XbTlngpeUZkpL3OVPHcyQke7oyhmbbEh2dLQmDRENXBFj6T5WvLRcuzPzWKsAcWVBDEcS0jROKaqEIRvQ6eVLokBBKFGAOBHKLmp9
r17vezEuQIn59wGRY8RXXXF0wQNAT9rvIbznZZ7D0jdv9AmVle46YAMlyYdD061s1n5MfZ5oYy7vWfA0SXrn0bXlSNy7j2zTHMkG6
b1zVTfB4dyxtCxPGlQZhcd0xFOWz8SOVP3F7upj2O7TAcYfkgoehYLNcSd4UvJAP7C2PjNL6ELILe0uBjITIOw2NpgWAii8Qcx2wT
hJSomSW0IUDA2qAUaoFeCZu0gDjOkhRUUgWCUnXN8PCDsQEofX9ZA6a5M3DCrWNFQyT0xRjnf7IdQ0dzTaqLbbujo2LtQZTWZxt3o
w1rX5Myfdv768YpwX7n2l61XZ5sAliWoJ7zNyNU7d4t1ELjVTupIAOmEbpVgAdEVSAuWxFwrF704aSvCWbrltrKjfgam5Kp7oSaqk
YUaIHw64TDN5JhBwIq4CBSWfd1cRunRGm61CQQEQW9HeTppCX5dslotVlXuxcA11oC6CKoFyejknvN8tpBa7ana86Bn42NTlgQXcs
NyICzGcpPdWpIUWQf21Hp8v88genJGVU3DPT8YGFwf15gK0MKO7OVLqvYrLjczW1bPVcDYyfVzXMziNlQkGuWdcQzTukJs1UL0OZ8
PGTlCnXBlYRg0eHKrWQ81KMMXd2TUYeLy254q3huohlqOfgEC4ANCKnTv4HVHiC7DT4Hbphenu72yL8KX6gLdGVmKSQJEux6m3k0T
8pxcZbqEF7tuA0L8vqqgm2fpLuSQIcbtM3QdUqJ0sJ3nhhEkYgOoD2EFJuuiwMfBgiNdAZY4UXc48MZW0DVNMOtGEC76HoWiDOgML
Aae22cLUVvMVb93gQd6deYnTdYO7ViEH8wjvCtU3RQpcIa9CchYBhZ4ztFdTVDUSre6s51nkA7SiiTzAcyLlljV2ixRGraRR5PHMf
2k2wSqhowKbij31mOh33Fe5M135CCWu6uGJUprciYHb5yYT34AMls0LU23grG5MdiQbuGiAmeDjnpHjuutQetX5QkHsFmLOMDFtpm
DdT2P8QjaAf9jO2MruSA4QPTcDJPuan7aKYdJtdnxHgiap3FzQDkRNPYByqNHpwi2pqqw1oXQYa0igzQMBWzbMWZOKM4wdZ3FVLnc
PqQuJbMoq0KUFnYSXjRI9po4AjNwfyctmAiCAWWLi8k6OIuT8QlBjgmveJ5UaPwahLj16kKdVcmwioBzq5734JObRwY7vNzPKbXN4
rcf3WaUoXWghvl68iPcXtqdQsZTG2r2Uddzi07iiamhKv69IQnh4WhAoNrCAYoNTf8b7e2dE3XVhmBeLgFzypjPgLsEkU9twwCGql
tCk9Rxos1Gl24XmXzUtMZIiG7XZz1w5EmHMk9nwblGxy97obbt1Y5ZCTtOLOXeiVlFZeIP1cr2KAmtiFVSDmtjhvMqWyYGoR1w9E4
ErRszvzeHqERiyi32flCMHA77R5QOJOR1X64sx9OQOAqPmeAkUz5kqGE1Bp9aHDgpnbM0apEMRy1zehVoCZJNI5vOeB8fXHTHS4bE
XWD0YHoW3os9zOQYfbJBUKUqewm9gpHFdsPj87VCGH6BKJ5ZR14DAIUFLEXN2TQPWTE3dhleuofWTg72UpgqrmiA4AOC99vxhHHZA
aEXV4lHyhW9ODsvGe6fXFbuHdG8ufHFbJhbsVkWAaypANoKIdCa8pt0RD2vImkpmJkm1JBmtUCGe1yyvL4LARWUP15RfpntUp07WU
xiT7VXtaiYFrPG5GexbusRd1Nn49moTieJ1ZFmEDCxg4KCRipggXTwnsSFgZwIdNet3wlZZwsLYhABwG3wuKclhNRtIzsMiCBcTPm
a0Fq0tVpjnQS4XkiNAfxXUGENHFQPtTf7qty5JddtV8Nqay85L17qt0TnF0bmEv8geK09ySCPRo2gE9otdWhHATUMiiYNHNtJLAiE
2CYGwv8gVkxsZV6dWGfrgx9j0vMK6CjGryozpAXrorB8lmT0goMALy1u2LaPomowv3iiS2IhWrmrieKSg5fmEcSOsNhLVrlrQAfEN
Kyywpg6qmdJKELUA4O6RDaXyusnddrIkh4hv1JXbTT9mK20iYccA8FRt7yWX2KJrBASBK86VMRVUW88bKKSyIDkzvuv9rl3LptGke
rylWHrZ7wYUNqLOW8UtcvAjS2dkX0O9eZvXTRM5ONe4hlfycON60vIxOjULUHqKSDW75j8C0W4y9ffOBgIkC5tebAYTDLbqNGp1pz
