Code.org
Practice Performance Task - Security and Hacking in the Real World
Young computer scientists create a visual artifact that represents their research into a computing innovation in the world of cybersecurity. They then work individually to write an essay on the impact of technology on cybersecurity.
Computer Science Unplugged
Kid Krypto–Public-Key Encryption
Class members have an opportunity to experience how to use a public key to encrypt information and a private key to decrypt it. Groups create their own public key and encrypt information then develop private keys to decrypt this...
Bowland
German or English?
Sprechen sie Deutsch? Future cryptographers must decide whether an unknown text is written in English or in German. They use provided pie charts about the frequency of words in the English and German languages to help make their decisions.
PBS
NOVA Cybersecurity Lab Game
It's important to protect yourself online. An online game has pupils imagine themselves as cybersecurity specialists at a social networking company. They learn about ways to protect data online through a series of challenges.
PBS
NOVA Cybersecurity Lab Lesson Plan
Don't be fooled by cyber scams! An informative lesson teaches techies about cybersecurity. They watch videos, play a game, and engage in discussion to improve their understanding of online safety.
Computer Science Unplugged
The Peruvian Coin Flip–Cryptographic Protocols
A digital flip. Introduce your classes to cryptographic protocols using and, or, and not gates. Groups create a complete circuit to convert a binary number into another one. This type of one-way function allows pupils to...
Curated OER
Grilling Algebra
Students use a grille to investigate geometry. The application of the geometric figure, which is square, the students begin the coding of a message. The use of cryptography is used to reinforce algebraic ideas.
Code.org
Keys and Passwords
Scholars explore the relationship between cipher keys and passwords and as they learn more about the Vigenere cipher and continue to read from the book Blown to Bits in the seventh lesson of the series. They conduct an activity where...
Code.org
The Need for Encryption
Scholars investigate the need for encryption as they read a portion of the book Blown to Bits and discuss encryption techniques. They finish by attempting to decode a message written using a Caesar cipher.
Curated OER
Coding History
Students study the topic of codes in Computer Science. They research it history, divisions in the field and its applications. The lesson also includes a brief overview of the information technology theory.
Curated OER
Sieve of Eratosthenes
Students discover the Sieve of Erathosthenes. They explore a method to find all the prime numbers in a group of numbers. Using models, students practice divisibility rules while examining the difference between prime and composite numbers.
Curated OER
Informational Writing: Business Letter
Fifth graders write business letters. In this business letter instructional activity, 5th graders discuss the format and reasons for writing a business letter. They pick who they want to write to and create their own letter.
Braingle
Braingle: Cryptography Brain Teasers
Test your critical thinking skills with a variety of cryptography brain teasers, phrases or expressions "encoded in some way." Solve the teasers provided at this site, and submit your own for others to try!
Shodor Education Foundation
Shodor Interactivate: Lesson: Clock Arithmetic and Cryptography
This lesson plan is designed to guide students in practicing their basic arithmetic skills by learning about clock arithmetic and cryptography. Linked resources include helpful applets.
Discovering Lewis & Clark
Discovering Lewis & Clark: Cryptography
Learn about the origins and history of cryptology and how Thomas Jefferson urged Lewis to use a cipher to keep him informed about the progress of the expedition.
Other
Gilc: Cryptography and Liberty
This site from the Global Internet Liberty Campaign reports on a 1998 survey conducted by the Electronic Privacy Information Center which asked world nations about their encryption policies. The survey got results from over 75 nations,...
Massachusetts Institute of Technology
Mit: Open Course Ware: Network and Computer Security
This MIT course on network and computer security covers topics such as security in multi-user distributed systems, cryptography, authentication, intrusion detection, and many other security topics.
Other
Center for Democracy and Technology
A public interest organization working for public policies that advance civil liberties and democratic values in information technologies. Contains links to information on free speech, data privacy, wiretapping, and cryptography.
National Council of Teachers of Mathematics
Nctm: Illuminations: Codes
This is a computer based program that allows students to understand basic cryptography which utilizes transformations of shifting and stretching. Students may encode their own message and see it graphically.
Khan Academy
Khan Academy: Modular Multiplication
Practice problems over modular multiplication in cryptography.
Khan Academy
Khan Academy: Modular Addition
Practice problems for reviewing modular addition in cryptography.
Other
Um: The Battle Over Cryptographic Key "Escrow"
This article describes the legal and technical issues involved in cryptography. It also discusses government proposals concerning the clipper chip.
Khan Academy
Khan Academy: Public Key Encryption
Check your understanding of cryptography and public key encryption.
Other popular searches
- Matrix Cryptography
- Matrices Cryptography
- Cryptography Poe
- Conventional Cryptography
- Cesar Cryptography
- Ceasar Cryptography
- Cryptography Lessons
- Cryptography Implementation
- Cryptography + Poe
- Cryptography \ Poe