SHIFT CIPHERS

 

 

Author:           Tom Abraham

 

Source:           Mathematics: Modeling Our World, Course 1

 

Date:               Day 3

 

Class:              9th Grade Algebra

 

Duration:        1 hour

 

Goals:             Students will be able to:

·                    Encode messages using a simple shift cipher.

·                    Represent a shift cipher as a function and a graph.

·                    Understand that math can simplify processes and make encoding messages more efficient.

 

TEKS:             b.1 (C) The student describes functional relationships for given problem situations and writes equations or inequalities to answer questions arising from the situations.

 

                        b.1 (D) The student represents relationships among quantities using concrete models, tables, graphs, diagrams, verbal descriptions, equations, and inequalities.

 

b.1 (E) The student interprets and makes inferences from functional relationships.

 

                        b.2 (C) The student interprets situations in terms of given graphs or creates situations that fit given graphs.

                       

                        b.3 (B) Given situations, the student looks for patterns and represents generalizations algebraically.

 

                        c.1 (A) The student determines whether or not given situations can be represented by linear functions.

 

c.1 (C) The student translates among and uses algebraic, tabular, graphical or verbal descriptions of linear functions.

 

c.3 (A) The student analyzes situations involving linear functions and formulates linear equations or inequalities to solve problems.

 

c.3 (C) For given contexts, the student interprets and determines the reasonableness of solutions to linear equations and inequalities.

 

c.4 (A) The student analyzes situations and formulates systems of linear equations to solve problems.

 

 

 

ENGAGEMENT


TEACHER SAYS

 

 

STUDENTS SAY

 

GUIDING QUESTIONS


"Julius Caesar used what's called a shift cipher to encode messages he sent to his army commanders.  Can anyone tell me what they think this message is?" 

 

Write a message on the board using a shift +3 cipher - "PDWK LV VR FRRO," which translates to "MATH IS SO COOL"

Write a shift -8 cipher where the alphabet is converted to numerical equivalents and then shifted over by 8.  Write the message “5 10 19 20 10 19 26 19 5,” which translates to “M R A B R A H A M.” 

“Can anyone solve this message?”

 


Most students should be able to decipher the message.

 

 

 

 

 

 

 

 

 

This cipher should be a bit harder to solve, but many students should still be able to do it.


"What do you think a shift cipher is?"

 

 

“How does a shift cipher work?”

 

 

 

 

 

 

“How does this cipher work?”

 

 

EXPLORATION


TEACHER SAYS

 

 

STUDENTS SAY

 

GUIDING QUESTIONS

 

“In your groups, use the graph paper and come up with your own shift ciphers.  Draw the relationship between your letters and their coded forms.  For the sake of simplicity, keep your shifts to 10 or less.”

 

“Draw two graphs, one with numbers and one with letters.”

 

 

Students should come up with linear graphs that relate a letter to its coded symbol.

 

Students should be able to come up with relationships similar to y = x + c, where ‘y’ is the coded symbol, ‘x’ the original letter, and ‘c’ the shift value.

 

 

Students may be confused at first by negatives, zeros, and numbers greater than 26.  It may take some time, but the students should realize that a value of 0 is equivalent to 26, a value of -2 is equivalent to 24, and a value of 28 is equivalent to 2.

 

A shift +34 cipher just shifts a letter 8 places to the right  (34 – 26 = 8).

 

 

“How can a shift cipher be represented as a pictorial relationship?”

 

“If this were a graph, what would you put on the x-axis and the y-axis?”

 

“What kind of relationships can you see between your pictures and your ciphers?”

 

In a shift cipher, what happens when your coded numerical value ends up being less 0, -2, and/or 28?

 

 

 

 

 

 

What would a shift +34 cipher look like?

 

 

 

 

EXPLANATION


TEACHER SAYS

 

 

STUDENTS SAY

 

GUIDING QUESTIONS

 

“You have just seen three ways that you can encode a message: a table, a graph, and a function.”

 

“The table shows the original letter and its coded form.  The graph conveys the same information but as a picture.  The function is the simplest and most efficient method of describing the cipher.”

 

“A function is a mathematical way of showing the relationship between two sets of numbers.”

 

(Have students put their functions and graphs of the numerical relationships on the board for the class.)  “Look at the different ciphers that have been placed on the board.  How are the graphs and the functions related?  Does each graph and its corresponding function convey the same message?” 

 

“Graphs, functions, and tables are different ways of conveying the same information.”

 

Students should be able to respond that they can represent codes using tables, pictures, and equations.

 

They should be able to state that tables contain the original letters and/or their number values, coded values, and the coded letter forms.

 

The picture or graph should show the same relationships as above, but as the graph of a line.

 

A function simply states the mathematical relationship between a letter’s numerical representation and its coded numerical form.

 

Students should understand that the function shows the relationship between the numerical values of the original letters and their coded forms.

 

Students should be able to say that the original value and the coded value are ‘c’ values apart, and that holds true for all the letters in their ciphers.

 

 

“Which are the three ways that we have learned to code messages?”

 

“What does the table contain?” 

 

“What would a graph look like?”

 

 

 

 

 

 

 

 

“Is a function an efficient way to code messages?  Why or why not?”

 

 

 

“What are the two sets of values that your functions relate?”

 

 

 

 

“What relationships were you able to come up with?”

 

 

 

EXTENSION


TEACHER SAYS

 

 

STUDENTS SAY

 

GUIDING QUESTIONS

 

“The shift cipher you have just learned is in the form y = x + c.  Let’s take out our graphing calculators and see what your graphs would look like if your function were to look like y = ax + c, where ‘a’ is any old number.”

 

 

Students should know that a constant is a number who’s value does not change and a variable is a symbol that can stand in for any number or for an unknown number. 

 

 

 

 

Students should realize that the graphs change steepness and/or get shifted vertically.

 

“What is it called when a letter or symbol can stand in for a number and where its value won’t change?” 

 

“What is it called when a letter or symbol stands in for an unknown number or quantity?”

 

“What do your graphs look like?  Change the ‘a’ and the ‘c’ values around.  What happens to the graph?”

 

 

 

 

EVALUATION

 

Ask students the following questions:

  1. What is a shift cipher?

 

  1. What is a shift +3 cipher?  What is a shift -4 cipher?

 

  1. If A = 1, B = 2, C = 3, and so on, what are the coded numeric values and coded letters for the word “LONGHORNS” using a shift -14 cipher?

 

  1. Write the above cipher as a function.