Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Clever mathematical methods are responsible for keeping data safe and private - even your private email!
How did mathematicians help win the war?
Why is 2012 a special year for Bletchley Park?
Is any communication secret?
Are any of my personal details private on the internet?
- How is prime factor decomposition related to cryptography?
- What is public key cryptography?
- What about elliptic curves?
- What is frequency analysis and how can it help crack a code?
Find more information...
Have a go at finding some more information using the search engines in the boxes below. Sweet Search and Ipl2 search the internet for useful information for students.
Here are some ideas of keywords and search strings you could try.
Sweet Search - a search engine for students
Try to find out more using Sweet Search, a search engine designed to help students find reliable information.
An Introduction to Cryptography
Real Applications at the Science Centre
Read about the 'Real Applications' exhibit at the Science Centre. This area of the Science Centre contains information on crytology.
America's Cryptokids website
Explore the American National Security Agency's Cryptokid's website which includes some basic information on codes, ciphers and how to make or break a cipher.
Books in the Senior Library
The code book : the secret history of codes and codebreaking by
Call Number: Library - Non Fiction 652
Number story : from counting to cryptography by
Call Number: Library - Non Fiction 512.7
The science book by
Call Number: Library - Non Fiction 509
Look at p.454 for information on public key cryptography.
The secret life of codes by
Call Number: Library - Non Fiction 793.74
The math book : from Pythagoras to the 57th dimension, 250 milestones in the history of mathematics by
Call Number: Library - Non Fiction 510.9
Look at page 464 for information on public key cryptography.