Pedagogy Everyone should have an Activities Handout keyed to the presentation. We use it for understanding codes and exchanging “secret” messages. Staff walk around to help students one-on-one, as needed. From “What Works” 1. Children learn science best when they can do experiments, so that they can witness science in action. 2. The mere inclusion of a portrait of an historical figure is mere window-dressing. It may even be distracting, especially for students who lack basic reading skills. 3. When teachers explain exactly what students are expected to learn and illustrated the steps needed to accomplish a particular task, students learn more (clear goals and assignments, ask questions, give chance to practice). 4. Constructive feedback, including deserved praise and specific suggestions, helps students learn, as well as develop positive self-esteem. Background: remove before presentation* 5. Memorizing helps students absorb and retain the factual information on which understanding and critical thought are based. 6. Student achievement rises when teachers ask questions that require students to apply, analyze, synthesize, and evaluate information in addition to simply recalling facts. ~~~~~~~~~~~~~~~~~~~~~~~ You learn … by iteration—that is, by going over the same material many times. Each time you do that, the material makes a little more sense. Richard A. Muller (physicist) ~~~~~~~~~~~~~~~~~~~~~~~~~ Tell me: I may not get it, and I'm sure to forget it. Show me: I may get it, I'll remember it for a little while. Have me do it: I may understand it, and it may stick for a while. * There are lots of these to remove. Preview What? Preview (continued) 2 1 A B C D E F G 00001 00010 00011 00100 00101 00110 00111 1 1 0 Complete Activity 1a to decode the title. CC II HH D R N E E A G b x C b C y K T O x Cracking The Code Keeping Information Safe Copyright Notice: This presentation may only be used free of charge and only for educational purposes, and may not be sold or otherwise used for commercial purposes Decoding The Title C I H D R N E E A G b x C b C x K T O x x C R A C K I N G T Cracking The Code Background: remove before presentation The previous code is properly called a letters-based transposition cipher, in which the letters in the plain text are systematically rearranged through the use of a table of a set number of rows and columns. Transposition codes, which rearrange words instead of ciphers, also include Keynumbers. The Keynumber indicates the order in which he columns are rearranged to form the codetext, that is, the routing of the transposition. See reference 5 on the Reading List at the end of this presentation. During the 1800s and into the 1900s people printed secret messages in the private message columns (called “agony columns”) of newspapers. Private codes/ciphers were used to maintain privacy and to reduce message length, which reduced the cost. Cards with a square cipher were printed and sold so as to provide a way to write private messages on postcards and, later, in telegrams that would be “secret.” Objectives 1. Learn what codes are. 2. See how they work. 3. Make and use some wellknown ones. Codes are USEFUL! Radio/TV/Movies Phones Military Product Barcodes Banking QR Code Background: remove before presentation Good codes are ones that are: EASY for the SENDER to encode a message, and for the RECEIVER to decode the message, but very difficult for ANYBODY ELSE to decode. Mathematicians, computer scientists, and engineers have figured out clever codes for sending secrets that, for now at least, are very very difficult to break. We make use of data codes whenever we use a password to check email, withdraw money from an automated bank teller machine, make a cellular phone call, or charge a purchase over the Internet. We rely on encryption to ensure the validity of our financial transactions, prove our identity, and safeguard our privacy. Although some people hesitate to conduct business over the Internet, most of us engage in online transactions with confidence that encryption protects our activities. Error control codes are used to detect and correct errors that occur when data are transferred or stored. Background: remove before presentation Encryption has long been used by militaries and governments for secret communication. Encryption is now commonly used in protecting information within many kinds of civilian systems. Businesses and institutions use encryption for of their data in transit, and for their data in storage. Encryption can be used to protect data "at rest", such as files on computers and storage devices (e.g. USB flash drives). Encrypting such files at rest helps protect them should physical security measures fail. Digital rights management systems which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering are another example of using encryption on data at rest. Encryption protects data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks. Activity 1b: QR Code Use a cell phone to decode this Quick Read Code. Cracking The Code At [School Name] Presented on [Date] Background: remove before presentation Custom QR codes can be created at the website experis.us/ieee. A QR (“Quick Response”) code is a cell phone readable 2D bar code that can store website URL's, plain text, phone numbers, email addresses and pretty much any other alphanumeric data.. It holds data both horizontally and vertically, unlike a bar code, which holds information only horizontally. The square shape stores approximately 90 alphanumeric characters for a standard 33x33 square, while a UPC code holds only 12 numerals. The codes are used to share: —A simple URL or contact information —Nutrition stats for fast food —A company's brand, like Louis Vuitton's colorful illustrated code —Interactive profiles and story pages on tombstones —A greeting for fellow digiphiles on T-shirts It stores up to 4296 characters they are internationally standardized, so a QR code is a QR code all over the world - they've been big in Japan forever, broke into Europe and the UK a few years back, and are now getting real traction in USA. To make things a bit more robust, the QR Code also contains its own error correction data, internal orientation calibration and self-alignment markers. In this way it doesn't matter whether the QR code is upside down or wrapped around a curved surface, the message will still get through. Background: remove before presentation Morse Code (Student have been asking about this code.) Morse code is a method for transmitting information, using short and long marks or pulses - "dots" and "dashes" - for the letters, numerals, punctuation and special characters of a message. It was created for Samuel F. B. Morse's electric telegraph in the mid-1830s, and was used early radio communication. When using Morse code, a dash is equal to three dots. A space between parts of the same letter is equal to one dot. A space between two letters is equal to three dots and a space between two words is equal to five dots. The pauses between two transmitted characters should be three times as long as the pause between two symbols (dot or dash). The pause between two words should be approximately twice as long as the pause between two characters. SCYTALE (Pronounced skit’ il lee) Spartan messengers carried coded messages on their belts Background: remove before presentation A scytale is strip of parchment paper which is wrapped around a cylinder of a specific diameter. The plaintext message is written on the paper while the paper is wound around the cylinder. Once the paper is unwound, the message becomes difficult to read. To decipher the message, you simply wind the paper around another cylinder of the same diameter. The earliest recorded instance of encryption dates to about 400 BCE, when the Spartans used the scytale to send coded messages between military commanders. Often the strip was a leather belt that looked as if it had been decorated with random letters. A message on a belt-sized strip could consist of 8 to 10 vertical rows. For a message written in three rows, extracting every third letter will decipher the message. This code is one of the easiest to crack and therefore is not very secure. However, they say the Greeks used it, off and on, for hundreds of years. A simple, easy to create, scytale device can be made from an ordinary wooden lead pencil, which usually has six sides. Use a ½ cm strip of paper. SCYTALE Example C U D S ? b N C R T A E H N A I A R E A T A N U H I R E A D U D ? N A I U C A E H D S C R T b S T H I ? S ? g o r h h F o b y o r s t b o r s e b e b b a u e e a o f b f b r b v r u a r d n b a e s r t o r e Long Scytale Message s n n b b h u t w c d b a f e g Fourbsc oreband bsevenb yearsba gobourbf orefathe rsbbroug htbfort hbabnew Line 1 Line 2 Line 3 Line 4 Line 5 Line 6 Line 7 Line 8 Line 9 Four score and seven years ago our forefathers brought forth… Background: remove before presentation The Gettysburg Address, Gettysburg, Pennsylvania, 11 / 19 / 1863: Four score and seven years ago our fathers brought forth on this continent, a new nation, conceived in Liberty, and dedicated to the proposition that all men are created equal. Now we are engaged in a great civil war, testing whether that nation, or any nation so conceived and so dedicated, can long endure. We are met on a great battle-field of that war. We have come to dedicate a portion of that field, as a final resting place for those who here gave their lives that that nation might live. It is altogether fitting and proper that we should do this. But, in a larger sense, we can not dedicate -- we can not consecrate -- we can not hallow -- this ground. The brave men, living and dead, who struggled here, have consecrated it, far above our poor power to add or detract. The world will little note, nor long remember what we say here, but it can never forget what they did here. It is for us the living, rather, to be dedicated here to the unfinished work which they who fought here have thus far so nobly advanced. It is rather for us to be here dedicated to the great task remaining before us -- that from these honored dead we take increased devotion to that cause for which they gave the last full measure of devotion -- that we here highly resolve that these dead shall not have died in vain -- that this nation, under God, shall have a new birth of freedom -- and that government of the people, by the people, for the people, shall not perish from the earth. ACTIVITY 2: Scytale Message Exchange Step 1. Get a riddle statement and its answer, or make your own, and write the statement on a strip. Step 2. Wind the strip on the rod (blank side up), keeping it attached at all times. . Step 3. Write the riddle answer on the mounted scytale strip. Step 4. Without detaching it, unwind one end of the scytale strip and exchange with a partner. Step 6. Wind the partner’s attached scytale strip on the rod, read the message, and write it in space provided! Codes: Substitute and Swap Letters, Numbers, Symbols Word Substitute Four score and seven 4 scor n 7 Codes: Substitute and Swap Letters, Numbers, Symbols PLAIN TEXT: I don’t like my new haircut! CODED: @:-( @ :-( @ :-( Background: remove before presentation @:-( Emoticon: a representation of a facial expression (as a smile or frown) created by typing a sequence of characters. Some combinations used in texting are below. (Ask the students for more?) CUL8R ): WAN2TLK? ATB ASA Codes: Substitute and Swap Letters, Numbers, Symbols What did the baby porcupine ask the cactus? ( Coded) Answer: SI THAT UOY ?OMMYM SI THAT UOY ?OMMYM baby porcupine cactus Decoded Answer: IS THAT YOU MOMMY? Activity 3 Activity 3a: Student Rearrangements Make up your own rearrangement of ISxTHATxYOUxMOMMY?xx and write it in the space on the Activity Sheet for Activity 3a. (cont.) Activity 3a: Solution Using Rectangular Coding /ISxTH/ATxYO/UxMOM/MY?xx/ I S x T H A T x Y O U x M O M M Y ? x x IAUM STxY xxM? TYOx HOMx Activity 3 Activity 3b: Other Rearrangements ISxTHATxYOUxMOMMY?xx Some possibilities: xx?YMMOMxUOYxTAHTxSI (backwards) xxMOMMY?xYOUxTHATxIS (reversed words) (cont.) Activity 3 Activity 3c: Random Order ISxTHATxYOUxMOMMY?xx Randomly selecting the letters: Y M x x x x A? T T O I H S U O Y M M (cont.) Factorial How many ways can the 12 characters I S T H A T Y O U M A ? be arranged? 12 x 11 x 10 x 9 x 8 x 7 x 5 x 4 x 3 x 2 x 1 = 12! (“12 factorial”) = 479,001,600 ways Do we have the time to write all the arrangements? Hardly! (479 years) Is that you Mommy? Background: remove before presentation This uses the factorial operation (which is not used subsequently) and the concept that decrypting by “trying all possible combinations” is frequently not a good idea. We are assuming that, by hand, we can write about one million combinations per year, so it will take about 479 years to write all of them—and a lot of paper! (Don’t try this at home!) Caesar’s Code Caesar used a “shift code” with a “Key” for messages to his Generals. Key = 3 a is b is c is y z replaced by D replaced by E replaced by F ... is replaced by B is replaced by C meet me at seven at mcdonalds (Continued on the next chart.) Caesar’s Code (continued) meet me at seven at mcdonalds PHHW PH W H H W P PHHW PH DW VHYHQ DW PFGRQDOGV key = 3 m e t becomes becomes becomes P H W (Continued on the next chart) Background: remove before presentation A Caesar cipher is one of the simplest (and easiest cracked) encryption methods. It is a Substitution Cipher that involves replacing each letter of the secret message with a different letter of the alphabet, which is three positions further in the alphabet. The pattern wraps around to the beginning: X becomes A, Y becomes B, and Z becomes C. The Caesar cipher replaces the characters of the plaintext-alphabet with other characters. This is called monoalphabetic substitution. Unfortunately, simplicity of use is a double-edged sword: The ciphertext thus encoded is highly susceptible to being decoded. Caesar’s cipher is easy to “crack:” simply move each letter in the encoded message back three spaces in the alphabet. 32 Other Values Of The Key Key = 3 is the value that Caesar used: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C a b c d e f g h i j k l m n o p q r s t u v w x y z If Key = 10, what does “j” code to? K L M N O P Q R S T U V W X Y Z A B C D E F G H I J a b c d e f g h i j k l m n o p q r s t u v w x y z How many values can Key have? 26: 0, 1, 2, 3, … ,25 Caesar Slide Key = 3 (Caesar): a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C a defghijklmnopqrstuvwxyzabc hijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ Caesar Slide With Key = 3 Activity 4: Construct A Caesar Slide defghijklmnopqrstuvwxyzabc ABCDEFGHIJKLMNOPQRSTUVWXYZ 1. Cut out the upper-case strip on the Activity Handout. 2. In line with the two cuts in your card, insert and center the upper-case strip. Optional: tape it securely. 3. Cut the two lower-case alphabet strips, tape them end-toend, and insert it above the other strip. 4. For coding and decoding, slide the lower-case strip to match up the two alphabets with the value of the Key. Activity 4 (continued) Try out your Caesar Slide on the coded text: HPHTWWXPPELEXTOYTRSE (The Key is NOT 3. It is between 8 and 12.) The Key is 11. The decoded message is: WE WILL MEET AT MIDNIGHT Website for coding/decoding software: http://www.braingle.com/brainteasers/codes/caesar.php Activity 5: Caesar-Slide Message Exchange For a (short!) secret message of your choosing, 1. Code the message with a Key of your choosing. 2.Exchange the coded message with a partner. (Please tell each other the range in which your Key falls. For example, “It’s between 19 and 23.”) 