EJ743766
EJ743766
Harry Potter
and The
Cryptography with Matrices
Introduction The activity
Cryptography, the science of encrypting and To capitalise on the popularity of the Harry
deciphering messages written in secret codes, Potter series by J. K. Rowling, the entire
has played a vital role in securing information activity is framed in the context of the Harry
since ancient times. Julius Caesar employed Potter story with the aim of stimulating and
what has become known as the Caesar Shift heightening students’ interest. The activity
Cipher when encoding messages to communi- begins with the following scenario:
cate with his generals. Under this form of
encryption technique, each letter in a message Harry Potter is in deep trouble. He is being
is substituted with the letter that was a certain pursued by Lord Voldemort and is presently
number of places further down the alphabet. hiding in a secret location to escape from
Caesar used a shift of three places, and so A is being captured by him. He needs to send
replaced by D, B is replaced by E, and so on. messages to his two good friends, Ron and
In modern history, the Nazis continued to use Hermione, to tell them about his situation
the presumably highly sophisticated Engima and whereabouts. Of course, he has to send
machine to encrypt their messages when they the messages in code, just in case they are
communicated, still unaware that three Polish intercepted and cracked by Lord Voldemort
mathematicians had already cracked the along the way. So he composes his first
unbreakable codes of the Engima machine message “Please save me!” by replacing each
and had provided the Allied Forces with the letter in the message by a number according
means to gain access to their top secrets. More to the code in Table 1.
15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
encryption software to prevent sensitive infor-
mation such as credit card numbers from
falling into the wrong hands.
There are several cryptographic techniques Then students are asked to translate
and many make extensive use of mathematics Harry’s plain message into code, which
to secure information. This article describes appears as follows when completed:
an activity built around one of the techniques
that illustrates an application of matrices. P L E A S E S A V E M E !
Secondary school teachers may use this activity 16 12 5 1 19 5 0 19 1 22 5 0 13 5 27
to consolidate their students’ learning of certain
concepts of matrices such as the algorithm for The activity continues with the story of the
matrix multiplication and the concept of the clever, but devious, Harry using a super hi-
multiplicative inverse of a matrix. tech LOCK to encrypt his message to make it
Conclusion
which should be instantly recognised by many Secondary school students often ask their teachers
students as the representative coded numbers why it is important to learn mathematics, and thus
for the group of letters teachers are usually faced with the challenge of
explaining its importance and relevance to real life situ-
ations to convince them. However, this may not always
be an easy task. Therefore, it is hoped that this activity
on cryptography not only offers teachers with great
To verify that the original message can opportunities to either introduce or consolidate certain
indeed be unveiled in such a manner, students mathematical concepts and algorithms, but also to
can apply the process to the other coded convince their students that mathematics plays an
groups of numbers to check. Having important role in various walks of life and hence is a
completely described how the entire encryp- useful and meaningful field of study.
tion and decryption process works, students
References
are given time to communicate with each other
in encoded messages.
Subsequently, they are informed that this
secret process is very unfortunately discovered Camp, D. R. (1985). Secret codes with matrices. Mathematics Teacher, 78(9),
676–680.
and broken by the evil Lord Voldemort, and Lee, P. Y. (2005). Teaching Secondary School Mathematics: A Resource Book.
therefore, a new system has to be developed. Singapore: McGraw Hill.
So students are asked to explore and create a Singh, S. (1999). The Code Book: The Secret History of Codes and Code-
Breaking. London: Fourth Estate.
new LOCK and KEY for transmitting coded
messages. They are also given the freedom to
modify the existing coding system. Boon Liang Chua
National Institute of Education
Nanyang Technological University, Singapore
To help students in their exploration of this
blchua@nie.edu.sg
task, the use of computer or calculator tech-
nology can be integrated into this part of the