Finding value of pie and pythagorus and cryptography

26
TOPIC – 1) FINDING VALUE OF PIE 2) PYTHAGORAS THEOREM 3) CRYPTOGRAPHY DR. S&S.S GANDHY GOVERMENT ENGINEERING COLLAGE

Transcript of Finding value of pie and pythagorus and cryptography

Page 1: Finding value of pie and pythagorus and cryptography

TOPIC – 1) FINDING VALUE OF PIE 2) PYTHAGORAS

THEOREM 3) CRYPTOGRAPHY

DR. S&S.S GANDHY GOVERMENT ENGINEERING

COLLAGE

Page 2: Finding value of pie and pythagorus and cryptography

PREPARED BYCHELANI PRASHANT VADHER VIJAY PATIL NIKHIL

Page 3: Finding value of pie and pythagorus and cryptography

1] FINDING VALUE OF PIEINFORMATION ABOUT PIENAMEDEFINITIONAPPROXCIMATE VALUEACTIVITY TO FIND PIE

Page 4: Finding value of pie and pythagorus and cryptography

INFORMATION ABOUT PIEThe number π is a mathematical constant, the ratio

of a circle's circumference to its diameter, commonly approximated as 3.14159. It has been represented by the Greek letter "π" since the mid-18th century, though it is also sometimes spelled out as "pi“.

Being an irrational number, π cannot be expressed exactly as a fraction. Still, fractions such as 22/7 and other rational numbers are commonly used to approximate π.

Because its definition relates to the circle, π is found in many formulae in trigonometry and geometry, especially those concerning circles, ellipses or spheres

Page 5: Finding value of pie and pythagorus and cryptography

NAMEThe symbol used by mathematicians to

represent the ratio of a circle's circumference to its diameter is the lowercase Greek letter π, sometimes spelled out as pi, and derived from the first letter of the Greek word perimetros, meaning circumference. In English, π is pronounced as "pie“. In mathematical use, the lowercase letter π (or π in sans-serif font) is distinguished from its capital counterpart Π, which denotes a product of a sequence.

The choice of the symbol π is discussed in the section Adoption of the symbol π.

Page 6: Finding value of pie and pythagorus and cryptography

DEFINITIONπ is commonly defined as the ratio of a circle's

circumference C to its diameter d.π = C d The ratio C/d is constant, regardless of

the circle's size. For example, if a circle has twice the diameter of another circle it will also have twice the circumference, preserving the ratio C/d. This definition of π implicitly makes use of flat (Euclidean) geometry; although the notion of a circle can be extended to any curved (non-Euclidean) geometry, these new circles will no longer satisfy the formula π = C/d.

Here, the circumference of a circle is the arc length around the perimeter of the circle, a quantity which can be formally defined independently of geometry using limits, a concept in calculus.For example, one may compute directly the arc length of the top half of the unit circle given in Cartesian coordinates by x2 + y2 = 1, as the integral.

Page 7: Finding value of pie and pythagorus and cryptography

APPROXIMATE VALUE

Some approximations of pi include:

Integers: 3Fractions: Approximate

fractions include (in order of increasing accuracy) 22/7, 333/106, 355/113, 52163/16604, 103993/33102, and 245850922/78256779

Page 8: Finding value of pie and pythagorus and cryptography

ACTIVITY TO FIND PIE

Step 1 Draw a circle on your card. The

exact size doesn't matter, but let's use a radius of 5 cm.

Use your protractor to divide the circle up into twelve equal sectors.

What is the angle for each sector? That's easy – just divide 360° (one complete turn) by 12:

360° / 12 = 30°So each of the angles must be

30°

Page 9: Finding value of pie and pythagorus and cryptography

Step 2Divide just one of the sectors into two equal parts – that's 15° for each sector.

You now have thirteen sectors – number them 1 to 13:

Page 10: Finding value of pie and pythagorus and cryptography

Step 3Cut out the thirteen

sectors using the scissors:

Page 11: Finding value of pie and pythagorus and cryptography

Step4Rearrange the 13 sectors like this

(you can glue them onto a piece of paper):

Page 12: Finding value of pie and pythagorus and cryptography

Step 5Its height is the circle's radius: just look at sectors 1 and

13 above. When they are in the circle they are "radius" high.Its width (actually one "bumpy" edge), is half of the curved

parts around the circle ... in other words it is about half the circumference of the original circle. We know that:

Circumference = 2 × π × radiusAnd so the width is:Half the Circumference = π × radiusWith a radius of 5 cm, the rectangle should be:5 cm highabout 5π cm wide

Page 13: Finding value of pie and pythagorus and cryptography

Step 6Measure the actual length of your

"rectangle" as accurately as you can using your ruler.

Divide by the radius (5 cm) to get an approximation for π

Put your answer here:“”RACTANGLE WIDTH” DIVIDE BY 5 CM.

=  π15.7 3.14

Page 14: Finding value of pie and pythagorus and cryptography

2) PYTHAGOREAN THEOREM

Pythagoras was a Greek mathematician and a philosopher, but was best known for his Pythagorean Theorem.

He was born around 572 B.C. on the island of Samos.

For about 22 years, Pythagoras spent time traveling though Egypt and Babylonia to educate himself.

At about 530 B.C., he settled in a Greek town in southern Italy called Crotona.

Pythagoras formed a brotherhood that was an exclusive society devoted to moral, political and social life. This society was known as Pythagorean

Page 15: Finding value of pie and pythagorus and cryptography

INFORMATIONThe sum of the areas of the two squares

on the legs (a and b) equals the area of the square on the hypotenuse (c).

In mathematics, the Pythagorean theorem, also known as Pythagoras' theorem, is a fundamental relation in Euclidean geometry among the three sides of a right triangle.

It states that the square of the hypotenuse (the side opposite the right angle) is equal to the sum of the squares of the other two sides. The theorem can be written as an equation relating the lengths of the sides a, b and c, often called the "Pythagorean equation":

Page 16: Finding value of pie and pythagorus and cryptography

DEFINITIONThe sum of the squares of each leg

of a right angled triangle equals to the square of the hypotenuse

a² + b² = c²

Page 17: Finding value of pie and pythagorus and cryptography

MANY PROOFS OF PYTHAGOREN THEOREMProof using similar trianglesEuclid's proofProofs by dissection and rearrangement

Einstein's proof by dissection without rearrangement

Algebraic proofsProof using differentials

Page 18: Finding value of pie and pythagorus and cryptography

CRYPTOGRAPHY

Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries.

Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards,

computer passwords, and electronic commerce

Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary

Page 19: Finding value of pie and pythagorus and cryptography

ENCRYPTION = It is the process of converting ordinary information (called plaintext) into unintelligible text (called ciphertext).

DECRYPTION = It is the process of converting unintelligible text (called ciphertext) into ordinary information (called plaintext).

Page 20: Finding value of pie and pythagorus and cryptography

TYPES OF CRYPTOSYSTEMS1) SYMMETRIC SYSTEM Symmetric-key cryptography, where a

single key is used for encryption and decryption

Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key

Page 21: Finding value of pie and pythagorus and cryptography

2) ASYMMETRIC SYSTEM Asymmetric systems use a public-key

cryptosystems, the public key may be freely distributed, while its paired private key must remain secret. The public key is used for encryption, while the private or secret key is used for decryption.

Use of asymmetric systems enhances the security of communication. Examples of asymmetric systems include RSA and ECC

Page 22: Finding value of pie and pythagorus and cryptography

CIPHER = It is a pair of algorithms that create the encryption and the reversing decryption.

The detailed operation of a cipher is controlled both by the algorithm and in each instance by a "key"

Page 23: Finding value of pie and pythagorus and cryptography

TYPES OF CIPHERS1] TRANSPOSITION CIPHERS = which

rearrange the order of letters in a message.

E.X= Plain text - 'hello world’. Cipher text - 'ehlol owrdl' 2] SUBSTITUTION CIPHERS = which

systematically replace letters or groups of letters with other letters or groups of letters

E.X= Plain text - 'fly at once' Cipher text - 'gmz bu podf'

Page 24: Finding value of pie and pythagorus and cryptography

3] CAESAR CIPHER in which each letter in the

plaintext was replaced by a letter some fixed number of positions further down the alphabet.

Alphabet shift ciphers are believed to have been used by Julius Caesar over 2,000 years ago.[5] This is an example with k=3. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.

Page 25: Finding value of pie and pythagorus and cryptography

HISTORY OF CRYPTOGRAPHY

German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages

Page 26: Finding value of pie and pythagorus and cryptography