Please enable JavaScript to use CodeHS

CA 9-12: 9-12.NI.7

CodeHS Lessons

Compare and contrast cryptographic techniques to model the secure transmission of information.

Standard
2.2 Symmetric Encryption
2.4 Authentication Methods
Standard
1.2 Encryption Algorithms
1.3 Advanced Cryptography
1.4 Hash Functions
1.5 Hash Function Development
1.6 Asymmetric Encryption
1.7 Digital Certificates
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.3 Basic Crypto Systems: Caesar Cipher
2.4 Basic Crypto Systems: Cracking Caesar
2.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
4.6 Cryptography, Cryptology, Cryptanalysis
4.7 Hash Functions
Standard
8.10 Cryptography
Standard
21.1 Cryptography, Cryptology, Cryptanalysis
21.3 Why encrypt?
21.4 Basic Crypto Systems: Caesar Cipher
21.5 Basic Crypto Systems: Cracking Caesar
21.6 Basic Crypto Systems: Vigenere Cipher
21.7 Advanced Cryptography
21.8 Hash Functions
21.9 Hash Function Development
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.3 Basic Crypto Systems: Caesar Cipher
2.4 Basic Crypto Systems: Cracking Caesar
2.5 Basic Crypto Systems: Vigenere Cipher
4.2 Encryption Algorithms
4.3 Advanced Cryptography
4.4 Hash Functions
4.5 Hash Function Development
4.6 Asymmetric Encryption
4.7 Digital Certificates
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
7.7 Cryptography
Standard
10.1 Cryptography, Cryptology, Cryptanalysis
10.3 Basic Crypto Systems: Caesar Cipher
10.4 Basic Crypto Systems: Cracking Caesar
10.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
11.1 Cryptography, Cryptology, Cryptanalysis
11.4 Basic Crypto Systems: Caesar Cipher
11.5 Basic Crypto Systems: Cracking Caesar
11.6 Basic Crypto Systems: Vigenere Cipher
11.7 Advanced Cryptography
11.8 Hash Functions
11.9 Hash Function Development
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods
Standard
6.10 Cryptography
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.3 Basic Crypto Systems: Caesar Cipher
4.4 Basic Crypto Systems: Cracking Caesar
4.5 Basic Crypto Systems: Vigenere Cipher
5.2 Encryption Algorithms
5.3 Advanced Cryptography
5.4 Hash Functions
5.5 Hash Function Development
5.6 Asymmetric Encryption
5.7 Digital Certificates
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.3 Basic Crypto Systems: Caesar Cipher
4.4 Basic Crypto Systems: Cracking Caesar
4.5 Basic Crypto Systems: Vigenere Cipher
4.6 Hash Functions
4.7 Hash Function Development
4.8 Digital Certificates
Standard
8.1 Cryptography, Cryptology, Cryptanalysis
8.3 Basic Crypto Systems: Caesar Cipher
8.4 Basic Crypto Systems: Cracking Caesar
8.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher