Curated OER
Transposition Cryptography
Students differentiate the types of cryptosystems and use them to communicate privately. In this algebra instructional activity, students use substitution and transposition to identify the cryptographs. They send and receive cryptograms...
Code.org
Practice Performance Task - Security and Hacking in the Real World
Young computer scientists create a visual artifact that represents their research into a computing innovation in the world of cybersecurity. They then work individually to write an essay on the impact of technology on cybersecurity.
Computer Science Unplugged
Kid Krypto–Public-Key Encryption
Class members have an opportunity to experience how to use a public key to encrypt information and a private key to decrypt it. Groups create their own public key and encrypt information then develop private keys to decrypt this...
Bowland
German or English?
Sprechen sie Deutsch? Future cryptographers must decide whether an unknown text is written in English or in German. They use provided pie charts about the frequency of words in the English and German languages to help make their decisions.
PBS
NOVA Cybersecurity Lab Game
It's important to protect yourself online. An online game has pupils imagine themselves as cybersecurity specialists at a social networking company. They learn about ways to protect data online through a series of challenges.
PBS
NOVA Cybersecurity Lab Lesson Plan
Don't be fooled by cyber scams! An informative lesson teaches techies about cybersecurity. They watch videos, play a game, and engage in discussion to improve their understanding of online safety.
Computer Science Unplugged
The Peruvian Coin Flip–Cryptographic Protocols
A digital flip. Introduce your classes to cryptographic protocols using and, or, and not gates. Groups create a complete circuit to convert a binary number into another one. This type of one-way function allows pupils to verify the...
Curated OER
Grilling Algebra
Students use a grille to investigate geometry. The application of the geometric figure, which is square, the students begin the coding of a message. The use of cryptography is used to reinforce algebraic ideas.
Code.org
Keys and Passwords
Scholars explore the relationship between cipher keys and passwords and as they learn more about the Vigenere cipher and continue to read from the book Blown to Bits in the seventh lesson plan of the series. They conduct an activity...
Code.org
The Need for Encryption
Scholars investigate the need for encryption as they read a portion of the book Blown to Bits and discuss encryption techniques. They finish by attempting to decode a message written using a Caesar cipher.
Curated OER
Coding History
Young scholars study the topic of codes in Computer Science. They research it history, divisions in the field and its applications. The lesson plan also includes a brief overview of the information technology theory.
Curated OER
Sieve of Eratosthenes
Students discover the Sieve of Erathosthenes. They explore a method to find all the prime numbers in a group of numbers. Using models, students practice divisibility rules while examining the difference between prime and composite numbers.
Curated OER
Informational Writing: Business Letter
Fifth graders write business letters. In this business letter instructional activity, 5th graders discuss the format and reasons for writing a business letter. They pick who they want to write to and create their own letter.
Other popular searches
- Matrix Cryptography
- Matrices Cryptography
- Cryptography Poe
- Conventional Cryptography
- Cesar Cryptography
- Ceasar Cryptography
- Cryptography Lessons
- Cryptography Implementation
- Cryptography + Poe
- Cryptography \ Poe