news (external)

National Cipher Challenge 1A

EdCompBlog by David Muir - Wed, 2014-10-15 09:44
The National Cipher Challenge is an annual event organised by the University of Southampton.

Cipher Challenge Logo This is the second year teams from our school have had a go at the competition. We have a keen but young group of pupils and I hope that by exploring how the ciphers could have been solved after the answers have been published, we will have a better prepared team ready to tackle next year's challenges.

Also, I thought this blog would be a good place to consider some of the educational benefits of tackling competitions like this. So here is how I solved Challenge 1A. I'll follow up in the next day or so with a consideration of the computing and maths skills that could be developed through cipher cracking activities.

The first challenge was pretty straightforward. The cipher text given was:

QEVO, XLEROW JSV FVMRKMRK QI MR SR XLMW SRI, WIIQW PMOI E JEWGMREXMRK GEWI. M LEZI XLVII UYIWXMSRW: ALC ASYPH XLI JPEK HEC EWWSGMEXIW AERX E WLMT? ALC ASYPH XLIC AERX XLMW WLMT? ALC ASYPH XLIC AERX XLMW WLMT RSA? LEZMRK VIEH XLI EXXEGLIH HSGYQIRX M WYWTIGX XLEX XLI ERWAIVW EVI EPP VIPEXIH XS XLI UYIWXMSR SJ ALEX IBEGXPC WLI ERH LIV JPEK HEC EWWSGMEXI GVIA AIVI XVCMRK XS WYVZIC. M EQ KYIWWMRK XLEX CSY EPVIEHC GLIGOIH SYX XLI SRFSEVH KTW WCWXIQ JSV MRJSVQEXMSR EFSYX LIV QSZIQIRXW, FYX MJ CSY HMH JMRH ERCXLMRK M ASYPH FI JEWGMREXIH XS LIEV EFSYX MX. MR XLI QIERXMQI M EQ TVIXXC WYVI XLEX CSY ORSA QSVI EFSYX XLI JPEK HEC EWWSGMEXIW XLER CSY LEZI XSPH QI, WS E FVMIJMRK ASYPH FI QYGL ETTVIGMEXIH. EPP XLI FIWX, LEVVC
The passage looked like a letter between Harry and Mark (two people named in the introductory text related to the challenge) so an obvious crib presents itself if you guess that QEVO at the start of the cipher text is Mark and that LEVVC at the end is Harry. This suggests the following substitutions:

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z . . y . a . . . . . . h . . k . m . . . . r . . . . (Note: from now on I will adopt the convention of showing Cipher text in capital letters and plain text in lowercase, even to the extent of showing proper names like "Harry" as "harry".)

Substituting these letters into the cipher text gives you:

mark,XhaRkW JSr FrMRKMRK mI MR SR XhMW SRI, WIImW PMkI a JaWGMRaXMRK GaWI. M haZI XhrII UYIWXMSRW: Ahy ASYPH XhI JPaK Hay aWWSGMaXIW AaRX a WhMT? Ahy ASYPH XhIy AaRX XhMW WhMT? Ahy ASYPH XhIy AaRX XhMW WhMT RSA? haZMRK rIaH XhI aXXaGhIH HSGYmIRX M WYWTIGX XhaX XhI aRWAIrW arI aPP rIPaXIH XS XhI UYIWXMSR SJ AhaX IBaGXPy WhI aRH hIr JPaK Hay aWWSGMaXI GrIA AIrI XryMRK XS WYrZIy. M am KYIWWMRK XhaX ySY aPrIaHy GhIGkIH SYX XhI SRFSarH KTW WyWXIm JSr MRJSrmaXMSR aFSYX hIr mSZImIRXW, FYX MJ ySY HMH JMRH aRyXhMRK M ASYPH FI JaWGMRaXIH XS hIar aFSYX MX. MR XhI mIaRXMmI M am TrIXXy WYrI XhaX ySY kRSA mSrI aFSYX XhI JPaK Hay aWWSGMaXIW XhaR ySY haZI XSPH mI, WS a FrMIJMRK ASYPH FI mYGh aTTrIGMaXIH. aPP XhI FIWX, harry
(Note: to make it easier to process in the spreadsheet I used to help me crack this cipher, I removed the extra lines, effectively turning it into a single paragraph, but otherwise left the punctuation and spacing intact.)

