+
Activity
Computer Science Unplugged

Kid Krypto–Public-Key Encryption

For Teachers 6th - 12th
Class members have an opportunity to experience how to use a public key to encrypt information and a private key to decrypt it. Groups create their own public key and encrypt information then develop private keys to decrypt this...
+
Activity
Computer Science Unplugged

Sharing Secrets—Information Hiding Protocols

For Teachers 4th - 12th
Did you know that you can find the average age of a group of people without anyone having to real their age? This resource provides directions for way to do just that. After the activity, class members read a short passage that provides...
+
Lesson Plan
Curated OER

Master Spy

For Teachers 3rd - 5th
Students explain that a code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers to send messages or to store information. They practice deciphering a variety of secret codes used in...
+
Lesson Plan
Curated OER

Secret Message

For Teachers 5th - 8th
Students explore a woman war hero, Hannah Senesh, who used secret codes and messages to protect important information. They follow instructions to write their own secret messages.
+
Lesson Plan
Curated OER

Secret Sharing with Linear Equations

For Teachers 9th - 12th
Students use linear equations to reveal a secret message. They practice writing linear equations from two ordered pairs. Students determine the y-intercept of the line from the equation. They reveal the secret message from the teacher.
+
Lesson Plan
Curated OER

Cryptography Implementation

For Teachers 9th - 10th
Students explore cryptology. They write a research paper on cryptography. Using linear equations, students invent a code and write a secret message. Students complete cryptography puzzles.
+
Lesson Plan
Curated OER

Basic Crypto Systems II

For Teachers 9th
Ninth graders discuss the Enigma machine used during World War II. They explore the substitution cipher and variations of it. Students examine the advantages and disadvantages of this cipher. Students write a message using the code...
+
Handout
Discovering Lewis & Clark

Discovering Lewis & Clark: Cryptography

For Students 9th - 10th
Learn about the origins and history of cryptology and how Thomas Jefferson urged Lewis to use a cipher to keep him informed about the progress of the expedition.
+
Primary
Other

Marshall Foundation: The Shakespearean Ciphers Examined

For Students 9th - 10th
Both William and Elizebeth Friedman worked at Riverbank Laboratories. Elizebeth was tasked with applying cryptographic techniques to analyze William Shakespeare's writings in order to prove that they were in fact written by Francis...
+
Primary
American Rhetoric

American Rhetoric: Abraham Sinkov Interview Excerpt: Move Into Cryptologic Field

For Students 9th - 10th
This is the text and audio of an excerpt from Abraham Sinkov's interview describing how he came into the Signal Intelligence Service to begin a career in the new cryptologic field. It was recorded on April 20, 1930.
+
Activity
Other

Nat'l Security Agency: National Cryptologic Museum

For Students 9th - 10th
On this site one can find the National Security Agency's history of cryptology, some online exhibits, and sections on mathematics, education, and more.
+
Lesson Plan
Alabama Learning Exchange

Alex: Can You Crack the Code?

For Teachers 3rd - 8th
Students will conduct guided research on the Navajo code talkers and briefly discuss their impact on WWII. Students will also be introduced to other forms of cryptology and use number pattern skills to crack their own code and create a...
+
Graphic
Curated OER

Behind the Scenes

For Students 9th - 10th
Here are stories of Military Intelligence as told by those who were in Harms Way", "In The Field", and "Behind the Scenes.