SlideShare una empresa de Scribd logo
1 de 15
Escape Room ELT
Live Escape Rooms
Ciphers and coded messages
graham.stanley@gmail.com https://escaperoomelt.wordpress.com
Ciphers and
coded messages
What is a cipher?
What is the difference
between cipher and
code?
Can you list some of
the different types of
cipher?
Have you ever used
ciphers for language
learning?
Codes vs Ciphers
A code operates on
semantics, meaning. A
code requires a codebook
where words or phrases
are assigned other
meanings.
A cipher does not involve
meaning – it operates on
syntax, symbols. Ciphers
are usually performed on
individual or small chunks
of letters.
https://www.khanacademy.org/computing/computer-
science/cryptography/ciphers/a/ciphers-vs-codes
There is an art to sending coded messages
and there is also long tradition of using coded messages in
ELT. Here are some ideas of how you can use them in class:
Secret Code game
Teaching languages with ciphers
Secret Code
Secret Messages
Cryptography as a teaching tool
Cryptology for Kids
Codes and Ciphers
https://wordpress.com/page/escaperoomelt.wordpress.com/109
#jackboom
and
the bomb
An example ELT Escape Room
cipher activity for Advanced learners
The city is being terrorised by
#jackboom, a deranged explosives
expert who delights in setting
booby-trapped bombs.
You are the city’s crack anti-
explosive team and are called by
the police to the 42nd floor of a
high-rise building to defuse the
latest bomb that #jackboom has
planted.
A red and blue wire leads from the mechanism to the bomb. The
countdown has not started yet, but the clock shows less than a
minute is left before it the bomb will explode.
The mechanism on the bomb that #jackboom planted looks simple
enough. There is a timer – it looks like when it reaches 00:00:00 the
bomb will explode.
On the back of the bomb there is a keypad where you can input
numbers and then press ‘Enter’. The keypad won’t accept letters.
Next to the keypad are four symbols and spaces below where the
numbers appear when you enter them. Do you recognise all of the
symbols?
#jackboom
#jackboom
#jackboom
Suddenly the count
down starts and the
picture disappears.
You have less than a
minute to go before
the bomb explodes.
What number do
you key in?
#jackboom
and
the bomb
Suggested follow-up activities:
• Role-play debrief to pólice chief
• Write a report of the incident
• You capture #jackboom – interrogate
him
Escape Room ELT
Live Escape Rooms
Ciphers and coded messages
graham.stanley@gmail.com https://escaperoomelt.wordpress.com

Más contenido relacionado

Similar a TESOL EVO 2020 Escape the Classroom! - Using Ciphers

enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authenticationahmad amiruddin
 
CryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptxCryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptxBhavikaGianey
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoJohn Bambenek
 
John Romero - The Early Days of Id Software: Programming Principles - Codemot...
John Romero - The Early Days of Id Software: Programming Principles - Codemot...John Romero - The Early Days of Id Software: Programming Principles - Codemot...
John Romero - The Early Days of Id Software: Programming Principles - Codemot...Codemotion
 
Part Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digitsPart Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digitsjohnhwoodsslideshare
 
A quick rant about Web App crypto
A quick rant about Web App cryptoA quick rant about Web App crypto
A quick rant about Web App cryptoChris John Riley
 
Weaponizing data science for social engineering: automate E2E spear phishing ...
Weaponizing data science for social engineering: automate E2E spear phishing ...Weaponizing data science for social engineering: automate E2E spear phishing ...
Weaponizing data science for social engineering: automate E2E spear phishing ...Priyanka Aash
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxImXaib
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Paul Yang
 
Codemotion ES 2014: Love Always Takes Care & Humility
Codemotion ES 2014: Love Always Takes Care & HumilityCodemotion ES 2014: Love Always Takes Care & Humility
Codemotion ES 2014: Love Always Takes Care & HumilityChema Alonso
 
hacking into computer systems - a beginners guid
hacking into computer systems - a beginners guidhacking into computer systems - a beginners guid
hacking into computer systems - a beginners guidChandra Pr. Singh
 
Cryptography 101
Cryptography 101 Cryptography 101
Cryptography 101 Andy Fisher
 
BSidesDC 2015 CryptKids Crypto Challenge
BSidesDC 2015 CryptKids Crypto ChallengeBSidesDC 2015 CryptKids Crypto Challenge
BSidesDC 2015 CryptKids Crypto ChallengeAndrew Shumate
 
Secure All Teh Things - Add 2 factor authentication to your own CFML projects
Secure All Teh Things - Add 2 factor authentication to your own CFML projectsSecure All Teh Things - Add 2 factor authentication to your own CFML projects
Secure All Teh Things - Add 2 factor authentication to your own CFML projectsRob Dudley
 

Similar a TESOL EVO 2020 Escape the Classroom! - Using Ciphers (19)

Brute force attack
Brute force attackBrute force attack
Brute force attack
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authentication
 
CryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptxCryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptx
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
John Romero - The Early Days of Id Software: Programming Principles - Codemot...
John Romero - The Early Days of Id Software: Programming Principles - Codemot...John Romero - The Early Days of Id Software: Programming Principles - Codemot...
John Romero - The Early Days of Id Software: Programming Principles - Codemot...
 
