DPEFT, DJQIFST boe TFDSFU XSJUJOH.. If for each letter, you instead write the letter before it in the alphabet, you will discover what we are doing this.

Slides:



Advertisements
Similar presentations
Welcome Back to School!!! Mr. Sortina.
Advertisements

Make an Origami Jumping Frog
Introduction to the Cartesian Plane
Geometry Origami - Penguin What shape do we begin with?
4/28/2015  Copyright Valiant Technology Ltd Flying High With Roamer.
Second Grade English High Frequency Words
At the end of Tutorial 2 I gave you a problem to work on independently. Watch as I use LATTICE MULTIPLICATION to solve that problem.
Module 6 Lesson 16.
How to make a paper airplane
In this lesson, you will review some piano staff basics and discover how accidentals (sharps, flats, and naturals) affect notes while you learn the Piano.
Section 3.6: An Introduction to Cryptography
Triangle Town Hi, I’m Elke. Pleased to be your guide through Triangle Town. Don’t ever worry about getting lost. I’ll stay with you the whole time.
Alan Turing and Code Breaking
Lessons 7.1 Students learn about a function through trying to un-code a message ◦ They will notice that unambiguous encoding requires a function.
Encryption: A Brief History Author: Margery Waldron.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
Sight words.
Enigma Plymstock School History Department. The Battle of the Atlantic The Battle of the Atlantic Since the evacuation of the British Army from the beaches.
Pop-up Evergreen Tree. Designed by Robert Sabuda.
Melon’s Fantastic Perspective Power-Point Linear perspective is based on the way the human eye sees the world—objects which are closer appear larger,
Secret Book Written Activity Sample Section A (front cover) Boxes 1-3 Students select three powerful quotes from the story and write each on in the three.
Making and decoding a code message
Literacy Instructions Making a pop up card You try Step 1: Begin with piece of card.
1. 4. Ribosome Translation 3. Protein 2. BELL WORK ( Buff Binder – start a new sheet !): Fill in the blanks on the diagram below: DNAmRNA Transcription.
Foldable 1. Take out a piece of notebook paper and make a hot dog fold over from the right side over to the pink line.
bottom right ______________ I write you a ______. I ______ it to you. Here’s your address on it, and a picture, too. Don’t forget the _______ ! Where.
Expectations/Reglas Each student will participate every day, in every activity of the circle—requires more attention & participation than before! No side.
Print a copy of the Bookmark Template.. Select one of the templates and cut it out along the dotted lines. Cut all the way through to the edge on the.
EMSA Testing Strategies Foldable.  It’s Easy! Just remember  CUBES How can I do well on the test??
Daily Routines Gary Ovando.
Sight Words.
Higher Dimensions. x Let's say we use a pencil to mark a point on paper. x is this point. We pick a direction and move the pencil along this direction.
Castle Project Name___________________ Period___________________ Mr. Martin- World History- Room 8.
Mission: Missing item Top Secret Confidential Secret Mission.
Source Cards. Getting Started: This Power Point will help take you through the process of writing your source cards and making sure they are perfect.
Drafting Your Short Story - with Dialogue
Dynamic Dots Moving from the known to the unknown.
Cryptography and Code Breaking Cryptography is the study and practice of hiding messages.
Oral English Listening Quiz! November 2011 “Quiz” means “small examination” 小测验.
Functional Skills Code Breaking LO: Use logic and frequency analysis to read and write in code.
Expressions and Equations 5.ATO.1 Evaluate numerical expressions involving grouping symbols (i.e., parentheses, brackets, braces). 5.ATO.2 Translate verbal.
ROT13 cipher. The ROT13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. Example: all 'A's.
MATHEMATICS Line Symmetry. Lesson Objectives The aim of this powerpoint is to help you… Review what we mean by ‘symmetry’ Draw reflections and find mirror.
1 Taking Notes. 2 STOP! Have I checked all your Source cards yet? Do they have a yellow highlighter mark on them? If not, you need to finish your Source.
LESSON 7.1 Functions To investigate the concept of function through secret codes.
Transformations for GCSE Maths Enlargement Translation Reflection Rotation.
Module 3 Lesson 13. Objectives  Read and write numbers within 1,000 after modeling with place value disks.  Model numbers with more than 9 ones or 9.
Organizing and Writing a persuasive Essay In this demonstration you will learn four basics steps to writing a persuasive essay. This will provide you with.
IB Diploma Examinations May 2015 Final advice and explanation of conditions.
Keyboarding/Office Applications Semester Review. #1 When using Microsoft Word, what are the default margin setting? In other words, what are the margin.
Codename: ULTRA Can your mathematical skills save the United Kingdom from defeat and invasion?
CRYTOGRAPHY PIGPEN CIPHER.
Making the 17-1 Motion Foldable
Objective of the lesson
How to make a paper aeroplane
Principles of Art Notes Page.
Codename: ULTRA Can your mathematical skills save the United Kingdom from defeat and invasion?
Making a “Foldable” to Remember the Exponent Laws
LO: Use logic and frequency analysis to read and write in code.
Making a “Foldable” to Remember the Exponent Laws
Growing Lines.
Substitution Codes By Sarah Bonnell.
Introduction to the Cartesian Plane
Periodic Table Folder.
Star Life Cycle Accordion Book
Group Activity: Black Disks
Since we enjoyed learning about how the Cyrillic Alphabet originated and how it looks and sounds so different from our alphabet, let’s have a little fun….
2/
Presentation transcript:

DPEFT, DJQIFST boe TFDSFU XSJUJOH.

If for each letter, you instead write the letter before it in the alphabet, you will discover what we are doing this morning.

DPEFT, DJQIFST boe TFDSFU XSJUJOH. becomes CODES, CIPHERS and SECRET WRITING.

WHY? Codes have been important throughout history. Thousands of people were employed during the second world war at Bletchley Park, trying to decipher the codes that were sent by the Germans to each other. If they could decipher the code, they could sink their ships.

WHEN? Codes have been used since humans could write. The Romans used to send messages throughout their empire using codes to which only they had the key.

HOW? Only trusted friends who have the code’s key can crack the code and read the message.

CODE 1: SHIFT CIPHER You previously saw the example of the SHIFT CIPHER, it gives each letter in the code a different letter in real life. The rule is the alphabet is SHIFTED one way or another but stays in the same order. My cipher was:

CODE 1: SHIFT CIPHER ABCDEFGHIJKLM BCDEFGHIJKLMN NOPQRSTUVWXYZ OPQRSTUVWXYZA The TOP line is what the letter actually is, the BOTTOM line is the one you write in the code.

The letters were moved one place to the left.

Design your own SHIFT CIPHER You ‘move’ the alphabet along as many places as you like but it must be in the same order. SEND this message, to a friend, using your shift cipher. How many fives in ten SEND your own message. Can a partner decode it?

CODE 1: SHIFT CIPHER ABCDEFGHIJKLM NOPQRSTUVWXYZ The TOP line is what the letter actually is, the BOTTOM line is the one you write in the code.

BREAKING THE SHIFT CIPHER Generally not very reliable. If you can work out one letter (like the e, which will occur most often over a long message) then you can work out all the other letters as well.

CODE 2: KEY WORD CIPHER Works in a similar way. The letters are arranged in order, except the letters from the key word are taken out and put at the beginning. NOTE: the key word must NOT have any repeating letters.

KEY WORD = FOREST ABCDEFGHIJKLM FORESTABCDGHI NOPQRSTUVWXYZ JKLMNPQUVWXYZ The TOP line is what the letter actually is, the BOTTOM line is the one you write in the code.

DESIGN your own KEY WORD cipher and write a short message for a trusted partner to decipher. You ONLY need to tell them the KEY WORD, they should not need your CIPHER sheet.

The KEY WORD cipher is harder to break than the SHIFT cipher. The next cipher is even harder to break. This is because the letters can be in any order.

Code 3: The Pigpen Cipher Devised in 1640 (during the English Civil war) Looks like pigs in a pen

Here the letters are represented by a diagramatical code The dots are important, if you don’t use them then you will mix up K and X etc. Do not write the letter, just draw the sides and dots that are next to it. I A M A C O D E B R E A K E R

DESIGN your own Pigpen cipher and send a message to a friend asking how long it is until home time. Get them to use their own cipher in reply.

CODE 4: THE CREASE CODE Fold a blank piece of A4 paper into 6, so the fold marks are as below. Long side

Write your code on the CREASES

Fill the rest up to make other words, it is better if they make sense. B i aG g O r E a pleas poa hed Is n t elightfula M al

BONUS CODE: ALBERTI’S DISC You need 2 discs where one overlaps the other. The inside is the letter you write down the outside is the real letter (the translation) Mix the letters up, as you like. Your partner needs to know the starting point. After each letter is translated, turn the inner disc one position clockwise. Then repeat by translating the next letter and so on. Very difficult to break.

CODE 5: WORD GRILLES These look like a series of random words until a grille is put over the top to make sense. WATCH

LAST FINAL HALF MONKEY GIRAFFE CIPHER JUMBLE GOAT COAT HAT PLEASE FOUND GET REHEARSE HOME AWAY LIGHT DARK HOUR CODE OBVIOUS ANSWER TIME FIND