STEM Information Assurance, Information Security and Digital Forensics (IT)
2008 Howard County
Activities with Cryptography
Read
Introduction to cryptography, from Egypt through Enigma
Read
Cryptanalysis
Read
Classical Cryptography Course (Part 1)
Activity
Paper Enigma
Break the code
Other cipher and code exercises
NSA Code Breakers
Educational Technology Policy,
Research, & Outreach
http://www.edtechpolicy.org//
dpruitt@umd.edu
Copyright © 2009 ETPRO