SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Escape Room ELT
Live Escape Rooms
Ciphers and coded messages
graham.stanley@gmail.com https://escaperoomelt.wordpress.com
Ciphers and
coded messages
What is a cipher?
What is the difference
between cipher and
code?
Can you list some of
the different types of
cipher?
Have you ever used
ciphers for language
learning?
Codes vs Ciphers
A code operates on
semantics, meaning. A
code requires a codebook
where words or phrases
are assigned other
meanings.
A cipher does not involve
meaning – it operates on
syntax, symbols. Ciphers
are usually performed on
individual or small chunks
of letters.
https://www.khanacademy.org/computing/computer-
science/cryptography/ciphers/a/ciphers-vs-codes
There is an art to sending coded messages
and there is also long tradition of using coded messages in
ELT. Here are some ideas of how you can use them in class:
Secret Code game
Teaching languages with ciphers
Secret Code
Secret Messages
Cryptography as a teaching tool
Cryptology for Kids
Codes and Ciphers
https://wordpress.com/page/escaperoomelt.wordpress.com/109
#jackboom
and
the bomb
An example ELT Escape Room
cipher activity for Advanced learners
The city is being terrorised by
#jackboom, a deranged explosives
expert who delights in setting
booby-trapped bombs.
You are the city’s crack anti-
explosive team and are called by
the police to the 42nd floor of a
high-rise building to defuse the
latest bomb that #jackboom has
planted.
A red and blue wire leads from the mechanism to the bomb. The
countdown has not started yet, but the clock shows less than a
minute is left before it the bomb will explode.
The mechanism on the bomb that #jackboom planted looks simple
enough. There is a timer – it looks like when it reaches 00:00:00 the
bomb will explode.
On the back of the bomb there is a keypad where you can input
numbers and then press ‘Enter’. The keypad won’t accept letters.
Next to the keypad are four symbols and spaces below where the
numbers appear when you enter them. Do you recognise all of the
symbols?
#jackboom
#jackboom
#jackboom
Suddenly the count
down starts and the
picture disappears.
You have less than a
minute to go before
the bomb explodes.
What number do
you key in?
#jackboom
and
the bomb
Suggested follow-up activities:
• Role-play debrief to pólice chief
• Write a report of the incident
• You capture #jackboom – interrogate
him
Escape Room ELT
Live Escape Rooms
Ciphers and coded messages
graham.stanley@gmail.com https://escaperoomelt.wordpress.com

Weitere ähnliche Inhalte

Ähnlich wie TESOL EVO 2020 Escape the Classroom! - Using Ciphers

enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authenticationahmad amiruddin
 
CryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptxCryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptxBhavikaGianey
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoJohn Bambenek
 
John Romero - The Early Days of Id Software: Programming Principles - Codemot...
John Romero - The Early Days of Id Software: Programming Principles - Codemot...John Romero - The Early Days of Id Software: Programming Principles - Codemot...
John Romero - The Early Days of Id Software: Programming Principles - Codemot...Codemotion
 
Part Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digitsPart Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digitsjohnhwoodsslideshare
 
A quick rant about Web App crypto
A quick rant about Web App cryptoA quick rant about Web App crypto
A quick rant about Web App cryptoChris John Riley
 
Weaponizing data science for social engineering: automate E2E spear phishing ...
Weaponizing data science for social engineering: automate E2E spear phishing ...Weaponizing data science for social engineering: automate E2E spear phishing ...
Weaponizing data science for social engineering: automate E2E spear phishing ...Priyanka Aash
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxImXaib
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Paul Yang
 
Codemotion ES 2014: Love Always Takes Care & Humility
Codemotion ES 2014: Love Always Takes Care & HumilityCodemotion ES 2014: Love Always Takes Care & Humility
Codemotion ES 2014: Love Always Takes Care & HumilityChema Alonso
 
hacking into computer systems - a beginners guid
hacking into computer systems - a beginners guidhacking into computer systems - a beginners guid
hacking into computer systems - a beginners guidChandra Pr. Singh
 
Cryptography 101
Cryptography 101 Cryptography 101
Cryptography 101 Andy Fisher
 
BSidesDC 2015 CryptKids Crypto Challenge
BSidesDC 2015 CryptKids Crypto ChallengeBSidesDC 2015 CryptKids Crypto Challenge
BSidesDC 2015 CryptKids Crypto ChallengeAndrew Shumate
 
Secure All Teh Things - Add 2 factor authentication to your own CFML projects
Secure All Teh Things - Add 2 factor authentication to your own CFML projectsSecure All Teh Things - Add 2 factor authentication to your own CFML projects
Secure All Teh Things - Add 2 factor authentication to your own CFML projectsRob Dudley
 

Ähnlich wie TESOL EVO 2020 Escape the Classroom! - Using Ciphers (19)

Brute force attack
Brute force attackBrute force attack
Brute force attack
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authentication
 
CryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptxCryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptx
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
John Romero - The Early Days of Id Software: Programming Principles - Codemot...
John Romero - The Early Days of Id Software: Programming Principles - Codemot...John Romero - The Early Days of Id Software: Programming Principles - Codemot...
John Romero - The Early Days of Id Software: Programming Principles - Codemot...
 
Part Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digitsPart Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digits
 
A quick rant about Web App crypto
A quick rant about Web App cryptoA quick rant about Web App crypto
A quick rant about Web App crypto
 
Weaponizing data science for social engineering: automate E2E spear phishing ...
Weaponizing data science for social engineering: automate E2E spear phishing ...Weaponizing data science for social engineering: automate E2E spear phishing ...
Weaponizing data science for social engineering: automate E2E spear phishing ...
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 
Otp
OtpOtp
Otp
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
 
Codemotion ES 2014: Love Always Takes Care & Humility
Codemotion ES 2014: Love Always Takes Care & HumilityCodemotion ES 2014: Love Always Takes Care & Humility
Codemotion ES 2014: Love Always Takes Care & Humility
 
hacking into computer systems - a beginners guid
hacking into computer systems - a beginners guidhacking into computer systems - a beginners guid
hacking into computer systems - a beginners guid
 
Cryptography 101
Cryptography 101 Cryptography 101
Cryptography 101
 
BSidesDC 2015 CryptKids Crypto Challenge
BSidesDC 2015 CryptKids Crypto ChallengeBSidesDC 2015 CryptKids Crypto Challenge
BSidesDC 2015 CryptKids Crypto Challenge
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
 
Secure All Teh Things - Add 2 factor authentication to your own CFML projects
Secure All Teh Things - Add 2 factor authentication to your own CFML projectsSecure All Teh Things - Add 2 factor authentication to your own CFML projects
Secure All Teh Things - Add 2 factor authentication to your own CFML projects
 
Gamecodization
GamecodizationGamecodization
Gamecodization
 
Hacking
HackingHacking
Hacking
 

Mehr von Graham Stanley

FIID Remote Teaching (May 2022)
FIID Remote Teaching (May 2022)FIID Remote Teaching (May 2022)
FIID Remote Teaching (May 2022)Graham Stanley
 
Supporting language learning with technology
Supporting language learning with technologySupporting language learning with technology
Supporting language learning with technologyGraham Stanley
 
Designing escape room games for ELT
Designing escape room games for ELTDesigning escape room games for ELT
Designing escape room games for ELTGraham Stanley
 
New Ways of Teaching, New Ways of CPD
New Ways of Teaching, New Ways of CPDNew Ways of Teaching, New Ways of CPD
New Ways of Teaching, New Ways of CPDGraham Stanley
 
Designing ELT Escape Room Games - IATEFL YLTSIG Web Conference
Designing ELT Escape Room Games - IATEFL YLTSIG Web ConferenceDesigning ELT Escape Room Games - IATEFL YLTSIG Web Conference
Designing ELT Escape Room Games - IATEFL YLTSIG Web ConferenceGraham Stanley
 
ELT Escape Room Game Design - Trendy English
ELT Escape Room Game Design - Trendy EnglishELT Escape Room Game Design - Trendy English
ELT Escape Room Game Design - Trendy EnglishGraham Stanley
 
Using Digital Technologies: Escape Room Games
Using Digital Technologies: Escape Room GamesUsing Digital Technologies: Escape Room Games
Using Digital Technologies: Escape Room GamesGraham Stanley
 
Designing escape room games for ELT
Designing escape room games for ELTDesigning escape room games for ELT
Designing escape room games for ELTGraham Stanley
 
Online Interactive Storytelling Games
Online Interactive Storytelling Games Online Interactive Storytelling Games
Online Interactive Storytelling Games Graham Stanley
 
Interactive storytelling games
Interactive storytelling games Interactive storytelling games
Interactive storytelling games Graham Stanley
 
Interactive storytelling games (July 2020)
Interactive storytelling games (July 2020)Interactive storytelling games (July 2020)
Interactive storytelling games (July 2020)Graham Stanley
 
Get the treasure and escape the island
Get the treasure and escape the islandGet the treasure and escape the island
Get the treasure and escape the islandGraham Stanley
 
Escape the dinner party
Escape the dinner partyEscape the dinner party
Escape the dinner partyGraham Stanley
 
Escape Rooms for Language Learning: VRT
Escape Rooms for Language Learning: VRTEscape Rooms for Language Learning: VRT
Escape Rooms for Language Learning: VRTGraham Stanley
 
Live listening Escape Room games
Live listening Escape Room gamesLive listening Escape Room games
Live listening Escape Room gamesGraham Stanley
 
Remote Teaching - Engaging students when teaching online
Remote Teaching -  Engaging students when teaching onlineRemote Teaching -  Engaging students when teaching online
Remote Teaching - Engaging students when teaching onlineGraham Stanley
 
Remote Teaching because of school closures
Remote Teaching because of school closuresRemote Teaching because of school closures
Remote Teaching because of school closuresGraham Stanley
 
Teaching live online (Remote Teaching)
Teaching live online (Remote Teaching)Teaching live online (Remote Teaching)
Teaching live online (Remote Teaching)Graham Stanley
 

Mehr von Graham Stanley (20)

FIID Remote Teaching (May 2022)
FIID Remote Teaching (May 2022)FIID Remote Teaching (May 2022)
FIID Remote Teaching (May 2022)
 
Supporting language learning with technology
Supporting language learning with technologySupporting language learning with technology
Supporting language learning with technology
 
Designing escape room games for ELT
Designing escape room games for ELTDesigning escape room games for ELT
Designing escape room games for ELT
 
New Ways of Teaching, New Ways of CPD
New Ways of Teaching, New Ways of CPDNew Ways of Teaching, New Ways of CPD
New Ways of Teaching, New Ways of CPD
 
IATEFL CPD 3.0
IATEFL CPD 3.0IATEFL CPD 3.0
IATEFL CPD 3.0
 
Designing ELT Escape Room Games - IATEFL YLTSIG Web Conference
Designing ELT Escape Room Games - IATEFL YLTSIG Web ConferenceDesigning ELT Escape Room Games - IATEFL YLTSIG Web Conference
Designing ELT Escape Room Games - IATEFL YLTSIG Web Conference
 
ELT Escape Room Game Design - Trendy English
ELT Escape Room Game Design - Trendy EnglishELT Escape Room Game Design - Trendy English
ELT Escape Room Game Design - Trendy English
 
Using Digital Technologies: Escape Room Games
Using Digital Technologies: Escape Room GamesUsing Digital Technologies: Escape Room Games
Using Digital Technologies: Escape Room Games
 
Designing escape room games for ELT
Designing escape room games for ELTDesigning escape room games for ELT
Designing escape room games for ELT
 
Online Interactive Storytelling Games
Online Interactive Storytelling Games Online Interactive Storytelling Games
Online Interactive Storytelling Games
 
Interactive storytelling games
Interactive storytelling games Interactive storytelling games
Interactive storytelling games
 
Interactive storytelling games (July 2020)
Interactive storytelling games (July 2020)Interactive storytelling games (July 2020)
Interactive storytelling games (July 2020)
 
Get the treasure and escape the island
Get the treasure and escape the islandGet the treasure and escape the island
Get the treasure and escape the island
 
Escape the dinner party
Escape the dinner partyEscape the dinner party
Escape the dinner party
 
Escape Rooms for Language Learning: VRT
Escape Rooms for Language Learning: VRTEscape Rooms for Language Learning: VRT
Escape Rooms for Language Learning: VRT
 
Live listening Escape Room games
Live listening Escape Room gamesLive listening Escape Room games
Live listening Escape Room games
 
Remote Teaching - Engaging students when teaching online
Remote Teaching -  Engaging students when teaching onlineRemote Teaching -  Engaging students when teaching online
Remote Teaching - Engaging students when teaching online
 
Remote Teaching because of school closures
Remote Teaching because of school closuresRemote Teaching because of school closures
Remote Teaching because of school closures
 
Remote Teaching
Remote TeachingRemote Teaching
Remote Teaching
 
Teaching live online (Remote Teaching)
Teaching live online (Remote Teaching)Teaching live online (Remote Teaching)
Teaching live online (Remote Teaching)
 

Kürzlich hochgeladen

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Kürzlich hochgeladen (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

TESOL EVO 2020 Escape the Classroom! - Using Ciphers

  • 1. Escape Room ELT Live Escape Rooms Ciphers and coded messages graham.stanley@gmail.com https://escaperoomelt.wordpress.com
  • 2. Ciphers and coded messages What is a cipher? What is the difference between cipher and code? Can you list some of the different types of cipher? Have you ever used ciphers for language learning?
  • 3. Codes vs Ciphers A code operates on semantics, meaning. A code requires a codebook where words or phrases are assigned other meanings. A cipher does not involve meaning – it operates on syntax, symbols. Ciphers are usually performed on individual or small chunks of letters. https://www.khanacademy.org/computing/computer- science/cryptography/ciphers/a/ciphers-vs-codes
  • 4. There is an art to sending coded messages and there is also long tradition of using coded messages in ELT. Here are some ideas of how you can use them in class: Secret Code game Teaching languages with ciphers Secret Code Secret Messages Cryptography as a teaching tool Cryptology for Kids Codes and Ciphers https://wordpress.com/page/escaperoomelt.wordpress.com/109
  • 5. #jackboom and the bomb An example ELT Escape Room cipher activity for Advanced learners
  • 6. The city is being terrorised by #jackboom, a deranged explosives expert who delights in setting booby-trapped bombs. You are the city’s crack anti- explosive team and are called by the police to the 42nd floor of a high-rise building to defuse the latest bomb that #jackboom has planted.
  • 7. A red and blue wire leads from the mechanism to the bomb. The countdown has not started yet, but the clock shows less than a minute is left before it the bomb will explode. The mechanism on the bomb that #jackboom planted looks simple enough. There is a timer – it looks like when it reaches 00:00:00 the bomb will explode.
  • 8. On the back of the bomb there is a keypad where you can input numbers and then press ‘Enter’. The keypad won’t accept letters. Next to the keypad are four symbols and spaces below where the numbers appear when you enter them. Do you recognise all of the symbols?
  • 12. Suddenly the count down starts and the picture disappears. You have less than a minute to go before the bomb explodes. What number do you key in?
  • 13.
  • 14. #jackboom and the bomb Suggested follow-up activities: • Role-play debrief to pólice chief • Write a report of the incident • You capture #jackboom – interrogate him
  • 15. Escape Room ELT Live Escape Rooms Ciphers and coded messages graham.stanley@gmail.com https://escaperoomelt.wordpress.com

Hinweis der Redaktion

  1. In this video, we’ll look at ciphers and coded messages. We will look at what to consider when using codes/ciphers in Escape Rooms when the objective of the activity is for learning or practising English.
  2. Let’s start by looking at some definitions-¿¿ What is a cipher? What is the difference between cipher and code? Can you list some of the different types of cipher? Have you ever used ciphers for language learning? You might want to stop the video here and take some time to relfect on this. If you are watching alone, write some notes in answer to the question. If you are with someone, discuss the questions.
  3. Codes vs ciphers
  4. I am not going to go over the codes and cipher activities listed here – in this blog post, but rather focus on an ELT Escape Room activity that I designed that makes use of a cipher
  5. Scenario: (for advanced learners) Let’s look at an example for Advanced learners of using a cipher. Although as it has been presented, this activity is designed for advanced learners, it can be adapted for lower levels by simplifying the language.
  6. Scenario: The city is being terrorised by #jackboom, a deranged explosives expert who delights in setting booby-trapped bombs. You are the city’s crack anti-explosive team and are called by the police to the 42nd floor of a high-rise building to defuse the latest bomb that #jackboom has planted.
  7. The mechanism on the bomb that #jackboom planted looks simple enough. There is a timer – it looks like when it reaches 00:00:00 the bomb will explode. A red and blue wire leads from the mechanism to the bomb. The countdown has not started yet, but the clock shows less than a minute is left before it the bomb will explode.
  8. On the back of the bomb there is a keypad where you can input numbers and then press ‘Enter’. The keypad won’t accept letters. Next to the keypad are four symbols and spaces below where the numbers appear when you enter them.
  9. As you look at the bomb, news comes in that #jackboom has sent via email an image of a strange code to the police, and you think it may be a clue to defusing the bomb. Surely this shows you the numbers you need to defuse the bomb? Broccoli – 1 / Milk = 7 / Hamburger = 4 / Green pepper = 8
  10. Scenario: (for advanced learners) Suddenly, the image disappears. Can you remember what food was related to which number? You think it may be important. Work together to share what you remember
  11. You approach the bomb, confident that you know the code to defuse it, but then just as you are about to key in the number, you receive a picture of #jackboom wearing a cryptic t-shirt.
  12. 1 minute explosión (flash video) Suddenly the count down starts and the picture disappears. You have les than a minute to go before the bomb explodes. What number do you key in?
  13. Transposing the hamburger and broccoli numbers, the correct code is 4718 Broccoli – 4 (1) / Milk = 7 / Hamburger = 1 (4) / Green pepper = 8
  14. Suggested follow-up activities: Role-play debrief to pólice chief Write a report of the incident You capture #jackboom – interrogate him
  15. In this video, we’ll look at ciphers and coded messages. We will look at what to consider when using codes/ciphers in Escape Rooms when the objective of the activity is for learning or practising English.