View on GitHub

CyberSecurity

A curriculum for a high school cyber security course.

Public Key Cryptography

Overview

Students will learn about and practice public key encryption. Focus on asymmetric algorithms where the process is not the same in both directions.

Purpose

Objectives

Students will be able to:

Preparation

Teaching Guide

Getting Started:

Numberphile - Public Key Encryption

Activity

Wrap-up

Extended Learning

Read: The Code Book - Chapter 5 Alice and Bob go Public

After reading chapter 5 of The Code Book, reflect on the following questions and create a blog post on this topic. As with the previous blog posts, the idea is to have the post be informative, informal, as though you were independently interested in this topic and are writing a blog based on your curiosity.

This chapter focused on public key encryption.

Raspberry Pi: Buid an OctaPi

Standards Alignment

Indiana - CS3S-1.2 Indiana - CS3S-2.1

License

Cyber Security Curriculum Creative Commons License is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.