Khan Academy
Khan Academy: The Euclidean Algorithm
As related to cryptography, understanding and providing proof of the Euclidian Algorithm.
Khan Academy
Khan Academy: Modular Multiplication
Understanding modular multiplication and its proof as related to cryptography.
Khan Academy
Khan Academy: Modular Addition and Subtraction
As related to cryptography, understanding the concept of modular addition and modular subtraction and finding the proof.
Khan Academy
Khan Academy: Fast Modular Exponentiation
Understanding modular exponentiation in cryptography.
Khan Academy
Khan Academy: The Discovery
The set up to breaking the cryptography code of The Discovery.
Khan Academy
Khan Academy: Xor and the One Time Pad
This article focuses on cipher codes especially XOR and the one-time pad. Let's look at a visual examples to see the different scrambling effects of AND vs. OR vs. XOR by encrypting an image. Here is a digital image of Charles Babbage.
Texas Instruments
Texas Instruments: Numb3 Rs: Code Crackers
Based off of the hit television show NUMB3RS, this lesson introduced students to simple methods of cryptography, most notably the Caesar cipher. By sliding the alphabet a certain number of spaces, students code and decode messages, and...
TED Talks
Ted: Ted Ed: How to Organize, Add and Multiply Matrices
When you're working on a problem with lots of numbers, as in economics, cryptography or 3D graphics, it helps to organize those numbers into a grid, or matrix. Bill Shillito shows us how to work with matrices, with tips for adding,...
Khan Academy
Khan Academy: Learn More About the Internet on Khan Academy
Provided are links to Khan Academy content on the following subjects: Computers and the Internet; HTML/CSS; Cryptography; and SOPA/PIPA.
University of Ottawa (Canada)
University of Ottawa: Linear Algebra Close to Earth
The author of this site endeavours to explain how linear algebra has many applications in a wide range of disciplines, to help students see its uses in the real world.
US National Archives
Nara: Teaching With Documents: The Zimmerman Telegram
This is an excellent resource for anyone intersted in the Zimmermann Telegram: click to see the original coded message, the decoded message, and read about the implications of the telegram. This National Archives and Records...
Massachusetts Institute of Technology
Mit: Open Course Ware: Great Ideas in Theoretical Computer Science
A complete course on theoretical Computer Science presented at the college undergraduate level. The course attempts to describe Computer Science beyond the computer, focusing on mathematical tools, complex systems and classic problems,...
National Institute of Standards and Technology (NIST)
Fipsp: Authentication Technology Alternatives
These guidelines describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations toFederal agencies and departments for the acquisition and use of technology which supports...
Other
Marshall Foundation: The Shakespearean Ciphers Examined
Both William and Elizebeth Friedman worked at Riverbank Laboratories. Elizebeth was tasked with applying cryptographic techniques to analyze William Shakespeare's writings in order to prove that they were in fact written by Francis...
Wikimedia
Wikipedia: Code Talker
This encyclopedia entry from Wikipedia explores the role of Native American code talkers during World War II. Content focuses on how the code was developed, as well as why the code remained unbroken throughout the duration of the war.
Other
How Encryption Works and How It Will Change Your Business
A thorough discussion of the business and professional uses of encryption.
Other popular searches
- Matrix Cryptography
- Matrices Cryptography
- Cryptography Poe
- Conventional Cryptography
- Cesar Cryptography
- Ceasar Cryptography
- Cryptography Lessons
- Cryptography Implementation
- Cryptography + Poe
- Cryptography \ Poe