0% found this document useful (0 votes)
34 views13 pages

Presentation1 GRP

Uploaded by

Armghan Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views13 pages

Presentation1 GRP

Uploaded by

Armghan Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

ARMGHAN ALI

25242
GROUP THEORY
Group theory, in modern algebra, the study of
groups, which are system consisting of a set of
elements and a binary operation that can be
applied on two element of the set, which together
satisfy certain axioms
•Group closed
•Associative law
•Commutative law
APPLICATION OF GROUP THEORY

•Discrete mathematics
•Cryptography
•Computer science
•Biology
•Chemistry and material science
•Physics
•Combinatorics
•Harmonic analysis
•Algebraic number theory
•Algebraic geometry
•Algebraic geometry
•Algebraic topology
•Galois theory
•Music
•Political science
DISCRETE MATH

•In discrete mathematics and science, group theory


is used to study algebraic structures, which are
known as groups

COMPUTER SCIENCE

In mathematics, computational group theory is the study of groups by


means of computers. It is concerned with designing and analysing algorithms
and data structures to compute information about groups.
PHYSICS

In physics, groups are important because they describe the symmetries


which the laws of physics seem to obey. According to Noether's theorem, every
continuous symmetry of a physical system corresponds to a conservation law of
the system.

COMBINATORICS

Applications of Group Theory to Combinatorics will be useful in the study of


graphs, maps and polytopes having maximal symmetry, and is aimed at
researchers in the areas of group theory and combinatorics, graduate students
in mathematics, and other specialists who use group theory and combinatorics
POLITICAL SCIENCE

The importance of group approach in political science has been recognized for
centuries. The group approaches examine the importance of role that people
hold in the political system as well as the relationship between the action of
collective group and its impact on the political behavior.

BIOLOGY

Cell Cycle and Multi-Nucleated Cells. Cell cycle is an


example of a natural application of group theory because of
the cyclic symmetry governing the process. The steps in the
cell cycle include G1 → S → G2 →M, and back to G1. In some
cases G0 is essentially so brief as to be nonexistent so we will
ignore that state.
CHEMISTRY

As the structure and behavior of molecules and crystals depend on their different
symmetries, group theory becomes an essential tool in many important areas of
chemistry. It is a quite powerful theoretical tool to predict many basic as well as
some characteristic properties of molecules.
cryptography

An original message is known as plain text, while the coded


message is known is known as the cipher text. A process that
is used for converting from plain text to cipher text is known
as enciphering or encryption. Restoring the plain text from
the cipher text is enciphering or decryption.

There are many schemes used for encryption constitute the


area of study known as cryptography, such a scheme is
known as cryptographic system or a cipher. Now the question
arises how to deciper a message.
The various techniques which are used for deciphering a
message without any knowledge of the enciphering details fall
into the area of crypt analysis. In the basic communication
scenario, it is assumed that there are two parties, assume that the
name of party is A and B for the sake of simplicity. Now A and B
wants to communicate with each other. A third party C is a
potential eavesdropper. When A wants to send a message, called
the plain text, to B, she encrypts it using a method prearranged
with B. Usually, the encryption method is assumed to be known
to C; what keeps the message secret is a key.
When B receives the encrypted message, called the cipher text ,
he changes it back to the plaintext using a decryption key.
While doing all of these things it is assumed that C should have
one of the following goals:
1. Message to be Read.
2. With the help of key read all messages encrypted with that key.
3. Corrupt A’s message into another message in such a way that B
will think A sent the altered message.
4. Masquerade as A, and thus communicate with B even though B
believes he is communicating with A.

The main technique used in Cryptography is based on Encryption


and decryption.

You might also like