GPNQHZ987
Type above to decrypt our story...

XbTlngpeUZkpL3OVPHcyQke7oyhmbbEh2dLQmDRENXBFj6T5WvLRcuzPzWKsAcWVBDEcS0jROKaqEIRvQ6eVLokBBKFGAOBHKLmp9

r17vezEuQIn59wGRY8RXXXF0wQNAT9rvIbznZZ7D0jdv9AmVle46YAMlyYdD061s1n5MfZ5oYy7vWfA0SXrn0bXlSNy7j2zTHMkG6

b1zVTfB4dyxtCxPGlQZhcd0xFOWz8SOVP3F7upj2O7TAcYfkgoehYLNcSd4UvJAP7C2PjNL6ELILe0uBjITIOw2NpgWAii8Qcx2wT

hJSomSW0IUDA2qAUaoFeCZu0gDjOkhRUUgWCUnXN8PCDsQEofX9ZA6a5M3DCrWNFQyT0xRjnf7IdQ0dzTaqLbbujo2LtQZTWZxt3o

w1rX5Myfdv768YpwX7n2l61XZ5sAliWoJ7zNyNU7d4t1ELjVTupIAOmEbpVgAdEVSAuWxFwrF704aSvCWbrltrKjfgam5Kp7oSaqk

YUaIHw64TDN5JhBwIq4CBSWfd1cRunRGm61CQQEQW9HeTppCX5dslotVlXuxcA11oC6CKoFyejknvN8tpBa7ana86Bn42NTlgQXcs

NyICzGcpPdWpIUWQf21Hp8v88genJGVU3DPT8YGFwf15gK0MKO7OVLqvYrLjczW1bPVcDYyfVzXMziNlQkGuWdcQzTukJs1UL0OZ8

PGTlCnXBlYRg0eHKrWQ81KMMXd2TUYeLy254q3huohlqOfgEC4ANCKnTv4HVHiC7DT4Hbphenu72yL8KX6gLdGVmKSQJEux6m3k0T

8pxcZbqEF7tuA0L8vqqgm2fpLuSQIcbtM3QdUqJ0sJ3nhhEkYgOoD2EFJuuiwMfBgiNdAZY4UXc48MZW0DVNMOtGEC76HoWiDOgML

Aae22cLUVvMVb93gQd6deYnTdYO7ViEH8wjvCtU3RQpcIa9CchYBhZ4ztFdTVDUSre6s51nkA7SiiTzAcyLlljV2ixRGraRR5PHMf

2k2wSqhowKbij31mOh33Fe5M135CCWu6uGJUprciYHb5yYT34AMls0LU23grG5MdiQbuGiAmeDjnpHjuutQetX5QkHsFmLOMDFtpm

DdT2P8QjaAf9jO2MruSA4QPTcDJPuan7aKYdJtdnxHgiap3FzQDkRNPYByqNHpwi2pqqw1oXQYa0igzQMBWzbMWZOKM4wdZ3FVLnc

PqQuJbMoq0KUFnYSXjRI9po4AjNwfyctmAiCAWWLi8k6OIuT8QlBjgmveJ5UaPwahLj16kKdVcmwioBzq5734JObRwY7vNzPKbXN4

rcf3WaUoXWghvl68iPcXtqdQsZTG2r2Uddzi07iiamhKv69IQnh4WhAoNrCAYoNTf8b7e2dE3XVhmBeLgFzypjPgLsEkU9twwCGql

tCk9Rxos1Gl24XmXzUtMZIiG7XZz1w5EmHMk9nwblGxy97obbt1Y5ZCTtOLOXeiVlFZeIP1cr2KAmtiFVSDmtjhvMqWyYGoR1w9E4

ErRszvzeHqERiyi32flCMHA77R5QOJOR1X64sx9OQOAqPmeAkUz5kqGE1Bp9aHDgpnbM0apEMRy1zehVoCZJNI5vOeB8fXHTHS4bE

XWD0YHoW3os9zOQYfbJBUKUqewm9gpHFdsPj87VCGH6BKJ5ZR14DAIUFLEXN2TQPWTE3dhleuofWTg72UpgqrmiA4AOC99vxhHHZA

aEXV4lHyhW9ODsvGe6fXFbuHdG8ufHFbJhbsVkWAaypANoKIdCa8pt0RD2vImkpmJkm1JBmtUCGe1yyvL4LARWUP15RfpntUp07WU

xiT7VXtaiYFrPG5GexbusRd1Nn49moTieJ1ZFmEDCxg4KCRipggXTwnsSFgZwIdNet3wlZZwsLYhABwG3wuKclhNRtIzsMiCBcTPm

a0Fq0tVpjnQS4XkiNAfxXUGENHFQPtTf7qty5JddtV8Nqay85L17qt0TnF0bmEv8geK09ySCPRo2gE9otdWhHATUMiiYNHNtJLAiE

