Hi, what do you want to do?
Curated OER
Coding with Linear Equation
Students explore linear equations. They participate in a simulation to save the International Space Station from intruders. Students create linear equations to save the Space Station from aliens.
University of Canterbury
University of Canterbury: Cs Unplugged: Public Key Encryption
This student activity about public key encryption allows learners to simulate encrypt and decrpyt messages without having to share a password to unlock them.
Other
How Encryption Works and How It Will Change Your Business
A thorough discussion of the business and professional uses of encryption.
Khan Academy
Khan Academy: The Need for Encryption
A huge amount of private data is sent around the Internet every day: emails with details about our personal lives, passwords that we type into login screens, tax documents that we upload to servers. Learn more about the need for data...
Khan Academy
Khan Academy: Public Key Encryption
Learn how public key encryption can protect computer data.
Khan Academy
Khan Academy: Symmetric Encryption Techniques
Learn how symmetric encryption techniques help protect computer data.
Khan Academy
Khan Academy: Encryption, Decryption, and Cracking
Find out about data encryption, decryption and cracking computer data to avoid virsus and cyberattacks.
Khan Academy
Khan Academy: The Need for Encryption
Find out why we need to encrypt computer data to avoid hackers.
Khan Academy
Khan Academy: Public Key Encryption
Learn how public key encryption can send that data safely between computer systems.
Khan Academy
Khan Academy: Public Key Encryption
Check your understanding of cryptography and public key encryption.
Khan Academy
Khan Academy: Public Key Encryption
Public Key Encryption, an asymmetric encryption technique, is used to allow computers to securely communicate. The high level process is explained in this article.
Khan Academy
Khan Academy: Encryption, Decryption, and Cracking
Julius Caesar encrypted messages two thousand years ago. By knowing the techniques of deciphering a code--frequency analysis, known text, and brute force--one can begin to understand the three key aspects of data encryption, decryption,...
Khan Academy
Khan Academy: Symmetric Encryption Techniques
Symmetric encryption techniques are explained including the Vigenere Cipher and AES-128.
Khan Academy
Khan Academy: Symmetric Encryption
Check your understanding of symmetric encryption techniques, in this set of free practice questions designed for AP Computer Science Principles students.
Wikimedia
Wikipedia: Encryption
Wikipedia provides a basic definition of encryption, and distinguishes between the two encryption methods: symmetric and asymmetric key algorithms.
Wikimedia
Wikipedia: Disk Encryption
A very brief encyclopedia article on disk encryption that defines the term and lists some common disk encryption software. Links to related information are also available.
Other
Curiosity in the Classroom: Principles of Encryption [Pdf]
In a world where people are sharing information every second online, securing that information is paramount. In this lesson students will understand the principle of encryption, how to decode encryption, and how to construct ciphers. The...
PBS
Pbs Nova: Send a Coded Message Virtual Enigma
Explore the NOVA's Virtual Enigma machine used during WWII. You can send an encrypted message to a friend along with the special key needed to decipher the message. A link is also included to the Virtual Enigma.
University of Canterbury
University of Canterbury: Cs Unplugged: Dominating Sets
This activity explores the dominating set problem, and sets it up as the basis for a the public key encryption activity.
Curated OER
Google for Education: Children and Technology: Privacy and Encryption
Students simulate sending a secret message to a friend via the internet, attempting to deliver the message safely and securely.
Texas Instruments
Texas Instruments: Numb3 Rs: Straddling Checkerboard
Based off of the hit television show NUMB3RS, this lesson introduces students to a ciphering technique called the Straddling Checkerboard. In such an encryption scheme, all messages are turned into a series of numbers for transmission....
Other
Dave Net: Bill Gates on Privacy
Dave Winer ponders the issues of privacy on the Internet, citing an email from Bill Gates and discussing digital encryption. Goes into depth about the debate on free speech and censorship of the internet.
Other
Gilc: Cryptography and Liberty
This site from the Global Internet Liberty Campaign reports on a 1998 survey conducted by the Electronic Privacy Information Center which asked world nations about their encryption policies. The survey got results from over 75 nations,...