In this paper I describe an activity based on a 1903 Sherlock Holmes murder mystery, in which a substitution cipher is used to encrypt secret messages. The story provides a fun and interesting way to talk about frequency analysis, and can be used as a segue into mathematical constructs such as modular arithmetic and computation. The activity is accessible to ages twelve and above, and has been successfully used in mathematics outreach and popularization efforts as well as in general education and mathematics courses
Cryptology is a very old science and until a few decades it was a science for government, military, ...
... As I trudged up the hall steps of 221 B Baker Street, my attention was drawn to the door of our ...
This paper will present a selective overview of some uses of mathematics in fiction, expanding and u...
Philosophiae Doctor - PhDThis study in an extension of a Master's study, entitled Realistic Mathemat...
Lecture NotesFor an array of activities such as, for example, PIN numbers used in automated transact...
Sir Arthur Conan Doyle’s Sherlock Holmes stories involve a hermeneutic game in which Holmes attempts...
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Ciphers have been used throughout history to keep information secret [3]. Text ciphers work by apply...
The purpose of this thesis is to give a brief history of cryptology and to show how to incorporate c...
Cryptology is a very old science and until a few decades it was a science for government, military, ...
Mathematician Lester Hill developed the Hill Cipher, the first mathematical encryption method ever d...
The great dowager of society paced nervously back and forth across the vast expanse of carpet that c...
Project Gutenberg, begun by Michael Hart in 1971, is an attempt to make public do-main electronic te...
From as early as 400 BC, civilizations have been using cryptography; the art of creating codes. Ofte...
Cryptology is a very old science and until a few decades it was a science for government, military, ...
... As I trudged up the hall steps of 221 B Baker Street, my attention was drawn to the door of our ...
This paper will present a selective overview of some uses of mathematics in fiction, expanding and u...
Philosophiae Doctor - PhDThis study in an extension of a Master's study, entitled Realistic Mathemat...
Lecture NotesFor an array of activities such as, for example, PIN numbers used in automated transact...
Sir Arthur Conan Doyle’s Sherlock Holmes stories involve a hermeneutic game in which Holmes attempts...
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Ciphers have been used throughout history to keep information secret [3]. Text ciphers work by apply...
The purpose of this thesis is to give a brief history of cryptology and to show how to incorporate c...
Cryptology is a very old science and until a few decades it was a science for government, military, ...
Mathematician Lester Hill developed the Hill Cipher, the first mathematical encryption method ever d...
The great dowager of society paced nervously back and forth across the vast expanse of carpet that c...
Project Gutenberg, begun by Michael Hart in 1971, is an attempt to make public do-main electronic te...
From as early as 400 BC, civilizations have been using cryptography; the art of creating codes. Ofte...
Cryptology is a very old science and until a few decades it was a science for government, military, ...
... As I trudged up the hall steps of 221 B Baker Street, my attention was drawn to the door of our ...
This paper will present a selective overview of some uses of mathematics in fiction, expanding and u...