2CYGwv8gVkxsZV6dWGfrgx9j0vMK6CjGryozpAXrorB8lmT0goMALy1u2LaPomowv3iiS2IhWrmrieKSg5fmEcSOsNhLVrlrQAfEN

Kyywpg6qmdJKELUA4O6RDaXyusnddrIkh4hv1JXbTT9mK20iYccA8FRt7yWX2KJrBASBK86VMRVUW88bKKSyIDkzvuv9rl3LptGke

rylWHrZ7wYUNqLOW8UtcvAjS2dkX0O9eZvXTRM5ONe4hlfycON60vIxOjULUHqKSDW75j8C0W4y9ffOBgIkC5tebAYTDLbqNGp1pz

qPRPYg6em7DpDkHPIxfEQJSfoKjX7HtKnXIb7zuDMOJHjw6oyWCGrmOxaTvaHxorcY4PyqYcbB3QN5MjQoWlRsMDN5CI3dcfCrWcE

FTAEjzVEwiMOaRiiPquXeqSwjQ3vy5WHmMuP0dRr0QZKU4AR0yDE3je1IK54HmYnigNIMsCyUAl8xlQ8LtTQpMkUAje8kygEFAKwi

Xxc5nek4eYafP0zGkbmCzTsVuD3VHdArFjrJLNYVKgnfLW2ckZwGiaoy4S6NhWw33wRVgnmgEiiKFtiefCS4AImriUme6PbUiDjFm

XboxngpeUZkpL3OVPHcyQke7oyhmbbEh2dLQmDRENXBFj6T5WvLRcuzPzWKscWVBDEcS0jROKaqEIRvQ6eVLAokBBKFGAOBHKLmp9

ErPIisLYgRJ8IR2u7QOMxGNi6k6hs9tOWth3OM6TC0rOTQfvpz6IIzVTXBEQomQl1kWVcPwTqv2gdmTa6dC9x2PaS4qmqS5txyXer

SnYSsxGG6oebPBiGg5X0tMEsypWRYNu7bxfBvixZfRpFCBKnHSwtYb0vecLKHnvCC1OJsUOy5Skrf5XDzVYMdcCMxBhOxsv3iB5jR

XWD0YHoW3os9zOQYfbJBUKUqewm9gpHFdsPjibNYXDtFnO59Mur84fTkoy0IiYCdTE3dhleuofWTg72UpgqrmiAL4AOC99vxhHHZA

QOlal5GQaui90qp0Xm63jXnKGXbnDaeVuWh6SeNbh6Z52AL8wRmNrLKV9hlUYrPNK8QEmYDUciLoTkill6CPCbvtE5zdlRo1iQPS9

r17vezEuQIn59wGRY8RXXXF0wQNAT9rvIbznZZ7D0jdv9AmVle46YAMlyYdD01s1n5MfZ5oYy7vWfA0SXrn0bXlSNAy7j2zTHMkG6

1zVTfB4dyxtCxPGlQZhcd0xFOWz8SOVP3F7upj2O7TAcYfkgoehYLNcSd4UvJP7C2PjNL6ELILe0uBjITIOw2NpgWAWii8Qcx2wTA

01
/

Codes & Ciphers

On-site or outreach

 

From Ancient Greece to the modern day, people have been using increasingly complex codes and ciphers with the intention of communicating secretly and keeping information secure. Enigma was one such cipher. Students will enjoy the rare opportunity to use a genuine Enigma machine as well as encountering a range of historical codes and ciphers as they work together to decipher messages in order to solve a puzzle. This session includes an Enigma machine demonstration.

During this session students will:

  • Increase their knowledge of codes and ciphers and their uses throughout history.

  • Develop their understanding of the role that ciphers played during WW2, with specific reference to the Enigma machine and the wider operations of Bletchley Park.

  • Use and develop team working, problem-solving and mathematical thinking skills, applying them to a practical codebreaking task.

Subject Focus: Maths,

Additional curriculum links: History, Computing

Story of Enigma

On-site or outreach

 

The German Military believed the Enigma cipher was unbreakable. They were wrong, but the Codebreakers were only able to break Enigma because of human error, complacency and predictable message formats. Students will examine a genuine Enigma machine to figure out for themselves what made Enigma such an effective cipher at the time and calculate the exact number of possible key settings per message. This session includes an Enigma machine demonstration.

During this session students will:

  • Learn about and understand the operation, use and purpose of Enigma machines in WW2.

  • Work together to develop and apply their mathematical skills and knowledge to calculate the number of possible key settings per message for a standard army Enigma machine.

Subject Focus: Maths

Additional curriculum links: History

Breaking Lorenz

On-site or outreach

 

More effective but less well-known than the iconic Enigma machine, Lorenz was the cipher of the German High Command.

Fiendishly difficult, the Lorenz cipher seemed impossible to break, but Bletchley Park Codebreaker John Tiltman’s inspired breakthrough paved the way for other codebreakers to unlock its secrets. His thought process is laid bare, and students will engage with a series of tasks of increasing complexity designed to give them a full understanding of Tiltman’s break and some of the secrets of this machine, including its use of binary operations to generate many key settings that dwarfed that of Enigma.

During this session students will:

  • Develop their knowledge and understanding of ciphers used in the past including those during WW2

  • Understand the number of possible settings for a Lorenz machine and come to recognise the scale of the problem for Codebreakers in WW2

  • Understand how a key logical step contributed to the breaking of a WW2 cipher, using ideas related to binary addition, the XOR operation and common language patterns

  • Work through a problem-solving procedure collaboratively based on real historical events

Subject Focus: Computing

Additional curriculum links: History, Maths

This session does not include an Enigma machine demonstration.

Interception to Intelligence: Battle of the Atlantic

On-site

 

It is 1941 and the Battle of the Atlantic is at its height. Numerous convoys of essential supplies are being sunk by German Wolf packs and Britain is close to surrender. In the role of codebreakers students will intercept, decipher and translate German Naval communications in order to plan a strategy to get the next convoy safely to Liverpool. This session includes an Enigma machine demonstration.

During this session students will:

  • Develop their knowledge and understanding of WW2 events and the role of Bletchley Park in the Battle of the Atlantic.

  • Briefly describe the process of decryption at Bletchley Park, from when a message is first intercepted until the intelligence is used.

  • Apply team working, problem-solving and strategic thinking skills to obtain and apply scenario-based intelligence.

Subject Focus: History

Additional curriculum links: Geography, Maths

Interception to Intelligence: D-Day

On-site

 

It is the early hours of 6th June 1944. Weather prevented Operation Overlord commencing in the early hours of June 5th so today is the best, and perhaps last, chance the Allies have of beginning the invasion of German-occupied Western Europe. Numerous deception plans have been put into place to fool the enemy and protect Allied troops. In the role of codebreakers students will intercept and decipher German communications in order to decide if the deception plans have been successful and whether it is safe to proceed with the invasion. This session includes an Enigma machine demonstration.

During this session students will:

  • Develop their knowledge and understanding of WW2 events and the role of Bletchley Park in the D-Day landings.

  • Briefly describe the process of decryption at Bletchley Park, from when a message is first intercepted until the intelligence is used.

  • Apply team working, problem-solving and strategic thinking skills to obtain and apply scenario-based intelligence.

Subject Focus: History

Additional curriculum links: Geography, Maths

Personal Cyber Security

On-site or outreach

 

This workshop has been designed for all KS5 students, regardless of whether they are studying Computer Science or not.

Our lives are becoming ever more digitally connected. Students are making their way into this brave new world. But how prepared are they to do this in a way that keeps their personal data and devices secure?

Through discussion, interactive demonstrations and practical activities, students will:

  • Consider their individual digital world – looking at the devices, apps and data they value.

  • Identify where weakness in their personal cyber security exist and how criminals might exploit these.

  • Learn practical ways to improve their cyber security.

  • Create a plan of action that is unique to them.

Subject Focus: Computing

Data Protection by Design

On-site or outreach

 

This workshop has been designed for KS5 students studying A-Level Computer Science and links to the AQA, OCR and Cambridge syllabuses. It is also suitable for students studying BTEC Computer Science Level 3

Modern cyber products can collect unfathomable amounts of personal data – often without the user’s knowledge or understanding. But just because computer scientists can, it doesn’t necessarily mean that they should. In this workshop, students will be introduced to the concept of Data Protection by Design – a philosophy of integrating user privacy at the conception of a new product.

Through discussion, interactive demonstrations and practical activities, students will:

  • Understand the principles of Data Protection by Design

  • Debate the ethics of existing ‘controversial’ cyber products

  • Integrate Data Protection by Design into the development of a new cyber product

Subject Focus: Computer Science

This session does not include an Enigma machine demonstration

Past, Present and Future Encryption

On-site and outreach

 

This workshop has been designed for KS5 students studying A-Level Computer Science and links to the AQA, OCR and Cambridge syllabuses. It is also suitable for students studying BTEC Computer Science Level 3.

Throughout history people have used cryptography to keep data secret. But as Bletchley Park’s wartime work proves, seemingly ‘unbreakable’ encryption systems can be broken. So how can computer scientists use cryptography to keep data safe?

Through discussion, interactive demonstrations and practical activities, students will:

  • Consider the types of cryptography used by Germany during World War 2 and the weakness in German ciphers.

  • Learn the principles that have led to secure modern-day encryption.

  • Send a message using the symmetrical and asymmetrical methods used by modern end-to-end encrypted messaging services.

  • Discuss the future of cryptography with quantum computing on the horizon.

Subject Focus: A Level Computer Science and BTEC Computer Science Level 3

Additional curriculum links: History, Maths

This session does not include an Enigma machine demonstration.

Contact us

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

    +44 (0) 1908 640404

    Our team is happy to answer any queries 9.30 – 16.45, Monday to Friday.

    To book a learning visit, please use the Learning Booking Form.

    Enquiries

    Any queries submitted through the contact form will be responded to as soon as possible.