MORE EVENTS
Leadership
Exchange
Solutions
Summit
Change display time — Currently: Eastern Daylight Time (EDT) (Event time)

Cracking the Code: Teaching Math Through Cryptography

,
Pennsylvania Convention Center, 111AB

Participate and share: Interactive session
Recorded Session
Save to My Favorites

Presenters

Photo
Instructional Technology Integration Specialist
NEIU 19
Alexandra Konsur-Grushinski has spent time in education teaching both students and adults how to embrace technology, STEM and Computer Science as tools for learning. Working with all sized learners (PreK to adults), she aims to demystify CS concepts as well as get students to engage in learning enthusiastically. She is passionate about aviation, electronics, robotics, programming and 3D design. This passion is illustrated by her management of projects developed for and utilized in iCreate STEM, a technology-focused STEM/CS program out of NEIU 19 Technology Department and her leadership roles in NEPA STEM Ecosystem and PA Statewide STEM Ecosystem (PSSE).
Photo
IT Operations
IU19

Session description

Explore different ways in which cryptography can be used to teach math concepts. After hearing a usage case, you'll engage in exploration around different types of ciphers and the mathematics content and best practices surrounding their use.

Purpose & objective

The purpose of this session is to explore different ways in which cryptography can be utilized to teach math concepts. After hearing a usage case, participants will engage in exploration around different types of ciphers and the mathematics content and best practices surrounding their use.
Session Agenda:
-Introduction and Statement of Purpose
-Presentation of Usage Case where Cryptography was used to improve math skill sets
-Hands on Participant Exploration of Cryptography and its mathematical concepts (3 cipher types will be introduced along with associated math skills)
-Call to Action - Group Discussion on how Teaching Cryptography can benefit students
-Hands on Participant Development of a plan to take Cryptography or other elements of Cybersecurity to their classrooms

More [+]

Outline

Content and Activities with Time and Process:
-Participants will have access to introductory information around the history and prevalence of Cybersecurity in the modern world with an emphasis on Cryptography through a shared slideshow.
-In addition, presenters will share the current job growth both current and projected around careers in cybersecurity. (10 minutes)
-Participants will hear about a usage case in which Cryptography was utilized to improve mathematics skills. (5 minutes)
-Participants will engage in hands-on experiences of three types of ciphers, each addressing different skills in mathematics. Peer-to-peer interaction (20 minutes)
-Participants will use their new foundational skills in Cryptography to engage in a discussion around how they can utilize this teaching approach with students in their own districts/schools. Peer-to-Peer interaction (5 minutes)
-Participants will begin to formulate different activities and lessons in which this approach can be utilized. Peer-to-Peer interaction (time remaining)

More [+]

Supporting research

Raspberry Pi Foundation has online cybersecurity & cryptography course: https://www.raspberrypi.org/courses/cybersecurity-and-encryption?utm_source=pi_learn&utm_medium=email&utm_campaign=fl_courses#courses-content

National Cryptologic Foundation’s curriculum: https://cryptologicfoundation.org/what-we-do/educate/high-school-cybersecurity-curriculum-guidelines.html

Cybersecurity lessons and activities for K-12: https://www.techlearning.com/news/best-cybersecurity-lessons-and-activities-for-k-12-education

Virtual NSA Museum: https://www.nsa.gov/museum/

The National Security Agency also has content for teachers. There is also a virtual content for students. The museum is free if in the DC/MD area: https://www.nsa.gov/Academics/K12-Partnership/

https://www.cryptool.org/en/ for an app that allows students to investigate different cryptography tools.

More [+]

Session specifications

Topic:
Computer science & computational thinking
Grade level:
6-12
Skill level:
Beginner
Audience:
Curriculum/district specialists, Library media specialists, Teachers
Attendee devices:
Devices useful
Attendee device specification:
Smartphone: iOS, Windows, Android
Laptop: Chromebook, Mac, PC
Tablet: Android, iOS, Windows
Participant accounts, software and other materials:
none needed
Subject area:
Computer science, Math
ISTE Standards:
For Educators:
Leader
  • Advocate for equitable access to educational technology, digital content and learning opportunities to meet the diverse needs of all students.
Designer
  • Design authentic learning activities that align with content area standards and use digital tools and resources to maximize active, deep learning.
For Students:
Computational Thinker
  • Students break problems into component parts, extract key information, and develop descriptive models to understand complex systems or facilitate problem-solving.