PBS
NOVA Cybersecurity Lab Lesson Plan
Don't be fooled by cyber scams! An informative lesson teaches techies about cybersecurity. They watch videos, play a game, and engage in discussion to improve their understanding of online safety.
Code.org
Public Key Cryptography
Investigate how public key cryptography works. Scholars continue their study of one-way functions and asymmetric keys and apply this information to public key cryptography. They use an app to explore public key cryptography and its...
EngageNY
The Power of Algebra—Finding Primes
Banks are responsible for keeping our financial information safe. Mathematics is what allows them to do just that! Pupils learn the math behind the cryptography that banks rely on. Using polynomial identities, learners reproduce the...
Curated OER
Caesar Ciphers: An Introduction to Cryptography
Students brainstorm and discuss the concept of cryptography, the science of secrets in today's world and then focus on a system for sending secret messages used by Julius Caesar. They make a Caesar wheel assessing encrypting and...
Curated OER
Clock Arithmetic and Cryptography
Students explore the concept of modular arithmetic and cryptography. In this modular arithmetic and cryptography activity, students use applets to explore modular arithmetic using a clock and Caesar Ciphers. Students exchange their...
Curated OER
Breaking the Code
Students understand what cryptography is and how to design original number-based codes. In this cryptography lesson, students research codes during World War II. Students develop number-based codes.
Curated OER
History and Analysis of Cryptography
Students are introduced to the code systems and art of cryptography. As a class, they review prior knowledge and brainstorm lists. Using the internet, they research the history of codes and determine how they are structured. They also...
Curated OER
Cryptography on the TI-83 Graphing Calculator
Students explore the history of cryptography. They assess function notation and transformation, matrix operations, and the fundamentals of modular arithmetic. Using graphing calculators, students develop their own encryption schemes.
Curated OER
Clock Arithmetic and Cryptography
Pupils investigate modular clock arithmetic and cryptography. They perform basic operations in modular (clock) arithmetic and encode and decode messages using simple shift and affine ciphers.
Institute of Electrical and Electronics Engineers
Public Keys, One Way Functions and Hard Problems
Use paint to teach about cryptography. Scholars explore public key cryptography by attempting to mix a secret color using paint. After the activity, they investigate the Diffie-Hellman method using prime numbers, exponents, and modular...
Curated OER
An Introduction to Public Key Cryptography
Students secure information online using cryptography. In this algebra lesson, students use RSA technology to encrypt information on the internet. They use modular reduction of natural numbers to understand prime number theory.
Code.org
Keys and Passwords
Scholars explore the relationship between cipher keys and passwords and as they learn more about the Vigenere cipher and continue to read from the book Blown to Bits in the seventh lesson of the series. They conduct an activity where...
Curated OER
Clock Arithmetic and Cryptography
Students perform basic operations in modular (clock) arithmetic. Students encode and decode messages using shift and affine ciphers. Students apply their multiplication, division, addition, and subtraction skills.
Code.org
Asymmetric Keys – Cups and Beans
Beans are for more than just counting! Introduce public key cryptography with cups and beans and ask scholars to use the beans to send secret numbers. Participants learn how this activity relates to public key cryptography and...
Curated OER
Mathematical Treasure Hunt
The hunt is on! Young mathematicians follow clues and complete a series of ten math puzzles as they try to crack Dr. Integer's code and find the location of his hidden treasure.
Curated OER
Matrices In Encryption And Decryption Of Codes
Students relate Cryptography to the solving of simultaneous linear equations in matrix notation. They explore various methods of encrypting and decrypting codes. Pupils discuss and solve simultaneous linear equations.
Curated OER
Cryptography Implementation
Students explore cryptology. They write a research paper on cryptography. Using linear equations, students invent a code and write a secret message. Students complete cryptography puzzles.
Curated OER
Transposition Cryptography
Students differentiate the types of cryptosystems and use them to communicate privately. In this algebra lesson plan, students use substitution and transposition to identify the cryptographs. They send and receive cryptograms as...
Curated OER
Secret Writing Devices
Elementary and middle schoolers explore the world of secret writing, otherwise known as cryptography. After an interesting introduction to the activity, learners utilize a decoder badge which uses the St. Cyr cipher - which is a cipher...
Code.org
The Need for Encryption
Scholars investigate the need for encryption as they read a portion of the book Blown to Bits and discuss encryption techniques. They finish by attempting to decode a message written using a Caesar cipher.
Curated OER
Does the falling tree make a sound if no one if there to hear it? (or communication via encryption)
Students explore encryption. They discuss the importance of cryptography in our daily lives. Students use games and cryptography to discover transformational geometry and modulo systems. They design their own encryption puzzles and...
Curated OER
Matrices: A Secret Weapon
Students perform operations with matrices. In this algebra activity, students use cryptography and cryptanalysis to solve problems. They add, subtract, and multiply matrices.
Curated OER
Coding History
Students study the topic of codes in Computer Science. They research it history, divisions in the field and its applications. The lesson also includes a brief overview of the information technology theory.
Code.org
Practice Performance Task - Security and Hacking in the Real World
Young computer scientists create a visual artifact that represents their research into a computing innovation in the world of cybersecurity. They then work individually to write an essay on the impact of technology on cybersecurity.