Professional Documents
Culture Documents
A Cryptographic Scavenger Hunt
A Cryptographic Scavenger Hunt
To cite this article: Judy A. Holdener & Eric J. Holdener (2007) A Cryptographic Scavenger Hunt,
Cryptologia, 31:4, 316-323, DOI: 10.1080/01611190701245050
Introduction
In 2003, Doubleday Fiction published the novel The Da Vinci Code [1] by American
author Dan Brown, and enthusiasm for the book immediately swept across the
globe. Selling over 60 million copies in less than three years, the book became the
focus of intense media scrutiny: magazine and newspaper articles, television specials,
and even other books. The book was panned by many critics, and there was a desire
to ban it by some groups. Nonetheless, despite the negative publicity, Brown’s intri-
cately layered code has captivated the masses.
After reading Brown’s novel and observing its success, the first author decided it
would be fun to capitalize on the allure of such a mystery. In an effort to motivate
and excite her mathematics students, she enlisted her husband (an avid mystery fan)
to help her create an enigmatic riddle for her number theory class. The result was a
mathematical scavenger hunt that had students searching for clues across the
Kenyon College campus and inside the surrounding village of Gambier, Ohio. Ulti-
mately, the trail of clues revealed a cipher that could be broken through RSA
cryptography, and in this way, students gained a meaningful hands-on experience
with the RSA encoding=decoding process.
Interestingly, we are certainly not the first married couple to create enigmatic
fun for others. Cryptanalysts William Friedman and his wife Elizebeth were known
to host inventive progressive dinner parties in which their guests, who were an inter-
esting mix of codebreakers, newspapermen, and scientists, were divided into teams
and sent on culinary scavenger hunts. While eating at one restaurant, they would
receive a clue from the restaurant’s owner concerning the next destination. Guests
would go to five or six restaurants throughout the course of the evening, and the first
team home would win a prize [2].
In this article, we present the number theoretic scavenger hunt to readers with
the hope that they too will be inspired to create enigmatic fun for their students.
While the mystery and clues presented here are specifically tailored to Kenyon
College, we believe that our approach can serve as a good starting point for others.
316
A Cryptographic Scavenger Hunt 317
The Mystery
At the beginning of class following their study of RSA cryptography, students in
Kenyon’s 2005 fall offering of Math 327: Number Theory Seminar received the
following message.
The Hunt
To meet the charge set out above, the class was broken up into two teams of five, and
each team was given a laptop computer equipped with the computer algebra system
Maple, which enabled them to decipher messages that had been enciphered using
RSA cryptography. In the week prior to the scavenger hunt, the students had gained
hands-on experience with the RSA encryption method, using a Maple program to
encipher and decipher ‘‘secret messages’’ for one another. Hence, they had not only
studied RSA encryption from a theoretical point of view; they were able to employ it.
(See the Appendix for the relevant Maple code.)
The students knew in advance that there would be a scavenger hunt on this
particular lesson, so they were prepared to trek across the campus and the surround-
ing area. After receiving the above scenario, each team was given their first clue2 and
they were off to stop the evildoers.
Clue #1: Ray Charles sang about having this person on his mind, but as
far as we know he never met the keeper of your first encrypted fragment
of a clue. You will find her in the hall of power—worth the price placed
on a king’s head.
Comments: The president of Kenyon College is Georgia Nugent, and her office is in
Ransom Hall. Hence, the keeper of the first clue was the president of the college.
Clue #2: Congratulations Team alpha! You have found the keeper of the
first encrypted fragment:
You will need to learn how to decipher this secret information. Keep
looking . . .
For your next clue find the keeper who works beneath the stars and
bars. In our little village this person need not worry about ‘‘rain nor
snow,’’ but the dark of the occasional power outage is a different matter.
2
Clue #1 for one team (team ‘‘alpha’’) was actually the third clue for the second team
(team ‘‘beta’’). The different ordering was meant to prevent the two teams from converging
at any one of the three keepers.
A Cryptographic Scavenger Hunt 319
Comments: Because of the many large old trees adorning the village of Gambier and the
Kenyon campus, power outages are a common occurrence. In this clue the students are
given the encrypted text and are told to go to the Gambier Post Office to seek out their
next clue. The Post Master, who is well known in the Kenyon community for his
friendly demeanor, was more than willing to comply. As the term ‘‘cipher text’’ implies,
the string of numbers revealed in the second clue is the message to be deciphered by the
students.
Clue #3: Very impressive. You are proving yourselves to be worthy reci-
pients of the second fragment of information. Although this information
is typically known to many, you have had to work for it!
[453838431999850498062034427355653905153, 81952655310075487163]
Whether you’re looking for the keeper of your next clue or looking for a
place to rest for the night, ‘‘check out’’ (or ‘‘check in’’ with) the person
behind the desk; you’re sure to get a nice reception.
Comments: The Kenyon Inn is the college’s hotel=restaurant in town. The third keeper
was the receptionist at the Inn. Having already encountered RSA cryptography, the
students would immediately recognize this pair of numbers as the ‘‘public key.’’ The
first number, m, is the modulus created by multiplying two large primes, p and q,
together, and the second number is a number, k, chosen to be relatively prime to
u(m) ¼ (p 1)(q 1). Admittedly, the value of m is smaller than what would typi-
cally be used in RSA cryptography. The smaller size of m was chosen to minimize the
chance of an error in transcription. Because the students received their clues in paper
form, they had to type the string of digits into the Maple file themselves.
Clue #4: Well Done! You are so close now. You need one more piece of
information, don’t you? Here it is:
½19669081321110693313
Hurry up . . . there are evildoers out there trying to thwart your efforts!
The Outcome
The Number Theory seminar met for 75 minutes twice a week, and students were
given one 75-minute class period to complete the scavenger hunt. In the end, the
320 J. A. Holdener and E. J. Holdener
Figure 1. The ‘‘long-lost’’ book turned out to be a secret box. We glued the pages of a book
together and then cut a hole through them to create the box.
winning team completed the entire hunt in just 30 minutes, and the losing team fin-
ished in about 40 minutes. Therefore, in retrospect, we should have made the clues
more difficult. The timing was difficult to predict, however, and we erred on the safe
side because we were worried about those students who had another class immedi-
ately afterward.
Judging by the level of the student’s excitement, the scavenger hunt was a suc-
cess. After solving the trail of clues, each team returned immediately and enthusiasti-
cally to relay the glitches and glories encountered along the way. The winning team
admitted that they were not familiar with Ray Charles’ song ‘‘Georgia,’’ but this did
not slow them down much. They were able to crack the clue in minutes using a Web
search.
Perhaps the greatest pedagogical benefit of the event was that it motivated
students to become proficient with the RSA cryptosystem. Students enjoy a healthy
competition and if there is a prize to be had, they will work even harder. While exams
certainly play a similar role in the learning process (with the prize being a high
grade), we argue that a scavenger hunt is much more fun. And why not have a little
fun in class? There is no reason why mathematics can’t be more captivating for the
masses.
Appendix:
Maple Code for RSA Encryption and Description
What follows is the Maple code that was made available to the students. The
notation used in this code is consistent with that used in the textbook of the course:
A Friendly Introduction to Number Theory by Joseph Silverman [4].
The Encoding Process
Step 1: RSA Set-up
First we find two large primes p and q:
A Cryptographic Scavenger Hunt 321
References
1. Brown, D. 2003. The Da Vinci Code. New York: Doubleday.
2. Codebreakers. 1994. NOVA Television Series. PBS Videocassette.
3. Forgotten Moments in Kenyon History. 1999. R. Oden. Videocassette in the Kenyon
archives.
4. Silverman, J. H. 2006. A Friendly Introduction to Number Theory, 3rd ed. Upper Saddle
River, NJ: Pearson Prentice Hall.