What Comes Next
Choose three of the following four patterns to analyze (or do all four if you're feeling adventurous!).
Choose three of the following four patterns to analyze (or do all four if you're feeling adventurous!).
Secret Codes
The study of cryptography, or secret codes, has been around since 2000 BC in ancient Egypt. The Rosetta Stone, not the language learning software, pictured here has inscriptions of the same text in three different languages: Greek, Egyptian hieroglyphics and Egyptian. These multiple representations allowed language researchers to translate the code of hieroglyphics.
Throughout history cryptography, writing and solving codes, has played an important role in communication and technology. For example, the image to the left is a coding table or cipher that Thomas Jefferson created. Each row of letters is related to a coded letter in the column. This method of coding letters to other letters was used even during World War II. |
New representations of messages can be made using a letter shift coding cipher. Use the app below to encode and decode messages.
1) Begin by encoding i love math and decoding mrsmkqy.
1) Begin by encoding i love math and decoding mrsmkqy.
Adapted from the GeoGebra work of Bodelot
2) Decode the quote below.
mahlx pah wtkx mh ytbe fblxktuer vtg tvabxox zkxtmer chag y dxggxwr
3) Use the coding cipher to encode your own message or quote.
You might find this link helpful for encoding and decoding messages. Codes
To learn more about cryptography click here.
mahlx pah wtkx mh ytbe fblxktuer vtg tvabxox zkxtmer chag y dxggxwr
3) Use the coding cipher to encode your own message or quote.
You might find this link helpful for encoding and decoding messages. Codes
To learn more about cryptography click here.