+
Lesson Plan
Code.org

Cracking the Code

For Teachers 9th - 12th
Scholars learn how to crack secret codes as they continue reading from the Blown to Bits and try to crack the random substitution cipher. They also begin learning about the Vigenere cipher. 
+
Lesson Plan
Curated OER

Binary Coding

For Teachers 3rd - 12th
Students identify different uses and forms of coding information. They use binary code to encode and decode written language. Students utilize worksheets imbedded in this plan to gain practice.
+
Lesson Plan
Code.org

Asymmetric Keys – Cups and Beans

For Teachers 9th - 12th
Beans are for more than just counting! Introduce public key cryptography with cups and beans and ask scholars to use the beans to send secret numbers. Participants learn how this activity relates to public key cryptography and asymmetric...
+
Lesson Plan
Institute of Electrical and Electronics Engineers

Public Keys, One Way Functions and Hard Problems

For Students 6th - 9th Standards
Use paint to teach about cryptography. Scholars explore public key cryptography by attempting to mix a secret color using paint. After the activity, they investigate the Diffie-Hellman method using prime numbers, exponents, and modular...
+
Lesson Plan
Computer Science Unplugged

You Can Say That Again! – Text Compression

For Teachers 4th - 12th Standards
Compression, the process computers use to store information, is the focus of a resource that presents two different stories that describe the concept of compression by eliminating repeated letters and replacing them with a pointer. The...
+
Lesson Plan
Computer Science Unplugged

Count the Dots – Binary Numbers

For Teachers 4th - 12th Standards
Did you know you can send a message using only zeroes and ones? This interactive resource presents an introduction to binary numbers. Through code cards, pupils learn to convert binary numbers to decimal numbers.
+
Lesson Plan
Code.org

The Need for Encryption

For Students 9th - 12th
Scholars investigate the need for encryption as they read a portion of the book Blown to Bits and discuss encryption techniques. They finish by attempting to decode a message written using a Caesar cipher.
+
Lesson Plan
Code.org

Public Key Cryptography

For Students 9th - 12th
Investigate how public key cryptography works. Scholars continue their study of one-way functions and asymmetric keys and apply this information to public key cryptography. They use an app to explore public key cryptography and its...
+
Lesson Plan
Code.org

Keys and Passwords

For Teachers 9th - 12th
Scholars explore the relationship between cipher keys and passwords and as they learn more about the Vigenere cipher and continue to read from the book Blown to Bits in the seventh lesson plan of the series. They conduct an activity...
+
Activity
Beauty and Joy of Computing

Algorithms

For Teachers 9th - 12th
Introduces the class to the idea of searching a list by building a script. Learners modify a guessing game script that will find a number in a list. 
+
Lesson Plan
Curated OER

Have I Been Hacked?

For Teachers 6th - 12th
Students investigate how effective SNEAK strategies are in detecting hackers. In this technology lesson, students explain the ethical issues about hacking. They graph and analyze their experimental results.
+
Activity
Computer Science Unplugged

Kid Krypto–Public-Key Encryption

For Teachers 6th - 12th
Class members have an opportunity to experience how to use a public key to encrypt information and a private key to decrypt it. Groups create their own public key and encrypt information then develop private keys to decrypt this...

Other popular searches