qPRPYg6em7DpDkHPIxfEQJSfoKjX7HtKnXIb7zuDMOJHjw6oyWCGrmOxaTvaHxorcY4PyqYcbB3QN5MjQoWlRsMDN5CI3dcfCrWcE
FTAEjzVEwiMOaRiiPquXeqSwjQ3vy5WHmMuP0dRr0QZKU4AR0yDE3je1IK54HmYnigNIMsCyUAl8xlQ8LtTQpMkUAje8kygEFAKwi
Xxc5nek4eYafP0zGkbmCzTsVuD3VHdArFjrJLNYVKgnfLW2ckZwGiaoy4S6NhWw33wRVgnmgEiiKFtiefCS4AImriUme6PbUiDjFm
XboxngpeUZkpL3OVPHcyQke7oyhmbbEh2dLQmDRENXBFj6T5WvLRcuzPzWKscWVBDEcS0jROKaqEIRvQ6eVLAokBBKFGAOBHKLmp9
ErPIisLYgRJ8IR2u7QOMxGNi6k6hs9tOWth3OM6TC0rOTQfvpz6IIzVTXBEQomQl1kWVcPwTqv2gdmTa6dC9x2PaS4qmqS5txyXer
SnYSsxGG6oebPBiGg5X0tMEsypWRYNu7bxfBvixZfRpFCBKnHSwtYb0vecLKHnvCC1OJsUOy5Skrf5XDzVYMdcCMxBhOxsv3iB5jR
XWD0YHoW3os9zOQYfbJBUKUqewm9gpHFdsPjibNYXDtFnO59Mur84fTkoy0IiYCdTE3dhleuofWTg72UpgqrmiAL4AOC99vxhHHZA
QOlal5GQaui90qp0Xm63jXnKGXbnDaeVuWh6SeNbh6Z52AL8wRmNrLKV9hlUYrPNK8QEmYDUciLoTkill6CPCbvtE5zdlRo1iQPS9
r17vezEuQIn59wGRY8RXXXF0wQNAT9rvIbznZZ7D0jdv9AmVle46YAMlyYdD01s1n5MfZ5oYy7vWfA0SXrn0bXlSNAy7j2zTHMkG6
1zVTfB4dyxtCxPGlQZhcd0xFOWz8SOVP3F7upj2O7TAcYfkgoehYLNcSd4UvJP7C2PjNL6ELILe0uBjITIOw2NpgWAWii8Qcx2wTA
From Ancient Greece to the modern day, people have been using increasingly complex codes and ciphers with the intention of communicating secretly and keeping information secure. Enigma was one such cipher. Students will enjoy the rare opportunity to use a genuine Enigma machine as well as encountering a range of historical codes and ciphers as they work together to decipher messages in order to solve a puzzle. This session includes an Enigma machine demonstration.
During this session students will:
Increase their knowledge of codes and ciphers and their uses throughout history.
Develop their understanding of the role that ciphers played during WW2, with specific reference to the Enigma machine and the wider operations of Bletchley Park.
Use and develop team working, problem-solving and mathematical thinking skills, applying them to a practical codebreaking task.
Subject Focus: Maths,
Additional curriculum links: History
It is 1941 and the Battle of the Atlantic is at its height. Numerous convoys of essential supplies are being sunk by German Wolf packs and Britain is close to surrender. In the role of codebreakers students will intercept, decipher and translate German Naval communications in order to plan a strategy to get the next convoy safely to Liverpool. This session includes an Enigma machine demonstration.
During this session students will:
Develop their knowledge and understanding of WWII events and the role of Bletchley Park in the Battle of the Atlantic.
Briefly describe the process of decryption at Bletchley Park, from when a message is first intercepted until the intelligence is used.
Apply team working, problem-solving and strategic thinking skills to obtain and apply scenario-based intelligence.
Subject Focus: History
Additional curriculum links: Geography, Maths
It is the early hours of 6th June 1944. Weather prevented Operation Overlord commencing in the early hours of June 5th so today is the best, and perhaps last, chance the Allies have of beginning the invasion of German-occupied Western Europe. Numerous deception plans have been put into place to fool the enemy and protect Allied troops. In the role of codebreakers, students will intercept and decipher German communications in order to decide if the deception plans have been successful and whether it is safe to proceed with the invasion. This session includes an Enigma machine demonstration.
During this session students will:
Develop their knowledge and understanding of WW2 events and the role of Bletchley Park in the D-Day landings.
Briefly describe the process of decryption at Bletchley Park, from when a message is first intercepted until the intelligence is used.
Apply team working, problem-solving and strategic thinking skills to obtain and apply scenario-based intelligence.
Subject Focus: History
Additional curriculum links: Geography, Maths
More effective but less well-known than the iconic Enigma machine, Lorenz was the cipher of the German High Command.
Fiendishly difficult, the Lorenz cipher seemed impossible to break, but Bletchley Park Codebreaker John Tiltman’s inspired breakthrough paved the way for other codebreakers to unlock its secrets. His thought process is laid bare, and students will engage with a series of tasks of increasing complexity designed to give them a full understanding of Tiltman’s break and some of the secrets of this machine, including its use of binary operations to generate many key settings that dwarfed that of Enigma.
During this session students will:
Develop their knowledge and understanding of ciphers used in the past including those during WW2
Understand the number of possible settings for a Lorenz machine and come to recognise the scale of the problem for Codebreakers in WW2
Understand how a key logical step contributed to the breaking of a WW2 cipher, using ideas related to binary addition, the XOR operation and common language patterns
Work through a problem-solving procedure collaboratively based on real historical events
Subject Focus: Computing
Additional curriculum links: History, Maths
This session does not include an Enigma machine demonstration.
This workshop has been designed for all KS4 students, regardless of whether they are studying GCSE Computer Science or not.
Our lives are becoming ever more digitally connected. Year 10 and 11 students are making their way into this brave new world. But how prepared are they to do this in a way that keeps their personal data and devices secure?
Through discussion, interactive demonstrations and practical activities, students will:
Consider their individual digital world – looking at the devices, apps and data they value.
Identify where weakness in their personal cyber security exist and how criminals might exploit these.
Learn practical ways to improve their cyber security.
Create a plan of action that is unique to them.
Subject Focus: Computing
This session does not include an Enigma machine demonstration
This workshop has been designed for KS4 students studying GCSE Computer Science and links to the OCR, Pearson Edexcel and Equqas syllabuses.
Modern cyber products can collect unfathomable amounts of personal data – often without the user’s knowledge or understanding. But just because computer scientists can, it doesn’t necessarily mean that they should. In this workshop, students will be introduced to the concept of Data Protection by Design – a philosophy of integrating user privacy at the conception of a new product.
Through discussion, interactive demonstrations and practical activities, students will:
Understand the principles of Data Protection by Design
Debate the ethics of existing ‘controversial’ cyber products
Integrate Data Protection by Design into the development of a new cyber product
Subject Focus: GCSE Computer Science
This session does not include an Enigma machine demonstration
This workshop has been designed for KS4 students studying GCSE Computer Science and links to the OCR, Pearson Edexcel and Equqas syllabuses.
Throughout history people have used cryptography to keep data secret. But as Bletchley Park’s wartime work proves, seemingly ‘unbreakable’ encryption systems can be broken. So how can computer scientists use cryptography to keep data safe?
Through discussion, interactive demonstrations and practical activities, students will:
Subject Focus: GCSE Computer Science
Additional curriculum links: History, Maths
This session does not include an Enigma machine demonstration
+44 (0) 1908 640404
Our team is happy to answer any queries 9.30 – 16.45, Monday to Friday.
To book a learning visit, please use the Learning Booking Form.
Enquiries
Any queries submitted through the contact form will be responded to as soon as possible.