Part Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digitsPart Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digits
 
A quick rant about Web App crypto
A quick rant about Web App cryptoA quick rant about Web App crypto
A quick rant about Web App crypto
 
Weaponizing data science for social engineering: automate E2E spear phishing ...
Weaponizing data science for social engineering: automate E2E spear phishing ...Weaponizing data science for social engineering: automate E2E spear phishing ...
Weaponizing data science for social engineering: automate E2E spear phishing ...
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 
Otp
OtpOtp
Otp
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
 
Codemotion ES 2014: Love Always Takes Care & Humility
Codemotion ES 2014: Love Always Takes Care & HumilityCodemotion ES 2014: Love Always Takes Care & Humility
Codemotion ES 2014: Love Always Takes Care & Humility
 
hacking into computer systems - a beginners guid
hacking into computer systems - a beginners guidhacking into computer systems - a beginners guid
hacking into computer systems - a beginners guid
 
Cryptography 101
Cryptography 101 Cryptography 101
Cryptography 101
 
BSidesDC 2015 CryptKids Crypto Challenge
BSidesDC 2015 CryptKids Crypto ChallengeBSidesDC 2015 CryptKids Crypto Challenge
BSidesDC 2015 CryptKids Crypto Challenge
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
 
Secure All Teh Things - Add 2 factor authentication to your own CFML projects
Secure All Teh Things - Add 2 factor authentication to your own CFML projectsSecure All Teh Things - Add 2 factor authentication to your own CFML projects
Secure All Teh Things - Add 2 factor authentication to your own CFML projects
 
Gamecodization
GamecodizationGamecodization
Gamecodization
 
Hacking
HackingHacking
Hacking
 

Más de Graham Stanley

FIID Remote Teaching (May 2022)
FIID Remote Teaching (May 2022)FIID Remote Teaching (May 2022)
FIID Remote Teaching (May 2022)Graham Stanley
 
Supporting language learning with technology
Supporting language learning with technologySupporting language learning with technology
Supporting language learning with technologyGraham Stanley
 
Designing escape room games for ELT
Designing escape room games for ELTDesigning escape room games for ELT
Designing escape room games for ELTGraham Stanley
 
New Ways of Teaching, New Ways of CPD
New Ways of Teaching, New Ways of CPDNew Ways of Teaching, New Ways of CPD
New Ways of Teaching, New Ways of CPDGraham Stanley
 
Designing ELT Escape Room Games - IATEFL YLTSIG Web Conference
Designing ELT Escape Room Games - IATEFL YLTSIG Web ConferenceDesigning ELT Escape Room Games - IATEFL YLTSIG Web Conference
Designing ELT Escape Room Games - IATEFL YLTSIG Web ConferenceGraham Stanley
 
ELT Escape Room Game Design - Trendy English
ELT Escape Room Game Design - Trendy EnglishELT Escape Room Game Design - Trendy English
ELT Escape Room Game Design - Trendy EnglishGraham Stanley
 
Using Digital Technologies: Escape Room Games
Using Digital Technologies: Escape Room GamesUsing Digital Technologies: Escape Room Games
Using Digital Technologies: Escape Room GamesGraham Stanley
 
Designing escape room games for ELT
Designing escape room games for ELTDesigning escape room games for ELT
Designing escape room games for ELTGraham Stanley
 
Online Interactive Storytelling Games
Online Interactive Storytelling Games Online Interactive Storytelling Games
Online Interactive Storytelling Games Graham Stanley
 
Interactive storytelling games
Interactive storytelling games Interactive storytelling games
Interactive storytelling games Graham Stanley
 
Interactive storytelling games (July 2020)
Interactive storytelling games (July 2020)Interactive storytelling games (July 2020)
Interactive storytelling games (July 2020)Graham Stanley
 
Get the treasure and escape the island
Get the treasure and escape the islandGet the treasure and escape the island
Get the treasure and escape the islandGraham Stanley
 
Escape the dinner party
Escape the dinner partyEscape the dinner party
Escape the dinner partyGraham Stanley
 
Escape Rooms for Language Learning: VRT
Escape Rooms for Language Learning: VRTEscape Rooms for Language Learning: VRT
Escape Rooms for Language Learning: VRTGraham Stanley
 
Live listening Escape Room games
Live listening Escape Room gamesLive listening Escape Room games
Live listening Escape Room gamesGraham Stanley
 
Remote Teaching - Engaging students when teaching online
Remote Teaching -  Engaging students when teaching onlineRemote Teaching -  Engaging students when teaching online
Remote Teaching - Engaging students when teaching onlineGraham Stanley
 
Remote Teaching because of school closures
Remote Teaching because of school closuresRemote Teaching because of school closures
Remote Teaching because of school closuresGraham Stanley
 
Teaching live online (Remote Teaching)
Teaching live online (Remote Teaching)Teaching live online (Remote Teaching)
Teaching live online (Remote Teaching)Graham Stanley
 

Más de Graham Stanley (20)

FIID Remote Teaching (May 2022)
FIID Remote Teaching (May 2022)FIID Remote Teaching (May 2022)
FIID Remote Teaching (May 2022)
 
Supporting language learning with technology
Supporting language learning with technologySupporting language learning with technology
Supporting language learning with technology
 
Designing escape room games for ELT
Designing escape room games for ELTDesigning escape room games for ELT
Designing escape room games for ELT
 
New Ways of Teaching, New Ways of CPD
New Ways of Teaching, New Ways of CPDNew Ways of Teaching, New Ways of CPD
New Ways of Teaching, New Ways of CPD
 
IATEFL CPD 3.0
IATEFL CPD 3.0IATEFL CPD 3.0
IATEFL CPD 3.0
 
Designing ELT Escape Room Games - IATEFL YLTSIG Web Conference
Designing ELT Escape Room Games - IATEFL YLTSIG Web ConferenceDesigning ELT Escape Room Games - IATEFL YLTSIG Web Conference
Designing ELT Escape Room Games - IATEFL YLTSIG Web Conference
 
ELT Escape Room Game Design - Trendy English
ELT Escape Room Game Design - Trendy EnglishELT Escape Room Game Design - Trendy English
ELT Escape Room Game Design - Trendy English
 
Using Digital Technologies: Escape Room Games
Using Digital Technologies: Escape Room GamesUsing Digital Technologies: Escape Room Games
Using Digital Technologies: Escape Room Games
 
Designing escape room games for ELT
Designing escape room games for ELTDesigning escape room games for ELT
Designing escape room games for ELT
 
Online Interactive Storytelling Games
Online Interactive Storytelling Games Online Interactive Storytelling Games
Online Interactive Storytelling Games
 
Interactive storytelling games
Interactive storytelling games Interactive storytelling games
Interactive storytelling games
 
Interactive storytelling games (July 2020)
Interactive storytelling games (July 2020)Interactive storytelling games (July 2020)
Interactive storytelling games (July 2020)
 
Get the treasure and escape the island
Get the treasure and escape the islandGet the treasure and escape the island
Get the treasure and escape the island
 
Escape the dinner party
Escape the dinner partyEscape the dinner party
Escape the dinner party
 
Escape Rooms for Language Learning: VRT
Escape Rooms for Language Learning: VRTEscape Rooms for Language Learning: VRT
Escape Rooms for Language Learning: VRT
 
Live listening Escape Room games
Live listening Escape Room gamesLive listening Escape Room games
Live listening Escape Room games
 
Remote Teaching - Engaging students when teaching online
Remote Teaching -  Engaging students when teaching onlineRemote Teaching -  Engaging students when teaching online
Remote Teaching - Engaging students when teaching online
 
Remote Teaching because of school closures
Remote Teaching because of school closuresRemote Teaching because of school closures
Remote Teaching because of school closures
 
Remote Teaching
Remote TeachingRemote Teaching
Remote Teaching
 
Teaching live online (Remote Teaching)
Teaching live online (Remote Teaching)Teaching live online (Remote Teaching)
Teaching live online (Remote Teaching)
 

Último

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Último (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

