Code with symbols

'Codes and Ciphers' Puts Students to Test

Math course offers insight into creating and solving secret messages.

At their simplest, they are used by kids passing notes in class and at their most complex, by governments carrying out military operations. In between, they are used by people every time they pull out a credit card or shop online.


Codes substitute arbitrary symbols鈥攖ypically, letters or numbers鈥攆or the components of the original message. Ciphers use algorithms to transform a message into an apparently random string of characters.

In 鈥淐odes and Ciphers,鈥 a special topic course offered鈥 recently by the mathematics department, students learn the difference and get an introduction to classical 鈥╝nd modern methods for encoding secret messages (cryptography) and the science of breaking codes and ciphers (cryptanalysis). It blends the history of secret writing, the art of creating codes, and the mathematics underlying the theory and practice of encryption and decryption.

鈥淭he puzzle nature of 鈥╰he course really appeals to 鈥╯tudents,鈥 says Penelope Dunham, a research associate who offers the course. 鈥淢ath majors and science majors love to solve puzzles.鈥

The course begins during the time of the Greeks and Romans with examples such as the Caesar cipher and proceeds all the way into the modern era. The Caesar cipher is a shift cipher, one of the simplest forms of encryption in which each letter of the message is replaced by a letter a certain number of positions down in the alphabet.

Some of the key moments in history that the class studies are the decoding of the Zimmerman Telegram in 1917 and the Allies鈥 successful cryptanalysis of Germany鈥檚 Enigma machine during World War II.

Intercepted and decoded by British intelligence, the Zimmerman Telegram was a secret diplomatic communication that proposed a military alliance of Germany, Mexico, and Japan in the event that the U.S. entered World War I. Its release inflamed U.S. public opinion and generated support for a declaration of war.

By World War II, the Germans were transmitting encrypted messages via the Enigma machine, but the British broke that as well. 鈥淢any students have seen the film The Imitation Game,鈥 says Dunham, 鈥渂ut I think they鈥檙e still surprised to 鈥╨earn just how important the 鈥╞reaking of these codes has 鈥╞een throughout history.鈥

鈥淭he students really enjoy the first half of the course because it鈥檚 stuff they can break,鈥 says Dunham. 鈥淲hen we get to things like the Enigma machine and the computer era, the students can no longer break the ciphers, so then it becomes more about learning the mathematics 鈥╞ehind them.鈥

Today, thanks to the need 鈥╰o send data securely online, cryptography is an unseen part 鈥╫f everyday life, and students with the right math skills are in high demand.

鈥淚鈥檝e had two of my students go on to work for the National Security Agency, which is now one of the top employers of 鈥╩ath Ph.D.鈥檚 in the world,鈥 鈥╯ays Dunham.


 

Above is the key to solving the puzzle at the top of the page. Scroll down for the correct answer.

 

 

 

Sherlock

I have

found

you

Ciphers vs. Codes

Codes substitute arbitrary symbols鈥攖ypically, letters or numbers鈥攆or the components of the original message. Ciphers use algorithms to transform a message into an apparently random string of characters.

Et Tu?

The Caesar cipher is a shift cipher, one of the simplest forms of encryption in which each letter of the message is replaced by a letter a certain number of positions down in the alphabet.

Reading List

For history, students read Simon Singh鈥檚 The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, and for math, Dunham assigns Cryptological Mathematics, by R.E. Lewand.

The Code Talkers

The name is generally associated with Navajos who served with Marine divisions in the Pacific. The Iwo Jima landing, for example, was directed entirely by Navajo code. But code talking had been pioneered during World War I by Cherokee and Choctaw Indians.

 

 

Published on: 05/13/2017