APRIL SMITH'S S.T.E.M. CLASS
  • HOME
  • STEM LABS
    • PRE-K STEM LABS
    • KINDERGARTEN STEM LABS
    • 1st GRADE STEM LABS
    • 2nd GRADE STEM LABS
    • 3rd GRADE STEM LABS
    • 4th GRADE STEM LABS
    • 5th GRADE STEM LABS
  • CAHABA ENGINEERS
    • LESSON 2
    • LESSON 3
    • LESSON 4
  • ABOUT OUR CLASS
  • PHOTO GALLERIES
    • PREK PHOTOS
    • KINDERGARTEN PHOTOS
    • 1ST GRADE PHOTOS
    • 2ND GRADE PHOTOS
    • 3RD GRADE PHOTOS
    • 4TH GRADE PHOTOS
    • 5TH GRADE PHOTOS
    • ENRICH PHOTOS
  • DATA BASES
    • DEBATE TOPICS DATABASE
    • AMERICAN BIOGRAPHIES
    • AMERICAN REVOLUTION
    • NON-FICTION RESEARCH
    • Animals
    • BIOMES
    • Native American Portal
    • NATIONAL PARKS
    • ALABAMA OUTDOORS
  • CONTACT ME
  • FUN LAB
  • STEM CHOICE BOARD
  • ACAP 2025
  • MULTI-CULTURAL CHRISTMAS
    • GERMANY LEARNING PAGE
    • GERMANY STEM ACTIVITIES
    • COLUMBIA LEARNING PAGE
    • COLUMBIA STEM ACTIVITIES

5th GRADE
​
WE ARE DIGITAL CITIZENS
LESSON 4:  ENCRYPTION

Picture

LESSON MISSION

Picture
  • I can explain the security technologies of encryption and public keys.​
  • I can construct a complex system of numbers and/or letters to represent information.

VIDEO TIME

What is an encryption code and how are they used to provide internet security?  Let's watch the video below together as a class.  Do not click on the video.  You can watch it on your own computer at home.

THE SPY WAR RACE

Now we are going to play a game called the Spy War Race.  In this race you will be divided into groups.  Each group will represent a nation in the following scenario.
The world is on the brink of World War III.  All nations are on edge.  Each nation sends their spies out to other nations so that they can learn whether or not these countries are allies or enemies.  
Picture
Your national spies intercept three encrypted messages and bring it back to you.  Each nation will race against the other nations to decrypt each message to find out the secret information first.  

The race begins when I will hand each nation an envelope with the first encrypted message. When I say go, your nation will open the envelope and work to determine how the encrypted message is coded by figuring out the system that was used to encrypt the message.  Then, you will translate the message.  
Remember, it is important for your nation to work quickly and quietly to uncover the code and translate the message.  You do not want another team to hear what you discovered.  When you believe your nation has succeeded in decrypting the first message, bring the translation to me.  
If it is correct, I will hand you the second encrypted code.  If it is incorrect, I will shake my head no, and you will have to go back and try again.  Remember, there will be a total of three encrypted messages.  The first team to decipher all 3 encryption codes and correctly translate all 3 messages will win the Spy War Race.

TOOL BOX

Picture
TERMS TO KNOW
encryption:  the process of scrambling or changing a message to make it secret 

decryption:  the process of unscrambling an encrypted or secret message, so that it can be read 

code:  replacing words, phrases, or sentences with groups of letters or numbers

cipher:  an algorithm or system that substitutes each letter with a certain number of steps down the alphabet

key:   the number used in a cipher or the coded system used to encrypt a message

symmetric encryption:  when the sender and receiver share the same key to unscramble a message

asymmetric keys:  using a public key that can be exchanged with anybody and a private key that is not shared

public key:  a key used to encrypt data that can be used by anyone to create a secret message

private key:  a key that is used to unlock an encrypted message

QUIZ TIME

Click on the link below to take the exit ticket quiz.  If you make a 100%, you have a WHOPPER of a brain!  Come and see me for a little treat.
Picture

MISSION ACCOMPLISHED

Picture
CONGRATULATIONS!  

You accomplished your mission!​
​
  • I can responsibly use a digital device.
  • I can explain the security technologies of encryption and public keys.​
  • I can construct a complex system of numbers and/or letters to represent information.

Want to know more about how encryption works?  Click on the icon below to learn more!
Picture




  • HOME
  • STEM LABS
    • PRE-K STEM LABS
    • KINDERGARTEN STEM LABS
    • 1st GRADE STEM LABS
    • 2nd GRADE STEM LABS
    • 3rd GRADE STEM LABS
    • 4th GRADE STEM LABS
    • 5th GRADE STEM LABS
  • CAHABA ENGINEERS
    • LESSON 2
    • LESSON 3
    • LESSON 4
  • ABOUT OUR CLASS
  • PHOTO GALLERIES
    • PREK PHOTOS
    • KINDERGARTEN PHOTOS
    • 1ST GRADE PHOTOS
    • 2ND GRADE PHOTOS
    • 3RD GRADE PHOTOS
    • 4TH GRADE PHOTOS
    • 5TH GRADE PHOTOS
    • ENRICH PHOTOS
  • DATA BASES
    • DEBATE TOPICS DATABASE
    • AMERICAN BIOGRAPHIES
    • AMERICAN REVOLUTION
    • NON-FICTION RESEARCH
    • Animals
    • BIOMES
    • Native American Portal
    • NATIONAL PARKS
    • ALABAMA OUTDOORS
  • CONTACT ME
  • FUN LAB
  • STEM CHOICE BOARD
  • ACAP 2025
  • MULTI-CULTURAL CHRISTMAS
    • GERMANY LEARNING PAGE
    • GERMANY STEM ACTIVITIES
    • COLUMBIA LEARNING PAGE
    • COLUMBIA STEM ACTIVITIES