{"id":29,"date":"2017-01-07T21:52:48","date_gmt":"2017-01-07T21:52:48","guid":{"rendered":"http:\/\/learnlearn.uk\/algorithms\/?page_id=29"},"modified":"2021-06-11T02:03:53","modified_gmt":"2021-06-11T02:03:53","slug":"encryption-algorithms","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/","title":{"rendered":"Encryption Algorithms"},"content":{"rendered":"<p><div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">Starter<\/h2>\n<div class=\"tabcontent\">\n<br \/>\n<iframe loading=\"lazy\" src=\"https:\/\/trinket.io\/embed\/python\/9765bfd3a5?outputOnly=true&amp;runOption=run&amp;start=result\" width=\"100%\" height=\"500\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p><a href=\"https:\/\/docs.google.com\/presentation\/d\/1u3GGp48Mh_XU_ZnT8GZMcq9JQyTuvt42cyMd-7fy9Mc\/edit?usp=sharing\">Alternative Board based Slideshow (or warmup)<\/a><\/p>\n\n<\/div><h2 class=\"tabtitle\">Intro<\/h2>\n<div class=\"tabcontent\">\n\n<h2>Encryption Algorithms<\/h2>\n<p><strong>What is encryption?<\/strong><\/p>\n<p>Encryption is the scrambling of data so that only the intended recipient of data can decode and read it. In the starter you successfully decrypted anagrams to read the hidden word. This is a form (albeit very weak!!!) of encryption!<\/p>\n<p><strong>What is it used for?<\/strong><\/p>\n<p>Encryption is used for a wide variety of purposes, including:<\/p>\n<ul>\n<li>Stopping unauthorised people accessing your school reocrds<\/li>\n<li>Protecting internet shopping transactions<\/li>\n<li>Securing online banking transactions<\/li>\n<li>Keeping your social media messages private<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Caesar<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Caesar Shift Cipher<\/h3>\n<p>The Caesar Shift is named after Julius Caesar, who used it to encrypt all messages of military significant. It is a form of substitution cipher, where letters were &#8216;shifted&#8217; along the alphabet by a certain number of letters. Caesar used a shift of 3 in all his ciphers.<\/p>\n<p><strong>3 Shift example<\/strong><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-32\" src=\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/caesar-shift-3-shift.png\" alt=\"caesar-shift-3-shift\" width=\"739\" height=\"87\" srcset=\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/caesar-shift-3-shift.png 739w, https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/caesar-shift-3-shift-300x35.png 300w, https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/caesar-shift-3-shift-600x71.png 600w\" sizes=\"(max-width: 739px) 100vw, 739px\" \/><\/p>\n<p>Using the 3 Shift example above you can encrypt a message&#8230;<\/p>\n<p><span style=\"color: #333399;\">Original: \u00a0\u00a0IHATESPROUTS<\/span><\/p>\n<p><span style=\"color: #333399;\">Coded: \u00a0 \u00a0 \u00a0LKDWHVSURXWV<\/span><\/p>\n<p>As you can see by the table above, letter G would be changed to J, M to P. To decrypt the message, you simply reverse the process.<\/p>\n<p><strong>Encryption Strength<\/strong><\/p>\n<ul>\n<li>In Caesar&#8217;s lifetime there were no known records of his cipher being broken by the enemy, although this is likely because often the enemy would be illiterate.<\/li>\n<li>In practice this algorithm is very easy to break, either manually, or with the aid of a computer and is extremely insecure.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Vigenere<\/h2>\n<div class=\"tabcontent\">\n\n<h3 class=\"LC20lb DKV0Md\">Vigen\u00e8re Cipher<\/h3>\n<p>An improvement on the Caesar cipher was the Vigen\u00e8re Cipher. It uses a series of shift ciphers, with each individual key being shifted by a certain amount, depending on a codeword (key).<\/p>\n<p>In order to encrypt a message you would start with your message, and underneath each letter \u00a0you would write the next letter in the key ( and just keep repeating if your code word is not very long).<\/p>\n<p>You would then look up against the two axes of the Vigen\u00e8re square(right) to find the coded letter.<\/p>\n<div id=\"attachment_34\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"http:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/vigenere-square.png\"><img aria-describedby=\"caption-attachment-34\" decoding=\"async\" loading=\"lazy\" class=\"wp-image-34 size-medium\" src=\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/vigenere-square-300x300.png?_t=1620696571\" alt=\"vigenere-square\" width=\"300\" height=\"300\" srcset=\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/vigenere-square-300x300.png 300w, https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/vigenere-square-150x150.png 150w, https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/vigenere-square-768x768.png 768w, https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/vigenere-square-600x600.png 600w, https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/vigenere-square.png 864w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-34\" class=\"wp-caption-text\">You&#8217;ll need this table to encrypt using the Vigenere Cipher<\/p><\/div>\n<p><strong>Example<\/strong><\/p>\n<p>Message: I like alpacas<\/p>\n<p>Key: chicken<\/p>\n<p>Coded message: KSQXOEYRHKCC<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-33\" src=\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/vigenere-encrypted.png\" alt=\"vigenere-encrypted\" width=\"745\" height=\"117\" srcset=\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/vigenere-encrypted.png 745w, https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/vigenere-encrypted-300x47.png 300w, https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/vigenere-encrypted-600x94.png 600w\" sizes=\"(max-width: 745px) 100vw, 745px\" \/><\/p>\n<h3>Encryption Strength<\/h3>\n<p>&nbsp;<\/p>\n<ul>\n<li>The Vigen\u00e8re Cipher is far stronger than the Caesar Shift &#8211; so strong in fact that it took 300 years to break it!<\/li>\n<li>It can be broken, however, as famously demonstrated by Charles Babbage &#8211; the inventor of the first computer!<\/li>\n<li>It would take a modern computer mere milliseconds to break this cipher and therefore it is not secure enough for modern communications.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Activity<\/h2>\n<div class=\"tabcontent\">\n\n<p>&nbsp;<\/p>\n<h3>Activity 1 &#8211; Secret Messages<\/h3>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-38\" src=\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/secret-300x200.jpg\" alt=\"secret\" width=\"300\" height=\"200\" srcset=\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/secret-300x200.jpg 300w, https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/secret.jpg 510w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><strong>Caesar Shift<\/strong><\/p>\n<p>Using the Caesar Shift Algorithm, write a secret message to a friend using a shift of your choice. See if you friend can break you cipher and find out the message!<\/p>\n<p><strong>Vigenere Cipher<\/strong><\/p>\n<p>If you have time, now try writing a vignere shift cipher using a message and code word of your choice. Pass in on to your friend to decrypt &#8211; but remember to give them the key(codeword) otherwise it might take them a long, long time to break the code!<\/p>\n<p><a href=\"http:\/\/csunplugged.mines.edu\/Activities\/Cryptography\/CryptographyWorksheets.pdf\">Worksheet<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Enigma<\/h2>\n<div class=\"tabcontent\">\n\n<p><strong>Enigma Machine<\/strong><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-43 alignnone\" src=\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/enigma-machine-200x300.jpg\" alt=\"enigma-machine\" width=\"200\" height=\"300\" srcset=\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/enigma-machine-200x300.jpg 200w, https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/enigma-machine.jpg 480w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/p>\n<p>With the invention of the telephone and radio communications, military commanders now possessed the ability to control the forces from hundreds or thousands of miles away. The form of communication was easily and stealthily intercepted by the enemy, so the need for encryption was greater than ever. At the end of the first world war the German military developed the Enigma machine, a device designed to make encryption impossible to break.<\/p>\n<p>The Enigma machine used a complex combination of rotors, wires and\u00a0plugs on a typewriter style machine to encrypt and decrypt data.<\/p>\n<p>A daily codebook of machine settings were needed in order to set the machine up in the correct of way each day. Without these settings it was impossible to manually break the codes.<\/p>\n<p><strong>Breaking the Enigma (Cribs and Brute Force)<\/strong><\/p>\n<p>At the start of the second world war Polish intelligence gave the British a working version of the Enigma machine, together with their research.\u00a0A British team, headed by Alan Turing, then began working on a machine break the Enigma encryption. The Enigma machine had 107,458,687,327,300,000,000,000\u00a0possible combinations and at the time ( and until very recently) such a large number of combinations would have been impossible to attack.<\/p>\n<p>The British were immensely aided breaking the enigma by the Germans themselves, who through poor operator discipline and human error helped the British team. For example many messages from the navy began with the words &#8216;Wettervorhersage&#8217; (weather forecast), which massively helped the allies as they could perform <strong>probable-phrase<\/strong>\u00a0attacks on the cipher.\u00a0The British Bombe machine checked through each of these probably phrases to find a match.<\/p>\n<p>Soon British intelligence were able to break the intercepted codes within about 2 days of them being received, which gave them a massive tactical and strategic advantage, especially because even until the end of the war the Germans believe the Enigma machine to be unbreakable.<\/p>\n<p><strong>Computer Based Attacks<\/strong><\/p>\n<p>If the German Enigma operators had maintained good working practices the Enigma ciphers would have likely remained unbreakable for the duration of the war, as a brute force attack (where every possible combination is attempted) would have taken the WW2 machines too long to work through.\u00a0Even with all the processing power of modern super computers that governments have at their disposal it might take a day to break the codes.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Modern Encryption<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Modern Encryption<\/h3>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-48 alignnone\" src=\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/keys-300x200.jpg\" alt=\"keys\" width=\"300\" height=\"200\" srcset=\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/keys-300x200.jpg 300w, https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/keys.jpg 511w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Most modern systems use \u00a0a form of Asymmetric Encryption using public and private keys.<\/p>\n<p><strong>The process<\/strong><\/p>\n<ol>\n<li>The receiver&#8217;s <strong>public key<\/strong> is sent over the internet from the receiver to the sender and can only be used to encrypt data.<\/li>\n<li>The sender encrypts the data using the <strong>public key<\/strong> and sends the data to the receiver.<\/li>\n<li>The receiver uses their <strong>private key<\/strong> to decrypt the data.<\/li>\n<\/ol>\n<p>The strength of the Asymmetric Encryption depends on the the length of the key (longer the better). A 128 bit encryption key has over\u00a0339,000,000,000,000,000,000,000,000,000,000,000 combinations to test using a brute force attack. This would take years to break using modern computing power.<\/p>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=GSIDS_lvRv4\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"Public Key Cryptography - Computerphile\" title=\"Play video &quot;Public Key Cryptography - Computerphile&quot;\">https:\/\/www.youtube.com\/watch?v=GSIDS_lvRv4<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=GSIDS_lvRv4\" title=\"Public Key Cryptography - Computerphile\">Public Key Cryptography &#8211; Computerphile (https:\/\/www.youtube.com\/watch?v=GSIDS_lvRv4)<\/a><\/noscript><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Resources<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Resources<\/h3>\n<p><a href=\"https:\/\/crypto.interactive-maths.com\/uploads\/1\/1\/3\/4\/11345755\/shift.pdf\">Caesar Wheel Template<\/a><\/p>\n<p><a href=\"http:\/\/csunplugged.mines.edu\/Activities\/Cryptography\/CryptographyWorksheets.pdf\">Caesar Shift Worksheet<\/a><\/p>\n<p><a href=\"http:\/\/csunplugged.org\/public-key-encryption\/\">Public Key Encryption Activity (CSUnplugged)<\/a><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Alternative Board based Slideshow (or warmup) Encryption Algorithms What is encryption? Encryption is the scrambling of data so that only the intended recipient of data can decode and read it. In the starter you successfully decrypted anagrams to read the hidden word. This is a form (albeit very weak!!!) of encryption! What is it used&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Encryption Algorithms<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"on","neve_meta_content_width":80,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Encryption Algorithms - Algorithms<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encryption Algorithms - Algorithms\" \/>\n<meta property=\"og:description\" content=\"Alternative Board based Slideshow (or warmup) Encryption Algorithms What is encryption? Encryption is the scrambling of data so that only the intended recipient of data can decode and read it. In the starter you successfully decrypted anagrams to read the hidden word. This is a form (albeit very weak!!!) of encryption! What is it used&hellip;&nbsp;Read More &raquo;Encryption Algorithms\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/\" \/>\n<meta property=\"og:site_name\" content=\"Algorithms\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-11T02:03:53+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/caesar-shift-3-shift.