You now have a choice to make:
  1. You can look at the partially deciphered text to see if any further substitutions suggest themselves. For example, the three letter grouping XhI appears many times in the text. Since "the" is a very common three letter word, there is a good chance that X=t and I=e. Similarly, the letters Ahy appear three times, which means A is probably w. Substitute these letters and then look at the text again. Keep looking for recognisable words and guessing letters until you have decoded the whole message.
     
  2. In this case, the easier option is to guess what kind of cipher was used and see if your guess is right by trying it out on the cipher text. Since we have guessed that E=a, we could further guess that Mark and Harry are using a Caesar cipher where plain text letters are moved forward four places to get the cipher text letter. So a goes to E (b to c to d to E - four places). Use your code wheel, set A to E and check if the other letters we have chosen match our guesses. You should see that the guesses match all round the wheel. That is r goes to V (s to t to u to V - four places) and y goes to C (z to a to b to C) etc.
What ever method you choose, you should be able to decipher the rest of the message and read:

mark, thanks for bringing me in on this one, seems like a fascinating case. i have three questions: why would the flag day associates want a ship? why would they want this ship? why would they want this ship now? having read the attached document i suspect that the answers are all related to the question of what exactly she and her flag day associate crew were trying to survey. i am guessing that you already checked out the onboard gps system for information about her movements, but if you did find anything i would be fascinated to hear about it. in the meantime i am pretty sure that you know more about the flag day associates than you have told me, so a briefing would be much appreciated. all the best, harry
So, Challenge 1A solved. Before going on to solve Challenge 1B, the next post will talk about the spreadsheets I developed to help crack the ciphers.


Computer News

EdCompBlog by David Muir - Wed, 2014-06-25 15:59
A former colleague told me about Weekly Computing News where, once a week, she shared some technology related news item with her Computing classes. I thought this was a brilliant idea and so shamelessly ripped it off when I started my new job here at the High School. I did fairly well for a year but it fell apart this session and I only made it up to Christmas before dribbling to a halt. Determined to do better next session, I thought I would try to get a couple in before the end of term.

I used to print out the presentation and post it outside my classroom ("print out"? How old fashioned!) but I realised if I converted it to a Google presentation, I could post it on our VLE. As an added bonus, I thought I could post it on my blog too (another much neglected project) and therefore hopefully manage at least one post a week through the school term.

So here is the first of the blogged Computer News items from session 2014/15:



As part of the presentation, there is a link to a BBC page with a short video which I showed in class as well as speaker's notes which give a bit more detail. There are also two QR code links at the end which give my primary sources. (The links are a BBC news report and an article from Wired magazine.)

Let me know what you think of the idea and/or the news item chosen. Would you like to see more?

Location:Crow Road,Glasgow,United Kingdom

Computing Science Conference: Hacking HTML, CSS and JavaScript

EdCompBlog by David Muir - Thu, 2014-05-29 16:06
Live notes from Education Scotland's Computing Science Conference
#HigherCS

Colin Maxwell

Useful websites are:
Codecademy (Colin's favourite) - great for getting yourself up to speed and for pupils to set practical homework as no special tools required.

w3schools.com - not as interactive as codecademy but good reference site.

webmaker.org - from Mozilla. The x-ray goggles is good but start with Thimble. Similar to codecademy with tutorials but the advantage is you can save and share what you create.

All three of these are great because all you need is access to the Internet. Possible to do it with some fairly basic tools: web browser (Chrome preferred) and a text editor (Notepad++, Brackets, Sublime, ...)

Brackets is free, open source. It does Live HTML Development, supports JavaScript debugging (with Theseus extension) and loads of other extensions (e.g. Extension that provides colour palette to choose hex colour codes or "beautify" code).

