Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
7663980
commit d71e17d
Showing
6 changed files
with
70 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,70 @@ | ||
--- | ||
title: Public Key Encryption | ||
type: page | ||
weight: 190 | ||
--- | ||
|
||
## Kid Krypto | ||
|
||
Public key encryption is an extraordinary recent development that has made internet commerce possible. | ||
It allows people to encrypt and decrpyt messages without having to share a password to unlock them. | ||
It is hard to believe that such a system could exist, yet this mode of encryption is widely used because it is so easy to set up. | ||
|
||
This activity works with two people, but it's most exciting with a whole class, with everybody else trying to intercept a message sent between two students. | ||
|
||
This activity is fairly demanding, and requires students to be careful in the way the encode messages. | ||
Also, the samples provided here are aimed at junior high students; some younger students may find it too difficult, and more capable or older students are likely to need more complex "maps" to make the encryption convincing, since the one provided can be solved relatively easily. | ||
Balancing the amount of tedious effort required for large maps against the insecurity of smaller maps needs to be done by the teacher, although this issue can be a discussion point for the class, since the goal is to understand the issues around encryption. | ||
|
||
![Public Key Encryption](/images/activities/public-key-encryption/public-key-encryption-cartoon.jpg) | ||
|
||
## Activity description (PDF) | ||
|
||
- [Instructions for Public Key Encryption activity (English)](/documents/activities/public-key-encryption/unplugged-18-public_key_encryption_0.pdf) | ||
|
||
### Translations and other versions | ||
|
||
- [Chinese language version](/documents/activities/public-key-encryption/Public-Key-Encryption-Chinese-Version.pdf) | ||
- [Polish language version](/documents/activities/public-key-encryption/18-CryptoKids_pl.pdf) | ||
- [Slovenian language version](/documents/activities/public-key-encryption/18-Kriptografija.pdf) | ||
|
||
## Video | ||
|
||
See our [video page]({{< ref "videos#public-key-encryption" >}}). | ||
|
||
## Related Resources | ||
|
||
### More lessons and activities | ||
|
||
- Misha Leder, a Software Engineer at Google has an activity called [ Privacy and Encryption](https://sites.google.com/site/childrenandtechnology/Home/presentation-6-privacy-and-encryption) which can be a nice extension activity on sending a secret message to your friend via Internet. | ||
- [The Royal Institution UK](https://www.rigb.org/) and [ Microsoft Research ](https://www.microsoft.com/en-us/research/?from=http%3A%2F%2Fresearch.microsoft.com%2Fen-us%2F) together have produced activities in encryption, cryptography, and zero knowledge protocols for the classroom at the locations below: | ||
- [Keeping secrets secret](http://www.rigb.org/christmaslectures08/html/activities/keeping-secrets-secret.pdf#page=1) | ||
- [Zero-knowledge games](http://www.rigb.org/christmaslectures08/html/activities/zero-knowledge-games.pdf#page=1) | ||
- [Frank Tapson – Centre for Innovation in Mathematics Teaching ](http://www.cimt.org.uk/) has an informative booklet on [Public Key Cryptography](http://www.cimt.org.uk/resources/topics/art003.pdf) developed as a resource for Modulo Arithmetic Maths Curriculum. | ||
- [Centre for Innovation in Mathematics Teaching ](http://www.cimt.org.uk/) has the following teaching package in Modern Encryption developed to teach Codes and Ciphers in their Maths Curriculum: Modern Encryption: [Teacher Guide](http://www.cimt.org.uk/resources/codes/codes_u16_tr.pdf), [Student Guide](http://www.cimt.org.uk/resources/codes/codes_u16_text.pdf), [ OHP Slides](http://www.cimt.org.uk/resources/codes/codes_u16_os.pdf), [Lesson Plans](http://www.cimt.org.uk/resources/codes/codes_u16_lp.pdf). | ||
- [Try Engineering ](https://tryengineering.org/) has an activity called [ Hand Biometrics Technology ](http://tryengineering.org/lesson-plans/hand-biometrics-technology) which explores how engineers incorporate biometrics technologies into products, but also explores the challenges of engineers who must weigh privacy, security and other issues when designing a system. Students explore different biometrics techniques, find their own hand geometry biometrics, then work in teams of "engineers" to design a high-tech security system for a museum. Download [ Full Lesson Plan ](http://tryengineering.org/wp-content/uploads/handbiometrics.pdf) and [ Student Worsksheets](https://tryengineering.wpengine.com/wp-content/uploads/handbiometrics_worksheet.rtf). | ||
- [CS4FN ](http://www.cs4fn.org/)has the following online activities/articles that demonstrates concepts in Binary and [ Gray code ](https://en.wikipedia.org/wiki/Gray_code): | ||
- [Locking a Dead Man’s Chest ](http://www.cs4fn.org/binary/lock/) | ||
- [The French Peasant's Lock and Gray Code](http://www.cs4fn.org/binary/lock/graylock.php) | ||
- [nrich Maths ](https://nrich.maths.org/frontpage) has the following activities with notes and solutions provided: | ||
- [The Public Key ](http://nrich.maths.org/2184) | ||
- [Public Key Cryptography ](http://nrich.maths.org/2200) | ||
- [The Knapsack Problem and Public Key Cryptography](http://nrich.maths.org/2199). See also [Knapsack ](https://nrich.maths.org/2195) | ||
|
||
### If you want to find out more | ||
|
||
- [Wikipedia: Public Key](http://en.wikipedia.org/wiki/Public_key) | ||
|
||
### Videos | ||
|
||
- [Hashing Algorithms and Security – Computerphile](https://www.youtube.com/watch?v=b4b8ktEV4Bg) | ||
- [Encryption and Security Agencies – Computerphile](https://www.youtube.com/watch?v=sWeVOXpTOhk) | ||
- [EXTRA BITS – Data Security and Flash Memory – Computerphile](https://www.youtube.com/watch?v=HQWFCDN9VZI) | ||
- [Security of Data on Disk – Computerphile](https://www.youtube.com/watch?v=4SSSMi4X_mA) | ||
- [Public Key Cryptography – Computerphile](https://www.youtube.com/watch?v=GSIDS_lvRv4) | ||
|
||
## Curriculum Links | ||
|
||
### Great Principles of Computer Science | ||
|
||
- Communication |
Binary file added
BIN
+182 KB
static/documents/activities/public-key-encryption/18-CryptoKids_pl.pdf
Binary file not shown.
Binary file added
BIN
+645 KB
static/documents/activities/public-key-encryption/18-Kriptografija.pdf
Binary file not shown.
Binary file added
BIN
+19.4 MB
static/documents/activities/public-key-encryption/Public-Key-Encryption-Chinese-Version.pdf
Binary file not shown.
Binary file added
BIN
+63.5 KB
static/documents/activities/public-key-encryption/unplugged-18-public_key_encryption_0.pdf
Binary file not shown.
Binary file added
BIN
+51.2 KB
static/images/activities/public-key-encryption/public-key-encryption-cartoon.jpg
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.