Cryptography Worksheet Polybius Square



Similar documents
Caesar Ciphers: An Introduction to Cryptography

Introduction to Hill cipher

Page 1. Session Overview: Cryptography

Hill s Cipher: Linear Algebra in Cryptography

Students will operate in pairs and teams of four to decipher and encipher information.

UNIT 2 Braille Lesson Plan 1 Braille

Solutions to Problem Set 1

Diffusion and Data compression for data security. A.J. Han Vinck University of Duisburg/Essen April 2013

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

Insight Guide. Encryption: A Guide

Introduction To Security and Privacy Einführung in die IT-Sicherheit I

Introduction to Encryption

Cyber Security Workshop Encryption Reference Manual

How to create a newsletter

Welcome to the Reading Workshop. Learning, Loving and Laughing Together

Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration

RSA Encryption. Tom Davis October 10, 2003

Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session

SCOTTISH RESOURCES. First Level/Second Level Autumn Tuesdays and 23 September BBC Radio 4 digital (terrestrial, cable, satellite)

A Short Guide To Metric Nuts and Bolts

Mathematics. Introduction

Network Security. HIT Shimrit Tzur-David

LONG MAY IT WAVE: Fort McHenry and the War of A Na onal Curriculum for Grades 4 through 8

IT Networks & Security CERT Luncheon Series: Cryptography

The use of binary codes to represent characters

The Impact of the Allied Cryptographers on World War II: Cryptanalysis of the Japanese and German Cipher Machines

An Introduction to Hill Ciphers Using Linear Algebra

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Introduction to The Ten Commandments

Key Stage 3 ENGLISH Medium Term Plan: THE BOY IN THE STRIPED PYJAMAS

K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013

Complex Sentences. This icon indicates that detailed teacher s notes are available in the Notes Page.

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Circles: Circumference and Area Lesson Plans

EDA385 Embedded Systems Design. Advanced Course

Alternating Current and Direct Current

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Sixth Grade Problem Solving Tasks Weekly Enrichments Teacher Materials. Summer Dreamers 2013

Acquisition Lesson Planning Form Key Standards addressed in this Lesson: MM2A2c Time allotted for this Lesson: 5 Hours

Security in Distributed Systems. Network Security

Simple Switch. migrate to better banking. Member FDIC

Grade 2 Lesson 3: Refusing Bullying. Getting Started

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.

Nebamun goes hunting

Cambridge English: First (FCE) Writing Part 1

Oral and mental starter

Spring Term Year 1. Covering activity badges : Communicator Badge

Hugo. Suitable for: primary literacy; history (of cinema); art and design; modern foreign languages (French)

INVENTION CONVENTION. Webquest. by Diane Findlay

7. HOW TO TEACH A DYSLEXIC PUPIL TO READ

BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004

Lesson 2: How to Give Compliments to Tutees

TEACHER S GUIDE TO RUSH HOUR

Chap 2. Basic Encryption and Decryption

The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation. *solve: to find a solution, explanation, or answer for

Service Project Planning Guide

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13

(b) slack file space.

Multiplicative Ciphers. Cryptography of Multiplicative Ciphers

Preventing bullying: a guide for teaching assistants. SEN and disability: developing effective anti-bullying practice

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

IELTS General Training Reading Task Type 5 (Matching Headings) teacher s notes

Keywords : complexity, dictionary, compression, frequency, retrieval, occurrence, coded file. GJCST-C Classification : E.3

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

POLITE ENGLISH. Giving advice FREE ON-LINE COURSE. Lesson 2: version without a key SZKOLENIA JĘZYKOWE DLA FIRM ZREALIZUJEMY TWÓJ CEL!

How To Understand Cryptanalysis

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Areas of Polygons. Goal. At-Home Help. 1. A hockey team chose this logo for their uniforms.

Multiplying Fractions

CSE331: Introduction to Networks and Security. Lecture 20 Fall 2006

Investigating Relationships of Area and Perimeter in Similar Polygons

Hide the spies Teacher notes. Activity description. Suitability. Time. AMP resources. Equipment. Key mathematical language.

Lesson 4: Convert Fractions, Review Order of Operations

KET for Schools Reading and Writing Part 9 teacher s notes

How To Proofread

English lesson plans for Grade 3

Contents. Subtraction (Taking Away) Multiplication... 7 by a single digit. by a two digit number by 10, 100 or 1000

Grade 8 English Language Arts 90 Reading and Responding, Lesson 9

How we teach calculations in Maths A Parent s Guide

The science of encryption: prime numbers and mod n arithmetic

This lesson explores different kinds of emotions

Grade 7/8 Math Circles November 3/4, M.C. Escher and Tessellations

family games Taking the kids swimming is a great way of making sure they re moving around and having fun. And to help you get them into

Academic Achievement Programs Tutoring and SI Program

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Extension of Playfair Cipher using 16X16 Matrix

Hieroglyphic Questions

1 Data Encryption Algorithm

The Difference Between Maps and Globes

Language Arts Core, First Grade, Standard 8 Writing-Students write daily to communicate effectively for a variety of purposes and audiences.

Microsoft Excel 2013 Step-by-Step Exercises: PivotTables and PivotCharts: Exercise 1

DARTS Directed Activities Related to Texts

Understand numbers, ways of representing numbers, relationships among numbers, and number systems

MATHEMATICS: REPEATING AND GROWING PATTERNS First Grade. Kelsey McMahan. Winter 2012 Creative Learning Experiences

Explore architectural design and act as architects to create a floor plan of a redesigned classroom.

