Knot Theory

By Nethania Okyere, Rachel Rozansky, Ashleigh Taylor, and Sylvia Towey

Knot Theory

The knot theory are two mathematical branches of topology. Its simply a loop in 3 dimensional space( doesn’t intersect itself). Knots can be described in various ways. Given a method of description, however, there may be more than one description that represents the same knot. For example, a common method of describing a knot is using a knot diagram. Any given knot can be drawn in many different ways using a knot diagram.

1knots knot theory

Continue reading

The Art of Cryptography

By: Nia Beverly, Makayla McDaniel, Yuanyuan Matherly, and Tyler Deegan


Cryptography is defined as the art of writing and solving codes. Upon first thought, many people picture codes as an antiquated war time communication technique. However, the field of cryptography is alive and well,  and it has become pervasive in our everyday lives. The world is becoming more and more connected through technology, and with this, there is a greater need to protect information. Encryption is probably the most widely used application of cryptography, and it is used to protect information by making it so only one person with a key can understand what is transmitted. In the following paragraphs we will walk through the steps to mathematically understanding one widely used type of encryption.

Continue reading

Real World Cryptography

By: Shai Caspin, Natalie Bowers, Bryana Dorsey, Nia Pierce, and Cana Perry

Cryptography is the act of encrypting and decrypting codes. It’s used to pass secret messages and keep outsiders from accessing information. Math is used to help encrypt codes using different methods. One common methods is to use RSA encryptions, which uses prime numbers and mod functions to make deciphering impossible. RSA encryptions are so successful since factoring large numbers into their prime factors is incredibly difficult, and there is yet a way to do so quickly and efficiently. 

We were all very interested in learning more about cryptography since it incorporates everyday math with real-world problems and situations.

Continue reading

Elliptic Curve Cryptography

By Noa Bearman, Kimberly Cruz Lopez, Tina Lin, Xintong Xiang, and Maria Neri Otero*

*Maria helped the group work through the problem set but was unfortunately unable to attend camp during the blog writing.

Screen Shot 2017-06-29 at 1.50.17 PM


Have you ever tried to send a secret message to a friend? Did it work? Was it secure? Well, one way to do so in a more secure way is by using Elliptic Curve Cryptography (ECC). Most people have never heard of ECC before, and two weeks ago, neither did we. However, in the past two weeks, we have been learning how to use this exciting application of the techniques of algebraic geometry and abstract algebra applied to the ancient art of keeping messages secure. ECC was first introduced by Victor Miller and Neal Koblitz in 1985. It was proposed as an alternative to other forms of cryptography with public-key systems such as DSA and RSA. Public-key systems involve the use of two different kinds of keys: a public key that is available to the public and a private key in which only the owner knows. The applications of ECC has been growing and has recently gained a lot of attention in industry and academia. The following information below will go more in-depth on what ECC is, how it works, its advantages, its disadvantages, and our progression throughout this course.

Continue reading


By Elizabeth Datskevych, Nina Hadley, Sabrina James, and Rachel Ruff

In our problem set for the classification of surfaces, we learned many things about dimensions, folding, and the shapes folding makes. First we learned about what a dimension is. The definition of a dimension in this math is the direction an object can go. For example a bird can go up/down, left/right, and back/forth. Next we learned about folding and twisting objects. Diagram A shows a square with arrows on its side, which are the directions to fold. When you fold you match the arrows according to if they look-alike. So when you fold Diagram A it makes a cylinder. Now Diagram B has one arrow pointing the opposite of the other so you would twist before connecting the sides. Diagram B makes a Mobius band. We could make other shapes using the arrows such as the Klein bottle, and the torus. This topic was very fun and cool and it is a subject everyone will enjoy!!!!!!!!!!!!!!!!!!!!!!!#girlstalkmath #girlsrock #blog2017

Mathematical Modeling (Fluid Dynamics)

By: Annie Huang, Heesue Kim, Sophie Gilliam, and Sylvia Towey

Hi guys!

Welcome to the Girls Talk Math blog today! This blog is to show you guys what we have learned and accomplished with fluid dynamics. At first, we (Annie, Heesue, Sophie, Sylvia) thought this was a very difficult topic but after some explanation and experiment, we learned how easy it is to work with the different topics thanks to the Girls Talk Math Camp held on the UNC Chapel Hill campus. Today we will be giving you a brief intro to mathematical modeling, Bernoulli’s principle, Dimensional Analysis, and Projectile motion.

Continue reading

Special Relativity

By Katie Clark, Tori Dunston, Kelly Fan, Abrianna Macklin, and McKenna Vernon

Picture a hummingbird. At any moment, it can go in any of the three dimensions it is a part of. So, it could go up and down, forwards and backwards, or left and right. But, one thing that is not taken into account is time. As it moves through space, it is also occupying time. However, we’re not used to thinking about our world in a four dimensional sense. But, as the movement of the pigeon progresses, so does time. This is known as the relationship between space and time, and it is the primary foundation that special relativity is built on. So, at any given moment, it actually can move in four dimensions at once. This can be simply modeled using a spacetime diagram.


Continue reading

RSA Encryption Cryptography

By Divya Aikat, Helena Harrison, Annie Qin, and Quinn Shanahan

The definition of cryptography is the art of writing and solving code. However, over the last two weeks, we learned so much more than just this textbook explanation. While working together within our team, we explored many different aspects behind cryptography. By building off our individual strengths, we prepared ourselves for higher level mathematics. The following is a synopsis of the progress we’ve made over the past two weeks.

Continue reading

Quantum Mechanics

By Kathryn Benedict, Olivia Fugikawa, Denna Huang, and Eleanor McAdon


Quantum mechanics is a subfield of physics. Like with any other major area of study, physics is divided into many smaller categories. Classical physics is the main one, which includes Newton’s Laws of Motion and basic principles of mechanics, like inertia and friction. Things get weird when you delve into modern physics, which includes special relativity, general relativity, and quantum mechanics. Special relativity deals with particles moving at the speed of light, general relativity works with incredibly massive objects and quantum mechanics is the physics of subatomic particles. This is what we worked on for the past two weeks and what our blog post is about!

Continue reading