Security Technologies: Encryption

Learning Resource Type

Learning Activity

Subject Area

Digital Literacy and Computer Science

Grade(s)

5

Overview

Students will understand and explain the security technologies of encryption and public keys and construct a complex system of numbers and/or letters to represent information.

This activity was created as a result of the DLCS COS Resource Development Summit.

Phase

During/Explore/Explain
Digital Literacy and Computer Science (2018) Grade(s): 5

DLCS18.5.1

Construct a complex system of numbers or letters to represent information.

UP:DLCS18.5.1

Vocabulary

  • code
  • cipher

Knowledge

Students know:
  • computer use a complex system of numbers or letters to represent and transmit information.
  • they can create a code or a complex system of numbers or letters to represent information.

Skills

Students are able to:
  • construct a complex system of numbers or letters to represent information.

Understanding

Students understand that:
  • there are an infinte amount of combinations for a complex system of numbers or letters to represent information.
  • computers use a complex system of numbers or letters to represent information.
Digital Literacy and Computer Science (2018) Grade(s): 5

DLCS18.5.9

Explain the proper use and operation of security technologies.

UP:DLCS18.5.9

Vocabulary

  • security technologies
  • password
  • login information
  • virus protection
  • malicious
  • spam filters
  • pop-up blocker

Knowledge

Students know:
  • software is installed to protect against malicious items.
  • users can protect their information by not sharing passwords or login information.

Skills

Students are able to:
  • explain to others how and why you should use strong passwords.
  • explain the causes and effects of someone having and using your password.
  • explain what SPAM, pop up blockers, and virus protection software can do.

Understanding

Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and to protect your personal information.

Learning Objectives

Students will:

understand and explain encryption and public keys as a security technology to protect private information.

construct a complex system of numbers and/or letters to represent information and use within the classroom, home, with friends, etc.

 

Activity Details

Students will:

  1. View and discuss Code.org’s video The Internet: Encryption and Public Keys, by Mia Epner, US National Intelligence Agency. 
  2. Test their ability to break the encryption of teacher-created secret codes. Examples: Message written from right to left on each line instead of left to right, a message written where the message is read every other letter or PigPen.
  3. Construct a complex system of numbers or letters to represent information with a partner or small group and write a message for the class to decode/decrypt.
  4. Work with their partner or group to decode/decrypt another group’s message.
  5. Vote and select one group’s system/cipher to begin using as a class.
  6. As a class, discuss how codes could protect private information.

 

Assessment Strategies

Students will be assessed based on their discussion of encryption and public keys after watching the video, ability to decode a cipher, and creation and use of a cipher.

Variation Tips

Research famous secret codes used throughout history such as the Caesar shift, Alberti’s disk, the Vigenère square, the Shugborough inscription, the Voynich manuscript, Hieroglyphs, the Enigma machine, Kryptos, RSA encryption, and The Pioneer plaques. More information about these codes, keys, and ciphers can be found in an article from The Guardian.

Background / Preparation

Pre-watch the video The Internet: Encryption and Public Keys.

Create at least three codes/ciphers for students to decrypt.

Research secret codes for kids and famous secret codes in history.

 

ALSDE LOGO