Updating search results...

Search Resources

45 Results

View
Selected filters:
  • cryptography
Atbash Cipher
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This cipher was invented for the Hebrew alphabet, but it can work with any alphabet.  Many people believe it was used in the Bible and is older than Hieroglyphics! It was later adopted by other cultures, such as the Greeks and Romans, and used to encode messages in their respective languages. This lesson leads students the basics of cryptography.

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/30/2023
Black Women Code Breakers
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

There were many black women who worked as code breakers at Arlington Hall during World War II, including Elsie Scott, Sue Bailey Thurman, and Genevieve Collins. These women faced significant challenges and discrimination due to their race and gender, but they made significant contributions to the war effort through their work as code breakers.

Subject:
American History
Computer Science
History/Social Sciences
Material Type:
Lesson
Author:
CodeVA Curriculum
THEA CLARK
Date Added:
03/17/2023
Building Cryptosystems
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This video module presents an introduction to cryptography - the method of sending messages in such a way that only the intended recipients can understand them. In this very interactive lesson, students will build three different devices for cryptography and will learn how to encrypt and decrypt messages. There are no prerequisites for this lesson, and it has intentionally been designed in a way that can be adapted to many audiences. It is fully appropriate in a high school level math or computer science class where the teacher can use it to motivate probability/statistics or programming exercises. nteractive lesson, students will learn to build the cryptography devices and will learn how to send and ''crack'' secret messages.

Subject:
Computer Science
Material Type:
Lecture
Provider:
M.I.T.
Provider Set:
M.I.T. Blossoms
Author:
Daniel J. Sturtevant
Date Added:
05/24/2019
The Caesar cipher
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Brit explains the Caesar cipher, the first popular substitution cipher, and shows how it was broken with "frequency analysis". Created by Brit Cruise.

Subject:
Computer Science
Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Brit Cruise
Date Added:
07/07/2022
Choctaw Code Talkers
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will examine the history and culture of the Choctaw Native Americans, as well as the story of the Code Talkers in WW1, in order to memorialize one of the Choctaw Code Talkers. 

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/30/2023
Ciphers and Encryption Part 4: Book Ciphers
Unrestricted Use
CC BY
Rating
0.0 stars

The student or class will read about book ciphers and how they work.  Students will then be able to use a cipher provided to crack a secret message.  Teachers can edit the message to fit their needs and make adjustments as desired.  This is one mini lesson out of a series of five, this is lesson four and it can be completed alone, or with any of the other lessons.

Subject:
Networking and the Internet
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/18/2022
Code Girls
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Women code-breakers changed the course of WWII by cracking Japanese codes that revealed the movements of people and supplies in the Pacific Islands. In this lesson, students will learn how specific information discovered led to a turning point when cryptographers were able to pinpoint the plans of the Pearl Harbor Attack’s “architect”, Admiral Yamomoto.Students will examine videos and articles to find out more about this episode in history. In pairs or small groups, they’ll look at the US Post Office’s newly revealed stamp commemorating it. They’ll identify what they think are the pros and cons of the stamp and then design their own. 

Subject:
American History
Computer Science
History/Social Sciences
Material Type:
Lesson
Author:
CodeVA Curriculum
Lola Lloyd
Date Added:
03/17/2023
Crytography Breakout (US History I)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This breakout activity provides teachers and students an interactive way to demonstrate their learning about cryptography, code-breaking, and historic ciphers. Clues are provided, along with additional hints you can choose to provide to students so that students solve ciphers and learn what time their army is planning to raid the enemy camp.

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Thea Clark
Date Added:
11/30/2023
Culper Spy Ring
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will learn about one of the most significant and successful spy rings in American History. They will also actually conduct some of the same techniques and demonstrate them to the rest of the class.

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Thea Clark
Date Added:
11/30/2023
Frequency stability property short film
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Can you tell the difference between actions based upon flipping a coin and those based upon blind guessing or simulating randomness? This short video examines the frequency stability property. Created by Brit Cruise.

Subject:
Computer Science
Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Brit Cruise
Date Added:
07/07/2022
Josephine Baker - Hidden Messages
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

American performer Josephine Baker used her star-status access to spy for the Allies in WWII and convey information to the Allies by using invisible ink on her sheet music. We’ll look at a few methods that can be used to hide messages “in plain sight”?

Subject:
American History
Computer Science
History/Social Sciences
Material Type:
Lesson
Author:
CodeVA Curriculum
Lola Lloyd
Date Added:
03/17/2023
Masked Letters
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will learn about Mask Letters and their use in the Revolutionary War, then they will make masks and messages of their own and discuss the pros and cons of this method of sending and receiving secret messages. 

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/30/2023