1. L.O: STUDENTS WILL BE ABLE
TO EXPLAIN CRYPTOGRAPHY
AND INNOVATIONS.
110-120 minutes
DO NOW: READ
Unit 2 Lab 6: Encryption,
Page 5
2. FOR YOU TO DO:
1. Choose and research an innovation that
has some relation to cryptography. Two
suggestions are listed on the next page,
but you may choose a different
innovation, if you like—any innovation
that interests you.
3. For example, you might look into some recent stories
about hacking into car information systems, or stories of
people showing they can interfere with self-driving cars:
• Why driverless cars may never happen (from UK
Telegraph, 9/8/15)
• Counting on government to protect cars from
hackers isn't our best option (op-ed from
Washington Post, 8/26/15)
• Jeep owners urged to update their cars after
hackers take remote control (Guardian, 7/21/15)
4. you might research Bitcoin, a
"cryptocurrency":
• Bitcoin: The payment revolution (The Market
Mogul)
• 21 Things I Learned About Bitcoin From Living On It
For A Week (Forbes, 5/9/13)
• Bitcoin's Dark Side Could Get Darker (MIT Tech
Review, 8/13/15)
5. 2. The following are prompts from the AP Explore
Task. Write about your innovation, responding to
each prompt in a separate paragraph. Remember to
cite your sources.
a. the innovation name and a description of the intended
purpose of the innovation (100 words max)
b. an explanation of the technical details of this innovation in
terms that someone completely unfamiliar with the
innovation would understand (100 words max)
c. a description of the role computing plays in implementing
the functionality associated with the innovation (100
words max)
d. a description of the relationship between data and the
innovation. For example, you could describe the data used
or produced by the innovation or any privacy issues
associated with the innovation data (100 words max).
3. When you’re done: Trade your paragraphs
with a partner. Read your partner's response
for each prompt. How well did the paragraphs
respond to the prompts?
6. HOMEWORK:
read Chapter 5 of “Blown to Bits”.
Reading through the entire chapter will be helpful,
especially to get a better understanding of the
evolution of encryption methods and some details of
public key encryption.
7. Learning Objectives:
1. LO 6.3.1 Identify existing cybersecurity
concerns and potential options to
address these issues with the Internet
and the systems built on it. [P1]
2. LO 7.5.2 Evaluate online and print
sources for appropriateness and
credibility [P5]
GIVE EXAMPLES OF THESE LEARNING OBJECTIVES IN THE LESSON
8. Enduring Understandings:
1. EU 6.3 Cybersecurity is an important
concern for the Internet and the systems
built on it.
2. EU 7.5 An investigative process is aided by
effective organization and selection of
resources. Appropriate technologies and
tools facilitate the accessing of information
and enable the ability to evaluate the
credibility of sources
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
9. Essential Knowledge:
1. EK 1.2.5A The context in which an artifact is used
determines the correctness, usability, functionality, and
suitability of the artifact.
2. EK 1.2.5B A computational artifact may have weaknesses,
mistakes, or errors depending on the type of artifact.
3. EK 1.2.5C The functionality of a computational artifact may
be related to how it is used or perceived.
4. EK 1.2.5D The suitability (or appropriateness) of a
computational artifact may be related to how it is used or
perceived.
5. EK 3.2.2D Maintaining privacy of large data sets containing
personal information can be challenging.
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
10. Essential Knowledge:
• 6.EK 3.3.1A Digital data representations involve trade-
offs related to storage, security, and privacy concerns.
• 7.EK 3.3.1B Security concerns engender trade-offs in
storing and transmitting information.
• 8.EK 3.3.1F Security and privacy concerns arise with
data containing personal information.
• 9. EK 5.4.1L An explanation of a program helps people
understand the functionality and purpose of it.
• 10. EK 5.4.1M The functionality of a program is often
described by how a user interacts with it
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
11. Essential Knowledge:
• 11.EK 6.1.1A The Internet connects devices and
networks all over the world.
• 12.EK 6.1.1D The Internet and the systems built on it
facilitate collaboration.
• 13.EK 6.3.1A The trust model of the Internet involves
trade-offs.
• 14. EK 6.3.1B The DNS was not designed to be
completely secure.
• 15. EK 6.3.1C Implementing cybersecurity has
software, hardware, and human components.
• 16. EK 6.3.1D Cyber warfare and cyber crime have
widespread and potentially devastating effects
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
12. Essential Knowledge:
• 17. EK 6.3.1H Cryptography is essential to many
models of cybersecurity.
• 18. EK 6.3.1I Cryptography has a mathematical
foundation.
• 19. EK 6.3.1J Open standards help ensure
cryptography is secure.
• 20. EK 6.3.1K Symmetric encryption is a method of
encryption involving one key for encryption and
decryption.
• 21. EK 6.3.1L Public key encryption, which is not
symmetric, is an encryption method that is widely
used because of the functionality it provides.
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
13. Essential Knowledge:
• 22.EK 6.3.1M Certificate authorities (CAs) issue
digital certificates that validate the ownership of
encrypted keys used in secured communications and
are based on a trust model.
• 23.EK 7.3.1A Innovations enabled by computing raise
legal and ethical concerns.
• 24.EK 7.3.1G Privacy and security concerns arise in
the development and use of computational systems
and artifacts.
• 25.EK 7.3.1L Commercial and governmental curation
of information may be exploited if privacy and other
protections are ignored.
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Editor's Notes
Page 5: Cryptography and Innovations.
Be prepared for the Explore task:
Know what good innovations are for the task.
Know what good computational artifacts are and how to create them.
Page 5: Cryptography and Innovations.
Students choose an innovation that interests them. Many innovations have some issues regarding data security, even if it is not immediately obvious. Students might start with a topic that interests them, and then find a connection to cryptography that they did not expect.
The prompts are taken directly from the "Innovation" section of "B. Written Requirements." You might let students know that these aren't the only written requirements, and that they will also have to produce a visual artifact and a reference list for the AP Explore Task.
Depending on how comfortable students are with writing assignments, you have several options for how to present this task.
Here's a video (Teaching Channel) and a written resource (from U.Michigan) about peer review.
Students might be fine with the assignment as written and be able to write four paragraphs based on their independent research. They should do this, and then exchange their papers with a partner for a peer review.
Students could choose from the four prompts, perhaps responding to just one or two of them. This might help them focus their research and be easier to enter into. Students can then either find a partner who worked on the same prompts to hone their understanding of how best to respond to their particular prompts. Or, students might be paired with someone who responded to different prompts in order to see what other questions the task is asking students to write about.
If this is one of the first formal writing activities, you might have all students work on the first prompt, have students share their writing with each other, have a short class discussion, and then have students work on the rest of the prompts. This two-stage process can help students get a better sense of the expectations you have for their writing.
After the writing activity, you might ask students to reflect on the process. Encourage students to be thinking of possible innovations they might want to write about in this way for the AP Explore Task.
The details of encryption get complicated, but the overall idea is important. All bits, whether they are from confidential information or not, pass through the Internet the same way. To keep information secret, we can use encryption, an idea that has been around for millennia. In this lab, students learn about encryption and decryption methods, both enabled by technology.
Students also consider why encryption is considered an issue with social implications. They will engage in a debate activity in which they consider the viewpoints of governments, civil liberties groups, and businesses regarding the availability of encryption software. Students also have the opportunity to choose and research an innovation that is affected by issues around encryption (there are many to choose among). They will do some online research and respond to prompts taken from the AP Explore Task, which they will do following Unit 4 in the course