PBS
Pbs Nova: Send a Coded Message Virtual Enigma
Explore the NOVA's Virtual Enigma machine used during WWII. You can send an encrypted message to a friend along with the special key needed to decipher the message. A link is also included to the Virtual Enigma.
Get Safe Online
Get Safe Online: Businesses
A comprehensive guide to protecting your business in today's digital world.
University of Canterbury
University of Canterbury: Cs Unplugged: Public Key Encryption
This student activity about public key encryption allows learners to simulate encrypt and decrpyt messages without having to share a password to unlock them.
Texas Instruments
Texas Instruments: Numb3 Rs: Coded Messages
Based off of the hit television show NUMB3RS, this lesson uses matrices (inverse and multiplication) to decode messages hidden within digital pictures -- a process known as steganography. This method of hidden communication is known to...
Texas Instruments
Texas Instruments: Numb3 Rs: Onion Peeler
Based off of the hit television show NUMB3RS, this lesson introduces students to the concept of changing number bases, as well as gives some insight into Internet privacy through "onion routing." Students translate hexadecimal numbers...
Texas Instruments
Texas Instruments: Numb3 Rs: Now You See It, Now You Don't
Based off of the hit television show NUMB3RS, this lesson is an introduction to a "different" type of coding, called steganography. In Steganography, images (or text) are split into layers, and then distorted in such a way so as to...
Texas Instruments
Texas Instruments: Numb3 Rs: Creating Codes
Based off of the hit show NUMB3RS, this lesson focuses on getting students to create ciphering codes. These codes are made in two different ways in this lesson: once with addition and once with multiplication. Students in this lesson are...
Texas Instruments
Texas Instruments: Numb3 Rs: Straddling Checkerboard
Based off of the hit television show NUMB3RS, this lesson introduces students to a ciphering technique called the Straddling Checkerboard. In such an encryption scheme, all messages are turned into a series of numbers for transmission....
Texas Instruments
Texas Instruments: Numb3 Rs: Code Crackers
Based off of the hit television show NUMB3RS, this lesson introduced students to simple methods of cryptography, most notably the Caesar cipher. By sliding the alphabet a certain number of spaces, students code and decode messages, and...
Khan Academy
Khan Academy: Public Key Encryption
Learn how public key encryption can protect computer data.
Khan Academy
Khan Academy: Symmetric Encryption Techniques
Learn how symmetric encryption techniques help protect computer data.
Khan Academy
Khan Academy: The Need for Encryption
Find out why we need to encrypt computer data to avoid hackers.
Khan Academy
Khan Academy: The Need for Encryption
A huge amount of private data is sent around the Internet every day: emails with details about our personal lives, passwords that we type into login screens, tax documents that we upload to servers. Learn more about the need for data...
Khan Academy
Khan Academy: Public Key Encryption
Check your understanding of cryptography and public key encryption.