Cryptography Worksheet Polybius Square
|
|
|
- Dorothy George
- 9 years ago
- Views:
Transcription
1 Cryptography Worksheet Polybius Square 1 A B C D E 2 F G H I / J K 3 L M N O P 4 Q R S T U Using the grid shown, can you encipher the message: We escape tonight Explain how you did it. Now decipher the message: Why do you think I and J are in the same square? Could you use a larger grid? This is called the Polybius Square, since it was first described by Polybius in his Histories in around 150BC. It has been used by many cultures throughout history in different sizes depending on the length of the alphabet (for example the Japanese used a 7 7 grid). Although useful as a form of enciphering, it is not par cularly strong. Why is it not a strong cipher? This was not a problem for the uses that Polybius intended it for, however. He believed it to be a useful aid in telegraphy (which is the long distance transmission of messages via a signalling method). Can you think of some examples of telegraphy? Polybius suggested that the cipher could be used by signalling the numbers using two sets of torches. Can you think of any other ways in which the message could be sent once it has been encrypted using the Polybius Square? What is different about this subs tu on cipher compared to the Mono alphabe c Subs tu on Cipher? How could we make the cipher be er? That is harder to break, but s ll easy to use. Using a keyword of TOMATO, encipher the plaintext: The only way is up. Using the same keyword, decipher: Chooses a keyword and encrypt a short message. Pass the message and the keyword to a friend, and get them to decipher it.
2 Teacher s Notes Polybius Square The Polybius Cipher is fairly easy to implement, and I expect that the vast majority of pupils should be able to encrypt the first message 1 A B C D E without any aid, maybe set as a starter. The encrypted message should read: 2 F G H I / J K L M N O P The way it is wri en will vary, with some pupils using brackets like coordinates or other similar layouts. When discussing, ask why do we lay 4 Q R S T U it out like this (actually the spaces would also be removed). It is because, if the ciphertext is presented in pairs then it is much easier to deduce what cipher has been used. Some pupils may have wri en the coordinates of the le ers the other way round as well. Specify that it is conven on that we go down first, then across (unlike actual coordinates), but that as long as the encipherer and decipherer do it the same way, either is fine. The plaintext of the enciphered message reads: Method in the Madness. I and J are in the same square because we only have 25 squares, but 26 le ers. You can pair up other le er (such as X and Z ) as long as one of them is a very uncommon le er. The conven on is to use I and J for this. A common varia on of the Polybius Square is to use different sized squares. A 6 6 square can be used by adding the digits 0 9. It has a long history, as outlined in the worksheet. It is not par cularly strong since it has no key (that we have seen so far), and more importantly it is s ll a method of mono alphabe c subs tu on, so is suscep ble to frequency analysis. Some forms of telegraphy that the pupils might come up with are semaphore (waving different colour flags to send messages to ships in a fleet), smoke signals, etc. There are many different ways to transmit the encrypted message: flashing lamps; blasts of sound; smoke signals; tapping. Probably the most famous example of the use of the Polybius Square was by American Prisoners of War in the Vietnam War. They tapped the enciphered message on walls and pipes to communicate with each other when they were generally kept with no human contact. In this way some just had conversa ons, whilst others planned escapes. It was a similar, but much simpler, way of encryp ng messages to Morse Code (which could also provide a nice ac vity). It has also been used to aid steganography (physically hiding messages), by tying knots in rope, or s ches in a quilt. Although this is a subs tu on cipher, it is different to other ones we have looked at since each le er is replaced by two numbers. In this way, we can represent 25 le ers by only 5 symbols. This process is called Frac ona on. This is a very powerful tool in cryptography, and although the Polybius Square itself is not that strong, using it in other ciphers increases their security.
3 Teacher s Notes pg 2 Polybius Square An easy way to make the cipher harder to break, but s ll easy to implement, is to add a key (a er all this is always what makes a cipher more secure). Ask the pupils if they can think of any way to implement a key, and if they have no ideas, get them to think about when looking at the Mono alphabe c Subs tu on Cipher. To implement a key, we simply jumble up the order of the le ers in the grid. Like with the Monoalphabe c Subs tu on Cipher, you can just choose the order randomly, but as we discussed then, it is hard to remember an ordered list of 26 objects. For this reason we use the same method here to create the order. We choose a keyword, and put the le ers in order from the keyword first, ignoring any repeated le ers. Then we add the remaining le ers in alphabe cal order. For example, for the keyword SCHOOL we get the Square shown on the right. The square created for the keyword TOMATO is shown below, and the ciphertext generated is: 1 S C H O L A B D E F The plaintext for the second message is the green eyed monster 3 G I / J K M N 4 P Q R T U 1 T O M A B 2 C D E F G 3 H I / J K L N 4 P Q R S U
4 Cryptography Worksheet Polybius Square Long Encryp on Choose a keyword. Choose a paragraph to encrypt from a book. Encrypt the passage using a Polybius Square with you chosen keyword. Pass the encrypted passage to someone else in the class for them to decrypt. DO NOT give them the keyword.
