0% found this document useful (0 votes)
63 views

MCR3U Tuesday May 25th, 2010 Introduction To Inverse of A Function

This document discusses inverse functions using encryption and decryption as an example. It shows that encrypting a message and then decrypting it returns the original message. It represents the encryption and decryption processes algebraically as functions f(x) = x + 3 for encryption and f^-1(x) = x - 3 for decryption. The document also provides an example of a "number trick" that algebraically returns the original number and challenges the reader to create their own algebraic number trick with both an encryption and decryption process.

Uploaded by

api-25935812
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

MCR3U Tuesday May 25th, 2010 Introduction To Inverse of A Function

This document discusses inverse functions using encryption and decryption as an example. It shows that encrypting a message and then decrypting it returns the original message. It represents the encryption and decryption processes algebraically as functions f(x) = x + 3 for encryption and f^-1(x) = x - 3 for decryption. The document also provides an example of a "number trick" that algebraically returns the original number and challenges the reader to create their own algebraic number trick with both an encryption and decryption process.

Uploaded by

api-25935812
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

MCR3U ­ Tuesday May 25th, 2010

Introduction to Inverse of a Function

ABCDEFGHIJKLMNOPQRSTUVWXYZ
KEY => DEFGHIJKLMNOPQRSTUVWXYZABC

Encrypt ("Jessica") =  "MHVVLFD"
Decrypt("MHVVLFD") = "Jessica"
Decrypt[Encrypt("Jessica")] = "Jessica"

We would consider the Encrypt and Decrypt processes as 
inverses of each other.

Note:  for the remainder of this example, we are going to 
consider strings that only consist of the letters A through W so 
that we don't have to worry about wrapping around the letters 
XYZ to the letters ABC.

If we use numbers to represent the letters in the initial string, we 
could represent the encryption and decryption processes in the 
following way:

Encrypt (Input) = Input + 3
Decrypt(Input) = Input ­ 3

or using function notation ...

f (x) = x + 3  {Encrypt}
g (x) = x ­ 3 {Decrypt}

Instead of introducing another letter g, we can use notation that 
connects the two functions since one is the inverse of the other:

f ­1(x) = x ­ 3 {Decrypt}

Notice that instead of Decrypt(Encrypt("Jessica")) = "Jessica", 
we can now write:

f­1( f ("Jessica")) = "Jessica"

1
Consider the following number trick:

1. Pick any number
2. Add 2 to this number
3. Double the previous result.
4. Add 2 to the previous result.
5. Take half of the previous result.
6. Subtract three from the previous result.

You should arrive at your initial number in step 1.  
Why did this work?

1. Pick any number  =>  x
2. Add 2 to this number  => x + 2
3. Double the previous result.  =>  2(x + 2) = 2x + 4
4. Add 2 to the previous result. => 2x + 6
5. Take half of the previous result. => [2x + 6]/2 = x + 3
6. Subtract three from the previous result. => x

This would not be a very good encryption process as it would 
encrypt a character back onto itself.

Try creating your own number trick similar 
to above.  Once you have it created, try to 
describe the process algebraically.  Test 
your algebraic model to make sure that it 
gives you the same result as before.  
Finally, try to create a decryption function 
algebraically and check to make sure that 
it works properly.

2
Try creating your own number trick similar 
Try creating your own number trick similar 
to above.  Once you have it created, try to 
to above.  Once you have it created, try to 
Try creating your own number trick similar 
describe the process algebraically.  Test 
describe the process algebraically.  Test 
to above.  Once you have it created, try to 
your algebraic model to make sure that it 
your algebraic model to make sure that it 
Try creating your own number trick similar 
describe the process algebraically.  Test 
gives you the same result as before.  
gives you the same result as before.  
to above.  Once you have it created, try to 
your algebraic model to make sure that it 
Finally, try to create a decryption function 
Finally, try to create a decryption function 
describe the process algebraically.  Test 
gives you the same result as before.  
algebraically and check to make sure that 
algebraically and check to make sure that 
your algebraic model to make sure that it 
Finally, try to create a decryption function 
it works properly.
it works properly.
gives you the same result as before.
algebraically and check to make sure that 
it works properly.

You might also like