Lesson Plan
Curated OER

Coding with Linear Equation

For Teachers 7th - 10th
Students explore linear equations. They participate in a simulation to save the International Space Station from intruders. Students create linear equations to save the Space Station from aliens.
Lesson Plan
University of Canterbury

University of Canterbury: Cs Unplugged: Public Key Encryption

For Teachers 4th - 8th
This student activity about public key encryption allows learners to simulate encrypt and decrpyt messages without having to share a password to unlock them.
Article
Other

How Encryption Works and How It Will Change Your Business

For Students 9th - 10th
A thorough discussion of the business and professional uses of encryption.
eBook
Khan Academy

Khan Academy: The Need for Encryption

For Students 9th - 10th
A huge amount of private data is sent around the Internet every day: emails with details about our personal lives, passwords that we type into login screens, tax documents that we upload to servers. Learn more about the need for data...
eBook
Khan Academy

Khan Academy: Public Key Encryption

For Students 9th - 10th
Learn how public key encryption can protect computer data.
eBook
Khan Academy

Khan Academy: Symmetric Encryption Techniques

For Students 9th - 10th
Learn how symmetric encryption techniques help protect computer data.
eBook
Khan Academy

Khan Academy: Encryption, Decryption, and Cracking

For Students 9th - 10th
Find out about data encryption, decryption and cracking computer data to avoid virsus and cyberattacks.
eBook
Khan Academy

Khan Academy: The Need for Encryption

For Students 9th - 10th
Find out why we need to encrypt computer data to avoid hackers.
eBook
Khan Academy

Khan Academy: Public Key Encryption

For Students 9th - 10th
Learn how public key encryption can send that data safely between computer systems.
Unknown Type
Khan Academy

Khan Academy: Public Key Encryption

For Students 9th - 10th
Check your understanding of cryptography and public key encryption.
Article
Khan Academy

Khan Academy: Public Key Encryption

For Students 9th - 10th
Public Key Encryption, an asymmetric encryption technique, is used to allow computers to securely communicate. The high level process is explained in this article.
Article
Khan Academy

Khan Academy: Encryption, Decryption, and Cracking

For Students 9th - 10th
Julius Caesar encrypted messages two thousand years ago. By knowing the techniques of deciphering a code--frequency analysis, known text, and brute force--one can begin to understand the three key aspects of data encryption, decryption,...
Article
Khan Academy

Khan Academy: Symmetric Encryption Techniques

For Students 9th - 10th
Symmetric encryption techniques are explained including the Vigenere Cipher and AES-128.
Unknown Type
Khan Academy

Khan Academy: Symmetric Encryption

For Students 9th - 10th
Check your understanding of symmetric encryption techniques, in this set of free practice questions designed for AP Computer Science Principles students.
Handout
Wikimedia

Wikipedia: Encryption

For Students 9th - 10th
Wikipedia provides a basic definition of encryption, and distinguishes between the two encryption methods: symmetric and asymmetric key algorithms.
Handout
Wikimedia

Wikipedia: Disk Encryption

For Students 9th - 10th
A very brief encyclopedia article on disk encryption that defines the term and lists some common disk encryption software. Links to related information are also available.
Lesson Plan
Other

Curiosity in the Classroom: Principles of Encryption [Pdf]

For Teachers 9th - 10th
In a world where people are sharing information every second online, securing that information is paramount. In this lesson students will understand the principle of encryption, how to decode encryption, and how to construct ciphers. The...
Interactive
PBS

Pbs Nova: Send a Coded Message Virtual Enigma

For Students 9th - 10th
Explore the NOVA's Virtual Enigma machine used during WWII. You can send an encrypted message to a friend along with the special key needed to decipher the message. A link is also included to the Virtual Enigma.
Lesson Plan
University of Canterbury

University of Canterbury: Cs Unplugged: Dominating Sets

For Teachers 2nd - 8th
This activity explores the dominating set problem, and sets it up as the basis for a the public key encryption activity.
Lesson Plan
Curated OER

Google for Education: Children and Technology: Privacy and Encryption

For Teachers Pre-K - 1st
Students simulate sending a secret message to a friend via the internet, attempting to deliver the message safely and securely.
Activity
Texas Instruments

Texas Instruments: Numb3 Rs: Straddling Checkerboard

For Students 9th - 10th
Based off of the hit television show NUMB3RS, this lesson introduces students to a ciphering technique called the Straddling Checkerboard. In such an encryption scheme, all messages are turned into a series of numbers for transmission....
Article
Other

Dave Net: Bill Gates on Privacy

For Students 9th - 10th
Dave Winer ponders the issues of privacy on the Internet, citing an email from Bill Gates and discussing digital encryption. Goes into depth about the debate on free speech and censorship of the internet.
Primary
Other

Gilc: Cryptography and Liberty

For Students 9th - 10th
This site from the Global Internet Liberty Campaign reports on a 1998 survey conducted by the Electronic Privacy Information Center which asked world nations about their encryption policies. The survey got results from over 75 nations,...
Unknown Type
Khan Academy

Khan Academy: Cyber Codes Quiz

For Students 6th - 8th
Try this quiz about cyber encryption.

Other popular searches