Please enable JavaScript to use CodeHS

Standards Framework

for Nevada Cryptography


Standards in this Framework

Standard Description
1.1.1 Research various types of cryptography
1.1.2 Describe occupations that use cryptography
1.1.3 Explain how people encounter cryptography in day-to-day life
1.1.4 Explain the connection between math, algorithms, and ciphers
1.1.5 Explain the difference between blockchain and block cipher
1.1.6 Define cryptanalysis as it relates to cryptography
1.2.1 Explain the history of cryptography
1.2.2 Describe the importance of the Enigma and Turing (The Bombe) machines
1.2.3 Explain the need for ciphering with the birth of the digital age
1.2.4 Describe the use of RSA (Rivest–Shamir–Adleman) in today’s online environment
2.1.1 Explain substitution ciphers (e.g., Masonic, polyalphabetic, etc.)
2.1.2 Describe Caesar ciphers
2.1.3 Explain transposition ciphers
2.1.4 Compare steganography and cryptography as used in ciphers
2.2.1 Apply a cipher technique to keep information secret
2.2.2 Develop a key to decipher the message
2.2.3 Decipher a cipher
3.1.1 Compare block and stream ciphers (i.e., of Advanced Secret Writing Standard (AES) and Data Secret Writing Standard (DES))
3.1.2 Research the role of block ciphers in data integrity
3.1.3 Relate key stream synchronicity to stream ciphers
3.1.4 Explain the use of hash functions
3.1.5 Discuss the difference between steganography and cryptography
3.1.6 Identify challenges when managing encryption on a large scale
3.1.7 Apply tools and protocols to real world practice
3.2.1 Build a block cipher with a data integrity component
3.2.2 Create a crypto key
3.2.3 Write an algorithm for a cipher
3.2.4 Describe how keys are generated
3.3.1 Define the purpose of public vs. private keys
3.3.2 Compare symmetric and asymmetric keys
3.3.3 Explain various security mechanisms
3.3.4 Describe the strengths and weakness of the Diffie-Hellman protocol
3.3.5 Explain the importance of authentication
3.3.6 Describe the strengths and weakness of the RSA protocol
4.1.1 Describe different types of attacks on cryptographic systems
4.1.2 Research different types of defenses against cryptographic attacks
4.1.3 Differentiate between passive and active attacks
4.1.4 Apply various techniques to encrypt a message
4.1.5 Analyze a passive attack using network traffic data and analysis
5.1.1 Research the ethics of cryptography
5.1.2 Discuss the balance between privacy and security
5.1.3 Research regulations and laws of cryptography and encryption
5.2.1 Describe the role of computational mathematics in the development of future cryptographic systems
5.2.2 Research how future technology may threaten cryptography
5.2.3 Discuss the role cryptography plays in the development of digital currencies
5.2.4 Examine ways in which encryption using cryptography can be applied in the future