The shocking behaviour of moving fluids

Figure 1: The shock wave caused by a supersonic jet.

Originating authors are David Mumford and Christiane Rousseau.

Foreword: This vignette is more difficult than others. However, in a few pages, it tells you how to explain in simple terms one of the most difficult open problems at the beginning of the 21st century. The vignette contains enrichment material, that you can choose to read or skip. The editors of the Klein blog hesitated for a while posting this vignette. After testing it with teachers during two Klein workshops, who expressed that they enjoy being challenged by more difficult vignettes, they decided to test it on the blog. They are eager to hear your comments, and if some of you were motivated by this topic.

You have probably heard some planes breaking the sound barrier. What does that mean? It means that a shock wave in the atmosphere is created as in Figure 1. But what is a shock wave? Imagine heavy traffic on highways as a wave. A shock wave corresponds to collisions. To explain this, we develop our intuition with a 1D model: traffic on a one lane road at different speeds. You know that collisions could occur if drivers do not adjust their speed. The atmosphere is a fluid, and traffic is a rough model of 1D fluid which is convenient to develop our intuition. Under which conditions do shock waves or other singularities occur in fluids? A million dollar prize is offered for answering this question. This is what we are going to explain you.

Continue reading

Posted in Mathematics Within the Last 100 Years, Vignette | Leave a comment

Public-key cryptography

Originating authors are Graeme L. Cohen (University of Technology, Sydney), Steven Galbraith (University of Auckland) and Edoardo Persichetti (University of Auckland).
How can we safely send our credit card details over the internet, or using a mobile phone, when others can intercept our messages? How can we trust software updates, when we know that computer viruses are common? Cryptography (the study of techniques for secure communication in the presence of adversaries) provides answers to these questions, and mathematics provides its foundations.

Continue reading

Posted in Mathematics Within the Last 100 Years, Vignette | Leave a comment

A tale of two triangles: Heron triangles and elliptic curves

Originating author is William Mc Callum.
If two triangles have the same area and the same perimeter, are they necessarily congruent? It turns out that the answer is no. For example, the triangle with sides 3, 4, and 5 has the same area and perimeter as the triangle with sides 41/15, 101/21, and 156/35.

Continue reading

Posted in Mathematics Within the Last 100 Years, Vignette | 6 Comments

两个三角形的故事:海伦三角形和椭圆曲线


(王婷 译 李建华 校 北京师范大学数学科学学院)

Continue reading

Posted in Uncategorized | Leave a comment

SXEOLF NHB FUBSWRJUDSKB (PUBLIC KEY CRYPTOGRAPHY)

The need to create secure codes is said to go back to Julius Caesar, who moved letters in his messages up by three through the alphabet. That is encoding. How would you decode such a message?

Modern day cryptography, which is the art of coding and decoding messages, has taken on a new relevance with computer transfer of information, and it retains its traditional relevance in military settings. It makes use of a public key, which does not require its users to share a key as this would, make their coded message susceptible to attack.

Traditional number theory has produced a number of means of securely coding messages, but “securely” is a relative term. Modern methods depend on the simple ability to multiply two large numbers together and the very difficult problem of finding those factors given only their product. Continue reading

Posted in Vignette | Leave a comment

Weitere Klein-Artikel in in anderen Sprachen verfügbar:

Englisch, Französisch, …

Posted in Uncategorized | Leave a comment