Hi, what do you want to do?
Computer Science Unplugged
Kid Krypto–Public-Key Encryption
Class members have an opportunity to experience how to use a public key to encrypt information and a private key to decrypt it. Groups create their own public key and encrypt information then develop private keys to decrypt this...
Code.org
The Need for Encryption
Scholars investigate the need for encryption as they read a portion of the book Blown to Bits and discuss encryption techniques. They finish by attempting to decode a message written using a Caesar cipher.
EngageNY
Using Matrix Operations for Encryption
Data encryption is an important security measure for sensitive data stored on computers. Pupils learn how to utilize matrices for creating code. They also get a great review of matrix multiplication, inverse matrices, and the identity...
College Board
2000 AP® Computer Science A Free-Response Questions
Coding works for other fields. The free-response questions for AP Computer science require pupils to develop code to solve a problem. Problems range from creating a histogram to developing an encryption program. Teachers use the...
Curated OER
Matrices In Encryption And Decryption Of Codes
Young scholars relate Cryptography to the solving of simultaneous linear equations in matrix notation. They explore various methods of encrypting and decrypting codes. Pupils discuss and solve simultaneous linear equations.
Curated OER
Does the falling tree make a sound if no one if there to hear it? (or communication via encryption)
Students explore encryption. They discuss the importance of cryptography in our daily lives. Students use games and cryptography to discover transformational geometry and modulo systems. They design their own encryption puzzles and...
Curated OER
Magnetism-Decode Encrypted Statements
Third graders solve a cryptogram by decoding a message written with wingdings. In this decoding lesson plan, 3rd graders solve a message related to magnetism. Students have notes about magnets once they've finished.
Curated OER
NUMB3RS Activity: Coded Messages
Using matrix multiplication and inverse matrices, students are trying to uncode a coded message. Students encrypt simple messages using 2 x 2 matrices.
Computer Science Unplugged
The Peruvian Coin Flip–Cryptographic Protocols
A digital flip. Introduce your classes to cryptographic protocols using and, or, and not gates. Groups create a complete circuit to convert a binary number into another one. This type of one-way function allows pupils to...
CK-12 Foundation
Solving Equations Using the Pythagorean Theorem: Cryptography
Don't keep this resource a secret. Individuals learn to use the Pythagorean Theorem to find Pythagorean triples. They also see how Pythagorean triples can be useful in the field of cryptography to encrypt secret messages.
College Board
2011 AP® Computer Science A Free-Response Questions
Was computer science any different back then? Scholars peruse the free-response questions from the 2011 AP Computer Science A. By practicing questions related to representing digital sounds as an array of integer values and writing...
Shodor Education Foundation
Spy Game
Turn students into detectives as they decipher encrypted messages. Introduce your class to modular arithmetic and have a little fun encrypting and decoding secret messages. The activity does not hit many content standards, but...
Computer Science Unplugged
Sharing Secrets—Information Hiding Protocols
Did you know that you can find the average age of a group of people without anyone having to real their age? This resource provides directions for way to do just that. After the activity, class members read a short passage...
Curated OER
Caesar Ciphers: An Introduction to Cryptography
Students brainstorm and discuss the concept of cryptography, the science of secrets in today's world and then focus on a system for sending secret messages used by Julius Caesar. They make a Caesar wheel assessing encrypting and...
Facebook
Cybersecurity, Phishing, and Spam
Take a serious look at an equally serious topic! Security scholars explore and discuss the methods hackers use to gain access to personal information during a well-written digital citizenship activity. Part of an extensive series, the...
Facebook
Public Wi-Fi
Sometimes free Wi-Fi comes with a hefty price tag! Networking novices examine the components of a Wi-Fi network during a digital citizenship lesson from an extensive series. Groups work together to map out a day's worth of Internet...
Curated OER
To Pay a Price
Students explore online banking. In this online banking activity, students discuss identity theft, direct deposit, encryption, and the Federal Reserve System. Students participate in a game show activity where students ask and answer...
Curated OER
An Introduction to Public Key Cryptography
Students secure information online using cryptography. For this algebra lesson, students use RSA technology to encrypt information on the internet. They use modular reduction of natural numbers to understand prime number theory.
Curated OER
Cryptography on the TI-83 Graphing Calculator
Students explore the history of cryptography. They assess function notation and transformation, matrix operations, and the fundamentals of modular arithmetic. Using graphing calculators, students develop their own encryption schemes.
Curated OER
Binary and Communication Systems
Students participate in an activity that introduces them to the concept of binary coding as a language. They decode messages using special boards that has its own code for different letters. They create new codes by rearranging wires...
Curated OER
Smart Move!
Middle schoolers visualize a communication system. They encode, decode, transmit, receive and store messages. Students use a code sheet and flashlight for this process. They will also maintain a storage sheet from which they can retrieve...
Computer Science Unplugged
Tourist Town—Dominating Sets
As an introduction to using a network to determine the fewest number of nodes that meet a given condition, small groups work together to determine the fewest number of ice cream vans, and their locations, to be able to serve the people...
Curated OER
Cryptarithm: If Santa Did Exist
In this cryptarithm worksheet, learners decode an amusing puzzle that will prove the existence of Santa Claus. There is 1 encrypted puzzle to solve with a provided answer.
Curated OER
Communications: To the Rescue!
Students role-play as soldiers rescuing lost mountain climbers. Working in teams, they interpret maps to locate the climbers and use flashlights to send and receive coded messages about the rescue. Their goal is to complete the task in...