Quantum Cryptography Explained

Learning Resource Type

Classroom Resource

Subject Area

Digital Literacy and Computer Science

Grade(s)

7, 9, 10, 11, 12

Overview

With recent high-profile security decryption cases, encryption is more important than ever. Much of your browser usage and your smartphone data is encrypted. But what does that process actually entail? And when computers get smarter and faster due to advances in quantum physics, how will encryption keep up? This video can be played during a lesson on identifying common methods of securing data.

Digital Literacy and Computer Science (2018) Grade(s): 7

DLCS18.7.9

Identify common methods of securing data.

UP:DLCS18.7.9

Knowledge

Students know:
  • data needs to be shared but not altered.

Skills

Students are able to:
  • identify measures to secure data.

Understanding

Students understand that:
  • data may need to be protected either physically or digitally.
Digital Literacy and Computer Science (2018) Grade(s): 09-12

DLCS18.HS.29

Summarize the role of compression and encryption in modifying the structure of digital artifacts and the varieties of information carried in the metadata of these artifacts.

UP:DLCS18.HS.29

Vocabulary

  • compression
  • encryption
  • metadata

Knowledge

Students know:
  • that when a file is altered in any way, changes may be seen in the file metadata.
  • compression and encryption are two methods used when sharing data.

Skills

Students are able to:
  • explain the roles of compression and encryption.
  • summarize the effects of compression and encryption on the metadata of a digital artifact.

Understanding

Students understand that:
  • any process applied to data has the potential to alter the structure of the data.
  • it is important to be aware of potential changes to data structure when electing to use a process.

CR Resource Type

Audio/Video

Resource Provider

PBS

License Type

CUSTOM

Accessibility

Video resources: includes closed captioning or subtitles
ALSDE LOGO