Update ActivityInstructions.md
parent
ee3ee944aa
commit
5737aebaa6
|
@ -113,12 +113,13 @@ The Vigenère cipher, was invented by a Frenchman, Blaise de Vigenère in the 16
|
||||||
In other words, the letters in the Vigenère cipher are shifted by different amounts, normally done using a word or phrase as the encryption key.
|
In other words, the letters in the Vigenère cipher are shifted by different amounts, normally done using a word or phrase as the encryption key.
|
||||||
For example, if the key-word is ”dog,” consisting of the 4th, 15th, and 7th letters of the alphabet, then the first letter of the message is shifted by 4, the second letter is shifted by 15, the third by 7, the fourth by 4 (here we return to the beginning of the key-word), the fifth by 15, and so on.
|
For example, if the key-word is ”dog,” consisting of the 4th, 15th, and 7th letters of the alphabet, then the first letter of the message is shifted by 4, the second letter is shifted by 15, the third by 7, the fourth by 4 (here we return to the beginning of the key-word), the fifth by 15, and so on.
|
||||||
Unlike the monoalphabetic ciphers, polyalphabetic ciphers are not susceptible to frequency analysis, as more than one letter in the plaintext can be represented by a single letter in the encryption.
|
Unlike the monoalphabetic ciphers, polyalphabetic ciphers are not susceptible to frequency analysis, as more than one letter in the plaintext can be represented by a single letter in the encryption.
|
||||||
Ask kids to encrypt a message for the following group and put it in a bottle / jar dedicated for that age group. Remind them – no hate speech, no bullying
|
|
||||||
It is possible to use the cesar brutforcing drum to encrypt. Set all wheels to A. Then turn the second wheel of each pair to spell the message. Then turn all the pairs (always 1st and 2nd synchronized, stick a sticky note to fix them) so the 1st wheels spell the codeword. Now you can read the encoded message on the entry line.
|
It is possible to use the cesar brutforcing drum to encrypt. Set all wheels to A. Then turn the second wheel of each pair to spell the message. Then turn all the pairs (always 1st and 2nd synchronized, stick a sticky note to fix them) so the 1st wheels spell the codeword. Now you can read the encoded message on the entry line.
|
||||||
Here is hello encrypted with DOG
|
Here is hello encrypted with DOG
|
||||||
|
|
||||||
First we encode HELLO on the second wheel pairs
|
First we encode HELLO on the second wheel pairs
|
||||||
v-- coding line
|
v-- coding line
|
||||||
|
|
||||||
|A|B|C|D|E|F|G|H|I|J|K|L|M|N|O|P|Q|R|S|T|U|V|W|X|Y|Z|
|
|A|B|C|D|E|F|G|H|I|J|K|L|M|N|O|P|Q|R|S|T|U|V|W|X|Y|Z|
|
||||||
|H|I|J|K|L|M|N|O|P|Q|R|S|T|U|V|W|X|Y|Z|A|B|C|D|E|F|G|
|
|H|I|J|K|L|M|N|O|P|Q|R|S|T|U|V|W|X|Y|Z|A|B|C|D|E|F|G|
|
||||||
| |
|
| |
|
||||||
|
@ -136,6 +137,7 @@ First we encode HELLO on the second wheel pairs
|
||||||
|
|
||||||
Then we turn all pairs to spell DOG on the coding line
|
Then we turn all pairs to spell DOG on the coding line
|
||||||
v-- coding line
|
v-- coding line
|
||||||
|
|
||||||
|D|E|F|G|H|I|J|K|L|M|N|O|P|Q|R|S|T|U|V|W|X|Y|Z|A|B|C|
|
|D|E|F|G|H|I|J|K|L|M|N|O|P|Q|R|S|T|U|V|W|X|Y|Z|A|B|C|
|
||||||
|K|L|M|N|O|P|Q|R|S|T|U|V|W|X|Y|Z|A|B|C|D|E|F|G|H|I|J|
|
|K|L|M|N|O|P|Q|R|S|T|U|V|W|X|Y|Z|A|B|C|D|E|F|G|H|I|J|
|
||||||
| |
|
| |
|
||||||
|
@ -155,16 +157,23 @@ The crypted message is read on the second wheel of each pair
|
||||||
KSROU
|
KSROU
|
||||||
|
|
||||||
To decode set all wheels to A
|
To decode set all wheels to A
|
||||||
|
|
||||||
AA AA AA AA AA
|
AA AA AA AA AA
|
||||||
|
|
||||||
then put the keyword on the 1st wheels
|
then put the keyword on the 1st wheels
|
||||||
DA OA GA DA OA
|
DA OA GA DA OA
|
||||||
|
|
||||||
put the coded message on 2nd wheels on the code line
|
put the coded message on 2nd wheels on the code line
|
||||||
|
|
||||||
DK OS GR DO OU
|
DK OS GR DO OU
|
||||||
|
|
||||||
Then turn the 1st & 2nd wheels of each pair synchronised so that the 1st wheels are all set to A. Now you can read the message on the 2nd wheels
|
Then turn the 1st & 2nd wheels of each pair synchronised so that the 1st wheels are all set to A. Now you can read the message on the 2nd wheels
|
||||||
|
|
||||||
AH AE AL AL AO
|
AH AE AL AL AO
|
||||||
|
|
||||||
=> HELLO
|
=> HELLO
|
||||||
|
|
||||||
|
Ask kids to encrypt a message for the following group and put it in a bottle / jar dedicated for that age group. Remind them – no hate speech, no bullying
|
||||||
/* Shall we audit those messages before the following group? Shall we ask BEE Secure for no-bullying posters and materials? */
|
/* Shall we audit those messages before the following group? Shall we ask BEE Secure for no-bullying posters and materials? */
|
||||||
|
|
||||||
Offer encrypted messages to decrypt.
