WI 9-12: NI2.d.3.h

CodeHS Lessons

Write a program that performs basic encryption (e.g., shift cipher, substitution cipher).

 Standard 8.10 Cryptography
 Standard 41.1 Cryptography
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis 5.3 Basic Crypto Systems: Caesar Cipher 5.4 Basic Crypto Systems: Cracking Caesar 5.5 Basic Crypto Systems: Vigenere Cipher
 Standard 1.2 Encryption Algorithms 1.5 Hash Function Development
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis 5.3 Basic Crypto Systems: Caesar Cipher 5.4 Basic Crypto Systems: Cracking Caesar 5.5 Basic Crypto Systems: Vigenere Cipher
 Standard 2.1 Cryptography, Cryptology, Cryptanalysis 2.3 Basic Crypto Systems: Caesar Cipher 2.4 Basic Crypto Systems: Cracking Caesar 2.5 Basic Crypto Systems: Vigenere Cipher
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis 5.3 Basic Crypto Systems: Caesar Cipher 5.4 Basic Crypto Systems: Cracking Caesar 5.5 Basic Crypto Systems: Vigenere Cipher
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis 5.3 Basic Crypto Systems: Caesar Cipher 5.4 Basic Crypto Systems: Cracking Caesar 5.5 Basic Crypto Systems: Vigenere Cipher
 Standard 4.6 Cryptography, Cryptology, Cryptanalysis
 Standard 8.10 Cryptography
 Standard 21.1 Cryptography, Cryptology, Cryptanalysis 21.9 Hash Function Development 21.4 Basic Crypto Systems: Caesar Cipher 21.5 Basic Crypto Systems: Cracking Caesar 21.6 Basic Crypto Systems: Vigenere Cipher
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis 5.3 Basic Crypto Systems: Caesar Cipher 5.4 Basic Crypto Systems: Cracking Caesar 5.5 Basic Crypto Systems: Vigenere Cipher
 Standard 2.1 Cryptography, Cryptology, Cryptanalysis 2.3 Basic Crypto Systems: Caesar Cipher 2.4 Basic Crypto Systems: Cracking Caesar 2.5 Basic Crypto Systems: Vigenere Cipher 4.2 Encryption Algorithms 4.5 Hash Function Development
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis 5.3 Basic Crypto Systems: Caesar Cipher 5.4 Basic Crypto Systems: Cracking Caesar 5.5 Basic Crypto Systems: Vigenere Cipher
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis 5.3 Basic Crypto Systems: Caesar Cipher 5.4 Basic Crypto Systems: Cracking Caesar 5.5 Basic Crypto Systems: Vigenere Cipher
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis 5.3 Basic Crypto Systems: Caesar Cipher 5.4 Basic Crypto Systems: Cracking Caesar 5.5 Basic Crypto Systems: Vigenere Cipher
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis 5.3 Basic Crypto Systems: Caesar Cipher 5.4 Basic Crypto Systems: Cracking Caesar 5.5 Basic Crypto Systems: Vigenere Cipher
 Standard 7.7 Cryptography
 Standard 7.7 Cryptography
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis 5.3 Basic Crypto Systems: Caesar Cipher 5.4 Basic Crypto Systems: Cracking Caesar 5.5 Basic Crypto Systems: Vigenere Cipher
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis 5.3 Basic Crypto Systems: Caesar Cipher 5.4 Basic Crypto Systems: Cracking Caesar 5.5 Basic Crypto Systems: Vigenere Cipher
 Standard 4.1 Cryptography, Cryptology, Cryptanalysis 4.3 Basic Crypto Systems: Caesar Cipher 4.4 Basic Crypto Systems: Cracking Caesar 4.5 Basic Crypto Systems: Vigenere Cipher 5.2 Encryption Algorithms 5.5 Hash Function Development
 Standard 4.1 Cryptography, Cryptology, Cryptanalysis 4.3 Basic Crypto Systems: Caesar Cipher 4.4 Basic Crypto Systems: Cracking Caesar 4.5 Basic Crypto Systems: Vigenere Cipher 4.7 Hash Function Development
 Standard 8.1 Cryptography, Cryptology, Cryptanalysis 8.3 Basic Crypto Systems: Caesar Cipher 8.4 Basic Crypto Systems: Cracking Caesar 8.5 Basic Crypto Systems: Vigenere Cipher
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis 5.3 Basic Crypto Systems: Caesar Cipher 5.4 Basic Crypto Systems: Cracking Caesar 5.5 Basic Crypto Systems: Vigenere Cipher