Book Cipher Encryption π
Materials
- Paper and pen
- Sample text below (the Key)
Sample Text (Use for encryption/decryption)
Page 1:
| Line Number | Text |
|---|---|
| 1 | Alice went to the market to buy some apples. |
| 2 | Bob stayed home and read a book about coding. |
| 3 | They agreed to meet at the park after school. |
| 4 | Secret messages should never be sent in plain sight. |
| 5 | Always practice encryption to keep messages safe. |
Process: Encrypt -> Send -> Decrypt
Step 1: Agree which key to use (only needs to be done once or when changing the key)
For our key, we are using the sample text above.
Rules:
- Use page number, line number, word number to reference a word.
Example: Page 1, Line 1, Word 1 β βAliceβ
Sample Text (Use for encryption/decryption)
Page 1:
| Line Number | Text |
|---|---|
| 1 | Alice went to the market to buy some apples. |
| 2 | Bob stayed home and read a book about coding. |
| 3 | They agreed to meet at the park after school. |
| 4 | Secret messages should never be sent in plain sight. |
| 5 | Always practice encryption to keep messages safe. |
Step 2: Encrypt a message
- Write a short message (3β5 words) using words found in the sample text.
- For each word, write down the pageβlineβword numbers instead of the word.
Example Message:
Alice meets Bob
Encryption using the sample text:
- Alice β 1-1-1
- meets β 1-3-4 (βmeetβ)
- Bob β 1-2-1
Encrypted message:
1-1-1 / 1-3-4 / 1-2-1
Everyone should use the same sample text so messages can be swapped and decrypted in class.
Sample Text (Use for encryption/decryption)
Page 1:
| Line Number | Text |
|---|---|
| 1 | Alice went to the market to buy some apples. |
| 2 | Bob stayed home and read a book about coding. |
| 3 | They agreed to meet at the park after school. |
| 4 | Secret messages should never be sent in plain sight. |
| 5 | Always practice encryption to keep messages safe. |
Send the encrypted message
Swap encrypted messages with a partner.
Step 3: Decrypt the message
- Use the same key (sample text) to decode.
- Read the decrypted message.
Step 4: Discussion
- Why is the sample text called the key?
- What happens if you donβt have the correct key?
- How is this different from a hash? (once you have completed the lesson on hashing!)
Optional Stretch
- Create your own short βAlice & Bobβ message for a partner to encrypt and decrypt.
- Change the book lines or words β what happens if the key is different?
- Compare to hashing: why could this not be reversed in the same way? (once you have completed the lesson on hashing!)