PREMIUM LOGIN

ClassTools Premium membership gives access to all templates, no advertisements, personal branding and other benefits!

Username:    
Password:    
Submit Cancel

 

Not a member? JOIN NOW!  

QR Challenge: Cryptography

Created using the ClassTools QR Treasure Hunt Generator

Teacher Notes

A. Prior to the lesson:

1. Arrange students into groups. Each group needs at least ONE person who has a mobile device.

2. If their phone camera doesn't automatically detect and decode QR codes, ask students to

3. Print out the QR codes.

4. Cut them out and place them around your class / school.


B. The lesson:

1. Give each group a clipboard and a piece of paper so they can write down the decoded questions and their answers to them.

2. Explain to the students that the codes are hidden around the school. Each team will get ONE point for each question they correctly decode and copy down onto their sheet, and a further TWO points if they can then provide the correct answer and write this down underneath the question.

3. Away they go! The winner is the first team to return with the most correct answers in the time available. This could be within a lesson, or during a lunchbreak, or even over several days!


C. TIPS / OTHER IDEAS

4. A detailed case study in how to set up a successful QR Scavenger Hunt using this tool can be found here.


Questions / Answers (teacher reference)

Question

Answer

1. Welcome to our class. I'm Secret Agent 110 and the class want to give you an introduction to this course. Cryptography is the discipline of using codes and ciphers to encrypt a message and make it unreadable unless the recipient knows the secret to decrypt it. Encryption has been used for many thousands of years. Using a decoding scanner device, explore the classroom to appreciate the ways in which codes and code breaking have impacted history, technology, and culture—and ways they continue to do so. The QR Codes are displayed near examples of related topics. Think of a spy disguise and scan the QR Codes with your spy device.Cryptography
2. A simple cipher is when one letter of a text is replaced with another letter, like a = z. Simple ciphers where introduced in the 1600's. They are important for spies and people who were in conflict, if an enemy knew what their opponent was saying there would be many wars that would have lasted for years and years. This closely related to math because you have to find the mode of the numbers and then use frequency to help identify where to start deciphering the code.Simple Cipher
3. A Caesar cipher is a substitution cipher used and discover by Julius Caesar around 1915. It was used for the Roman army to send secret codes to each other. This is closely relates math because they used modular arithmetic to create the cipher.Caesar Cipher
4. An Enigma machine, invented in 1918 by Arthur Scherbius in Berlin, was used to distribute messages during in WWII. Think of it as the original code-breaking computer. What made it sophisticated was that each time the code was used, it changed. The wiring from the letter pressed, to the cipher value, was set to a wheel. The wheel was on a rotor that rotated after each cipher. This enabled 26 possibilities to be used. By adding more wheels and rotors, additional possibilities occurred. This related to math because you have determine how many codes are possible by using permutations.Enigma machine
5. In binary code the characters 1 and 0 are only used. These two characters are basically yes and no. 8 digits represent every letter or number. Gottfried Leibniz first invented the binary number system back around 1679. They are important because they allow computers to and electronics to read barcodes and the codes in the systems. This is related to math and technology because binary codes are used with computers and scanners to read messages and codes given off by the system. It's related to math because if you use 2^n then you can figure out some of the ways to make the code.Binary Codes
6. Younger children tend to ask you many questions such as “What is this?” or “How does this work?” As a person with knowledge you may find it annoying to answer these questions that have simple solutions. But what happens when you don’t know the answer, who do you turn to? I know you see those strips of dark and light lines on your favorite bag of chips. You ask yourself “What are these for?” Well with the help of my wonderful teacher Mrs. AJ I am informed to tell you the intention of bar codes. A bar code (often seen as a single word, barcode) is the small image of lines (bars) and spaces that is affixed to retail store items, identification cards, and postal mail to identify a particular product number, person, or location.. (according to an online source).They are read with a barcode reader. The reader uses laser beams to translate digital data. Barcode readers can be found in many stores such as Walgreens or Wal-Mart.Binary Codes
7. The first barcodes were used at a supermarket in Troy, OH, in 1974, and the scanners that read the barcode were considered large, loud, and clumsy. The very first item scanned was a pack of Wrigley's Juicy Fruit chewing gum. Because computers cannot read barcodes, they require an adapter called a "Barcode Reader" kit to scan products. The kit usually consists of a scanner, a decoder, and a cable that connects to a computer, cash register, or other computer embedded product. The scanner "reads" the barcodes -- looking at both the black lines and the size and spacing of blank space between bars. The decoder checks the last number, and transmits the corresponding information about the item to the computer in text format. Because computers cannot read barcodes, they require an adapter called a "Barcode Reader" kit to scan products. The kit usually consists of a scanner, a decoder, and a cable that connects to a computer, cash register, or other computer embedded product. The scanner "reads" the barcodes -- looking at both the black lines and the size and spacing of blank space between bars. The decoder checks the last number, and transmits the corresponding information about the item to the computer in text format.Thanks for breaking the code. We hope you enjoyed our presentations.Thank

 



Cryptography : QR Challenge

https://www.classtools.net/QR/decode.php?text=Welcome_to_our_class._I'm_Secret_Agent_110_and_the_class_want_to_give_you_an_introduction_to_this_course._Cryptography_is_the_discipline_of_using_codes_and_ciphers_to_encrypt_a_message_and_make_it_unreadable_unless_the_recipient_knows_the_secret_to_decrypt_it._Encryption_has_been_used_for_many_thousands_of_years._Using_a_decoding_scanner_device,_explore_the_classroom_to_appreciate_the_ways_in_which_codes_and_code_breaking_have_impacted_history,_technology,_and_culture—and_ways_they_continue_to_do_so._The_QR_Codes_are_displayed_near_examples_of_related_topics._Think_of_a_spy_disguise_and_scan_the_QR_Codes_with_your_spy_device.

