Computer Science Unplugged
Kid Krypto–Public-Key Encryption
Class members have an opportunity to experience how to use a public key to encrypt information and a private key to decrypt it. Groups create their own public key and encrypt information then develop private keys to decrypt this...
Computer Science Unplugged
Sharing Secrets—Information Hiding Protocols
Did you know that you can find the average age of a group of people without anyone having to real their age? This resource provides directions for way to do just that. After the activity, class members read a short passage that provides...
Curated OER
Master Spy
Students explain that a code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers to send messages or to store information. They practice deciphering a variety of secret codes used in...
Curated OER
Secret Message
Students explore a woman war hero, Hannah Senesh, who used secret codes and messages to protect important information. They follow instructions to write their own secret messages.
Curated OER
Secret Sharing with Linear Equations
Students use linear equations to reveal a secret message. They practice writing linear equations from two ordered pairs. Students determine the y-intercept of the line from the equation. They reveal the secret message from the teacher.
Curated OER
Cryptography Implementation
Students explore cryptology. They write a research paper on cryptography. Using linear equations, students invent a code and write a secret message. Students complete cryptography puzzles.
Curated OER
Basic Crypto Systems II
Ninth graders discuss the Enigma machine used during World War II. They explore the substitution cipher and variations of it. Students examine the advantages and disadvantages of this cipher. Students write a message using the code...