TESOL EVO 2020 Escape the Classroom! - Using Ciphers

  • 1. Escape Room ELT Live Escape Rooms Ciphers and coded messages graham.stanley@gmail.com https://escaperoomelt.wordpress.com
  • 2. Ciphers and coded messages What is a cipher? What is the difference between cipher and code? Can you list some of the different types of cipher? Have you ever used ciphers for language learning?
  • 3. Codes vs Ciphers A code operates on semantics, meaning. A code requires a codebook where words or phrases are assigned other meanings. A cipher does not involve meaning – it operates on syntax, symbols. Ciphers are usually performed on individual or small chunks of letters. https://www.khanacademy.org/computing/computer- science/cryptography/ciphers/a/ciphers-vs-codes
  • 4. There is an art to sending coded messages and there is also long tradition of using coded messages in ELT. Here are some ideas of how you can use them in class: Secret Code game Teaching languages with ciphers Secret Code Secret Messages Cryptography as a teaching tool Cryptology for Kids Codes and Ciphers https://wordpress.com/page/escaperoomelt.wordpress.com/109
  • 5. #jackboom and the bomb An example ELT Escape Room cipher activity for Advanced learners
  • 6. The city is being terrorised by #jackboom, a deranged explosives expert who delights in setting booby-trapped bombs. You are the city’s crack anti- explosive team and are called by the police to the 42nd floor of a high-rise building to defuse the latest bomb that #jackboom has planted.
  • 7. A red and blue wire leads from the mechanism to the bomb. The countdown has not started yet, but the clock shows less than a minute is left before it the bomb will explode. The mechanism on the bomb that #jackboom planted looks simple enough. There is a timer – it looks like when it reaches 00:00:00 the bomb will explode.
  • 8. On the back of the bomb there is a keypad where you can input numbers and then press ‘Enter’. The keypad won’t accept letters. Next to the keypad are four symbols and spaces below where the numbers appear when you enter them. Do you recognise all of the symbols?
  • 12. Suddenly the count down starts and the picture disappears. You have less than a minute to go before the bomb explodes. What number do you key in?
  • 13.
  • 14. #jackboom and the bomb Suggested follow-up activities: • Role-play debrief to pólice chief • Write a report of the incident • You capture #jackboom – interrogate him
  • 15. Escape Room ELT Live Escape Rooms Ciphers and coded messages graham.stanley@gmail.com https://escaperoomelt.wordpress.com

Notas del editor

  1. In this video, we’ll look at ciphers and coded messages. We will look at what to consider when using codes/ciphers in Escape Rooms when the objective of the activity is for learning or practising English.
  2. Let’s start by looking at some definitions-¿¿ What is a cipher? What is the difference between cipher and code? Can you list some of the different types of cipher? Have you ever used ciphers for language learning? You might want to stop the video here and take some time to relfect on this. If you are watching alone, write some notes in answer to the question. If you are with someone, discuss the questions.
  3. Codes vs ciphers
  4. I am not going to go over the codes and cipher activities listed here – in this blog post, but rather focus on an ELT Escape Room activity that I designed that makes use of a cipher
  5. Scenario: (for advanced learners) Let’s look at an example for Advanced learners of using a cipher. Although as it has been presented, this activity is designed for advanced learners, it can be adapted for lower levels by simplifying the language.
  6. Scenario: The city is being terrorised by #jackboom, a deranged explosives expert who delights in setting booby-trapped bombs. You are the city’s crack anti-explosive team and are called by the police to the 42nd floor of a high-rise building to defuse the latest bomb that #jackboom has planted.
  7. The mechanism on the bomb that #jackboom planted looks simple enough. There is a timer – it looks like when it reaches 00:00:00 the bomb will explode. A red and blue wire leads from the mechanism to the bomb. The countdown has not started yet, but the clock shows less than a minute is left before it the bomb will explode.
  8. On the back of the bomb there is a keypad where you can input numbers and then press ‘Enter’. The keypad won’t accept letters. Next to the keypad are four symbols and spaces below where the numbers appear when you enter them.
  9. As you look at the bomb, news comes in that #jackboom has sent via email an image of a strange code to the police, and you think it may be a clue to defusing the bomb. Surely this shows you the numbers you need to defuse the bomb? Broccoli – 1 / Milk = 7 / Hamburger = 4 / Green pepper = 8
  10. Scenario: (for advanced learners) Suddenly, the image disappears. Can you remember what food was related to which number? You think it may be important. Work together to share what you remember
  11. You approach the bomb, confident that you know the code to defuse it, but then just as you are about to key in the number, you receive a picture of #jackboom wearing a cryptic t-shirt.
  12. 1 minute explosión (flash video) Suddenly the count down starts and the picture disappears. You have les than a minute to go before the bomb explodes. What number do you key in?
  13. Transposing the hamburger and broccoli numbers, the correct code is 4718 Broccoli – 4 (1) / Milk = 7 / Hamburger = 1 (4) / Green pepper = 8
  14. Suggested follow-up activities: Role-play debrief to pólice chief Write a report of the incident You capture #jackboom – interrogate him
  15. In this video, we’ll look at ciphers and coded messages. We will look at what to consider when using codes/ciphers in Escape Rooms when the objective of the activity is for learning or practising English.