![]() Some letter pairs will carry over from one line to the next. The code letters are arbitrarily arranged in groups of five letters. To decode the fictitious message in the cryptogram, begin by grouping each set of two letters starting with the first two letters (FG) and continuing through the message. Trace them across the grid to their intersection at the letter "A" in the plaintext. For example, if "DG" were the first two letters to decipher in a cryptogram, you would find the letter "D" on the vertical axis and the letter "G" on the horizontal axis. ![]() ![]() The first letter in the message is from the vertical axis of the grid, and the second letter is from its horizontal axis. Each letter in the grid is replaced by two letters in the coded message. ![]() In this code system, each letter of the alphabet and each of the numbers from 1 to 9 appears in the matrix of the grid. In substitution codes, the letters of the plaintext (message to be put into secret form) are replaced by other letters, numbers, or symbols. To extend the activity, ask students to write a message using the code, and then exchange the messages for decoding. It supports learning about the Zimmermann Telegram. In this exercise, students decode a fictitious message using a simple substitution code.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |