+
Activity
Computer Science Unplugged

Kid Krypto–Public-Key Encryption

For Teachers 6th - 12th
Class members have an opportunity to experience how to use a public key to encrypt information and a private key to decrypt it. Groups create their own public key and encrypt information then develop private keys to decrypt this...
+
Activity
Computer Science Unplugged

Sharing Secrets—Information Hiding Protocols

For Teachers 4th - 12th
Did you know that you can find the average age of a group of people without anyone having to real their age? This resource provides directions for way to do just that. After the activity, class members read a short passage that provides...
+
Lesson Plan
Curated OER

Master Spy

For Teachers 3rd - 5th
Students explain that a code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers to send messages or to store information. They practice deciphering a variety of secret codes used in...
+
Lesson Plan
Curated OER

Secret Message

For Teachers 5th - 8th
Students explore a woman war hero, Hannah Senesh, who used secret codes and messages to protect important information. They follow instructions to write their own secret messages.
+
Lesson Plan
Curated OER

Secret Sharing with Linear Equations

For Teachers 9th - 12th
Students use linear equations to reveal a secret message. They practice writing linear equations from two ordered pairs. Students determine the y-intercept of the line from the equation. They reveal the secret message from the teacher.
+
Lesson Plan
Curated OER

Cryptography Implementation

For Teachers 9th - 10th
Students explore cryptology. They write a research paper on cryptography. Using linear equations, students invent a code and write a secret message. Students complete cryptography puzzles.
+
Lesson Plan
Curated OER

Basic Crypto Systems II

For Teachers 9th
Ninth graders discuss the Enigma machine used during World War II. They explore the substitution cipher and variations of it. Students examine the advantages and disadvantages of this cipher. Students write a message using the code...