Lab Name Sending data with or without encryption
Subject Area Math, and Computer Science
Grade 7 - 12
Topic
  • Math: Function and inverse
  • CS: Transferring data with Encryption
Experiment Title Sending coded/encrypted data
Hardware
  • COSMOS Toolkit: Computer Node
Software
  • COSMOS Toolkit: Framework
  • https://www.asciitohex.com/
Number of Sessions to teach the topic 1 - 3 days
Educational standards to be addressed
  • CCSS.Math.Content.HSF.IF.C.9
    Compare properties of two functions each represented in a different way (algebraically, graphically, numerically in tables, or by verbal descriptions).
  • CCSS.ELA-Literacy.WHST.6-8.2
    Write informative/explanatory texts, including the narration of historical events, scientific procedures/ experiments, or technical processes.
COSMOS concepts to be used for the lab Network security (cryptography) is extremely important in wireless communication. Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network. It is a subset of network security that adds protection for a wireless computer network.The exponential increase in the use of mobile devices will lead to an increase in security threats. Devices on an unsecured wireless network are vulnerable to attacks. Unauthorized users can steal your personal files, conduct illegal activities, and monitor your web traffic on unsecure networks. Therefore, the use of cryptography is necessary.
K12 Educational Goals (How the educational goals are achieved through teaching using the experiment, how the topic is connected to the COSMOS concepts used) In this lesson, students will be introduced how data is converted and transferred on between two computers. The activities demonstrates the difference between coding data vs. encrypted data which includes hash values. The connected topic to the COSMOS concept is network security.
Short Description and Walk-through of the experiment This is a scaffolded lesson as how data is transferred on the wireless internet. It is designed with multiparts where teacher has options to do all or part of the activities.
  • First activity is demonstrating transferring ASCII values.
  • Second activity is ASCII values plus hash values.
  • Third activity is encrypting and decrypting data.
Testbed mapping of the experiment Network security (cryptography) is extremely important in wireless communication. Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network. It is a subset of network security that adds protection for a wireless computer network.The exponential increase in the use of mobile devices will lead to an increase in security threats. Devices on an unsecured wireless network are vulnerable to attacks. Unauthorized users can steal your personal files, conduct illegal activities, and monitor your web traffic on unsecure networks. Therefore, the use of cryptography is necessary.

Experiment Execution


Write a sentence inside the box using capital letters, and use period as the end of the sentence. Then, press the START button to encode the message. In order to try another message press STOP.

Message:
Encoded:

Write a secret message inside the box that is produced using the encode function. Then, press the START button to decode the message. In order to try another secret message press STOP.

Secret Message:
Decoded:



Write a sentence inside the first box using capital letters, and use period as the end of the sentence. Enter a hash value inside the second box (i.e., 5) that will be used for authentication. Then, press the START button to encrypt the message. In order to try another message press STOP.

Message:
Hash:
Encrypted:

Write a secret message inside the first box that is produced using the encrypt function. Enter a hash value inside the second box (i.e., 5) that will be used for authentication. Then, press the START button to encrypt the message. In order to try another message press STOP.

Message:
Hash:
Decrypted:



Write a sentence inside the first box using capital letters, and use period as the end of the sentence. Enter the function in the secret key box. The secret key must input as function notation (i.e., f(x) = ... , g(x) = ...). Enter a hash value inside the second box (i.e., 5) that will be used for authentication. Then, press the START button to encrypt the message. In order to try another message press STOP.

Message:
Secret Key:
Hash:
Encrypted:

Write a secret message inside the first box that is produced using the encrypt function. Enter the inverse function in the secret key box. The inverse secret key must input as function notation (i.e., f(x) = ... , g(x) = ...). Enter a hash value inside the second box (i.e., 5) that will be used for authentication. Then, press the START button to encrypt the message. In order to try another message press STOP.

Message:
Secret Key:
Hash:
Decrypted:


Experiment Material

NGSS Lesson Plan
Worksheet

© 2019 COSMOS Project. Created by Martina Choi, Beacon School