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/\",\"url\":\"https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/\",\"name\":\"Encryption Algorithms - Algorithms\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/algorithms\/#website\"},\"datePublished\":\"2017-01-07T21:52:48+00:00\",\"dateModified\":\"2021-06-11T02:03:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"KS3 Algorithms Unit\",\"item\":\"https:\/\/learnlearn.uk\/algorithms\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption Algorithms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/algorithms\/#website\",\"url\":\"https:\/\/learnlearn.uk\/algorithms\/\",\"name\":\"Algorithms\",\"description\":\"An intro\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/algorithms\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/algorithms\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/algorithms\/#organization\",\"name\":\"Algorithms\",\"url\":\"https:\/\/learnlearn.uk\/algorithms\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/algorithms\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2021\/04\/LearnLearnLogowhite.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2021\/04\/LearnLearnLogowhite.png\",\"width\":710,\"height\":98,\"caption\":\"Algorithms\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/algorithms\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Encryption Algorithms - Algorithms","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/","og_locale":"en_GB","og_type":"article","og_title":"Encryption Algorithms - Algorithms","og_description":"Alternative Board based Slideshow (or warmup) Encryption Algorithms What is encryption? Encryption is the scrambling of data so that only the intended recipient of data can decode and read it. In the starter you successfully decrypted anagrams to read the hidden word. This is a form (albeit very weak!!!) of encryption! What is it used&hellip;&nbsp;Read More &raquo;Encryption Algorithms","og_url":"https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/","og_site_name":"Algorithms","article_modified_time":"2021-06-11T02:03:53+00:00","og_image":[{"url":"http:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/caesar-shift-3-shift.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/","url":"https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/","name":"Encryption Algorithms - Algorithms","isPartOf":{"@id":"https:\/\/learnlearn.uk\/algorithms\/#website"},"datePublished":"2017-01-07T21:52:48+00:00","dateModified":"2021-06-11T02:03:53+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/algorithms\/encryption-algorithms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"KS3 Algorithms Unit","item":"https:\/\/learnlearn.uk\/algorithms\/"},{"@type":"ListItem","position":2,"name":"Encryption Algorithms"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/algorithms\/#website","url":"https:\/\/learnlearn.uk\/algorithms\/","name":"Algorithms","description":"An intro","publisher":{"@id":"https:\/\/learnlearn.uk\/algorithms\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/algorithms\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/algorithms\/#organization","name":"Algorithms","url":"https:\/\/learnlearn.uk\/algorithms\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/algorithms\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2021\/04\/LearnLearnLogowhite.png","contentUrl":"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2021\/04\/LearnLearnLogowhite.png","width":710,"height":98,"caption":"Algorithms"},"image":{"@id":"https:\/\/learnlearn.uk\/algorithms\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/algorithms\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Alternative Board based Slideshow (or warmup) Encryption Algorithms What is encryption? Encryption is the scrambling of data so that only the intended recipient of data can decode and read it. In the starter you successfully decrypted anagrams to read the hidden word. This is a form (albeit very weak!!!) of encryption! What is it used&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/algorithms\/wp-json\/wp\/v2\/pages\/29"}],"collection":[{"href":"https:\/\/learnlearn.uk\/algorithms\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/algorithms\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/algorithms\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/algorithms\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":8,"href":"https:\/\/learnlearn.uk\/algorithms\/wp-json\/wp\/v2\/pages\/29\/revisions"}],"predecessor-version":[{"id":200,"href":"https:\/\/learnlearn.uk\/algorithms\/wp-json\/wp\/v2\/pages\/29\/revisions\/200"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/algorithms\/wp-json\/wp\/v2\/media?parent=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}