• Corpus ID: 245334394

Online Unplugged and Block-Based Cryptography in Grade 10

@article{Lodi2021OnlineUA,
  title={Online Unplugged and Block-Based Cryptography in Grade 10},
  author={Michael Lodi and Marco Sbaraglia and Simone Martini},
  journal={ArXiv},
  year={2021},
  volume={abs/2112.10437}
}
We report our experience of an extracurricular online intervention on cryptography principles in 10th grade. This paper’s first goal is to present the learning path we designed, influenced by cryptography core ideas rather than technical knowledge. We will detail how we used Snap! (a visual programming language) to realize hands-on activities: programming playgrounds to experiment with cryptosystems and their limits, and interactive support for an unplugged activity on the Diffie-Hellman key… 

Figures from this paper

References

SHOWING 1-10 OF 43 REFERENCES

Keeping secrets: K-12 students' understanding of cryptography

A mixed-methods investigation into the conception of secure messaging held by both K-12 students and pre-service teachers indicates that students first and foremost lack a clear understanding of networked communication that may prevent them from forming correct mental models about cybersecurity.

Teaching cryptography to undergraduate students in small liberal art schools

By carefully selecting a set of important, representative cryptography components, along with the devised model and diverse applications, students get a coherent sense and appreciation of cryptography and more importantly many students express interest in going on pursuing cryptography in graduate schools or professional fields.

Teaching cryptography with open-source software

Although not as full-featured and powerful as the commercial systems Maple and Mathematica, it is shown they are in fact admirably suited for a subject such as cryptography.

Using a Message Board as a Teaching Tool in an Introductory Cyber-Security Course

This work uses the message board to illustrate and teach important cyber-security concepts and common attacks such as the following: authentication and cookies, cross-site scripting and injection attacks, man-in-the-middle attack on public-key cryptography, password selection, and password-file management.

Two models of a cryptography and computer security class in a liberal arts context

  • S. Buchele
  • Computer Science, Education
    SIGCSE '13
  • 2013
An elective course in cryptography and computer security was developed that matched the talents of the professor and the resources and context of the two Universities and departments in which it was taught.

Scout patrol secret grilles: one more CS unplugged-style activity on cryptography

A new supplementary activity on symmetric key encryption is developed to give a broader understanding of Internet web browser security and its mathematical (cryptographic) principles to primary and secondary school students.

Explaining cryptographic systems

AESvisual: A Visualization Tool for the AES Cipher

AESvisual is quite versatile, providing support for both beginners learning how to encrypt and decrypt, and also for the more advanced users wishing to see all the details, including the GF(28) addition and multiplication operations.

Email for you (only?): design and implementation of a context-based learning process on internetworking and cryptography

A learning arrangement in which students in lower secondary school education are motivated to engage with cryptographic algorithms ranging from Caesar to RSA by making them discover the challenges of a private and trustable communication over public networks is described.

Educating the next generation of spammers

In the lab activities described, students do not engage in programming, yet they learn to think computationally by engaging in computational activities, and various challenges encountered through their implementation.