3.Decode your partner’s message.” 37 Activity 6: Secret Message, Sliding Panel I’m out of here! Worthie Sir John: Hope, that is the beste comfort of the afflicted, cannot much, I fear me, help you now. That I would say to you, is this only; if ever I may be able to Complete Activity 6 to find requite that I owe you, stand not upon message. asking me. the ‘Tishidden not much I can do: but what I can do, bee very sure I will. I knowe that, pa if deathe comes, if ordinary men fear it, it frights not you, accounting it for a high honour, to have such a rewarde of your panelateastendofchapelslides loyalty. Pray yet that you may be spared this soe bitter, cup. I fear not that you will grudge any sufferings; onlie if bie submission you can turn them away, ‘tis the part of a wise man. Tell me, an if you can, to do for you anything that you wolde have done. The general goes back on Wednesday. Restinge your servant to command. [Signed] R.T. panel at east end of chapel slides Chapel Background: remove before presentation In 1642 Sir John Trevanion, who fought for King Charles I, was captured and imprisoned in Colchester Castle. More than likely, Sir John was beginning to sweat because he knew that two of this comrades had already made the long walk to the gallows. Things looked grim for Sir John, when he received a message from a fiend, R.T. The seemingly harmless note actually contained coded instructions on how to escape. RT’s code is called a null cipher, which conceals the letters of the plaintext within a string other letters. To unmask the message within the message, select the third letter after each punctuation mark. (“Panel at east end of chapel slides.”) John’s jailers didn’t know who R.T. was, but they found nothing suspicious in the letter and delivered it to the prisoner. Just as no one questioned the letter, no one questioned Sir John’s request to spend time in quiet prayer in the chapel. After an hour, his jailer finally entered the chapel to check on the prisoner. Sir John was long gone through the secret escape panel. Story 1 Mary Queen of Scots sent messages in a barrel Story 1: Mary Queen of Scots Sent Messages in a Barrel Background: remove before presentation Mary Stuart, 1542-1587, Queen of Scotland and disputed heir to the English throne was kept a prisoner for nineteen years by Queen Elizabeth, fearing that Mary would lead a rebellion against her. Mary communicated with her supporters using a combination cipher and nomenclator. (A nomemclator is a system of coding that relies on a cipher alphabet, which is used to code the majority of a message, and a limited list of codewords.) She sealed her notes in a watertight packet and inserted it in a keg bung of a beer barrel. After discovery, Mary was tried, found guilty largely on the basis of deciphered treasonous messages, and beheaded. (She believed her cipher was secure, and so discussed her treasonous plans more openly than she would have if she’d suspected her messages might be read.) Reminder: tell the interesting way Mary was tricked into revealing the identity of her coconspirators. More Secure Code: Keyword Alphabet Keyword = DIAMONDBACKS DIAMONDBACKS DIAMONBCKS ABCDEFGHIJKLMNOPQRSTUVWXYZ DIAMONBCKSABCDEFGHIJKLMNOPQRSTUVWXYZ DIAMONBCKSABCDEFGHIJKLMNOPQRSTUVWXYZ DIAMONBCKSEFGHJLPQRTUVWXYZ Plaintext Alphabet: Keyword Alphabet: abcdefghijklmnopqrstuvwxyz DIAMONBCKSEFGHJLPQRTUVWXYZ Background: remove before presentation Kerckhoff’s Principle: Coding algorithms should be made public; all of the security of a cipher system needs to lie in the Key. A “good” Keyword is easy to remember, is long enough to change the sequence of the code alphabet, and includes one or more of the letters V W X Y Z (which are near the end of the alphabet). Frequent changing of the Keyword makes the cipher harder to “break.” Activity 7: Example (Keyword = DIAMONDBACKS) Complete Activity 7 to decode the message GOOT GO DT GAMJHDFMR keyword alphabet: plaintext alphabet: DIAMONBCKSEFGHJLPQRTUVWXYZ abcdefghijklmnopqrstuvwxyz coded message: GOOT GO DT GAMJHDFMR decoded message: meet ?? ?? ????????? meet me at mcdonalds Recall that with the Caesar Code (Key = 3): phhw ph dw pfgrqdogv Background: remove before presentation Note that if we had the time, we could ask the students to use their Caesar Slides to do the decoding. The alphabets are: abcdefghijklmnopqrstuvwxyz DIAMONBCKSEFGHJLPQRTUVWXYZ Activity 8: Exchange A Keyword-Alphabet Message For a (short) secret message of your choice. 1. Code it using a Keyword Alphabet. 2. Exchange it with that of a partner. 3. Decode each other’s message. (Please tell each other the Keywords you used.) Vigenère/Beaufort Code Vigenère/Beaufort Array A B C D E F G H I J K L M N O P Q R S T U V W X Y Z a A B C D E F G H I J K L M N O P Q R S T U V W X Y Z b B C D E F G H I J K L M N O P Q R S T U V W X Y Z A c d e f g h i j k l m n o p q C D E F G H I J K L M N O P Q D E F G H I J K L M N O P Q R E F G H I J K L M N O P Q R S F G H I J K L M N O P Q R S T G H I J K L M N O P Q R S T U H I J K L M N O P Q R S T U V I J K L M N O P Q R S T U V W J K L M N O P Q R S T U V W X K L MKeyword N O P Q R S T U V W be X Y The will always L M N O P Q R S T U V W X Y Z Minside N O P the Q R array, S T U V W X Y Z A letter-byN O P Q R S T U V W X Y Z A B O P Q R S T letter. U V W X Y Z A B C P Q R S T U V W X Y Z A B C D Q R S Example: T U V W X Y“JOE” Z A B C D E R S T U V W X Y Z A B C D E F S T U V W X Y Z A B C D E F G T U V W X Y Z A B C D E F G H U V W X Y Z A B C D E F G H I V W X Y Z A B C D E F G H I J W X Y Z A B C D E F G H I J K X Y Z A B C D E F G H I J K L Y Z A B C D E F G H I J K L M Z A B C D E F G H I J K L M N A B C D E F G H I J K L M N O B C D E F G H I J K L M N O P r R S T U V W X Y Z A B C D E F G H I J K L M N O P Q s S T U V W X Y Z A B C D E F G H I J K L M N O P Q R t T U V W X Y Z A B C D E F G H I J K L M N O P Q R S u U V W X Y Z A B C D E F G H I J K L M N O P Q R S T v V W X Y Z A B C D E F G H I J K L M N O P Q R S T U w W X Y Z A B C D E F G H I J K L M N O P Q R S T U V x X Y Z A B C D E F G H I J K L M N O P Q R S T U V W y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Background: remove before presentation In the 1500s, Blaise de Vigenère, a French diplomat, invented the first polyalphabetic cipher, a method for encrypting different letters in a message with different ciphers in which letters may be encoded differently depending on their position in the document. This cipher system is polyalphabetic, which means more than one cipher alphabet is used. This is the reason for the repeating keyword. The result is coded text in which the same letter, such as the two L’s, represents different plaintext letters. For many years Vigenère’s cipher was considered unbreakable, but Charles Babbage, showed in the 1850s that it was not so. Babbage hacked the system by looking for repeated strings of letters. In any message that is much longer than the key, some repeats are bound to occur. How would an eavesdropper exploit this fact? If, say, the ciphertext “UPK” appeared twice, 21 letters apart, then he could deduce that 21 was probably a multiple of the keyword’s length. Or to put it another way, the number of letters in the keyword was a divisor of 21. (1, 3, 7, and 21.) Given enough clues of this sort, an eavesdropper could pin down the exact length of the keyword. Once he knew the length, he could do ordinary frequency analysis to decode the message. Notice that the math comes first: The eavesdropper figures out the length of the keyword before even attempting to figure out what its letters are. Babbage’s ingenious technique broke new ground in cryptography, by introducing mathematical tools to a subject that previously had seemed to be about words. Even if an encryption system does not use mathematics explicitly, its hidden patterns can often be teased out that way--mathematics is, after all, the science of patterns. How To Use The V/B Array 1. Find the known letter in the leftmost column or the top-most row. 2. Move in to the Keyword letter. 