|Sub Module||Description||Learning Outcomes||Projects||Child investigations|
|1- Introduction to cryptography||Cryptography is a word, which sounds mysterious. In fact, it means hidden writing. On this, the children will unravel the mysteries of cryptography as they discover the different ways in which it is used, and how they can use it. They will also get a historical perspective by looking at some age-old methods of coding||– Explore what is cryptography and the need for cryptography|
-Identify the basic requirements for coding and decoding
– Apply and use two different cryptographic systems to code and decode
– Discover that codes are not restricted to the military application through the introduction to sign language
|-Draw their name as a picture.|
-Create and use a Ceasar Cipher wheel
-Use the Dictionary code to create a coded message and decode
|What do we need to know to understand a code?|
How have people used codes over the ages?Can we create a code using signs? Who uses signs as a code?
|2-Hiding in plan sight- Steganography and visual cryptography||This focuses on specific types of cryptography, where the message is hidden in a visual that is presented to them. They will delve into Visual cryptography which uses modern imaging technology, to create interesting and useful codes.||– Explore the different methods of Visual cryptography|
– Decode and understand how the system works
– Discover why this is more relevant in the digital age
– Understand how the image is broken down to create a key image and code image in Visual cryptography
|-Play a game using Steganography coded cards|
-Apply the principles of visual cryptography to decode a message
-Create an invisible message on paper
|Is it possible to hide the information in plain sight?|
Can I split an image into the smallest section?
What are pixels and how do they help in creating a cryptographic code?
How is visual cryptography used?
|3- Maintaining secrecy in groups||Sometimes it is necessary to work in groups, but it may be required to maintain secrecy even though information needs to be exchanged. Interesting challenge? Absolutely!|
On this, the children will look into and try for themselves some techniques to achieve this.
In addition, the highlight of the will be the Peruvian Coin toss method – Always dependable
|– Explore some techniques to maintain the secrecy of individuals in a group while getting the summary information|
– Understand the relevance of this technique to that of voting on a ballot
– Explore how to identify their work when it will be mixed in a diverse group
-Explore how to use cryptography to make a fair random choice when people cannot see each other
|– Conduct a vote with a secret ballot system|
– Play a bead game to understand coding information in a group
-Find the average age of the group without disclosing the age
-Use the Peruvian coin toss to perform a coin toss, when the 2 people are not near each other
|How do we get opinions in a group while maintaining secrecy about each individual’s answer?|
What information should I record to make sure that I can identify my choice in a secret group?
Is there a cryptographic way to perform a fair coin toss even when the 2 people are not near each other
|4- Codes in every life||Can any study of cryptography proceed without the Morse Code?|
This revolutionized the way, the world transmitted messages. Morse Code will be the retro hero of the codes. Close on its heels however is the QR code which is all prevalent too. The children will explore and use both.
|– Discuss the need for transmitting messages in secrecy over a long distance|
– Understand the historical importance of Morse code
– Use morse code in a game to code and decode messages
– Discover how they can use codes to remember hard things using mnemonics
– Explore and use a modern and prevalent code – the QR code
|– Create their own binary code system|
– Use a system of Morse code to transmit cryptographic messages
– Play a treasure hunt using QR codes
– Guess the place based on Latitude and Longitude
– Create Mnemonics, a coding to help you remember
|Where do we see the use of codes around us?|
Why was the Morse code so revolutionary? Is it still used?
What are the different ways, I can create a binary code system( with 2 symbols only)?
What are some of the modern codes we see around us?
Can we create our own code?
|5- Wrapping up||On this, the children will have a hilarious time creating a new language and conversing in it. Of course, they will also learn about code phrases and how words can be deceptive.|
Last but not the least, they will create a mindmap to summarise their own understanding.
|– Create a model of a cryptographic device|
-Explore using secret code language and phrases to convey meaning
– Summarise the learnings and build their list of questions
|-Make a scytale|
-Watch clips from movies where cryptography is really important
-Make your own secret language
– Create a driving Question Board and mind map on cryptology
|What are the limitations of some of the cryptographic devices?|
What does it take to create a secret language?
What new information have I learned and what more would I like to know?
New Batches Starting
5 Apr 2021
7 Jun 2021
Flexi class available on request