Learning Resource Type

Learning Activity

Security Technologies: Encryption

Subject Area

Digital Literacy and Computer Science

Grade(s)

5

Overview

Students will understand and explain the security technologies of encryption and public keys and construct a complex system of numbers and/or letters to represent information.

This activity was created as a result of the DLCS COS Resource Development Summit.

    Digital Literacy and Computer Science (2018) Grade(s): 5

    DLCS18.5.1

    Construct a complex system of numbers or letters to represent information.

    Unpacked Content

    UP:DLCS18.5.1

    Vocabulary

    • code
    • cipher

    Knowledge

    Students know:
    • computer use a complex system of numbers or letters to represent and transmit information.
    • they can create a code or a complex system of numbers or letters to represent information.

    Skills

    Students are able to:
    • construct a complex system of numbers or letters to represent information.

    Understanding

    Students understand that:
    • there are an infinte amount of combinations for a complex system of numbers or letters to represent information.
    • computers use a complex system of numbers or letters to represent information.
    Digital Literacy and Computer Science (2018) Grade(s): 5

    DLCS18.5.9

    Explain the proper use and operation of security technologies.

    Unpacked Content

    UP:DLCS18.5.9

    Vocabulary

    • security technologies
    • password
    • login information
    • virus protection
    • malicious
    • spam filters
    • pop-up blocker

    Knowledge

    Students know:
    • software is installed to protect against malicious items.
    • users can protect their information by not sharing passwords or login information.

    Skills

    Students are able to:
    • explain to others how and why you should use strong passwords.
    • explain the causes and effects of someone having and using your password.
    • explain what SPAM, pop up blockers, and virus protection software can do.

    Understanding

    Students understand that:
    • proper use and operation of security technologies is important to keep a device working correctly and to protect your personal information.

    Phase

    During/Explore/Explain
    Learning Objectives

    Learning Objectives

    Students will:

    understand and explain encryption and public keys as a security technology to protect private information.

    construct a complex system of numbers and/or letters to represent information and use within the classroom, home, with friends, etc.

     

    Activity Details

    Students will:

    1. View and discuss Code.org’s video The Internet: Encryption and Public Keys, by Mia Epner, US National Intelligence Agency. 
    2. Test their ability to break the encryption of teacher-created secret codes. Examples: Message written from right to left on each line instead of left to right, a message written where the message is read every other letter or PigPen.
    3. Construct a complex system of numbers or letters to represent information with a partner or small group and write a message for the class to decode/decrypt.
    4. Work with their partner or group to decode/decrypt another group’s message.
    5. Vote and select one group’s system/cipher to begin using as a class.
    6. As a class, discuss how codes could protect private information.

     

    Assessment Strategies

    Assessment Strategies

    Students will be assessed based on their discussion of encryption and public keys after watching the video, ability to decode a cipher, and creation and use of a cipher.

    Variation Tips

    Research famous secret codes used throughout history such as the Caesar shift, Alberti’s disk, the Vigenère square, the Shugborough inscription, the Voynich manuscript, Hieroglyphs, the Enigma machine, Kryptos, RSA encryption, and The Pioneer plaques. More information about these codes, keys, and ciphers can be found in an article from The Guardian.

    Background and Preparation

    Background / Preparation

    Pre-watch the video The Internet: Encryption and Public Keys.

    Create at least three codes/ciphers for students to decrypt.

    Research secret codes for kids and famous secret codes in history.

     

    Digital Tools / Resources

    ALSDE LOGO