Cryptic Challenge STEM Fair, Biddenham School, Bedford 19 th March 2015 Vasso Evdoridou, Matthew Jacques and David Martí-Pete Department of Mathematics.

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

1 Cryptosystems When defining a cryptosystem, details must be given of: The alphabets M and C the keyspace K and how keys are to be chosen The encryption.
Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
Computer Science 101 Data Encryption And Computer Networks.
Zac Blohm & Kenny Holtz. ALGORITHMS ARE THE BASIS FOR CRYPTOGRAPHY  The basic idea of Cryptography in Computer Science is to run a message through an.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
9/21/12. I can identify which factors are prime numbers. LEARNING TARGET.
Security & Encryption Thomas Fenske & Joseph Minter.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Enigma Meghan Emilio Faculty Sponsor: Ralph Morelli (Computer Science)
Secure communication Informatics for economists II Jan Přichystal
A Glimpse of the History of Cryptography
The Enigma Encryption System Andrew Regan CSC 290.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
MAT 1000 Mathematics in Today's World Winter 2015.
Introduction to Cryptography
Section 3.6: An Introduction to Cryptography
Dan Boneh Introduction History Online Cryptography Course Dan Boneh.
Cryptography Programming Lab
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Alan Turing Presented By: Tyler Romero CSCE Spring 2014.
Can you find the hidden message? G HTCR A HVMR E EA I AA S S T.
Alan Turing and Code Breaking
Computer Science 101 Cryptography Part I. Notes based on S. Singh, The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography.
TMAT 103 Supplemental Chapter Cryptography. Sending messages that cannot be read if stolen –Been in use for centuries (wars) –Used to transmit data securely.
Famous Firsts in Computation MSE 2400 Evolution & Learning
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Q.
Lec. 5 : History of Cryptologic Research II
Encryption: A Brief History Author: Margery Waldron.
Cryptography By, Anthony Lonigro & Valentine Mbah.
1.History of a remarkable Man Call “Alan Turing”. 2.Study Life. 3.Work life during the world war 2 period. 4.His achievement after the world war. 5.His.
Codes and Ciphers By the end of this session you will be able to:
Transposition Cipher. Suppose we want to encrypt the following message: “Now run along and don't get into.
Chapter Ten The Application and Presentation Layers.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Terminology and classical Cryptology
CSCI 5857: Encoding and Encryption
LO To learn basic computer coding using binary
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Cryptography Lynn Ackler Southern Oregon University.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Cryptography is the process of encryption and decryption a message or data. Examples: Banking to keep peoples money safe Schools so we can keep students.
Encryption of WWII Philip Gebhardt 10/24/2011. Interest.
CRYPTOLOGY IN WWII ByJOE&SEAN. SIGABA SIGABA was similar to the Enigma in basic theory A series of rotors enciphered every character of the plaintext.
UNIT 2 LESSON 3 CS PRINCIPLES. OBJECTIVES Students will be able to: Construct a binary communication protocol for playing Battleship using the Internet.
Your Mission Objectives
Copyright © Cengage Learning. All rights reserved. 7 Linear Systems and Matrices.
Satellites (They really are fun). General Information Satellites are a combination of binary patterns that enable encrypted messages to be transferred.
CS 150 – Computing: From Ada to the Web Cryptography.
Reservations for the above trip are now being accepted on payment of a £50 deposit. Please refer to the letter on the school website.
Spring, 2011 –– Computational Thinking – Dennis Kafura – CS 2984 Lambda Calculus Introduction.
Answer these quick fire questions on your mini whiteboards.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
Secure communication Informatics for economists II Jan Přichystal
Cryptology in the U.S.—Then and Now
Networks Encryption.
Who was Alan Turing? Alan Turing played a role in deciphering the messages encrypted by the German Enigma machine. He took the lead in a team that designed.
In this lesson we will understand:
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Enigma, Cyphers and Encryption
Cryptography a Presentation Prepared by Vytautas Kondratas.
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
Presentation transcript:

Cryptic Challenge STEM Fair, Biddenham School, Bedford 19 th March 2015 Vasso Evdoridou, Matthew Jacques and David Martí-Pete Department of Mathematics and Statistics The Open University, Milton Keynes

What is cryptography? BobAlice encrypt decrypt

Bletchley Park Milton Keynes

Enigma 158,962,555,217,826,360,000 configurations! Choose 3 rotors out of a set of 5, 60 possibilities. Each rotor has 26 positions, one for each letter. Connect 10 pairs of letters in the plugboard.

Alan Turing Wilmslow (Cheshire), 1912 – 1954

Starter activity Crack the cypher to find out what we’ll do today

By the end of this session you will be able to: Decode messages using different cyphers.

Challenge 1 The texting challenge Examples 927 = WAS/WAR 2628 = BOAT/COAT 4483 = GIVE/HIVE

Challenge 1 The texting challenge Challenge 1: Decode the message “ ?” “ !”

Challenge 1 The texting challenge Challenge 1: The message says… “What do you call a sheep with no legs?” “A cloud!”

Challenge 2 The transposition challenge We want to encrypt the message “We are from Biddenham School” First remove all punctuation and spaces wearefrombiddenhamschool There are 24 letters. How can we factorise 24? 24 = 2 × 12 = 4 × 6 We’ll choose 4 × 6

Challenge 2 The transposition challenge We read off the coded message going down the columns “wemdahefbemoarinsorodhcl” wear efro mbid denh amsc hool We write our message in a 4 × 7 grid going along the rows

Challenge 2 The transposition challenge

This time we write the message going down the columns codes keepb ankde tails safer Then we read off the message going along the rows “Codes keep bank details safe”

Challenge 2 The transposition challenge Challenge 2: Decode the message “trmsimhlatsledld1 owslo5nosegcg” Hint: You might have to try different grids!

Challenge 2 The transposition challenge Challenge 2: The message says… “The world’s smallest dog is 15cm long”

Challenge 3 The binary challenge A = 1 = B = 2 = C = 3 = D = 4 = E = 5 = F = 6 = G = 7 = H = 8 = I = 9 = J = 10 = K = 11 = L = 12 = ? M = 13 = ? N = 14 = ? Computers code messages in the binary language.

Challenge 3 The binary challenge How do we get from a binary number to a letter? 16s 8s 4s 2s 1s = 21 = U

Challenge 3 The binary challenge What are the following letters?

Challenge 3 The binary challenge Challenge 3: Decode the message “ ”

Challenge 3 The binary challenge Challenge 3: The message says… “Computers view everything as ones and zeroes!”

Challenge 4 How might you crack a substitution cypher if you do not know which substitutions have been made?

Challenge 4

Challenge 4 The frequency analysis challenge Challenge 4: Decode the message “IHU EUTI NYSU NLRNKULT MYJI PGQU WF RJS RAMRVT MRJI IY BGJS IHU RJTMUL. YBIUJ IHULU GT R LUMRLS BYL IHYTU MHY TWNNUUS.”

Challenge 4 The frequency analysis challenge Challenge 4: The message says… “The best code crackers won’t give up and always want to find the answer. Often there is a reward for those who succeed.”

The ALAN TURING Cryptography Competition by University of Manchester

The Imitation Game …won the Oscar for best adapted screenplay!

Vasso Evdoridou Matthew Jacques David Martí-Pete website: Thanks to: