An NCTM Illuminations Lesson. Please cut out the two circles on the Caesar Shifter Activity Sheet in your packet.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
Section 3.6: An Introduction to Cryptography
Dan Boneh Introduction History Online Cryptography Course Dan Boneh.
Welcome back! It’s spring…or supposed to be MAT199: Math Alive Cryptography Ian Griffiths Mathematical Institute, University of Oxford, Department of.
Go to READ the DIRECTIONS Try Path 1 and Path 2
MAT 1000 Mathematics in Today's World Winter 2015.
Alan Turing and Code Breaking
a connection between language and mathematics
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Encryption: A Brief History Author: Margery Waldron.
Keeping Secrets with Digital Technology Information Assurance Program Anderson School of Management.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
Secret Codes.  A code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers to send messages or store.
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
© A+ Computer Science - Codes and ciphers have existed for hundreds of years. People have always had the need to hide secrets.
Section 2.5 Polyaphabetic Substitutions
MAT 1000 Mathematics in Today's World Winter 2015.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Cryptography : from substitution cipher to RSA Alex Karassev.
CS 150 – Computing: From Ada to the Web Cryptography.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
CRYPTOGRAPHY. DEFINITION Cryptography is the science of writing in secret code The earliest documented use began around 2,000 B.C in Egypt (Hieroglyphics)
Introduction to Cryptography and Secure Communications  What is cryptography?  Encryption  Decryption.
Code Making/Breaking. What methods have you seen for encoding secret messages?
Week 3. Day 1 – Meet the Word Part “Divide and Conquer” Day 1.
Codename: ULTRA Can your mathematical skills save the United Kingdom from defeat and invasion?
Encryption with Keys and Passwords
Key words: Intercept | Decipher | Translate
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cryptography & Security
Forensic Science Questioned Documents: Part 3
Section 2.7 The Friedman and Kasiski Tests
Networks Encryption.
Lesson 4-5 AP Computer Science Principles
In this lesson we will understand:
Cryptography and Network Security Sixth Edition by William Stallings.
World War One Communication
Lesson 5: Simple Encryption
Julius Caesar in Iambic
History of Cryptography
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
By William Shakespeare
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Codename: ULTRA Can your mathematical skills save the United Kingdom from defeat and invasion?
PART VII Security.
Encryption with Keys and Passwords
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
LO: Use logic and frequency analysis to read and write in code.
Cryptography “The Secret Code Language”
Simple Encryption- Lesson 5
Substitution Codes By Sarah Bonnell.
Cryptography Cryptography is derived from the Green word ‘kryptos’
Encryption with Keys and Passwords
Cryptography a Presentation Prepared by Vytautas Kondratas.
Lesson 7: Simple Encryption
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Cryptography: Cesar Cipher
Welcome to semester 2. Midterm Pass-back tomorrow
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
Digital Communications
Traditional Symmetric-Key Ciphers
By Sean O’Mahoney from the Computing Society at Futures Friday
WORLD OF WONDERS : THE ENIGMA MACHINE
Double Transpositions
Cryptography: from substitution cipher to RSA
Presentation transcript:

An NCTM Illuminations Lesson

Please cut out the two circles on the Caesar Shifter Activity Sheet in your packet.

Enigma Machine Used to encode messages during WWII. With substantial aid from Poland, the Allies were able to break the code and read German messages.

Morse Code: Designed for coding efficiency. The length of each coded letter is inversely proportional to its frequency of occurrence in English.

Secret Decoder Ring These rings became popular in the 1930’s as premiums for children who were fans of the radio program Little Orphan Annie.

I am on fire and have dangerous cargo on board Man Overboard U.S. Navy Signal Flags

Deciphering a Simple Coded Message Today you will learn about codes.

Use Letter Frequency Analysis TFNRIUJ UZV DREP KZDVJ SVWFIV KYVZI UVRKYJ; KYV MRCZREK EVMVI KRJKV FW UVRKY SLK FETV. Cowards die many times before their deaths; The valiant never taste of death but once. Julius Caesar by William Shakespeare

Which letter occurred most often? Which letter occurred the second most times? Which letter occurred the third most times? Notice the similarity of the word before the semi-colon and the first word on the last line. ‘V’ occurred 13 times ‘K’ occurred 9 times ‘R’ occurred 7 times

The Caesar Cipher Julius Caesar is thought to have used this method to communicate with officers in the Roman army. Caesar would inform his generals what the shift was, so they would be the only ones who could read the encrypted message.

Pretend you are Julius Caesar. You are conducting a meeting about sending encrypted messages. You have decided to use a shift of 7 units. What letter replaces ‘A’?

Use your Caesar Shifter to encrypt this message: ROME IS THE GREATEST EMPIRE YVTL PZ AOL NYLHALZA LTWPYL

Your generals receive this message: YVTL DHZ UVA IBPSA PU H KHF. What does the message say? Rome was not built in a day.

The Caesar Cipher was eventually discarded. Why do you think it was discarded?

A coded message included in a short story titled The Adventure of the Dancing Men by Sir Arthur Conan Doyle. Connect to Literature: Edgar Allen Poe was also fond of using secret messages in his stories.

a polyalphabetic cipher as opposed to a substitute cipher Rome is the Greatest Empire math ma thm athmathm athmat Encode this message using your copy of the Vigenere Grid.

DOFL US MOQ GKLMTXZF EFWURX What makes the Vigenere Cipher more difficult for code breakers? What letters were used to replace ‘E’? Perform a Frequency Analysis to see which letters occur most often.

How many different ways can a message be encoded using the Vigenere Cipher? How many different ways can a message be encoded using the Caesar Cipher? n

This message is written using the Vigenere Code. The keyword is ‘code’. OOWL KG HZGFBAJSUI Decode the message.

Encode a message using the Vigenere Cipher. algebra