Please enable JavaScript to use CodeHS

KS 9-12: L2.NI.C.02

CodeHS Lessons

Use encryption and decryption algorithms to transmit/ receive an encrypted message.

Standard
23.4 Activity 4: Hiding and Revealing a Text Message
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
2.2 Symmetric Encryption
Standard
1.2 Encryption Algorithms
1.3 Advanced Cryptography
1.6 Asymmetric Encryption
Standard
10.4 Activity 4: Hiding and Revealing a Text Message
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
20.4 Activity 4: Hiding and Revealing a Text Message
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.3 Basic Crypto Systems: Caesar Cipher
2.4 Basic Crypto Systems: Cracking Caesar
2.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
21.1 Cryptography, Cryptology, Cryptanalysis
21.3 Why encrypt?
21.4 Basic Crypto Systems: Caesar Cipher
21.5 Basic Crypto Systems: Cracking Caesar
21.6 Basic Crypto Systems: Vigenere Cipher
21.7 Advanced Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.3 Basic Crypto Systems: Caesar Cipher
2.4 Basic Crypto Systems: Cracking Caesar
2.5 Basic Crypto Systems: Vigenere Cipher
4.2 Encryption Algorithms
4.3 Advanced Cryptography
4.6 Asymmetric Encryption
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
10.1 Cryptography, Cryptology, Cryptanalysis
10.3 Basic Crypto Systems: Caesar Cipher
10.4 Basic Crypto Systems: Cracking Caesar
10.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
11.1 Cryptography, Cryptology, Cryptanalysis
11.4 Basic Crypto Systems: Caesar Cipher
11.5 Basic Crypto Systems: Cracking Caesar
11.6 Basic Crypto Systems: Vigenere Cipher
11.7 Advanced Cryptography
Standard
8.4 Activity 4: Hiding and Revealing a Text Message
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.3 Basic Crypto Systems: Caesar Cipher
4.4 Basic Crypto Systems: Cracking Caesar
4.5 Basic Crypto Systems: Vigenere Cipher
5.2 Encryption Algorithms
5.3 Advanced Cryptography
5.6 Asymmetric Encryption
Standard
7.9 Cybersecurity
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.3 Basic Crypto Systems: Caesar Cipher
4.4 Basic Crypto Systems: Cracking Caesar
4.5 Basic Crypto Systems: Vigenere Cipher
Standard
8.1 Cryptography, Cryptology, Cryptanalysis
8.3 Basic Crypto Systems: Caesar Cipher
8.4 Basic Crypto Systems: Cracking Caesar
8.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.6 Cybersecurity
Standard
8.4 Activity 4: Hiding and Revealing a Text Message
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher