Stacks Image 97

CryptoMatch

Stacks Image 13

Block Mode

Stacks Image 17

Blockchain

Stacks Image 21

Cryptocurrency

Stacks Image 25

Cryptography

Stacks Image 29

Diffie-Hellman Key Exchange

Digital Signatures
Description: Step through the digital signature process.
 
Key Words: digital, signature, electronic, encrypt, decrypt, hash, verify, key, pki, integrity         
 
Level:   High School     Community College     
CryptoMatch
Description: Match the terms from the Cryptography Emate.
 
Key Words: cryptography, game, activity, match
 
Level:   Community College     University
Block Mode
Description: Explore the five different Block Modes used in symmetric encryption algorithms.
 
Key Words: block, electronic codebook, mode, counter, cipher feedback, output feedback, ECB, CTR, CFB, OFB, cipher block chaining, CBC
 
Level:   Community College     University
Blockchain
Description: Explore the record-keeping technology used in cryptocurrencies such as Bitcoin which allows digital coins or other types of assets to move from one party to another.
 
Key Words: bitcoin, crypto, ledger, hash, miner, blockchain
 
Level:   High School     Community College
Cryptocurrency
Description: Explore the various forms of cryptocurrency and its application within several disciplines.
 
Key Words: ledger, block, chain, crypto, wallet, key, vulnerability
 
Level:   High School     Community College
Cryptography
Description: Explore symmetric and asymmetric encryption methods along with digital signatures.
 
Key Words: symmetric, asymmetric, digital signature, algorithm, key, encrypt, decrypt, ciphertext, authentication, confidentiality, nonrepudiation, key, algorithm, strength
 
Level:   High School     Community College
Diffie-Hellman Key Exchange
Description: Explore how the Diffie-Hellman Key exchange creates a secure communication method.
 
Key Words: trust, public, encrypt, decrypt, ciphertext, mod, key, exchange, prime number, exchange
 
Level:   Community College     University
Encryption
Description: Explore how encryption provides data confidentiality.
 
Key Words: symmetric, asymmetric, ssl, algorithm, key, encrypt, decrypt, ciphertext, authentication, confidentiality, nonrepudiation
 
Level:   Middle School      High School     Community College     
Encryption and Data Formatting
Description: Explore the XOR operation and how it is used in encryption.
 
Key Words: encrypt, xor, encrypt, ascii, binary, decimal, hexadecimal, Boolean, gate, key,
 
Level:   High School     Community College 
Hashing
Description: Explore the process of converting an input of any length using a mathematical or logical function into a fixed-sized output called a hash value or hash digest. 
 
Key Words: hash, algorithm, digest, input, Boolean, function, MD5, SHA256, integrity
 
Level:   High School     Community College 
Hashing with Narration
Description: A narrated version of the Hashing Emate.
 
Key Words: hash, algorithm, digest, input, Boolean, function, MD5, SHA256, integrity
 
Level:   High School     Community College 
Kerberos
Description: Description: Explore the network authentication protocol that uses encryption, Kerberos.
 
Key Words: hash, algorithm, digest, input, Boolean, function, MD5, SHA256, integrity
 
Level:   High School     Community College 
Public Key Infrastructure and Digital Certifications
Description: A Public Key Infrastructure (PKI) is a system used to distribute, verify, and revoke public keys used for public key encryption. A Digital Certificate, also known as a public key certificate, is a digital file that cryptographically links a public key with its owner and is part of the PKI system.
 
Key Words:  public, key, pki, certificate, server, issue, hash, private, cryptography, trust, revoke, authentication, access, repudiation, integrity, confidentiality
 
Level:   Community College     University
RSA Encryption
Description: Step through RSA key generation and the RSA algorithm for encryption and decryption.
 
Key Words: asymmetric, encryption, key, private, public, rsa, prime, factor, modulus, algorithm
 
Level:   Community College     University
Factoring and Prime Numbers
Description: Factoring and prime numbers provide the foundation for cryptographic algorithms.
 
Key Words: prime, factor cryptography, key, composite, phi, totient, function, rsa
 
Level:   Community College     University

Games

CryptoMatch

Stacks Image 129

Instructional

Block Mode

Stacks Image 141

Blockchain

Stacks Image 143

Cryptocurrency

Stacks Image 145

Cryptography

Stacks Image 147

Diffie-Hellman Key Exchange

Stacks Image 149

Digital Signatures

Stacks Image 72

Ecryption

Stacks Image 39

Encryption and Data Formatting

Stacks Image 68

Factoring and Prime Numbers

Stacks Image 86

Hashing

Stacks Image 43

Hashing with Narration

Stacks Image 47

Kerberos

Stacks Image 57

PKI and Digital Certificates

Stacks Image 61

RSA Encryption

Stacks Image 64