SlideShare a Scribd company logo
Cryptography Mentor’s Guide
The main thing a mentor needs to do for this activity is to convince students to try it. You
can offer that they will get a large supply of cheesy jokes if they come work with you. You
can ask then if they want to learn a skill that every true spy knows.
Give many high fives. Laugh at the jokes, or shake your head and say that’s not funny. Ask
what the next joke is.
Most students will figure out to wrap around when the numbers get larger than 25 in the
letters to numbers section. If a student does not see what letter to assign to 34, ask a series
of easier questions:
What is letter 24? letter 25? letter 26? letter 27?
Once they can count around make a larger jump – What is letter 47? what is
letter 108? The student should be able to figure out that they can subtract 26,
or any multiple of 26. Eventually, they should figure out that they can divide by
26 and take the remainder.
Some students will not know what x → 3x + 7 means. You can tell them that it means
multiply by 3 and add 7. Thus 4 becomes 19 since 3 × 4 = 12 and 12 + 7 = 19.
Decoding affine i.e. x → mx + b ciphers requires Euclid’s algorithm (long division). For
example to decode x → 15x − 4 one would first want to find numbers a and b so that
15a + 26b = 1. This process is explained in the rational tangle dance. Ask the students if
they have seen the rational tangle dance. If they have ask them if it could help them break
the codes. If they haven’t seen the dance yet, suggest that they go watch it when they want a
break from the codes. Indeed,
15 · 0 + 26 · 1 = 26
15 · 1 + 26 · 0 = 15
26
15
= 1
11
15
, so subtract 1
15 · (−1) + 26 · 1 = 11
15
11
= 1
4
11
, so subtract 1
15 · 2 + 26 · (−1) = 4
11
4
= 2
3
4
, so subtract 2
note − 1 − 2 · 2 = −5 and 1 − 2 · (−1) = 3 so
15 · (−5) + 26 · 3 = 3
15 · 7 + 26 · (−4) = 1 .
Thus we can decode multiplication by 15 by multiplying by 7. Indeed multiplying any code
letter c by 15 gives 15c. Multiplying this by 7 gives 7 · 15c = (1 + 26 · 4)c which returns c
after the wrap around.
1
A code that just makes substitutions between 26 symbols is not very secure. This is the
point of the frequency analysis. In problem 14, the answer does not always follow the general
frequency pattern, but all of the code strings are coded with the same code so once someone
figures out what one letter is, it can be used on the entire page. Ask the students if they
can guess why the frequency pattern here does not follow the pattern for the
general English language. One reason is that this is a list of jokes, Why did..., What
did,... so question words are used much more often than in typical writing samples.
Some answers/hints
5. 26 – not shifting at all is a cipher! It isn’t very difficult to break, but mathematicians
usually include trivial cases.
11. Since 3x + 7 is decoded by 9x − 11, students may be able to guess that 9x + 2 will be
decoded by something with 3x.
12. Since 2×13 = 26 and this wraps around to 0, both 0 and 13 map to the same thing. Can
the student guess another number that would give a problem? (13, 26, 0, 4, . . . any
number not relatively prime to 26.)
2

More Related Content

What's hot (20)

PPSX
Mental computation
angelic55
 
PPTX
October 3
khyps13
 
PPTX
Welcome1stdaypwpt2014 b
jbianco9910
 
PDF
Continued fraction walk
navajomath
 
PDF
Class 1 CBSE Maths Sample Paper Model 1
Sunaina Rawat
 
PPT
Math magic
Vimal Prajapati
 
PPT
1.02ewohwreview
kboynton
 
PPT
1.02ew ohwreview
kboynton
 
PPTX
Synthetic division
baraly92
 
PPTX
Algebra I
rsullivan90
 
PPT
Mental Math Strategies for Grade 3
RoshelS
 
PPTX
April 12
khyps13
 
DOCX
Lesson plan in mathematics 8 (Factoring Perfect Square Trinomial)
Rachel Ann
 
PPTX
MS Math Night, fall 2014
gebhards
 
DOC
Tricky math shortcut
Abhi world
 
PPT
MATH MAGIC
LadyLou de Guzman
 
PPTX
Welcome1stdaypwpt2014 b
jbianco9910
 
PPT
Math Powerpoint Final 1
billinjo
 
PPT
Whiz Kid 4th Grade Math
Terrell Johnson
 
PDF
Best Practice in Mathematical Modeling
University of Fribourg
 
Mental computation
angelic55
 
October 3
khyps13
 
Welcome1stdaypwpt2014 b
jbianco9910
 
Continued fraction walk
navajomath
 
Class 1 CBSE Maths Sample Paper Model 1
Sunaina Rawat
 
Math magic
Vimal Prajapati
 
1.02ewohwreview
kboynton
 
1.02ew ohwreview
kboynton
 
Synthetic division
baraly92
 
Algebra I
rsullivan90
 
Mental Math Strategies for Grade 3
RoshelS
 
April 12
khyps13
 
Lesson plan in mathematics 8 (Factoring Perfect Square Trinomial)
Rachel Ann
 
MS Math Night, fall 2014
gebhards
 
Tricky math shortcut
Abhi world
 
MATH MAGIC
LadyLou de Guzman
 
Welcome1stdaypwpt2014 b
jbianco9910
 
Math Powerpoint Final 1
billinjo
 
Whiz Kid 4th Grade Math
Terrell Johnson
 
Best Practice in Mathematical Modeling
University of Fribourg
 

Viewers also liked (11)

PDF
Squaring and subtracting worksheets
navajomath
 
PDF
River Crossing Puzzle set from ThinkFun
navajomath
 
PDF
6 choose 3
navajomath
 
PDF
Ballast puzzles
navajomath
 
PDF
6 c3 guide
navajomath
 
PDF
Stomp combined
navajomath
 
PDF
Arrows logic game
navajomath
 
PDF
Three jugs
navajomath
 
PDF
ABBA and Braids
navajomath
 
PDF
Cryptography
navajomath
 
PDF
Set overview
navajomath
 
Squaring and subtracting worksheets
navajomath
 
River Crossing Puzzle set from ThinkFun
navajomath
 
6 choose 3
navajomath
 
Ballast puzzles
navajomath
 
6 c3 guide
navajomath
 
Stomp combined
navajomath
 
Arrows logic game
navajomath
 
Three jugs
navajomath
 
ABBA and Braids
navajomath
 
Cryptography
navajomath
 
Set overview
navajomath
 
Ad

Similar to Crypt inst-guide (20)

PDF
A study on number theory and its applications
Itishree Dash
 
PDF
Ki2518101816
IJERA Editor
 
PDF
Ki2518101816
IJERA Editor
 
PDF
Crypto lecture PDF
Nedia Hamoudi
 
PDF
Introduction to Network security and privacy
MyilvahananJothivel
 
PPTX
Algebra 1 chapter 1 complete notes
Heather Hennigan
 
PDF
8th grade packet c
Cinnaminson Public Schools
 
PPTX
How do computers exchange secrets using Math?
Dharmalingam Ganesan
 
PPTX
Lecture 13 Criptarithmetic problem
Hema Kashyap
 
ODP
Middle school math quiz
ITfC-Edu-Team
 
PPTX
CH4__crypto.pptx
Mohammad512578
 
PPTX
Maths Activities (Fun With Numbers)
ShubhyaLohani
 
PPTX
Errong Prequel
ChristianSR
 
PDF
Known plaintext attack of hill cipher
MinghongGao
 
PPTX
Number theory and cryptography
Yasser Ali
 
PPT
crypto_1vdgfhhhggggjjgghghghgggghhhhhfhhhhhhjhvcgghcghggg
sultanahimed3
 
PDF
Algebra The Basics
keithpeter
 
PDF
Pascal’s triangle
Tarun Gehlot
 
PDF
How Do You Say 'Cryptography' in Romanian?
Joshua Holden
 
DOCX
Rsa example
Abhishek Kesharwani
 
A study on number theory and its applications
Itishree Dash
 
Ki2518101816
IJERA Editor
 
Ki2518101816
IJERA Editor
 
Crypto lecture PDF
Nedia Hamoudi
 
Introduction to Network security and privacy
MyilvahananJothivel
 
Algebra 1 chapter 1 complete notes
Heather Hennigan
 
8th grade packet c
Cinnaminson Public Schools
 
How do computers exchange secrets using Math?
Dharmalingam Ganesan
 
Lecture 13 Criptarithmetic problem
Hema Kashyap
 
Middle school math quiz
ITfC-Edu-Team
 
CH4__crypto.pptx
Mohammad512578
 
Maths Activities (Fun With Numbers)
ShubhyaLohani
 
Errong Prequel
ChristianSR
 
Known plaintext attack of hill cipher
MinghongGao
 
Number theory and cryptography
Yasser Ali
 
crypto_1vdgfhhhggggjjgghghghgggghhhhhfhhhhhhjhvcgghcghggg
sultanahimed3
 
Algebra The Basics
keithpeter
 
Pascal’s triangle
Tarun Gehlot
 
How Do You Say 'Cryptography' in Romanian?
Joshua Holden
 
Rsa example
Abhishek Kesharwani
 
Ad

Recently uploaded (20)

PDF
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
PPTX
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PDF
Zoology (Animal Physiology) practical Manual
raviralanaresh2
 
PPTX
How to Configure Prepayments in Odoo 18 Sales
Celine George
 
PPTX
Quarter1-English3-W4-Identifying Elements of the Story
FLORRACHELSANTOS
 
PPTX
Views on Education of Indian Thinkers Mahatma Gandhi.pptx
ShrutiMahanta1
 
PPTX
How to Set Maximum Difference Odoo 18 POS
Celine George
 
PPTX
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
PDF
Dimensions of Societal Planning in Commonism
StefanMz
 
PDF
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
PDF
People & Earth's Ecosystem -Lesson 2: People & Population
marvinnbustamante1
 
PDF
'' IMPORTANCE OF EXCLUSIVE BREAST FEEDING ''
SHAHEEN SHAIKH
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PDF
community health nursing question paper 2.pdf
Prince kumar
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PPTX
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
PPTX
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
PDF
IMP NAAC REFORMS 2024 - 10 Attributes.pdf
BHARTIWADEKAR
 
PPSX
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
PDF
IMP NAAC-Reforms-Stakeholder-Consultation-Presentation-on-Draft-Metrics-Unive...
BHARTIWADEKAR
 
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
Zoology (Animal Physiology) practical Manual
raviralanaresh2
 
How to Configure Prepayments in Odoo 18 Sales
Celine George
 
Quarter1-English3-W4-Identifying Elements of the Story
FLORRACHELSANTOS
 
Views on Education of Indian Thinkers Mahatma Gandhi.pptx
ShrutiMahanta1
 
How to Set Maximum Difference Odoo 18 POS
Celine George
 
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
Dimensions of Societal Planning in Commonism
StefanMz
 
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
People & Earth's Ecosystem -Lesson 2: People & Population
marvinnbustamante1
 
'' IMPORTANCE OF EXCLUSIVE BREAST FEEDING ''
SHAHEEN SHAIKH
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
community health nursing question paper 2.pdf
Prince kumar
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
IMP NAAC REFORMS 2024 - 10 Attributes.pdf
BHARTIWADEKAR
 
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
IMP NAAC-Reforms-Stakeholder-Consultation-Presentation-on-Draft-Metrics-Unive...
BHARTIWADEKAR
 

Crypt inst-guide

  • 1. Cryptography Mentor’s Guide The main thing a mentor needs to do for this activity is to convince students to try it. You can offer that they will get a large supply of cheesy jokes if they come work with you. You can ask then if they want to learn a skill that every true spy knows. Give many high fives. Laugh at the jokes, or shake your head and say that’s not funny. Ask what the next joke is. Most students will figure out to wrap around when the numbers get larger than 25 in the letters to numbers section. If a student does not see what letter to assign to 34, ask a series of easier questions: What is letter 24? letter 25? letter 26? letter 27? Once they can count around make a larger jump – What is letter 47? what is letter 108? The student should be able to figure out that they can subtract 26, or any multiple of 26. Eventually, they should figure out that they can divide by 26 and take the remainder. Some students will not know what x → 3x + 7 means. You can tell them that it means multiply by 3 and add 7. Thus 4 becomes 19 since 3 × 4 = 12 and 12 + 7 = 19. Decoding affine i.e. x → mx + b ciphers requires Euclid’s algorithm (long division). For example to decode x → 15x − 4 one would first want to find numbers a and b so that 15a + 26b = 1. This process is explained in the rational tangle dance. Ask the students if they have seen the rational tangle dance. If they have ask them if it could help them break the codes. If they haven’t seen the dance yet, suggest that they go watch it when they want a break from the codes. Indeed, 15 · 0 + 26 · 1 = 26 15 · 1 + 26 · 0 = 15 26 15 = 1 11 15 , so subtract 1 15 · (−1) + 26 · 1 = 11 15 11 = 1 4 11 , so subtract 1 15 · 2 + 26 · (−1) = 4 11 4 = 2 3 4 , so subtract 2 note − 1 − 2 · 2 = −5 and 1 − 2 · (−1) = 3 so 15 · (−5) + 26 · 3 = 3 15 · 7 + 26 · (−4) = 1 . Thus we can decode multiplication by 15 by multiplying by 7. Indeed multiplying any code letter c by 15 gives 15c. Multiplying this by 7 gives 7 · 15c = (1 + 26 · 4)c which returns c after the wrap around. 1
  • 2. A code that just makes substitutions between 26 symbols is not very secure. This is the point of the frequency analysis. In problem 14, the answer does not always follow the general frequency pattern, but all of the code strings are coded with the same code so once someone figures out what one letter is, it can be used on the entire page. Ask the students if they can guess why the frequency pattern here does not follow the pattern for the general English language. One reason is that this is a list of jokes, Why did..., What did,... so question words are used much more often than in typical writing samples. Some answers/hints 5. 26 – not shifting at all is a cipher! It isn’t very difficult to break, but mathematicians usually include trivial cases. 11. Since 3x + 7 is decoded by 9x − 11, students may be able to guess that 9x + 2 will be decoded by something with 3x. 12. Since 2×13 = 26 and this wraps around to 0, both 0 and 13 map to the same thing. Can the student guess another number that would give a problem? (13, 26, 0, 4, . . . any number not relatively prime to 26.) 2