Cryptography: Linking Learning and Life

by Joshua Newton, Ryan Pai, Mary Pennington, Jamie Sloat

Introduction
Anchor Video
Concept Map
Project Calendar
Lesson Plans
Letter to Parents
Assessments
Resources
Modifications
Grant

Cryptography Resources

 

Supplies and Materials:

Classroom Set (one per student) of:

TI-83 Graphing Calculators

Graph Paper (pads of 50 sheets)

Straight Edges

Internet Access Ready Computers

 

One Each of:

TI Graphing Calculator Projector

Overhead Projector

Doc Cam (if available, if not transperencies and markers)

 

Books & Print:

 

W.H. Freeman, Mathematics: Modeling our World.  Annotated Teacher’s Edition; Course 1. © 1998 (teacher resource)

 

W.H. Freeman, Mathematics: Modeling our World.  Student Edition; Course 1. © 1998 (student resource, need classroom set)

 

Singh, Simon. The Code Book for Young People: How to Make It, Break  It, Hack It, Crack It. © 2002 Delacorte Books for Young Readers.

 (history of codes, teacher and student resource, classroom set or just make copies of selected readings)

ISBN 385729138

 

Sinkov, Abraham. Elementary Cryptanalysis  : A Mathematical Approach. © 1998 The Mathematical Association of America.

teacher resource

ISBNÝ 883856220

 

WEBSITES

 

Teacher Resources:

http://www.webcom.com/nazgul/codeclass.html      Code lesson for accelerated students

 

 

 

Student Resources:

 

www.nsa.gov             (under About NSA; National Cryptologic Museum)  information on modulus and prime uses in coding

 

www.codesandciphers.com.uk  enigma simulator

 

http://www.iwm.org.uk/online/enigma/enigma2.htm  code examples

 

http://illuminations.nctm.org/mathlets/codes/index.html   interactive shift codes

 

http://codebreaker.dids.com/       Site with history and different codes

 

 

http://www.ugrad.cs.jhu.edu/~russell/classes/enigma/    Enigma Simulator

 

http://www.xat.nl/enigma/         Enigma Simulator

 

http://www.rsasecurity.com/rsalabs/faq/     Cryptography information site

 

http://world.std.com/~franl/crypto.html  cryptosystems: symmetric and asymmetric