CryptoClue Cryptography & Math Circles An Unexpected Topic for - - PowerPoint PPT Presentation

cryptoclue
SMART_READER_LITE
LIVE PREVIEW

CryptoClue Cryptography & Math Circles An Unexpected Topic for - - PowerPoint PPT Presentation

CryptoClue CryptoClue The Setting Where? Who? With What? CryptoClue Cryptography & Math Circles An Unexpected Topic for a Math Circle Basics of Cryptography Crime Resolved! Game History Math Circle Sharon K. Robbert References


slide-1
SLIDE 1

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

CryptoClue

An Unexpected Topic for a Math Circle Sharon K. Robbert

Trinity Christian College

January 6, 2017

slide-2
SLIDE 2

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

An Hour-able Crime!

I Location: Archimedes Junior High

slide-3
SLIDE 3

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

An Hour-able Crime!

I Location: Archimedes Junior High I Principal: Mrs.

Bletchley

I To solve this enigmatic

mystery, you will need to solve three clues based on historical cryptosystems.

I Where? I Who? I With what?

slide-4
SLIDE 4

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Narrowing the Options

I Principal Bletchley has identi…ed the following options

for the crime:

I Locations for the criminal act: Outhouse, Walk-in

closet, basement, Tree house, Attic, kitchen cabinet

I Many weapon options, including: a dustbuster, a tennis

shoe, a plunger, a squirt gun, shrubbery, bagpipes, etc.

I Her list of usual suspects:

slide-5
SLIDE 5

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Narrowing the Options

I Principal Bletchley has identi…ed the following options

for the crime:

I Locations for the criminal act: Outhouse, Walk-in

closet, basement, Tree house, Attic, kitchen cabinet

I Many weapon options, including: a dustbuster, a tennis

shoe, a plunger, a squirt gun, shrubbery, bagpipes, etc.

I Her list of usual suspects:

I Volunteer crytanalysts?

slide-6
SLIDE 6

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Where? Clue #1: Letters Inscribed on Colored Ribbons

I Curious rods in Mrs. Oiler’s geometry classroom,

ribbons dangling from light …xtures

I Hint: To solve the riddle, you must test the ribbons by

wrapping them around the rods provided to see if the resequencing makes sense.

slide-7
SLIDE 7

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Who? Clue #2: A Cipher Wheel and Cipher Text

I In Mr. Seezer’s classroom:

slide-8
SLIDE 8

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

With What? Clue #3: A sequence of playing card symbols of one color

slide-9
SLIDE 9

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

With What? Clue #3: A sequence of playing card symbols of one color

I Curious fact: the number of red playing cards is

identical to the number of letters in the English alphabet.

I A suspicious challenge by your math tutor, Ms. R.S.

Adleman: “I’ll give you one card-letter clue for each correct problem you answer...”

I Hint: you need not obtain all 26 cards to solve the

riddle and determine the weapon of clock destruction.

slide-10
SLIDE 10

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

What is Cryptography?

I Any system of secret writing where

I allies can communicate information accurately I allies are able to be assured of information validity

slide-11
SLIDE 11

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

What is Cryptography?

I Any system of secret writing where

I allies can communicate information accurately I allies are able to be assured of information validity

I BUT where

I enemies cannot understand an intercepted message I enemies cannot trick allies into believing a false message

slide-12
SLIDE 12

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

What is Cryptography?

