+
AP Test Prep
College Board

2000 AP® Computer Science A Free-Response Questions

For Students 10th - 12th
Coding works for other fields. The free-response questions for AP Computer science require pupils to develop code to solve a problem. Problems range from creating a histogram to developing an encryption program. Teachers use the...
+
Lesson Plan
1
1
Facebook

Cybersecurity, Phishing, and Spam

For Teachers 6th - 12th
Take a serious look at an equally serious topic! Security scholars explore and discuss the methods hackers use to gain access to personal information during a well-written digital citizenship activity. Part of an extensive series, the...
+
Lesson Plan
1
1
Facebook

Public Wi-Fi

For Teachers 6th - 12th
Sometimes free Wi-Fi comes with a hefty price tag! Networking novices examine the components of a Wi-Fi network during a digital citizenship lesson from an extensive series. Groups work together to map out a day's worth of Internet...
+
Interactive
PBS

Pbs Nova: Send a Coded Message Virtual Enigma

For Students 9th - 10th
Explore the NOVA's Virtual Enigma machine used during WWII. You can send an encrypted message to a friend along with the special key needed to decipher the message. A link is also included to the Virtual Enigma.
+
Handout
Other

The World Wide Web Security Faq

For Students 9th - 10th
Answers frequently asked questions relating to the security implications of running a Web server and using Web browsers.
+
Primary
National Institute of Standards and Technology (NIST)

Fipsp: Authentication Technology Alternatives

For Students 9th - 10th
These guidelines describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations toFederal agencies and departments for the acquisition and use of technology which supports...
+
Website
Get Safe Online

Get Safe Online: Businesses

For Students 9th - 10th
A comprehensive guide to protecting your business in today's digital world.
+
Lesson Plan
Google

Google for Education: Ciphering a Sentence

For Teachers 3rd - 6th
For this lesson, the students have a goal to map each alphabet letter to a number in the range 1-26. They use some simple rules to create this mapping and then use this mapping to encode a sentence.
+
Activity
TeachEngineering

Teach Engineering: Smart Move!

For Teachers 6th - 8th
This is a simple activity to visualize a communication system. In order to do this the students encode, decode, transmit, receive, and store messages. They will use a code sheet and flashlight for this process. They will also maintain a...
+
Lesson Plan
University of Canterbury

University of Canterbury: Cs Unplugged: Dominating Sets

For Teachers 2nd - 8th
This activity explores the dominating set problem, and sets it up as the basis for a the public key encryption activity.
+
Unit Plan
REMC Association of Michigan

Remc Association of Michigan: 21 Things4 Students: 21. Computational Thinking

For Students 9th - 10th
Computational thinking can be used to take a complex problem, understand what the problem is and develop possible solutions to solve or explain it. In these six Quest, students will learn about the four stages of computational thinking:...
+
Activity
Texas Instruments

Texas Instruments: Numb3 Rs: How Hard Can It Be?

For Teachers 9th - 10th
Based off of the hit television show NUMB3RS, this lesson introduces students to one way of defining the strength of an encryption (called "Entropy"). In the lesson, students learn how to calculate the entropy of a given code, and then...
+
Activity
Texas Instruments

Texas Instruments: Numb3 Rs: Breaking the Code

For Teachers 9th - 10th
Based off of the hit television show NUMB3RS, this lesson introduced students to simple coding techniques (namely, the shift cipher). Students learn to translate codes from nonsense to English by quantifying each letter, and then...
+
Activity
Texas Instruments

Texas Instruments: Numb3 Rs: Straddling Checkerboard

For Students 9th - 10th
Based off of the hit television show NUMB3RS, this lesson introduces students to a ciphering technique called the Straddling Checkerboard. In such an encryption scheme, all messages are turned into a series of numbers for transmission....
+
Article
Other

Dave Net: Bill Gates on Privacy

For Students 9th - 10th
Dave Winer ponders the issues of privacy on the Internet, citing an email from Bill Gates and discussing digital encryption. Goes into depth about the debate on free speech and censorship of the internet.
+
Article
Other

How Encryption Works and How It Will Change Your Business

For Students 9th - 10th
A thorough discussion of the business and professional uses of encryption.
+
Primary
Other

Gilc: Cryptography and Liberty

For Students 9th - 10th
This site from the Global Internet Liberty Campaign reports on a 1998 survey conducted by the Electronic Privacy Information Center which asked world nations about their encryption policies. The survey got results from over 75 nations,...
+
Article
Other

Um: The Battle Over Cryptographic Key "Escrow"

For Students 9th - 10th
This article describes the legal and technical issues involved in cryptography. It also discusses government proposals concerning the clipper chip.
+
eBook
Mathigon

Mathigon: Math Foundations: Divisibility and Primes: Real Life Applications

For Students 6th - 8th
This lesson provides real life applications for divisibility and prime numbers including the Cicada Cycle's use of prime numbers and Cryptography,encryption.
+
Website
Other

Isoc: All About the Internet Internet Issues

For Students 9th - 10th
As the Internet continues to grow, the issues that confront its stable, beneficial evolution increase in number and complexity. Here, the Internet Society presents links to information on a variety of Internet issues including copyright,...
+
Unknown Type
Khan Academy

Khan Academy: Crypto Checkpoint 2

For Students 9th - 10th
Test if you decrypted the secret code.
+
Unknown Type
Khan Academy

Khan Academy: Cyber Codes Quiz

For Students 6th - 8th
Try this quiz about cyber encryption.
+
Handout
Wikimedia

Wikipedia: Disk Encryption

For Students 9th - 10th
A very brief encyclopedia article on disk encryption that defines the term and lists some common disk encryption software. Links to related information are also available.
+
Handout
Wikimedia

Wikipedia: Encryption

For Students 9th - 10th
Wikipedia provides a basic definition of encryption, and distinguishes between the two encryption methods: symmetric and asymmetric key algorithms.