ðŸ¤” Substitution CipherÂ¶
Perhaps one of the earliest uses of computers was in the area of encrypting and decrypting secret messages. the image below is a picture I took in the Deutsches Museum in Germany. It is a picture of the german enigma machine. The operator of this machine would type in a message using the keyboard, and the machine would output the encrypted version of the letter. For example you might type the letter p but the machine would output the letter b.
The enigma machine was used by the Germans during World War II to encrypt orders for the movements of troops and german Uboats. Alan Turing (one of the fathers of computer science) worked in England and built the Bombe one of the first computers that decrypted the messages encrypted by the Enigma. The efforts of Turing and his coworkers helped bring the war to and end and saved many thousands of lives.
encrypt1: Here is a secret message bkfgamdazje
we call this the ciphertext. Can you decode it using paper and pencil and enter the decrypted message which we call the plaintext in the following space:
The enigma encrypted messages using a much more sophisticated code than the previous question. The secret message I gave you uses a simple substitution cipher. I have given you one hint but if you still donâ€™t have it This matching question will reveal a few more hints that should help you solve it.
The letters on the left correspond to the letters in the ciphertext and the letters on the right correspond to the plaintext. Drag the letters on the left to their corresponding letters on the right.

encrypt2:
 a
 o
 b
 p
 k
 y
 f
 t
In this lab we will explore some simple encryption algorithms to both encrypt and decrypt messages. This lab is fun to work with if you have a partner so that one of you can encrypt the message and the other can decrypt the message. Both of you will have to get your program working in order to communicate effectively!
Caesar CipherÂ¶
A cipher is a secret or disguised way of writing, and a caesar cipher is one of the oldest ciphers and is attributed to Julius Caesar who used it in private correspondence. The caesar cipher simply shifts each character by a fixed number of positions down the alphabet. For example a shift of 5 turns A into F If the shift takes you past then end of the alphabet for example a shift of 5 on the letter Y goes to Z, then A, B, C, D for a result of D. If you are thinking of modulo arithmetic then you are definitely on to something! A shift of 13 is very useful and was widely used in the early days of the internet to encrypt unsavory jokes that were posted to the alt.humor.funny newsgroups. The Caesar cipher is often represented by two dials where you can turn the inner dial to match up the letters any way you would like.
The problem with the caesar cipher is that there are only 25 possible rotations. If you are a clever spy it wonâ€™t take you very long to write a python program that can try all possible combinations to unlock the plaintext message. In fact, here is a new cipher text for you to unscramble. Iâ€™ll admit to you that it is using a caesar cipher but I wonâ€™t tell you the shift. Can you find the plaintext message and figure out how much the original message was shifted? The art of breaking codes is called cryptology.
encrypt3: What was the original shift?
As you have just discovered, the Caesar cipher is not very secure. Even in ancient times Iâ€™m sure with enough slave scientists working on the problem in parallel they could decrypt just about any message. We might call the number of characters we shift the key. As we have noted, there are only 26 possible keys! However, if we agree that we can mix up the alphabet into any with the mixed up alphabet acting as the key then we have a much larger set to choose from and it becomes much much harder to break. How many different arrangements of the letters in the alphabet are there? If you said 403,291,461,126,605,635,584,000,000 Then you are correct! That is there are â€˜26 factorialâ€™ possible arrangements for the alphabet. Think of it like this: You have 26 letters to choose from as the first letter. Then you have 25 letters to choose as the second and 24 letters for the third etc. So, that is 26*25*24*23â€¦*1 You can even write a loop and have python calculate that if you want.
Scrambled KeyÂ¶
\(403 e 10^{24}\) is a pretty very big number, if you could try 100 different arrangements a second how long would it take to try them all? Moving to this system will make our encryption algorithm a bit more difficult. But its not too hard if you think of it this way: Suppose we have our plaintext alphabet as â€˜abcdefghijklmnopqrstuvwxyzâ€™ For our caesar cipher instead of doing modulo arithmetic suppose we created a second version of the alphabet but rotated by thirteen â€˜nopqrstuvwxyzabcdefghijklmâ€™ Lets put them right on top of each other so we can see the correspondence:
abcdefghijklmnopqrstuvwxyz
nopqrstuvwxyzabcdefghijklm
Now to encrypt our message we just need to find the letter in the top row and replace it by the letter on the bottom row. This strategy will work for any possible arrangement of the alphabet. Another benefit of this strategy is that we could also include spaces or even punctuation. As long as our â€˜alphabetâ€™ and our key are the same length.
Now test yourself a bit further.
Password to Key (challenge)Â¶
Finally, only a few truly amazing people are going to remember a random ording of 26 letters. We would like to have a way to use a password of around 7 characters. How can we use a password to scramble our alphabet into some order? Its not as bad as you might think at first. Do the following:
 Remove any duplicate letters from the password.
 Now split the alphabet into two halves The letters up to and including the last letter in the password and the rest of the alphabet.
 Remove any letters in your password from the the two halves of the alphabet.
 The key is the concatenation of the password (without duplicate letters) followed by the second part of the split alphabet followed by the first part of the alphabet.
Finally, work with your partner so that you can ask for a password and a message, using the password, construct the key, encrypt/decrypt the message and then print out the result.
Post Project Questions

During this project I was primarily in my...
 Comfort Zone
 Learning Zone
 Panic Zone

Completing this project took...
 Very little time
 A reasonable amount of time
 More time than is reasonable

Based on my own interests and needs, the things taught in this project...
 Don't seem worth learning
 May be worth learning
 Are definitely worth learning

For me to master the things taught in this project feels...
 Definitely within reach
 Within reach if I try my hardest
 Out of reach no matter how hard I try