CONCEPTUAL TOOLS

By:  Neil E. Cotter

Outreach

 

 

Algebra Public Key

 

 

Student Guide

 

 

 

 
 
 

 

Intro:        In WWII, British intelligence intercepted and decoded messages sent by the Germans using the "Enigma" machine.  Alan Turing lead the effort, which lead to the creation of early computers and is portrayed in the movie "Imitation Game".

Today, encryption has become more complicated.  One interesting scheme to openly publish a public key the may be used to encode messages.  The decoding requires a private key, which could be found by anyone with enough computing power.  The time required to find the private key, however, is so large as to be impractical.

Today, you will break codes based on factoring polynomials.  The code is simple enough to break, if you can factor cubic polynomials.

Code:        You will have the following information for each code you break, (example values in 3rd line): 

xCoefficient

a2  Coefficient

a1  Coefficient

a0  Coefficient

p = public root

a3

a2

a1

a0

p

1

13

54

72

3

The first four numbers are the coefficients of a cubic polynomial:

                                                                               (1)

The public root means one root term is (x + p) = (x + 3).  The information being sent by the code is the other two root terms.  The size of the largest root (lives saved) is the value of the code.  You will earn points (or cash) proportional to the largest root.

Continuing with our example, we factor out the (x + 3) term from f(x).

                                           (2)

It turns out the factorization is straightforward:

a = 1                                                 (3)

After you calculate b and c, you will factor the quadratic function:  x2 + bx + c.

                           (9)

The value of this broken code is the larger-sized root term:  6.

                                                                                                                          (10)