College Board
2000 AP® Computer Science A Free-Response Questions
Coding works for other fields. The free-response questions for AP Computer science require pupils to develop code to solve a problem. Problems range from creating a histogram to developing an encryption program. Teachers use the...
Facebook
Cybersecurity, Phishing, and Spam
Take a serious look at an equally serious topic! Security scholars explore and discuss the methods hackers use to gain access to personal information during a well-written digital citizenship activity. Part of an extensive series, the...
Facebook
Public Wi-Fi
Sometimes free Wi-Fi comes with a hefty price tag! Networking novices examine the components of a Wi-Fi network during a digital citizenship lesson from an extensive series. Groups work together to map out a day's worth of Internet...
PBS
Pbs Nova: Send a Coded Message Virtual Enigma
Explore the NOVA's Virtual Enigma machine used during WWII. You can send an encrypted message to a friend along with the special key needed to decipher the message. A link is also included to the Virtual Enigma.
Other
The World Wide Web Security Faq
Answers frequently asked questions relating to the security implications of running a Web server and using Web browsers.
National Institute of Standards and Technology (NIST)
Fipsp: Authentication Technology Alternatives
These guidelines describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations toFederal agencies and departments for the acquisition and use of technology which supports...
Get Safe Online
Get Safe Online: Businesses
A comprehensive guide to protecting your business in today's digital world.
Google
Google for Education: Ciphering a Sentence
For this lesson, the students have a goal to map each alphabet letter to a number in the range 1-26. They use some simple rules to create this mapping and then use this mapping to encode a sentence.
TeachEngineering
Teach Engineering: Smart Move!
This is a simple activity to visualize a communication system. In order to do this the students encode, decode, transmit, receive, and store messages. They will use a code sheet and flashlight for this process. They will also maintain a...
University of Canterbury
University of Canterbury: Cs Unplugged: Dominating Sets
This activity explores the dominating set problem, and sets it up as the basis for a the public key encryption activity.
REMC Association of Michigan
Remc Association of Michigan: 21 Things4 Students: 21. Computational Thinking
Computational thinking can be used to take a complex problem, understand what the problem is and develop possible solutions to solve or explain it. In these six Quest, students will learn about the four stages of computational thinking:...
Texas Instruments
Texas Instruments: Numb3 Rs: How Hard Can It Be?
Based off of the hit television show NUMB3RS, this lesson introduces students to one way of defining the strength of an encryption (called "Entropy"). In the lesson, students learn how to calculate the entropy of a given code, and then...
Texas Instruments
Texas Instruments: Numb3 Rs: Breaking the Code
Based off of the hit television show NUMB3RS, this lesson introduced students to simple coding techniques (namely, the shift cipher). Students learn to translate codes from nonsense to English by quantifying each letter, and then...
Texas Instruments
Texas Instruments: Numb3 Rs: Straddling Checkerboard
Based off of the hit television show NUMB3RS, this lesson introduces students to a ciphering technique called the Straddling Checkerboard. In such an encryption scheme, all messages are turned into a series of numbers for transmission....
Other
Dave Net: Bill Gates on Privacy
Dave Winer ponders the issues of privacy on the Internet, citing an email from Bill Gates and discussing digital encryption. Goes into depth about the debate on free speech and censorship of the internet.
Other
How Encryption Works and How It Will Change Your Business
A thorough discussion of the business and professional uses of encryption.
Other
Gilc: Cryptography and Liberty
This site from the Global Internet Liberty Campaign reports on a 1998 survey conducted by the Electronic Privacy Information Center which asked world nations about their encryption policies. The survey got results from over 75 nations,...
Other
Um: The Battle Over Cryptographic Key "Escrow"
This article describes the legal and technical issues involved in cryptography. It also discusses government proposals concerning the clipper chip.
Mathigon
Mathigon: Math Foundations: Divisibility and Primes: Real Life Applications
This lesson provides real life applications for divisibility and prime numbers including the Cicada Cycle's use of prime numbers and Cryptography,encryption.
Other
Isoc: All About the Internet Internet Issues
As the Internet continues to grow, the issues that confront its stable, beneficial evolution increase in number and complexity. Here, the Internet Society presents links to information on a variety of Internet issues including copyright,...
Wikimedia
Wikipedia: Disk Encryption
A very brief encyclopedia article on disk encryption that defines the term and lists some common disk encryption software. Links to related information are also available.
Wikimedia
Wikipedia: Encryption
Wikipedia provides a basic definition of encryption, and distinguishes between the two encryption methods: symmetric and asymmetric key algorithms.