What is a cryptographer?
Cryptography keeps data and messages secure from prying eyes by converting it into a code: a process called encryption. Using a key, the person who receives the encrypted message can decrypt it back into its original form.
A cryptographer is someone who encrypts secret and sensitive information for people and organisations using algorithms, ciphers and security systems. They’ll usually work with computers and specialised software.
Encryption was once used mostly for military purposes, but is now used to keep government, business and law enforcement secrets safe; to secure the movement of money; and to keep medical records private. It can be used to ensure communications such as your online shopping, telephone calls and emails are secure. Finance tools such as credit cards and cash point transactions are also securely encrypted, so they can only be accessed by authorised people.
There are many different jobs which use cryptography, such as: cyber security engineer, security operations centre analyst, software security officer, network security administrator, ethical hacker, web developer, or cloud security consultant.
Attributes: self-motivated, resilient, imaginative
Camp Together Cryptographer Answers
Key 5 XHNJSHJ = SCIENCE
Key 12 FQOTZAXASK = TECHNOLOGY
Key 20 YHACHYYLCHA = ENGINEERING
Key 16 CQJXI = MATHS
Key 23 AFA VLR HKLT XK LZQLMRP EXP QEOBB EBXOQP? = DID YOU KNOW AN OCTOPUS HAS THREE HEARTS?
How can I make my own codes?
A code is a system of words, letters, pictures or symbols used to represent other words (or letters, pictures, symbols, etc.). You might want to try using Lego or other building blocks to write or decode a message. An arrangement of Lego pieces substitutes for each letter of the alphabet, so you can write messages in an arrangement of bricks and nobody else will understand it, unless they also know which bricks mean what. It’s really easy to make: look at all of the bricks in your collection and decide which combinations of bricks will represent each letter. It is worth remembering that some letters in the English language are used much more often than others. So if you have loads of one particular brick, maybe use that to represent one of the common letters. The most commonly used letter is e, followed by t, then a, i, n, o, s, h and r. If you don’t have much Lego at home you could try using pictures, combinations of stickers, or beads to represent each letter. For more ideas and ways to make secret codes, WikiHow has a great set of ideas.
A code is a system of words, letters, pictures or symbols used to represent other words (or letters, pictures, symbols, etc.).
You might want to try using Lego or other building blocks to write or decode a message. An arrangement of Lego pieces substitutes for each letter of the alphabet, so you can write messages in an arrangement of bricks and nobody else will understand it, unless they also know which bricks mean what.
It’s really easy to make: look at all of the bricks in your collection and decide which combinations of bricks will represent each letter. It is worth remembering that some letters in the English language are used much more often than others. So if you have loads of one particular brick, maybe use that to represent one of the common letters. The most commonly used letter is e, followed by t, then a, i, n, o, s, h and r.
If you don’t have much Lego at home you could try using pictures, combinations of stickers, or beads to represent each letter. For more ideas and ways to make secret codes, WikiHow has a great set of ideas.
Morse code is an electronic communication system that uses just a single sound. The sound can be short (a ‘dot’), long (a ‘dash’), or silent (a space); combinations of dots, dashes and spaces are used to represent letters, punctuation, and numbers. So a long sequence of dots, dashes and spaces can make up a full message.
Morse code messages used to be transmitted and received by telegraph machines. An operator would use a mechanical key to tap in the sequence of dots and dashes to make a message, and earphones to listen to incoming messages. To have a go at sending a message in Morse code, click here.
How does a cipher disk work?
A great way to encrypt messages is to use a substitution cipher. The simplest is a Caesar cipher, where you replace each letter of the alphabet with another letter by moving the whole alphabet on by a certain number of letters. The number of letters you move the alphabet by is your key.
So: if you used the key “3”, a would become d, b would become e, c would become f… and so on.
A quick way of encoding or decoding a Caesar cypher is with a cypher wheel, like the one shown here. To encode your message, start with all the letters lined up so the inner a is below the outer a. Turn the inner wheel anti-clockwise (to the left), by the number of letters you want as your key. Remember what your key is!
Now for each letter of the message you want to encrypt, find it on the outer wheel and write down the corresponding letter on the inner wheel.
To decode your message, your friend will need to know the key. Using their code wheel, they can then start by lining up the letters (so the inner a is below the outer a), and turn their wheel anti-clockwise by the number of letters given by the key. Then they can match each letter of the encrypted message on the inner wheel, to the plain text on the outer wheel, letter by letter.
Now you can send messages that are written in cipher and other people can’t read them!
How safe is my cipher?
In a simple Caesar cypher there are only 25 possible keys, so a decoder can try each possible combination of letters and see if it works. That might sound like a challenge, but even doing it by hand doesn’t take all that long. A computer program could unravel the code in a fraction of a second. So a Caesar cypher isn’t very secure.
That’s because each letter is shifted by the same amount, so there are very few combinations. Suppose you shuffled the letters completely – that would be a much more complex cypher code.
One way to crack ciphers is by using frequency analysis. Remember that some letters appear more often than others? You can use that to help read an encrypted message. The method goes someting like this:
- Count how often each letter appears in the encrypted message.
- The most-used letter probably represents ‘e’, so guess that’s the case in the cypher you’re trying to break.
- Now look for three-letter words which end with the letter representing ‘e’. The most common word is likely to be ’the’… so you have the letters ’t’, ‘h’ and ‘e.’ Fill in all the other places where those letters appear.
- Remember that the most common letters in English are, in order, e, t, a, i, o, s, h, r; you may be able to start working out some other letters…
- …pretty soon, you’ll be able to guess whole words.
Try writing a paragraph with your cipher and then getting your friends to crack it using frequency analysis. It takes time, but it’s very satisfying
If you and your friends use your cipher regularly to pass on secret messages, there is the risk is that someone will discover your key. You can help prevent this by changing the key regularly, to keep your secrets safe.
Do try this at home… computer code
Getting started with coding
Cookie and Privacy Settings
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.
If you do not want that we track your visit to our site you can disable tracking in your browser here:
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
The following cookies are also needed - You can choose if you want to allow them: