Dakota State University
  • Home
  • Graduate Credit
  • Schedule
    • Session 1 >
      • Kick off Design Thinking Projects with the Extraordinaires
      • Brain Breaks and Academic Integrations
      • Flipping out over Flipgrid
      • Tech Tools for Storytelling
      • The *NEW* Google Classroom!
      • Gimkit
    • Session 2 >
      • Discover the Power of Global Learning for STEM Connections
      • Code Cracking & Cryptology
      • Citizen Science
      • Make Math Fun
      • Google Forms & Seesaw
      • Learning with Robots
    • Session 3 >
      • The Great Google Tour for STEM Educators
      • Simple Screen Recording for Teachers and Students
      • Telepresence Robots and Assistive Tech
      • Create & Innovate
      • Cybersecurity for All
      • Exploring with Edison
    • Ignite Talks
  • About
    • About Us

Cryptography – Cracking the Code – Solve the Secret Messages!

We will encrypt plain text and allow others to decrypt the cipher text.  We will provide three one-hour lessons as well as many other resources. 
 
Cryptography was started way before computers and cyber security.  In fact, the first recorded use of written cryptography was 1900 BC.    In a book by Liza Mundy, we find that women were hired to be cryptographers in WWII– deciphering text sent between Japanese invaders.  These female cryptographers work played a crucial role in ending World War II.
 
Modern cryptography uses sophisticated mathematical equations (algorithms) and secret keys to encrypt and decrypt data. Today, cryptography is used to provide secrecy and integrity to our data, and both authentication and anonymity to our communications.
 
Cryptography combines math, computing, and history. 

Resources

Cryptography lessons:
  • http://sites.psu.edu/cvclab/outreach/cryptopraphy-activities-for-k-12/
  • http://crypto.interactive-maths.com/downloadable-resources.html
  • https://gencyber.utulsa.edu/complete-lesson-plans/
  • http://www.educationworld.com/a_lesson/00-2/lp2207.shtml
  • http://www.pbs.org/wgbh/nova/education/activities/2101_codebrea.html
  • http://crypto.interactive-maths.com/
  • http://inventwithpython.com/cipherwheel/   (Cipher Wheel)
Picture
 Session 3
1:00 to 2:30

Presenter:

Pam Rowland
Dakota State University
​
<< SCHEDULE

Location

Funding

Picture
This material is based upon work supported by the National Science Foundation/EPSCoR Award No. IIA-1355423 and by the state of South Dakota.  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Other Info

Contact Us
​

FAQ

Dakota State University
​

​
  • Home
  • Graduate Credit
  • Schedule
    • Session 1 >
      • Kick off Design Thinking Projects with the Extraordinaires
      • Brain Breaks and Academic Integrations
      • Flipping out over Flipgrid
      • Tech Tools for Storytelling
      • The *NEW* Google Classroom!
      • Gimkit
    • Session 2 >
      • Discover the Power of Global Learning for STEM Connections
      • Code Cracking & Cryptology
      • Citizen Science
      • Make Math Fun
      • Google Forms & Seesaw
      • Learning with Robots
    • Session 3 >
      • The Great Google Tour for STEM Educators
      • Simple Screen Recording for Teachers and Students
      • Telepresence Robots and Assistive Tech
      • Create & Innovate
      • Cybersecurity for All
      • Exploring with Edison
    • Ignite Talks
  • About
    • About Us