Cryptography: unlocking the future

Cryptography is all around us and has major historical connections. This course explores the mathematics of cryptography. Topics range from simple substitution ciphers and the Enigma machine of the Second World War, to modern approaches such as RSA used in internet encryption. You will need to be confident with basic arithmetic and algebra. This is a 10-session course and must be taken with W310Am02 in Week 3.

Course details

Checking availability...
Start Date
2 Aug 2026
Duration
10 Sessions over two weeks
End Date
8 Aug 2026
Application Deadline
28 Jun 2026
Location
International Summer Programme
Code
W410Am02

Tutors

Dr James Grime

Dr James Grime

Tutor in science

Aims

This course aims to:

  • introduce you to mathematics through the topic of codes and codebreaking
  • introduce the mathematics of simple codes and codebreaking
  • introduce modern cryptography from Enigma to internet encryption

Course content

Codes and ciphers have been used for approximately 4,000 years to disguise our secret messages. This mathematics course will show you how to make and break ciphers, from simple historical ciphers to modern encryption. 

Along the way, we will learn about different kinds of ciphers, including monoalphabetic and polyalphabetic ciphers. We will learn what these terms mean, why they were so difficult to break, and learn the mathematics behind making and breaking such ciphers. 

By the Second World War, code making had become mechanised. The Enigma machine was a cipher machine used by the German military that many believed to be unbreakable. We will see exactly how this machine worked and how it was eventually broken by wartime code breakers. 

After WWII mechanical cipher were replaced with electronic ciphers. These ciphers send messages using 1s and 0s and are the basis of how all messages are sent today. We will look at how the messages we send today are sent secretly and efficiently. 

Finally, we will end the course with one of the most secure ciphers that we have today. Known as RSA, it is a method of encryption used on the internet and is an example of Public Key Encryption. 

Cryptography touches on a broad range of topics in mathematics and is one of the most exotic real life applications of maths. By the end of this course we will have introduced several fundamental ideas in code making and code breaking and discover whether there is such a thing as an unbreakable code. 

What to expect on this course

There are no books to read or essays to write. The course is intended to be self-contained. You will need to be comfortable with basic arithmetic and algebra, such as rearranging equations. 

At the start of each session, you will be given notes with gaps, we will then fill the gaps together. This allows us to spend less time writing and more time absorbing the ideas. By the end of the course you will have a complete set of notes. 

Course sessions

  1. Monoalphabetic ciphers 1  

    An introduction to the simplest ciphers, and the mathematical ideas we will need in the course, including the Caesar shift and modular arithmetic. 

  2. Monoalphabetic ciphers 2 

    We will practice ideas learnt so far and apply them to other ciphers. 

  3. Polyalphabetic ciphers 

    We complete our look at monoalphabetic ciphers by looking at how they were eventually broken. A new type of cipher took their place, which were harder to break. 

  4. Polyalphabetic ciphers 2 

    We will look at how polyalphabetic ciphers were eventually broken. We look at the last of the pen and paper ciphers, taking us into the early 20th century.  

  5. Secret Sharing 

    We look at how to protect secrets so that they can only be read when several people cooperate. 

  6. Enigma 

    The infamous cipher machine used by Nazi Germany in World War II that was broken by the Allies. We will look in detail at how the Enigma machine worked and how it was broken. 

  7. Lorenz 

    We will look at the cipher machine used by Adolf Hitler himself, used for the most secret messages of WWII, and how this machine was broken. 

  8. Digital ciphers 

    Messages sent today are encoded as 1s and 0s. We will look at binary and how it can be used to send messages in secret.  

  9. Digital coding 

    We look at how modern digital messages are made to be as short as possible and how they fix any mistakes made when transmitted. 

  10. RSA and Internet encryption  

    In the second half of the 20th century, new mathematical methods were devised to encrypt messages. These are the ideas we currently use on the internet today.

Learning outcomes

As a result of the course, you will gain a greater understanding of the subject and you should be able to:

  • gain an understanding of topics of classical cryptography, including substitution ciphers, transposition ciphers and frequency analysis 
  • gain an understanding of cryptography and cryptanalysis in World War II and internet encryption 
  • have a better understanding of the applications of mathematics and proof 

Required reading

There is no required reading for this course. See Course materials for supplementary reading once registered.