PBS
NOVA Cybersecurity Lab Lesson Plan
Don't be fooled by cyber scams! An informative lesson teaches techies about cybersecurity. They watch videos, play a game, and engage in discussion to improve their understanding of online safety.
PBS
NOVA Cybersecurity Lab Game
It's important to protect yourself online. An online game has pupils imagine themselves as cybersecurity specialists at a social networking company. They learn about ways to protect data online through a series of challenges.
CK-12 Foundation
Solving Equations Using the Pythagorean Theorem: Cryptography
Don't keep this resource a secret. Individuals learn to use the Pythagorean Theorem to find Pythagorean triples. They also see how Pythagorean triples can be useful in the field of cryptography to encrypt secret messages.
Institute of Electrical and Electronics Engineers
Public Keys, One Way Functions and Hard Problems
Use paint to teach about cryptography. Scholars explore public key cryptography by attempting to mix a secret color using paint. After the activity, they investigate the Diffie-Hellman method using prime numbers, exponents, and modular...
Code.org
Practice Performance Task - Security and Hacking in the Real World
Young computer scientists create a visual artifact that represents their research into a computing innovation in the world of cybersecurity. They then work individually to write an essay on the impact of technology on cybersecurity.
Code.org
Public Key Cryptography
Investigate how public key cryptography works. Scholars continue their study of one-way functions and asymmetric keys and apply this information to public key cryptography. They use an app to explore public key cryptography and its...
Bowland
German or English?
Sprechen sie Deutsch? Future cryptographers must decide whether an unknown text is written in English or in German. They use provided pie charts about the frequency of words in the English and German languages to help make their decisions.
EngageNY
The Power of Algebra—Finding Primes
Banks are responsible for keeping our financial information safe. Mathematics is what allows them to do just that! Pupils learn the math behind the cryptography that banks rely on. Using polynomial identities, learners reproduce the...
Computer Science Unplugged
Kid Krypto–Public-Key Encryption
Class members have an opportunity to experience how to use a public key to encrypt information and a private key to decrypt it. Groups create their own public key and encrypt information then develop private keys to decrypt this...
Curated OER
Mathematical Treasure Hunt
The hunt is on! Young mathematicians follow clues and complete a series of ten math puzzles as they try to crack Dr. Integer's code and find the location of his hidden treasure.
Computer Science Unplugged
Sharing Secrets—Information Hiding Protocols
Did you know that you can find the average age of a group of people without anyone having to real their age? This resource provides directions for way to do just that. After the activity, class members read a short passage that provides...
Curated OER
Cryptography and Cryptanalysis
In this cryptography and cryptanalysis worksheet, 8th graders read the explanation and example for codes and ciphers, then answer 2 questions and decipher 2 messages.
Curated OER
Breaking the Code
Students understand what cryptography is and how to design original number-based codes. In this cryptography activity, students research codes during World War II. Students develop number-based codes.
Curated OER
Caesar Ciphers: An Introduction to Cryptography
Students brainstorm and discuss the concept of cryptography, the science of secrets in today's world and then focus on a system for sending secret messages used by Julius Caesar. They make a Caesar wheel assessing encrypting and...
Curated OER
An Introduction to Public Key Cryptography
Students secure information online using cryptography. In this algebra lesson, students use RSA technology to encrypt information on the internet. They use modular reduction of natural numbers to understand prime number theory.
Curated OER
Cryptography and Cryptanalysis
In this cryptography/cryptanalysis worksheet, learners work with a group and use logic and cryptography techniques to solve problems.
Curated OER
Clock Arithmetic and Cryptography
Learners explore the concept of modular arithmetic and cryptography. In this modular arithmetic and cryptography lesson plan, students use applets to explore modular arithmetic using a clock and Caesar Ciphers. Learners exchange their...
Curated OER
History and Analysis of Cryptography
Students are introduced to the code systems and art of cryptography. As a class, they review prior knowledge and brainstorm lists. Using the internet, they research the history of codes and determine how they are structured. They also...
Curated OER
Matrices In Encryption And Decryption Of Codes
Students relate Cryptography to the solving of simultaneous linear equations in matrix notation. They explore various methods of encrypting and decrypting codes. Pupils discuss and solve simultaneous linear equations.
Curated OER
Cryptography on the TI-83 Graphing Calculator
High schoolers explore the history of cryptography. They assess function notation and transformation, matrix operations, and the fundamentals of modular arithmetic. Using graphing calculators, students develop their own encryption...
Curated OER
Clock Arithmetic and Cryptography
Students perform basic operations in modular (clock) arithmetic. Students encode and decode messages using shift and affine ciphers. Students apply their multiplication, division, addition, and subtraction skills.
Curated OER
Clock Arithmetic and Cryptography
High schoolers investigate modular clock arithmetic and cryptography. They perform basic operations in modular (clock) arithmetic and encode and decode messages using simple shift and affine ciphers.
Curated OER
Does the falling tree make a sound if no one if there to hear it? (or communication via encryption)
Students explore encryption. They discuss the importance of cryptography in our daily lives. Students use games and cryptography to discover transformational geometry and modulo systems. They design their own encryption puzzles and...
Massachusetts Institute of Technology
Mit: Open Course Ware: Network and Computer Security
This MIT course on network and computer security covers topics such as security in multi-user distributed systems, cryptography, authentication, intrusion detection, and many other security topics.