5 Teacher s Notes Polybius Square Long Encryp on If you have done Frequency Analysis and the Polybius Square this is a nice lesson ac vity. You will need to get them to bring books in for the lesson. Make sure that they are choosing passages which are long enough to perform frequency analysis on.
Caesar Ciphers: An Introduction to Cryptography
Purdue GK-12 Lesson Plan 2006-07 Caesar Ciphers: An Introduction to Cryptography Purdue University GK-12 2006-07 Lead developer and contact: Lance Bryant Purdue GK-12 Fellow [email protected] Co-author
Introduction to Hill cipher
Introduction to Hill cipher We have explored three simple substitution ciphers that generated ciphertext C from plaintext p by means of an arithmetic operation modulo 26. Caesar cipher: The Caesar cipher
Page 1. Session Overview: Cryptography
Cool Careers in Cyber Security Frequency Chart and Cipher Cryptography Delivery: Can be used as a table demo (hands-on) activity or during a presentation session. Best to have the wheels pre-made. Messaging
Hill s Cipher: Linear Algebra in Cryptography
Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a
Students will operate in pairs and teams of four to decipher and encipher information.
Title: SHHHHHH! It s a Secret Link to Outcomes: Patterns and Relationships Cooperation Connections Technology Problem Solving Algebra Writing Students will discover the need for a common understanding
UNIT 2 Braille Lesson Plan 1 Braille
Codes and Ciphers Activity Mathematics Enhancement Programme Lesson Plan 1 Braille 1 Introduction T: What code, designed more than 150 years ago, is still used extensively today? T: The system of raised
Solutions to Problem Set 1
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #8 Zheng Ma February 21, 2005 Solutions to Problem Set 1 Problem 1: Cracking the Hill cipher Suppose
Diffusion and Data compression for data security. A.J. Han Vinck University of Duisburg/Essen April 2013 [email protected]
Diffusion and Data compression for data security A.J. Han Vinck University of Duisburg/Essen April 203 [email protected] content Why diffusion is important? Why data compression is important? Unicity
Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may
Number Theory Divisibility and Primes Definition. If a and b are integers and there is some integer c such that a = b c, then we say that b divides a or is a factor or divisor of a and write b a. Definition
Insight Guide. Encryption: A Guide
Encryption: A Guide for Beginners If you read anything about information security, you re likely to have come across the word encryption. It s a fundamental building block when it comes to securing your
Introduction To Security and Privacy Einführung in die IT-Sicherheit I
Introduction To Security and Privacy Einführung in die IT-Sicherheit I Prof. Dr. rer. nat. Doğan Kesdoğan Institut für Wirtschaftsinformatik [email protected] http://www.uni-siegen.de/fb5/itsec/
Introduction to Encryption
Computers and Society Introduction to Encryption Chris Brooks Department of Computer Science University of San Francisco Department of Computer Science University of San Francisco p.1/35 3-0: Terminology
Cyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
How to create a newsletter
How to create a newsletter Why? Creating a newsletter is a valuable way of communicating with a specific audience group. However, its production does take time, energy and resources so it s important to
Welcome to the Reading Workshop. Learning, Loving and Laughing Together
Welcome to the Reading Workshop Aims for the workshop to encourage reading to be a regular and enjoyable activity to explore the best ways to read with your child to try an activity with your child(ren)
Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration
Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration This JavaScript lab (the last of the series) focuses on indexing, arrays, and iteration, but it also provides another context for practicing with
RSA Encryption. Tom Davis [email protected] http://www.geometer.org/mathcircles October 10, 2003
RSA Encryption Tom Davis [email protected] http://www.geometer.org/mathcircles October 10, 2003 1 Public Key Cryptography One of the biggest problems in cryptography is the distribution of keys.
Email Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session
Name: Email Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session Purpose: The purpose of this lab is to reinforce the key ideas behind cryptography
SCOTTISH RESOURCES. First Level/Second Level Autumn 2008. Tuesdays 03.45 04.00 16 and 23 September BBC Radio 4 digital (terrestrial, cable, satellite)
B B C Learning Scotland SCOTTISH RESOURCES First Level/Second Level Autumn 2008 Tuesdays 03.45 04.00 16 and 23 September BBC Radio 4 digital (terrestrial, cable, satellite) China Stories Programmes in
A Short Guide To Metric Nuts and Bolts
A Short Guide To Metric Nuts and Bolts Answers to the most Frequently Asked Questions Standard and Fine Pitch Threads How to identify nut and bolt strength grades How nut and bolt strength grades compare
Mathematics. Introduction
Mathematics Introduction Numeracy is a core subject within the National Curriculum. This policy outlines the purpose, nature and management of the mathematics taught and learned in our school. Mathematics
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
LONG MAY IT WAVE: Fort McHenry and the War of 1812. A Na onal Curriculum for Grades 4 through 8
LONG MAY IT WAVE: Fort McHenry and the War of 1812 A Na onal Curriculum for Grades 4 through 8 Developed by the Friends of Fort McHenry in collabora on with Fort McHenry Na onal Monument & Historic Shrine
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
The use of binary codes to represent characters
The use of binary codes to represent characters Teacher s Notes Lesson Plan x Length 60 mins Specification Link 2.1.4/hi Character Learning objective (a) Explain the use of binary codes to represent characters
The Impact of the Allied Cryptographers on World War II: Cryptanalysis of the Japanese and German Cipher Machines
The Impact of the Allied Cryptographers on World War II: Cryptanalysis of the Japanese and German Cipher Machines Katelyn Callahan December 14, 2013 Abstract Throughout history, cryptography has played
An Introduction to Hill Ciphers Using Linear Algebra
An Introduction to Hill Ciphers Using inear Algebra Brian Worthington October 26, 2010 University of North Texas MATH 2700.002 1 Contents 1 Introduction 3 1.1 Substitution Ciphers.........................
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Lecture No. #06 Cryptanalysis of Classical Ciphers (Refer
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Introduction to The Ten Commandments
Introduction to The Ten Commandments This was a collaborative learning experience for our Nursery, led by Sue Thomson, Children s Minister, St Columba s Church and our Primary 7 teacher, Kara McCurrach.
Key Stage 3 ENGLISH Medium Term Plan: THE BOY IN THE STRIPED PYJAMAS
Key Stage 3 ENGLISH Medium Term Plan: THE BOY IN THE STRIPED PYJAMAS KEY ASSESSMENT OBJECTIVES: AO1: SPEAKING, LISTENING & AO2: STUDYING SPOKEN LANGUAGE 1 Communicating & Adapting Language DURATION: Week
K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013
Hill Cipher Project K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013 Directions: Answer all numbered questions completely. Show non-trivial work in the space provided. Non-computational
Complex Sentences. This icon indicates that detailed teacher s notes are available in the Notes Page.
Complex Sentences This icon indicates that detailed teacher s notes are available in the Notes Page. This icon indicates the slide contains activities created in Flash. These activities are not editable.
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Circles: Circumference and Area Lesson Plans
Circles: Circumference and Area Lesson Plans A set of lessons for year 7. Lesson 1: Circumference of the circle and Pi Lesson 2: Area of the circle Lesson 3: Consolidation and Practice Lesson 1: Circumference
EDA385 Embedded Systems Design. Advanced Course
EDA385 Embedded Systems Design. Advanced Course Encryption for Embedded Systems Supervised by Flavius Gruian Submitted by Ahmed Mohammed Youssef (aso10ayo) Mohammed Shaaban Ibraheem Ali (aso10mib) Orges
Alternating Current and Direct Current
K Hinds 2012 1 Alternating Current and Direct Current Direct Current This is a Current or Voltage which has a constant polarity. That is, either a positive or negative value. K Hinds 2012 2 Alternating
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Sixth Grade Problem Solving Tasks Weekly Enrichments Teacher Materials. Summer Dreamers 2013
Sixth Grade Problem Solving Tasks Weekly Enrichments Teacher Materials Summer Dreamers 2013 SOLVING MATH PROBLEMS KEY QUESTIONS WEEK 1 By the end of this lesson, students should be able to answer these
Acquisition Lesson Planning Form Key Standards addressed in this Lesson: MM2A2c Time allotted for this Lesson: 5 Hours
Acquisition Lesson Planning Form Key Standards addressed in this Lesson: MM2A2c Time allotted for this Lesson: 5 Hours Essential Question: LESSON 2 Absolute Value Equations and Inequalities How do you
Security in Distributed Systems. Network Security
Security in Distributed Systems Introduction Cryptography Authentication Key exchange Computer Science Lecture 18, page 1 Network Security Intruder may eavesdrop remove, modify, and/or insert messages
Simple Switch. migrate to better banking. www.horiconbank.com. Member FDIC
Simple Switch migrate to better banking www.horiconbank.com Welcome to Horicon Bank s Simple Switch Thank you for choosing Horicon Bank, we look forward to building a rela onship with you. Our Simple Switch
Grade 2 Lesson 3: Refusing Bullying. Getting Started
Getting Started Lesson Concepts You can refuse to let bullying happen to you or to others. Being assertive is one way to refuse bullying. Key Words Refuse, assertive Objectives Students will be able to:
1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.
MATH 13150: Freshman Seminar Unit 18 1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. 1.1. Bob and Alice. Suppose that Alice wants to send a message to Bob over the internet
Nebamun goes hunting
Nebamun goes hunting Cross-curricular literacy activities Key Stage 2 classroom resource Nebamun goes hunting Introduction Introduction This resource pack contains instructions and resources for five cross-curricular
Cambridge English: First (FCE) Writing Part 1
Cambridge English: First (FCE) Writing Part 1 Teacher s notes Aims of the lesson to familiarise students with Part 1 of the Writing paper and give them practice at planning an essay Time needed 50 minutes
Oral and mental starter
Lesson Objectives Order fractions and position them on a number line (Y6) Vocabulary gauge, litre numerator, denominator order Resources OHT. individual whiteboards (optional) Using fractions Oral and
Spring Term Year 1. Covering activity badges : Communicator Badge
Spring Term Year 1 Covering activity badges : Communicator Badge 1. Get someone to give you directions or instructions to do something. Check that you have understood. Then follow the directions or instructions.
Hugo. Suitable for: primary literacy; history (of cinema); art and design; modern foreign languages (French) www.filmeducation.org
Hugo Directed by: Martin Scorsese Certificate: U Country: USA Running time: 126 mins Year: 2011 Suitable for: primary literacy; history (of cinema); art and design; modern foreign languages (French) 1
INVENTION CONVENTION. Webquest. by Diane Findlay
INVENTION by Diane Findlay CONVENTION Webquest Introduction You, an inventor? Why not? We use inventions every day, from gadgets to games, from organizing systems to orchestra instruments. And we ve probably
7. HOW TO TEACH A DYSLEXIC PUPIL TO READ
7. HOW TO TEACH A DYSLEXIC PUPIL TO READ OVERVIEW Extract In this module, we will cover the following topics: Introduction Reading ages How to choose appropriate reading materials Teaching a dyslexic child
BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004
BRIEF INTRODUCTION TO CRYPTOGRAPHY By PAGVAC February 8, 2004 What will I learn from this file? What cryptography is How encryption and decryption works Cryptography terms Symmetric cryptography Asymmetric
Lesson 2: How to Give Compliments to Tutees
Kids As Reading Helpers: A Peer Tutor Training Manual Copyright 2002 by Jim Wright www.interventioncentral.org L2-1 Lesson 2: How to Give Compliments to Tutees Introduction When correctly used, compliments
TEACHER S GUIDE TO RUSH HOUR
Using Puzzles to Teach Problem Solving TEACHER S GUIDE TO RUSH HOUR Includes Rush Hour 2, 3, 4, Rush Hour Jr., Railroad Rush Hour and Safari Rush Hour BENEFITS Rush Hour is a sliding piece puzzle that
Chap 2. Basic Encryption and Decryption
Chap 2. Basic Encryption and Decryption H. Lee Kwang Department of Electrical Engineering & Computer Science, KAIST Objectives Concepts of encryption Cryptanalysis: how encryption systems are broken 2.1
The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation. *solve: to find a solution, explanation, or answer for
The 5 P s in Problem Solving 1 How do other people solve problems? The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation *solve: to find a solution, explanation, or answer
Service Project Planning Guide
Service Project Planning Guide CELEBRATING 10 YEARS ON and or registered trademarks of Norman Bridwell. All rights reserved. Everybody can be great because everybody can serve. Dr. Martin Luther King,
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 13 Some More Secure Channel Issues Outline In the course we have yet only seen catastrophic
(b) slack file space.
