Friday, September 29, 2017

3rd TERM - FIRTS DEADLINE - DEFINE - DISCOVER



AUTHORS: Aguirre & O'Dwyer
We have been working in Khan Academy with the topic of Cryptography. It is about how to cipher encrypted messages. We should solve a case, with information from a bag that you found. There were three clues. This three clues were papers with encrypted messages. Each message was wrote in a different way of encryption, like this: olyrlfdvykpza. To cipher them, we use different types of cipher, like the Caesar Cipher, or the Polyalphabetic Cipher, etc. These types of cipher helped us to solve the encrypted messages and to understand- and learn about these two topic.


 
Resultado de imagen para caesar cipher




Resultado de imagen para polyalphabetic cipher







Define - Discover

Authors: Cavanagh & Ibarra GarcĂ­a


We were working in these last two lessons with Khan Academy. This time the topic is Cryptography. This topic is about to cipher encrypted messages. In this Khan Academy they present us a case, a police case, and all the initial information to solve the case is in a bag that you found. With all the information in the bag we found three clues, for the moment. This three clues are papers with encrypted messages. Each message was wrote in a different way of encryption, like this: olyrlfdvykpza. To cipher them, we use different types of cipher, like the Caesar Cipher, or the Polyalphabetic Cipher, etc. These types of cipher helped us to cipher the encrypted messages and to understand- and learn about the topic.






This is a video about the Caesar Cipher. So you can learn a bit about it.

Define and Discover

                                           Cryptography


Authors name: Brasquet and Thomsen

Cryptography 1

Define %2F Discover.jpg 
Author’s names: Agustin Cabantous, Francis Ferrari
--------------------------------------------------------------------------------------------------------------------

 For the last month and a half we've been engaging with cryptography and a bunch of new studying techniques, some of which actually helped a lot to get along with the exercises proposed to us. All of this activities were somehow related to cryptography, mainly decrypting. We learned about the caesar cipher and the viegenere cipher, about frequency analysis and how to apply both concept to code breaking. After this first stage I feel confident that the upcoming exercises will be really interesting.