Students will operate in pairs and teams of four to decipher and encipher information.



Similar documents
Hill s Cipher: Linear Algebra in Cryptography

Page 1. Session Overview: Cryptography

Insight Guide. Encryption: A Guide

Cyber Security Workshop Encryption Reference Manual

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Introduction to Hill cipher

Students will use various media (computer, graphing calculator, paper and pencil) to graph/sketch linear equations.

Network Security. HIT Shimrit Tzur-David

Using Algebra Tiles for Adding/Subtracting Integers and to Solve 2-step Equations Grade 7 By Rich Butera

Solutions to Problem Set 1

Multiplying Binomials and Factoring Trinomials Using Algebra Tiles and Generic Rectangles

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

Mathematics as Problem Solving The students will demonstrate the ability to gather information from a graphical representation of an equation.

Application Layer (1)

Multiplicative Ciphers. Cryptography of Multiplicative Ciphers

CSE331: Introduction to Networks and Security. Lecture 20 Fall 2006

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

Information Security in Big Data using Encryption and Decryption

The program also provides supplemental modules on topics in geometry and probability and statistics.

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Caesar Ciphers: An Introduction to Cryptography

Cryptography Worksheet Polybius Square

Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session

Prentice Hall Mathematics: Algebra Correlated to: Utah Core Curriculum for Math, Intermediate Algebra (Secondary)

Use of Linear Algebra in Cryptography

Name of Lesson: Properties of Equality A Review. Mathematical Topic: The Four Properties of Equality. Course: Algebra I

K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013

Solving Rational Equations

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Keywords : complexity, dictionary, compression, frequency, retrieval, occurrence, coded file. GJCST-C Classification : E.3

How To Understand And Understand The History Of Cryptography

Title: Integers: Quick, Fun and Easy To Learn

If the World Were Our Classroom. Brief Overview:

Simple Encryption/Decryption Application

Safer data transmission using Steganography

Sandeep Mahapatra Department of Computer Science and Engineering PEC, University of Technology

Algebra I Credit Recovery

Factoring Quadratic Trinomials

An Application of Visual Cryptography To Financial Documents

An Introduction to Cryptography and Digital Signatures

Part 1 Expressions, Equations, and Inequalities: Simplifying and Solving

Mathematics as Reasoning Students will use reasoning skills to determine the best method for maximizing area.

Savitribai Phule Pune University

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

How To Understand Cryptanalysis

How To Factor Quadratic Trinomials

Why dread a bump on the head?

SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE

Supported by. A seven part series exploring the fantastic world of science.

The science of encryption: prime numbers and mod n arithmetic

How To Encrypt With A 64 Bit Block Cipher

Chris Yuen. Algebra 1 Factoring. Early High School 8-10 Time Span: 5 instructional days

Pre-Calculus Unit Plan: Vectors and their Applications. Dr. Mohr-Schroeder. Fall University of Kentucky. Jessica Doering.

An Introduction to Hill Ciphers Using Linear Algebra

Compter Networks Chapter 9: Network Security

THE WHE TO PLAY. Teacher s Guide Getting Started. Shereen Khan & Fayad Ali Trinidad and Tobago

South Plains College. MATH 2320 Differential Equations Section 001, M W 8 9:15 am Math Bldg., Rm. 105

Understand numbers, ways of representing numbers, relationships among numbers, and number systems

Software License Management using the Polymorphic Encryption Algorithm White Paper

Basic Algorithms In Computer Algebra

MOVIES, GAMBLING, SECRET CODES, JUST MATRIX MAGIC

UNIT PLAN: EXPONENTIAL AND LOGARITHMIC FUNCTIONS

The Trouble With Math is English

Accommodated Lesson Plan on Solving Systems of Equations by Elimination for Diego

CSCE 465 Computer & Network Security

UNDERSTANDING COMPUTER FORENSICS. Doug White, PhD, CISSP, CCE Security Assurance Studies Roger Williams University

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

A Concrete Introduction. to the Abstract Concepts. of Integers and Algebra using Algebra Tiles

Grade 6 Math Circles. Binary and Beyond

Students will model a real-world situation by using information and mathematical data on companies to build a stock portfolio.

A SOFTWARE COMPARISON OF RSA AND ECC

Solving Systems of Linear Equations Elimination (Addition)

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Vector Treasure Hunt Teacher s Guide

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Cryptography & Network Security

The Giza Template. Template

Free Pre-Algebra Lesson 55! page 1

Welcome to Mrs. Henisa s Prep for College Algebra Class

Getting Started 15 minutes 1. Journal entry: What types of messages can be communicated with a single bit? 2. Introduce the sending bits challenge

Solving Systems of Linear Equations Substitutions

Randomly Encryption Using Genetic Algorithm

High School Functions Interpreting Functions Understand the concept of a function and use function notation.

PoW-TER Problem Packet A Phone-y Deal? (Author: Peggy McCloskey)

MATH 110: College Algebra

CHAPTER 5. Obfuscation is a process of converting original data into unintelligible data. It

Introduction to Encryption

CORE Assessment Module Module Overview

Big Ideas in Mathematics

Prime and Composite Numbers

Using Ohm s Law to Build a Voltage Divider

I. ASSESSSMENT TASK OVERVIEW & PURPOSE:

Transcription:

Title: SHHHHHH! It s a Secret Link to Outcomes: Patterns and Relationships Cooperation Connections Technology Problem Solving Algebra Writing Students will discover the need for a common understanding of symbolic representation and the many ways symbols can be disguised using codes and mathematical processes. Students will operate in pairs and teams of four to decipher and encipher information. Students will understand how mathematics is used to encode and decode messages. Students will use the TI-82 graphics calculator to formulate and manipulate matrix operations for encoding and decoding messages. Students will solve several different encrypting processes and will work together to formulate a process for encrypting their own information. Students will use matrices to encode and decode messages. Students will individually write about the history and processes used in creating and reading ciphers. Brief Overview: Understanding symbols has been an important factor in human history. The symbols enhance understanding, but without a key for unlocking the message held within the symbols, the information is useless. Allowing only a select group of people to have information is an important part of the world of business, nations, and individuals. Each of us has information which is important to us and would pose a threat to our security if it were public knowledge. Social security numbers, pin codes, bank accounts, personal health information, etc. are essential in our personal world but in the hands of someone else, may be threatening. In business coding messages is important so that only those who purchase a service such as HBO may use the service, and the messages are not pirated by those who do not pay for the access. In the international arena, coding of secure information has moved from fairly simple methods used in the Civil and Revolutionary Wars to the highly complex coding done today with super computers. Mathematics has played an integral part in the development of the programs used in the encoding and decoding processes.

Grade/Level: Duration: The ciphering and deciphering of codes is termed cryptography and cryptanalysis. These words are derived from the Greek, KRYPTOS (meaning hidden), and LOGOS (meaning speech). In this lesson, students will gain an understanding of the history and a few of the methods which can be used to hide messages. Algebra I, Geometry, Algebra II. The complexity of the lesson can be changed by using larger matrices and increasing the operations performed. The lesson also could be used for Pre-Algebra, if only the first lesson is used. The unit is composed of two lessons which are designed to run on consecutive days for 45 minute classes. Prerequisite Knowledge: Objectives: The student must have mastered basic matrix knowledge and know how to use the TI-82 to manipulate matrices. The lesson can be simplified to basic Pre-Algebra usage by only using the activities from Lesson 1. The students will gain an insight into the history of cryptology and learn how to use several different methods to encode and decode messages. Students will understand the role which mathematics plays in enciphering and deciphering codes. Materials/Resources/Printed Materials: Each student will need the use of a TI-82 calculator and 3-3x5 index cards. Each pair will need a copy of the lesson sheet. Each group will also need a pair of scissors. Development/Procedures: Students should be teamed in groups of four which are subdivided into pairs. Lesson 1: Teacher s Guide The teacher will lecture for five minutes on the role of symbols in our culture and mathematics and how messages may be scrambled or coded using different methods. The students also may discuss who would want to code messages and why this is becoming more important in the world.

Students will form groups of four which are sub-divided into pairs. They will receive the first worksheet from their teacher and in pairs will work to find solutions. In Part II, students will work in their groups of four to devise a new code and encrypt their own messages into code. Then groups will exchange cards and work to decode the messages. Lesson 2: Teacher s Guide Extension: Evaluation: Authors: Allocate the first ten minutes of class to follow up on yesterday s assignment. Ask volunteers from some of the groups to share their experiences. Make an effort to ask them to talk about the methods of attack, frustration, success, and the value of having a group versus working as an individual, while decoding. For Lesson 2, students should work in groups of four. Give each student a copy of the instruction on the Hill Cipher. Students should work through the example in their groups. As they finish the sample message, students should pick up the next worksheet. The groups should work for the rest of the period to decipher a message which is encoded using the Hill Method. The teacher can make a research assignment for each group to write a report on who uses codes and why they are such an important topic. The teacher can use a checklist to evaluate the students in Parts I and II of Lesson 1. The teacher can use the same checklist to evaluate group progress and note successes in Lesson 2. Hazel H. Orth Langley High School Fairfax County Sandra W. Williamson Stratford Academy Macon, Georgia

The activity should be done in pairs using notes. REVIEW OF MATRICES Preliminary Lesson To Teaching Encoding 3 &2 6 5 Given matrix A ' and B ' 5 7 3 0 Find each of the following using a graphics calculator. Simplify each. 1. [A] + [B] 2. 3[A] - 2[B] -1 3. [A -1 4. [A] [A] -1-1 5. [A] [B] 6. [B] [A] 7. What is the result to problem 4 called?

LESSON 1 BE A CRYPTANALYST NAME DATE The Caesar Cipher was invented by Julius Caesar over two thousand years ago. It involves using a shift in the positions of the letters of the alphabet forward three letters to create an new alphabet and was used to send secret messages. Standard A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Caesar X Y Z A B C D E F G H I J K L M N O P Q R S T U V W Cipher PBKA LRQ CLO MFWWX Plain text SEND OUT FOR PIZZA DIRECTIONS: Part I Students should work in pairs to solve the following problem: This question was encoded using a Caesar-type shift, but not the same shift as in the example above. Decipher the question, and answer it. (Extra credit if your answer is in cipher text.) * Hint: One of the words is SECRET. SQD OEK TUSETU JXYI IUSHUJ CUIIQWU? Question in plain text Answer in plain text Answer in cipher text Raise your hand when you have finished so that the teacher can see if your answers are correct. While you are waiting for the other pair in your group to finish, each of you can experiment with variations of the Caesar cipher to make a new code. ----------------------------------------------------------------- ABCDEFGHIJKLMNOPQRSTUVWXYZ ABCDEFGHIJKLMNOPQRSTUVWXYZ

Part II In your groups of four, discuss the variations which are possible and devise a new way to use the letters of the alphabet to make a more complex code. You may wish to cut out the alphabet strips at the bottom of the previous page in order to facilitate the process. Decide upon a message which is between 15 and 30 letters long and encrypt that message using your new cipher. Write the directions for your cipher on one 3x5 card, and then write your encrypted message CLEARLY on the second card. You will have 10 minutes to complete this task. When the teacher calls time, each group will exchange its encrypted message with another group. Each group then will work to decipher the code and write the plaintext message on the back of the card and a description of the cipher method used. If the group cannot decipher the message, they may then work on it for homework.

LESSON 2 Name Date HILL CODES One method of encoding is called the Hill cipher which was published by Lester S. Hill in the Atlantic Monthly in 1929. The method used matrices to encode the message. Matrix multiplication converted the information into a new matrix which was not decipherable to those encountering it. If the matrix used were not known, the cryptanalyst had to go through all possible combinations of numbers to find the correct matrix. The larger the cipher matrix, the more difficult it is to find the precise array of numbers which will allow the cryptanalyst to decipher the message. Matrix operations also can be used to make the code even more difficult to break. Guidelines for Encoding and Decoding Using Hill's Method To Encode Step 1 Arrange the letters of your message in matrix form. We will use a 2x2 matrix. Message: MEET ME AT THE LIBRARY ME ME TH IB RY ET AT EL RA QQ* *Note: Use dummy letters to complete the matrix. Step 2 Substitute a number for each letter using the chart below. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 13 5 13 5 20 8 9 2 18 25 5 20 1 20 5 12 18 1 17 17 Step 3 Select a cipher matrix. Let s use 2 1 5 3

Step 4 Multiply each matrix found in step 2 by the cipher matrix. For example: 2 1 13 5 31 30 2 1 13 5 27 30 ( ' or ( ' 5 3 5 20 80 85 5 3 1 20 68 85 Continue with this pattern for each of the message matrices. Note: Matrix multiplication is NOT commutative. The encoded message matrices are: 31 30 27 30 45 28 36 5 53 67 80 85 68 85 115 76 99 13 141 176 Step 1 Find the inverse of the cipher matrix. TO DECODE cipher matrix 2 1 3 &1 inverse 5 3 &5 3 Step 2 Multiply ON THE LEFT by the inverse. 3 &1 31 30 13 5 ( ' &5 2 80 85 5 20 Continue until all matrices have been multiplied. This retrieves the original ciphers which can be matched with their corresponding letters to reveal the message. 13 5 5 20 M E E T

BE A CRYPTANALYST Name Date Here s a message which has ben encoded using the Hill Method. Message in cipher text: 50 60 62 30 60 48 69 96 2 15 33 25 &6 19 12 17 Note: The cipher matrix used to produce this message is 3 1 &1 2 Write the inverse of the cipher matrix. Show all the work which decodes the message. Write the message in plain text.

LESSON 1 STUDENT WORKSHEET ANSWERS Question in plain text: CAN YOU DECODE THIS SECRET MESSAGE? Answer in plain text: YES Answer in cipher text: OUI LESSON 2 STUDENT WORKSHEET ANSWERS Message in plain text: NO HOMEWORK FOR YOU