3. Move back out perpendicularly to the unknown letter. ------------- coded letters ------------ --- plain letters (decoded letters) --A B C D E F G H I J K L M N O P Q R S T U V W X Y Z a A B C D E F G H I J K L M N O P Q R S T U V W X Y Z b B C D E F G H I J K L M N O P Q R S T U V W X Y Z A c C D E F G H I J K L M N O P Q R S T U V W X Y Z A B d D E F G H I J K L M N O P Q R S T U V W X Y Z A B C e E F G H I J K L M N O P Q R S T U V W X Y Z A B C D f F G H I J K L M N O P Q R S T U V W X Y Z A B C D E g G H I J K L M N O P Q R S T U V W X Y Z A B C D E F h H I J K L M N O P Q R S T U V W X Y Z A B C D E F G i I J K L M N O P Q R S T U V W X Y Z A B C D E F G H j J K L M N O P Q R S T U V W X Y Z A B C D E F G H I k K L M N O P Q R S T U V W X Y Z A B C D E F G H I J l L M N O P Q R S T U V W X Y Z A B C D E F G H I J K m M N O P Q R S T U V W X Y Z A B C D E F G H I J K L n N O P Q R S T U V W X Y Z A B C D E F G H I J K L M o O P Q R S T U V W X Y Z A B C D E F G H I J K L M N p P Q R S T U V W X Y Z A B C D E F G H I J K L M N O q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P r R S T U V W X Y Z A B C D E F G H I J K L M N O P Q s S T U V W X Y Z A B C D E F G H I J K L M N O P Q R t T U V W X Y Z A B C D E F G H I J K L M N O P Q R S u U V W X Y Z A B C D E F G H I J K L M N O P Q R S T v V W X Y Z A B C D E F G H I J K L M N O P Q R S T U w W X Y Z A B C D E F G H I J K L M N O P Q R S T U V x X Y Z A B C D E F G H I J K L M N O P Q R S T U V W y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X keyword letters are always in the array Vigenére/Beaufort Array z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Vigenére/Beaufort Code Example Hi, gang! Bob Riddle: What did Bob buy a roll of tape for? ? For the Keyword JOE the coded answer is: VBAGATYON Keyword: JOEJOE JOE Coded Answer: VBAGATYON Decoded Answer: ????????? Continued on Next Chart… ACTIVITY 9: Decode V/B Riddle Coded: What did Bob buy a roll of tape for? To decode: 1. Find the coded letter in left-most column. 2. Move over to the Keyword letter. 3. Move up to the plain letter. Keyword: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z a A B C D E F G H I J K L M N O P Q R S T U V W X Y Z b B C D E F G H I J K L M N O P Q R S T U V W X Y Z A Decoded c C D E F G H I J K L M N O P Q R S T U V W X Y Z A B d D E F G H I J K L M N O P Q R S T U V W X Y Z A B C e E F G H I J K L M N O P Q R S T U V W X Y Z A B C D f F G H I J K L M N O P Q R S T U V W X Y Z A B C D E g h G: H H I I J J K K L L M M N N O O P P Q Q R R S S T T U U V V W W X X Y Y Z Z A A B B C C D D E E F F G V B A G A T Y O N J O E J O E J O E o n e d o l l a r i I J K L M N O P Q R S T U V W X Y Z A B C D E F G H j J K L M N O P Q R S T U V W X Y Z A B C D E F G H I k K L M N O P Q R S T U V W X Y Z A B C D E F G H I J l L M N O P Q R S T U V W X Y Z A B C D E F G H I J K m M N O P Q R S T U V W X Y Z A B C D E F G H I J K L n N O P Q R S T U V W X Y Z A B C D E F G H I J K L M o O P Q R S T U V W X Y Z A B C D E F G H I J K L M N p P Q R S T U V W X Y Z A B C D E F G H I J K L M N O q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P r R S T U V W X Y Z A B C D E F G H I J K L M N O P Q s S T U V W X Y Z A B C D E F G H I J K L M N O P Q R t T U V W X Y Z A B C D E F G H I J K L M N O P Q R S u U V W X Y Z A B C D E F G H I J K L M N O P Q R S T v V W X Y Z A B C D E F G H I J K L M N O P Q R S T U w W X Y Z A B C D E F G H I J K L M N O P Q R S T U V x X Y Z A B C D E F G H I J K L M N O P Q R S T U V W y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Activity 10: Another V/B Riddle What did Bob want the roll of tape for? ? For Keyword BOB the coded answer is: WGWIQZKOIW Coded: Keyword: Decoded: WGWIQZKOIW BOBBOBBOBB ?????????? ACTIVITY 10 (continued) Riddle: What did Bob want the roll of tape for? To decode: 1. Find the coded letter in left-most column. 2. Move over to the Keyword letter. 3. Move up to the plain letter. WGWIQZXBIJ Keyword: BOBBOBBOBB Decoded: fiftycents f Coded: A B C D E F G H y J K L M N O P Q R S T U V W X Y Z a A B C D E F G H I J K L M N O P Q R S T U V W X Y Z b B C D E F G H I J K L M N O P Q R S T U V W X Y Z A c C D E F G H I J K L M N O P Q R S T U V W X Y Z A B d D E F G H I J K L M N O P Q R S T U V W X Y Z A B C e E F G H I J K L M N O P Q R S T U V W X Y Z A B C D f F G H I J K L M N O P Q R S T U V W X Y Z A B C D E g G H I J K L M N O P Q R S T U V W X Y Z A B C D E F h H I J K L M N O P Q R S T U V W X Y Z A B C D E F G i I J K L M N O P Q R S T U V W X Y Z A B C D E F G H j J K L M N O P Q R S T U V W X Y Z A B C D E F G H I k K L M N O P Q R S T U V W X Y Z A B C D E F G H I J l L M N O P Q R S T U V W X Y Z A B C D E F G H I J K m M N O P Q R S T U V W X Y Z A B C D E F G H I J K L n N O P Q R S T U V W X Y Z A B C D E F G H I J K L M o O P Q R S T U V W X Y Z A B C D E F G H I J K L M N p P Q R S T U V W X Y Z A B C D E F G H I J K L M N O q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P r R S T U V W X Y Z A B C D E F G H I J K L M N O P Q s S T U V W X Y Z A B C D E F G H I J K L M N O P Q R t T U V W X Y Z A B C D E F G H I J K L M N O P Q R S u U V W X Y Z A B C D E F G H I J K L M N O P Q R S T v V W X Y Z A B C D E F G H I J K L M N O P Q R S T U w W X Y Z A B C D E F G H I J K L M N O P Q R S T U V x X Y Z A B C D E F G H I J K L M N O P Q R S T U V W y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y ACTIVITY 11 V/B Code Message Exchange For a (short) secret message of your choice: 1. Code the with a Vigenère/Beaufort Code. 2. Exchange the message with that of a partner. 3. Decode your partner’s message. (Please tell each other the Keyword used) Background: remove before presentation See also: http://ruffnekk.stormloader.com/beaufort_tool.html http://www.simonsingh.net/The_Black_Chamber/vigenere_cipher.html http://www.simonsingh.net/The_Black_Chamber/vigenere_tool.html http://www.math.tamu.edu/~dallen/hollywood/breaking/v.htm STORY 2: Germany promised Mexico the states Arizona, Texas, and New Mexico Coded Telegram From Germany to Mexico Cartoon in U.S. Newspaper 56 Background: remove before presentation The most sensational solution of a single coded message in recent history (according to Martin Gardiner) occurred during World War I. In 1917 the German Foreign Minister, Arthur Zimmerman, the German foreign minister, sent a cable to Mexico, using a diplomatic code called 0075. It announced Germany’s plan to begin unrestricted submarine warfare. If America entered the war, the cable continued, Germany promised to give Mexico the states of Arizona, Texas, and New Mexico--if Mexico would only join fighting against the United States. The Germans intended to begin unrestricted submarine (U boat) warfare and thereby cut off the flow of goods so badly needed by the British and French forces. The cable was intercepted and the code broken by British intelligence, then passed on to President Woodrow Wilson. America had been reluctant to enter the war. But news about the Zimmermann telegram so enraged the U.S. Congress and the public that the Congress declared war on Germany 30 days after the telegram appeared in U.S. newspapers. Had we no done so, it is probable that Germany would have won the war. “Never before or since,” writes David Kahn, “has so much turned upon the solution of a secret message.” Background: remove before presentation STORY 2: Germany would give Arizona, Texas, and New Mexico to Mexico The telegram (January 16, 1917) : "We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of this to keep the United States