|
NOVA scienceNOW: Kryptos
|
|
Viewing Ideas
|
|
Before Watching
-
Define "code" and brainstorm some acronyms and abbreviations,
which are simple codes. Have students describe different types of codes they have
created or solved (e.g. text messages or ciphers in books). Ask what a code is and why codes are used. (A code is a system of symbols, letters, words, or signals
used in place of words or numbers to either store information
or convey a message. They are used to make short or secret
messages.) Acronyms are one type of code and are usually words formed
from the first letters of other words (e.g. PIN=personal identification number; radar=radio
detecting and ranging). In general, acronyms are pronounced as a word. Abbreviations
are another type of code (e.g., HS=high school; MS=middle school; Y2K=Year 2000;
ATM=automated teller machine.) Have students brainstorm some familiar acronyms and
abbreviations and tell what each stands for.
-
Introduce cipher terminology. In a cipher, the replaced
symbols, often letters, follow a rule that is defined by a key
and known only by the sender and receiver of the cipher. To
introduce students to the terms plaintext,
cipher, and key, write the following example on
the board and explain how each term applies to a secret message.
-
The message is called the plaintext because it is the
unchanged source information. Example: The cat ran away.
-
The secret message generated is called a cipher or
ciphertext and it is the encrypted form of the plaintext. Example: Uif
dbu sbo bxbz.
-
The key is the secret solution technique. Example:
Each letter of the plaintext is replaced by the letter that
comes after it in the alphabet.
After reviewing the terms with students, write a different
one-line cipher on the board, using the above key, for the class
to solve.
-
Write substitution and transposition ciphers. Provide
students with definitions and examples of the two main cipher
systems described below. Then have pairs write one transposition
and one substitution cipher.
-
To write a substitution cipher, replace the plaintext
with other symbols without changing the sequence.
Plaintext: The dog is under the desk.
Substitution cipher: 20 8 5 4 15 7 9 19 21 14 4 5 18 20 8 5
4 5 19 11.
Key: Ordered numbers 1–26 replace letters of the
alphabet.
-
To write a transposition, retain all the plaintext
symbols, but change the order in which they occur.
Plaintext: THE MESSAGE IS HIDDEN
Transposition cipher: TEESGIHDEHMSAESIDN
Key (directions): Write the letters, in order, in a grid
alternating between the first and second row.
T
|
E
|
E
|
S
|
G
|
I
|
H
|
D
|
E
|
H
|
M
|
S
|
A
|
E
|
S
|
I
|
D
|
N
|
Next, write the letters in the first row of the grid, in
order, followed by the letters in the second row of the
grid.
Have pairs post their ciphers in the classroom for other
students to solve.
-
Make invisible ink and use it to write a message. There
are many ways to conceal a message. One method involves using
"invisible" ink to write the message and a chemical process to
reveal the writing. Have pairs of students make "invisible" ink
by mixing one tablespoon baking soda with one tablespoon water.
Next, have them fold a piece of copier paper into thirds and
then write a brief message, using a cotton swab, on each of the
three sections. Let the paper dry. Ask students to test which
type of juice best reveals the message—grape juice, grape
juice concentrate, or cranberry juice. To test the different
juices, have pairs dip a thin paint brush in the juice to be
tested and then gently "paint" over the invisible message. Have
them research and explain how their messages were revealed. (Different juices contain different chemicals including
flavenoid pigments which give each juice its color. When the
flavenoid pigments interact with the baking soda, they change
form and appear blue. Baking soda is basic; most juices are
acidic. An acid-base reaction occurs with the baking soda and
the juice, revealing the writing. The amount of pigment
available also influences how dark the message becomes.)
After Watching
-
Write a message using Julius Caesar's substitution code. The segment describes how Julius Caesar (100–44 BCE) used
codes and ciphers so that an enemy could not understand the
messages he sent to his troops. The substitution code he used
shifted the position of alphabet letters three places.
Write on the board the following alphabet and substitution key:
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
|
X
|
Y
|
Z
|
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
Have pairs find an interesting fact about the Roman Empire at
www.pbs.org/empires/romans/
and write a brief statement about it.
