With recent high-profile security decryption cases, encryption is more important than ever. Much of your browser usage and your smartphone data is encrypted. But what does that process actually entail? And when computers get smarter and faster due to advances in quantum physics, how will encryption keep up? This video can be played during a lesson on identifying common methods of securing data.
This video will walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure.
The world is a noisy place, and errors can occur whenever information is stored or transmitted. Error detection techniques add extra parity bits to data to determine when errors have occurred.
This activity is a magic trick which most audiences find intriguing. In the trick the demonstrator is “magically” able to figure which one out of dozens of cards has been turned over, using the same methods that computers use to figure out if an error has occurred in data storage.
What is Cryptography? A story which takes us from Caesar to Claude Shannon. Created by Brit Cruise.
On the left side of the linked webpage, there are additional resources related to cryptology, including Caesar cipher, polyalphabetic cipher, and the Enigma machine.
In this lesson, students look at how data is collected and used by organizations to solve problems in the real world. The lesson begins with a quick review of the data problem-solving process they explored in the last lesson. Then students are presented with three scenarios that could be solved using data, brainstorm the types of data they would want to solve them, and how they could collect the data. Each problem is designed to reflect a real-world service that exists. After brainstorming, students watch a video about a real-world service and record notes about what data is collected by the real-world service and how it is used. At the end of the lesson, students record whether data was provided actively by a user, was recorded passively, or is collected by sensors.
Note: You will need to create a free account on code.org before you can view this resource.