Hi, what do you want to do?
Huntington Library
Huntington Library: Decoding the Civil War
This is a rich learning module where students explore the use of telegraphs and of Union codes during the Civil War. Both topics have an "Explainer" to introduce it, pre- and post-activities, and primary and secondary source materials to...
National Institute of Standards and Technology (NIST)
Fipsp: Authentication Technology Alternatives
These guidelines describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations toFederal agencies and departments for the acquisition and use of technology which supports...
Get Safe Online
Get Safe Online: Businesses
A comprehensive guide to protecting your business in today's digital world.
Texas Instruments
Texas Instruments: Numb3 Rs: Onion Peeler
Based off of the hit television show NUMB3RS, this lesson introduces students to the concept of changing number bases, as well as gives some insight into Internet privacy through "onion routing." Students translate hexadecimal numbers...
Texas Instruments
Texas Instruments: Numb3 Rs: Now You See It, Now You Don't
Based off of the hit television show NUMB3RS, this lesson is an introduction to a "different" type of coding, called steganography. In Steganography, images (or text) are split into layers, and then distorted in such a way so as to...
Shodor Education Foundation
Shodor Interactivate: Spy Game
Students will learn about modular arithmetic in order to decipher encrypted messages.
Texas Instruments
Texas Instruments: Numb3 Rs: How Hard Can It Be?
Based off of the hit television show NUMB3RS, this lesson introduces students to one way of defining the strength of an encryption (called "Entropy"). In the lesson, students learn how to calculate the entropy of a given code, and then...
Other
Um: The Battle Over Cryptographic Key "Escrow"
This article describes the legal and technical issues involved in cryptography. It also discusses government proposals concerning the clipper chip.
Massachusetts Institute of Technology
Mit: Open Course Ware: Introduction to Copyright Law
This MIT course covers a wide range of copyright issues in the digital age. Peer-to-peer file sharing, DVD encryption, fair use and GNU licensing are just a few of the topics discussed in the video lectures.
Other
Internet Library of Law and Court Decisions
The Internet Law Library features extensive summaries of court decisions shaping the law of the Web up to 2008. Issues include: intellectual property issues including copyright and trademark; jurisdiction; linking; framing; meta tags;...
Texas Instruments
Texas Instruments: Numb3 Rs: Message of the Bottle
Based off of the hit television show NUMB3RS, this lesson is best used to serve as a preliminary introduction to coding and encryption. Messages are ciphered by single-letter substitution, and the lesson guides students into deciphering...
ABCya
Ab Cya: Secret Message Maker
The ABCya Secret Message Maker is a fun way to create, share and solve secret messages! Simply type your message into the maker and press the button to encrypt it! Next you can choose to solve it on the computer, save it or print it out.
Khan Academy
Khan Academy: Shift Cipher
The use of the Shift Cipher to encrypt and decrypt information.
Khan Academy
Khan Academy: Xor and the One Time Pad
This article focuses on cipher codes especially XOR and the one-time pad. Let's look at a visual examples to see the different scrambling effects of AND vs. OR vs. XOR by encrypting an image. Here is a digital image of Charles Babbage.
Other
The World Wide Web Security Faq
Answers frequently asked questions relating to the security implications of running a Web server and using Web browsers.
Google
Google for Education: Ciphering a Sentence
For this lesson, the learners have a goal to map each alphabet letter to a number in the range 1-26. They use some simple rules to create this mapping and then use this mapping to encode a sentence.
TeachEngineering
Teach Engineering: Smart Move!
This is a simple activity to visualize a communication system. In order to do this the students encode, decode, transmit, receive, and store messages. They will use a code sheet and flashlight for this process. They will also maintain a...
REMC Association of Michigan
Remc Association of Michigan: 21 Things4 Students: 21. Computational Thinking
Computational thinking can be used to take a complex problem, understand what the problem is and develop possible solutions to solve or explain it. In these six Quest, students will learn about the four stages of computational thinking:...
Texas Instruments
Texas Instruments: Numb3 Rs: Coded Messages
Based off of the hit television show NUMB3RS, this lesson uses matrices (inverse and multiplication) to decode messages hidden within digital pictures -- a process known as steganography. This method of hidden communication is known to...
Texas Instruments
Texas Instruments: Numb3 Rs: Creating Codes
Based off of the hit show NUMB3RS, this lesson focuses on getting students to create ciphering codes. These codes are made in two different ways in this lesson: once with addition and once with multiplication. Students in this lesson are...
Texas Instruments
Texas Instruments: Numb3 Rs: Code Crackers
Based off of the hit television show NUMB3RS, this lesson introduced students to simple methods of cryptography, most notably the Caesar cipher. By sliding the alphabet a certain number of spaces, students code and decode messages, and...
Other
Cpsr: Cyber Rights
CPSR offers an informative discussion of current legal and policy topics hosted by group working for rights of assembly and speech for online communities.
Other
Global Internet Liberty Campaign: Regardless of Frontiers
"Protecting the Human Right to Freedom of Expression on the Global Internet" is the resource's topic. Lists the Global Internet Liberty Campaign's principles for promoting human rights and civil liberties. Introduction and overview...