11 October 2025

Cybersecurity Basics – Cracking Simple Ciphers

 


Cybersecurity Basics – Cracking Simple Ciphers

Understanding cybersecurity begins with understanding how information can be protected — and how it can be broken. In the classroom, simple ciphers offer an engaging way to introduce encryption, decryption, and the logic behind keeping data safe.


What is a Cipher?

A cipher is a method of changing a message so that only someone with the key can read it. The message before encryption is called plaintext, and after encryption it becomes ciphertext.

For example, using a Caesar cipher, each letter is shifted by a fixed number of places.

  • Shift by 3: A → D, B → E, C → F
    So the message “HELLO” becomes “KHOOR”.


Cracking the Code

Students can attempt to decrypt messages by:

  • Trying different shift values (a brute-force approach).

  • Looking for common letters or patterns such as “E” or “THE”.

  • Comparing frequency counts of letters in the ciphertext with normal English usage.

This develops logical thinking and introduces real principles of codebreaking.


Beyond Caesar

Once students understand simple substitution ciphers, they can explore:

  • Keyword ciphers – where a secret word defines the letter substitutions.

  • Transposition ciphers – where letters are rearranged rather than replaced.

  • Frequency analysis – a statistical approach used in classical cryptography.

These challenges demonstrate that security relies not only on clever systems, but also on their resistance to reverse-engineering.


Cybersecurity Connections

Modern encryption algorithms work on the same principles but at a vastly more complex scale. Understanding basic ciphers helps students see:

  • Why strong passwords and encryption keys matter.

  • Data protection relies heavily on mathematics and computation.

  • Why cybersecurity is an essential modern skill.


Why It Works in Teaching

Breaking codes gives students immediate feedback — a satisfying sense of discovery. It brings computing, logic, and maths together while encouraging persistence and reasoning.

Simple ciphers are a fun introduction to a serious subject: the protection of digital information in the modern world.

How to approach cracking a transposition cipher

1. Identify it’s a transposition cipher

Signs that a ciphertext is transposition (not substitution):

  • Letter frequency looks like plain English (E, T, A still common) but text is unreadable.

  • Common digrams/trigrams exist but in wrong positions.

  • Ciphertext length unchanged; no new symbols introduced.

If letter frequencies are very altered, you may have a substitution or a mixed cipher.

2. Try to recognise the type

Common kinds you will meet in classroom puzzles:

  • Columnar transposition (write plaintext in rows and read out by columns in some key order).

  • Rail fence (zig-zag writing and read across rails).

  • Route/spiral transpositions (write into a grid by route, read out by another route).

  • Double transposition (apply two different columnar transpositions).

Start with columnar and rail fence — they’re the most frequent in exercises.

3. Useful observations and tests

  • Look for probable words (cribs). If you suspect a word like THE, AND, or a place name, try to place it in candidates.

  • Try likely key lengths. For columnar, reasonable classroom keys are small (3–10). For rail fence, try 2–6 rails.

  • Examine repeated patterns. If the same group of letters recurs at regular intervals that suggests grid/column structure.

  • Index of coincidence is usually close to English for transposition — use that to rule out substitution.

4. Manual columnar-cracking technique (basic)

For columnar transposition:

  1. Guess a number of columns n. (If ciphertext length L, rows ≈ L/n.)

  2. Write the ciphertext into n columns top-to-bottom (or into rows and then read by columns depending on convention).

  3. Try permutations of column order to see which permutation yields readable plaintext.

  4. Shortcuts:

    • If you see short common words split across columns, try permutations that bring those letters together.

    • Use likely cribs: place the crib in all possible positions in the candidate plaintext and see if columns can be re-ordered to make it match.

Manual solving is feasible for small n and short messages. For larger keys or double transpositions, use a computer.

5. Rail-fence cracking (quick)

  • Try various rail counts r.

  • Reconstruct plaintext by writing characters along a zig-zag of r rails and reading row by row; compare resulting text to English.

  • A common clue is that small r values often reveal partial words quickly.

6. Automated / algorithmic approaches

When manual methods stall, use automated search:

  • Brute force all key permutations (only feasible for small key lengths — n! grows fast).

  • Scoring function: rate candidate plaintexts by English-language fitness (word-list hits, common bigrams/trigrams, log probability). Choose top-scoring candidates.

  • Heuristic search: hill-climbing, simulated annealing or genetic algorithms can efficiently find good permutations for large keys (used in classical cryptanalysis).

  • Crib dragging: if you know or guess a plaintext fragment, slide it along and check consistency with a transposition model.

