Top Message
Top Message
Back to Home Page  |  Recommend a Site  |  Settings   |  Sign In
Education Web
Viewing 1-2 of 2 total results
 Caesar Cipher Activity Sheet
effective do you think this method was for sending secret messages? 4. Would this method provide adequate security today, or would a code using this method be easily broken? Explain your opinion. 5. Explain why the number of total shifts possible from Question 2 is a...
1 0
effective do you think this method was for sending secret messages? 4. Would this method provide adequate security today, or would a code using this method be easily broken? Explain your opinion. 5. Explain why the number of total shifts possible from Question 2 is a weakness of the Caesar cipher.
1 0 http://illuminations.nctm.org/Lessons/Codes/Caesar-AS-Caesar.pdf#page=1 illuminations.nctm.org/Lessons/Codes/Caesar-AS-Caesar.pdf#page=1
effective do you think this method was for sending <span class="highlight">secret</span> messages? 4. Would this method provide adequate security today, or would <span class="highlight">a</span> <span class="highlight">code</span> <span class="highlight">using</span> this method be easily broken? Explain your opinion. 5. Explain why the number of total shifts possible from Question 2 is <span class="highlight">a</span> weakness of the Caesar cipher.
Decoding Nazi Secrets: A Simple Cipher
complex ones. The key for a cipher used by Augustus Caesar, some 2,000 years ago, was simple enough: The receiver just had to shift the alphabet one position. In other words, "a" was represented by "b," "b" was represented by "c," and so on. (Bo...