Tuesday, June 15, 2004
You can do substitution cipher solving by hand of course, but technology
can help too. And since part of the point
of our current work is to get comfortable with the technology, we
have a good excuse to play with it now.
While you're waiting, try the code at
Caesar shift code. (If it's working today.)
Stage 1
First, let's do an example together. Download and open the Maple file,
substitution.mws.
It will help to also open a new internet window with the
letter frequency table.
Let's also cut and paste the CIPHER text into a Word document, make a duplicate
copy of the file (so we can make mistakes) and use the Find & Replace
feature of Word to convert to plain text. Remember to tell Word to match
the case of the letters it is replacing.
Stage 2
Emina
Alibegovic, a recent Utah Math Ph.D., TA-ed this week of ACCESS for
me two years ago, and found an essay you might find interesting. She
chopped it up into seven parts and encrypted
each piece using who knows
what sort of substitution. According to your group number, download the
section of the essay into Word and start deciphering!
Group1.doc
Group2.doc
Group3.doc
Group4.doc
Group5.doc
Group6.doc
Group7.doc
Stage 3
After all our hard work,
let's read our results outloud to the class to hear the whole story.
If this story is indeed interesting to you and you
would like to find out more on women in Mathematics,
please visit the Women in Math Project,
maintained by Professor Marie Vitulli of the University of Oregon.
This is the most comprehensive site on the subject. (Thanks to Emily Putnam,
who helped ACCESS out last year, for this link.)