I Any system of secret writing where

I allies can communicate information accurately I allies are able to be assured of information validity

I BUT where

I enemies cannot understand an intercepted message I enemies cannot trick allies into believing a false message

I Cryptosystems are considered secure, if the enemy is

unable to decipher the message even if everything about the system is public knowledge except for the key. (Kerckho¤s’ principle)

slide-13
SLIDE 13

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Historical Notes

I Where? Clue #1: Letters Inscribed on Colored Ribbons

I The ribbons and tubes are a modern version of an

ancient Spartan cipher tool called a scytale from the …fth century BC

slide-14
SLIDE 14

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Historical Notes

I Where? Clue #1: Letters Inscribed on Colored Ribbons

I The ribbons and tubes are a modern version of an

ancient Spartan cipher tool called a scytale from the …fth century BC

I Who? Clue #2: A Cipher Wheel and Cipher Text

I The cipher used in this clue is a shift cipher, a variation

  • f the Caesar cipher.
slide-15
SLIDE 15

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Historical Notes

I Where? Clue #1: Letters Inscribed on Colored Ribbons

I The ribbons and tubes are a modern version of an

ancient Spartan cipher tool called a scytale from the …fth century BC

I Who? Clue #2: A Cipher Wheel and Cipher Text

I The cipher used in this clue is a shift cipher, a variation

  • f the Caesar cipher.

I With What? Clue #3: A sequence of playing card

symbols of one color

I The cipher used in this clue is a substitution cipher,

believed to be …rst used by Arabs prior to the 10th century AD. The Arabs also were the …rst to do frequency analysis of characters to break these codes!

slide-16
SLIDE 16

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Crime Resolved!

I Where: Outhouse, Walk-in closet, basement, Tree

house, Attic, kitchen cabinet

slide-17
SLIDE 17

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Crime Resolved!

I Where: Outhouse, Walk-in closet, basement, Tree

house, Attic, kitchen cabinet

I Clue: Sometimes this possibly scary and dark place is

called the cellar or the lower level but most people just call it this eight letters.

slide-18
SLIDE 18

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Crime Resolved!

I Where: Outhouse, Walk-in closet, basement, Tree

house, Attic, kitchen cabinet

I Clue: Sometimes this possibly scary and dark place is

called the cellar or the lower level but most people just call it this eight letters.

I Who:

slide-19
SLIDE 19

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Crime Resolved!

I Where: Outhouse, Walk-in closet, basement, Tree

house, Attic, kitchen cabinet

I Clue: Sometimes this possibly scary and dark place is

called the cellar or the lower level but most people just call it this eight letters.

I Who:

I Clue: Giant Green Ogre.

slide-20
SLIDE 20

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Crime Resolved!

I Where: Outhouse, Walk-in closet, basement, Tree

house, Attic, kitchen cabinet

I Clue: Sometimes this possibly scary and dark place is

called the cellar or the lower level but most people just call it this eight letters.

I Who:

I Clue: Giant Green Ogre.

I With What: a dustbuster, a tennis shoe, a plunger, a

squirt gun, shrubbery, bagpipes, etc..

slide-21
SLIDE 21

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Crime Resolved!

I Where: Outhouse, Walk-in closet, basement, Tree

house, Attic, kitchen cabinet

I Clue: Sometimes this possibly scary and dark place is

called the cellar or the lower level but most people just call it this eight letters.

I Who:

I Clue: Giant Green Ogre.

I With What: a dustbuster, a tennis shoe, a plunger, a

squirt gun, shrubbery, bagpipes, etc..

I Clue: I am a plant collection of hardy shrubs.

slide-22
SLIDE 22

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Crime Resolved!

I Where: Outhouse, Walk-in closet, basement, Tree

house, Attic, kitchen cabinet

I Clue: Sometimes this possibly scary and dark place is

called the cellar or the lower level but most people just call it this eight letters.

I Who:

I Clue: Giant Green Ogre.

I With What: a dustbuster, a tennis shoe, a plunger, a

squirt gun, shrubbery, bagpipes, etc..

I Clue: I am a plant collection of hardy shrubs.