Question 1 (of 7)

 



Cryptography : QR Challenge

https://www.classtools.net/QR/decode.php?text=A_simple_cipher_is_when_one_letter_of_a_text_is_replaced_with_another_letter,_like_a_=_z._Simple_ciphers_where_introduced_in_the_1600's._They_are_important_for_spies_and_people_who_were_in_conflict,_if_an_enemy_knew_what_their_opponent_was_saying_there_would_be_many_wars_that_would_have_lasted_for_years_and_years._This_closely_related_to_math_because_you_have_to_find_the_mode_of_the_numbers_and_then_use_frequency_to_help_identify_where_to_start_deciphering_the_code.

Question 2 (of 7)

 



Cryptography : QR Challenge

https://www.classtools.net/QR/decode.php?text=A_Caesar_cipher_is_a_substitution_cipher_used_and_discover_by_Julius_Caesar_around_1915._It_was_used_for_the_Roman_army_to_send_secret_codes_to_each_other.__This_is_closely_relates_math_because_they_used_modular_arithmetic_to_create_the_cipher.

Question 3 (of 7)

 



Cryptography : QR Challenge

https://www.classtools.net/QR/decode.php?text=An_Enigma_machine,_invented_in_1918_by_Arthur_Scherbius_in_Berlin,_was_used_to_distribute_messages_during_in_WWII._Think_of_it_as_the_original_code-breaking_computer._What_made_it_sophisticated_was_that_each_time_the_code_was_used,_it_changed.__The_wiring_from_the_letter_pressed,_to_the_cipher_value,_was_set_to_a_wheel.__The_wheel_was_on_a_rotor_that_rotated_after_each_cipher.___This_enabled_26_possibilities_to_be_used.__By_adding_more_wheels_and_rotors,_additional_possibilities_occurred._This_related_to_math_because_you_have_determine_how_many_codes_are_possible_by_using_permutations.

Question 4 (of 7)

 



Cryptography : QR Challenge

https://www.classtools.net/QR/decode.php?text=In_binary_code_the_characters_1_and_0_are_only_used._These_two_characters_are_basically_yes_and_no._8_digits_represent_every_letter_or_number._Gottfried_Leibniz_first_invented_the_binary_number_system_back_around_1679._They_are_important_because_they_allow_computers_to_and_electronics_to_read_barcodes_and_the_codes_in_the_systems._This_is_related_to_math_and_technology_because_binary_codes_are_used_with_computers_and_scanners_to_read_messages_and_codes_given_off_by_the_system._It's_related_to_math_because_if_you_use_2^n_then_you_can_figure_out_some_of_the_ways_to_make_the_code.

Question 5 (of 7)

 



Cryptography : QR Challenge

https://www.classtools.net/QR/decode.php?text=Younger_children_tend_to_ask_you_many_questions_such_as_“What_is_this?”_or_“How_does_this_work?”_As_a_person_with_knowledge_you_may_find_it_annoying_to_answer_these_questions_that_have_simple_solutions.__But_what_happens_when_you_don’t_know_the_answer,_who_do_you_turn_to?_I_know_you_see_those_strips_of_dark_and_light_lines_on_your_favorite_bag_of_chips._You_ask_yourself_“What_are_these_for?”_Well_with_the_help_of_my_wonderful_teacher_Mrs._AJ_I_am_informed_to_tell_you_the_intention_of_bar_codes._A_bar_code_(often_seen_as_a_single_word,_barcode)_is_the_small_image_of_lines_(bars)_and_spaces_that_is_affixed_to_retail_store_items,_identification_cards,_and_postal_mail_to_identify_a_particular_product_number,_person,_or_location.._(according_to_an_online_source).They_are_read_with_a_barcode_reader._The_reader_uses_laser_beams_to_translate_digital_data._Barcode_readers_can_be_found_in_many_stores_such_as_Walgreens_or_Wal-Mart.

Question 6 (of 7)

 



Cryptography : QR Challenge

https://www.classtools.net/QR/decode.php?text=The_first_barcodes_were_used_at_a_supermarket_in_Troy,_OH,_in_1974,_and_the_scanners_that_read_the_barcode_were_considered_large,_loud,_and_clumsy._The_very_first_item_scanned_was_a_pack_of_Wrigley's_Juicy_Fruit_chewing_gum._Because_computers_cannot_read_barcodes,_they_require_an_adapter_called_a_"Barcode_Reader"_kit_to_scan_products._The_kit_usually_consists_of_a_scanner,_a_decoder,_and_a_cable_that_connects_to_a_computer,_cash_register,_or_other_computer_embedded_product._The_scanner_"reads"_the_barcodes_--_looking_at_both_the_black_lines_and_the_size_and_spacing_of_blank_space_between_bars._The_decoder_checks_the_last_number,_and_transmits_the_corresponding_information_about_the_item_to_the_computer_in_text_format._Because_computers_cannot_read_barcodes,_they_require_an_adapter_called_a_"Barcode_Reader"_kit_to_scan_products._The_kit_usually_consists_of_a_scanner,_a_decoder,_and_a_cable_that_connects_to_a_computer,_cash_register,_or_other_computer_embedded_product._The_scanner_"reads"_the_barcodes_--_looking_at_both_the_black_lines_and_the_size_and_spacing_of_blank_space_between_bars._The_decoder_checks_the_last_number,_and_transmits_the_corresponding_information_about_the_item_to_the_computer_in_text_format.Thanks_for_breaking_the_code._We_hope_you_enjoyed_our_presentations.

Question 7 (of 7)