You are on page 1of 3

MATHEMATICS IN THE MODERN WORLD

LESSON 5: CODES

Learning Outcomes: At the end of the lesson, the students should be able to:
1. Use coding schemes to encode and decode different types of information for identification, privacy,
and security purposes. (S)
2. Exemplify honesty and integrity when using codes for security purposes (V)

Core Idea: The utility of mathematics goes beyond the mundane. Mathematics enables the development of
codes and ciphers that are useful to individuals and to society.

References/ Materials:
https://www.exploratorium.edu/ronh/secret/secret.html
https://www.cerias.purdue.edu/education/k-12/teaching_resources/lessons_presentations/cryptology.html
https://www.ahschools.us/cms/lib/MN01909485/Centricity/Domain/4557/Loads%20of%20Codes
%20%20Cryptography%20Activities.pdf

Introduction:
When you were a kid, did you have a “Captain Midnight” decoder ring? With it, you could send messages to
a friends that no one else could read. Or perhaps you remember using special symbols to write notes to your
"squeeze" in class. If the note was intercepted , your teacher, could learn nothing about your romance. In more
serious uses, codes and ciphers are used by our military and diplomatic forces to keep confidential
information from unauthorized eyes. Businesses also send data that has been encoded to try and protect trade
secrets and back-room deals. After all, you wouldn't want your competitor to know that you were about to
acquire their company with a leveraged buy-out. The study of enciphering and encoding (on the sending end),
and deciphering and decoding (on the receiving end) is called cryptography from the Greek κρυπτός
(kryptos), or hidden and γράφειν (graphia), or writing. If you don't know Greek (and not many of us do) the
above letters could be a form of code themselves! Although the distinction is fuzzy, ciphers are different from
codes. When you substitute one word for another word or sentence, like using a foreign language dictionary,
you are using a code. When you mix up or substitute existing letters, you are using a cipher. (I told you the
difference was fuzzy, and you can combine codes and ciphers by substituting one word for another and then
mixing up the result.)

Activity:
Convert the following message into code.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W

The leaping duck quacks loudest

QEFP JBPPXDB FP QLM PEZOBQ

Analysis:
After converting the message, find a pair and share what you have written. Use the following questions as
your guide.

- How did you find the message in converting into code?


- Is coding important?
Abstraction:

Code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers to
send messages or store information. A code is used to keep the message short or to keep it secret. Codes and
ciphers are forms of secret communication. A code replaces words, phrases, or sentences with groups of
letters or numbers, while a cipher rearranges letters or uses substitutes to disguise the message. This process is
called encryption or enciphering. The science that studies such secret communication is called cryptology.

Morse code is a series of dashes and dots, different combinations of which stand for different letters or
numbers. Anyone who knows the code can decode the message.
Pigpen code is coded in a tic – tac – toe grid and an X. This can be customized so that only the sender and
recipient know the key.

A cipher is a system in which each letter of the alphabet in a message is replaced by a letter, number or
symbol. This type of cipher is called a substitution cipher. Julius Caesar invented a simple cipher system that
moved the alphabet three places to the right. This shown in the table below.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W

Another type of cipher is called a transposition ciphers keep all the original letters intact but mix up their
order.
An example of transposition cipher is Rail Fence Cipher one which doesn’t change any letters when
enciphered.

Example: Encipher “DO NOT DELAY IN ESCAPING,” using a rail fence cipher.

You would send:


DNTEAIECPN OODLYNSAIG

Anagram – use the letters of one word, phrase or sentence to form a different one.
Example: “Meet behind the castle” becomes “These belched a mitten”

Application:
Encrypt the following message using rail fence cipher.
1. Marry had a little lamb.
2. Winter is supper cold.
3. Seniors rock my socks.
4. I love college algebra.

Decode the following message using the simple cipher system of Julius Caesar.
1. GRIFP ZXBPXO
Evaluation:
- Create your code key so that someone else can code or decode using your new code.

BIBLIOGRAPHY:

Hipschman, Ron. “SECRET LANGUAGE”. https://www.exploratorium.edu/ronh/secret/secret.html


Kelley, Paul. “LOADS OF CRYPTOLOGY”
https://www.ahschools.us/cms/lib/MN01909485/Centricity/Domain/4557/Loads%20of%20Codes
%20%20Cryptography%20Activities.pdf

You might also like