In this video, Harley moves in with Harry and makes Harry's life miserable. Harley spies on Harry writing in his diary. When Harley "borrows" the diary, he finds it is written in a code using numbers. Harley figures out a pattern with numbers and letters and decodes the page to find it is a message for Harley saying it is time to move out.
Figure out the secret code using your problem-solving skills. This activity from Zoom focuses on your critical thinking and operational skills to solve the problem and find the pattern. This video can be used during a lesson on encryption and secret codes.
Make a coded message called a scytale message to send to a friend. This activity from Zoom focuses on your ability to follow directions and requires a cylinder. This learning activity can be used during a lesson on encryption.
This activity involves listening to songs and finding hidden messages based on the same principle as a modem.
The binary number activity briefly mentions how text could be coded using sound — high and low beeps represent binary digits, which in turn can be decoded to numbers that represent the letters of the alphabet.
All data on computers is stored and transmitted using the binary number system. When the binary digits need to be sent over phone lines which used to be standard in home internet connections, the digits are converted to sound and decoded at the other end, using a modem. This activity uses an audio coding similar to that used by a modem, but the sounds are recorded as songs, which students can decode.
What is Cryptography? A story which takes us from Caesar to Claude Shannon. Created by Brit Cruise.
On the left side of the linked webpage, there are additional resources related to cryptology, including Caesar cipher, polyalphabetic cipher, and the Enigma machine.
Students have a discussion on the different levels of security they would like for personal data. Once the class has developed an understanding of the importance of privacy, they learn about the process of encrypting information by enciphering a note for a partner and deciphering the partner's note. The class concludes with a discussion about the importance of both physical and digital security.
Note: You will need to create a free account on code.org before you can view this resource.