•□♎♏• ♋■♎ •♓•♒♏❒• (Codes and Ciphers)

Slides:



Advertisements
Similar presentations
Introduction to the Cartesian Plane
Advertisements

DPEFT, DJQIFST boe TFDSFU XSJUJOH.. If for each letter, you instead write the letter before it in the alphabet, you will discover what we are doing this.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Section 2.4 Transposition Ciphers Definition: A Transposition Cipher is a cipher in which the plaintext message is rearranged by some means agreed upon.
Section 3.6: An Introduction to Cryptography
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
a connection between language and mathematics
“To Be, or Not To Be” From Hamlet By: William Shakespeare 10/30  “To be, or not to be: that is the question:  Whether ‘tis nobler in the mind to suffer.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Categories of Ciphers Substitution ciphers - replace letters in the plaintext with other letters or symbols, keeping the order in which the symbols fall.
Symmetric-Key Cryptography
Traditional Symmetric-Key Ciphers
Section 2.5 Polyaphabetic Substitutions
“To be or not to be, that is the question. Whether 'tis nobler in the mind to suffer the slings and arrows of outrageous fortune, or take arms against.
BY J.STEPHY GRAFF IIMSC(C.S). 1.Inroduction 2.What is a columnar transposition? 3. Methods of Transposition 4.Colunmar transposition ciphers 5.Double.
Functional Skills Code Breaking LO: Use logic and frequency analysis to read and write in code.
ROT13 cipher. The ROT13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. Example: all 'A's.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Week 3. Day 1 – Meet the Word Part “Divide and Conquer” Day 1.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
What is accessible information? On the next slide we will show you a few examples. It is information that everyone can understand.
Last Minute Tips for the English I EOC. Textual Analysis: Read the passage! You don't want to. There's a little voice inside of you that says, "Just look.
Literary Conflict. Depending on how it is defined, there can be many different types of literary conflict. The same types of conflict are used in most.
Mental Arithmetic Strategies Scotts Primary School. Mental Arithmetic Scheme.
Codename: ULTRA Can your mathematical skills save the United Kingdom from defeat and invasion?
Top tips and techniques
Substitution Ciphers.
Egyptian Writing Hieroglyphics.
Mental Arithmetic Strategies
CRYTOGRAPHY PIGPEN CIPHER.
TRANSPOSITION CYPHER.
Key words: Cryptography | Binary | Cipher
Introduction To Cryptography
© 2013 McGraw-Hill Companies. All Rights Reserved.
Last Minute Tips for the English II EOC
Forensic Science Questioned Documents: Part 3
Mr. Jordan Language Arts
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
By: Mohsin Tahir waqas Akram Numan-Ul-Haq Ali Asghar Rao Arslan
CS4780 Cryptography and Information Security
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
Networks Encryption.
Class 11 Guitar I and II Lots of stuff
Guitar III & Guitar IV 12th night Spring 2003
Topic 3: Data Encryption.
What is accessible information? It is information that everyone can understand. On the next slide we will show you a few examples.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
National Cipher Challenge
Codename: ULTRA Can your mathematical skills save the United Kingdom from defeat and invasion?
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
LO: Use logic and frequency analysis to read and write in code.
Cryptography “The Secret Code Language”
Computers in the real world Objectives
Substitution Codes By Sarah Bonnell.
Poetic Devices and Literary Terms
Introduction to the Cartesian Plane
Human Growth and Development
OUR SCHOOL.
Organizing Your Research
Information Security IT423
Traditional Symmetric-Key Ciphers
Classroom Lesson #4 Welcome students. Ask them to share with a partner what they remember about the last SSS lesson. (15 seconds) Next ask for volunteers.
Etiquette.
you get to solve puzzles!
Partial Quotients Division
Types of Cryptanalysis attacks
Presentation transcript:

•□♎♏• ♋■♎ •♓•♒♏❒• (Codes and Ciphers)

Code A code is a system of signals that is used to represent letters or numbers in transmitting a message. In other words, a code deals with phrases and sentences or whole words. In a true code, symbols stand for ideas. A code attaches meaning to individual symbols. For example, this symbol means: Send help at once

Code Phrase Here is the message: The word "Grandpa" is a code for "Are you coming?" The word "Picking"  is a code for "I will see you."  The word "Apples" is a code for  "come at 5:00."  The word "Dad" is a code for "Bring a friend."  "Eating" is a code for "thanks"  Here is the message: "Grandpa Is Washing Apples So is Dad.“ grandpa apples dad is the true message… the other words are there to throw your enemy off – and make the message sound innocent.

Ciphers A cipher deals with letters. It is a message written in letters in a predetermined way. This means that a cipher is a system of communication that uses letters instead of phrases and such. CIPHER uses SINGLE LETTERS. These are either jumbled up or replaced by other letters, numbers or symbols. Complicated ciphers involve both. Ciphers can be memorized so a codebook may not be needed.

CIPHER EXAMPLE: A B C D E F G 1 2 3 4 5 6 7 H I J K L M N 8 9 10 11 12 13 14 O P Q R S T U 15 16 17 18 19 20 21 V W X Y Z 22 23 24 25 26 See if you can figure this one out. 9 –19\ 20-8-9-19\6-21-14? Is this fun?

2nd Letter Cipher Read every second letter starting at the first letter, and when you finish, start again on the letters you missed the first time! Here's a cipher for you to solve: M R E K E A T T M M E I I D N N T I H G E H P T A Meet me in the park at midnight

Pig Pen Cipher This cipher was made up during the Civil War by a Union prisoner to send messages to his friends on the outside First you write out the whole alphabet in two grids, as shown: Each letter is represented by the part of the "pigpen" that surrounds it. If it's the second letter in the box, then it has a dot in the middle. So an A looks like this: And a B looks like this:

Example: This is deciphered as "LISTEN TO THE WIND".

Braille is an example of a Cipher What does this message say?: DOG

Morse Code is really a cipher Morse (Cipher) is sometimes written with a slash (/) between letters, to stop you from getting the letters confused. A double slash (//) means a break between words. Example: SOS = .../---/... Is Morse Code faster than texting? http://www.wimp.com/neatexperim ent/

Sir Francis Bacon’s Substitution Cipher A=***** N=*BB*B B=****B O=*BBB* C=***B* P=*BBBB D=***BB Q=B**** E=**B** R=B***B F=**B*B S=B**B* G=**BB T=B**BB H=**BBB U=B*B** I= *B*** V=B*B*B J=*B**B W=B*BB* K=*B*B* X=B*BBB L=*B*BB Y=BB*** M=*BB** Z=BB**B Francis Bacon created one of the more interesting substitution ciphers. He used two different type- faces(one regular, one bold). He broke up his cipher text into 5 character groups, each of which would represent one character in his plaintext. Depending on which characters of the group were bold, one could determine the plaintext character using the table (* stands for a plain character and B for a bold character)

Try this one… To be or not to be that is the question. Whether 'tis nobler in the mind to suffer the slings and arrows of outrageous fortune or to take arms against a sea of troubles and by opposing end them? To decipher, we just break the characters into groups of 5 and use the key to find the plaintext message. Tobeo rnott obeth atist heque stion A=***** N=*BB*B B=****B O=*BBB* C=***B* P=*BBBB D=***BB Q=B**** E=**B** R=B***B F=**B*B S=B**B* G=**BB T=B**BB H=**BBB U=B*B** I= *B*** V=B*B*B J=*B**B W=B*BB* K=*B*B* X=B*BBB L=*B*BB Y=BB*** M=*BB** Z=BB**B M E E T M E

“Code” word Cipher You can make a cipher based on a special word which only you know about…such as the word "XYLOPHONE". First of all we write down the normal alphabet (it's called the Plain Text alphabet), and below it we write the Cipher alphabet, starting with the word, and following the word with the rest of the alphabet. But there's a trick to this - remember that you don't want repeated letters! So you have to leave out the second O in XYLOPHONE, and when you get to the normal alphabet you write down ABCDFGI... leaving out the E, the H, and any other letters in the codeword. So here's what the alphabet looks like when you're finished: Plain text: ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher: XYLOPHNEABCDFGIJKMQRSTUVWZ When you're solving this code, remember to look up the letter in the Code alphabet. So the letter S is decoded as U, because U is above S. QLISR is decoded as SCOUT

Block Cipher We write the message in a rectangular block, one row at a time, and then read off the columns. To encipher the message THIS IS VERY EASY!, write it in a block like this: T H I S I S V ERY E A SY ! The ciphered message is read by looking at the columns, and writing them out like this: TSE HVA IES SRY IY! To decipher it, just write all the words in a block again, as columns, and then read the message across the rows.

2 Dumbest Criminals