Professor Kate Poirier, Spring 2017

Month: April 2017 (Page 3 of 3)

MATLAB assignment

  1. On a computer that has MATLAB installed, watch the videos for Lectures #1, #2, #3, and #5 here (5-10 minutes each).
  2. Open MATLAB and follow along with the videos. (If you’re using a computer lab on campus, don’t forget to bring headphones.)
  3. Read from page 191 to the top of page 196.
  4. Complete #1, 13, 14, and 16 on page 202.
  5. Try implementing Algorithms 1, 2, and 3 in MATLAB for a random list of numbers.
  6. Try implementing your answers for #1, 13, 14, and 16 on page 202 in MATLAB for a random list of numbers.
  7. Bring these files with you to class on Tuesday, April 25.

While MATLAB is the official requirement for this assignment, and is installed on most computers in CityTech labs, a free alternative to MATLAB is Scilab. You might like to practice on Scilab if you will not have access to MATLAB during the break but do have access to a computer that you can install software on. Commands in Scilab are similar to the commands in MATLAB, but they’re not necessarily identical, so you may find the MATLAB-Scilab equivalence page helpful. You will have to convert to MATLAB after you arrive back on campus after the break.

OpenLab code-breaking assignment (in teams)

For this assignment, form teams of 2-3 students. There are two goals for this assignment:

  1. Conduct a conversation publicly on the OpenLab with your partners entirely in code.
  2. Break another team’s code to decipher their messages.

Before starting your conversation, you and your partner(s) must choose how you will encrypt your messages. Read pages 294-297 and, together with your teammates, choose a shift cipher, an affine cipher, or a block cipher to use. Keep this information private. Decide who will post the first message.

One team member will post the first message as a new post on the OpenLab. Title your post “Code-breaking” and the names of all the team members (not encrypted). Select the “Code-breaking” category from the right-hand side of the screen. The message can be as long as you want, but it must be at least two sentences long and must be entirely encrypted. It will look something like:

L ZLOO EH UHDOOB KDSSB LI BRXU HQFRGHG PHVVDJHV DUH VLOOB MRNHV RU IXQQB VWRULHV. MXVW PDNH VXUH WKDW WKHB DUH QRW WRR LQDSSURSULDWH!

After the first message is posted, other team members can add their encrypted responses as comments on their teammate’s post. Every team member must post at least one message. Messages don’t need to say anything in particular. You can tell a story together or ask each other questions. You can be silly or you can be serious. Keep posting encrypted messages until someone else breaks your code.

After enough encrypted messages have been posted, try breaking another team’s code. If you break it, post a comment on their thread with the decrypted messages along with the kind of cipher they chose, and the information you needed to decrpyt it. If you and a partner work together to break another team’s code, make sure to credit them in your post. You can try breaking as many other teams’ codes as you like, but you may only post the decrypted code for one team.

First post due by Tuesday, April 11. All teammates’s comments due by Thursday, April 13.

We’ll see how many codes have been broken by our first class meeting after spring break!

You might find the Khan Academy unit on cryptography (including videos) to be useful.

Newer posts »