More Fun with Ciphers

Similar documents
Fun with Ciphers! decode it! Encoded message: Decoded message: Early Elementary meeting 1, Oct. 12, Pigpen Cipher

Cryptography Worksheet

Encryption à la Mod Name

Cryptography. What is Cryptography?

Cryptography Lesson Plan

Modern Cryptography Activity 1: Caesar Ciphers

Worksheet - Reading Guide for Keys and Passwords

PROJECT 2: Encoding Assistants CSE100/INFO100 Fluency with Information Technology Spring 2002

What did we talk about last time? Public key cryptography A little number theory

Chapter 17: Information Science Lesson Plan

CCNA Security 1.1 Instructional Resource

HOMEWORK 1: Solutions

Math for Liberal Studies

The Hill Cipher. In 1929 Lester Hill, a professor at Hunter College, published an article in the American

INSE 6110 Midterm LAST NAME FIRST NAME. Fall 2016 Duration: 80 minutes ID NUMBER. QUESTION Total GRADE. Notes:

CPSC 467b: Cryptography and Computer Security

The inverse of a matrix

How many DES keys, on the average, encrypt a particular plaintext block to a particular ciphertext block?

T H E I N T E R A C T I V E S H E L L

NS6-50 Dividing Whole Numbers by Unit Fractions Pages 16 17

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 4

In-Class Exercises: Set 2 Transfers for Church Clerks. For the eadventist Demo Site

TOPIC 2 INTRODUCTION TO JAVA AND DR JAVA

E-cash. Cryptography. Professor: Marius Zimand. e-cash. Benefits of cash: anonymous. difficult to copy. divisible (you can get change)

Math Circle Beginners Group October 18, 2015 Solutions

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Chapter 7 Lab A: Exploring Encryption Methods

Unit 1: Guess and Check: A Decoding Strategy

Ref:

Goals of Modern Cryptography

ONLINE REGISTRATION: A STEP-BY-STEP GUIDE

Exponents. Reteach. Write each expression in exponential form (0.4)

Shared Secret = Trust

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

Cryptography. Intercepting Information Scenario 1. Tuesday, December 9, December 9, Wireless broadcasts information using radio signals

CIS 3362 Final Exam 12/4/2013. Name:

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Excel Basics Rice Digital Media Commons Guide Written for Microsoft Excel 2010 Windows Edition by Eric Miller

Using Mail Merge in Microsoft Word 2003

4 + 4 = = 1 5 x 2 = 10

CCBC Math 081 Order of Operations Section 1.7. Step 2: Exponents and Roots Simplify any numbers being raised to a power and any numbers under the

Firelands FCU Fireline Online Banking Enrollment Steps

Senior Math Circles Cryptography and Number Theory Week 1

ISA 562: Information Security, Theory and Practice. Lecture 1

Getting Ready to Teach Unit 6

ENGR/CS 101 CS Session Lecture 5

Math Dr. Miller - Constructing in Sketchpad (tm) - Due via by Friday, Mar. 18, 2016

Improving our systems. Includes important information about changes to HR and Payroll, including how you receive your payslips

Section 6.3: Measures of Position

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Connexions module: m Linear Equations. Rupinder Sekhon

1 A Tale of Two Lovers

Lecture 22 - Oblivious Transfer (OT) and Private Information Retrieval (PIR)

Week 5 Creating a Calendar. About Tables. Making a Calendar From a Table Template. Week 5 Word 2010

Cryptography I ALFE APRTGHAL KAP BQQQ ADCQTPEMY KSANG A KGA-ETAM MFLK FQRUQY

Quantum Encryption Keys

Fractions with a denominator of 10, 100 or can be written as decimals. A decimal is any number which has a decimal comma.

