You are on page 1of 9

Produce

Intrigue
C r
Introduce students to
matrices while they
encode, decode, and
pass secret messages
in math class.
Cheryl L. Avila and Enrique Ortiz

Learning mathematics is challenging. a matrix, rows, elements, equivalent secret message that he or she will
It requires discipline, logic, precision, matrices, inverse matrices, identity encode and a partner will decode.
perseverance, and accuracy. It can matrices, matrix multiplication, and The partners also agree on a key that
also be fun. When mathematics is set solving matrix equations will be they will share to encode and decode
in a context that inspires students to touched on. The game can be played the message. The students need to
want to solve interesting problems, with or without a graphing calculator, convert the letters in their message
students will have an intrinsic desire depending on the learning goals. It into numbers and will use matrices to
to learn the necessary skills to ac- should be explored after students have encode and decode the message. Each
complish a specific goal. The game a basic understanding of algebra. letter of the alphabet is assigned a
of Crypto! was designed to introduce number, with A being 1 and Z being
PESKY MONKEY /ISTOCK

middle school students to matrices set up For crypto! 26. A period, comma, question mark,
in the context of decrypting a secret Students work with a partner. To exclamation mark, and space are also
message. In so doing, the concepts of begin play, each student devises a assigned numbers.

212 MatheMatics teaching in the Middle school ● Vol. 18, No. 4, November 2012
Brought to
Copyright © 2012 The National Council of Teachers of Mathematics, Inc. www.nctm.org. All you
rightsby Univ of Toronto - OISE Lib | Unauthenticated | Downloaded 03/06/22 10:25 PM UTC
reserved.
This material may not be copied or distributed electronically or in any other format without written permission from NCTM.
with
y t o!
p
My students use color keys from setting the stage school student, with a working
four uniquely colored golf tees. I To introduce the activity and elicit knowledge of algebra to help with
made wooden blocks with holes for interest in its completion, I give stu- the transfer of information. They
the golf tees to help students re- dents some background information have given you the 2 × 2 code key
member both the placement and the on cryptography with the following in which to encipher the message
color. To keep track of the colored scenario: and have told you the secret mes-
tees, I assigned each one a number sage. Your mission is to correctly
on the basis of how many letters are The National Security Adminis- encipher the message that only you
in the name of the color. However, tration (NSA) needs to get a mes- know and pass it on to the under-
this step is unnecessary when playing sage to an undercover operative cover operative. Once the message
the game because the key can simply working on a top-secret operation is received, the undercover opera-
be numerical and written on paper vital to the nation’s security. The tive will decipher it and protect
instead. NSA has recruited you, a middle our country’s national security.

Vol. 18, No. 4, November 2012 ● MatheMatics teaching in the Middle school 213
Brought to you by Univ of Toronto - OISE Lib | Unauthenticated | Downloaded 03/06/22 10:25 PM UTC
Students set up their
codes using golf tees.
Cheryl Goebel

Cheryl Goebel
Crypto! supplies are
relatively simple to procure.

Coding and decoding students become more familiar with teachable moment to remind the
in pairs encoding and decoding the messages, student how the use of the inverse
The first time that the game is they should no longer need the struc- matrix in solving matrix equations is
played, activity sheet 1 is given to ture provided by the printed activity similar to the use of the reciprocal in
each student. The students follow sheet. solving algebraic equations with frac-
the steps on the first page and fill in At times, students may get lost tions. If the student did not use the
their matrices. Then they use the key in the encoding or decoding process. reciprocal when solving an algebraic
and the message matrix along with Therefore, I display a flow-chart visu- equation with fractions, the answer
matrix multiplication to encode the al (see fig. 2) on the overhead projec- would also be incorrect.
message. Encoded messages are then tor while students work through their Depending on the learning goals
exchanged between partners. message. If they get lost, I refer them of the instructor and the mathematics
After receiving the encoded mes- to the chart. As with activity sheet 2, level of the students, this game can be
sage, students must then decode their after a few rounds the students no easily adapted for use with a graphing
partner’s message using the key’s longer need to refer to it. calculator. Once the coded messages
inverse matrix. Next, they will need to When students are deciphering are converted into numbers, students
convert the numerical message back their partner’s message, they often can use the matrix function of the
to letters using the chart shown in mistakenly use the 2 × 2 key instead calculator to input matrices, multiply
figure 1. The steps for decoding are of the inverse of the 2 × 2 key. They matrices, and identify the inverse
on activity sheet 2. This sheet gives type [A][C] instead of [A]-1[C] into matrix. If working with matrix multi-
students the opportunity to decode the calculator. The result is a matrix plication and finding inverse matrices
a secret message before they are with large numbers that cannot are skills that the teacher wants the
familiar with the process. After a few be decoded. If this occurs and the students to master, this game provides
rounds with the process, and as the student asks for assistance, use this the repetition necessary for student

Fig. 1 Students use this table to convert letters to numbers and numbers back into letters.

A B C D E F G H I J K L M N O
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P Q R S T U V W X Y Z . ? ! space
16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Red = 3 White = 5
Blue = 4 Yellow = 6

214 Mathematics Teaching in the Middle School ● Vol. 18, No. 4, November 2012
Brought to you by Univ of Toronto - OISE Lib | Unauthenticated | Downloaded 03/06/22 10:25 PM UTC
encoding
messages keeps
students on task.
mastery. The game of Crypto! also
presents a context for the application
of these skills in a fun and challeng-
ing activity.

More Mysterious scenario

CHERYL GOEBEL
Once the students have successfully
decoded their partner’s message, I
display the second half of the scenario
and ask all students to repeat the
process using the following message Fig. 2 A flow chart provides a visual reminder of the encoding and decoding process.
that I provide:
Convert letters to numbers
On your return to the NSA (alphabet on board)
and the successful completion
of your mission, the commander
congratulated you and gave ➡
you a piece of paper with the Encrypt numbers using
following encrypted message: the 2 × 2 code [A] × [B]

 17 49 61 74 21 40 9 79 
 
 28 86 94 146
17 39
49135
6116 74 40 9 79 
191 21

 28
Type in [C].
Put encrypted message on code
49 94 146 39 135 16 191
sheet, and pass to partner ➡ Put partner’s message into [C]


 2 1 
 
 3 4  Decipher partner’s message
[A]-1 × [C]
Type in [A].
figure 3
You may have to remind students that ➡
2 3   1decipher
to 2 3 this message, they  need to
 + type
  
= use the flow  chart
5 6   4 [A] 5 [C] 6  and
-1
 
 7 fig.
8 9  (see 8 2)9 to reveal
 the hidden mes-
sage of “Have a nice day!”
1 2 3  1 2 3   
I also
 give an identical
 +  pretest and Fig. 3 This Crypto! quiz was given both before and after the activity.
posttest 4 5 6 6  = 
4 5students’
 (see fig. 3) toassess 
 7 On
knowledge. 8 9the pretest,
 7 8questions
9    is a matrix?
1. What
2 and 4 are usually answered correct-
ly: Noting the difference between a 2. What is the difference between a row and a column?
row and column and adding matrices.
3. When do you use the x-1 key on your calculator?
Students are unsure of questions 1,
3, and 5, however: What is a matrix,
4. Add these two 3 × 3 matrices:
how or when to use the x-1 key on
their calculator, and how to multiply
matrices. The most common error 1 2 3  1 2 3   
 + = 
involving matrices is to multiply the  4 5 6  4 5 6   
numbers in the same location, using  7 8 9   7 8 9   
the same process as addition. On the
posttest, most students are able to an- 5. Multiply the matrices in problem 4.
swer those three questions correctly.

