RET at UC

Research Experience for Teachers (2018-2019)

Cybersecurity and Encryption

Kelly Hiersche's Poster
Author: Kelly Hiersche
Unit Title: Cybersecurity and Encryption
Grade Level: 10th / 11th
Subject: Algebra 2
Estimated Duration: 15 Days (50 minute periods)
Unit Activities:

Pre/Post Test:

None needed


Keywords:
  • Exponent
  • Radical
  • Rational
  • Function
  • Inverse Functions
  • Cryptography
  • Encrypt
  • Decrypt
  • Security

The Big Idea (including global relevance)

Encrypting Information to protect data: – All people send important information over the internet, including students and their parents. This unit will enlighten students into how data is encrypted, how to keep their information safe, and they will develop a way to safely encrypt data.


Essential Questions

  • How can we reliably and effectively encrypt information?
  • How is data encrypted to protect our information?
  • How can math be used to secure information sent online?
  • How can cybersecurity and math be combined to reliably transmit information over the internet?
  • How can we secure secret information using encryption methods?


The Hook

Students will be shown two videos from news sources that explain recent successes in hacking people’s Snap Chat accounts/fortnite or other culturally relevant topic. Students will then participate in an activity where they use a simple system to encrypt a message, and then find out how to break this encryption. Once they figure out how to break and fix it, they will look for ways to make this method more secure. (This is a visual, pattern based method with only simple addition).


The Challenge

Snap Chat has hired your firm to develop a secure method of encrypting data being sent over the internet using mathematical functions.


Guiding Questions

  • How is data currently encrypted?
  • Is math used to encrypt data – in what ways?
  • How does coding play a role in encryption?
  • How many methods are there for data encryption?
  • How can someone learn to hack?
  • What is the goal of cryptography?
  • Is different data encrypted in different ways?
  • What makes something a "good" encryptor?
  • What is hacking?
  • How does math help with hacking?




ACS (Real world applications; career connections; societal impact)

As the internet and technology becomes more prevalent in the world, so does the need Cybersecurity and student understanding of how information is keep safe in on the internet. Students can utilize Algebra 2 to encrypt data in a method which could realistically be used to keep information secure.

Societal impact would come from the ability of this Challenge to peak the interest of students in Computer Science to help make this a field which students can consider as a future job opportunity. It also raises their awareness of the vulnerability of information they put online and provides context for discussing safe use of social media, online banking, etc.

Computer Science careers specifically Cryptographer, Cryptanalyst, Computer Engineer, Encryption specialist. – have not decided exactly how to introduce these – don’t know if guest speakers are available. Game design/encryption

Misconceptions

  • I expect misconceptions in the differences between inverse function and function multiplication and function composition, because they are similar in process and both valid approaches to creating an encryption system. I also think there may be misconceptions between inverse operations and inverse functions.


Unit Lessons and Activities

  • Lesson 1: Understanding Encryption Keys & Breaking Them - Lesson 1 will focus on the basics of encrypting information. Students will learn about public keys and privates keys. Students will use the Diffie-Hellman to be introduced to the concept of Logarithms as the inverse of exponential functions. Additionally, student will utilize exponent rules to create a secret key between to people.
    • Activity 1: Introducing the Big Idea, the hook, Generating Essential Questions, Presentation of Challenge, Generation of Guiding Questions, gathering information
    • Activity 2: Exponent rules and introduction of logs via Diffie-Hellman

  • Lesson 2: Encryption with Algebra 2 - Lesson 2 will focus on the development and utilization of students’ knowledge of inverse functions to send encryption messages. Students will learn about double encryption with asymmetric keys.
    • Activity 3: Encrypting with Inverse Functions, Gathering information, select solutions, communicate solutions, refine
    • Activity 4: Make and Break the Encryptions: Implement solutions, evaluate solutions, refine
  • Evidence of CBL: Lesson 1 Activity 1, Lesson 2 Activity 2
  • Evidence of EDP: Lesson 1 Activity 1, Lesson 1 Activity 2, Lesson 2 Activity 1, Lesson 2 Activity 2


Additional Resources