Hi, what do you want to do?
Khan Academy
Khan Academy: Symmetric Encryption Techniques
Learn how symmetric encryption techniques help protect computer data.
Khan Academy
Khan Academy: The Need for Encryption
A huge amount of private data is sent around the Internet every day: emails with details about our personal lives, passwords that we type into login screens, tax documents that we upload to servers. Learn more about the need for data...
Khan Academy
Khan Academy: Encryption, Decryption, and Cracking
Find out about data encryption, decryption and cracking computer data to avoid virsus and cyberattacks.
Other
How Encryption Works and How It Will Change Your Business
A thorough discussion of the business and professional uses of encryption.
Khan Academy
Khan Academy: Public Key Encryption
Learn how public key encryption can protect computer data.
Khan Academy
Khan Academy: Public Key Encryption
Learn how public key encryption can send that data safely between computer systems.
Khan Academy
Khan Academy: The Need for Encryption
Find out why we need to encrypt computer data to avoid hackers.
University of Canterbury
University of Canterbury: Cs Unplugged: Public Key Encryption
This student activity about public key encryption allows learners to simulate encrypt and decrpyt messages without having to share a password to unlock them.
Khan Academy
Khan Academy: Encryption, Decryption, and Cracking
Julius Caesar encrypted messages two thousand years ago. By knowing the techniques of deciphering a code--frequency analysis, known text, and brute force--one can begin to understand the three key aspects of data encryption, decryption,...
Curated OER
Google for Education: Children and Technology: Privacy and Encryption
Students simulate sending a secret message to a friend via the internet, attempting to deliver the message safely and securely.
Khan Academy
Khan Academy: Public Key Encryption
Check your understanding of cryptography and public key encryption.
University of Canterbury
University of Canterbury: Cs Unplugged: Dominating Sets
This activity explores the dominating set problem, and sets it up as the basis for a the public key encryption activity.
Wikimedia
Wikipedia: Encryption
Wikipedia provides a basic definition of encryption, and distinguishes between the two encryption methods: symmetric and asymmetric key algorithms.
National Institute of Standards and Technology (NIST)
Fipsp: Authentication Technology Alternatives
These guidelines describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations toFederal agencies and departments for the acquisition and use of technology which supports...
Khan Academy
Khan Academy: Public Key Encryption
Public Key Encryption, an asymmetric encryption technique, is used to allow computers to securely communicate. The high level process is explained in this article.
Khan Academy
Khan Academy: Symmetric Encryption Techniques
Symmetric encryption techniques are explained including the Vigenere Cipher and AES-128.
Get Safe Online
Get Safe Online: Businesses
A comprehensive guide to protecting your business in today's digital world.
Texas Instruments
Texas Instruments: Numb3 Rs: Breaking the Code
Based off of the hit television show NUMB3RS, this lesson introduced students to simple coding techniques (namely, the shift cipher). Students learn to translate codes from nonsense to English by quantifying each letter, and then...
Khan Academy
Khan Academy: Congruence Relation
A quick comprehension check over congruence relation.
Khan Academy
Khan Academy: Modular Multiplication
Practice problems over modular multiplication in cryptography.
Khan Academy
Khan Academy: Modular Addition
Practice problems for reviewing modular addition in cryptography.