of America neutral. In the event of this not succeeding, we make Mexico a proposal of alliance on the following basis: make war together, make peace together, generous financial support and an understanding on our part that Mexico is to reconquer the lost territory in Texas, New Mexico, and Arizona. The settlement in detail is left to you. You will inform the[Mexican] President of the above most secretly as soon as the outbreak of war with the United States of America is certain and add the suggestion that he should, on his own initiative, invite Japan to immediate adherence and at the same time mediate between Japan and ourselves. Please call the President's attention to the fact that the ruthless employment of our submarines now offers the prospect of compelling England in a few months to make peace." Signed, ZIMMERMANN (Mexico formally declined Zimmermann's proposals on April 14, by which time the U.S. had declared war on Germany.) STORY 3: Why did the British let them shoot down the airplane? During WWII, enemy spies learned that the actor Leslie Howard would fly from Spain to England. They believed his travel companion was Winston Churchill! So, the enemy made plans to shoot down the plane. The British allowed the enemy to shoot down the plane. Background: remove before presentation STORY 3: Why did the British let them shoot down the airplane? Leslie Howard (3 April 1893 – 1 June 1943) was an English actor (“Gone With the Wind), director, and producer of Hungarian origin. He was active in anti-Nazi propaganda, and worked with British or Allied Intelligence, which may have led to his untimely death in 1943 when his airliner was shot down, sparking modern conspiracy theories regarding his death. The Allies had broken an important German code just days before Howard was to take a flight from Lisbon, Spain. His travel companion happened to look like Winston Churchill. Fascists spotted Howard’s companion and planned to shoot down the plane. The Allies learned of this plan, but allowed the flight to occur to keep the German code system from being changed by the Germans, and the plane was indeed shot down by German planes over the Bay of Biscay, between Spain and England. Story 4 Enigma Coding Machine This German coding system, used by its Navy, was the best one before computers were invented. The code was broken by the British and the Americans even before the U.S. entered the war. Background: remove before presentation London (CNN) – An Enigma machine which was featured in a Hollywood movie about the codebreakers of World War II has smashed auction estimates and sold for a world record price. The encoding device sparked a three-way bidding war when it went under the hammer at Christie's in London Thursday, selling for £133,250 ($208,137) -- more than double the upper estimate of £50,000. Christie's said the previous record for an Enigma machine was £67,250, at the same auction house, in November 2010. Vitally important to the Nazi war machine, the Enigma machine was used by the German military to encrypt messages into a form they believed was unbreakable. However, the code was cracked by a team of cryptologists at Bletchley Park in southern England -- a breakthrough widely credited with having shortened the war by at least two years. Thousands of the machines are thought to have been produced from the 1920s, through to the end of the Second World War, but it is rare for one to come up for sale. The story of the codebreakers has inspired several books, and a movie starring Oscar-winning actress Kate Winslet. The Enigma machine sold Thursday was one of several used in the 2001 film. Background: remove before presentation http://edition.cnn.com/2011/WORLD/europe/09/16/enigma.machine.auction/index.html Although the number of the ciphering machines still in existence is thought to remain in the thousands, "it is rare for one to come up for sale," says Christie's specialist, James Hyslop. "Many are believed to have been produced but it's not a particularly high survival," he adds. During the wartime period, the Enigma machine was the most advanced device of its kind, a forerunner of the first modern computer systems. Originally produced by a Dutch company for commercial use in the aftermath of the First World War, the technology was snapped up for sole use by the German military in 1929. Employing a complex series of interchangeable rotors, the machine would encode messages before sending them via Morse code to an identical device in another location. If the receiving Enigma was attuned to the same settings -- one of a possible 158 million million million combinations -- the encrypted message would then be automatically decoded. Historians have recognized that Bletchley played a very significant part in the war, shortening it by at least two years --Simon Greenish The mindboggling numbers involved led the Germans to believe that it was "impossible to crack" the Enigma, Hyslop explains, hence its importance to the Nazi war machine. Unbeknown to Hitler's charges however, a group of code breakers based at Bletchley Park in the English countryside had devised a way to do just that. Led by the English mathematician Alan Turing, this small army of cryptologists, linguists, scientists and data analysts managed to create a system that at its peak was breaking as many as 6,000 encrypted German Enigma messages every day. "The importance of the Enigma machine and the efforts of those at Bletchley to decode it cannot be underestimated," says Simon Greenish, Director of the Bletchley Park Museum. "Historians have, until comparatively recently, recognized that Bletchley played a very significant part in the war, shortening it by at least two years," he says. "But some are now beginning to say that perhaps it made the difference in terms of winning (the war)." The extraordinary efforts of those involved, Greenish adds, played a vital role in gathering the intelligence that helped shape pivotal battles such as D-Day, the Russian campaign, the North African campaign and the battle for the Atlantic. Greenish claims the role played by the Enigma in determining the outcome of WWII alone is enough to guarantee its status as a relic of great historical importance. Enigma Coding Machine Background: remove before presentation The Enigma (Greek for ”riddle“) is a ciphering-machine developed in Germany by Arthur Scherbius in 1926 for use by businesses. Originally Enigma was used only for civilian purposes and was sold by a company founded by Scherbius. However, near the end of the twenties, the German Wehrmacht started using the Enigma for military purposes, and thus it vanished from the market. It is estimated that between 30,000 and 200,0002 Enigma machines were manufactured during World War II. The Enigma has six main components: • A keyboard, similar to a typewriter • A light field with small lights for each letter • A set of rollers, each one representing a monoalphabetic device • A reflector • A plug-board • A battery The plug-board contains 26 sockets, each one labeled with a letter. When a button on the keyboard is pressed, voltage is applied to the conducting path of the pressed button. This conducting path usually leads directly to the rollers, unless the previously pressed letter is connected to another letter on the plug board. In this case, the electric current would first pass this connection and then the conducting path to the rollers. The conducting paths of each single roller are wired in an arbitrary way. The rollers can be turned and, depending on the position of the rollers, a different conducting path is created, which leads to the reflector. From there, the electric current flows back over all rollers. When voltage is applied at the end of the conducting path of Y, a small light for a letter glows, unless the