Cryptography Workshop

Rate this resource

This set of activities introduces children to cryptography techniques, showing how the use of computers can make encryption quicker and more effective. Some notable examples of the use of encryption in history are mentioned, leading to the use of calculation machines for code-making and code-breaking.

A role-play based around solving a murder case then offers clues using a range of encryption techniques such as transposition, substitution and pigeon cyphers. By exploring the limitations of manual techniques students are then introduced to using spreadsheets for encrypting and decrypting longer messages – these allow cypher rules to be programmed and therefore executed more efficiently.

More advanced code-breaking techniques, such as looking for high-frequency letters in substitution cyphers, are later covered.

The resource includes a teacher guide and presentations. Also included are several ‘clue’ worksheets as well as the answers, and several prepared spreadsheet templates used for code-breaking challenges. A ‘suspects database’ is also provided, to be used in conjunction with the clues in finding the murderer.

Digital School House is associated and fully supported by Ukie

Show health and safety information

Please be aware that resources have been published on the website in the form that they were originally supplied. This means that procedures reflect general practice and standards applicable at the time resources were produced and cannot be assumed to be acceptable today. Website users are fully responsible for ensuring that any activity, including practical work, which they carry out is in accordance with current regulations related to health and safety and that an appropriate risk assessment has been carried out.

Published by


Share this resource