NotesFAQContact Us
Collection
Advanced
Search Tips
Back to results
Peer reviewed Peer reviewed
Direct linkDirect link
ERIC Number: EJ769557
Record Type: Journal
Publication Date: 2005
Pages: 7
Abstractor: ERIC
ISBN: N/A
ISSN: ISSN-0730-8639
EISSN: N/A
Using Pi in Cryptology
Dence, Thomas P.; Heath, Steven
Mathematics and Computer Education, v39 n1 p56-62 Win 2005
The number Pi has a rich and colorful history. The origin of Pi dates back to when Greek mathematicians realized that the ratio of the circumference to the diameter is the same for all circles. One is most familiar with many of its applications to geometry, analysis, probability, and number theory. This paper demonstrates several examples of how the digits of Pi can be used in cryptology to encode secret messages, although there is nothing special about Pi, for this task, because many other irrational numbers would work just as well. There are a lot of variations on the schemes that the reader is encouraged to investigate, many of which provide a simple way to generate scrambled messages that are secure from all but sophisticated "code breakers."
MATYC Journal Inc. Mathematics and Computer Education, P.O. Box 158, Old Bethpage, NY 11804. Tel: 516-822-5475; Web site: http://www.macejournal.org
Publication Type: Journal Articles; Reports - Descriptive
Education Level: N/A
Audience: N/A
Language: English
Sponsor: N/A
Authoring Institution: N/A
Grant or Contract Numbers: N/A