Unit 7 The Number System: Multiplying and Dividing Integers

EU Lesson Plan. Name of Teacher: Sharon Goralewski School: Oakland Schools Title of Lesson Plan: The European Union: United in Diversity

Transcription:

Cryptography Worksheet Polybius Square 1 A B C D E 2 F G H I / J K 3 L M N O P 4 Q R S T U Using the grid shown, can you encipher the message: We escape tonight Explain how you did it. Now decipher the message: 32 15 44 23 34 14 24 33 44 23 15 32 11 14 33 15 43 43 Why do you think I and J are in the same square? Could you use a larger grid? This is called the Polybius Square, since it was first described by Polybius in his Histories in around 150BC. It has been used by many cultures throughout history in different sizes depending on the length of the alphabet (for example the Japanese used a 7 7 grid). Although useful as a form of enciphering, it is not par cularly strong. Why is it not a strong cipher? This was not a problem for the uses that Polybius intended it for, however. He believed it to be a useful aid in telegraphy (which is the long distance transmission of messages via a signalling method). Can you think of some examples of telegraphy? Polybius suggested that the cipher could be used by signalling the numbers using two sets of torches. Can you think of any other ways in which the message could be sent once it has been encrypted using the Polybius Square? What is different about this subs tu on cipher compared to the Mono alphabe c Subs tu on Cipher? How could we make the cipher be er? That is harder to break, but s ll easy to use. Using a keyword of TOMATO, encipher the plaintext: The only way is up. Using the same keyword, decipher: 11 31 23 25 43 23 23 35 23 54 23 22 13 12 35 44 11 23 43. Chooses a keyword and encrypt a short message. Pass the message and the keyword to a friend, and get them to decipher it.

Teacher s Notes Polybius Square The Polybius Cipher is fairly easy to implement, and I expect that the vast majority of pupils should be able to encrypt the first message 1 A B C D E without any aid, maybe set as a starter. The encrypted message should read: 2 F G H I / J K 52 15 15 43 13 11 35 15 44 34 33 24 22 23 44 3 L M N O P The way it is wri en will vary, with some pupils using brackets like coordinates or other similar layouts. When discussing, ask why do we lay 4 Q R S T U it out like this (actually the spaces would also be removed). It is because, if the ciphertext is presented in pairs then it is much easier to deduce what cipher has been used. Some pupils may have wri en the coordinates of the le ers the other way round as well. Specify that it is conven on that we go down first, then across (unlike actual coordinates), but that as long as the encipherer and decipherer do it the same way, either is fine. The plaintext of the enciphered message reads: Method in the Madness. I and J are in the same square because we only have 25 squares, but 26 le ers. You can pair up other le er (such as X and Z ) as long as one of them is a very uncommon le er. The conven on is to use I and J for this. A common varia on of the Polybius Square is to use different sized squares. A 6 6 square can be used by adding the digits 0 9. It has a long history, as outlined in the worksheet. It is not par cularly strong since it has no key (that we have seen so far), and more importantly it is s ll a method of mono alphabe c subs tu on, so is suscep ble to frequency analysis. Some forms of telegraphy that the pupils might come up with are semaphore (waving different colour flags to send messages to ships in a fleet), smoke signals, etc. There are many different ways to transmit the encrypted message: flashing lamps; blasts of sound; smoke signals; tapping. Probably the most famous example of the use of the Polybius Square was by American Prisoners of War in the Vietnam War. They tapped the enciphered message on walls and pipes to communicate with each other when they were generally kept with no human contact. In this way some just had conversa ons, whilst others planned escapes. It was a similar, but much simpler, way of encryp ng messages to Morse Code (which could also provide a nice ac vity). It has also been used to aid steganography (physically hiding messages), by tying knots in rope, or s ches in a quilt. Although this is a subs tu on cipher, it is different to other ones we have looked at since each le er is replaced by two numbers. In this way, we can represent 25 le ers by only 5 symbols. This process is called Frac ona on. This is a very powerful tool in cryptography, and although the Polybius Square itself is not that strong, using it in other ciphers increases their security.

Teacher s Notes pg 2 Polybius Square An easy way to make the cipher harder to break, but s ll easy to implement, is to add a key (a er all this is always what makes a cipher more secure). Ask the pupils if they can think of any way to implement a key, and if they have no ideas, get them to think about when looking at the Mono alphabe c Subs tu on Cipher. To implement a key, we simply jumble up the order of the le ers in the grid. Like with the Monoalphabe c Subs tu on Cipher, you can just choose the order randomly, but as we discussed then, it is hard to remember an ordered list of 26 objects. For this reason we use the same method here to create the order. We choose a keyword, and put the le ers in order from the keyword first, ignoring any repeated le ers. Then we add the remaining le ers in alphabe cal order. For example, for the keyword SCHOOL we get the Square shown on the right. The square created for the keyword TOMATO is shown below, and the ciphertext generated is: 1 S C H O L 11 31 23 12 35 34 54 52 14 54 32 44 45 41 2 A B D E F The plaintext for the second message is the green eyed monster 3 G I / J K M N 4 P Q R T U 1 T O M A B 2 C D E F G 3 H I / J K L N 4 P Q R S U

Cryptography Worksheet Polybius Square Long Encryp on Choose a keyword. Choose a paragraph to encrypt from a book. Encrypt the passage using a Polybius Square with you chosen keyword. Pass the encrypted passage to someone else in the class for them to decrypt. DO NOT give them the keyword.

Teacher s Notes Polybius Square Long Encryp on If you have done Frequency Analysis and the Polybius Square this is a nice lesson ac vity. You will need to get them to bring books in for the lesson. Make sure that they are choosing passages which are long enough to perform frequency analysis on.