|
Offer encrypted messages to decrypt.
|
||||||
|
@ -191,10 +200,10 @@ Here's a code for kids to solve:
|
||||||
|
|
||||||
LKU OHR OIT KGH WHE IER DRA ELF ROI LOE OKL OFD
|
LKU OHR OIT KGH WHE IER DRA ELF ROI LOE OKL OFD
|
||||||
|
|
||||||
### Code word
|
### Code word / Keyword
|
||||||
*(flipchart/whiteboard; paper for kids to write their own tables)*
|
*(flipchart/whiteboard; paper for kids to write their own tables; there are printable ones)*
|
||||||
|
|
||||||
You can make a code based on a special code word which only you know about. We've chosen the word "XYLOPHONE".
|
Kids can make a code based on a special code word (or keyword) which only they know about. We've chosen the word "XYLOPHONE".
|
||||||
So first of all we write down the normal alphabet (the plaintext alphabet), and below it we write the code alphabet, starting with the codeword, and following the codeword with the rest of the alphabet.
|
So first of all we write down the normal alphabet (the plaintext alphabet), and below it we write the code alphabet, starting with the codeword, and following the codeword with the rest of the alphabet.
|
||||||
But there's a trick to this - remember that we don't want repeated letters!
|
But there's a trick to this - remember that we don't want repeated letters!
|
||||||
So kids have to leave out the second O in XYLOPHONE, and when you get to the normal alphabet you write down ABCDFGI... leaving out the E, the H, and any other letters in the codeword.
|
So kids have to leave out the second O in XYLOPHONE, and when you get to the normal alphabet you write down ABCDFGI... leaving out the E, the H, and any other letters in the codeword.
|
||||||
|
@ -204,6 +213,8 @@ So here's what the alphabet looks like when you're finished:
|
||||||
|-----------|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|
|
|-----------|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|-|
|
||||||
|Code: |X|Y|L|O|P|H|N|E|A|B|C|D|F|G|I|J|K|M|Q|R|S|T|U|V|W|Z|
|
|Code: |X|Y|L|O|P|H|N|E|A|B|C|D|F|G|I|J|K|M|Q|R|S|T|U|V|W|Z|
|
||||||
|
|
||||||
|
The next step is to explain to kids that besides a code word/ keyword, we can have a keyletter - the code word should be written starting under the specified keyletter rather than at the beginning. And then, the rest of the alphabet is written omitting duplicate letters.
|
||||||
|
|
||||||
### Public Key Cryptography (Highly recommended)
|
### Public Key Cryptography (Highly recommended)
|
||||||
Explain the use of encryption for public-secret (private) key cryptography – with previously shown ciphers, we use the same key for encrypting and decrypting – symmetric encryption.
|
Explain the use of encryption for public-secret (private) key cryptography – with previously shown ciphers, we use the same key for encrypting and decrypting – symmetric encryption.
|
||||||
It is more secure if each of us has different keys. Demonstrate Georges's box with 2 locks that illustrates the idea of asymmetric encryption.
|
It is more secure if each of us has different keys. Demonstrate Georges's box with 2 locks that illustrates the idea of asymmetric encryption.
|
||||||
|
|
Loading…
Reference in New Issue