7. Double transposition

  • Try single transposition first to see if you get English fragments.

  • If it’s double, you may need heuristic searches (hill-climbing) that try pairs of permutations and score results.

8. Practical classroom tips

  • Teach students to start small: try rail fence and small column keys first.

  • Use frequency tests to decide whether you should be looking for transposition or substitution.

  • Give cribs (a known word) to classes — this shows how a tiny piece of plaintext can break many ciphers.

  • Show comparison: same ciphertext, different decryptions — scoring separates readable English from junk.


Small Python example: brute force columnar transposition (small keys)

This is a simple brute-force tester for a columnar transposition cipher. It tries key lengths up to 8 and all permutations for each length and prints candidates that contain a common English word (e.g. " the ").

Warning: permutations grow factorially. This script is fine for keys ≤ 8 but will be very slow above that.

# Simple brute-force columnar transposition cracker (educational) from itertools import permutations import math def decrypt_columnar(cipher, key_order): n = len(key_order) L = len(cipher) rows = math.ceil(L / n) # compute number of "full" columns (some columns may be shorter by 1) cols_lengths = [rows] * n short_cols = (rows * n) - L if short_cols > 0: # last 'short_cols' columns will have one less char for i in range(n - short_cols, n): cols_lengths[i] -= 1 # split cipher into columns in order (as written out by column) cols = [] idx = 0 for clen in cols_lengths: cols.append(cipher[idx: idx+clen]) idx += clen # reorder columns according to key_order (key_order maps plaintext col pos -> cipher column index) # here key_order is a tuple of indices representing the order columns were read; we want to reconstruct rows # We need to place cols back into their plaintext column positions plain_cols = [None] * n for plain_pos, col_idx in enumerate(key_order): plain_cols[plain_pos] = cols[col_idx] # read off row-wise plaintext = [] for r in range(rows): for c in range(n): if r < len(plain_cols[c]): plaintext.append(plain_cols[c][r]) return ''.join(plaintext) cipher = "WEEENNHRREE T..." # replace with your ciphertext (no spaces ideally) cipher = ''.join(cipher.split()) # remove whitespace for processing common_word = " the " # crude filter for n in range(2, 9): # try key lengths 2..8 print(f"Trying key length {n} (permutations: {math.factorial(n)})") for perm in permutations(range(n)): # perm describes the order columns were read out when encrypting pt = decrypt_columnar(cipher, perm) if common_word in (' ' + pt.lower() + ' '): print("Possible plaintext (key order):", perm) print(pt[:200])

This script is a classroom starter — you can improve it by:

  • Using a better scoring function (word frequency / log probability).

  • Allowing for different conventions (writing rows then reading columns, or vice versa).

  • Adding support for double transposition (nested search or heuristic search).


Example of heuristic scoring (short note)

A robust solver uses a scoring function based on English quadgram or trigram frequencies. The algorithm randomly permutes the key order and uses hill-climbing: try small swaps in the permutation and keep changes that improve the score. Repeat until no improvement — repeat from different random starts. This is how many classical puzzle solvers succeed at larger keys or double transpositions.


Common pitfalls

  • Forgetting encryption convention: whether plaintext was written in rows and read by columns, or vice versa. Try both conventions.

  • Not accounting for short columns when length L is not divisible by key length.

  • Assuming a single transposition when it's double.

  • Trying brute force for large keys will result in an exponential combinatorial explosion.


Quick classroom exercise

Give students a short plaintext (30–50 letters), apply a small columnar key (3–5), and then challenge classmates to recover it using:

  • frequency check,

  • guessing key length,

  • manual column re-ordering,

  • cribbing.

Then show how a small program can solve it in seconds.


Worksheet: Cracking Transposition Ciphers

1. Warm-up: Rail-Fence Cipher

In a rail-fence cipher, the message is written diagonally across a set number of “rails”, then read row by row.

For example, with 3 rails:

HELLO WORLD H . . . O . . . R . . . E . L . W . L . D . . . L . . . O . . . .

The ciphertext would be: H O R E L W L D L O


Cipher 1

Ciphertext:

WECRLTEERDSOEEFEAOCAIVDEN
  1. Try different rail counts (2, 3, 4, 5).

  2. Write the letters in a zig-zag pattern for each rail count.

  3. Which number of rails produces an English-like plaintext?

  4. Write your decoded message below:

Decrypted text: ____________________________________________

(Hint: The correct answer has three rails.)