letter is connected to another letter on the plug-board, in which case the small light of this letter would glow. 64 Background: remove before presentation A B C D E F G H y J K L M N O P Q R S T U V W X Y Z a A B C D E F G H I J K L M N O P Q R S T U V W X Y Z b B C D E F G H I J K L M N O P Q R S T U V W X Y Z A c C D E F G H I J K L M N O P Q R S T U V W X Y Z A B d D E F G H I J K L M N O P Q R S T U V W X Y Z A B C e E F G H I J K L M N O P Q R S T U V W X Y Z A B C D f F G H I J K L M N O P Q R S T U V W X Y Z A B C D E g G H I J K L M N O P Q R S T U V W X Y Z A B C D E F h H I J K L M N O P Q R S T U V W X Y Z A B C D E F G i I J K L M N O P Q R S T U V W X Y Z A B C D E F G H j J K L M N O P Q R S T U V W X Y Z A B C D E F G H I k K L M N O P Q R S T U V W X Y Z A B C D E F G H I J l L M N O P Q R S T U V W X Y Z A B C D E F G H I J K m M N O P Q R S T U V W X Y Z A B C D E F G H I J K L n N O P Q R S T U V W X Y Z A B C D E F G H I J K L M o O P Q R S T U V W X Y Z A B C D E F G H I J K L M N p P Q R S T U V W X Y Z A B C D E F G H I J K L M N O q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P r R S T U V W X Y Z A B C D E F G H I J K L M N O P Q s S T U V W X Y Z A B C D E F G H I J K L M N O P Q R t T U V W X Y Z A B C D E F G H I J K L M N O P Q R S u U V W X Y Z A B C D E F G H I J K L M N O P Q R S T v V W X Y Z A B C D E F G H I J K L M N O P Q R S T U w W X Y Z A B C D E F G H I J K L M N O P Q R S T U V x X Y Z A B C D E F G H I J K L M N O P Q R S T U V W y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y After multiple rotations, the rotor positions yield the proper shifted alphabet for determining the coded (or decoded) letter. Story 4 Enigma Coding Machine Background: remove before presentation It took three German soldiers to operate the Enigma machine. One would key in the message text. One called out the letters as they lighted, and the third wrote down the letters as they were called out. During WWII both the Germans and the Japanese thought they had a cipher system that couldn't be broken. Both systems were broken however, even before the U.S. officially entered he war. Both used “state of the art” cipher machines. Germany never realized that Great Briton and the U.S. were “reading” much of their Enigma message traffic throughout the war. The Japanese cipher machine was code-named “PURPLE” and was used initially for diplomatic message traffic. It was quite different from the German ENGMA machine and used electrical relays in a typewriter-like device. American cryptanalysts worked almost two years to develop a solution to the Japanese machine. The final step in the solution was to construct a machine that functioned identically to the PURPLE machine . The American machine was surprisingly similar in appearance to the actual Japanese machine—even though the Americans had never seen the Japanese machine. 66 Enigma Coding Machine Background: remove before presentation It has to be known which roller belongs to which position in order to decode a message with the Enigma. The ring position, which determines the offset of the inner wiring to the carry-over to the next roller, has to be known as well. Also, the connections on the plug board have to be known. Since the rollers are turning around with different speed, depending on their position, the starting positions of the rollers also have to be known. Setting up a communications net involved selecting the rotors for the day and placing them in the machine in the proper left-to-right order. During the war, the Enigma was improved continuously, which resulted in more than 50 different versions. Nevertheless, English and Polish code-analysts managed to crack German radio messages several times, which had a great impact on the war. The Polish secret service had access to an Enigma-machine from the time when it was still commercially available. And thus, Polish mathematicians managed to reverse engineer the wiring of the Enigma, which enabled them to crack the key a few months later. The Enigma had been cracked – until the Germans started to use an Enigma-variant with a new wiring. The Polish and also the British secret service later on developed machines to ease the cracking of German radio messages. Until the end of World War II, the British employed up to 7,000 people in a decoding-center. The German military issued extra rotors with each machine--two for Army and Air Force machines and four for Navy. Enigma Coding Machine Background: remove before presentation Part electrical, part mechanical, the Enigma was like a combination lock with more than 10^23 possible combinations--this is roughly the number of tablespoons of water in all the world’s oceans. Moreover, the Germans changed the combination every day— sometimes several times a day. Recipients of the transmissions needed to possess not only a duplicate Enigma machine, but also to know the correct combination. If the Allies had had to rely solely on frequency analysis or trial and error, they would still be hunting for that one-tablespoon of water in an ocean of possibilities. However, thanks in large part to crucial earlier work by Polish cryptographers and mathematicians, a team of British codebreakers These achievements greatly shortened the war, hereby saving countless lives. Alan Turing found a shortcut that eliminated almost all of the trial and error for finding the current combination. Now it was more like hunting for one particular tablespoon of water in a small wading pool. Turing’s solution exploited both the mathematical structure of the Enigma machine and certain regularities in the German transmissions, such as (1) their punctual release each morning of a weather bulletin containing the word “Wetter” (the German word for “weather”), and (2) the fact that the Enigma could not encipher any letter as itself, and (3) many German messages were similar. Bletchley Park built 16 machines (“bombes,” based on machines and designs that were given as a jump start to the British by Polish intelligence—devised by Marian Rajewski, a 23-year-old mathematician) The machines were used day and night to decipher Enigma. By early 1942 they were able to decipher all that day’s messages within an hour. 68 Bletchley Park Bletchley Park built 16 machines to crack the Enigma code, based on the machines and designs of a 23-year-old Polish mathematician. The “bombes” were used day and night to decipher Enigma messages sent by the German Navy. By early 1942 the British were able to decipher all that day’s messages within an hour. Story 5 Bletchley Park Background: remove before presentation Bletchley Park is located in England, midway between Oxford and Cambridge Universities (http://www.frobenius.com/bletchley.htm). On this site during Word War II, 22,000 men and women, with prewar help from Poland, broke the German Lorenz and Enigma ciphers, as well as Japanese and Italian codes and ciphers. They used innovative mathematical analyses and were assisted by two computing machines developed there by teams led by the famous mathematician/computer scientist Alan Turing. Bletchley Park and the American counterpart at Mt. Vernon Seminary in Washington, D.C. also played a central role in helping Montgomery win at Alamein, and in the D-Day landings. During the Normandy invasion Bletchley Park was receiving over 4,800 German military messages a day to decode. See also: Secret Code Breaker II by Robert Reynard (1977) Background: remove before presentation http://www.bletchleypark.org/ STORY 6: Recruiting For Bletchley Park “He’s always puttering around with that heap.” PILOT O T AFTER KINDLY FILLET T K F I N R Y E T T I N K E R T I N K E R T O Y What he turned his car into. T O Y Story 6 Recruiting For Bletchley Park Background: remove before presentation To recruit code breakers for Bletchley Park, the British asked readers of the London Daily Telegraph (the highest-selling British newspaper) to complete the crossword puzzle in under 12 minutes. Those who replied were invited to complete another special crossword test, and 6 of the 25 people who took that test were hired for work at Bletchley Park. After the war the people at Bletchley Park were told to go home and never speak about their role, much of which remains classified. Note: A new Jumble appears daily in the Arizona Star. Also, google “Jumble” for more. Number Worms Nowadays information to be coded is usually first represented by either 1. decimal numbers, or 2. binary numbers. 