After the introduction to message transmission in Model 7, this model deals with the protection of transmission by encryption. Two simple encryption methods introduce the functionality of a substitution cipher and the concept of key-controlled encryption.
How can data transmission be protected from „eavesdroppers“? How does encryption work? What is a „key“?
The „Encryption" model is developed using two separate building insructions for the Receiver model and the Transmitter model. Please pay attention to both tasks and let the teams build one model each.