Then have them write their fact using Julius Caesar's
substitution code.
Group students by asking two or three sets of pairs to work
together to decipher each other's Roman Empire facts.
-
Make a substitution-code disc. Divide the class into
groups and have each one make a code disc. Give groups two white
paper plates, and have students cut away the outer rim from one
of the plates. Ask groups to make a code disc by centering the
smaller plate on top of the larger plate and then use a brass
fastener to join both at the center. Have students write the
alphabet around the rim of the larger plate and a second set of
symbols (of their choice) on the smaller plate near its rim
directly beneath the letters on the larger plate. Make sure
there is a one-to-one correspondence between the markings on the
two plates.
Possible code sets:
- two sets of the alphabet
- one alphabet, one 1–26 number set
- one alphabet, one set of symbols
On a separate piece of paper, have groups write the name of a
favorite musician and/or band and a sentence about why they like
the musician(s) they chose. (This original message is the
plaintext.) Then have groups turn the smaller disc,
realigning it with the outer alphabet. Ask groups to then write
their band description using substitution. (The new message is
the cipher.) Have each group define their key and then
exchange their cipher with another group to see which group can
first "crack" their cipher.
-
Design and display a poster about a code system. Divide
the class into groups and assign each group one of the code
methods listed below. Then have them research their assigned
code system and present their work in a poster for display.
Groups should write a sample cipher for the rest of the class to
crack.
-
Playfair cipher: a substitution code invented by
seventeenth-century scientist, Sir Charles Wheatstone.
-
Vigenère Table: a substitution code invented
by sixteenth-century cryptologist, Blaise de
Vigenère.
-
Transposition ciphers: Frequently used early in the
history of cryptography and still popular today
-
Product ciphers: Used by the German army during World
War 1
(Suggest as a resource:
www.ridex.co.uk/cryptography/)
-
Make a model similar to Kryptos that has a concealed riddle. Once Kryptos has
been deciphered, the meaning of the messages may form a riddle
that still need to be solved.
In this activity, groups will write ciphers of riddle poems for
other students to decipher and then solve.
To review riddle poems, write the following poem on the board
for the class to solve:
The beginning of eternity,
The end of time and space,
The beginning of every end,
And the end of every place.
-The Guess Book (c. 1820)
(solution: the letter e)
Next, divide the class into teams. Have each team write a riddle
or riddle poem. Have them decide on a key and then make a cipher
of their riddle. Provide teams with scissors and poster board
and have them write their cipher riddle poem on, or cut it out
of, their poster board. Display student work and have classmates
try to decipher and solve hidden riddles.
[For additional riddle poems, see the suggested resource in the
Links and Books section.]
Web Sites
NOVA scienceNOW
www.pbs.org/nova/sciencenow/3411/03.html
Offers Kryptos-related resources and activities including
"Cryptography 101" and "Send a Secret Message", streamed video, and
the opportunity to ask questions to artist Jim Sanborn.
Codes and Ciphers
www.otr.com/ciphers.shtml
Includes information about the history of codes and code breaking.
Kryptos Links
www.elonka.com/kryptos/
Contains several links for articles, interviews, and books related
to Kryptos.
Kryptos, The Da Vinci Code, The Solomon Key
www.kryptos-cia.com/
Tracks the progress and success in cracking three parts of Kryptos.
Script for Writing a Riddle Poem
www.readwritethink.org/lesson_images/lesson169/WriteARiddle.pdf
Provides directions for writing riddle poems.
The Secret Language
www.exploratorium.edu/ronh/secret/secret.html
Describes substitution and transposition codes and includes several
examples.
Books
Cryptography: The Science of Secret Writing
by Laurence Dwight Smith. Dover, 1955.
Introduces students to codes and the history of codes and ciphers.
Top Secret: A Handbook of Codes, Ciphers, and Secret Writing
by Paul B. Janeczko (editor) and Jenna Lareau (illustrator).
Candlewick Press, 2006.
Explains secret writing and includes decoding exercises.
|
|