Lesson Planet
Search educational resources
  • Sign In Try It Free
  • AI Teacher Tools
    • Discover Resources Search reviewed educational resources by keyword, subject, grade, type, and more
    • Curriculum Manager (My Content) Manage saved and uploaded resources and folders To Access the Curriculum Manager Sign In or Join Now
    • Browse Resource Directory Browse educational resources by subject and topic
    • Curriculum Calendar Explore curriculum resources by date
    • Lesson Planning Articles Timely and inspiring teaching ideas that you can apply in your classroom
    • Our Story
    • Frequently Asked Questions
    • Testimonials
    • Contact Us
  • Pricing
  • School Access
    • Your school or district can sign up for Lesson Planet — with no cost to teachers
      Learn More
  • Sign In
  • Try It Free
Kid Krypto–Public-Key Encryption ActivityKid Krypto–Public-Key Encryption Activity
Publisher
Computer Science Unplugged
Resource Details
Curator Rating
Educator Rating
Not yet Rated
Grade
6th - 12th
Subjects
STEM
1 more...
Resource Type
Activities & Projects
Audience
For Teacher Use
Duration
30 mins
Instructional Strategy
Hands-on Activity
Technology
Video
Projection
Year
1998
Activity

Kid Krypto–Public-Key Encryption

Curated and Reviewed by Lesson Planet
This Kid Krypto–Public-Key Encryption activity also includes:
  • Computer Science Unplugged: Public-Key Encryption
  • Reading Passage
  • Join to access all included materials

Class members have an opportunity to experience how to use a public key to encrypt information and a private key to decrypt it. Groups create their own public key and encrypt information then develop private keys to decrypt this material. The activity is the last part in a three-part series on encryption.

9 Views 5 Downloads

Concepts

cryptography, cryptograms, cryptology, the internet, technology resources

Instructional Ideas

  • If the class is not familiar with one-way functions, provide instruction on them
  • Show the video before starting the activity

Classroom Considerations

  • Needs either a transparency or way of projecting the black line master

Pros

  • Makes comparisons between private padlocks to encryption
  • Provides a detailed example on how a public key works

Cons

  • Requires concentration and precision in order to successfully complete the activity 

View 6,059 other resources for 6th - 12th Grade STEM

© 1999-2026 Learning Explorer, Inc.
Teacher Lesson Plans, Worksheets and Resources

Sign up for the Lesson Planet Monthly Newsletter

Open Educational Resources (OER)

  • Health
  • Language Arts
  • Languages
  • Math
  • Physical Education
  • Science
  • Social Studies
  • Special Education
  • Visual and Performing Arts
View All Lesson Plans

Discover Resources

  • Our Review Process
  • How it Works
  • How to Search
  • Create a Collection

Manage Curriculum

  • Edit a Collection
  • Assign to Students
  • Manage My Content
Contact Us Site Map Privacy Policy Terms of Use