2. Columnar Transposition Cipher

In a columnar cipher, the message is written in rows under a keyword and then read column by column in the order of the keyword’s letters.

Example with keyword CAGE (alphabetical order 1–4):

C(2)A(1)G(3)E(4)
HELL
OWOR
LD

Ciphertext (columns in order 1-2-3-4): EWDHLOOLR


Cipher 2

Ciphertext:

TIEHXHETATSRHESAESPNLTTE

Known information:

  • The keyword is SALT (4 letters).

  • The plaintext is an English sentence.

  1. Write the ciphertext in 4 columns, one column per keyword letter.

  2. Work out which column comes first, second, third, and fourth according to the alphabetical order of the keyword letters.

  3. Read the message row by row to recover the plaintext.

  4. Write your decoded sentence below:

Decrypted text: ____________________________________________

(Hint: You should find a sentence about how salt preserves food.)


3. Reflection Questions

  1. How can you tell that both ciphers use transposition rather than substitution?

  2. Which cipher was easier to break, and why?

  3. How might computers speed up this process for longer messages?

  4. Why are transposition ciphers no longer secure for modern communication?

10 October 2025

Electrolysis of Solutions – Splitting Water and Beyond

 


Electrolysis of Solutions – Splitting Water and Beyond

Electrolysis is one of the most dramatic chemistry experiments. It turns electricity into chemistry by decomposing compounds into their elements. With a Hoffman voltameter, students can see this process in action — as bubbles of hydrogen and oxygen gas appear right before their eyes.


The Setup

A Hoffman voltameter consists of three vertical glass tubes connected at the bottom and filled with a conductive solution, usually acidified water.

  • Electrodes are connected to a direct current power supply.

  • When current flows, hydrogen gas forms at the negative electrode (cathode) and oxygen gas at the positive electrode (anode).

  • The gases collect in separate graduated tubes, making the reaction measurable and visible.


The Reaction

2H2O(l)2H2(g)+O2(g)2H_2O(l) \rightarrow 2H_2(g) + O_2(g)

The key observation is the 2:1 ratio of hydrogen to oxygen — twice as much hydrogen gas forms because water contains two hydrogen atoms for every oxygen atom.


Measuring Results

Students can measure the gas volumes and compare them to the theoretical ratio. Typical results show:

GasElectrodeVolume Collected (cm³)
HydrogenCathode20
OxygenAnode10

When tested, hydrogen burns with a squeaky pop, while oxygen relights a glowing splint — confirming their identities.


Beyond Water

The same principles apply to other electrolytes:

  • Copper(II) sulfate solution: copper forms on the cathode, oxygen at the anode.

  • Sodium chloride solution: hydrogen at the cathode, chlorine gas at the anode.

By changing the electrolyte and electrodes, students explore how ion discharge depends on reactivity and concentration.


Skills Highlight

  • Writing ionic equations for electrolysis.

  • Identifying products at each electrode.

  • Measuring and interpreting experimental gas ratios.

  • Linking practical results to energy and bonding.


Why It Works in Teaching

Electrolysis is one of those experiments that bridges chemistry and physics. The Hoffman voltameter makes an invisible process visible, turning abstract equations into real, testable phenomena. Students don’t just learn what electrolysis means — they see it, measure it, and prove it.

09 October 2025

Investigating Electricity With PASCO Current Sensors

 


Investigating Electricity With PASCO Current Sensors

Understanding electricity is easier when students can measure it directly. PASCO current sensors make invisible electrical quantities visible, allowing learners to explore current flow, Ohm’s Law, and circuit behaviour with real-time data.


The Setup

A PASCO current sensor connects easily into a circuit, just like an ammeter. When linked to PASCO software or a data logger, it records current continuously and displays it on a graph.

Typical investigations include:

  • Measuring how current changes with voltage in a simple circuit.

  • Comparing current in series and parallel circuits.

  • Observing how resistance affects current flow.

The advantage is accuracy — and instant visual feedback.


Experiments in Action

  1. Ohm’s Law
    Students vary the potential difference across a resistor and record the current. Plotting current against voltage produces a straight line through the origin, confirming that V=IRV = IR.

  2. Series and Parallel Circuits
    By building and measuring different circuit types, students discover that:

  • In series circuits, current is the same everywhere.

  • In parallel circuits, current splits between branches.

  1. Temperature and Resistance
    Using a filament bulb or thermistor, students can measure how resistance changes as the component warms up.


Skills Highlight

  • Accurate measurement and graph plotting.

  • Understanding relationships between current, voltage, and resistance.

