Download as pdf or txt
Download as pdf or txt
You are on page 1of 102

Numeral Systems

Vedic Mathematics
Zero Search Methods
Highlights of Computing: From the
Credit Cards
Cryptography
Ancient Indian Vedic Literature to
Definitions
Contact Information
Modern Practical Cryptography
mathfinance.com
Uwe Wystup
Title Page

JJ II
uwe.wystup@mathfinance.com
J I

Page 1 of 55 February 2010


Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
1. Numeral Systems
Definitions
Contact Information
2. Vedic Mathematics
mathfinance.com 3. Zero Search Methods
Title Page 4. Credit Cards
JJ II
5. Cryptography
J I

Page 2 of 55
6. Definitions
Go Back

Full Screen

Close

Quit
1. Numeral Systems
• Fundamentals: Any integer has a unique represen-
Numeral Systems tation as a weighted sum of powers of a chosen base.
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information

mathfinance.com

Title Page

JJ II

J I

Page 3 of 55

Go Back

Full Screen

Close

Quit
1. Numeral Systems
• Fundamentals: Any integer has a unique represen-
Numeral Systems tation as a weighted sum of powers of a chosen base.
Vedic Mathematics
Zero Search Methods
Credit Cards • Example: 245 = 2 · 102 + 4 · 101 + 5 · 100
Cryptography
Definitions
Contact Information

mathfinance.com

Title Page

JJ II

J I

Page 3 of 55

Go Back

Full Screen

Close

Quit
1. Numeral Systems
• Fundamentals: Any integer has a unique represen-
Numeral Systems tation as a weighted sum of powers of a chosen base.
Vedic Mathematics
Zero Search Methods
Credit Cards • Example: 245 = 2 · 102 + 4 · 101 + 5 · 100
Cryptography
Definitions
Contact Information The Base 10 is in no way special except
that
mathfinance.com

Title Page

JJ II

J I

Page 3 of 55

Go Back

Full Screen

Close

Quit
1. Numeral Systems
• Fundamentals: Any integer has a unique represen-
Numeral Systems tation as a weighted sum of powers of a chosen base.
Vedic Mathematics
Zero Search Methods
Credit Cards • Example: 245 = 2 · 102 + 4 · 101 + 5 · 100
Cryptography
Definitions
Contact Information The Base 10 is in no way special except
that
mathfinance.com

Title Page

JJ II • The Mayas also used the feet (base=20), see http:


J I //en.wikipedia.org/wiki/Maya_numerals.
Page 3 of 55

Go Back

Full Screen

Close

Quit
1. Numeral Systems
• Fundamentals: Any integer has a unique represen-
Numeral Systems tation as a weighted sum of powers of a chosen base.
Vedic Mathematics
Zero Search Methods
Credit Cards • Example: 245 = 2 · 102 + 4 · 101 + 5 · 100
Cryptography
Definitions
Contact Information The Base 10 is in no way special except
that
mathfinance.com

Title Page

JJ II • The Mayas also used the feet (base=20), see http:


J I //en.wikipedia.org/wiki/Maya_numerals.
Page 3 of 55

Go Back • Computers use a dual system (power off


Full Screen
or on, base 2) or a hexadecimal system
Close
(0, 1, 2, . . . , 9, A, B, C, D, E, F ) for memory size:
1 byte = F F .
Quit
1. Numeral Systems
• Fundamentals: Any integer has a unique represen-
Numeral Systems tation as a weighted sum of powers of a chosen base.
Vedic Mathematics
Zero Search Methods
Credit Cards • Example: 245 = 2 · 102 + 4 · 101 + 5 · 100
Cryptography
Definitions
Contact Information The Base 10 is in no way special except
that
mathfinance.com

Title Page

JJ II • The Mayas also used the feet (base=20), see http:


J I //en.wikipedia.org/wiki/Maya_numerals.
Page 3 of 55

Go Back • Computers use a dual system (power off


Full Screen
or on, base 2) or a hexadecimal system
Close
(0, 1, 2, . . . , 9, A, B, C, D, E, F ) for memory size:
1 byte = F F .
Quit

• More on http://en.wikipedia.org/wiki/
Numeral_system
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information

1.1. Exercise
mathfinance.com
Write the hexadecimal number CAF E in the dual, dec-
Title Page
imal and Maya number system.
JJ II

J I

Page 4 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
Definitions 2. Vedic Mathematics
Contact Information

1. Introduction
mathfinance.com
2. Multiplication
Title Page

JJ II
3. Squares
J I 4. Division
Page 5 of 55
5. Divisibility
Go Back
6. Square Roots
Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
2.1. Introduction
Zero Search Methods
Credit Cards veda (Sanskrit) means: knowledge
Cryptography
Definitions
Contact Information Veda Upaveda

mathfinance.com
Rigveda Ayurveda
Title Page Samaveda Gandharvaveda
JJ II Yajurveda Dhanurveda
J I
Atharvaveda Sthapatyaveda
Page 6 of 55

Go Back
Table 1: Vedas and Upavedas (supplementary vedas)
Full Screen

Close

Quit
2.1.1. The 16 Sutras
are part of a Parisista (Appendix) of the Atharvaveda
1. By one more than the one before
Numeral Systems
2. All from 9 and the last from 10
Vedic Mathematics
Zero Search Methods 3. Vertically and crosswise
Credit Cards
Cryptography
4. Transpose and apply
Definitions 5. If the Samuccaya is the same it is zero
Contact Information
6. If one is in ratio the other is zero

mathfinance.com 7. By addition and by subtraction


Title Page 8. By the completion or non-completion
JJ II 9. Differential calculus
J I 10. By the deficiency
Page 7 of 55
11. Specific and general
Go Back
12. The remainders by the last digit
Full Screen
13. The ultimate and twice the penultimate
Close
14. By one less than the one before
Quit
15. The product of the sum

16. All the multipliers


2.1.2. Jagadguru Swami Sri Bharati Krsna Tirthaji
Maharaja
Numeral Systems
Vedic Mathematics Explained the sutras in his books.
Zero Search Methods
Credit Cards Jagadguru Swami Sri
Cryptography Bharati Krsna Tirthaji
Definitions
Maharaja (March, 1884 -
Contact Information
February 2, 1960) was the
mathfinance.com
Jagadguru (literally, teacher
of the world; assigned to
Title Page
heads of Hindu mathas)
JJ II of the Govardhana matha
J I of Puri during 1925-1960.
Page 8 of 55
He was one of the most
significant spiritual figures
Go Back
in Hinduism during the 20th
Full Screen
century. He is particularly
Close known for his work on Vedic
Quit mathematics.
Numeral Systems 2.2. Multiplication
Vedic Mathematics
Zero Search Methods
Example with working base 10:
Credit Cards
Cryptography
Definitions 9 - 1
Contact Information

×
mathfinance.com
7 - 3
Title Page

JJ II
6 / 3
J I = 63
Page 9 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems 2.2. Multiplication
Vedic Mathematics
Zero Search Methods
Example with working base 10:
Credit Cards
Cryptography
Definitions 9 - 1 7 - 3
Contact Information

× ×
mathfinance.com
7 - 3 6 - 4
Title Page

JJ II
6 / 3 3 /1 2
J I = 63 = 42
Page 9 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems 2.2. Multiplication
Vedic Mathematics
Zero Search Methods
Example with working base 10:
Credit Cards
Cryptography
Definitions 9 - 1 7 - 3 13 + 3
Contact Information

× × ×
mathfinance.com
7 - 3 6 - 4 12 + 2
Title Page

JJ II
6 / 3 3 /1 2 15 / 6
J I = 63 = 42 = 156
Page 9 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems 2.2. Multiplication
Vedic Mathematics
Zero Search Methods
Example with working base 10:
Credit Cards
Cryptography
Definitions 9 - 1 7 - 3 13 + 3 12 + 2
Contact Information

× × × ×
mathfinance.com
7 - 3 6 - 4 12 + 2 8 - 2
Title Page

JJ II
6 / 3 3 /1 2 15 / 6 10 / 4̄
J I = 63 = 42 = 156 = 96
Page 9 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems 2.2. Multiplication
Vedic Mathematics
Zero Search Methods
Example with working base 10:
Credit Cards
Cryptography
Definitions 9 - 1 7 - 3 13 + 3 12 + 2
Contact Information

× × × ×
mathfinance.com
7 - 3 6 - 4 12 + 2 8 - 2
Title Page

JJ II
6 / 3 3 /1 2 15 / 6 10 / 4̄
J I = 63 = 42 = 156 = 96
Page 9 of 55

Go Back
Reason: (x + a)(x + b) = x(x + a + b) + ab
Full Screen

Close

Quit
Numeral Systems 2.2. Multiplication
Vedic Mathematics
Zero Search Methods
Example with working base 10:
Credit Cards
Cryptography
Definitions 9 - 1 7 - 3 13 + 3 12 + 2
Contact Information

× × × ×
mathfinance.com
7 - 3 6 - 4 12 + 2 8 - 2
Title Page

JJ II
6 / 3 3 /1 2 15 / 6 10 / 4̄
J I = 63 = 42 = 156 = 96
Page 9 of 55

Go Back
Reason: (x + a)(x + b) = x(x + a + b) + ab
Full Screen
Origin of the ×-sign comes from this method
Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards Example with working base 100:
Cryptography
Definitions
Contact Information
91 - 9
mathfinance.com ×
Title Page
96 - 4
JJ II

J I
87 / 36
Page 10 of 55 = 8736
Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards Example with working base 100:
Cryptography
Definitions
Contact Information
91 - 9 111 + 11
mathfinance.com × ×
Title Page
96 - 4 109 + 9
JJ II

J I
87 / 36 120 / 99
Page 10 of 55 = 8736 = 12099
Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards Example with working base 100:
Cryptography
Definitions
Contact Information
91 - 9 111 + 11 108 + 8
mathfinance.com × × ×
Title Page
96 - 4 109 + 9 97 - 3
JJ II
87 / 36 120 / 99 105 / ¯
24
J I

Page 10 of 55 = 8736 = 12099 = 10476


Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Other working bases (division case)
Zero Search Methods
Credit Cards
Cryptography
Definitions 100/2=50
Contact Information
49 - 1
mathfinance.com
×
Title Page
49 - 1
JJ II

J I
2)48 / 01
Page 11 of 55 24 / 01
Go Back = 2401
Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Other working bases (division case)
Zero Search Methods
Credit Cards
Cryptography
Definitions 100/2=50 100/2=50
Contact Information
49 - 1 54 + 4
mathfinance.com
× ×
Title Page
49 - 1 46 - 4
JJ II

J I
2)48 / 01 2)50 / 1̄6̄
Page 11 of 55 24 / 01 25 / 1̄6̄
Go Back = 2401 = 2484
Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Other working bases (multiplication case)
Zero Search Methods
Credit Cards
Cryptography
Definitions 10× 2=20
Contact Information
19 - 1
mathfinance.com
×
Title Page
19 - 1
JJ II

J I
× 2)18 / 1
Page 12 of 55 36 / 1
Go Back = 361
Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Other working bases (multiplication case)
Zero Search Methods
Credit Cards
Cryptography
Definitions 10× 2=20 10× 6=60
Contact Information
19 - 1 62 + 2
mathfinance.com
× ×
Title Page
19 - 1 48 - 12
JJ II

J I
× 2)18 / 1 × 6)50 /2̄ 4̄
Page 12 of 55 36 / 1 300 /2̄ 4̄
Go Back = 361 = 2976
Full Screen

Close

Quit
2.2.1. Exercises
Multiply the following

Numeral Systems
a 94 × 94
Vedic Mathematics
Zero Search Methods
b 97 × 89
Credit Cards
c 87 × 99
Cryptography
Definitions
d 87 × 98
Contact Information

e 87 × 95
mathfinance.com
f 95 × 95
Title Page

JJ II
g 79 × 96
J I h 98 × 96
Page 13 of 55
i 92 × 99
Go Back
j 88 × 88
Full Screen

Close
k 97 × 56
Quit l 97 × 63
m 92 × 196
Multiply the following mentally

Numeral Systems
a 667 × 998
Vedic Mathematics
Zero Search Methods
b 768 × 997
Credit Cards
c 989 × 998
Cryptography
Definitions d 885 × 997
Contact Information

e 883 × 998
mathfinance.com
f 8×6
Title Page

JJ II
g 891 × 989
J I h 8888 × 9996
Page 14 of 55
i 6999 × 9997
Go Back
j 90909 × 99994
Full Screen

Close
k 78989 × 99997
Quit l 9876 × 9989
Multiply the following mentally

Numeral Systems
a 133 × 103
Vedic Mathematics
Zero Search Methods
b 107 × 108
Credit Cards
c 171 × 101
Cryptography
Definitions d 102 × 104
Contact Information

e 132 × 102
mathfinance.com
f 14 × 12
Title Page

JJ II
g 18 × 13
J I h 1222 × 1003
Page 15 of 55
i 1051 × 1007
Go Back
j 15111 × 10003
Full Screen

Close
k 125 × 105
Quit l 10607 × 10008
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
2.3. Squares
Cryptography
Definitions
Using the sutra Ekadhikena Purvena (“by one more
Contact Information than the previous one”) we get

mathfinance.com
152 = 1 × 2/25 = 2/25 = 225
Title Page
252 = 2 × 3/25 = 6/25 = 625
JJ II
352 = 3 × 4/25 = 12/25 = 1225
J I ...
Page 16 of 55
1152 = 11 × 12/25 = 132/25 = 13225
Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics 2.3.1. Exercises
Zero Search Methods
Credit Cards Multiply the following mentally
Cryptography
Definitions a 652
Contact Information

b 852
mathfinance.com
c 0.52
Title Page

JJ II
d 7.52
J I e 0.02252
Page 17 of 55
f 10502
Go Back
g 1752
Full Screen

Close

Quit
2.4. Division
• Lots of tricks are available. We do only some high-
Numeral Systems
lights.
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information

mathfinance.com

Title Page

JJ II

J I

Page 18 of 55

Go Back

Full Screen

Close

Quit
2.4. Division
• Lots of tricks are available. We do only some high-
Numeral Systems
lights.
Vedic Mathematics
1
Zero Search Methods
• Find the exact decimal representation of 19
.
Credit Cards
Cryptography
Definitions
Contact Information

mathfinance.com

Title Page

JJ II

J I

Page 18 of 55

Go Back

Full Screen

Close

Quit
2.4. Division
• Lots of tricks are available. We do only some high-
Numeral Systems
lights.
Vedic Mathematics
1
Zero Search Methods
• Find the exact decimal representation of 19
.
Credit Cards
Cryptography • Standard methods are cumbersome.
Definitions
Contact Information

mathfinance.com

Title Page

JJ II

J I

Page 18 of 55

Go Back

Full Screen

Close

Quit
2.4. Division
• Lots of tricks are available. We do only some high-
Numeral Systems
lights.
Vedic Mathematics
1
Zero Search Methods
• Find the exact decimal representation of 19
.
Credit Cards
Cryptography • Standard methods are cumbersome.
Definitions
Contact Information • Using the “Ekadhika Purva” Sutra it is easy:

mathfinance.com
• Start with 1 and then work from right to left mul-
tiplying by 2.
Title Page

JJ II

J I

Page 18 of 55

Go Back

Full Screen

Close

Quit
2.4. Division
• Lots of tricks are available. We do only some high-
Numeral Systems
lights.
Vedic Mathematics
1
Zero Search Methods
• Find the exact decimal representation of 19
.
Credit Cards
Cryptography • Standard methods are cumbersome.
Definitions
Contact Information • Using the “Ekadhika Purva” Sutra it is easy:

mathfinance.com
• Start with 1 and then work from right to left mul-
tiplying by 2.
Title Page

JJ II
. 0 5 2 6 3 1 5 7 8
J I
1 1 1 1 1 1
Page 18 of 55

Go Back
/ 9 4 7 3 6 8 4 2 1
Full Screen 1 1 1
Close

Quit
Numeral Systems • A further shortcut is the insight that
Vedic Mathematics
Zero Search Methods
Credit Cards
. 0 5 2 6 3 1 5 7 8
Cryptography
+ 9 4 7 3 6 8 4 2 1
Definitions
Contact Information = 9 9 9 9 9 9 9 9 9
mathfinance.com

1
Title Page
• The same works for all periodic decimals, e.g. 7
JJ II

J I . 1 4 2
Page 19 of 55
+ 8 5 7
Go Back
= 9 9 9
Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information 2.4.1. Exercises
Compute the exact decimal number of
mathfinance.com

1
Title Page a 29
JJ II 1
b 49
J I

Page 20 of 55

Go Back

Full Screen

Close

Quit
2.5. Divisibility
Numeral Systems
Vedic Mathematics • Use Ekadhika as an osculator.
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information

mathfinance.com

Title Page

JJ II

J I

Page 21 of 55

Go Back

Full Screen

Close

Quit
2.5. Divisibility
Numeral Systems
Vedic Mathematics • Use Ekadhika as an osculator.
Zero Search Methods
Credit Cards • For 9, 19, 29, 39 etc. the Ekadhikas are 1, 2, 3, 4,
Cryptography etc.
Definitions
Contact Information

mathfinance.com

Title Page

JJ II

J I

Page 21 of 55

Go Back

Full Screen

Close

Quit
2.5. Divisibility
Numeral Systems
Vedic Mathematics • Use Ekadhika as an osculator.
Zero Search Methods
Credit Cards • For 9, 19, 29, 39 etc. the Ekadhikas are 1, 2, 3, 4,
Cryptography etc.
Definitions
Contact Information • For 3, 13, 23, 33 etc. multiply them by 3 and you
get 1, 4, 7, 10, etc. as the Ekadhikas.
mathfinance.com

Title Page

JJ II

J I

Page 21 of 55

Go Back

Full Screen

Close

Quit
2.5. Divisibility
Numeral Systems
Vedic Mathematics • Use Ekadhika as an osculator.
Zero Search Methods
Credit Cards • For 9, 19, 29, 39 etc. the Ekadhikas are 1, 2, 3, 4,
Cryptography etc.
Definitions
Contact Information • For 3, 13, 23, 33 etc. multiply them by 3 and you
get 1, 4, 7, 10, etc. as the Ekadhikas.
mathfinance.com
• For 7, 17, 27, 37 etc. multiply them by 7 and you
Title Page
get 5, 12, 19, 26, etc. as the Ekadhikas.
JJ II

J I

Page 21 of 55

Go Back

Full Screen

Close

Quit
2.5. Divisibility
Numeral Systems
Vedic Mathematics • Use Ekadhika as an osculator.
Zero Search Methods
Credit Cards • For 9, 19, 29, 39 etc. the Ekadhikas are 1, 2, 3, 4,
Cryptography etc.
Definitions
Contact Information • For 3, 13, 23, 33 etc. multiply them by 3 and you
get 1, 4, 7, 10, etc. as the Ekadhikas.
mathfinance.com
• For 7, 17, 27, 37 etc. multiply them by 7 and you
Title Page
get 5, 12, 19, 26, etc. as the Ekadhikas.
JJ II

J I
• For 1, 11, 21, 31 etc. multiply them by 9 and you
get 1, 10, 19, 28, etc. as the Ekadhikas.
Page 21 of 55

Go Back

Full Screen

Close

Quit
2.5. Divisibility
Numeral Systems
Vedic Mathematics • Use Ekadhika as an osculator.
Zero Search Methods
Credit Cards • For 9, 19, 29, 39 etc. the Ekadhikas are 1, 2, 3, 4,
Cryptography etc.
Definitions
Contact Information • For 3, 13, 23, 33 etc. multiply them by 3 and you
get 1, 4, 7, 10, etc. as the Ekadhikas.
mathfinance.com
• For 7, 17, 27, 37 etc. multiply them by 7 and you
Title Page
get 5, 12, 19, 26, etc. as the Ekadhikas.
JJ II

J I
• For 1, 11, 21, 31 etc. multiply them by 9 and you
get 1, 10, 19, 28, etc. as the Ekadhikas.
Page 21 of 55

Go Back
• Now test if 112 is divisible by 7 osculating by 5:
2 × 5 + 11 = 21, which is divisible by 7.
Full Screen

Close
• Therefore: yes
Quit
2.5. Divisibility
Numeral Systems
Vedic Mathematics • Use Ekadhika as an osculator.
Zero Search Methods
Credit Cards • For 9, 19, 29, 39 etc. the Ekadhikas are 1, 2, 3, 4,
Cryptography etc.
Definitions
Contact Information • For 3, 13, 23, 33 etc. multiply them by 3 and you
get 1, 4, 7, 10, etc. as the Ekadhikas.
mathfinance.com
• For 7, 17, 27, 37 etc. multiply them by 7 and you
Title Page
get 5, 12, 19, 26, etc. as the Ekadhikas.
JJ II

J I
• For 1, 11, 21, 31 etc. multiply them by 9 and you
get 1, 10, 19, 28, etc. as the Ekadhikas.
Page 21 of 55

Go Back
• Now test if 112 is divisible by 7 osculating by 5:
2 × 5 + 11 = 21, which is divisible by 7.
Full Screen

Close
• Therefore: yes
Quit
Numeral Systems
Vedic Mathematics
Is 2774 divisible by 19? Osculate by 2:
Zero Search Methods
Credit Cards
Cryptography 2 7 7 4
Definitions
Contact Information + 8
2 8 5
mathfinance.com

Title Page
+ 1 0
JJ II 3 8
J I
+ 1 6
Page 22 of 55
1 9
Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards • One more example: Is 5293240096 divisible by 139?
Cryptography
Definitions • The Ekadhika (osculator) is 14.
Contact Information

mathfinance.com

Title Page

JJ II

J I

Page 23 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards • One more example: Is 5293240096 divisible by 139?
Cryptography
Definitions • The Ekadhika (osculator) is 14.
Contact Information

5 2 9 3 2 4 0 0 9 6
mathfinance.com

139 89 36 131 29 131 19 51 93


Title Page

JJ II

J I

Page 23 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards • One more example: Is 5293240096 divisible by 139?
Cryptography
Definitions • The Ekadhika (osculator) is 14.
Contact Information

5 2 9 3 2 4 0 0 9 6
mathfinance.com

139 89 36 131 29 131 19 51 93


Title Page

JJ II

J I

Page 23 of 55
• Answer: yes
Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography 2.5.1. Exercises
Definitions
Contact Information Using the osculation method, check if

mathfinance.com
a 32896 is divisible by 29
Title Page b 93148 is divisible by 29
JJ II
c 4914 is divisible by 39
J I
d 14061 is divisible by 43
Page 24 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics 2.6. Square Roots (Vargamula)
Zero Search Methods
Credit Cards • 1, 5, 6 and 0 at the end of a number reproduce
Cryptography themselves as the last digits in the square.
Definitions
Contact Information

mathfinance.com

Title Page

JJ II

J I

Page 25 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics 2.6. Square Roots (Vargamula)
Zero Search Methods
Credit Cards • 1, 5, 6 and 0 at the end of a number reproduce
Cryptography themselves as the last digits in the square.
Definitions
Contact Information • Squares of complements from 10 have the same last
digit; thus 12 and 92 end in 1, 22 and 82 end in 4
mathfinance.com etc.
Title Page

JJ II

J I

Page 25 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics 2.6. Square Roots (Vargamula)
Zero Search Methods
Credit Cards • 1, 5, 6 and 0 at the end of a number reproduce
Cryptography themselves as the last digits in the square.
Definitions
Contact Information • Squares of complements from 10 have the same last
digit; thus 12 and 92 end in 1, 22 and 82 end in 4
mathfinance.com etc.
Title Page
• 2, 3, 7 and 8 are out of court altogether.
JJ II

J I

Page 25 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics 2.6. Square Roots (Vargamula)
Zero Search Methods
Credit Cards • 1, 5, 6 and 0 at the end of a number reproduce
Cryptography themselves as the last digits in the square.
Definitions
Contact Information • Squares of complements from 10 have the same last
digit; thus 12 and 92 end in 1, 22 and 82 end in 4
mathfinance.com etc.
Title Page
• 2, 3, 7 and 8 are out of court altogether.
JJ II

J I
• If the given number has n digits, then the square
root will contain n2 or n+1
2
digits.
Page 25 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics 2.6. Square Roots (Vargamula)
Zero Search Methods
Credit Cards • 1, 5, 6 and 0 at the end of a number reproduce
Cryptography themselves as the last digits in the square.
Definitions
Contact Information • Squares of complements from 10 have the same last
digit; thus 12 and 92 end in 1, 22 and 82 end in 4
mathfinance.com etc.
Title Page
• 2, 3, 7 and 8 are out of court altogether.
JJ II

J I
• If the given number has n digits, then the square
root will contain n2 or n+1
2
digits.
Page 25 of 55

Go Back
• Systematic computation of an exact square root re-
quires the Dvandvayoga (Duplex) process.
Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
2.6.1. Duplex Process (Dvandvayoga)
Definitions
Contact Information
D(4) = 42 = 16 (1)
mathfinance.com
D(43) = 2 · 4 · 3 = 24 (2)
Title Page
D(137) = 2 · 1 · 7 + 32 = 23 (3)
D(1034) = 2·1·4+2·0·3=8 (4)
JJ II
D(10345) = 2 · 1 · 5 + 2 · 0 · 4 + 32 = 19 (5)
J I

Page 26 of 55 Got it?


Go Back

Full Screen

Close

Quit
2.6.2. Square Root of a Perfect Square
Numeral Systems √
Vedic Mathematics Find 1849.
Zero Search Methods
Credit Cards
Group in pairs, taking a single extra digit on the left as
Cryptography
Definitions
extra digit.
Contact Information

mathfinance.com

Title Page

JJ II

J I

Page 27 of 55

Go Back

Full Screen

Close

Quit
2.6.2. Square Root of a Perfect Square
Numeral Systems √
Vedic Mathematics Find 1849.
Zero Search Methods
Credit Cards
Group in pairs, taking a single extra digit on the left as
Cryptography
Definitions
extra digit.
Contact Information

mathfinance.com
1 8 — 4 9
Title Page 8) 2
JJ II
4
J I

Page 27 of 55

Go Back

Full Screen

Close

Quit
2.6.2. Square Root of a Perfect Square
Numeral Systems √
Vedic Mathematics Find 1849.
Zero Search Methods
Credit Cards
Group in pairs, taking a single extra digit on the left as
Cryptography
Definitions
extra digit.
Contact Information

mathfinance.com
1 8 — 4 9
Title Page 8) 2
JJ II
4
J I

Page 27 of 55

Go Back
4 is the largest integer whose square does not exceed 18.
Full Screen
18/4 is 4 with remainder 2.
Close The divisor 8 is two times 4.
Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Next we divide 24 by the divisor 8. This gives 3 remain-
Credit Cards
der 0, placed as
Cryptography
Definitions 1 8 — 4 9
Contact Information

8) 2 0
mathfinance.com
4 3
Title Page

JJ II

J I

Page 28 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Next we divide 24 by the divisor 8. This gives 3 remain-
Credit Cards
der 0, placed as
Cryptography
Definitions 1 8 — 4 9
Contact Information

8) 2 0
mathfinance.com
4 3
Title Page

JJ II

J I
Now we see 09 and we deduct from this the duplex of
Page 28 of 55
the last answer figure 3, i.e. 09 − D(3) = 09 − 32 =
Go Back
09 − 9 = 0. This means that the answer is exactly 43.
Full Screen

Close

Quit
1 3 — 6 9
6) 4
Numeral Systems
Vedic Mathematics 3
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information

mathfinance.com

Title Page

JJ II

J I

Page 29 of 55

Go Back

Full Screen

Close

Quit
1 3 — 6 9
6) 4
Numeral Systems
Vedic Mathematics 3
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information 3 is the largest integer whose square does not exceed 13.
13/3 is 3 with remainder 4.
mathfinance.com The divisor 6 is two times 3.
Title Page
Next we divide 46 by the divisor 6. This gives 7 remain-
der 4, placed as
JJ II

J I
1 3 — 6 9
Page 29 of 55
6) 4 4
Go Back

Full Screen
3 7
Close

Quit
1 3 — 6 9
6) 4
Numeral Systems
Vedic Mathematics 3
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information 3 is the largest integer whose square does not exceed 13.
13/3 is 3 with remainder 4.
mathfinance.com The divisor 6 is two times 3.
Title Page
Next we divide 46 by the divisor 6. This gives 7 remain-
der 4, placed as
JJ II

J I
1 3 — 6 9
Page 29 of 55
6) 4 4
Go Back

Full Screen
3 7
Close

Quit

49 − D(7) = 0, so 37 is the exact square root of 1369.


2.6.3. Exercises
Find the square root of the following.
Numeral Systems a 3136
Vedic Mathematics
Zero Search Methods b 3969
Credit Cards
Cryptography c 5184
Definitions
Contact Information d 3721
e 6889
mathfinance.com

Title Page
f 1296
JJ II

J I

Page 30 of 55

Go Back

Full Screen

Close

Quit
2.6.3. Exercises
Find the square root of the following.
Numeral Systems a 3136
Vedic Mathematics
Zero Search Methods b 3969
Credit Cards
Cryptography c 5184
Definitions
Contact Information d 3721
e 6889
mathfinance.com

Title Page
f 1296
JJ II

J I Find out how the method extends to 6-digit squares and


Page 30 of 55
find the square roof of the numbers
Go Back
a 119025
Full Screen
b 524176
Close

Quit
c 519841
d 375769
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information

mathfinance.com
3. Zero Search Methods
Title Page

JJ II
1. Newton’s Method
J I 2. Heron’s Square Root Finder
Page 31 of 55
3. Exercise: Divisions without Dividing
Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information

mathfinance.com

Title Page

JJ II

J I

Page 32 of 55
Sir Isaac Newton
Go Back
1643 - 1727
Full Screen

Close

Quit
3.1. Newton’s Method
Numeral Systems
Vedic Mathematics
Given a differentiable function f (x) we want to deter-
Zero Search Methods mine x̂ such that
Credit Cards
Cryptography f (x̂) = 0. (6)
Definitions
Contact Information Starting with x0 we take the tangent to the curve
through the point (x0, f (x0)) and use its intersection
mathfinance.com with the x-axis x1 as a new starting point. We repeat
Title Page this method until no further changes occur. The recur-
JJ II sive relation is
J I f (xn)
xn+1 = xn − (7)
Page 33 of 55 f 0(xn)
Go Back
and the result is
Full Screen

Close
lim xn = x̂. (8)
n→∞
Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information

mathfinance.com

Title Page

JJ II

J I

Page 34 of 55

Go Back

Full Screen

Close
Newton’s Method - graphically
Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards 3.1.1. Problems
Cryptography
Definitions Problems can occur due to
Contact Information
1. multiple solutions
mathfinance.com
2. non convex f , reflection points
Title Page

3. solutions at extreme values


JJ II

J I 4. |f 0| = ∞
Page 35 of 55 5. pathological cases
Go Back

Full Screen

Close

Quit
3.1.2. Rate of Convergence
Numeral Systems
Vedic Mathematics Considering all these problems, why is Newton’s method
Zero Search Methods still so popular? The reason lies in the rate of conver-
Credit Cards
gence. Define the error by
Cryptography
Definitions ∆
Contact Information en = xn − x̂ (9)

mathfinance.com
From the definition of the Newton iteration, we have
Title Page en+1 = xn+1 − x̂
JJ II f (xn)
= xn − 0 − x̂
J I f (xn)
Page 36 of 55 f (xn)
= en − 0
Go Back f (xn)
Full Screen enf 0(xn) − f (xn)
= (10)
Close f 0(xn)
Quit
By Taylor’s Theorem, we have
Numeral Systems
0 = f (x̂) = f (xn − en) (11)
Vedic Mathematics
1
Zero Search Methods
= f (xn) − enf 0(xn) + e2nf 00(ξn) (12)
Credit Cards 2
Cryptography
Definitions where ξn is a number between xn and x̂. A rearrange-
Contact Information ment of this equation yields
1
mathfinance.com
enf 0(xn) − f (xn) = f 00(ξn)e2n (13)
Title Page
2
JJ II Putting this in (10) leads to
J I
1 f 00(ξn) 2 1 f 00(x̂) 2
Page 37 of 55 en+1 = 0
en ≈ 0
en = Ce2n (14)
2 f (xn) 2 f (x̂)
Go Back

Full Screen
This equation tells us that en+1 is roughly a con-
stant times e2n. This desirable state of affairs is called
Close
quadratic convergence.
Quit
Numeral Systems 3.2. Heron’s Square Root Finder
Vedic Mathematics
Zero Search Methods • Goldman Sachs standard interview question: Find
Credit Cards the square root of 17.
Cryptography
Definitions • The Greek Engineer Heron who lived sometime be-
Contact Information tween 100 B.C. and 100 A.D. had used the recursion
 
1 R
mathfinance.com
xn+1 = xn + (15)
Title Page
2 xn
JJ II to find the square root of R.
J I
• This is based on Newton’s method.
Page 38 of 55

Go Back
• Taking R = 17 and starting with x0 = 4 we
find x4 = 4.123105625617660549821409856 which
Full Screen
is correct to 28 figures.
Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
Definitions 3.3. Exercise: Divisions without Dividing
Contact Information
• Use Newton’s method to determine an algorithm
mathfinance.com that computes the reciprocal of a given number x,
Title Page
without ever performing any division.
JJ II • apply your method to compute 191 exact to 8 decimal
J I places.
Page 39 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
4. Credit Cards
Zero Search Methods
Credit Cards We follow An Introduction to the Mathematics of
Cryptography Money by Lovelock, Mendel and Wright [3].
Definitions
Contact Information •
9876
|{z} 5432
| 1987
{z 654} |{z}
3 (16)
mathfinance.com
BIN cardholder ID checksum
Title Page
• BIN: Bank Identification Number
JJ II

J I

Page 40 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
4. Credit Cards
Zero Search Methods
Credit Cards We follow An Introduction to the Mathematics of
Cryptography Money by Lovelock, Mendel and Wright [3].
Definitions
Contact Information •
9876
|{z} 5432
| 1987
{z 654} |{z}
3 (16)
mathfinance.com
BIN cardholder ID checksum
Title Page
• BIN: Bank Identification Number
JJ II

J I • More on http://en.wikipedia.org/wiki/
Page 40 of 55
Credit_card_numbers
Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
4. Credit Cards
Zero Search Methods
Credit Cards We follow An Introduction to the Mathematics of
Cryptography Money by Lovelock, Mendel and Wright [3].
Definitions
Contact Information •
9876
|{z} 5432
| 1987
{z 654} |{z}
3 (16)
mathfinance.com
BIN cardholder ID checksum
Title Page
• BIN: Bank Identification Number
JJ II

J I • More on http://en.wikipedia.org/wiki/
Page 40 of 55
Credit_card_numbers
Go Back • checksum: designed to protect against accidental
Full Screen
errors, not malicious attacks. How?
Close

Quit
Numeral Systems
Vedic Mathematics
4. Credit Cards
Zero Search Methods
Credit Cards We follow An Introduction to the Mathematics of
Cryptography Money by Lovelock, Mendel and Wright [3].
Definitions
Contact Information •
9876
|{z} 5432
| 1987
{z 654} |{z}
3 (16)
mathfinance.com
BIN cardholder ID checksum
Title Page
• BIN: Bank Identification Number
JJ II

J I • More on http://en.wikipedia.org/wiki/
Page 40 of 55
Credit_card_numbers
Go Back • checksum: designed to protect against accidental
Full Screen
errors, not malicious attacks. How?
Close • Luhn algorithm
Quit
4.1. The Luhn Algorithm
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information

Hans Peter Luhn


mathfinance.com

Title Page The Luhn algorithm or Luhn formula, also known as


JJ II
the modulus 10 or mod 10 algorithm, is a simple check-
sum formula used to validate a variety of identification
J I
numbers, such as credit card numbers and Canadian
Page 41 of 55
Social Insurance Numbers.
Go Back

Full Screen

Close

Quit
4.1. The Luhn Algorithm
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information

Hans Peter Luhn


mathfinance.com

Title Page The Luhn algorithm or Luhn formula, also known as


JJ II
the modulus 10 or mod 10 algorithm, is a simple check-
sum formula used to validate a variety of identification
J I
numbers, such as credit card numbers and Canadian
Page 41 of 55
Social Insurance Numbers.
Go Back

Full Screen It was created by IBM scientist Hans Peter Luhn and
Close
described in US Patent 2,950,048, filed on January 6,
1954, and granted on August 23, 1960.
Quit
4.1. The Luhn Algorithm
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information

Hans Peter Luhn


mathfinance.com

Title Page The Luhn algorithm or Luhn formula, also known as


JJ II
the modulus 10 or mod 10 algorithm, is a simple check-
sum formula used to validate a variety of identification
J I
numbers, such as credit card numbers and Canadian
Page 41 of 55
Social Insurance Numbers.
Go Back

Full Screen It was created by IBM scientist Hans Peter Luhn and
Close
described in US Patent 2,950,048, filed on January 6,
1954, and granted on August 23, 1960.
Quit
9876
|{z} 5432
| 1987 3
{z 654} |{z}
Numeral Systems BIN cardholder ID checksum
Vedic Mathematics
Zero Search Methods
Credit Cards 9 8 7 6 5 4 3 2 1
Cryptography
Definitions ×2 ↓ ×2 ↓ ×2 ↓ ×2 ↓ ×2 ↓
Contact Information
18 8 14 6 10 4 6 2 2
mathfinance.com

Title Page
9 8 7 6 5 4 add up
JJ II

J I ×2 ↓ ×2 ↓ ×2 ↓ digits
Page 42 of 55 9 16 7 12 5 8 82
Go Back

Full Screen Table 2: Example of the Luhn Algorithm


Close
Note: 18 counts as 1 + 8, i.e. count only the digits
Quit
Numeral Systems 9876
|{z} 5432
| 1987 3
{z 654} |{z}
Vedic Mathematics
BIN cardholder ID checksum
Zero Search Methods
Credit Cards • Add the checksum 3 to the 82 and obtain 85.
Cryptography
Definitions
Contact Information

mathfinance.com

Title Page

JJ II

J I

Page 43 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems 9876
|{z} 5432
| 1987 3
{z 654} |{z}
Vedic Mathematics
BIN cardholder ID checksum
Zero Search Methods
Credit Cards • Add the checksum 3 to the 82 and obtain 85.
Cryptography
Definitions • If the new total is divisible by 10, then the credit
Contact Information
card number has passed the validation test.
mathfinance.com

Title Page

JJ II

J I

Page 43 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems 9876
|{z} 5432
| 1987 3
{z 654} |{z}
Vedic Mathematics
BIN cardholder ID checksum
Zero Search Methods
Credit Cards • Add the checksum 3 to the 82 and obtain 85.
Cryptography
Definitions • If the new total is divisible by 10, then the credit
Contact Information
card number has passed the validation test.
mathfinance.com • our number fails, whereas
Title Page

JJ II |{z} 5432
9876 | 1987
{z 654} |{z}
8
J I
BIN cardholder ID checksum
Page 43 of 55
passes.
Go Back

Full Screen

Close

Quit
Numeral Systems 9876
|{z} 5432
| 1987 3
{z 654} |{z}
Vedic Mathematics
BIN cardholder ID checksum
Zero Search Methods
Credit Cards • Add the checksum 3 to the 82 and obtain 85.
Cryptography
Definitions • If the new total is divisible by 10, then the credit
Contact Information
card number has passed the validation test.
mathfinance.com • our number fails, whereas
Title Page

JJ II |{z} 5432
9876 | 1987
{z 654} |{z}
8
J I
BIN cardholder ID checksum
Page 43 of 55
passes.
Go Back

Full Screen
• Note: Amex has one digit less and starts with the
second digit.
Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
4.2. Exercises
Credit Cards
Cryptography
1. Implement the Luhn-Algorithm in Excel.
Definitions
Contact Information
2. Apply the Luhn-Algorithm to your own credit card
number.
mathfinance.com 3. In your group think of a credit card number and
Title Page ask another group to verify it.
JJ II
4. Does the Luhn Algorithm pick up any incorrect en-
J I try of a single digit?
Page 44 of 55
5. Will the Luhn Algorithm pick up any incorrect
Go Back transposition of adjacent digits?
Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
5. Cryptography
Cryptography
Definitions 1. The Inventors of the RSA-Algorithm
Contact Information
2. Method
mathfinance.com
3. Examples
Title Page
4. Exercise
JJ II

J I

Page 45 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
5. Cryptography
Cryptography
Definitions 1. The Inventors of the RSA-Algorithm
Contact Information
2. Method
mathfinance.com
3. Examples
Title Page
4. Exercise
JJ II

J I

Page 45 of 55

Go Back 5.1. The Inventors of the RSA-Algorithm (1978)


Full Screen
Ron Rivest, Adi Shamir, and Leonard Adleman [5]
Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information

mathfinance.com

Title Page
Ronald L. Rivest
JJ II Andrew and Erna Viterbi Professor of Electrical Engi-
J I neering and Computer Science in MIT’s Department of
Page 46 of 55
Electrical Engineering and Computer Science
Go Back
http://theory.lcs.mit.edu/~rivest/
Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information

mathfinance.com

Title Page
Adi Shamir
JJ II
Paul and Marlene Borman Professor of Applied Math-
J I
ematics at Weizmann Institute
Page 47 of 55

Go Back
http://www.weizmann.ac.il/math/profile04/
scientists/shamir-prof04.html
Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Cryptography
Definitions
Contact Information

mathfinance.com

Title Page
Professor Leonard Adleman
JJ II
Department of Computer Science University of South-
J I ern California
Page 48 of 55
http://www.usc.edu/dept/molecular-science/
Go Back
fm-adleman.htm
Full Screen

Close

Quit
5.2. Method
We follow Francis Litterio’ instructions on http://
world.std.com/~franl/crypto/rsa-guts.html.
Numeral Systems
Vedic Mathematics 1. Find P and Q, two large (e.g., 1024-bit) prime num-
Zero Search Methods bers.
Credit Cards
Cryptography 2. Choose E ∈]1, P Q[, no prime factors in common
Definitions with (P − 1)(Q − 1).
Contact Information

3. Compute D (the multiplicative inverse) such that


mathfinance.com DE = 1 mod (P − 1)(Q − 1). (Find an integer X
Title Page
which causes D = (X(P − 1)(Q − 1) + 1)/E to be
JJ II
an integer, then use that value of D.)
J I 4. The encryption function is C = T E mod P Q,
Page 49 of 55
where C is the ciphertext (a positive integer), T
is the plaintext (a positive integer). The message
Go Back
being encrypted, T , must be less than the modulus,
Full Screen
P Q.
Close
5. The decryption function is T = C D mod P Q,
Quit
where C is the ciphertext (a positive integer), T
is the plaintext (a positive integer).
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Your public key is the pair (P Q, E). Your private key
Cryptography is the number D (reveal it to no one). The product P Q
Definitions is the modulus (often called N in the literature). E is
Contact Information
the public exponent. D is the secret exponent.
mathfinance.com

Title Page

JJ II

J I

Page 50 of 55

Go Back

Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods
Credit Cards
Your public key is the pair (P Q, E). Your private key
Cryptography is the number D (reveal it to no one). The product P Q
Definitions is the modulus (often called N in the literature). E is
Contact Information
the public exponent. D is the secret exponent.
mathfinance.com
You can publish your public key freely, because there
Title Page
are no known easy methods of calculating D, P , or
JJ II Q given only (P Q, E) (your public key). If P and Q
J I are each 1024 bits long, the sun will burn out before
Page 50 of 55
the most powerful computers presently in existence can
factor your modulus into P and Q.
Go Back

Full Screen

Close

Quit
5.3. Examples
Numeral Systems prime 1 P 5 11 37 61
Vedic Mathematics prime 2 Q 7 7 41 53
Zero Search Methods
Credit Cards
public modulus N = PQ 35 77 1517 3233
Cryptography P −1 4 10 36 60
Definitions
Q−1 6 6 40 52
Contact Information
(P − 1)(Q − 1) 24 60 1440 3120
mathfinance.com public exponent E 5 7 7 17
Title Page inverse of E D 5 43 823 2753

JJ II check DE 25 301 5761 46801

J I check DE − 1 24 300 5760 46800

Page 51 of 55
check [DE − 1]/[(P − 1)(Q − 1)] 0 0 0 0

Go Back
plaintext T 5 6 100 123
encryption function C = T E mod P Q 10 41 1062 855
Full Screen

decryption function T = C D mod P Q 5 6 100 123


Close

Quit
Numeral Systems
Vedic Mathematics
Zero Search Methods 5.4. Exercise
Credit Cards
Cryptography 1. Set up an RSA tool in Excel/VBA and verify the
Definitions examples.
Contact Information
2. Take two prime numbers P and Q between 100
mathfinance.com and 200, e.g. from http://primes.utm.edu and
Title Page
compute E and D.
JJ II 3. Based on a plain text of your choice compute its
J I ciphertext.
Page 52 of 55 4. Give your public key and the ciphertext to the next
Go Back group and determine the plaintext of another group.
Full Screen

Close

Quit
Numeral Systems
Vedic Mathematics
6. Definitions
Zero Search Methods
Credit Cards 6.1. Prime Numbers
Cryptography
Definitions a number that can only be divided evenly by 1 and the
Contact Information number itself.
mathfinance.com
6.2. Modulus
Title Page

JJ II For integers K, R and N the equation


J I
K = R mod N (17)
Page 53 of 55

Go Back
means that R is the remainder of the division of K by
N or alternatively there exists an integer L such that
Full Screen

Close N · L + R = K. (18)
Quit
7. Contact Information
Numeral Systems
Vedic Mathematics
Professor Dr. Uwe Wystup
Zero Search Methods
Credit Cards
Ansua Dutta-Wystup
Cryptography Managing Directors
Definitions
Contact Information
MathFinance AG
Mainluststraße 4
mathfinance.com
60329 Frankfurt am Main
Title Page
Germany
JJ II Phone +49-700-MATHFINANCE
J I More papers are available at
Page 54 of 55
http://www.mathfinance.com/wystup/papers.
php
Go Back
These slides and handouts are available at
Full Screen http://www.mathfinance.com/seminars/vedic.
Close php
Quit
References
Numeral Systems [1] Burden, R. L. and Faires, J. D. (1993). Numerical analysis. PWS
Vedic Mathematics Publishing Company.
Zero Search Methods
[2] Datta, B. and Singh, A.N. (1962). History of Hindu Mathematics.
Credit Cards
Asia Publishing House, Calcutta.
Cryptography
Definitions [3] Lovelock, D., Mendel, M. and Wright, A.L. (2007). An Intro-
Contact Information duction to the Mathematics of Money, Springer, New York.

[4] Maharaja, Bharati Krsna Tirthaji (1992). Vedic Mathematics, Moti-


mathfinance.com lal Banarsidass Publishers Private Ltd, Delhi.
Title Page [5] Rivest, R.L., Shamir, A. and Adleman, L.M. (1978). A Method for
JJ II
Obtaining Digital Signatures and Public-Key Cryptosystems. Commu-
nications of the ACM 21,2, 120–126.
J I
[6] Schonard, A. and Kokot, C. (2006). Der Matheknüller. http://
Page 55 of 55 www.matheknueller.de.
Go Back [7] Williams, K.R. (2002). Vedic Mathematics - Teacher’s Manual. Ad-
vanced Level. Motilal Banarsidass Publishers Private Limited, Delhi.
Full Screen
http://www.mlbd.com
Close

Quit
Numeral Systems Index
Vedic Mathematics
Zero Search Methods
bank identification number (BIN), 40 prime number, 53
BIN, 40
Credit Cards quadratic convergence, 37
Cryptography division, 18, 21
Definitions dual system, 3 RSA-Algorithm, 45
Contact Information duplex, 26
square root, 25
dvandvayoga, 26
squares, 16
mathfinance.com ekadhika, 21 sutras, 7

Title Page Heron’s Square Root Finder, 38 vedas, 6


hexadecimal system, 3
JJ II
Luhn algorithm, 41
J I
Maya numerals, 3
Page 56 of 55
modulus, 53
Go Back multiplication, 9

Full Screen Newton’s Method, 33


numeral systems, 3
Close
osculator, 21
Quit

You might also like