Russell L. Delos Santos - Module 5 - Project
Russell L. Delos Santos - Module 5 - Project
Russell L. Delos Santos - Module 5 - Project
ACTIVITY 1
Message:
- PAUL HALMOS
Name: RUSSELL L. DELOS SANTOS Section: II-AHM
ACTIVITY 2
Julius Caesar used a simple Substitution Cipher to send messages to his troops. He
used a very simple rule to replace each leer with another letter from the alphabet. He
substituted each letter by the letter that was 3 places further along in the alphabet, so
that “a” was replaced with “D”, “b” with “E” and so on.
Complete the table below to show what each leer is enciphered as using this system.
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
Using the Caesar Cipher, encode the name of your school. Check that you get the same
code as the person sat next to you. Although Caesar substituted each leer with the leer
3 places ahead, there are other variations of this cipher. You could shift each leer by 4 or
5 or 6 etc. This is called a key, and depending on which key you use, you will get a
different message.
In pairs, discuss how good this cipher is at protecting messages. Can you think of any
ways to improve it? Finding each individual letter to complete the sentence or word is
difficult. To improve you to find easily the sentence you need to memorize the chart first.
Name: RUSSELL L. DELOS SANTOS Section: II-AHM
ACTIVITY 3
You have been given this encrypted message, and all you know is that it
has been encrypted using a Mono‐alphabetic Substitution Cipher. Can you
break it?
most frequently occurring letter the ‘first,’ the next most occurring
letter
OIS ‘LSNGFU’ OIS CGDDWPFR EGLO GNNQKKPFR DSOOSK OIS ‘OIPKU’, MFU LG GF, QFOPD
the ‘second,’ the following most occurring letter the ‘third,’ and so
on, until
WS MNNGQFO CGK MDD OIS UPCCSKSFO DSOOSKL PF OIS HDMPFOSXO LMHDS. OISF WS
we account for all the different letters in the plaintext sample. Then
we
DGGB MO OIS NPHISK OSXO WS WMFO OG LGDVS MFU WS MDLG NOMLLPCY POL
look at the cipher text we want to solve and we also classify its
LYEAGOL WS CPFU OIS EGLO GNNQKKPFR LYEAGD MFU NIMFRS PO OG OIS CGKE GC OIS
symbols. We find the most occurring symbol and change it to the
form of the
‘CPKLO’ DSOOSK GC OIS HDMPFOSXO LMEHDS, OIS FSXO EGLO NGEEGF LYEAGO PL NIM-
‘first’ letter of the plaintext sample, the next most common symbol
is cha-
FRSU OG OIS CGKE GC OIS ‘OIPKU’ MFU LG GF, QFOPD WS MNNGQFO
nged to the form of the ‘second’ and so on, until we account
CGK MDD LYEAGDL OIS NKYHOGRKME WS WMFO OG LGDVS.
for all symbols the cryptogram we want to solve.
other aims.
Once some are starting to make some head way with the decryption, a
discussion of methods will help those who are struggling. Some key questions to
help the decryption process are
Provided are blank tables to fill in to work out what each letter stands for will
also help to keep track of what has been done. It must be noted that “m”
on top goes to “A” on boom (this is the ciphertext turning into
the plaintext). Grids for recording leers in Breaking the Code
a b c d e f g h i j k l m n o p q r s t u v w x y z
M A N U S C R I P T B D E F G H J K L O Q V W X Y Z
Name: RUSSELL L. DELOS SANTOS Section: II-AHM
ACTIVITY 4
A B C J K L S W
D E F M N O T X Y
G H I P Q R V Z
earths circumstance
Name: RUSSELL L. DELOS SANTOS Section: II-AHM
ACTIVITY 5
You may take notes on this piece of paper as you proceed through the investigation.
When you have finished you must be prepared to justify your decisions to the class.
Mr X Dr Z Mr F Miss K
Mr Y Mr Q Mr G
This code uses the following key. You need to work out how to use the key to decode
the message which follows.
A B C J K L S W
D E F M N O T X Y
G H I P Q R V Z
The room in which the murder was committed has a room number.
Code 2: Polybius square
This code uses the following key. You need to work out how to use the key to decode
the message which follows.
5 A B C D E
4 F G H I J
3 K L M N O
2 P Q R S T
1 U V W X Y/Z
1 2 3 4 5
(2,3)(5,5)(5,2)(5,2)(5,5)(3,2) (4,5).
The murderer does not have an e in their name but has letter d
Code 3
Each letter is represented by a different number in a simple way, using the key a = 1,
b = 2, c = 3, d = 4, etc.
14,21,13,2,5,18,5,4 18,15,15,13
Code 4: Atbash
This code uses the following key. You need to work out how to use the key to decode
the message which follows.
A .- N -.
B -... O ---
C -.-. P .--.
D -.. Q --.-
E . R .-.
F ..-. S ...
G --. T -
H .... U ..-
I .. V ...-
J .--- W .--
K -.- X -..-
L .-.. Y -.--
M -- Z --..
- .... . / .-. --- --- -- / -. ..- -- -... . .-. / .... .- ... / . .. --. .... - / ..-. .- -.-. - --- .-. ... /
This looks disturbingly familiar, but there’s something weird about it...
-.- -.. -.-. / --.- -..- ..-. / -- .-. --/ --.- -. / -- -..- / .-. -.-. / -.-- -. .-
--.- .--- -.-- -... / ..-. .-. -.-. --.- / -... -..- ...- -. -.-. --.- .-. .— .--. /
Kdc qxf mím qn mx íc ynaqjyb fícq bxvncqíap cqjc bcdmnwcb ljw bíc xw
But how did he do it peíhaps with something that students can sit on
Code 1 says:
The room in which the murder was committed has a room number.
Code 2 says:
The murderer does not have an e in their name but has letter d
Code 3 says:
Code 4 says:
Code 6 says:
The room number has eight factors
Code 7 says:
Kdc qxf mím qn mx íc ynaqjyb fícq bxvncqíap cqjc bcdmnwcb ljw bíc xw
But how did he do it peíhaps with something that students can sit on