The task was to make a Scytale from the provided materials (a round cardboard stick, scissors, marker, tape, and paper) and decipher the given message. When the strip was unwound from the stick, the message written on it would become illegible and could only be read by the person who had a stick of the same diameter. The device was called Scytale and was made of a wooden stick around which a thin strip of leather or parchment would be wound, and then the letters would be written vertically on it. On the workshop “Encrypt and Decrypt with Scytale”, the moderators from the Vukovar Gymnasium introduced elementary school students to a device for encryption that was used by the ancient Greeks for secret communication in the 5th century BC. Workshop: Encrypt and Decrypt with Scytale During breaks, they discovered the secret of Dan Brown’s Cryptex and, from the prepared parts, made, set up, and applied their own Cryptex. They created an escape room in the youth department “Spajalica” at the Vukovar City Library, preparing four workshops and a series of four puzzles and challenges.Įach workshop was given a name according to the devised challenge, and students solved the challenges in teams made up of students from different elementary schools, while Gymnasium Vukovar students moderated each challenge and provided all the necessary information to help elementary school students successfully complete them.Īs they passed through the workshops, students were introduced to examples of classical cryptography, made Skital and Jeffersonian cipher devices, and created and decoded their own encrypted messages using Pigpen and Polybius square. Students and teachers from Gymnasium Vukovar designed and organized a public event called “Secrets of Encryption and Data Security Protection” aimed at elementary school students in the Vukovar area. Secrets of Encryption and Data Security Protection Teaching enriched with a playful dimension allows the student to explore, think, make decisions, solve problems, communicate, collaborate, and has a positive effect on the learning process. An interestingly told story, well-designed logical challenges, and a created dynamic atmosphere attract the interest of students, raise their level of motivation, and increase their desire for new knowledge.īy solving logical challenges in which students take on the role of cipher creators (cryptographers) and their breakers (cryptanalysts), students learn and develop creativity and logical thinking through play. Therefore, it is not surprising that humanity has been fascinated by it since ancient times. txt file is free by clicking on the export iconĬite as source (bibliography): Nihilist Cipher on dCode.Secrets of Encryption and Data Security Protection Publication date: June 9, 2023īy Sanja Pavlović Šijanović, Leading Teacher Croatia and Davor Šijanović, Gymnasium VukovarĬryptography is a fascinating field that involves secrets, intrigue, games, and puzzles. The copy-paste of the page "Nihilist Cipher" or any of its results, is allowed (even for commercial purposes) as long as you cite dCode!Įxporting results as a. Except explicit open source licence (indicated Creative Commons / free), the "Nihilist Cipher" algorithm, the applet or snippet (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, breaker, translator), or the "Nihilist Cipher" functions (calculate, convert, solve, decrypt / encrypt, decipher / cipher, decode / encode, translate) written in any informatic language (Python, Java, PHP, C#, Javascript, Matlab, etc.) and all data download, script, or API access for "Nihilist Cipher" are not public, same for offline use on PC, mobile, tablet, iPhone or Android app! Ask a new question Source codeĭCode retains ownership of the "Nihilist Cipher" source code. The Russian nihilist movement is described in the history textbooks as between 18.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |