NotesFAQContact Us
Collection
Advanced
Search Tips
50 Years of ERIC
50 Years of ERIC
The Education Resources Information Center (ERIC) is celebrating its 50th Birthday! First opened on May 15th, 1964 ERIC continues the long tradition of ongoing innovation and enhancement.

Learn more about the history of ERIC here. PDF icon

Back to results
Peer reviewed Peer reviewed
Direct linkDirect link
ERIC Number: EJ769557
Record Type: Journal
Publication Date: 2005
Pages: 7
Abstractor: ERIC
Reference Count: 5
ISBN: N/A
ISSN: ISSN-0730-8639
Using Pi in Cryptology
Dence, Thomas P.; Heath, Steven
Mathematics and Computer Education, v39 n1 p56-62 Win 2005
The number Pi has a rich and colorful history. The origin of Pi dates back to when Greek mathematicians realized that the ratio of the circumference to the diameter is the same for all circles. One is most familiar with many of its applications to geometry, analysis, probability, and number theory. This paper demonstrates several examples of how the digits of Pi can be used in cryptology to encode secret messages, although there is nothing special about Pi, for this task, because many other irrational numbers would work just as well. There are a lot of variations on the schemes that the reader is encouraged to investigate, many of which provide a simple way to generate scrambled messages that are secure from all but sophisticated "code breakers."
MATYC Journal Inc. Mathematics and Computer Education, P.O. Box 158, Old Bethpage, NY 11804. Tel: 516-822-5475; Web site: http://www.macejournal.org
Publication Type: Journal Articles; Reports - Descriptive
Education Level: N/A
Audience: N/A
Language: English
Sponsor: N/A
Authoring Institution: N/A
Identifiers: N/A