QuickTime™ and a
d eco mpres sor are nee ded to s ee this picture.
Information is power.
Even before the first written word, the need to safeguard information created an ongoing evolutionary battle between codemakers and codebreakers .
Cryptology is the study of secret writing such as codes and ciphers. Beginning with early techniques for creating secret writing, such as the Caesar shift, monoalphabetic substitution, and the Vigenère cipher, students then move on to learn about modern techniques including digital encryption and RSA public key cryptography. Discussions about the vulnerabilities of each encryption system enable students to attack and decrypt messages using techniques such as frequency analysis and cribbing. Students apply what they learn to encrypt and decrypt their own secret writing.
Class
Materials
Grade
Distribution
Attendance and
Assignments
Required Materials:
Binder for handouts
The Code Book – Simon
Singh lined paper
Your grade will be calculated based on your completion and performance on the following:
Assessments
(quizzes, tests, final exam)
Recommended Materials:
Scientific or graphing calculator
Student grades are based on the total number of points earned using the following scale:
A = 90-100%
B = 80-89%
Assignments
Projects
Group Challenges and
Scavenger Hunt
C = 70-79%
D = 60-69%
F = below 60%
Attendance is necessary to learn the material in this class. You are responsible for all notes and assignments you miss due to an absence, excused or unexcused. Most assignments will be completed during class time, however some will be assigned as homework.
Many assignments will require partner or group work.
Course
Pacing
Guide
Mathematical topics Codes and Historical Topics
Combinatorics and Permutations
Probability
Modular Arithmetic
Prime Numbers
Matrices
Solving Equations
Binary and Hexadecimal Number Systems
Euclidean Algorithm
Transposition Ciphers
Caesar Shift
Monoalphabetic Substitution
Vigenère cipher
Playfair cipher
Hill cipher
Engima Machine
RSA encryption
Public Key Cryptography