Alan Turing and Code Breaking

Slides:



Advertisements
Similar presentations
Origin and Nature of the Allied Cryptographic Advantage During World War II By Grant Musick.
Advertisements

SECRET CODE HCM B 李可茵 B 沈君亞 B 崔 翔 B 陳凱蒂 B 蔡依恬.
By Megan Goatley. history one of the last of a top World War Two codebreaking team at Bletchley Park codebreaker Jerry Roberts dies aged 93, Capt Roberts,
BLP Building Learning Power. The Four Rs Resourcefulness Reflectiveness Resilience Reciprocity.
Philosophy and Cogsci The Turing Test Joe Lau. Alan Turing ( ) n Famous British mathematician / logician n Mathematical theory of computation.
Code Breaking during the Second World War An Introduction By Gary J Becea.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Alan Turing Start of the 20 th century The Atom Quantum physics Freud Philosophy …and a crisis in Maths!
DPEFT, DJQIFST boe TFDSFU XSJUJOH.. If for each letter, you instead write the letter before it in the alphabet, you will discover what we are doing this.
Solving the Enigma How the Western Allies Cracked the German Secret Codes During WW II.
Modern Cryptography.
A Glimpse of the History of Cryptography
Guess My Word Mr. Nan Wang, C2PRISM Fellow Mr. Gerardo Stricker, Pre-CalculusTeacher Add extra privacy to our communications! – how is it done?
HTML, Formatting Text and Images Lesson 2.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Alan Turing Presented By: Tyler Romero CSCE Spring 2014.
Programming Computer Games Game Design.
Activity 1 5 minutes to discuss and feedback on the following:
Famous Firsts in Computation MSE 2400 Evolution & Learning
The Turing machine Olena Lastivka. Definition Turing machine is a theoretical device that manipulates symbols on a strip of tape according to a table.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Encryption: A Brief History Author: Margery Waldron.
1.History of a remarkable Man Call “Alan Turing”. 2.Study Life. 3.Work life during the world war 2 period. 4.His achievement after the world war. 5.His.
Activity 1 Input Device Output Device CPU RAM Hard Drive (Hard Disk)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
QUIZ In the 1930’s computers were much slower at performing complex calculations than they are today. Yet 30’s era computers were much more lifelike than.
Enigma Plymstock School History Department. The Battle of the Atlantic The Battle of the Atlantic Since the evacuation of the British Army from the beaches.
Unit 3 Day 4. Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In.
Alan M. Turing ( ) A Natalie Cluck Presentation.
Understanding of the World Make observations of plants and animals and explain why some things occur Select and use technology for a range of purposes.
Philosophy 4610 Philosophy of Mind Week 8: Can a Computer Think?
Personal, social and emotional Going for Goals – knowing that we learn in different ways. Being able to identify things we find easy and things we find.
SIMS Learning Gateway Parental access to student data Username and password from Mrs J Stanley Allows you access to attendance figures, timetable, assessment.
WWII - U-Boats A British convoy made it’s way from England to Nova Scotia because, it needed to protect supply ships from the ever present threat of German.
Encryption of WWII Philip Gebhardt 10/24/2011. Interest.
CRYPTOLOGY IN WWII ByJOE&SEAN. SIGABA SIGABA was similar to the Enigma in basic theory A series of rotors enciphered every character of the plaintext.
The Storyboard stage. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender,
“IT IS A RIDDLE, WRAPPED IN A MYSTERY, INSIDE AN ENIGMA” * By: Michaela Wontroba Mr Kuniega; PD 5,6,7.
The cracking of Enigma in World War II John Bibb Harry Caplan Abhishek Chhikara Vladimir Grantcharov Aditi Kulkarni Nigel Lawrence Andrew Muldowney Hou.
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
By, Amanda Rydzynski O’Brien Computer Skills
How the internet works Cryptography. LO: Define the terms encryption and decryption Construct a secure message using encryption LO: Define the terms encryption.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
The Mathematics Behind
Millions of electronic pulses move through your computer every second. Computers are capable of processing thousands of functions in the time it takes.
Creating your own Handheld Games Console
A: Schoolboy genius Turing was a genius at school. He once cycled 60 miles, on his own, so he didn’t miss the first day of term. While at school, Turing.
CS 154 Formal Languages and Computability April 5 Class Meeting Department of Computer Science San Jose State University Spring 2016 Instructor: Ron Mak.
Key words: Intercept | Decipher | Translate
Learning Muscles.
DATA REPRESENTATION – 3 binary addtion
Who was Alan Turing? Alan Turing played a role in deciphering the messages encrypted by the German Enigma machine. He took the lead in a team that designed.
In this lesson we will understand:
Enigma Machine.
Alan Turing & Cryptanalysis
BITS & BYTES.
Substitution Codes By Sarah Bonnell.
Thinking Ahead
What is Building Learning Power all about?
Computational Thinking
Britain stands alone
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
OOP Python Inheritance
Enigma Cipher Machine By: Amber Churchwell.
OOP Python Instantiation & Understanding Self
Thinking Abstractly
WORLD OF WONDERS : THE ENIGMA MACHINE
Modern Cryptography.
Building Learning Power
Presentation transcript:

Alan Turing and Code Breaking Back to the Future – Lesson 1

Starter – on whiteboards Can you think of any famous figures in the world of computing? What did they do? Discuss with a partner and be ready to share with the rest of the group.

