Encryption for Kids! (2024)

Cryptology for Kids

<![if !supportEmptyParas]><![endif]>

<![if !supportEmptyParas]><![endif]>

Introduction:


A code is a system of symbols, letters, words, or signals that are used insteadof ordinary words and numbers to send messages or store information. A code isused to keep the message short or to keep it secret.

Codes and ciphersare forms of secret communication. A code replaces words, phrases, or sentenceswith groups of letters or numbers, while a cipher rearranges letters or usessubstitutes to disguise the message. This process is called encryption or enciphering.The science that studies such secret communication is calledcryptology.

<![if !supportEmptyParas]><![endif]>

How is cryptology used?

<![if !supportEmptyParas]><![endif]>

Secret writing hasbeen employed about as long as writing has existed. Codes have been usedthroughout history whenever people wanted to keep messages private. Cryptology has long been employedby governments, military, businesses, and organizations to protect theirmessages. Today, encryption is used to protect storage of data and transactionsbetween computers. Visitthis site to learn more: http://www.thunk.com/learn.html

<![if !supportEmptyParas]><![endif]>

In ancient timeswhen messages were carried by foot for miles, kings and rulers would encryptthe letters they would send to allies.This helped to protect the secrecy of the message in case they werestolen. In early American history,even George Washington sent coded messages to his fellow soldiers. Likewise, the members of the ContinentalCongress also encoded their documents. When the telegraph was invented, the “Morse Code” was used tosend understandable messages via sound patterns.

<![if !supportEmptyParas]><![endif]>

Today, computerusers encrypt documents, network space, and e-mail messages as a way to protectthe confidentiality of their messages.The new types of encryption are very advanced, and sometimes complicated….but,the basic skill remains true to the ancient methods!

<![if !supportEmptyParas]><![endif]>

Below you willfind a collection of links on cryptology use through history.

<![if !supportLists]>·<![endif]>Morse Code:

<![if !supportLists]>o<![endif]>Visit thiswebsite to translate (and listen to!) your own message in Morse Code: http://www.soton.ac.uk/~scp93ch/morse/

<![if !supportEmptyParas]><![endif]>

<![if !supportLists]>·<![endif]>Navajo CodeTalkers in WWII:

<![if !supportLists]>o<![endif]>Visit this site to read more about theseimportant Americans and their role in our victory during WWII: http://www.history.navy.mil/faqs/faq61-2.htm

<![if !supportEmptyParas]><![endif]>

<![if !supportLists]>·<![endif]>ENIGMA in WWII:

<![if !supportLists]>o<![endif]>Learn moreabout the code machine, ENIGMA, cracked by the Allies in WWII http://www.odci.gov/cia/information/artifacts/enigma.htm

<![if !supportEmptyParas]><![endif]>

<![if !supportLists]>·<![endif]>Secret Code Breakers Through History:

<![if !supportLists]>o<![endif]>This site http://codebreaker.dids.com/fhistory.htmcontains many stories about the role of encryption in history.

Calling all cryptologists!

Your mission (should you choose toaccept it) is to encrypt the message the following message using at least 3different secret codes. Write yourresponses on a separate piece of paper.

Message to Encrypt:

The redballoon will launch at noon tomorrow.Alert all parties!

<![if !supportEmptyParas]><![endif]>

HelpfulResources:

The following links will provideyou with an assortment of sample encryption techniques. Be sure to explore them all!

<![if !supportLists]>·<![endif]>Numbers Stand for Letters

<![if !supportLists]>o<![endif]>http://www.funology.com/braindrains/bd002.cfm

<![if !supportLists]>·<![endif]>Cryptographs

<![if !supportLists]>o<![endif]>http://www.scouting.org.za/codes/sliding.html

<![if !supportLists]>·<![endif]>Pigpen Ciphers

<![if !supportLists]>o<![endif]>http://www.scouting.org.za/codes/pigpen.html

<![if !supportLists]>·<![endif]>Mixed Up Alphabet

<![if !supportLists]>o<![endif]>http://www.funology.com/braindrains/bd001.cfm

<![if !supportLists]>·<![endif]>Police Letters Alphabet

<![if !supportLists]>o<![endif]>http://www.happychild.org.uk/ifs/00001pla.htm

<![if !supportLists]>·<![endif]>Morse Code Letters

<![if !supportLists]>o<![endif]>http://www.happychild.org.uk/ifs/00003mrs.htm

<![if !supportEmptyParas]><![endif]>

FUN Cryptology Projects forYOU to Try:

NationalSecurity Agency’s Code Challenge:
Visit this site http://www.nsa.gov/programs/kids/standard/lab/elementary/index.shtmlto begin your journey as a secret agent for the federal government. Click on the “Start Puzzle” button tobegin.

MirrorWriting:
If you hold up to a mirror somethingwith writing, the writing looks reversed. You can easily write notes and otherthings to look like mirror writing. Get a sheet of thin white or light coloredpaper. With a dark marker, write something on one side. Make sure you write itthick and dark enough so that it will show through on to the other side. Flipover the paper and trace what you wrote. You'll be tracing it backwards. Itshould come out like how you would see your regular writing if you were to holdit up to a mirror. For fun, write down different words, or write a note tosomeone, then reverse it and send it to them.

InvisibleInk:
If you write with white crayon on awhite piece of paper, it looks like there's nothing there. But if you thenpaint over it, your invisible writing will magically appear. Write words,phrases or even a note to someone, and then impress them by making it magicallyappear!

CryptographWheel:
You can make a special CryptographWheel to solve cryptographs (see the picture!) First make two circles of cardboard,one a bit smaller than the other, and use a protractor to mark them off into 26pieces of about 13.8 degrees each. Write one letter of the alphabet in eachdivision on each wheel. Then attach the two wheels together using a split pinso that you can rotate them independently. Visit this site again tosee an example: http://www.scouting.org.za/codes/sliding.html

AmericanSign Language:
Use this site to learn more aboutsigning the alphabet. http://www.mikesart.net/clorisacom/signlanguage/?inputstring=helloYou can learn how to spellwords. Enter a word into the box and press "translate" to seehow it looks in the sign language. Each finger represents a letter.

Pin Marks:

Using a newspaper or a sheet ofpaper. Use a pin to make tinyholes under specific letters to spell out a secret message. To decipher the message, hold the paperup to a light (or window) and write down the marked letters.

Encryption for Kids! (2024)
Top Articles
Latest Posts
Article information

Author: Tish Haag

Last Updated:

Views: 6042

Rating: 4.7 / 5 (47 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Tish Haag

Birthday: 1999-11-18

Address: 30256 Tara Expressway, Kutchburgh, VT 92892-0078

Phone: +4215847628708

Job: Internal Consulting Engineer

Hobby: Roller skating, Roller skating, Kayaking, Flying, Graffiti, Ghost hunting, scrapbook

Introduction: My name is Tish Haag, I am a excited, delightful, curious, beautiful, agreeable, enchanting, fancy person who loves writing and wants to share my knowledge and understanding with you.