Curated OER
Informational Writing: Business Letter
Fifth graders write business letters. In this business letter instructional activity, 5th graders discuss the format and reasons for writing a business letter. They pick who they want to write to and create their own letter.
Curated OER
Grilling Algebra
Students use a grille to investigate geometry. The application of the geometric figure, which is square, the students begin the coding of a message. The use of cryptography is used to reinforce algebraic ideas.
Curated OER
Sieve of Eratosthenes
Students discover the Sieve of Erathosthenes. They explore a method to find all the prime numbers in a group of numbers. Using models, students practice divisibility rules while examining the difference between prime and composite numbers.
Shodor Education Foundation
Shodor Interactivate: Lesson: Clock Arithmetic and Cryptography
This lesson plan is designed to guide students in practicing their basic arithmetic skills by learning about clock arithmetic and cryptography. Linked resources include helpful applets.
Mathigon
Mathigon: Math Foundations: Divisibility and Primes: Real Life Applications
This lesson provides real life applications for divisibility and prime numbers including the Cicada Cycle's use of prime numbers and Cryptography,encryption.
Cuemath
Cuemath: Prime Factorization
In this lesson, you will be learning prime factorization to solve various mathematical problems followed by solved examples and practice questions.
Other
Curiosity in the Classroom: Principles of Encryption [Pdf]
In a world where people are sharing information every second online, securing that information is paramount. In this lesson students will understand the principle of encryption, how to decode encryption, and how to construct ciphers. The...
TED Talks
Ted: Ted Ed: How to Organize, Add and Multiply Matrices
When you're working on a problem with lots of numbers, as in economics, cryptography or 3D graphics, it helps to organize those numbers into a grid, or matrix. Bill Shillito shows us how to work with matrices, with tips for adding,...
Khan Academy
Khan Academy: Xor Bitwise Operation
If you've seen the lesson on the one-time pad, you know that it is the ultimate shift cipher. It involves the application of a random list of shifts equal to the length of the message. It's important to understand exactly how and why the...
US National Archives
Nara: Teaching With Documents: The Zimmerman Telegram
This is an excellent resource for anyone intersted in the Zimmermann Telegram: click to see the original coded message, the decoded message, and read about the implications of the telegram. This National Archives and Records...
Texas Instruments
Texas Instruments: Numb3 Rs: Code Crackers
Based off of the hit television show NUMB3RS, this lesson introduced students to simple methods of cryptography, most notably the Caesar cipher. By sliding the alphabet a certain number of spaces, students code and decode messages, and...