Lab Name Introduction to Cryptography
Subject Area Mathematics, and Computer Science
Grade 6 - 7
Topic Cryptography
Experiment Title Introduction to Cryptography
Hardware
  • COSMOS Toolkit: Computer Node
Software
  • COSMOS Toolkit: Framework
Number of Sessions to teach the topic 1 session
Educational standards to be addressed CSTA K-12 Computer Science Standards (2011)
  • CI - Community, Global, and Ethical Impacts
  • CL - Collaboration
  • CPP - Computing Practice & Programming
  • CT - Computational Thinking
Computer Science Principles
  • 1.2 - Computing enables people to use creative development processes to create computational artifacts for creative expression or to solve a problem.
  • 3.3 - There are trade offs when representing information as digital data.
  • 6.3 - Cybersecurity is an important concern for the Internet and the systems built on it.
  • 7.3 - Computing has a global affect -- both beneficial and harmful -- on people and society.
  • 4.2 - Algorithms can solve many but not all computational problems.
  • 6.3 - Cybersecurity is an important concern for the Internet and the systems built on it.
COSMOS concepts to be used for the lab Network security (cryptography) is extremely important in wireless communication. Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network. It is a subset of network security that adds protection for a wireless computer network.The exponential increase in the use of mobile devices will lead to an increase in security threats. Devices on an unsecured wireless network are vulnerable to attacks. Unauthorized users can steal your personal files, conduct illegal activities, and monitor your web traffic on unsecure networks. Therefore, the use of cryptography is necessary.
K12 Educational Goals (How the educational goals are achieved through teaching using the experiment, how the topic is connected to the COSMOS concepts used) Students will be able to recognize that we use encryption everyday on the Internet. Students will be introduced to the field of cryptography and cyber security by learning about encryption and simple techniques for breaking (or cracking) secret messages. Students will use a tool that shows them about how long it would take to crack a given password using a standard desktop computer. The primary goal of the lesson is to understand how and why encryption plays a role in all of our daily lives. Students will learn how to crack a message with a Caesar cipher, using the COSMOS toolkit computer. They will also make connections to real-world cryptography and data privacy/security topics through this activity.
Short Description and Walk-through of the experiment Students will learn about cryptography and cybersecurity through an introduction to the Caesar cipher. Students will then also have an opportunity to complete an extension activity using the COSMOS toolkit to decode and send/receive secret messages.
Testbed mapping of the experiment Network security (cryptography) is extremely important in wireless communication. Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network. It is a subset of network security that adds protection for a wireless computer network.The exponential increase in the use of mobile devices will lead to an increase in security threats. Devices on an unsecured wireless network are vulnerable to attacks. Unauthorized users can steal your personal files, conduct illegal activities, and monitor your web traffic on unsecure networks. Therefore, the use of cryptography is necessary.

Experiment Execution

Students will use the terminal to complete the activity.

Experiment Material

NGSS Lesson Plan
Worksheet
Instructions
Ceasar Cypher

© 2019 COSMOS Project. Created by Basil Masood, The Mott Hall School.