1. Using decimal numbers: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | | | | | | | | | | | | | | | | | | | | | | | | | | 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 A is 00, B is 01, C is 02, … , Z is 25 Example Riddle: How much dirt is in a cylindrical hole 1m deep and 2m in diameter? 2 How much 1 dirt? Coding the Riddle (not the Answer) as a number worm: H O W M U C H D I R T etc. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | | | | | | | | | | | | | | | | | | | | | | | | | | 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Coded Riddle: 07 14 22 12 20 02 07 Number Worms - 1 03 08 17 19 etc. 75 Activity 12: Number Worm Decoding Coded Answer (for Key = 20): Y = 33 34 33 24 34 33 31 44 20 28 27 = +20 = -20 2 1 How much dirt? 33 34 33 24 - 20 20 20 20 34 33 31 44 20 20 20 20 20 28 37 20 20 20 13 14 13 04 14 13 11 24 00 08 17 N O N E O N L Y A I R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | | | | | | | | | | | | | | | | | | | | | | | | | | 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Number Worms Using 0’s and 1’s Information to be coded is first represented by either decimal numbers, or binary numbers (0’s and 1’s) A B C D E F G 00001 00010 00011 00100 00101 00110 00111 H I J K L M N 01000 01001 01010 01011 01100 01101 0110 O P Q R S T U 01111 10000 10001 10010 10011 10100 10101 V W X Y Z 10110 10111 11000 11001 11010 SPACE 00000 PERIOD 01100 ASCII Code 128 letters, numbers, and other characters can be represented. For example, A is 1000001 It’s time-consuming and easy to make errors in working with so many bits/character. So we are using a modified ASCII code with only 5 bits/character. A B C D E F G 00001 00010 00011 00100 00101 00110 00111 78 Riddle: What did Paul Revere say after his ride? Coded Answer: 10111 01000 01111 00001 A B C D E F G 00001 00010 00011 00100 00101 00110 00111 H I J K L M N 01000 01001 01010 01011 01100 01101 0110 O P Q R S T U 01111 10000 10001 10010 10011 10100 10101 V W X Y Z 10110 10111 11000 11001 11010 SPACE 00000 PERIOD 01100 10111 01000 01111 00001 W H O A 79 Riddle: What flower tells what the teacher did after sitting on a tack? Answer: 10010 01111 10011 00101 R Decoded: A B C D E F G 00001 00010 00011 00100 00101 00110 00111 H I J K L M N 01000 01001 01010 01011 01100 01101 0110 O P Q R S T U 01111 10000 10001 10010 10011 10100 10101 O S V W X Y Z 10110 10111 11000 11001 11010 SPACE 00000 PERIOD 01100 E Concealing The Answer Coded Answer: 10010 01111 10011 00101 Decoded Answer: R O S E No Key was used. So, ROSE is coded using standard ASCII, which everyone knows. Let’s put in a Key, to conceal the answer. Code ROSE With The Key “JOE” A B C D E F G 00001 00010 00011 00100 00101 00110 00111 H I J K L M N 01000 01001 01010 01011 01100 01101 01110 O P Q R S T U 01111 10000 10001 10010 10011 10100 10101 V 10110 W 10111 X 11000 Y 11001 Z 11010 SP 00000 10010 01111 10011 00101 ROSE 01010 01111 00101 01010 JOEJ (Key= JOE) ????? ????? ????? ????? ROSE JOEJ Combine the plaintext and the key by using “” (to be continued) Coding ROSE With JOEJ 10010 01111 10011 00101 ROSE 01010 01111 00101 01010 JOEJ (KEY) ????? ????? ????? ? ????? ? ?? ROSE JOEJ 1 0 0 1 1 0 1 0 ? ? ? ? (to be continued) Or: 1 0 0 1 1 0 1 0 0 0 1 1 1 0 1 0 1 0 0 1 84 Background: remove before presentation Note that is the Exclusive-Or operation of Boolean algebra (but those terms may be too scary, so we label it as the “OR” operation). Analogies: We are combining operands bit-by-bit using a logic operation that is easy to implement in digital hardware. 1.The is “like” addition, except for 1 1 = 0, which is like [1 + 1 = 0 carry 1]. 2.The is “like” subtraction, except for 0 1 = 0, which is like [0 − 1 = − 0 borrow 1]. 3.The is “like” the way the word “or” is used, except that this is the Boolean OR operation, with 1 OR 1 = 0. By using , we get a symmetrical key—one whose value is exactly the same for both coding and decoding. 85 Activity 13: JOEJ 0 0 1 1 0 1 0 1 0 1 1 0 10010 01111 10011 00101 ROSE 01010 01111 00101 01010 JOEJ (Key=JOE) 11000 00000 10110 01111 ROSEJOEJ 01010 01111 00101 01010 JOEJ (Key=JOE) 10010 01111 10011 00101 ROSE ROSE JOEJ JOEJ JOEJ works both ways! The key is “symmetric under .” 86 Background: remove before presentation A B C D E F G 00001 00010 00011 00100 00101 00110 00111 H I J K L M N 01000 01001 01010 01011 01100 01101 01110 O P Q R S T U 01111 10000 10001 10010 10011 10100 10101 V W X Y Z 10110 10111 11000 11001 11100 SPACE 00000 FYI: ROSEJOEJ decodes to “XV O” 11000 00000 10110 01111 O space V X Activity 14: Ghost Riddle What do ghosts chew? A B C D E F G 00001 00010 00011 00100 00101 00110 00111 H I J K L M N 01000 01001 01010 01011 01100 01101 01110 O P Q R S T U 01111 10000 10001 10010 10011 10100 10101 V W X Y Z 10110 10111 11000 11001 11010 SP 00000 Coded answer for the Key “GHOSTS”: 0010100111000001001110110111000100001000010000011011001 Decoded answer: ??????????????????????????????????????????????????????? Activity 14: Ghost Riddle (continued) A B C D E F G 00001 00010 00011 00100 00101 00110 00111 H I J K L M N 01000 01001 01010 01011 01100 01101 01110 O P Q R S T U 01111 10000 10001 10010 10011 10100 10101 V 10110 W 10111 X 11000 Y 11001 Z 11010 SP 00000 Coded Answer 0010100111000001001110110111000100001000010000011011001 GHOSTSGHOST 0011101000011111001110100100110011101000011111001110100 0010100111000001001110110111000100001000010000011011001 0011101000011111001110100100110011101000011111001110100 _________________________________________________________________________ _ 0001001111011110000000010011110111100000001111010101101 00010|01111|01111|00000|00010|01111|01111|00000|00111|10101|01101 | | | | | | | | | | G U B | O | O | | B | O | O | | | | M Background: remove before presentation Chewing this or any other (preferably sugar-free) gum immediately after eating can be a significant aid to digestion. Caution: Don’t try this at school! 90 Kids DES (Data Encryption Standard) Congratulations! You have just done Kids DES. The practical version uses “rounds,” “shifting,” and “swapping.” The current version of DES, called AES, is being used worldwide. Background: remove before presentation In 1977 the U.S. introduced the Data Encryption Standard, DES. It became the most widely used cryptosystem in the world. DES was initially developed by IBM, as a modification of an earlier system known as Lucifer. In DES, the plaintext is written in the form of binary numbers and divided into blocks of 64 bits. Each block undergoes a complicated procedure. Sender and receiver receive a key—a block of 56 bits. From this the DES procedure produces 16 partial keys of length 48 bits each. The method method combines a block of 32 bits with one of the partial keys (above), so that a new block of 32 bits is created. This is the preparatory stage. Next, 16 consecutive steps follow of exchanging right and left blocks and linking with on the partial keys of 48 bits, and finally the two halves (now shuffled and combined with partial keys) are reunited into a block of 64 bits. Only with a knowledge of the key can the decoder retrace the individual steps and thus arrive at the original block Etc. There are more