How do we teach HTML? Colin started teaching programming by getting pupils to hack code. Start by giving web pages for them to hack. Example given of a web page that asks for a pin code then flick backwards and forwards between the code and the page. Get pupils to identify how the different parts relate to each other. Start with JavaScript version of a simple PIN code form then same form but using CSS to code it. You can show how style is improved and extra functionality added. Can open the JavaScript file and the CSS file alongside HTML file. This approach let's pupils see the completed jigsaw puzzle rather than just giving them the bits and no picture.

Colin then went on to show editing a web page in bracket. bracket lets you open all the files in a folder and shows them in a side bar for easy navigation. From a teaching point of view, you can zoom the text in a window, highlight lines and do live update of a web page. Set pupils tasks like change a grade, add a person don't tell them how, let them work it out. Makes it more than a "monkey see, monkey do" exercise.

CSS
Set tasks to place objects (Colin uses zombies) using div to place graphics - house a png which can have transparency (for windows and doors) and zombies as gif because they can be animated. Place the zombies in the windows and doors. Uses layers to get zombie inside house. Then give file to another pupil who will stack crates in front on the windows - again using div and layers.

Went on to show JavaScript game using JavaScript library called enchant. Again, hacking an existing page to do things like change frame rate and sprite being animated. The enchant library much easier to use than many. Colin uses JavaScript as his main programming language.

Ran out of time but check his blog for more.


Computing Science Conference; PLAN-C

EdCompBlog by David Muir - Thu, 2014-05-29 14:08
Live notes from Education Scotland's Computing Science Conference
#HigherCS

Programming: Teaching Standard Algorithms - Peter Donaldson

Visualising Hidden Mechanisms
Lots of hidden mechanisms in Computing. If pupils do not have an understanding of these mechanisms (only seen examples or relying on intuition) they will struggle. Showing examples is not enough. Must have a causal model or there can be "random twiddling" to try and fix problems. Watching a process helps but it is not enough. Often programming gives too much work for eyes and not enough work for the brain. You don't have to be a genius to program, you just have to develop an understanding of what the computer does when it is given an instruction.

How do we do that currently? Diagrams e.g. Boxes for variables or use debugger to inspect variables and trace an execution of a program. Use actual boxes and get pupils to put things in the boxes. (An aside was how do you read an assignment statement? Not read left to right or how do you make sense of total = total + 1?) interactively model the process of writing code - start with a blank page and build the code up a line at a time rather than starting with example programs.

Other suggeststions: draw a flowchart of a program; draw structure diagram; trace table/debugging tools; step through program and asking "what happens next...". There are limitations of all these approaches. Each approach contributes something but often need to teach new ways of describing when they are still getting their heads round coding. Is the cart before the horse teaching design notation before they understand coding?

Example was given of using a paper table to trace through a program. Started by identifying expressions (i.e. something that generates a value).



Teachers answer was:



Next draw arrows to show the flow of control:



Finally, hand execute the program with the input 20, 7, -1 (put the step numbers beside the arrows - makes it easier to see when things happen). Fill in changing variables in a table and show the expression being evaluated at each stage too. Work in progress:



So our final trace looked like this:



Using the "Expression evaluator" box makes pupils' understanding of what is going on clear.

But research shows there is a strong correlation between the ability to trace the flow of a program and the ability to produce code.

Location:Grosvenor Street,Edinburgh,United Kingdom

watch Online English Movies Free: Dui bu qi wo ai <b>ni (2009</b>)

- Sat, 2014-01-25 10:32
Saturday, 25 January 2014. Dui bu qi wo ai ni (2009). pMovie: strongDui bu qi wo ai ni/strong/ppspanimg align=left style=margin-top: 5px;margin-bottom: 5px;margin-left: 3px;margin-right: 20px ...

U-KISS ?Man Man Ha <b>Ni??2009</b>?11????M COUNTDOWN <b>...</b>

- Mon, 2014-01-13 02:49
U-KISS ?Man Man Ha Ni??2009?11????M COUNTDOWN??? ?Mnet Satellite ???? ??????GyaO! ?????????????????????????????????????GyaO!

Pages

Subscribe to Ulrich Schrader's Website aggregator