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication

CS61A Lecture #39: Cryptography

Classical Encryption Techniques

Sets. Sets. Examples. 5 2 {2, 3, 5} 2, 3 2 {2, 3, 5} 1 /2 {2, 3, 5}

ASSIGNMENT 2. COMP-202A, Fall 2013, All Sections. Due: October 20 th, 2013 (23:59)

CHAPTER 17 INFORMATION SCIENCE. Binary and decimal numbers a short review: For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 4731 =

Lecture 19 - Oblivious Transfer (OT) and Private Information Retrieval (PIR)

SYMMETRY v.1 (square)

Math236 Discrete Maths with Applications

ÓBUDA UNIVERSITY, BUDAPEST SSL CERTIFICATES

Assignment 3 Functions, Graphics, and Decomposition

MOBILE ENROLLMENT APPLICATION TRAINING GUIDE

Staff User Guide PowerSchool Student Information System

Welcome to Design Patterns! For syllabus, course specifics, assignments, etc., please see Canvas

Fall 2005 Joseph/Tygar/Vazirani/Wagner Final

How to make a "hello world" program in Java with Eclipse *

Cryptography. How to Protect Your Data

The Network Security Model. What can an adversary do? Who might Bob and Alice be? Computer Networks 12/2/2009. CSC 257/457 - Fall

CA Atul C.Bheda Mumbai

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Creating a Box-and-Whisker Graph in Excel: Step One: Step Two:

Project 2: How Parentheses and the Order of Operations Impose Structure on Expressions

Finite State Machines

CSE 127: Computer Security Cryptography. Kirill Levchenko

Repeat or Not? That Is the Question!

Part II Composition of Functions

CPS111 Victory Thru Scratch Lab

Applied Finite Mathematics. Collection Editor: Rupinder Sekhon

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Switched on Computing Year 5. My progress. Name: Class: Insert your photo or picture here!

Every function machine takes its inputs from a bag called the Input bag. Here are some examples of this function machine's Input bag:

CS 332 Computer Networks Security

Classic Cryptography: From Caesar to the Hot Line

Sending secret messages with cryptography. An activity by the Australian Computing Academy

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography

FSA Algebra 1 EOC Practice Test Guide

Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 24

Classical Encryption Techniques. CSS 322 Security and Cryptography

A theme park charges $12 entry to visitors. Find the money taken if 1296 people visit the park.

Activity Guide - Public Key Cryptography

CS 135: Fall Project 2 Simple Cryptography

Spam Protection Guide

Transcription:

More Fun with Ciphers October 3, 2010 1 Using frequencies to decode 1. Daniel received an encoded message of 1000 characters. He counted up how often every letter occurred and listed the top 5 most frequent letters below. Use the graph to match the letters that occur most often in the encoded message to the original letters. Substitution Letter # of times Original letter R 127 S 90 D 81 E 76 A 70 Q 66 T 63 C 60 1

(a) Copy the table from the previous page here: Substitution Letter # of times Original letter R 127 S 90 D 81 E 76 A 70 Q 66 T 63 C 60 (b) Below is a sample of some text from the message that Daniel received. Decode the message by rst replacing the letters you found above into the text. Then, see if you can gure out what the rest of the message reads. A MEHQP SCR RQRYI CAPREHS. AS AT BRCAQP SCR ELP SZRR. 2

2 Pigpen cipher 1. Encode the following message using Pigpen cipher: SYMBOLS 2. Decode this message written using the Pigpen cipher: 3. Encode your own message using the Pigpen cipher, and pass it to your partner to decode: Encoded message: Decoded: 3

3 Rail Fence Cipher 1. Encoding the Rail Fence Cipher (a) Here is how we can encode the phrase WE ARRIVE SOON using the Rail Fence cipher i. First, make an outline of the zig-zag pattern for the number of letters that are in your message (WE ARRIVE SOON has 12 letters) ii. Arrange the letters a zig-zag pattern on three lines: W R S E R I E O N A V O iii. Then, the encoded phrase is written out left-to-right, top-tobottom: WRSERIEONAVO (b) Use the Rail Fence cipher to encode the message MATH IS GREAT _ i. What will the encoded text read? 4

