Teacher page for the History
and Analysis of Cryptography Unit
Each layer in a system builds upon previous layers
Topic: The history of cryptography and its current applications in our
Michael Sirois, Lanier Middle School, Media 2000
Teachers using this lesson online: Your current URL is
Send your students to the URL below to get started, not to the one above. Many of the items on this "teacher" page will give away important information that the students should discover for themselves.
Send Students Here:
Purpose: The primary purpose of the unit is to allow students to become aware of code systems and the art of cryptanalysis.
Materials: An Internet connection, WWW browser, paper, pencil.
Prior knowledge: Any knowledge students already have, regarding codebreaking or cryptographic systems, will be useful to them, but not necessary. They should discover everything they need to know while exploring the topic.
Description: In this unit, we will learn about the history of codes, and--by analyzing and breaking down some codes into sections--we will see how they are structured. We will continue that process by inventing codes of our own, attempting to break each other's codes during the next few weeks.
Procedure: The students will examine and understand the history of cryptography to further demonstrate that each layer in a system builds on the item which precedes it. They will come to an understanding of cryptographic systems by deconstructing coded messages, then developing their own code system. They will also have an opportunity to enter The Edgar Allan Poe Cryptographic Challenge, and try to solve a 150 year old mystery.
Suggested URLs pertaining to lesson: URLs for Edgar Allan Poe, cryptography, etc., are located in the students' document, assignment.html.
Technology TEKS covered in this unit:
The student is expected to:
Length of lesson: Approximately two weeks, unit to be extended with research and project construction.
Objectives: Students will be able to
Possible Questions Relating to Cryptography: [these questions are also on the students' assignment page]
When students take their pretest, they should enter your e-mail address in the appropriate place, along with their own name. Look at the pretest at this link
The students will link to it from their main page. When they submit it, I'll get a copy and you'll get a copy [if they filled in the correct e-mail address]. Your copy of the e-mail should have the following:
These are the answers to the five questions on the pretest. Be sure to check this page and the pretest page periodically. I will expand it, eventually, to include more questions. I'll update this page when I do. If it will be easier for you, save the source code and devise your own version, or print a paper copy. Be aware that the students can view the source code of a page from any browser by choosing View/Page Source from the menu. Make sure they don't do that while they are working on the pretest [they can peek at the answers...they wouldn't do that, would they? (8^) ].
[sorry for the <blink>, I had to get your attention].
Below is a duplicate of the cryptogram the students have to solve to make it to the next step in the lesson. This is the only way they can retrieve their assignment. Your version has the answers, of course. Theirs doesn't.
Cryptogram: The Answers:
Did I forget something? ...or do you just need to talk about the lesson? E-mail me at firstname.lastname@example.org
Last updated on July 25, 1999
Go back to Michael's GirlTech homepage
...or back to the main Lessons page
This page's URL= http://www.crpc.rice.edu/CRPC/GT/msirois/Lessons/crypto/teacher.html
These pages were developed through GirlTECH, a teacher training sponsored by the Center for Research on Parallel Computation (CRPC), a National Science Foundation Science and Technology Center. Copyright July 1998 and 1999 by Michael Sirois.