Acronis is a fearless and restless girl from a modern English family. Her parents are in the process of a divorce, during which they sent their daughter to one of the best private boarding schools in England.
There she becomes immersed in an adventure involving encrypted letters and international terrorism from the very first day.
Acronis starts a project in quantum physics inspired by the charming young teacher, Ms. Holly. She learns a lot about photons: the particles of light.
See if you can become a spy
The Enigma machine
is an electro-mechanical cryptographic device used by the Germans in the Second World War. The machine transformed the text in a special way, changing it into a code.
The book cipher
is a cipher in which two figures are assigned to each letter. The first figure is a number of a line on the relevant page of a code book, the second figure correlates to the number of letter’s order in a line. Only the person who possesses the code book and the key with the page number is able to read the message.
The Caesar cipher
is a kind of a shift cipher used by the Roman emperor Gaius Julius Caesar when corresponding with commanders of his legions. Every letter of the Roman alphabet stood for a letter shifted relatively to the first one on a certain number of positions. For example, instead of “A” Caesar wrote “D”, instead of “B” — “E”, “C” was turned into “F”, etc.
was an outstanding English mathematician, the founder of Informatics and the author of the first computing algorithm. A group of British scientists, led by him, created the ‘Turing Bombe’ — a computer which decrypted the Enigma cipher.
one of the first computers, designed by Alan Turing and his colleagues. Bombe’s algorithm was trying different variants of the code until the result coincided with a given piece of text.
also invented by Turing, was an electronic machine ensuring a speed of 500 operations a second. Both a captured encrypted message and a decrypted piece (usually the first words or a signature) were entered into Colossus. The computer selected the key to the text fragment and predicted the rest of the message.
is a department of the British Secret Service that conducts secret operations abroad. The activities of MI6 are shrouded in mystery and connected with many legends. The first computers were created with their participation.
The Vernam cipher
is still considered to be one of the most reliable methods for encrypting radio messages. The letters of encrypted messages are entered in binary code.