Functional Skills Code Breaking LO: Use logic and frequency analysis to read and write in code.

Slides:



Advertisements
Similar presentations
ACT Prep Science Credited to: Kristine Fisher.
Advertisements

Cryptography encryption authentication digital signatures
Mr Watsons Introduction to Spreadsheets The Quick and Easy guide to using Microsoft Excel.
My Internet Safety Guide I have used scratch to program a guide to internet safety using QR codes.
How can using Aleks™ daily help you?
PRESENTED BY PAYTON FAKER JAWS, JANUARY 22, 2015.
Conference posters & Short presentations By Andreas Grondoudis 1.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
DPEFT, DJQIFST boe TFDSFU XSJUJOH.. If for each letter, you instead write the letter before it in the alphabet, you will discover what we are doing this.
Code Club Session 3 Shark Eats Fish. Picture of finished product here.
Counting Pennies Click here to begin Click here to begin.
Is ASCII the only way? For computers to do anything (besides sit on a desk and collect dust) they need two things: 1. PROGRAMS 2. DATA A program is a.
Counting Quarters Click here to begin Click here to begin.
CRYPTOGRAPHY Lecture 5. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M.
Chapter 2 Basic Encryption and Decryption (part B)
Improving Achievement The CPC Way © James M. Furukawa, J.D., Ph.D.
This can be used for making phone calls, sending text messages, picture messages and video phone calls.
Speaking in English. To speak English, you need to practise. Use every opportunity to speak in class (and outside!) Speak in a loud, clear voice. Look.
Section 3.6: An Introduction to Cryptography
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Cryptography Programming Lab
How Many Valentines?.
Reception: How We Teach Reading
Dividing 1 digit by 2 digit numbers
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Unit 1 – Improving Productivity Instructions ~ 100 words per box.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Part 2 – Skills for Success
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
BTEC Nationals - ICT LO: To develop the skills required to give an effective presentation.
Enigma Plymstock School History Department. The Battle of the Atlantic The Battle of the Atlantic Since the evacuation of the British Army from the beaches.
© A+ Computer Science - Codes and ciphers have existed for hundreds of years. People have always had the need to hide secrets.
© A+ Computer Science mixlplik igpay atinlay.
Unit 1 The Changing World Topic 1 Our country has developed rapidly. Section C.
UPDATE AND NEWS… FUNCTIONAL SKILLS. FUNCTIONAL SKILLS RESULTS: Maths  Maths Level 1:one learner  Maths Level 2:six learners.
Audio-Visual English Course ( st Semester) Unit 9 Book Your Vacation Now! 1 st Class.
Making and decoding a code message
The Process of Communication Chapter 2. COMMUNICATION MODEL SENDER MESSAGE RECEIVER FEEDBACK.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Introduction to Spreadsheets Part 1 The ‘Quick’ and ‘Easy’ guide to using Microsoft Excel.
Sight Words.
Before we begin you need to know something very important. Music notes are named after letters of the alphabet. However, instead of having 26 different.
Ms. Holewinski’s Short Vowel Review Click the button to begin.
ISNE101 – Introduction to Information Systems & Network Engineering WEEK 2.
Weekly Net Control Review of Net Control tasks and resources for Monday night Net. by Madeline Lombaerde, KD6JTU.
x 2 3 2x Carlo is very much in love with Jennylyn. However, he is finding hard time winning Jennylyn’s heart. Jennylyn said that she could only accept.
Chapter 5 - The Once And Future Digital Network Introduction The World Was Once Digital A Telegraph Is Digital [The telegraph is a digital technology because.
I have used Scratch, to program a guide to internet safety. This is done by using QR codes to make it more interactive and interesting for people playing.
ROT13 cipher. The ROT13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. Example: all 'A's.
Every individual learns differently and thus has a unique learning style. "Approximately 20 to 30 percent of the school-aged population remembers what.
Cryptography Cryptography is the use of mathematics to encode messages and prevent them from being read by anyone who doesn’t know the code. One way that.
Part 2 – Skills for Success Chapter 5 Communicating on the Job.
Cramming the night before your exams is NOT the best way to get your best grades… So what should you do instead? If you look at all the work you have done.
The Internet Book Chapter 5 3 The World Was Once Digital 150 years ago, telegraph messages were sent from one town to another. –Using audible clicks.
© English Language Testing Ltd Taking the Password Skills Test.
© English Language Testing Ltd Taking the Password Skills Receptive Test.
Encryption with Keys and Passwords
Egyptian Writing Hieroglyphics.
Objective of the lesson
MAT 105 Spring 2008 Chapter 17: Binary Codes.
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
LO: Use logic and frequency analysis to read and write in code.
Classroom Management Hide.
Fundamentals of Data Representation
Mr Watson’s Introduction to Spreadsheets
Presentation transcript:

