NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Schembari, N. Paul – PRIMUS, 2020
Ciphers based on rotor machines were the state-of-the-art in the mid-1900s, with arguably the most famous being the German Enigma. We have found that students have great interest in the Enigma and its cryptanalysis, so we created our own rotor cipher that is simulated with shifting tables and can be cryptanalyzed. Ours and the historic rotor…
Descriptors: Mathematics Instruction, Equipment, Technology, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Erol, Ramazan; Saygi, Elif – International Journal of Contemporary Educational Research, 2021
The aim of the study is to teach the concept of function using cryptology and to investigate whether it provides support to students who have difficulty integrating this topic into everyday life. The study's research group consisted of 50 elementary school teachers in the department of mathematics education at a public college in Ankara. Since the…
Descriptors: Foreign Countries, Technology, Mathematics Instruction, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Ciganik, Shari; McDaniel, Michael – PRIMUS, 2021
Prospective teachers and cryptography students use programming, statistics and guile to enrich both their courses.
Descriptors: Preservice Teachers, Elementary School Teachers, Technology, Problem Solving
Beckman, Joseph W. – ProQuest LLC, 2019
Information security practitioners and researchers who possess sufficient depth of conceptual understanding to reconstitute systems after attacks or adapt information security concepts to novel situations are in short supply. Education of new information security professionals with sufficient conceptual depth is one method by which this shortage…
Descriptors: Achievement Gains, Cognitive Processes, Coding, Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Chua, Boon Liang – Mathematics Teaching in the Middle School, 2008
When students learn mathematics, they tend to understand and remember the mathematical processes that they find practical and relevant. It is not surprising then that "Principles and Standards for School Mathematics" (NCTM 2000) encourages teachers to help students discover the relevance of mathematics in their daily lives. To help young people…
Descriptors: Mathematical Concepts, Mathematics Instruction, Teaching Methods, Literature