Please enable JavaScript to use CodeHS

IN CS3S: CS3S-1.2

CodeHS Lessons

Describe and discuss key concepts in cybersecurity, including cryptology, cryptography, cryptanalysis, cipher, cryptographic algorithm, private and public key encryption, public key infrastructure, and trust/trustworthiness.

Standard
2.2 Symmetric Encryption
Standard
1.1 Advanced Cryptography
1.2 Hash Functions
1.4 Asymmetric Encryption
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.3 Basic Crypto Systems: Caesar Cipher
2.4 Basic Crypto Systems: Cracking Caesar
2.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
4.6 Cryptography, Cryptology, Cryptanalysis
4.7 Hash Functions
Standard
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.4 Basic Crypto Systems: Caesar Cipher
21.5 Basic Crypto Systems: Cracking Caesar
21.6 Basic Crypto Systems: Vigenere Cipher
21.7 Advanced Cryptography
21.8 Hash Functions
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.3 Basic Crypto Systems: Caesar Cipher
2.4 Basic Crypto Systems: Cracking Caesar
2.5 Basic Crypto Systems: Vigenere Cipher
4.2 Encryption Algorithms
4.3 Advanced Cryptography
4.4 Hash Functions
4.6 Asymmetric Encryption
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
10.1 Cryptography, Cryptology, Cryptanalysis
10.2 History of Cryptography
10.3 Basic Crypto Systems: Caesar Cipher
10.4 Basic Crypto Systems: Cracking Caesar
10.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
11.1 Cryptography, Cryptology, Cryptanalysis
11.2 History of Cryptography
11.4 Basic Crypto Systems: Caesar Cipher
11.5 Basic Crypto Systems: Cracking Caesar
11.6 Basic Crypto Systems: Vigenere Cipher
11.7 Advanced Cryptography
11.8 Hash Functions
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.3 Basic Crypto Systems: Caesar Cipher
4.4 Basic Crypto Systems: Cracking Caesar
4.5 Basic Crypto Systems: Vigenere Cipher
5.2 Encryption Algorithms
5.3 Advanced Cryptography
5.4 Hash Functions
5.6 Asymmetric Encryption
Standard
2.2 Symmetric Encryption
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.3 Basic Crypto Systems: Caesar Cipher
4.4 Basic Crypto Systems: Cracking Caesar
4.5 Basic Crypto Systems: Vigenere Cipher
4.6 Hash Functions
Standard
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
8.3 Basic Crypto Systems: Caesar Cipher
8.4 Basic Crypto Systems: Cracking Caesar
8.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
1.2 Encryption Algorithms
1.3 Advanced Cryptography
1.4 Hash Functions
1.6 Asymmetric Encryption