Please enable JavaScript to use CodeHS

FL 9-12: SC.912.CS-PC.1.4

CodeHS Lessons

Explain the principles of cryptography by examining encryption, digital signatures, and authentication methods (e.g., explain why and how certificates are used with “https” for authentication and encryption)

Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
1.2 Encryption Algorithms
1.3 Advanced Cryptography
1.4 Hash Functions
1.5 Hash Function Development
1.6 Asymmetric Encryption
1.7 Digital Certificates
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.3 Basic Crypto Systems: Caesar Cipher
2.4 Basic Crypto Systems: Cracking Caesar
2.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.3 Why encrypt?
21.4 Basic Crypto Systems: Caesar Cipher
21.5 Basic Crypto Systems: Cracking Caesar
21.6 Basic Crypto Systems: Vigenere Cipher
21.7 Advanced Cryptography
21.8 Hash Functions
21.9 Hash Function Development
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
8.3 Basic Crypto Systems: Caesar Cipher
8.4 Basic Crypto Systems: Cracking Caesar
8.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher