Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

KS3 Science & Maths - Breaking News!: Code Breaking

Information to help you create a science and maths news flash, mini-documentary or advert (year 8) - compiled by your Librarians.

Code Breaking

Stimulus Questions

Clever mathematical methods are responsible for keeping data safe and private - even your private email!

  • How did mathematicians help win the war?

  • Why is 2012 a special year for Bletchley Park?

  • Is any communication secret?

  • Are any of my personal details private on the internet?

  • How is prime factor decomposition related to cryptography?

   - What is public key cryptography?

   - What about elliptic curves?

  • What is frequency analysis and how can it help crack a code?

Find more information...

Have a go at finding some more information using the search engines in the boxes below.  Sweet Search and Ipl2 search the internet for useful information for students. 

Here are some ideas of keywords and search strings you could try.

Sweet Search - a search engine for students

Try to find out more using Sweet Search, a search engine designed to help students find reliable information.

Listen to this!

Cracking the NAZI Enigma Code Machine

Bletchley Park

   During the Second World War, Bletchley Park was the site of the United Kingdom's main decryption establishment, the Government Code and Cypher School (GC&CS), where ciphers and codes of several Axis countries were decrypted, most importantly the ciphers generated by the German Enigma and Lorenz machines.

A guided Virtual Tour of Bletchley Park

Prime numbers and cryptography

Prime numbers and cryptography

   Cryptography is the study of secret codes. Prime Factorization is very important to people who try to make (or break) secret codes based on numbers. That is because factoring very large numbers is very hard, and can take computers a long time to do.

 Explore the RSA algorithm to find out how it works.

Frequency analysis

the cipher that Mary Queen of Scots used  

 Encrypted text is sometimes achieved by replacing one letter by another. Instead of writing a letter, we could write a symbol, or draw a picture. The weakness of this method is that although the letters themselves change, their frequency does not. So, any enthusiastic cryptographer could crack the code using frequency analysis tables of the original plain text language.

   The method of decryption using frequency analysis has two stages:

   1.Work out the frequencies of letters or symbols in the ciphertext and compare the results to the letter frequencies in the language: e.g., we know "e" is the most common letter in English, and "the" is the most frequent word.

   2.Make intelligent guesses for words or letters: e.g., a lone letter in English will be "I" or "A". This method is time consuming, and is less accurate for short messages, but is a valuable aid to the cryptographer.

You can try out some code breaking examples in the Young Codebreakers' Zone!

Books in the Senior Library

How Stuff Works

Cryptokids

Cryptography - POPSCI

Loading ...