Cryptography Lesson Plan - UCD

2y ago
36 Views
2 Downloads
1.27 MB
7 Pages
Last View : 13d ago
Last Download : 3m ago
Upload by : Abby Duckworth
Transcription

Cryptography Lesson Plan2nd Class MathsKerry Brooks and Eoin DelaneyAbstractWe hope to introduce cryptography through the lens of simple arithmetic andpatterns. Students will gain an insight into the historic background of cryptography and its application in the Roman Empire and during the American CivilWar. Students will decrypt messages using the Caesar Cipher and the PigpenCipher. They will also design their own secret messages. Scratch will be incorporated into this lesson where the students will use interactive Caesar wheelsand partake in several problem solving role play activities. We have designed aclassified cryptography workbook where students can test their understandingof code-breaking and design their own codes. Students should appreciate thatcomputers can be used to generate and break codes. We have also designedsome interactive games on Scratch where students can practice cracking codes.

1Learning OutcomesAccording to the Curriculum documents (NCCA, 1999), studentsshould be able to; Count the number of objects in a set Develop an understanding of addition by combining or partitioning sets Recognise patterns and predict subsequent numbers Sort and classify objects by two and three criteria Solve one-step and two-step problems involving addition and subtraction Construct number sentences and number stories; solve problems involvingaddition within 992Learning IntentionsUpon successful completion of this lesson, students will be able to. Explain the meaning of the terms cryptography and cipher Recall some basic facts about the historic background of different ciphers Recognise the alphabet as a set and identify that there are twenty-sixelements in this set Assign numbers to different letters in the alphabet Apply the arithmetic techniques of addition and subtraction to shift theletters of the alphabet Interpret geometric patterns Break simple codes using a Caesar Wheel Encrypt and decrypt messages using the Pigpen Cipher Design simple codes and communicate messages with classmates1

3Lesson Rationale3.1Prior KnowledgeFor many children this will be the first link between code-breaking and mathematics. Students have previously covered the basic properties of arithmeticsuch as the associative, commutative and distributive properties of addition.Students should also be comfortable with ordering numbers and recording placevalues. Students should also recognise that a number frame or blank box canbe used to show the presence of an unknown number. Children should enjoythe espionage theme that permeates this lesson.3.2Resources Required Cryptography Workbook (See our attached workbook!) Caesar Wheel (Available to print out) Colouring Pencils Scratch3.3Common Student Misconceptions Students may encounter difficulty in decoding messages using the Caesarwheel. We expect that some students may mix up the application of theinner and outer wheel when decrypting messages. The concept of a key and shift may be confusing for some students. It isuseful to use simple shifts (1-3) to build up confidence in using the Caesarwheel. Some students may not realise that the shift can change for different messages. They may believe the shift is always k 2 for the Caesar Cipherif this is an example that we are providing them with.3.4How will learning be assessed? Teacher Questioning Checking if students can break simple codes Listening to student conversations Scratch Games2

4Lesson FlowTimingLearning ActivityIntroduction to CryptographyWhat is a cipher?10 minsWho uses codes and howare they broken?Historic backgroundThe Caesar CipherNotes for Teacher & Scripted QuestionsLink to spies“Has anyone ever heard of a code”“How do spies communicate?Link to mathematics - Alan TurningLink to arithmetic & patternsSeveral demonstrationsusing wheelThe concept of a shift and a key20 minsScratch interactive wheelEmphasize what eachwheel is used forWorkbook Examples“What happens if I use a shift of 26?”Design your own secret codeConsider student misconceptionsProblem based learningPigpen Cipher introduction“What is a pattern?”Geometrical Code“Can somebody remind me what geometry is?”15 minsClass ExercisesCode locations; GRAFTON STREETScratch GamesCheck workMini ReflectionList three new things thatyou learned today3

55.1CryptographyWhat is Cryptography?Cryptography is the art of solving and writing of codes. The word cryptographycomes from the greek words kryptós which means “hidden secret”. In ancienttimes cryptography was used to send secret messages between people. Thepurpose was to prevent outsiders who obtained the message from understandingthe contained information. The messages would often be sent between armygenerals, diplomats and even spies. In order to reveal the secret, one wouldneed a key to decode the message. In WWII the Germans used a device knownas an enigma machine to encrypt and decrypt secret messages. The Alliesemployed thousands of mathematicians to try and break this code. It was thework of the great Bletchley Park scientists, most notably, Alan Turning whodeveloped a computer to break the code. Modern computers can now easilybreak codes that were previously thought impenetrable. It is the arduous workof cryptographers that ensures our personal information is somewhat safe whenwe surf the web, make payments and call our friends! We will commence ourlesson by looking at one of the oldest and simplest ciphers, the Caesar cipher.Figure 1: Julius Caesar4

5.2The Caesar CipherThe Caesar Cipher was named after the roman emperor Julius Caesar. He isbelieved to have used this cipher to send secret messages across the Roman Empire. The cipher itself is a simple substitution cipher where each letter in thealphabet is replaced by a different letter that is a fixed number of positions downthe alphabet. This cipher can be demonstrated by considering a simple example.In order to encrypt the following message; SECRET SPY we can use a k 2shift. This means that each letter in the code will be shifted two letters alongthe alphabet, so the letter A becomes C and the letter B becomes D as shownin the Caesar wheel below.The encrypted message becomes; UGETGV URAFigure 2: Caesar WheelWe can also reverse this process and decode a secret message. If I receive thecode; CVVCEM CV FCYP, I can use the wheel to decode the cipher to revealthe secret message ATTACK AT DAWN5

The previous example used the key k 2, meaning each letter was shifted twospaces down the alphabet. We can choose k to be any number between 1 and 25to get a unique Caesar shift. If we use k 26 the wheel does a full revolution andthere is no difference between the encrypted message and the actual message.5.3The Pigpen CipherThe Pigpen Cipher is a geometric cipher that assigns a unique shape to eachletter in the alphabet. A secret message is then encrypted using these shapes.Only someone who knows what each shape means can decrypt the message.Variations of this code were used by the Freemasons and in the American CivilWar.Figure 3: Graphical Symbols of the Pigpen CipherUsing these symbols it is possible to encode secret messages. For example if Iwanted to encrypt the location; AMSTERDAMMy code using the pigpen cipher would become; AMSTERDAMSimilarly if I received the code DUBLIN I could use my geometric key toreveal the message DUBLIN5.4WOLF CREEK6

Cryptography is the art of solving and writing of codes. The word cryptography comes from the greek words krypt os which means \hidden secret". In ancient times cryptography was used to send secret messages b

Related Documents:

About This Manual 6. ABOUT THIS MANUAL Purpose This guide is User Manual of UCD-400 and UCD-411. They are USB-connected video interface test units for use with a PC with Windows 10 Windows 8 or Windows 7 operating system. All instructions in this manual are valid when using either UCD-400 and UCD-411 except

Planting mid-October 2016, 2017 and 2018 . Festival. LC-G. LC-D. LC-F. Ruby June. Plant mortality (%) Average plant mortality due to Macrophomina crown rot -2018. UCD Victor. Royal Royce. UCD Valiant. UCD Moxie. UCD Warrior. 0. 10. 20. 30. 40. 50. 60. 70. 80. 90. 100. Plant Mortality (%)

UCD Handbook Patrick Paul Walsh 1 M.Sc. in Sustainable Development in partnership with UN SDSN 2022/23 Contacts Ms. Jennifer McGowan Email: graduatespire@ucd.ie Professor Patrick Paul Walsh- 01 716 8435 Email: ppwalsh@ucd.ie Phonelines may not be available as staff continue to work on a hybrid basis Please emailall your inquiries to:

4 Step Phonics Quiz Scores Step 1 Step 2 Step 3 Step 4 Lesson 1 Lesson 2 Lesson 3 Lesson 4 Lesson 5 Lesson 6 Lesson 7 Lesson 8 Lesson 9 Lesson 10 Lesson 11 Lesson 12 Lesson 13 Lesson 14 Lesson 15 . Zoo zoo Zoo zoo Yoyo yoyo Yoyo yoyo You you You you

of public-key cryptography; providing hands-on experience with some of the most common encryption algorithms that are used on the internet today. Modern Cryptography Introduction Outline 1 Introduction 2 Historical Cryptography Caesar Cipher 3 Public{Key Cryptography

Cryptography with DNA binary strands and so on. In terms of DNA algorithms, there are such results as A DNA-based, bimolecular cryptography design, Public-key system using DNA as a one-way function for key distribution, DNASC cryptography system and so on. However, DNA cryptography is an

Cryptography and Java Java provides cryptographic functionality using two APIs: JCA - Java Cryptography Architecture - security framework integrated with the core Java API JCE - Java Cryptography Extension - Extensions for strong encryption (exported after 2000 US export policy)

TO GROUP WORK PRACTICE, 5/e. 64 3 Understanding Group Dynamics The forces that result from the interactions of group members are often referred to as group dynamics. Because group dynamics influence the behavior of both individual group mem-bers and the group as a whole, they have been of considerable interest to group workers for many years (Coyle, 1930, 1937; Elliott, 1928). A thorough .