Caesar Cipher Lesson
Upon completion of the Caesar Cipher lesson, students will:
1) Investigate how Caesar Ciphers work to achieve the goal of confidentiality of information, their historical context, and strengths and weaknesses,
2) Encrypt and decrypt text using Caesar Ciphers,
3) Implement a Caesar Cipher in a programming language, and
4) Ascertain the correctness of their program as a functional program to protect information assets and computing resources.
All materials in this Cybersecurity Concept Lesson is based upon work supported by the NCyTE Center and the National Science Foundation under Grant No. 1548315, Catalyzing Computing and Cybersecurity in Community Colleges (C5). C5 is a grant-funded project based at Whatcom Community College in Bellingham, WA. One of its goals is to develop and disseminate instructional materials to enhance computer science and cybersecurity courses.
A downloadable print version of this lesson, developed through a collaboration between the NSF-funded NCyTE Center and the CLARK cybersecurity curriculum library, is hosted on https://clark.center. Register for a free account on the CLARK website to download these and other cybersecurity teaching materials.
A web-based version of this lesson, developed through a collaboration between the NSF-funded NCyTE Center and CodeHS, is hosted on https://codehs.com. Register for a free CodeHS teacher account to access all the materials for this lesson.