|
NOVA scienceNOW: Kryptos
|
|
Viewing Ideas
|
|
Before Watching
Define "code" and
brainstorm some acronyms and abbreviations, which are simple codes. Have students describe different types of codes
they have created or solved (e.g. text messages or ciphers in books).
Ask what a code is and why codes are used. (A code is a system of symbols,
letters, words, or signals used in place of words or numbers to either store
information or convey a message. They are used to make short or secret
messages.) Acronyms are one type of code
and are usually words formed from the first letters of other words (e.g.
PIN=personal identification number; radar=radio detecting and
ranging). In general, acronyms are
pronounced as a word. Abbreviations are another type of code (e.g.,
HS=high school; MS=middle school; Y2K=Year 2000; ATM=automated teller machine.) Have students brainstorm some familiar acronyms and
abbreviations and tell what each stands for.
Introduce cipher terminology. In a cipher, the replaced symbols, often letters,
follow a rule that is defined by a key and known only by the sender and
receiver of the cipher. To introduce students to the terms plaintext,
cipher, and key, write the following example on the board and explain
how each term applies to a secret message.
The
message is called the plaintext because
it is the unchanged source information. Example: The cat ran away.
The
secret message generated is called a cipher or ciphertext and it is
the encrypted form of the plaintext. Example: Uif dbu sbo bxbz.
The
key is the secret solution technique.
Example: Each letter of the plaintext is replaced by the letter that comes
after it in the alphabet.
After reviewing the terms with
students, write a different one-line cipher on the board, using the above key,
for the class to solve.
Write substitution and
transposition ciphers. Provide students with
definitions and examples of the two main cipher systems described below. Then
have pairs write one transposition and one substitution cipher.
To write a substitution
cipher, replace the plaintext with other
symbols without changing the sequence.
Plaintext: The dog is under the
desk.
Substitution cipher: 20 8 5 4 15
7 9 19 21 14 4 5 18 20 8 5 4 5 19 11.
Key: Ordered numbers 1–26
replace letters of the alphabet.
To write a transposition, retain all the plaintext symbols, but change the
order in which they occur.
Plaintext: THE MESSAGE IS HIDDEN
Transposition cipher:
TEESGIHDEHMSAESIDN
Key (directions): Write the
letters, in order, in a grid alternating between the first and second row.
T
|
E
|
E
|
S
|
G
|
I
|
H
|
D
|
E
|
H
|
M
|
S
|
A
|
E
|
S
|
I
|
D
|
N
|
Next, write the letters in the
first row of the grid, in order, followed by the letters in the second row of
the grid.
Have pairs post their ciphers in
the classroom for other students to solve.
Make invisible ink and use it
to write a message. There are many ways to
conceal a message. One method involves using "invisible" ink to
write the message and a chemical process to reveal the writing. Have pairs of
students make "invisible" ink by mixing one tablespoon baking soda
with one tablespoon water. Next, have them fold a piece of copier paper into
thirds and then write a brief message, using a cotton swab, on each of the
three sections. Let the paper dry. Ask students to test which type of juice
best reveals the message—grape juice, grape juice concentrate, or
cranberry juice. To test the different juices, have pairs dip a thin paint
brush in the juice to be tested and then gently "paint" over the
invisible message. Have them research and explain how their messages were
revealed. (Different juices contain different chemicals including flavenoid
pigments which give each juice its color. When the flavenoid pigments interact
with the baking soda, they change form and appear blue. Baking soda is basic;
most juices are acidic. An acid-base reaction occurs with the baking soda and
the juice, revealing the writing. The amount of pigment available also
influences how dark the message becomes.)
After Watching
Write a message using Julius
Caesar's substitution code. The
segment describes how Julius Caesar (100–44 BCE) used codes and ciphers
so that an enemy could not understand the messages he sent to his troops. The
substitution code he used shifted the position of alphabet letters three
places.
Write on the board the following
alphabet and substitution key:
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
|
X
|
Y
|
Z
|
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
Have pairs find an interesting fact
about the Roman Empire at
www.pbs.org/empires/romans/
and
write a brief statement about it.
