logo
         
Additional Lessons 1 - 10 of 25 for Cryptography
  1.   Cryptography and Geometry, Beyond the Triangular Grille
Cryptography and Geometry, Beyond the Triangular Grille Duncan Chiu (dchiu@dimacs.rutgers.edu) 1. Divide an equilateral triangle into three congruent parts (fig. 1). There should be 27 small triangles in each. 2. Number 1 through 27 in each part. You may arrange the 27 numbers randomly, but they must be identical in the thre...
User Rating:
    Grade Level: 6-8

  2.   Matrices In Encryption And Decryption Of Codes
Matrices In Encryption And Decryption Of Codes Carol West (cwwest@dimacs.rutgers.edu) Nancy Fedor (nfedor@dimacs.rutgers.edu) Chuck Tiberio (tiberio@dimacs.rutgers.edu) Category Cryptography, Matrices, Simultaneous Linear Equations The Problem The objective of the lesson is to relate Cryptography (Encryption And Decryption of Codes) to the solving of simultaneous linear equations in matrix notation. Students will study methods of encryption and decryption, such as Substitution, Caesar Cipher and Shi...
User Rating:
    Grade Level: 9-12

  3.   Grilling Algebra (Using a Rotating Grille to interest your students in Algebra)
...Grille. Girolamo Cardano, an Italian, has been credited with inventing the grille. Grilles can be made from any geometrical figure which is equilateral. This lesson will use a square grille, but please be creative. Category This packet of activities has been designed to interest Algebra students in cryptography while reinforcing algebraic ideas. Most activities can be used in Algebra I, II, or III. Grade Levels 9-12 (also grades 7 & 8 with slight revisions) Prerequisites After building a grille, most of the activities can be carried out with no prerequisites. Activity 1: Use a Rotating Grille to decode and code a messa...
User Rating:
    Grade Level: 6-8

  4.   Does the falling tree make a sound if no one if there to hear it? (or communication via encryption)
Does the falling tree make a sound if no one if there to hear it? (or communication via encryption) Elizabeth Gamburg (gamburg@dimacs.rutgers.edu) Janet Taubin (taubin@dimacs.rutgers.edu) General Information Using games and cryptography to promote the learning and understanding of transformational geometry and modulo systems. Category Geometry, cryptography, and modular arithmetic The Problem How can we promote communication while ensuring privacy and security? This is a question dating back to Roman times, when the first known code was Icreate...
User Rating:
    Grade Level: 9-12

  5.   Clock Arithmetic and Cryptography
Clock Arithmetic and Cryptography Abstract The following discussions and activities are designed to lead the students to practice their basic arithmetic skills by learning about clock arithmetic (aka modular arithmetic) and cryptography. The lesson can be done individually or in groups of any size. It is long, taking approximately 2 hours, but c...
User Rating:
    Grade Level: 3-5

  6.   Caesar Ciphers: An Introduction to Cryptography
Purdue GK-12 Lesson Plan 2006-07 Caesar Ciphers: An Introduction to Cryptography Purdue University GK-12 2006-07 Lead developer and contact: Lance Bryant Purdue GK-12 Fellow LBRYANT@MATH.PURDUE.EDU Co-author and instructor: JoAnn Ward Klondike Middle School Table of Contents CAESER CIPHERS: AN INTRODUCTION TO CRYPTOGRAPHY...............................................i TABLE OF CONTENTS.....
User Rating:
    Grade Level: K-12

  7.   Michael Sirois' GirlTech Pages--Cryptography Unit--Teacher's Info
Teacher page for the History and Analysis of Cryptography Unit Each layer in a system builds upon previous layers Topic: The history of cryptography and its current applications in our society. Michael Sirois, Lanier Middle School, Media 2000 Teachers using this lesson online: Your current URL is http://www.crpc.rice.edu/CRPC/GT/msirois/Lessons/crypto/teacher.html Send...
User Rating:
    Grade Level: 9-12

  8.   Cryptography Implementation
Cryptography Implementation Robert M. Scher (rscher@dimacs.rutgers.edu) New York City School Chancellor's theme of "literacy" was implement in math class with a term project in cryptography. Each student was asked to either: 1. do a research paper on cryptography, or 2. invent a code. write a secret message in code. provide...
User Rating:
    Grade Level: 6-8

  9.   A Programming Challenge in Cryptography
A Programming Challenge in Cryptography (by Eric Collazo) submitted by: Duncan Chiu (dchiu@dimacs.rutgers.edu The Problem Write a program to decode a string of digits and the character "O"', and print the hidden message. [Ex. Find the hidden message in 84581248O6096095854123337.] The Private Key Roman numerals: I = 12, V = 22, X = 24, Characters: O =...
User Rating:
    Grade Level: 9-12

  10.   Cryptography on the TI-83 Graphing Calculator
Cryptography on the TI-83 Graphing Calculator Lora Monfils (lmonfils@dimacs.rutgers.edu) Category Cryptography The Problem "Cryptography is the art of concealing the content of messages from an enemy who may be monitoring system activity." (DeMillo, et al., p.2) Throughout history information has been communicated with secre...
User Rating:
    Grade Level: 9-12


More Lesson Plans:   1 - 2 - 3 - Next

Copyright © 2014 Lesson Corner. All rights reserved.