National Institute of Standards and Technology (NIST)
Fipsp: Authentication Technology Alternatives
These guidelines describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations toFederal agencies and departments for the acquisition and use of technology which supports...
University of Canterbury
University of Canterbury: Cs Unplugged: Dominating Sets
This activity explores the dominating set problem, and sets it up as the basis for a the public key encryption activity.
University of Canterbury
University of Canterbury: Cs Unplugged: Public Key Encryption
This student activity about public key encryption allows learners to simulate encrypt and decrpyt messages without having to share a password to unlock them.
Curated OER
Google for Education: Children and Technology: Privacy and Encryption
Young scholars simulate sending a secret message to a friend via the internet, attempting to deliver the message safely and securely.
Other
How Encryption Works and How It Will Change Your Business
A thorough discussion of the business and professional uses of encryption.
Other
Gilc: Cryptography and Liberty
This site from the Global Internet Liberty Campaign reports on a 1998 survey conducted by the Electronic Privacy Information Center which asked world nations about their encryption policies. The survey got results from over 75 nations,...
Other
Um: The Battle Over Cryptographic Key "Escrow"
This article describes the legal and technical issues involved in cryptography. It also discusses government proposals concerning the clipper chip.
American Rhetoric
American Rhetoric: Arthur W. Coviello: Rsa Conference Keynote Address
This is the text and video of Arthur W. Coviello's keynote speech at the RSA Conference delivered on February 25, 2014, in San Francisco, California.
American Rhetoric
American Rhetoric: Ashton Carter: Drell Lecture on Innovation and Cybersecurity
This is the text, audio, and video [40:52] of Secretary of Defense Ashton Carter's Drell Lecture on innovation and cybersecurity delivered on April 23, 2015, at Stanford University, in Palo Alto, California.
Khan Academy
Khan Academy: Public Key Encryption
Learn how public key encryption can protect computer data.
Khan Academy
Khan Academy: Symmetric Encryption Techniques
Learn how symmetric encryption techniques help protect computer data.
Khan Academy
Khan Academy: Encryption, Decryption, and Cracking
Find out about data encryption, decryption and cracking computer data to avoid virsus and cyberattacks.
Khan Academy
Khan Academy: The Need for Encryption
Find out why we need to encrypt computer data to avoid hackers.
Khan Academy
Khan Academy: Public Key Encryption
Learn how public key encryption can send that data safely between computer systems.
Khan Academy
Khan Academy: The Need for Encryption
A huge amount of private data is sent around the Internet every day: emails with details about our personal lives, passwords that we type into login screens, tax documents that we upload to servers. Learn more about the need for data...
Khan Academy
Khan Academy: Congruence Relation
A quick comprehension check over congruence relation.
Khan Academy
Khan Academy: Modular Multiplication
Practice problems over modular multiplication in cryptography.
Khan Academy
Khan Academy: Modular Addition
Practice problems for reviewing modular addition in cryptography.
Khan Academy
Khan Academy: Public Key Encryption
Check your understanding of cryptography and public key encryption.