NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Peer reviewed Peer reviewed
Direct linkDirect link
Berson, Michael J.; Berson, Ilene R. – Social Education, 2014
Educators have been increasingly sensitized to the role of schools in developing students' cyberethics, cybercitizenship, and cybersafety, which have emerged as one of the most pressing and yet unexplored areas of education. The Department of Defense has identified challenges to cybersecurity infrastructure as a significant risk for the…
Descriptors: Bullying, Computer Mediated Communication, School Role, School Safety
New England Board of Higher Education, 2018
Surveys of New England employers, college academic officers, and graduates find that many consider today's college graduates inadequately prepared for the world of work. In 2017, the New England Board of Higher Education convened the Commission on Higher Education & Employability, under the leadership of Rhode Island Governor Gina M. Raimondo.…
Descriptors: Education Work Relationship, Employment Potential, College Graduates, Career Readiness
Peer reviewed Peer reviewed
Direct linkDirect link
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Peer reviewed Peer reviewed
Sullivan, Megan – Science Teacher, 2005
For the general public, the field of cryptography has recently become famous as the method used to uncover secrets in Dan Brown's fictional bestseller, The Da Vinci Code. But the science of cryptography has been popular for centuries--secret hieroglyphics discovered in Egypt suggest that code-making dates back almost 4,000 years. In today's…
Descriptors: Information Skills, Programming, Internet, Computer Security