Vol. 18, No. 4, November 2012 ● MatheMatics teaching in the Middle school 215
Brought to you by Univ of Toronto - OISE Lib | Unauthenticated | Downloaded 03/06/22 10:25 PM UTC
Alignment with Common Why play games?
Playing games in the classroom has
Core State Standards been shown to be a successful strategy
for teaching mathematics when used
Crypto! was developed with the Common Core State Standards for Mathematics as a teaching tool. “A game is an ac-
(CCSSM) and its Mathematical Practices in mind (CCSSI 2010a). tivity performed under strict rules in
By introducing matrices in middle school, students will have experienced which players seek to participate be-
them when they occur in high school. In the high school Common Core cause it is fun and challenging” (Falco
Number and Quantity area, one domain, Vector and Matrix Quantities, 2001). A good game for a mathemat-
contains six standards, N-VM.6. to N-VM.11. Using matrices to represent ics classroom should give students
and manipulate data and multiplying matrices by scalars to produce new the opportunity to observe patterns
matrices are just two areas discussed. and use their logical reasoning to find
The strand N-VM.9 states that students should “understand that, unlike
a solution to a unique situation. The
multiplication of numbers, matrix multiplication for square matrices is not
structure of a good game requires the
a commutative operation” (CCSSI 2010a, p. 61). The CCSSM Introduction
states, “The middle school and high school standards call on students to player to perform the specific think-
practice applying mathematical ways of thinking to real world issues and ing skills determined by the teacher;
challenges; they prepare students to think and reason mathematically” the fun of the game results in stu-
(CCSSI 2010b). Crypto! allows students the opportunity to do just that. dents engaging in the repeated play
CCSSM also states, “The Standards set a rigorous definition of college that is necessary to master the skills.
and career readiness, not by piling topic upon topic, but by demanding that As a student masters the basic skills
students develop a depth of understanding and ability to apply mathematics necessary for the game, the focus of
to novel situations, as college students and employees regularly do.” Crypto! the activity shifts from basic skills to
allows students to apply mathematics to a situation that is unique to the higher-order thinking skills, which
players and novel every time it is played. are necessary to develop specific
The Mathematical Practices in CCSSM are prevalent throughout this game.
strategies to find the solution quickly
The use of Crypto! as an interactive, instructional tool allows students the
and efficiently.
opportunity to make sense of problems and persevere in solving them. The
problems are student-created, student-solved, and student-checked for Because classroom games are often
correctness. To understand how the game is played using matrices, the played in teams or with partners, a
student must reason abstractly and quantitatively. To develop a matrix that social benefit is gained from teaching
accurately reflects the message and encode the matrix to send the message this structured activity in the class-
to another, the student is being asked to model with math and be precise so room. Games such as Crypto! that
that the receiver can accurately decipher the original message. As Crypto! is require students to interact and com-
used throughout the matrix unit, the student will be given the opportunity to municate with one another to solve a
look for and express regularity in repeated reasoning. problem help build students’ social re-
lationship skills. Unlike sports, where
players are often adversaries, Crypto!
Encouraging curiosity by going to the Federal Bureau of does not promote an adversarial
At the end of the activity, I often hear, Investigation (FBI) website: http:// relationship among the players. Both
“That was fun!” or “I want to do that www.fbi.gov/news/stories/2009/ players can be equally successful; in
again.” Once I have gone through the december/code_122409 where they fact, the success of one player can lead
activity with the entire class, most can find the online activity “Can You to the success of the other. The fun of
students can play independently with Crack a Code?” Students can also playing a challenging game can reduce
little or no assistance from the teacher. be directed to books such as Codes, the pressures that lead to conflict, thus
This makes a perfect activity for Ciphers and Secret Writing by Martin helping to build positive social rela-
those unexpected days when students Gardner (1972). The teacher might tionship skills that students will find
finish their assignments early or an wish to highlight or discuss scenes necessary later in the workplace.
unplanned school activity disrupts the from the 2001 movie Enigma about
normal class schedule. the German cipher machine used Games: a valuable tool
I encourage students who are during World War Two. However, Because this activity is student-
interested in cryptography to try the movie’s R rating should preclude centered, it allows the teacher to
their hand at actual cryptanalysis student access. focus on the students’ mathematical

216 Mathematics Teaching in the Middle School ● Vol. 18, No. 4, November 2012
Brought to you by Univ of Toronto - OISE Lib | Unauthenticated | Downloaded 03/06/22 10:25 PM UTC
processes while they are engaged in Council of Chief State School Officers. Communication from Ancient Times to
the game. This activity allows stu- http://www.corestandards.org/assets/ the Internet. New York: Scribner.
dents to become engaged in their own CCSSI_Math%20Standards.pdf. SET Enterprises. “Games of Fun,
learning processes and the learning ———. 2010b. “Myths vs. Facts.” Perception and Challenge.”
processes of other participants. If Common Core State Standards for http://www.setgame.com/
the message is not decoded correctly, Mathematics. Washington, DC: Na-
partners must work together to find tional Governors Association Center Cheryl L. Avila, cherie
the mistake and correct it. Learning for Best Practices and the Council of .avila@cfl.rr.com, is a doc-
mathematics is challenging, but so can Chief State School Officers. http:// toral student at the Univer-
be the teaching of mathematics. The www.corestandards.org/about-the- sity of Central Florida. She
challenge for the teacher is to find and standards/myths-vs-facts. is interested in problem
use tools that motivate students to Falco, Bob. 2001. “Why Play Games?” solving and collaborative
persevere and master the skills that are http://ebookbrowse.com/why- learning, and she also
being introduced. Games used as in- play-games-cag-march-2001-pdf- enjoys professional devel-
structional activities, such as Crypto! d314282584 . opment workshops and
may be one tool in a teacher’s toolbox Federal Bureau of Investigation (FBI). working with new teachers. Enrique Ortiz,
that accomplishes this goal. “Can You Crack a Code?” http://www enrique.ortiz@ucf.edu, teaches mathemat-
.fbi.gov/news/stories/2009/december/ ics methods courses at the University of
References code_122409. Central Florida in Orlando. He is interested
Common Core State Standards Initiative Gardner, Martin. 1972. Codes, Ciphers and in preservice teachers’ development of
(CCSSI). 2010a. Common Core State Secret Writing. New York: Simon & teaching and assessment goals; mind,
Standards for Mathematics. Washing- Schuster. brain, and education research applications;
ton, DC: National Governors Associa- Kahn, David. 1967. The Codebreakers: A and the development of activities involving
tion Center for Best Practices and the Comprehensive History of Secret games and technology.

What’s the Big Idea?


Introducing Three New Titles in the Landmark Essential Understanding Series
Rose Mary Zbiek, Series Editor

NEW NEW NEW


Developing Essential Developing Essential Developing Essential
Understanding of Proof Understanding of Geometry Understanding of Geometry
and Proving in for Teaching for Teaching
Grades 9–12 Mathematics Mathematics in
By Amy B. Ellis, in Grades 6–8 Grades 9–12
Kristen Bieda, By Nathalie By Nathalie
and Eric Knuth Sinclair, David Sinclair, David
Stock # 13803
Pimm, and Pimm, and
Melanie Skelin Melanie Skelin
Stock # 14122 Stock # 14123

For more information or to place an order,


please call (800) 235-7566 or visit www.nctm.org/catalog.

Vol. 18, No. 4, November 2012 ● Mathematics Teaching in the Middle School 217
Brought to you by Univ of Toronto - OISE Lib | Unauthenticated | Downloaded 03/06/22 10:25 PM UTC
activity sheet 1
Name ______________________________

CRYPTO: SECRET MESSAGE

Part 1—Generate the Coded Message


You and your partner need to agree on a color key. Place the tees in the correct positions on both sides of the board, with
the same color in the same location (i.e., upper right, and so on). The tees will not be mirror images. Once the tees are
properly placed, put the partition in the slot to separate the work spaces.

1. Convert the matrix of color tees into a 2 × 2 number matrix to create your key matrix. The only rule for the key matrix is
that the product of the diagonals cannot be equal.

2. Enter your key matrix in your graphing calculator as follows—Press the MATRIX key, then move the cursor right to EDIT,
then press ENTER. Type in the dimensions, which are 2 × 2 for the matrix above, and then type in the numbers above
for matrix [A].

3. Write your message in words here: ___________________________________________

4. Write your message using the corresponding number for each letter, period, question mark, or exclamation point in your
message. Your message must contain an even number of characters.

5. Write your message as a string of numbers here: ____________________________________

6. Use the alphabet on your partition to encrypt your message into numbers. Fill out the matrix by completing down the
first column, then the second, etc.

This is your MESSAGE matrix. Remember: You do not need to fill in all of the spaces provided, just complete a column.

For example, “I love math!” would look like this:

9 12 22 30 1 8

30 15 5 13 20 29

This is a 2 × 6 matrix because it has 12 characters.

from the November 2012 issue of


Brought to you by Univ of Toronto - OISE Lib | Unauthenticated | Downloaded 03/06/22 10:25 PM UTC
activity sheet 1 (continued)
Name ______________________________

7. Go to MATRIX, right to EDIT, down to [A]. Type in the dimensions, 2 × n (where n is the number of columns in your
message matrix), and then type in the matrix. Enter your message matrix into [B] in the calculator.

8. Multiply the key matrix by your message matrix as [A] × [B].

The dimensions of the resulting matrix have the same number of rows as the first matrix and the same number of
columns as the second matrix:

[2 × 2] × [2 × n] = [2 × n]

Fill out the matrix below with the encrypted message. Tear off the matrix from this page, and pass it to your partner.

from the November 2012 issue of


Brought to you by Univ of Toronto - OISE Lib | Unauthenticated | Downloaded 03/06/22 10:25 PM UTC
activity sheet 2
Name ______________________________

CRYPTO: SECRET MESSAGE


Part 2—Decode a Coded Message
1. Once you receive your partner’s encrypted message matrix, store it in matrix [C] on your calculator.

2. Go to MATRIX, right to EDIT, down to [C]. Type in the dimensions, 2 × n, and then type in the matrix.

3. Next, find the inverse matrix ([A]-1) of your key matrix ([A]). Change the elements in the matrix into fractions by
pressing the MATH key > FRAC.

4. Multiply the INVERSE matrix ([A]-1) by the ENCRYPTED message matrix ([C]) you received as [A]-1 × [B] = [C].

5. Put the number DECRYTPTED matrix below:

6. Convert your number MESSAGE matrix into a letter matrix using the corresponding letter for each number.

7. Write the decrypted message here: ___________________________________________

8. Tell your partner his or her secret message.

from the November 2012 issue of


Brought to you by Univ of Toronto - OISE Lib | Unauthenticated | Downloaded 03/06/22 10:25 PM UTC

You might also like