ALEX Learning Activity

  

Security Technologies: Encryption

A Learning Activity is a strategy a teacher chooses to actively engage students in learning a concept or skill using a digital tool/resource.

You may save this Learning Activity to your hard drive as an .html file by selecting “File”,then “Save As” from your browser’s pull down menu. The file name extension must be .html.
  This learning activity provided by:  
Author: April Chamberlain
System:Trussville City
School:Trussville City Board Of Education
  General Activity Information  
Activity ID: 1990
Title:
Security Technologies: Encryption
Digital Tool/Resource:
The Internet: Encryption & Public Keys YouTube Video
Web Address – URL:
Overview:

Students will understand and explain the security technologies of encryption and public keys and construct a complex system of numbers and/or letters to represent information.

This activity was created as a result of the DLCS COS Resource Development Summit.

  Associated Standards and Objectives  
Content Standard(s):
Digital Literacy and Computer Science
DLIT (2018)
Grade: 5
1) Construct a complex system of numbers or letters to represent information.

Example: Student-created complex secret codes using more than one form to solve a problem or answer a question.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • construct a complex system of numbers or letters to represent information.
Teacher Vocabulary:
  • code
  • cipher
Knowledge:
Students know:
  • computer use a complex system of numbers or letters to represent and transmit information.
  • they can create a code or a complex system of numbers or letters to represent information.
Skills:
Students are able to:
  • construct a complex system of numbers or letters to represent information.
Understanding:
Students understand that:
  • there are an infinte amount of combinations for a complex system of numbers or letters to represent information.
  • computers use a complex system of numbers or letters to represent information.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 5
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • explain how to properly use security technologies and how they work.
Teacher Vocabulary:
  • security technologies
  • password
  • login information
  • virus protection
  • malicious
  • spam filters
  • pop-up blocker
Knowledge:
Students know:
  • software is installed to protect against malicious items.
  • users can protect their information by not sharing passwords or login information.
Skills:
Students are able to:
  • explain to others how and why you should use strong passwords.
  • explain the causes and effects of someone having and using your password.
  • explain what SPAM, pop up blockers, and virus protection software can do.
Understanding:
Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and to protect your personal information.
Learning Objectives:

Students will:

understand and explain encryption and public keys as a security technology to protect private information.

construct a complex system of numbers and/or letters to represent information and use within the classroom, home, with friends, etc.

 

  Strategies, Preparations and Variations  
Phase:
During/Explore/Explain
Activity:

Students will:

  1. View and discuss Code.org’s video The Internet: Encryption and Public Keys, by Mia Epner, US National Intelligence Agency. 
  2. Test their ability to break the encryption of teacher-created secret codes. Examples: Message written from right to left on each line instead of left to right, a message written where the message is read every other letter or PigPen.
  3. Construct a complex system of numbers or letters to represent information with a partner or small group and write a message for the class to decode/decrypt.
  4. Work with their partner or group to decode/decrypt another group’s message.
  5. Vote and select one group’s system/cipher to begin using as a class.
  6. As a class, discuss how codes could protect private information.

 

Assessment Strategies:

Students will be assessed based on their discussion of encryption and public keys after watching the video, ability to decode a cipher, and creation and use of a cipher.


Advanced Preparation:

Pre-watch the video The Internet: Encryption and Public Keys.

Create at least three codes/ciphers for students to decrypt.

Research secret codes for kids and famous secret codes in history.

 

Variation Tips (optional):

Research famous secret codes used throughout history such as the Caesar shift, Alberti’s disk, the Vigenère square, the Shugborough inscription, the Voynich manuscript, Hieroglyphs, the Enigma machine, Kryptos, RSA encryption, and The Pioneer plaques. More information about these codes, keys, and ciphers can be found in an article from The Guardian.

Notes or Recommendations (optional):
 
  Keywords and Search Tags  
Keywords and Search Tags: