Please enable JavaScript to use CodeHS

TN 6-8: CCP.12

CodeHS Lessons

Explain how encryption can be used to safeguard data that is sent across a network.

Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
21.3 Why encrypt?
21.2 History of Cryptography
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography