1 00:00:00,000 --> 00:00:00,090 2 00:00:00,090 --> 00:00:00,135 [VIDEO PLAYBACK] 3 00:00:00,135 --> 00:00:03,430 DAVID MALAN: You can still get it, apparently, on Amazon, as we did here. 4 00:00:03,430 --> 00:00:05,305 But the motivation here was to introduce cryptology-- 5 00:00:05,305 --> 00:00:05,610 [END PLAYBACK] 6 00:00:05,610 --> 00:00:06,540 DOUG LLOYD: So this is really the first time 7 00:00:06,540 --> 00:00:09,720 we introduce a domain-specific problem in the course as opposed 8 00:00:09,720 --> 00:00:11,790 to the sort of back of the textbook problems. 9 00:00:11,790 --> 00:00:14,040 DAVID MALAN: Yeah, and that's exactly the motivation. 10 00:00:14,040 --> 00:00:16,320 I feel like too many textbooks and curricula 11 00:00:16,320 --> 00:00:20,190 use fairly uninspiring problems to reinforce material 12 00:00:20,190 --> 00:00:23,490 that may very well be good mechanical practice, but don't really excite 13 00:00:23,490 --> 00:00:27,870 and don't really help you see the application of these fundamentals 14 00:00:27,870 --> 00:00:28,530 to a problem. 15 00:00:28,530 --> 00:00:31,196 DOUG LLOYD: You think that's one of the biggest pieces of advice 16 00:00:31,196 --> 00:00:35,280 you'd give to a teacher is to try and make these problems more relatable 17 00:00:35,280 --> 00:00:38,210 or connect them to things that students have seen in the past? 18 00:00:38,210 --> 00:00:39,210 DAVID MALAN: I think so. 19 00:00:39,210 --> 00:00:42,210 And it isn't even necessarily relatable, because many students might not 20 00:00:42,210 --> 00:00:44,310 have dabbled in any form of cryptography before, 21 00:00:44,310 --> 00:00:48,660 but most everyone can understand the idea of or the need for encryption 22 00:00:48,660 --> 00:00:52,360 in some cases, even if it's like little secret messages being passed in class. 23 00:00:52,360 --> 00:00:56,250 But I think creating an exciting and in a learning 24 00:00:56,250 --> 00:00:59,889 domain in which to explore ideas and packaging problems in a way that really 25 00:00:59,889 --> 00:01:03,180 does resonate with students, especially when they're so increasingly surrounded 26 00:01:03,180 --> 00:01:04,429 with technology themselves. 27 00:01:04,429 --> 00:01:06,720 And they have passwords and encryption on their phones, 28 00:01:06,720 --> 00:01:10,202 and helping them appreciate the fact that those are not inaccessible ideas. 29 00:01:10,202 --> 00:01:11,660 They themselves can implement them. 30 00:01:11,660 --> 00:01:13,360 DOUG LLOYD: Right. 31 00:01:13,360 --> 00:01:15,696