Hidden Files A Computer Forensics Case Study Question Paper 1. Outline the meaning of the following terms: (a) cookie, [2 marks] A cookie is data stored locally that is used by some websites for data that
Multiplicative Ciphers. Cryptography of Multiplicative Ciphers
Fall 2006 Chris Christensen MAT/CSC 483 Multiplicative Ciphers It is evident from the relative ease with which the Caesar Cipher or its generalization to an arbitrary number of positions of shift has been
Preventing bullying: a guide for teaching assistants. SEN and disability: developing effective anti-bullying practice
Preventing bullying: a guide for teaching assistants SEN and disability: developing effective anti-bullying practice Preventing bullying: a guide for teaching assistants 2 Introduction This guide is based
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
IELTS General Training Reading Task Type 5 (Matching Headings) teacher s notes
teacher s notes Description An activity to introduce how to choose headings for paragraphs of a text, focusing on forming a main idea using language students understand and ignoring unknown words Time
Keywords : complexity, dictionary, compression, frequency, retrieval, occurrence, coded file. GJCST-C Classification : E.3
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 4 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography
CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What
POLITE ENGLISH. Giving advice FREE ON-LINE COURSE. Lesson 2: version without a key SZKOLENIA JĘZYKOWE DLA FIRM ZREALIZUJEMY TWÓJ CEL!
POLITE ENGLISH FREE ON-LINE COURSE Lesson 2: Giving advice version without a key WARM UP THINK Do you like giving advice? Do you often ask for advice? WATCH OUT! Do you know the difference between: ADVICE
How To Understand Cryptanalysis
Cryptography and Network Security Chapter 2 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 2 Classical Encryption Techniques "I am fairly familiar with all
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.
Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:
Areas of Polygons. Goal. At-Home Help. 1. A hockey team chose this logo for their uniforms.
-NEM-WBAns-CH // : PM Page Areas of Polygons Estimate and measure the area of polygons.. A hockey team chose this logo for their uniforms. A grid is like an area ruler. Each full square on the grid has
Multiplying Fractions
. Multiplying Fractions. OBJECTIVES 1. Multiply two fractions. Multiply two mixed numbers. Simplify before multiplying fractions 4. Estimate products by rounding Multiplication is the easiest of the four
CSE331: Introduction to Networks and Security. Lecture 20 Fall 2006
CSE331: Introduction to Networks and Security Lecture 20 Fall 2006 Announcements Homework 2 has been assigned: **NEW DUE DATE** It's now due on Friday, November 3rd. Midterm 2 is Friday, November 10th
Investigating Relationships of Area and Perimeter in Similar Polygons
Investigating Relationships of Area and Perimeter in Similar Polygons Lesson Summary: This lesson investigates the relationships between the area and perimeter of similar polygons using geometry software.
Hide the spies Teacher notes. Activity description. Suitability. Time. AMP resources. Equipment. Key mathematical language.
Hide the spies Teacher notes Activity description Pupils investigate where four spies should sit in a square park so that they cannot see each other, and how many such are possible. Suitability Pupils
Lesson 4: Convert Fractions, Review Order of Operations
Lesson 4: Convert Fractions, Review Order of Operations LESSON 4: Convert Fractions, Do Order of Operations Weekly Focus: fractions, decimals, percent, order of operations Weekly Skill: convert, compute
KET for Schools Reading and Writing Part 9 teacher s notes
KET for Schools Reading and Writing Part 9 teacher s notes Description This is a guided discovery activity to find out what candidates need to do in KET for Schools Reading and Writing Part 9. Students
How To Proofread
GRADE 8 English Language Arts Proofreading: Lesson 6 Read aloud to the students the material that is printed in boldface type inside the boxes. Information in regular type inside the boxes and all information
English lesson plans for Grade 3
English lesson plans for Grade 3 Lessons in this section 3.1 Vocabulary and speaking: How do you say in English? 76 3.2 Reading: We re going to take a holiday 80 3.3 Listening and writing: holiday plans
Contents. Subtraction (Taking Away)... 6. Multiplication... 7 by a single digit. by a two digit number by 10, 100 or 1000
This booklet outlines the methods we teach pupils for place value, times tables, addition, subtraction, multiplication, division, fractions, decimals, percentages, negative numbers and basic algebra Any
Grade 8 English Language Arts 90 Reading and Responding, Lesson 9
GRADE 8 English Language Arts Reading and Responding: Lesson 9 Read aloud to the students the material that is printed in boldface type inside the boxes. Information in regular type inside the boxes and
How we teach calculations in Maths A Parent s Guide
How we teach calculations in Maths A Parent s Guide Belmont Maths Department 2011 1 Contents Introduction...Page 3 Maths at Belmont...Page 4 Addition...Page 5 Subtraction...Page 7 Multiplication...Page
The science of encryption: prime numbers and mod n arithmetic
The science of encryption: prime numbers and mod n arithmetic Go check your e-mail. You ll notice that the webpage address starts with https://. The s at the end stands for secure meaning that a process
This lesson explores different kinds of emotions
4.4 LESSON 1 How are YOUF eeli ng?! My Feelings Book Objectives... Identify different kinds of emotions. Acknowledge emotions and how they make us feel. Work on grammar (capitalization and punctuation).
