Generic encryption

advertisement
Generic Encryption
NAME________________________________ HOUR________
For thousands of years, people have been sending secret messages that have been scrambled so that no person
intercepting the message would be able to read it. This was especially useful during wartime. The process of
scrambling these messages is called encryption. Today with all of the electronic data we have stored in every
part of the world, encryption is more important than ever. It is theoretically possible to break any encryption so
the more complicated the code is, the tougher it is to break. One way to encrypt a message is to use function
composition and function inverse. That is what we will do today.
Space
A
B
C
D
E
F
G
H
First we need to turn all of the letters of the alphabet into numbers.
We will use the chart on the right to do so.
A.
To begin encryption, we need to plug convert a word or
phrase into numbers. Let’s use the word MATH
M=
B.
A=
T=
H=
Write this conversion as a set of points: (M, ) (A,
)(
,
)(
,
0
1
2
3
4
5
6
7
8
I
J
K
L
M
N
O
P
Q
9
10
11
12
13
14
15
16
17
R
S
T
U
V
W
X
Y
Z
18
19
20
21
22
23
24
25
26
)
These 4 numbers given are a sort of code, but it would be really easy to break this code as it is not encrypted. To
scramble the message, we need to perform the same operation to all of the numbers. Pick any operation that
would fit your grade level.
C.
Now perform this operation on each number to create a new set of numbers.
( , )( , )( , )( , )
D.
Represent the entire encryption in bubble form.
M
A
T
H
E.
Write down the bubble form needed to unscramble this message.
F.
Use the inverse operation to unscramble the message.
G.
Convert each of the phrases below into numbers
MR WHITE IS COOL
( , )( , )( ,
( , )( , )( ,
( , )( , )( ,
( , )
H.
)(
)(
)(
,
,
,
)(
)(
)(
,
,
,
)
)
)
YEAH RIGHT
( , )( , )(
( , )( , )(
,
,
)(
)(
,
,
)(
)(
,
,
)
)
Now encrypt the message using an operation of your choosing
__ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __
I.
What do we need to decrypt the message?
J.
Now decrypt each message
__ __ __ __ __ __ __ __ __ __
Space
A
B
C
D
E
F
G
H
0
1
2
3
4
5
6
7
8
I
J
K
L
M
N
O
P
Q
9
10
11
12
13
14
15
16
17
R
S
T
U
V
W
X
Y
Z
18
19
20
21
22
23
24
25
26
K.
Create your own phrase and choose an operation; then encrypt your message. You will then give your
code and your operation to a member of the class.
Operation:______________
Message:
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
Numbers:
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
Code:
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
L.
Create a second phrase and choose a different operation; then encrypt your message. You will then give
your code and your operation to a member of the class.
Operation:______________
Message:
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
Numbers:
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
Code:
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
M.
Get a code and an operation from a class member and decode the message
Operation:______________
Code:
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
Numbers:
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
Message:
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
N. Get a second code and an operation from a different class member and decode the message
Operation:______________
Code:
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
Numbers:
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
Message:
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
Download