Professional Documents
Culture Documents
Hacking?
By: Sam Jensen
Ten unfamiliar digits pop up on your phone screen. You grow skeptical. Either
you lost a friends number, or a company representative is calling to tell you
that your credit card was used in west Texas to buy $500 worth of line
dancing clothes. This either could be a bad dream or become a reality,
because hackers rule the world.
But what if hacking was the motive behind a new Exeter Summer class?
Mathematics instructor Karen Lassey was inspired to create the course after
Diana Davis 03, a former PEA teaching intern and now a postdoctoral
lecturer in geometry at Northwestern University, gave a talk at the annual
Anja Greer Conference on Mathematics and Technology about the math
behind cryptography: It was really fascinating, Lassey says, [and] I got
to thinking about how accessible it could be to students.
In the class, students spend time learning different codes. The math is high-
school level, but it can be tricky. Cryptography uses math techniques in a
way that a lot of students may never have experienced at their respective
schools. Lassey believes exposure to such techniques is invaluable.
Students in Cryptology also learn about the history behind ciphers. Lassey
had her class watch The Imitation Game, a movie about Alan Turing, who
saved millions of lives by decoding messages generated by Germanys
Enigma machine during World War II.
In order to decrypt a cypher, you need a key, Lassey says. Once you have
the key, you can decrypt the code. In this case, the Enigma machine was the
key, but Turings computer cracked it.
Consumers encounter public key encryption when they shop online. In order
to protect the data that customers enter when they make a purchase,
cryptographers for major commerce sites generate their own decryption keys
to keep the shoppers personal information and credit card numbers private
and secure.
Public key encryption relies on number theory and the study of integers and
prime numbers and factorization, as cryptography does, but uses the product
of two extremely large prime numbers to serve as a public key.
Public key encryption is difficult, she says, but the mathematics makes it
possible.
The Results
As she builds on the curriculum for next year, Lassey hopes to attract more
students to the course, and notes that the students in her first section were
always engaged and enthusiastic about their learning.
Coming here, I didnt really like math that much, says Casey Ocasal, but
this course has really changed my view on it. Its cool to see the different
applications.
Other students, like Adi Dust, believe this course will help them in the
future. Ive wanted to do something like this as a career, she says. So I
thought this course would be a stepping stone for that path that I couldnt
get from other schools.
Encouraged that the course may have ignited a newly discovered passion for
math in some of her students, Lassey says: Beyond offering a fun challenge,
my hope is to transport students beyond the margins of a textbook to
discover the real-life applications of the problems and theories learned in a
typical math class.