Computer Science Unplugged
Kid Krypto–Public-Key Encryption
Class members have an opportunity to experience how to use a public key to encrypt information and a private key to decrypt it. Groups create their own public key and encrypt information then develop private keys to decrypt this...
Computer Science Unplugged
Sharing Secrets—Information Hiding Protocols
Did you know that you can find the average age of a group of people without anyone having to real their age? This resource provides directions for way to do just that. After the activity, class members read a short passage that provides...
Curated OER
Master Spy
Students explain that a code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers to send messages or to store information. They practice deciphering a variety of secret codes used in...
Curated OER
Secret Message
Students explore a woman war hero, Hannah Senesh, who used secret codes and messages to protect important information. They follow instructions to write their own secret messages.
Curated OER
Secret Sharing with Linear Equations
Students use linear equations to reveal a secret message. They practice writing linear equations from two ordered pairs. Students determine the y-intercept of the line from the equation. They reveal the secret message from the teacher.
Curated OER
Cryptography Implementation
Students explore cryptology. They write a research paper on cryptography. Using linear equations, students invent a code and write a secret message. Students complete cryptography puzzles.
Curated OER
Basic Crypto Systems II
Ninth graders discuss the Enigma machine used during World War II. They explore the substitution cipher and variations of it. Students examine the advantages and disadvantages of this cipher. Students write a message using the code...
Discovering Lewis & Clark
Discovering Lewis & Clark: Cryptography
Learn about the origins and history of cryptology and how Thomas Jefferson urged Lewis to use a cipher to keep him informed about the progress of the expedition.
Other
Marshall Foundation: The Shakespearean Ciphers Examined
Both William and Elizebeth Friedman worked at Riverbank Laboratories. Elizebeth was tasked with applying cryptographic techniques to analyze William Shakespeare's writings in order to prove that they were in fact written by Francis...
American Rhetoric
American Rhetoric: Abraham Sinkov Interview Excerpt: Move Into Cryptologic Field
This is the text and audio of an excerpt from Abraham Sinkov's interview describing how he came into the Signal Intelligence Service to begin a career in the new cryptologic field. It was recorded on April 20, 1930.
Other
Nat'l Security Agency: National Cryptologic Museum
On this site one can find the National Security Agency's history of cryptology, some online exhibits, and sections on mathematics, education, and more.
Alabama Learning Exchange
Alex: Can You Crack the Code?
Students will conduct guided research on the Navajo code talkers and briefly discuss their impact on WWII. Students will also be introduced to other forms of cryptology and use number pattern skills to crack their own code and create a...
Curated OER
Behind the Scenes
Here are stories of Military Intelligence as told by those who were in Harms Way", "In The Field", and "Behind the Scenes.