I The clock crime was committed by Shrek with

shrubbery in the basement.

slide-23
SLIDE 23

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Overview of CryptoClue Development

I Crypto Puzzles were created by a cryptography class of

13 college students several years ago

slide-24
SLIDE 24

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Overview of CryptoClue Development

I Crypto Puzzles were created by a cryptography class of

13 college students several years ago

I One is completing a Ph.D. in philosophy

slide-25
SLIDE 25

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Overview of CryptoClue Development

I Crypto Puzzles were created by a cryptography class of

13 college students several years ago

I One is completing a Ph.D. in philosophy I Four are working in computing …elds I Brandon: “...cryptography showed the mysterious side

  • f mathematics, and that sometimes math can be used

for fun instead of ‘solving problems’...”

I Maria: “...the familiarity with cryptography and the

history and purpose behind it has de…nitely boosted my ability to contribute to [a] work project” implementing a data obscuring tool

slide-26
SLIDE 26

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Overview of CryptoClue Development

I Crypto Puzzles were created by a cryptography class of

13 college students several years ago

I One is completing a Ph.D. in philosophy I Four are working in computing …elds I Brandon: “...cryptography showed the mysterious side

  • f mathematics, and that sometimes math can be used

for fun instead of ‘solving problems’...”

I Maria: “...the familiarity with cryptography and the

history and purpose behind it has de…nitely boosted my ability to contribute to [a] work project” implementing a data obscuring tool

I Eight are teaching mathematics, I Lauren: I created “a cryptography lesson in Algebra 2

as a tie to inverse functions.”

I Dan: Cryptography “tied together history, humanities,

technology, and of course mathematics in a way that made me feel like I was learning ‘just for the fun of it.’”

slide-27
SLIDE 27

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Trinity Math Triathlon Half-time

I CryptoClue was played with approximately 170 junior

high students in a 45 minute window with 24 di¤erent sets of clues

slide-28
SLIDE 28

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Trinity Math Triathlon Half-time

I CryptoClue was played with approximately 170 junior

high students in a 45 minute window with 24 di¤erent sets of clues

I Student response

I The shift cipher was very challenging for the students,

even with cipher wheel provided.

I The students very quickly solved the scytale puzzle.

slide-29
SLIDE 29

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Trinity Math Triathlon Half-time

I CryptoClue was played with approximately 170 junior

high students in a 45 minute window with 24 di¤erent sets of clues

I Student response

I The shift cipher was very challenging for the students,

even with cipher wheel provided.

I The students very quickly solved the scytale puzzle. I Spencer: After the Triathlon, “I ended up buying a

book with a bunch of cryptography-related puzzles” to solve the following summer...

slide-30
SLIDE 30

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Math Circle Event

I Challenge teachers to solve the puzzles with guided

instruction in each cryptosystem

slide-31
SLIDE 31

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Math Circle Event

I Challenge teachers to solve the puzzles with guided

instruction in each cryptosystem

I Why cryptography as a topic?

slide-32
SLIDE 32

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Math Circle Event

I Challenge teachers to solve the puzzles with guided

instruction in each cryptosystem

I Why cryptography as a topic?

I Many applications to middle school and high school

mathematics curriculum!

I Math topics in cryptography include: geometric

measurement, function characteristics, modular arithmetic, statistics (frequency analysis), number theory

I More ideas (and puzzles to try!) on handout

slide-33
SLIDE 33

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Math Circle Event

I Challenge teachers to solve the puzzles with guided

instruction in each cryptosystem

I Why cryptography as a topic?

I Many applications to middle school and high school

mathematics curriculum!

I Math topics in cryptography include: geometric

measurement, function characteristics, modular arithmetic, statistics (frequency analysis), number theory

I More ideas (and puzzles to try!) on handout I Great way to link to other subjects! I Historical context of cryptography: story characters,

use of cryptography in intrigue and war

I Literature involving cryptography as plot element I Current technology: secure online transactions,

passcodes for devices, E-currency

slide-34
SLIDE 34

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Math Circle Event

I Challenge teachers to solve the puzzles with guided

instruction in each cryptosystem

I Why cryptography as a topic?

