000.
14. If skills in Math is correlated to aptitude in Science,
8. Identify whether the statement describes inferential what is the predicted correlation between these two
statistics or descriptive statistics: variables?
a) The average age of the students in a statistics A. 1 B. -1
class is 21 years. C. 0 D. Impossible to say for sure
b) The chances of winning the California Lottery are
one chance in twenty-two million.
15. Use the prime numbers p=9 and q=7 (so that
9. Determine whether the data are qualitative or n=pq=63) in creating an RSA cryptosystem with public
quantitative: key (n,e) with e=5.
a) the colors of automobiles on a used car lot
b) the ages of a sample of 350 employees of a large a. If A = 00, B = 01, … Z = 25, encrypt the message
hospital “KEY” using the encryption key (n, e) = (63, 5).
Encryption equation: C = Pe mod n
10. Given the following set of grades:
78 81 83 83 83 85 85 92 b. Using the private key (n, d) = (63, 29) decrypt the
a) Compute for the mean. cipher packet you came up with in (a).
b) What is the median? Decryption equation: P = Cd mod n
c) What is the mode?
1. a) x = 5
b) x = 2
c) x = 15
d) x = 5
2. F6 = 1111 0110
3. 11010 = 1A
4. 29 = 1D
5. 5B = 91
7. a) statistic
b) parameter
8. a) descriptive
b) descriptive
9. a) qualitative
b) quantitative
10. a) 83.75
b) 84
c) 85
11. a) z = 1.533
b) 93.7%
12. a) 122.5
b) 0.62%