Then have them write their fact
using Julius Caesar's substitution code.
Group students by asking two or
three sets of pairs to work together to decipher each other's Roman
Empire facts.
Make a substitution-code disc. Divide the class into groups and have each one
make a code disc. Give groups two white paper plates, and have students cut
away the outer rim from one of the plates. Ask groups to make a code disc by
centering the smaller plate on top of the larger plate and then use a brass
fastener to join both at the center. Have students write the alphabet around
the rim of the larger plate and a second set of symbols (of their choice) on
the smaller plate near its rim directly beneath the letters on the larger
plate. Make sure there is a one-to-one correspondence between the markings on
the two plates.
Possible code sets:
- two sets of the alphabet
- one alphabet, one
1–26 number set
- one alphabet, one set of
symbols
On a separate piece of paper, have
groups write the name of a favorite musician and/or band and a sentence about why
they like the musician(s) they chose. (This original message is the plaintext.) Then have groups turn the smaller disc, realigning
it with the outer alphabet. Ask groups to then write their band description
using substitution. (The new message is the cipher.) Have each group define their key and then exchange
their cipher with another group to see which group can first
"crack" their cipher.
Design and display a poster about a code system. Divide the class into groups and assign each group
one of the code methods listed below. Then have them research their assigned
code system and present their work in a poster for display. Groups should write
a sample cipher for the rest of the class to crack.
Playfair cipher: a substitution code invented by seventeenth-century
scientist, Sir Charles Wheatstone.
Vigenère Table: a substitution code invented by sixteenth-century
cryptologist, Blaise de Vigenère.
Transposition ciphers:
Frequently used early in the history of cryptography and still popular today
Product ciphers: Used by
the German army during World War 1
(Suggest as a resource:
www.ridex.co.uk/cryptography/)
Make a model similar to Kryptos that has a concealed riddle. Once Kryptos has been deciphered, the meaning of the messages may
form a riddle that still need to be solved.
In this activity, groups will write
ciphers of riddle poems for other students to decipher and then solve.
To review riddle poems, write the
following poem on the board for the class to solve:
The beginning of
eternity,
The end of time
and space,
The beginning of
every end,
And the end of
every place.
-The Guess
Book (c. 1820)
(solution: the
letter e)
Next, divide the class into teams.
Have each team write a riddle or riddle poem. Have them decide on a key and
then make a cipher of their riddle. Provide teams with scissors and poster
board and have them write their cipher riddle poem on, or cut it out of, their
poster board. Display student work and have classmates try to decipher and
solve hidden riddles.
[For additional riddle poems, see
the suggested resource in the Links and Books section.]
Web Sites
NOVA scienceNOW
www.pbs.org/nova/sciencenow/3411/03.html
Offers Kryptos-related resources
and activities including "Cryptography 101" and "Send a
Secret Message", streamed video, and the opportunity to ask questions to
artist Jim Sanborn.
Codes and Ciphers
www.otr.com/ciphers.shtml
Includes information about the
history of codes and code breaking.
Kryptos Links
www.elonka.com/kryptos/
Contains several links for
articles, interviews, and books related to Kryptos.
Kryptos, The Da Vinci Code, The
Solomon Key
www.kryptos-cia.com/
Tracks the progress and success in cracking
three parts of Kryptos.
Script for Writing a Riddle Poem
www.readwritethink.org/lesson_images/lesson169/WriteARiddle.pdf
Provides directions for writing riddle
poems.
The Secret Language
www.exploratorium.edu/ronh/secret/secret.html
Describes substitution and
transposition codes and includes several examples.
Books
Cryptography: The Science
of Secret Writing
by Laurence Dwight Smith.
Dover, 1955.
Introduces students to codes and the history of codes and
ciphers.
Top Secret: A Handbook
of Codes, Ciphers, and Secret Writing
by Paul B. Janeczko
(editor) and Jenna Lareau (illustrator). Candlewick Press, 2006.
Explains secret writing and includes decoding exercises.
|
|