Lesson Plan
Curated OER

Caesar Ciphers: An Introduction to Cryptography

For Teachers 8th - 10th
Students brainstorm and discuss the concept of cryptography, the science of secrets in today's world and then focus on a system for sending secret messages used by Julius Caesar. They make a Caesar wheel assessing encrypting and...
Assessment
Concord Consortium

Leap Years and Calendars

For Students 8th - 12th
How many birthdays do leap year babies have in a lifetime? Learners explore the question among others in a lesson focused on different calendar systems. Given explanations of the Julian, Gregorian, and Martian calendars, individuals use...
Worksheet
Curated OER

Time and Timetables

For Students 5th - 6th
In this recognizing time and timetables instructional activity, students compare Julian and Gregorian calendars, determine leap years, and apply the formula for finding the day of week and Easter day for any year. Students solve 20...
Worksheet
Curated OER

Cryptography and Cryptanalysis

For Students 8th
In this cryptography and cryptanalysis learning exercise, 8th graders read the explanation and example for codes and ciphers, then answer 2 questions and decipher 2 messages.
Lesson Plan
Curated OER

Time and Again

For Teachers 5th - 8th
Students examine historical time and make time lines. They study the two main divisions of time; the time before and after the birth of Christ. They also note that time lines are a way of illustrating the length of historical time.
Lesson Plan
Curated OER

Basic Crypto Systems

For Teachers 7th - 12th
Students try to solve codes mathematically. The use of a code needs a key. Students try to decipher a code with a mathematical key. This requires focus and higher order thinking skills like analysis.
Article
Khan Academy

Khan Academy: Encryption, Decryption, and Cracking

For Students 9th - 10th
Julius Caesar encrypted messages two thousand years ago. By knowing the techniques of deciphering a code--frequency analysis, known text, and brute force--one can begin to understand the three key aspects of data encryption, decryption,...

Other popular searches