sophisticated modes of encryption that provide additional security. In 2002 DES was replaced by Advanced Encryption Standard (AES) as the National Security Agency's official "secure encryption" algorithm. The AES ciphers have been analyzed extensively and are now used worldwide. The AES cipher is specified as a number of repetitions of transformation “rounds” that convert the input plaintext into the final output of ciphertext. Each round consists of several processing steps, including one that depends on the encryption key. A set of reverse rounds are applied to transform ciphertext back into the original plaintext using the same encryption key. AES has 10 rounds of processing for 128-bit keys, 12 for 192-bit keys, and 14 for 256-bit keys. By 2006, the best known attacks were on 7 rounds for 128-bit keys, 8 92 for 192-bit keys, and 9 for 256-bit keys. Background: remove before presentation The first major symmetric algorithm developed for computers in the United States was the Data Encryption Standard (DES), approved for use in the 1970s. The DES uses a 56-bit key. Even though the description of DES is quite lengthy, it has been implemented very efficiently, both in hardware or in software. The only arithmetic operations to be performed are exclusive-ors of bitstrings. The other operations can all be done by table look-up (in software) or by hard-wiring them into a circuit. DES (AES) is used in banking transactions using standards developed by the American Bankers Association. DES (AES) is used to encrypt personal identification numbers (PINs) and account transactions carried out by automatic teller machines (ATMs). DES (AES) is used by the Clearing House Interbank Payments System (CHIPS to authenticate transactions involving trillions of $ per week. DES (AES) is also used in DOE, DOJ, and the Federal Reserve System. Because computers have become increasingly faster since the '70s, security experts no longer consider DES secure -- although a 56-bit key offers more than 70 quadrillion possible combinations (70,000,000,000,000,000), an attack of brute force (simply trying every possible combination in order to find the right key) could easily decipher encrypted data in a short while. DES has since been replaced by the Advanced Encryption Standard (AES), which uses 128-, 192- or 256-bit keys. Most people believe that AES will be a sufficient encryption standard for a long time coming: A 128-bit key, for instance, can have more than 300,000,000,000,000,000,000,000,000,000,000,000 key combinations [source: CES Communications]. 93 Summary: Coding Techniques We Used AEWxOEYTRxGDNxE? Decoded Riddle: ARExWExDONExYET? Coded Answer (DIAMONBCKS): DPGJRT Coded Answer (Shift Code): GRSUYZ Coded Riddle (rectangular): 1. 2. 3. 4. 5. 6. 7. 8. Rectangular ARExWExDONExYET? Scytale Answer (in Invisible Ink) Caesar Shift Keyword Punctuation Vigenère/Beaufort Decimal Worms Binary Worms Background: remove before presentation Invisible Ink Text written on paper with a pen with lemon juice as its ink (or a variety of other commonly available substances) “disappears.” The text can be made to reappear by heating the paper. General George Washington and others used invisible ink and codes to communicate vital information in hand-written letters. Instead of using lemon ink and heat, they would do the writing with a chemical that would disappear, which they called the agent. And then when they were ready to read it, they’d use a completely different chemical, which they called the reagent. Simple, right? Agent and reagent. As long as the they kept the second chemical away from the enemy, the enemy can never figure out what was written. They would also put their messages the first few pages of common books, sometimes between the lines of text. That’s where we get the phrase “Read between the lines.” They use books because they believed that no one would search for messages there, and because they needed good-quality paper for the chemicals of the invisible ink to work best. Background: remove before presentation Invisible Ink Product Description Read and write secret messages, anywhere…in light or darkness. Includes invisible ink and a hidden UV light that you can position at any angle…all built inside. Ages 8+. Spy Net Invisible Ink Pen $8.94 @ Amazon.com This Spy Net invisible ink pen is what you need to read and write secret messages. It has a LED light to read in the dark! Read and write secret messages Create secret messages no one else can read Built-in LED light allows you to read in the dark Requires 3 AG13 batteries Background: remove before presentation The Culper Ring The “Culper” Ring was a civilian spy ring set up by General George Washington at the height of the American Revolutionary War, to send messages to General Washington about the activities of the British in New York. The general public was not aware of the Ring's existence until the 1930s. It was the pre-cursor of intelligence services such as the CIA. Secrecy was so strict that Washington did not know the identity of all the operatives. Members were given code names. For example, Washington's code was 711. (No one used their real name. To relay messages they used coded messages published in newspapers, and invisible ink to write between the lines of what appeared to be a typical letter. The invisible ink methods are still in use by the CIA today. General Benedict Arnold, who became disgruntled with the American cause after he had not been paid for 7 years, devised a plot to sell West Point to the British for 20,000 pounds. His plot was discovered by the Culper Ring and relayed Washington, but Arnold also caught word that his plot had been discovered and he fled down the Hudson River to the British. He attempted to round up the members of the Culper Ring but only succeeded in being captured by some of them. Women were also an integral part of the Culper Ring. At this time in history, women were expected to share their husbands beliefs and not to be directly and openly involved in politics. For this reason, they would not be suspected of being spies. Bad Use Of Coding—Why? RIDDLE: How did the plumber feel after working all day to fix the sink? Coded Answer: EIRADDN Decoded Answer: DRAINED Background: remove before presentation Useful Websites: www.wolframalpha.com (calculations such as 8979mod 3337 = 858) www.navajocodetalkers.org (Navajo Code Talkers) www.braingle.com/brainteasers/codes/caesar.php (Caesar Cipher) web.mit.edu/network/pgp.html (Pretty Good Privacy) www.tropsoft.com/strongenc/des.htm (DES information) www.bletchleypark.org.uk (British WWII codebreakers and Enigma) www.topsecretrosies.com/Top_Secret_Rosies/Home.html (USA women codebreakers) 8. www.softschools.com/testresults.do?id=392 9. www.simonsingh.net/Navajo_Code.html (Navajo Code Talkers AND code-making/code-breaking software for our codes) 10. www.braingle.com/brainteasers/codes/caesar.php (coding/decoding software) 1. 2. 3. 4. 5. 6. 7. Background: remove before presentation Reading List 1. Code Breakers: From Hieroglyphs to Hackers; Simon Adams, DK Publishing, 2002. 2. Code Breaking: A History And Exploration; Rudolf Kippenhahn, Overlook Press, 1999. 3. Mysterious Messages: A History of Codes and Ciphers; Gary L. Blackwood, Dutton Children’s Books, 2009. 4. The Code Book by Simon Singh; Doubleday, 1999. 5. Secret Code Breaker: A Cryptanalyst’s Handbook by Robert Reynard; Smith and Daniel Marketing, 1996. Also: Secret Code Breaker II, and Secret Code Breaker III. 6. Cryptography: Theory And Practice by Douglas R. Stinson; CRC Press, 1995. 7. Crypto: How The Code Rebels Beat The Government—Saving Privacy In The Digital Age; Steven Levy, Viking Penguin, 2001. 8. Codes, Ciphers, And Secret Writing; Martin Gardner; Dover, 1984. 9. The Codebreakers: The Story of Secret Writing; David Kahn, Scribner, 1996.