Functional Skills Code Breaking LO: Use logic and frequency analysis to read and write in code.

Codes appear for many reasons. They are usually used to hide information. Everything you send on the internet is encoded so that hackers do not have access to everyone's private information. One of the biggest places for codes is on the internet.

LO: Use logic and frequency analysis to read and write in code. We are going to look at substitution codes. These are where letters are changed to make things harder to read. During one of Sherlock Holmes’s adventures, he comes across “The Dancing Men Cipher”

LO: Use logic and frequency analysis to read and write in code. Try to work out the following message…

LO: Use logic and frequency analysis to read and write in code. One of the most common codes people know something about is Morse Code. Before the internet there were phones… ….and before phones there were telegrams… … and telegrams were sent using Morse Code.

LO: Use logic and frequency analysis to read and write in code. Morse Code is very hard to hear and work out without lots of practice. It is made up of quick clicks for dots, longer clicks for dashes, short breaks between letters, and longer breaks between words. Listen to the sound of a short Morse Code Message. Then listen again to try and keep up with dots, dashes and spaces.

LO: Use logic and frequency analysis to read and write in code. This is what you should have got: – – – – – · – · · · · · – · – · – – – – · · · Listen to the sound again and see if you can follow along.

LO: Use logic and frequency analysis to read and write in code. You are going to be give a sheet with these codes on to decipher for yourself. By each piece of coding the cipher key is also included. Task 1 – On Your Own

LO: Use logic and frequency analysis to read and write in code. Another way to make a cipher code is to mix up the letters instead of using symbols. For example suppose I change the letters around so… E become L H becomes X L becomes P O becomes E …then the word HELLO becomes… XLPPE

LO: Use logic and frequency analysis to read and write in code. The reason why this is a good way to make a code is that there are lots of ways of mixing up the alphabet. How many ways do you think we could mix up all the letters? Over 400, 000, 000, 000, 000, 000, 000, 000, 000! To say that number out loud it is: Four Hundred Septillion Interesting fact: If you read that number in Britain before 1974 the correct way to say it would have been four hundred quadrillion. In European countries you would still use the old way, but since 1974 most English speaking countries now use what is called the short system (which was previously referred to as the American System).

LO: Use logic and frequency analysis to read and write in code. However! Mathematicians can crack the code using something called frequency analysis.

LO: Use logic and frequency analysis to read and write in code. What does this graph show us? How could we use this to work out what a coded message says?

LO: Use logic and frequency analysis to read and write in code. We are going to see if we can work out a coded sheet as a class. You are going to be given a sheet of code and will be responsible for counting the number of times you see a specific letter. Task 2 – As a class

LO: Use logic and frequency analysis to read and write in code. We are going to fill in a table using the information from the letters you have just counted and the graph above. Task 2 – As a class

LO: Use logic and frequency analysis to read and write in code. Task 2 – As a class

LO: Use logic and frequency analysis to read and write in code. Now lets try to read it!

LO: Use logic and frequency analysis to read and write in code. You have a list of tasks to finish you off: Task 3 – On your own or in Pairs 1.Make an A3 poster of the codes we have been looking at explaining how they work. 2.Try to crack a harder code sheet that is made up of a combination of mixing up letters and symbols. 3.Write a short passage and create it in code. (This could be using symbols, mixing letters, or a combination of the two).