Please enable JavaScript to use CodeHS

CYBER ORG 9-12: 9-12.SEC.CRYP

CodeHS Lessons

Analyze how modern advancements in computing have impacted encryption. Clarification statement: At this level, student discussions should focus on previous standards as well as grade-appropriate examples of modern advancements in encryption, such as symmetric vs. asymmetric, public key vs. private key, and encryption algorithms. Where appropriate, discussions may touch on how methods for encoding data, such as binary (base-2), decimal (base-10), and hexadecimal (base-16), can benefit encryption.

Standard
1.3 Advanced Cryptography
1.4 Hash Functions
1.5 Hash Function Development
1.6 Asymmetric Encryption
Standard
21.7 Advanced Cryptography
21.8 Hash Functions
21.9 Hash Function Development
Standard
4.3 Advanced Cryptography
4.4 Hash Functions
4.5 Hash Function Development
4.6 Asymmetric Encryption
Standard
11.7 Advanced Cryptography
11.8 Hash Functions
11.9 Hash Function Development
Standard
2.3 Asymmetric Encryption
Standard
2.3 Asymmetric Encryption
Standard
5.3 Advanced Cryptography
5.4 Hash Functions
5.5 Hash Function Development
5.6 Asymmetric Encryption
Standard
4.6 Hash Functions
4.7 Hash Function Development