L.O: STUDENTS WILL EXPLORE SECRETS (ENCODING AND
DECODING).20-25 minutes
DO NOW: read Unit 2 Lab 6: Encryption, Page 1
Why do countries have spy agencies?
For You To Do
1. On a sheet of paper, make up a message to send to a partner. Invent some way of encoding the message, then send the encoded message to your partner.
2. When you get your partner's encoded message, try to decode it. What strategies are you using to decode the message?
3. Get together with another pair of students and compare the methods you used to encode your messages. Was anyone able to decode their message? How did they do it?
HOMEWORK:read Chapter 5 of “Blown to Bits”.
Reading through the entire chapter will be helpful, especially to get a better understanding of the
evolution of encryption methods and some details of public key encryption.
Learning Objectives:1. LO 6.3.1 Identify existing cybersecurity
concerns and potential options to address these issues with the Internet and the systems built on it. [P1]
2. LO 7.5.2 Evaluate online and print sources for appropriateness and credibility [P5]
Enduring Understandings:
1. EU 6.3 Cybersecurity is an important concern for the Internet and the systems built on it.
2. EU 7.5 An investigative process is aided by effective organization and selection of resources. Appropriate technologies and tools facilitate the accessing of information and enable the ability to evaluate the credibility of sources
Essential Knowledge:1. EK 1.2.5A The context in which an artifact is used
determines the correctness, usability, functionality, and suitability of the artifact.
2. EK 1.2.5B A computational artifact may have weaknesses, mistakes, or errors depending on the type of artifact.
3. EK 1.2.5C The functionality of a computational artifact may be related to how it is used or perceived.
4. EK 1.2.5D The suitability (or appropriateness) of a computational artifact may be related to how it is used or perceived.
5. EK 3.2.2D Maintaining privacy of large data sets containing personal information can be challenging.
Essential Knowledge:
• 6.EK 3.3.1A Digital data representations involve trade-offs related to storage, security, and privacy concerns.
• 7.EK 3.3.1B Security concerns engender trade-offs in storing and transmitting information.
• 8.EK 3.3.1F Security and privacy concerns arise with data containing personal information.
• 9. EK 5.4.1L An explanation of a program helps people understand the functionality and purpose of it.
• 10. EK 5.4.1M The functionality of a program is often described by how a user interacts with it
Essential Knowledge:• 11.EK 6.1.1A The Internet connects devices and networks all
over the world.• 12.EK 6.1.1D The Internet and the systems built on it facilitate
collaboration.• 13.EK 6.3.1A The trust model of the Internet involves trade-offs.• 14. EK 6.3.1B The DNS was not designed to be completely
secure.• 15. EK 6.3.1C Implementing cybersecurity has software,
hardware, and human components.• 16. EK 6.3.1D Cyber warfare and cyber crime have widespread
and potentially devastating effects
Essential Knowledge:
• 17. EK 6.3.1H Cryptography is essential to many models of cybersecurity.
• 18. EK 6.3.1I Cryptography has a mathematical foundation.• 19. EK 6.3.1J Open standards help ensure cryptography is
secure.• 20. EK 6.3.1K Symmetric encryption is a method of
encryption involving one key for encryption and decryption.
• 21. EK 6.3.1L Public key encryption, which is not symmetric, is an encryption method that is widely used because of the functionality it provides.
Essential Knowledge:• 22.EK 6.3.1M Certificate authorities (CAs) issue digital
certificates that validate the ownership of encrypted keys used in secured communications and are based on a trust model.
• 23.EK 7.3.1A Innovations enabled by computing raise legal and ethical concerns.
• 24.EK 7.3.1G Privacy and security concerns arise in the development and use of computational systems and artifacts.
• 25.EK 7.3.1L Commercial and governmental curation of information may be exploited if privacy and other protections are ignored.