TEJ2O0-A, Castlebrooke S.S.
Peel District School Board
Nidhi Chokshi, Navdeep Dhaliwal, Ashvin Dhiman, Rachana Khatri, Ashmita Kumar
Phase One: Explain the challenge
1) Our group includes five students in alphabetical order; Nidhi Chokshi, Navdeep Dhaliwal, Ashvin Dhiman, Rachana Khatri, and Ashmita Kumar.
2) This video is based on the cryptography challenge, in Mr. Anderson's Grade 10 Computer Engineering class. There are six participating groups in the class, and each group has encrypted a secret message.
3) All of the encrypted messages are distributed to the six number of groups, and we must attempt to break the encryption with logic, subterfuge, and online analytical tools.
4) We are able to use any and all methods as we choose based on the strengths and weaknesses of the code breaking groups. As for us, we used the language braille for our second level of encryption and this was a weakness for many of our classmates, because it is very difficult to understand a new language especially for people with clear vision, and moreover it was a weakness because the language braille is in dots and the dots were very confusing as to what was the correct way to read and solve the encrypted message.
5) The group that decodes the highest number of encrypted messages wins the challenge. Each student is told to contribute two dollars to the challenge, and the group that decodes the most encrypted messages receives the total amount of money collected. In our class, sixty dollars was collected, and the group that wins the challenge receives the amount collected. Our group decoded the highest amount of encrypted messages, and each member of the group received twelve dollars each.
Phase Two: Document Encryption
6) Our groups' favourite encryption method was the method we used to encrypt our secret message into. This method is called a substitution cipher, it is when plaintext is replaced with ciphered text according to a system. For example, the letter A would be replaced to the number nine, so every time the letter A appears in the plaintext it is then substituted to the number nine. So this method is our first level of encryption. For the second level of encryption we put the ciphered text into braille.
7) This method is our favourite because it is random, and without the key, it is very difficult for the opposing teams to decode the message.
8) Our encryption method is profoundly secure, firstly because we had two levels of encryption instead of one. Furthermore, as stated in the video earlier this method is eminently random. Each letter is given it's own substitution, therefore it is not a specific cipher which can be found on a online or other alternate source. Continuing on, we also used the language braille as our second level of encryption, and the language braille is remarkably difficult to understand if the student/person has clear vision. To conclude, our method is profoundly secure because no participating group was able to decode our encrypted message.
9) Demonstrated our method on a three letter word in the video through explanation.
10) To encrypt our message it took our group five days. For the first two days, as a group, we brainstormed ideas of different ciphering methods that we could encrypt our message into. When the ciphering method was chosen, we did research on this specific method to see if it was secure, and difficult. Furthermore, on the third and fourth day we used the method to encrypt our secret message. Each level of encryption took us one day each, therefore on the third day we applied the substitution cipher to plaintext, and on the fourth day we applied the second level of encryption, which is the language braille to the ciphered text. Continuing on, on the fifth day, we proofread to ensure that spelling and grammar was accurate.
Phase Three: Document Decryption
11) There were six encrypted messages in the challenge, the first group was the Wingdings Code and our first thoughts on this code was that our entire group knew we had seen that font on Microsoft Word. The second group was the Opposites Code and our first thoughts on this code was this seemed confusing because the letters were all scrambled up. The third group was the Numbers Code and our first thoughts on this code was very easy because we already had a clue how to solve it the first time we saw it. The fourth group was the Lines Code and our first thoughts on this code was we thought it was MENTAL, it was approximately five to six pages long and just seemed impossible to solve. The fifth group was the Numbers, Letters, and Symbols Code and our first thoughts on this code was it was defiantly random and we could tell this because there was no specific pattern. The last group was the Lines and Dots Code and our first thoughts on this code was it was very hard and looked quite confusing.