Sunday, March 18, 2018

Cryptography


Experiment Title:

Coding Breaking and Secret Messages

Objective:

Learn about how messages can be coded and decoded

Background on Cryptography

Cryptography is the practice (meaning coding and decoding) and study of techniques for secure communication in the presence of third parties (can be anyone outside of the basic conversation). Think about when you are little and you have your own language and your parents figure out what you are trying to say in order to understand what you would like, this is the basic idea of decryption, taking something that might appear to be gobbledy-gook and turning it into something that can be understood by more people than just yourself. Now think of when you have a diary at home and a sibling who really wants to be like you and insists on reading your diary, to keep your thoughts and feelings to yourself you may come up with your own language that your sibling does not know, this is the basic idea of encryption, taking something that most people can follow and understand and turning it into something that very few people can figure out.

Now we know what encryption and decryption is but how do we get from a to b and back again? The answer is that we use ciphers. Ciphers are algorithms (series of commands that change things from on thing to another based on key information provided to it). Let’s use a simple encryption method to demonstrate this:

I have the alphabet: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z and I want to encrypt it with an alphabet shift cipher (meaning that one letter becomes a different letter in the alphabet). This would be done using a cipher that looks at the letter you start with an changes it to another letter that is a set number of letters away. In the cipher think about the alphabet as moving and just circling back on itself, let’s look at an alphabet shift cipher that shifts by six letters:

A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F

In this shift A becomes G, B becomes H, C becomes I and so forth. The cipher will change the letters from their first source to their changed letter. Let’s go through and encrypt a simple message using this cipher.

S
P
R
I
N
G

I
S

B
E
A
U
T
I
F
U
L


Y
V
X
O
T
M

O
Y

H
K
G
A
Z
O
L
A
R

Now looking at what the phrase has become unless you knew the cipher or were very good and figuring out what the cipher could be this phrase would no longer make any sense, hence the phrase has now been encrypted. But now we need to decrypt our message. Since we know our first cipher all we have to do is reverse it and go from the encrypted message back to the original decrypted message. Let’s look at what our reverse cipher would look like:

G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

From here we can simply apply the decryption cipher to our encrypted message and get our original message out:

Y
V
X
O
T
M

O
Y

H
K
G
A
Z
O
L
A
R


S
P
R
I
N
G

I
S

B
E
A
U
T
I
F
U
L

We have just done a very basic cryptographic experiment and rocked it. Now we let’s work with some more intense cryptographic methods.

Now we will go through and see if we can encrypt and decrypt message using several other encryption and decryption methods. Please refer to the cryptography packet for more information.

Materials

  • Lab notebook
  •  Pen
  • Cryptography packet

Method

Prepare Experiment

  • Get your lab notebook
  • Get the cryptography packet

Run Experiment


  • Using the cryptography packet work through 5 different ciphers to both encrypt and decrypt messages
  • Note: The ciphers will increase in difficulty, if you do not understand how to complete one ask for help as the next ones will be more difficult

Analyze Data

  • Work with your teacher to review the answers and see how to do each of the problems

Conclusions

Cryptography has been around for centuries if not millennia and has been found to be very helpful in keeping messages secret or between two parties rather than everyone. Today you have learned how to both encrypt and decrypt messages. Doing this will help you to learn some of the basic principles behind coding (like for computer games) by creating algorithms (a series of events used to take you from the beginning of something to the end of something, i.e. from a non-encrypted message to an encrypted message or from an encrypted message to a decrypted message).

Make It Your Own

Now see if you can create your own cipher based on what you learned today. Is it easy to create a difficult cipher? Is it difficult? Think about the steps involved in creating a cipher and implementing it, can you write out these steps?

Extension Activities to do at home

You now know how to encrypt and decrypt a message if you have the proper knowledge of the cipher being used. Now see if you can extend this idea to writing out a program or algorithm for implementing the cipher. Start with something simple like the alphabet shift cipher. See if you can write down all of the steps that a computer would need to know in order to encrypt a letter. If you get through this look at the Google free coding tutorials online and see if you can start programming some of the stuff you have learned, make sure you get your parents permission.

No comments:

Post a Comment