  • Designing and modifying circuits safely.

  • Analysing real data instead of relying on theoretical values.


Why It Works in Teaching

The PASCO current sensor turns theory into observation. Students see the link between voltage and current unfold on screen in real time. It builds data-handling skills, reinforces key electrical relationships, and shows how digital sensors improve accuracy over traditional meters.

Electricity becomes a measurable, dynamic process rather than a set of abstract equations.

08 October 2025

Trigonometry in the Real World – Measuring Heights With Shadows

 


Trigonometry in the Real World – Measuring Heights With Shadows

Trigonometry is often introduced with triangles drawn on paper, but its real power comes when students take it outside. One of the simplest and most satisfying applications is using shadows to measure the height of tall objects — from trees and lampposts to buildings.


The Principle

When sunlight hits an object, it forms a right-angled triangle between the object, its shadow, and the line of sight to the top.
If students measure:

  • The length of the shadow, and

  • The angle of elevation from the tip of the shadow to the top of the object,
    they can use trigonometry to find the object’s height.

Using:

tan(θ)=oppositeadjacent\tan(\theta) = \frac{\text{opposite}}{\text{adjacent}} height=shadow length×tan(θ)\text{height} = \text{shadow length} \times \tan(\theta)

Example Calculation

ObjectShadow Length (m)Angle of Elevation (°)Calculated Height (m)
Tree5.0353.5
Lamp Post7.5406.3
Building10.04510.0

Students can verify results by comparing with a tape measure or building data, reinforcing accuracy and proportional reasoning.


Skills Highlight

  • Applying trigonometric ratios (tan, sin, cos) to real situations.

  • Measuring and estimating angles with a clinometer or phone app.

  • Recognising sources of error such as uneven ground or moving shadows.

  • Relating maths to everyday objects and outdoor measurement.


Why It Works in Teaching

Taking trigonometry outdoors turns numbers into meaning. Students see how angles and ratios describe the real world. It transforms abstract formulas into a practical tool for problem-solving — and shows that maths genuinely measures the world around us.

Measuring Height Using Shadows – Trigonometry in Action


Layout Description

1. Scene Illustration (Top Section)

  • A simple side-on diagram showing:

    • A tree or lamppost standing vertically on the left.

    • A horizontal ground line extending to the right.

    • A shadow cast along the ground (labelled shadow length = adjacent side).

    • A ray of sunlight coming down diagonally to the tip of the shadow, forming a right-angled triangle.

    • The angle of elevation (θ) marked between the shadow and the line to the top of the object.

Labels:

  • Height of object (opposite side)

  • Shadow length (adjacent side)

  • Angle θ (angle of elevation)

  • Sunlight direction

  • Right angle marked between the height and the ground.


2. Formula Section (Middle)
Clearly display the key equation underneath the diagram:

tan(θ)=oppositeadjacentHeight=Shadow Length×tan(θ)\tan(\theta) = \frac{\text{opposite}}{\text{adjacent}} \quad \Rightarrow \quad \text{Height} = \text{Shadow Length} \times \tan(\theta)

Below this, show a quick worked example:

Example: Shadow = 7.5 m, Angle = 40°

Height = 7.5 × tan(40°) = 6.3 m


3. Quick Tips (Bottom Section)
Three short side boxes:

  • Tip 1: Measure the shadow quickly before the sun moves.

  • Tip 2: Use a clinometer or phone app to measure the angle.

  • Tip 3: Keep the ground level for accurate results.

07 October 2025

Light and Lenses – Exploring Optics With Simple Setups

 


Light and Lenses – Exploring Optics With Simple Setups

Optics doesn’t need complicated equipment. With a few lenses, a light source, and a screen, students can explore the behaviour of light, understand how images form, and see the principles behind cameras, microscopes, and the human eye.


Setting Up the Experiment

A basic optics bench or even a metre ruler works perfectly. Students use:

  • A light box or torch to produce a narrow beam. A candle is a good fun alternative.

  • Convex and concave lenses of known focal lengths.

  • A screen to capture the image.

By moving the lens and screen, students can find the image position and magnification for different object distances.


The Science

Convex lenses focus light to a point, forming a real image on the screen when the object is beyond the focal point. Concave lenses diverge light, forming a virtual image that can only be seen by looking through the lens.

The relationship between object distance (u), image distance (v), and focal length (f) is given by the lens equation:

1f=1u+1v\frac{1}{f} = \frac{1}{u} + \frac{1}{v}

By measuring u and v, students can calculate f and test the equation for different lenses.


Typical Results

Lens TypeObject Distance (cm)Image Distance (cm)Calculated f (cm)
Convex2010.06.7
Convex258.36.8
Convex307.56.7

The results confirm a consistent focal length and help students visualise how lenses bend light.


Extensions

  • Explore magnification by measuring image and object heights.

  • Combine two lenses to build a simple telescope or microscope.

  • Investigate how lens curvature affects focal length.

  • Use PASCO light sensors to measure light intensity and test inverse-square relationships.


Why It Works in Teaching

Students often find ray diagrams abstract. Simple hands-on setups make light behaviour visible and measurable. By moving the lens and watching the image shift or sharpen, they connect equations to real observations.

Optics becomes more than drawing arrows on paper — it becomes an exploration of how we see the world.

06 October 2025

Enzymes at Work – Testing Catalase and Hydrogen Peroxide

 


Enzymes at Work – Testing Catalase and Hydrogen Peroxide

Enzymes are biological catalysts that speed up reactions in living organisms without being used up. One of the best ways to see this in action is with catalase — an enzyme found in most cells, especially in the liver, that breaks down hydrogen peroxide into water and oxygen.


The Reaction

Hydrogen peroxide is toxic to cells, so catalase breaks it down quickly:

2H2O22H2O+O22H_2O_2 → 2H_2O + O_2

This reaction produces visible bubbles of oxygen gas, which makes it perfect for classroom investigation.


The Experiment

Students add small pieces of potato or liver (both rich in catalase) to hydrogen peroxide and observe how quickly bubbles form. The faster the bubbles appear, the faster the enzyme is working.

Variables to explore:

  • Temperature – warming speeds up the reaction until the enzyme denatures.

  • pH – catalase works best around neutral pH.

  • Surface area – smaller pieces or blended samples react faster.

  • Concentration of hydrogen peroxide – higher concentration gives faster reaction rates.

The rate can be measured by:

  • Collecting oxygen in a gas syringe, or

  • Measuring foam height in a test tube, or

  • Timing how long it takes to produce a set volume of gas.




Typical Results

Temperature (°C)Volume of O₂ in 30 s (cm³)
02
2018
4025
6010
800

The results show enzyme activity increasing with temperature up to an optimum (around 40°C) before falling rapidly as the enzyme denatures.


Why It Works in Teaching

This investigation shows students how enzymes depend on structure and conditions. They can see and measure the reaction, test different variables, and link results to the lock-and-key theory.

It is hands-on biology that reinforces both experimental design and molecular understanding.


Conclusion

Catalase offers a clear, visible, and measurable way to study enzymes. Students not only observe oxygen being released but also understand how factors like temperature and pH control enzyme activity — and why enzymes are vital in every living cell.

05 October 2025

Memory Tests – Why We Forget and How to Measure It

 


Memory Tests – Why We Forget and How to Measure It

Why do we forget things, and how can we test how much we remember? Psychology gives us fascinating ways to measure memory and understand why it fades.


Why We Forget

Forgetting happens for several reasons:

  • Decay – memories fade if not used.

  • Interference – new information can overwrite old memories, or old ones interfere with new learning.

  • Retrieval failure – sometimes the memory is stored, but we cannot access it without the right cue.

Understanding these processes helps explain why revision is harder when students cram everything the night before an exam.


Classic Memory Tests

  1. Free recall – a list of words is read out, and students write down as many as they can remember.

  2. Recognition tests – words or pictures are shown, and students identify which ones they have seen before.

  3. Serial position effect – students usually remember the first and last items in a list best, showing how short-term and long-term memory work together.


Measuring Memory in Class

  • Create word lists of different lengths and test recall after short and long delays.

  • Compare recall with and without distractions to show interference.

  • Add retrieval cues (such as categories or images) to demonstrate how recall improves.

These small experiments make memory more than a definition — they let students measure it directly.


How to Improve Recall

Psychology research shows strategies that work:

  • Spaced practice – revising little and often.

  • Active recall – testing yourself, not just rereading notes.

  • Mnemonics and associations – linking new information to something familiar.

  • Context cues – studying in varied places or conditions to create stronger retrieval links.


Student Takeaway

Forgetting is a normal process, but it is not random. By measuring memory, students see why some things stick and others fade — and they learn techniques to make recall more reliable when it matters most.

The Chemistry of Explosives: Gun Cotton Explained (Safely)

 The Chemistry of Explosives: Gun Cotton Explained (Safely) Explosives often feel like something from action films or military history, but ...