K-12 Computer Science Standards

Nevada Cryptography

46 Standards

1

1.1.1

Research various types of cryptography

2

1.1.2

Describe occupations that use cryptography

3

1.1.3

Explain how people encounter cryptography in day-to-day life

4

1.1.4

Explain the connection between math, algorithms, and ciphers

5

1.1.5

Explain the difference between blockchain and block cipher

6

1.1.6

Define cryptanalysis as it relates to cryptography

7

1.2.1

Explain the history of cryptography

8

1.2.2

Describe the importance of the Enigma and Turing (The Bombe) machines

9

1.2.3

Explain the need for ciphering with the birth of the digital age

10

1.2.4

Describe the use of RSA (Rivest–Shamir–Adleman) in today’s online environment

11

2.1.1

Explain substitution ciphers (e.g., Masonic, polyalphabetic, etc.)

12

2.1.2

Describe Caesar ciphers

13

2.1.3

Explain transposition ciphers

14

2.1.4

Compare steganography and cryptography as used in ciphers

15

2.2.1

Apply a cipher technique to keep information secret

16

2.2.2

Develop a key to decipher the message

17

2.2.3

Decipher a cipher

18

3.1.1

Compare block and stream ciphers (i.e., of Advanced Secret Writing Standard (AES) and Data Secret Writing Standard (DES))

19

3.1.2

Research the role of block ciphers in data integrity

20

3.1.3

Relate key stream synchronicity to stream ciphers

21

3.1.4

Explain the use of hash functions

22

3.1.5

Discuss the difference between steganography and cryptography

23

3.1.6

Identify challenges when managing encryption on a large scale

24

3.1.7

Apply tools and protocols to real world practice

25

3.2.1

Build a block cipher with a data integrity component

26

3.2.2

Create a crypto key

27

3.2.3

Write an algorithm for a cipher

28

3.2.4

Describe how keys are generated

29

3.3.1

Define the purpose of public vs. private keys

30

3.3.2

Compare symmetric and asymmetric keys

31

3.3.3

Explain various security mechanisms

32

3.3.4

Describe the strengths and weakness of the Diffie-Hellman protocol

33

3.3.5

Explain the importance of authentication

34

3.3.6

Describe the strengths and weakness of the RSA protocol

35

4.1.1

Describe different types of attacks on cryptographic systems

36

4.1.2

Research different types of defenses against cryptographic attacks

37

4.1.3

Differentiate between passive and active attacks

38

4.1.4

Apply various techniques to encrypt a message

39

4.1.5

Analyze a passive attack using network traffic data and analysis

40

5.1.1

Research the ethics of cryptography

41

5.1.2

Discuss the balance between privacy and security

42

5.1.3

Research regulations and laws of cryptography and encryption

43

5.2.1

Describe the role of computational mathematics in the development of future cryptographic systems

44

5.2.2

Research how future technology may threaten cryptography

45

5.2.3

Discuss the role cryptography plays in the development of digital currencies

46

5.2.4

Examine ways in which encryption using cryptography can be applied in the future

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program