Learning Objectives Learning Objectives Success Criteria To understand who Alan Turing was To understand how messages can be encrypted using ciphers. To understand how to use a cipher key to decipher codes Success Criteria To discuss the importance of Alan Turing To use logical thought to crack codes using a variety of different ciphers Literacy – Key Words Cipher A Cipher is a ‘Secret Message’ often written in code Decipher A method to unscramble a cipher so that the ‘Secret Message’ can be understood Encryption A method used to scramble messages so that if they are intercepted they cannot be read / understood

Learning Habits Reasoning: Noticing details Adapting : Thinking rigorously, methodically and giving explanations. Noticing details Adapting : Reflecting and making changes Empathising… …with feelings and views Effective use of time Questioning: Asking questions to get below the surface Listening… …to understand Imagining… …how things could be and seeing a range of possibilities Distilling… …what you have learnt and what you need to learn Collaboration: Working effectively with others Meta Learning: Talking about how you have been learning Imitation: Picking up good habits from others Independence: Working effectively alone Managing distractions… …and sustaining concentration Capitalising: Using resources purposefully Making links… …and recognising relevance Perseverance: Overcoming frustration and difficulty Planning… …your learning in advance

What do we already know? Who was Alan Turing?

Setting the Scene The world was at war, Britain were fighting the Nazis German soldiers / government were sending messages to each other in order to communicate strategies. British Intelligence were managing to intercept these messages – but they were encrypted... …But if there was a way to decrypt / decipher the messages, then Britain could get vital information about their enemy! Therefore information / intelligence could be a vital tool in the war!

Bletchley Park Bletchley park was an office set up by ‘British Intelligence’ to try to crack the code so that these messages could be understood. …and this is were Alan Turing’s story begins!

Alan Turing Alan Turing played a vital role in deciphering the messages encrypted by the German Enigma machine, which provided vital intelligence for the Allies. He took the lead in a team that designed a machine known as the ‘bombe’ that successfully decoded German messages. He became a well-known and rather eccentric figure at Bletchley.

The Enigma This is the machine that the Germans invented to write their encrypted messages. The machine was electric and each time a key was pressed it would turn a series of rotors. These rotors alter the letter pressed so that messages would be scrambled. The different rotors meant that the encryption machine could be set up one of 100,000 different ways. So each day, the ‘Enigma’ would be set up slightly differently making it hard for anyone to decrypt, unless they had the key (if, in other words, they knew how it had been set up that day).

The Bombe Machine Turing invented this machine – the Bombe. Messages could be fed into it and the machine could help ‘pin point’ the way that the Enigma was set up when writing that particular message. With this information, British Intelligence could get to work trying to decrypt the messages allowing the British to learn many German secrets. Many of which were instrumental in the War being won!

Alan Turning – A sad end to an amazing man Sadly, Alan was persecuted for his homosexuality. In the 50’s he faced prison or daily injections to help supress his feelings. He chose the injection. A short time later he committed suicide. Terrible treatment of an amazing man who played a massive part in winning the war and saving us from Nazi rule.

Who was Alan Turing? Mathematician / One of the first Computer Scientists Created a machine that could help decipher messages sent by the German encryption machine called ‘the Enigma’. Out of the 100,000 different ways the Enigma could be set up to encrypt messages, the Bombe (Turing’s invention) could reduce these possibilities by working out how the Enigma was set up for each message received. British Itelligence could therefore decipher the messages much faster, understanding the enemy’s next move and help win the war!

Lets Crack Some Code! We will now exercise some of the logic that Turing used when cracking German messages.

Activity – Cracking Code PigPen Ciphers What is this message?

Pig Pen Ciphers - How they work This is the KEY By locating the letters in the key, you can identify the symbols which replace the letter. To make it harder, the letters can be in different positions to these, so a symbol in one message might represent a different letter in another…without the key it would be very hard to decrypt.

Activity Complete one of two worksheets Levels 3-5 Worksheet

Plenary Who was Alan Turing? Why do we need to encrypt messages? What do we need to decrypt a message?