Dakota State University
  • Home
  • Register
  • About
    • About Us
    • Graduate Credit
    • Twitter Updates
  • Schedule
    • Session 1 >
      • Get Creative with Google Slides and Drawings
      • Google Forms
      • Twitter
      • Assistive Technology
      • Science Resources
      • Adobe Spark
    • Session 2 >
      • Crafting Questions that Drive Projects
      • Google Classroom
      • EdPuzzle
      • Weebly
      • Engineering Design
      • Coding in the K-12 Classroom
    • Session 3 >
      • iPads as the Teacher's Pet
      • Thinking Out Loud: Using Video and Audio Tools In Your Classroom
      • CS First
      • Cryptography Cracking the Code
      • Where Math + Tech = Amazing!
      • Book Snaps

Cryptography – Cracking the Code – Solve the Secret Messages!

We will encrypt plain text and allow others to decrypt the cipher text.  We will provide three one-hour lessons as well as many other resources. 
 
Cryptography was started way before computers and cyber security.  In fact, the first recorded use of written cryptography was 1900 BC.    In a book by Liza Mundy, we find that women were hired to be cryptographers in WWII– deciphering text sent between Japanese invaders.  These female cryptographers work played a crucial role in ending World War II.
 
Modern cryptography uses sophisticated mathematical equations (algorithms) and secret keys to encrypt and decrypt data. Today, cryptography is used to provide secrecy and integrity to our data, and both authentication and anonymity to our communications.
 
Cryptography combines math, computing, and history. 

Resources

Cryptography lessons:
  • http://sites.psu.edu/cvclab/outreach/cryptopraphy-activities-for-k-12/
  • http://crypto.interactive-maths.com/downloadable-resources.html
  • https://gencyber.utulsa.edu/complete-lesson-plans/
  • http://www.educationworld.com/a_lesson/00-2/lp2207.shtml
  • http://www.pbs.org/wgbh/nova/education/activities/2101_codebrea.html
  • http://crypto.interactive-maths.com/
  • http://inventwithpython.com/cipherwheel/   (Cipher Wheel)
Picture
 Session 3
1:00 to 2:30

Presenter:

Pam Rowland
Dakota State University
​
<< SCHEDULE

Location

Funding

Picture
This material is based upon work supported by the National Science Foundation/EPSCoR Award No. IIA-1355423 and by the state of South Dakota.  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Other Info

Contact Us
​

FAQ

Dakota State University
​

​
  • Home
  • Register
  • About
    • About Us
    • Graduate Credit
    • Twitter Updates
  • Schedule
    • Session 1 >
      • Get Creative with Google Slides and Drawings
      • Google Forms
      • Twitter
      • Assistive Technology
      • Science Resources
      • Adobe Spark
    • Session 2 >
      • Crafting Questions that Drive Projects
      • Google Classroom
      • EdPuzzle
      • Weebly
      • Engineering Design
      • Coding in the K-12 Classroom
    • Session 3 >
      • iPads as the Teacher's Pet
      • Thinking Out Loud: Using Video and Audio Tools In Your Classroom
      • CS First
      • Cryptography Cracking the Code
      • Where Math + Tech = Amazing!
      • Book Snaps