Cryptography

In this activity students are introduced to The Caesar Cipher and create a cipher wheel and practice using the cipher.

Author: Kristy Barr
Grade Level: 6-8
Standard Framework: Wyoming CS
Standards: 8.AP.A.01
Materials: None

OVERVIEW

Activity Overview:

In this activity students are introduced to The Caesar Cipher and create a cipher wheel and practice using the cipher.

Meta description

  • Subject Area: Computer Science, Logic
  • Grade Level : 6-8
  • Computer Science Domains:
    • Algorithms and Programming
  • Computer Science Principles:
    • Recognizing and Defining Computational Problems, Creating Computational Artifacts, Communicating About Computing
  • Materials:
    • None
  • Considerations: +

Lesson Plan

Overview

In this activity students are introduced to The Caesar Cipher and create a cipher wheel and practice using the cipher.

ASSESSMENT PRE/POST-TEST

What is a Caesar Cipher and how does it work?

OBJECTIVES

The students will understand what a Caesar Cipher is and what it is used for. The students will practice using a Caesar Cipher.

CATCH/HOOK

Intro: Share the video from the movie National Treasure: https://youtu.be/7tNEph7L0dU Discuss the movie clip and share what they know about codes and ciphers.

ACTIVITY INSTRUCTIONS

Discussion: Cryptography is the practice of encoding information so that people can read and understand it. Why do we need that? In what instances would we need to keep information secret? Who needs cryptography now?

Explain the Caesar Cipher: Let’s travel back to around 100 BC when Julius Caesar was a Roman general and politician. He realized that if he was going to take down the Roman Republic, he would need to communicate with only the people he trusted with messages that could not be read by everyone. He used a method of encryption to convey secret messages to his army generals on the war front. This was known as Caesar Cipher, where each character of the original text would be substituted by another character based on a rule, perhaps +3 characters. That way A would become D, B would become E and so on. While this worked well in the early days of encryption, there was an obvious flaw. Well, obvious to us, but perhaps not to those living over 2000 years ago. Can anyone guess what that flaw was?

A cipher is an algorithm used for encryption or decryption. In a substitution cipher, each character of the plaintext (plaintext is the message which has to be encrypted) is substituted by another character to form the ciphertext (ciphertext is the encrypted message). The variant used by Caesar was a shift by 3 cipher. Each character was shifted by 3 places, so the character ‘A’ was replaced by ‘D’, ‘B’ was replaced by ‘E’, and so on. The characters would wrap around at the end, so ‘X’ would be replaced by ‘A’. It is easy to see that such ciphers depend on the secrecy of the system and not on the encryption key. Once the system is known, these encrypted messages can easily be decrypted. In fact, substitution ciphers can be broken by using the frequency of letters in the language.

Next, lead the students in creating their own Caesar cipher wheel using the following material: cipher wheel To practice using the wheel lead students in encoding the teacher’s name: Mrs. Barr.

In partners, have the students complete the following tasks: Encode the name of our school: Casper Classical Academy Encode your full name: first, middle and last. Encode the name of your favorite song and trade with your partner so they can decode it. Encode a message of your own on a sticky note and hand it to the teacher. She will then give you a different student’s sticky note to encode. With your partner, discuss how good a cipher is at protecting messages? Brainstorm one or two ways to improve it.

Lesson based on and materials are from Cryptography: The Caesar Cipher by CodeHS.org

Supplements

Any items in this section are the property & under the license of their respective owners.

REVIEW

Exit slip: in 2-3 sentences explain what a Caesar Cipher is and how does it work? Give at least one example of what it could be used for.

STANDARDS

TypeListing
CS DomainsAlgorithms and Programming
CS PrinciplesRecognizing and Defining Computational Problems, Creating Computational Artifacts, Communicating About Computing
Other Content Standards8.AP.A.01