Grade 7/8 Math Circles November 3/4, 2015. M.C. Escher and Tessellations
Faculty of Mathematics Waterloo, Ontario N2L 3G1 Centre for Education in Mathematics and Computing Tiling the Plane Grade 7/8 Math Circles November 3/4, 2015 M.C. Escher and Tessellations Do the following
family games Taking the kids swimming is a great way of making sure they re moving around and having fun. And to help you get them into
swim family games Taking the kids swimming is a great way of making sure they re moving around and having fun. And to help you get them into the pool, we ve come up with loads of great swimming games to
Academic Achievement Programs Tutoring and SI Program
Reading at the College Level Academic Achievement Programs Tutoring and SI Program Reading at the College Level Active Reading Benefits Activates schema (background knowledge) Enhances comprehension Fosters
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Extension of Playfair Cipher using 16X16 Matrix
Extension of Playfair Cipher using 16X16 S.S.Dhenakaran, PhD. Assistant Professor Computer Science and Engineering Alagappa University, Karaikudi, India. M. Ilayaraja Research Scholar Computer Science
Hieroglyphic Questions
Name: Hieroglyphic Questions Class: 1. Why did the ancient Egyptians need to develop a system of writing? 2. What was the name of the system of writing the Egyptians developed? 3. How did the development
1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
The Difference Between Maps and Globes
The Difference Between Maps and Globes Where are you? Maps and globes can help you answer that question. But maps and globes are different. Maps are flat. Globes are round. A map is a flat picture of a
Language Arts Core, First Grade, Standard 8 Writing-Students write daily to communicate effectively for a variety of purposes and audiences.
Genre Unit Reading and Writing Fables by Amy Kinney Language Arts Core, First Grade, Standard 7 Comprehension-Students understand, interpret, and analyze narrative and informational grade level text. Objective
Microsoft Excel 2013 Step-by-Step Exercises: PivotTables and PivotCharts: Exercise 1
Microsoft Excel 2013 Step-by-Step Exercises: PivotTables and PivotCharts: Exercise 1 In this exercise you will learn how to: Create a new PivotTable Add fields to a PivotTable Format and rename PivotTable
DARTS Directed Activities Related to Texts
DARTS Directed Activities Related to Texts What are DARTS? DARTS are activities that are designed to challenge pupils to engage with texts. They ask them to read closely and to interpret the information
Understand numbers, ways of representing numbers, relationships among numbers, and number systems
Equivalent Fractions and Comparing Fractions: Are You My Equal? Brief Overview: This four day lesson plan will explore the mathematical concept of identifying equivalent fractions and using this knowledge
MATHEMATICS: REPEATING AND GROWING PATTERNS First Grade. Kelsey McMahan. Winter 2012 Creative Learning Experiences
MATHEMATICS: REPEATING AND GROWING PATTERNS Kelsey McMahan Winter 2012 Creative Learning Experiences Without the arts, education is ineffective. Students learn more and remember it longer when they are
Explore architectural design and act as architects to create a floor plan of a redesigned classroom.
ARCHITECTURAL DESIGN AT A GLANCE Explore architectural design and act as architects to create a floor plan of a redesigned classroom. OBJECTIVES: Students will: Use prior knowledge to discuss functions
Unit 7 The Number System: Multiplying and Dividing Integers
Unit 7 The Number System: Multiplying and Dividing Integers Introduction In this unit, students will multiply and divide integers, and multiply positive and negative fractions by integers. Students will
EU Lesson Plan. Name of Teacher: Sharon Goralewski School: Oakland Schools Title of Lesson Plan: The European Union: United in Diversity
EU Lesson Plan Name of Teacher: School: Oakland Schools Title of Lesson Plan: The European Union: United in Diversity Grades: 6th or 7 th Description: This lesson introduces the students to the countries