I Many applications to middle school and high school

mathematics curriculum!

I Math topics in cryptography include: geometric

measurement, function characteristics, modular arithmetic, statistics (frequency analysis), number theory

I More ideas (and puzzles to try!) on handout I Great way to link to other subjects! I Historical context of cryptography: story characters,

use of cryptography in intrigue and war

I Literature involving cryptography as plot element I Current technology: secure online transactions,

passcodes for devices, E-currency

I It’s FUN and can be used to excite students about

mathematics

slide-35
SLIDE 35

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Recommended Beginning Cryptography References

I Online cryptography tool:

http://simonsingh.net/The_Black_Chamber/

slide-36
SLIDE 36

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Fiction and Films that Utilize Cryptography as a Plot Element

I Sir Arthur Conan Doyle, The Return of Sherlock Homes

“The Adventure of the Dancing Men”

I Eoin Colfer, Artemis Fowl series, 8 books (2001-2012) I Cory Doctorow, Little Brother (2008) I Neal Stephenson, Cryptonomicon (some mature

content, 1999)

I BBC TV show: “The Bletchley Circle”. (Two seasons,

2012-2014)

I Film: “The Imitation Game” (2014) I Film: “Sneakers” (1992)

slide-37
SLIDE 37

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Conclusion

Questions? Contact Information:

Sharon Robbert Trinity Christian College sharon.robbert@trnty.edu

Special thanks to Trinity’s maintenance department for cutting the twenty-four sets of scytales!

slide-38
SLIDE 38

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Extensions: Rearrangement Ciphers

I Scytale uses a geometric pattern to rearrange letters.

Extension questions:

I Encipher a message using the rod of your choice. Then

measure the distance between several pairs of consecutive letters. How does this distance compare to the diameter of the rod?

I If you encipher a single message with rods of di¤ering

diameter, one larger and one smaller in diameter, for which rod are the consecutive letters spaced more closely and which farther apart?

I Give your encoded message to another table group to

decipher.

I Another similar cipher to investigate: rail fence cipher

slide-39
SLIDE 39

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Extensions: Shift Ciphers

I How secure is this method? How long would it take a

determined person to break the cipher?

I How many di¤erent options for shift cipher exist? I Are there any shift ciphers that are symmetric, that is,

where plaintext and ciphertext are mirrored?

I Shift ciphers can be interpreted in terms of modular

arithmetic with mod 26. What number corresponds to the letter shift used to decipher your clue? What number corresponds to the letter shift used to encipher your clue? What is special about these number pairs?

I More complex versions of shift ciphers

I Vigenere cipher: use a pattern of multiple shifts in a

single message, usually based on a keyword.

I One-time pad: each letter in the message is shifted by a

random letter sequence recorded on the pad.

I Suppose you wished to encipher a message with all

identical characters, e.g., “F F F F F F F F F F. . . F.” Is this possible? How?

slide-40
SLIDE 40

CryptoClue CryptoClue

The Setting Where? Who? With What?

Cryptography & Math Circles

Basics of Cryptography Crime Resolved! Game History Math Circle

References

Selected Reference List Fun Resources beyond the Math Classroom

Contact Information

Extensions: Substitution Ciphers

I How many di¤erent options for encoding a 26 character

message with a substitution cipher exist?

I Cipher security is not solely based on the number of

  • ptions: letter frequency analysis for ciphertext of

su¢cient length

I Common English digraphs (th, er, on, an, re, . . . ) and

trigraphs (the, and, tha, ent, ion, . . . ) can also be used to complete the cryptanalysis.

I Is it possible to decipher a code to more than one

plaintext message? If so, how? If not, why not?

I Other versions of substitution ciphers

I Retain word spacing vs. uniform letter blocks. Which

makes for a more secure cipher? Why?

I Expand character set beyond the 26 letters. E.g., add

punctuation, numbers, spaces, etc. Does this make the system more secure? Why or why not?