Cryptography First show this scene from The Da Vinci

Cryptography
First show this scene from The Da Vinci Code where the Fibonacci numbers are showed
in a mixed up order to introduce the idea of cryptography. The clip can be found here:
https://www.youtube.com/watch?v=GKb9zzNkwzM.
Cryptography is a way to encode and decode information. A simple kind of cryptography
is the Caesar Cipher. This allows for coding and decoding messages by shifting letters a certain
number of places in the alphabet. For example, A shift of 2 will move a to c, b to d, etc. The
Caesar Cipher is named after Julius Caesar because he used it to send secret messages to
soldiers. Print this decoder ring for each group: http://www.thingiverse.com/thing:14891. You
can also print the attachment for it.
1. Use the Caesar Cipher on your ring with a shift of 3 to decode the following message:
pdwk lv ixq.
Math is fun.
2. Why would the Caesar Cipher not be good to use for important information?
It is too easy to crack.
3. A slightly more complicated cipher is called the Vigenè re cipher. This cipher uses a
key. This is a chosen word that is public knowledge. To encrypt a message using the Vigenè re
cipher it would be helpful to have a Vigenè re table as shown here:
A B C
A A B C
B B C D
C C D E
D
D
E
F
E
E
F
G
F
F
G
H
G
G
H
I
H
H
I
J
I
I
J
K
J
J
K
L
K
K
L
M
L
L
M
N
M
M
N
O
N
N
O
P
O
O
P
Q
P
P
Q
R
Q
Q
R
S
R
R
S
T
S
S
T
U
T
T
U
V
U
U
V
W
V
V
W
X
W
W
X
Y
X
X
Y
Z
Y
Y
Z
A
Z
Z
A
B
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
To decode a letter look at the column of the letter and the row of the corresponding letter in the
key. For example, if the key is “key” and the word to encode is “math” start with the column
with “m” and the row with “k.” This yields a “w.” Repeat this process for the remaining letters.
When the key is shorter than the word, it gets repeated as many times as necessary. In this case
there is only one extra letter so the key becomes “keyk.” Using this method the decoded word is
“werr.” Decryption works the same way. Since the key is known look at the row with “k” and
find the “w” within it. Tracing that back to the column heading yields the “m.”
Use the Vigenè re cipher with key “love” to decode the word “jcp.”
You.
4. The decoder ring can actually be used in place of the Vigenè re table. Figure out and
explain how this would work.
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
The key letter tells you what shift to make. In the example from question 3 the first letter in the
key is L, so first use the ring to match A with L. You will see that J and Y are paired up. For the
next letter do another shift, matching A to O, and keep going like this.
5. Make up a key and encode a secret message with your decoder ring. Switch your
message in encoded form and your key with another group. Then decode the new message you
received.
(extension) If your students know modular arithmetic or have done this activity
http://www.thingiverse.com/thing:1693134 they can also answer the following:
6. Explain how these ciphers use modular arithmetic.
The alphabet has 26 letters so to do the matching
a b c d e f g h i j k l
m n o p q r
s
t
u v w x y z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Think of the Caesar Cipher with a shift of 3. To see where each letter goes, look at its numerical
value and add 3. For example, m becomes 12+3=15 = p. Once you get to the higher numbers
though you can’t just add 3. If you look at y that becomes 24+3=27, but there is no 27. After 25
you start back at 0. Thus, y becomes 1=b. This is the same as adding in mod 26.
Caesar Cipher Decoder Ring Rounded by
cymon
Published on December 21, 2011
www.thingiverse.com/thing:14891
Creative Commons - Attribution - Share Alike