2. Decoding Rail Fence cipher (a) The algorithm: i. Count the number of letters in the message. ii. Make an outline of the zig-zag pattern like we did in the example above for the number of letters in the message A. Fill in the top row rst B. Then ll in the middle row C. Finally, ll in the third row iii. Read the message, inserting spaces where necessary (b) Decode the following message that was encoded with the Rail Fence cipher: RFEHALECCPEINIR i. How many letters are there in the message? ii. Fill in the decoding outline below: _ iii. Write out the original message below: 5

4 Cardan Grille In this method of encoding, a message is hidden within other text, and the key to decoding it is a grid with cutouts that reveal the letters of the actual message. 1. Below is a message that appears to be a letter from someone named Alice to her Cousin Ralph. After looking at it using the attached grid, it reveals a hidden message. What is this letter really telling the reader? 6

2. Sometimes the message is hidden within other words. Use the grille at your table to decode the message hidden in the words below: W H E N W I L L L A N D H A L O 3. Notice that the surrounding letters do not need to be really meaningful. Find the message in the text below using your grille again. D A P N W T R L P L X D Q U L E 4. Use the tables below, and the grille at your table, to encode your own secret messages, then pass it to your partner to decode: Decoded messages: 7

5 Hidden information in account numbers 1 Did you know that bank and credit card accounts hold information even in the numbers of the accounts? Certain credit card companies set the account numbers up so it is easy to verify that the number belongs to a real card. The Circle Credit Company issues credit cards whose number can be veri- ed as follows: First, compute a certain Value associated to the card; Second, check if this Value is a number that ends with a 0. Cards whose numbers have an Value that ends with the digit 0 are likely Circle Credit cards. If the Value ends with any digit other than 0, the number we started with is not a number of an actual credit card. For example, let's check if a card whose number appears below can be an actual card issued by the Circle Credit Company: 4316 9940 1203 9603 1. First we compute the Value following certain rules. (a) Beginning with the digit in the right-most position, write down every other digit underneath its original position. (Do not write anything below the digits in the even-numbered positions.) 4316 9940 1203 9603 4 3 1 6 9 9 4 0 1 2 0 3 9 6 0 3 1 Adapted from Rudolf Kippenhahn, Code Breaking: A History and Exploration, The Test Figure in a Credit Card, p.44 8

(b) Then, for the digits that have nothing written underneath them, add the digit to itself. i. If the result is a one digit number, write it below the digit you started with; ii. If the result is a two digit number, add these two digits and write the result below the digit you started with. Example 1: if the digit is 3, add 3 + 3 = 6, and write 6 under 3. Example 2: if the digit is 7, add 7 + 7 = 14, add 1 + 4 = 5, and write 5 under 7. Now, do it for all the digits of the number we are checking: 4316 9940 1203 9603 4 3 1 6 9 9 4 0 1 2 0 3 9 6 0 3 3 6 9 0 2 3 6 3 (c) Finally, add up all of the digits in the second row to get the Value of the card: V alue = (d) Check if the last digit of the V alue is 0. If not, this is denitely not the number of a real card issued by the Circle Credit Company. If the last digit is 0, then, most likely, you have a real number of a Circle Credit card. 2. Why do you think the company decided to compute the Value like this? Why might it be a good idea to use numbers that are next to each other dierently when computing the value? 3. Do you think it easy to come up with these credit card numbers? Why or why not? Can you start with an arbitrary 16 digit number and then change some of its digits so that the Value ends in 0? 9

4. Circle Company Bank uses the same steps to determine if a bank account number is valid. If the Value is divisible by 5 (ends in a 0 or 5), then it is a valid bank account number. Find the Value of the card below: 5464 3749 2372 4676 5 4 6 4 3 7 4 9 2 3 7 2 4 6 7 6 (a) What is the Value of the bank account number? (b) Could this be a valid Circle Company Bank number (Does it end with the digit 0 or 5)? 5. Aside from having a Value end in a certain digit, can you think of some other ways that a credit card company or bank might make their card numbers more veriable? 10