
Understanding Cryptography Concepts

Interactive Video
•
Mathematics, Computers, Science
•
7th - 12th Grade
•
Hard
+1
Standards-aligned

Emma Peterson
FREE Resource
Standards-aligned
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What challenge do Alice and Bob face when they need to communicate a secret from a distance?
They don't have a secret to share.
They need to avoid Eve intercepting their messages.
They can't understand each other's language.
They have no way to send messages.
Tags
CCSS.RI.11-12.4
CCSS.RI.7.4
CCSS.RI.8.4
CCSS.RI.9-10.4
CCSS.RI.9-10.4
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process called when Alice locks her message in a box?
Encryption
Encoding
Decoding
Decryption
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does Bob access the message sent by Alice?
By asking Eve for help
By using a different lock
By using the shared code to unlock it
By guessing the code
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do ciphers replace in the process of cryptography?
Public keys
Digital signatures
Physical locks
Secret handshakes
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of using ciphers in communication?
To scramble messages so they appear meaningless to eavesdroppers
To reduce the size of messages
To make messages longer
To make messages look more interesting
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How long has cryptography been in use?
Since the invention of the internet
A few centuries
A few decades
Thousands of years
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which two theories are important to understand the story of cryptography?
Quantum theory and relativity
Number theory and probability theory
Chaos theory and string theory
Game theory and decision theory
Similar Resources on Wayground
8 questions
TED-Ed: What can Schrodinger's cat teach us about quantum mechanics? - Josh Samani

Interactive video
•
9th - 12th Grade
11 questions
Cryptography Concepts and Challenges

Interactive video
•
9th - 10th Grade
11 questions
Understanding Polyalphabetic Ciphers

Interactive video
•
9th - 12th Grade
2 questions
TED-ED: The origin of countless conspiracy theories - PatrickJMT

Interactive video
•
KG - University
3 questions
TED-ED: The origin of countless conspiracy theories - PatrickJMT

Interactive video
•
KG - University
11 questions
Transposition Ciphers and Their Functions

Interactive video
•
6th - 12th Grade
2 questions
Cryptography: Crash Course Computer Science

Interactive video
•
9th - 12th Grade
5 questions
Cryptography: Crash Course Computer Science

Interactive video
•
9th - 12th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade