Code.org
Cracking the Code
Scholars learn how to crack secret codes as they continue reading from the Blown to Bits and try to crack the random substitution cipher. They also begin learning about the Vigenere cipher.
Curated OER
Binary Coding
Students identify different uses and forms of coding information. They use binary code to encode and decode written language. Students utilize worksheets imbedded in this plan to gain practice.
Code.org
Asymmetric Keys – Cups and Beans
Beans are for more than just counting! Introduce public key cryptography with cups and beans and ask scholars to use the beans to send secret numbers. Participants learn how this activity relates to public key cryptography and asymmetric...
Institute of Electrical and Electronics Engineers
Public Keys, One Way Functions and Hard Problems
Use paint to teach about cryptography. Scholars explore public key cryptography by attempting to mix a secret color using paint. After the activity, they investigate the Diffie-Hellman method using prime numbers, exponents, and modular...
Computer Science Unplugged
You Can Say That Again! – Text Compression
Compression, the process computers use to store information, is the focus of a resource that presents two different stories that describe the concept of compression by eliminating repeated letters and replacing them with a pointer. The...
Computer Science Unplugged
Count the Dots – Binary Numbers
Did you know you can send a message using only zeroes and ones? This interactive resource presents an introduction to binary numbers. Through code cards, pupils learn to convert binary numbers to decimal numbers.
Code.org
The Need for Encryption
Scholars investigate the need for encryption as they read a portion of the book Blown to Bits and discuss encryption techniques. They finish by attempting to decode a message written using a Caesar cipher.
Code.org
Public Key Cryptography
Investigate how public key cryptography works. Scholars continue their study of one-way functions and asymmetric keys and apply this information to public key cryptography. They use an app to explore public key cryptography and its...
Code.org
Keys and Passwords
Scholars explore the relationship between cipher keys and passwords and as they learn more about the Vigenere cipher and continue to read from the book Blown to Bits in the seventh lesson plan of the series. They conduct an activity...
Beauty and Joy of Computing
Algorithms
Introduces the class to the idea of searching a list by building a script. Learners modify a guessing game script that will find a number in a list.
Curated OER
Have I Been Hacked?
Students investigate how effective SNEAK strategies are in detecting hackers. In this technology lesson, students explain the ethical issues about hacking. They graph and analyze their experimental results.
Computer Science Unplugged
Kid Krypto–Public-Key Encryption
Class members have an opportunity to experience how to use a public key to encrypt information and a private key to decrypt it. Groups create their own public key and encrypt information then develop private keys to decrypt this...
Other popular searches
- Secret Code Multiplication
- Secret Service Codename
- Grid Coordinates Secret Code
- Math Secret Codes
- Math Secret Code Riddles
- Squigly Secret Codes
- Secret Code Division
- Dna Secret Codes
- Secret Code Free Printables
- Squiggly Secret Codes
- Number Sense Secret Codes
- Secret Codes Using Fractions