Hi, what do you want to do?
EngageNY
Using Matrix Operations for Encryption
Data encryption is an important security measure for sensitive data stored on computers. Pupils learn how to utilize matrices for creating code. They also get a great review of matrix multiplication, inverse matrices, and the identity...
Facebook
Cybersecurity, Phishing, and Spam
Take a serious look at an equally serious topic! Security scholars explore and discuss the methods hackers use to gain access to personal information during a well-written digital citizenship activity. Part of an extensive series, the...
Shodor Education Foundation
Spy Game
Turn students into detectives as they decipher encrypted messages. Introduce your class to modular arithmetic and have a little fun encrypting and decoding secret messages. The activity does not hit many content standards, but...
Curated OER
Smart Move!
Middle schoolers visualize a communication system. They encode, decode, transmit, receive and store messages. Students use a code sheet and flashlight for this process. They will also maintain a storage sheet from which they can retrieve...
Curated OER
An Introduction to Public Key Cryptography
Students secure information online using cryptography. For this algebra lesson, students use RSA technology to encrypt information on the internet. They use modular reduction of natural numbers to understand prime number theory.
Institute of Electrical and Electronics Engineers
Public Keys, One Way Functions and Hard Problems
Use paint to teach about cryptography. Scholars explore public key cryptography by attempting to mix a secret color using paint. After the activity, they investigate the Diffie-Hellman method using prime numbers, exponents, and modular...
Curated OER
Master Spy
Students explain that a code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers to send messages or to store information. They practice deciphering a variety of secret codes used in...
Curated OER
Determinants: 2x2 and 3x3 Matrices
In this Algebra II instructional activity, 11th graders find the determinant of 2x2 or 3x3 matrix and use the determinant to find the inverse of the matrix. The two page instructional activity contains explanation of topic, a...
Curated OER
Digital Images: From Satellites To The Internet
Students examine digital images and how satellites orbiting Earth send information and pictures to Earth over the Internet. They use a digital camera to put pictures on a computer and decode a satellite image from space.
Curated OER
My Pyramid
In this food pyramid activity, students fill in the 5 boxes at the bottom of the food pyramid and draw or color foods within the 5 food pyramid areas.
Khan Academy
Khan Academy: Symmetric Encryption Techniques
Learn how symmetric encryption techniques help protect computer data.
Khan Academy
Khan Academy: The Need for Encryption
A huge amount of private data is sent around the Internet every day: emails with details about our personal lives, passwords that we type into login screens, tax documents that we upload to servers. Learn more about the need for data...
Khan Academy
Khan Academy: Encryption, Decryption, and Cracking
Find out about data encryption, decryption and cracking computer data to avoid virsus and cyberattacks.
Other
How Encryption Works and How It Will Change Your Business
A thorough discussion of the business and professional uses of encryption.
Khan Academy
Khan Academy: Public Key Encryption
Learn how public key encryption can protect computer data.
Khan Academy
Khan Academy: Public Key Encryption
Learn how public key encryption can send that data safely between computer systems.
Khan Academy
Khan Academy: The Need for Encryption
Find out why we need to encrypt computer data to avoid hackers.
University of Canterbury
University of Canterbury: Cs Unplugged: Public Key Encryption
This student activity about public key encryption allows learners to simulate encrypt and decrpyt messages without having to share a password to unlock them.
Khan Academy
Khan Academy: Encryption, Decryption, and Cracking
Julius Caesar encrypted messages two thousand years ago. By knowing the techniques of deciphering a code--frequency analysis, known text, and brute force--one can begin to understand the three key aspects of data encryption, decryption,...
Curated OER
Google for Education: Children and Technology: Privacy and Encryption
Students simulate sending a secret message to a friend via the internet, attempting to deliver the message safely and securely.
Khan Academy
Khan Academy: Public Key Encryption
Check your understanding of cryptography and public key encryption.
University of Canterbury
University of Canterbury: Cs Unplugged: Dominating Sets
This activity explores the dominating set problem, and sets it up as the basis for a the public key encryption activity.
Wikimedia
Wikipedia: Encryption
Wikipedia provides a basic definition of encryption, and distinguishes between the two encryption methods: symmetric and asymmetric key algorithms.