CSFG
English Deutsch Beta Español Beta język polski (2.6.0)
Chapters Curriculum Guides Appendices

Coding - Encryption
8.7. Further reading

Coding - Encryption

  • 8.1. What's the big picture?
  • 8.2. Substitution ciphers
  • 8.3. Cryptosystems used in practice
  • 8.4. The key distribution problem
  • 8.5. Storing passwords securely
  • 8.6. The whole story!
  • 8.7. Further reading
    • Useful links

The Wikipedia entry on cryptography has a fairly approachable entry going over the main terminology used in this chapter (and a lot more).

The encryption methods used these days rely on fairly advanced maths; for this reason books about encryption tend to either be beyond high school level, or else are about codes that aren't actually used in practice.

There are lots of intriguing stories around encryption, including its use in wartime and for spying e.g.

  • How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code (David Kahn)

  • Decrypted Secrets: Methods and Maxims of Cryptology (Friedrich L. Bauer)

  • Secret History: The Story of Cryptology (Craig Bauer)

  • The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet (David Kahn) – this book is an older version of his new book, and may be hard to get.

The following activities explore cryptographic protocols using an Unplugged approach; these methods aren't strong enough to use in practice, but provide some insight into what is possible:

  • Information hiding

  • Cryptographic protocols

  • Public key encryption

War in the fifth domain looks at how encryption and security are key to our defence against a new kind of war.

There are lots of articles in cs4fn on cryptography, including a statistical attack that lead to a beheading.

The book "Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python" (by Al Sweigart) goes over some simple ciphers including ones mentioned in this chapter, and how they can be programmed (and attacked) using Python programs.

8.7.1.

Useful links

  • How Stuff Works entry on Encryption
  • Cryptool is a free system for trying out classical and modern encryption methods. Some are beyond the scope of this chapter, but many will be useful for running demonstrations and experiments in cryptography.
  • Wikipedia entry on Cryptographic keys
  • Wikipedia entry on the Caesar cipher
  • Videos about modern encryption methods
  • Online interactives for simple ciphers
Previous:
The whole story!
Next:
Coding - Error control

Looking for something for primary schools? Check out CS Unplugged.

The Computer Science Field Guide is an online interactive resource for high school students learning about computer science.

Useful Links

  • About
  • Chapters
  • Interactives
  • Curriculum Guides

Community

  • Twitter
  • YouTube
  • GitHub

Help

  • Search
  • Glossary
  • Feedback

Switch to teacher mode

English | Deutsch | Español | język polski (2.6.0)

The Computer Science Field Guide material is open source on GitHub, and this website's content is shared under a Creative Commons Attribution-ShareAlike 4.0 International license. The Computer Science Field Guide is a project by the Computer Science Education Research Group at the University of Canterbury, New Zealand. Icons provided generously by icons8.

3.12.6

This definition is not available in English, sorry!