Exercise 8: Encryption

Overview

After the introduction to message transmission in Model 7, this model deals with the protection of transmission by encryption. Two simple encryption methods introduce the functionality of a substitution cipher and the concept of key-controlled encryption.

Topics

How can data transmission be protected from „eavesdroppers“? How does encryption work? What is a „key“?

 

Learning objective

  • Encryption as protection against „eavesdropping"
  • Principle of „shared secret”
  • Principle of a key-based cipher
  • Programming an encrypted transmission
  • Determining of the key space” of a cipher

Time required

The „Encryption" model is developed using two separate building insructions for the Receiver model and the Transmitter model. Please pay attention to both tasks and let the teams build one model each.

Didactic material

cd-green-78ddcfbddb-62jt7