University of Ottawa (Canada)
University of Ottawa: Linear Algebra Close to Earth
The author of this site endeavours to explain how linear algebra has many applications in a wide range of disciplines, to help students see its uses in the real world.
US National Archives
Nara: Teaching With Documents: The Zimmerman Telegram
This is an excellent resource for anyone intersted in the Zimmermann Telegram: click to see the original coded message, the decoded message, and read about the implications of the telegram. This National Archives and Records...
Massachusetts Institute of Technology
Mit: Open Course Ware: Great Ideas in Theoretical Computer Science
A complete course on theoretical Computer Science presented at the college undergraduate level. The course attempts to describe Computer Science beyond the computer, focusing on mathematical tools, complex systems and classic problems,...
National Institute of Standards and Technology (NIST)
Fipsp: Authentication Technology Alternatives
These guidelines describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations toFederal agencies and departments for the acquisition and use of technology which supports...
Other
Center for Democracy and Technology
A public interest organization working for public policies that advance civil liberties and democratic values in information technologies. Contains links to information on free speech, data privacy, wiretapping, and cryptography.
National Council of Teachers of Mathematics
Nctm: Illuminations: Codes
This is a computer based program that allows students to understand basic cryptography which utilizes transformations of shifting and stretching. Students may encode their own message and see it graphically.
Other
Marshall Foundation: The Shakespearean Ciphers Examined
Both William and Elizebeth Friedman worked at Riverbank Laboratories. Elizebeth was tasked with applying cryptographic techniques to analyze William Shakespeare's writings in order to prove that they were in fact written by Francis...
Shodor Education Foundation
Shodor Interactivate: Lesson: Clock Arithmetic and Cryptography
This lesson plan is designed to guide students in practicing their basic arithmetic skills by learning about clock arithmetic and cryptography. Linked resources include helpful applets.
Wikimedia
Wikipedia: Code Talker
This encyclopedia entry from Wikipedia explores the role of Native American code talkers during World War II. Content focuses on how the code was developed, as well as why the code remained unbroken throughout the duration of the war.
Other
How Encryption Works and How It Will Change Your Business
A thorough discussion of the business and professional uses of encryption.
Other
Gilc: Cryptography and Liberty
This site from the Global Internet Liberty Campaign reports on a 1998 survey conducted by the Electronic Privacy Information Center which asked world nations about their encryption policies. The survey got results from over 75 nations,...
Other
Um: The Battle Over Cryptographic Key "Escrow"
This article describes the legal and technical issues involved in cryptography. It also discusses government proposals concerning the clipper chip.
Mathigon
Mathigon: Mathematical Treasure Hunt
The mathematical treasure hunt allows students to follow a trail of clues and mathematical problems around the school site; each clue contains a hint to where the next clue is hidden.
Mathigon
Mathigon: Mathematical Treasure Hunt
The mathematical treasure hunt allows students to follow a trail of clues and mathematical problems around the school site; each clue contains a hint to where the next clue is hidden.
Mathigon
Mathigon: Math Foundations: Divisibility and Primes: Real Life Applications
This lesson provides real life applications for divisibility and prime numbers including the Cicada Cycle's use of prime numbers and Cryptography,encryption.
Khan Academy
Khan Academy: Congruence Relation
A quick comprehension check over congruence relation.
Khan Academy
Khan Academy: Modular Multiplication
Practice problems over modular multiplication in cryptography.
Khan Academy
Khan Academy: Modular Addition
Practice problems for reviewing modular addition in cryptography.
Khan Academy
Khan Academy: Public Key Encryption
Check your understanding of cryptography and public key encryption.
Cuemath
Cuemath: Prime Factorization
In this lesson, you will be learning prime factorization to solve various mathematical problems followed by solved examples and practice questions.
Khan Academy
Khan Academy: Xor and the One Time Pad
This article focuses on cipher codes especially XOR and the one-time pad. Let's look at a visual examples to see the different scrambling effects of AND vs. OR vs. XOR by encrypting an image. Here is a digital image of Charles Babbage.