7

Created by

Dara Brinkman

TOPIC: Early Cryptography

GRADE LEVELS: 5th Grade

LESSON DURATION:  4 days

SOFT SKILLS:  Communication skills, problem solving, collaboration

Standards of Learning:

5.1 The student will listen, draw conclusions, and share responses in subject-related group learning activities.

  1. a) Participate in and contribute to discussions across content areas.

5.2 The student will use effective verbal and nonverbal communication skills to deliver planned oral presentations.

  1. a) Maintain eye contact with listeners.
  2. b) Use gestures to support, accentuate, and dramatize verbal message.

Learning Outcome:

How to use GPS to find locations

○ Understand how GPS works

○ Understand how coded messages have been used throughout US History

  • Caesar Wheel, Jefferson Wheel, Underground Railroad Quilt , Morse Code, Current military messaging techniques , – internet encryption — banks, credit cards, email, and military

○ Use and Create Cypher Wheels to decipher and create coded messages

○ Learn about local historical spies – James Armistead – Revolutionary War spy, Mary Louvestre – Civil War spy, Civil War decoding

○ Geocaching — students will use GPS units to participate in a geocache in Olde Towne using decoded messages for substitution of coordinates.

○ Using public transportation systems and schedules

○ Understand career opportunities with secure networks and messaging systems ○ Honor and be aware of Portsmouth’s role as Coast Guard City – ■ Fifth Coast Guard District ■ US Coast Guard Base – Portsmouth

Materials: Caesar Cipher wheels, Jefferson Wheels, booklets, projectors, calculators, invisible ink pens, Betty Stroud books (30) “ A pathwork Path”, laptops, HRT tickets, geocache clues for school and dowtown Portsmouth, cones, GPS units, pencils, clues for invisible ink, yarn and bells for laser tag. Postcards for thank you letters.

Activities:  Students will complete the following:

Day 1 POD (Plan of the Day)

  1. Spy Scenario
    1. SPY CROSS WORD PUZZLE
  2. Understand how coded messages have been used throughout US History- cryptography history and practice.  Click <here> for lesson.
  • Caesar Wheel
  • Jefferson Wheel
  • Underground Railroad Quilt – A Patchwork Path by Betty Stroud  book read aloud
  • Morse Code
  1. Understand how GPS works
  2. Geocaching VES — participate
    1.  Click <here> for activity.
    2. Click <here> for activity.

Civil War messages – decoding:

  1. Understand and research who was doing the spying in Portsmouth/ Tidewater region

Mary Louvestre – Civil War (delivered CSS Virginia plans to the Union Navy)

James Armistead – Revolutionary War

Harriet Tubman- Civil War

  1. Preparation for downtown
  2. Spy interactive games -Morse CODE
  3. Journal

Day 2 POD

  1. Top Secret Briefing for day 2
  2. Downtown Geocache
  3. Download pics for spy journal and journaling

Day 3 POD

  1. Top Secret Briefing for day 2
  2. Downtown Geocache
  3. Download pics for spy journal and journaling

Day 4 POD

  1. Storyboard (prewriting) for PowerPoint project. Creating PowerPoint of their GPS journey. Each project must adhere to rubric. Each slide must have a picture and at least 2 descriptive sentences.
    1. PowerPoint Rubric
  2. Decode and decode activity. Where one student codes words under a topic like continents and the other student has to encode the words with 80 % accuracy.
  3. Laser Tag- Squirm through the maze in the fastest time without ringing the bells.
  4. Journal
  5. Cyber security careers

Enrichment/Follow-up:  

Nova Cyber security online interactive games

http://www.pbs.org/wgbh/nova/labs/lab/cyber/

Example of Completed Assignment:

Click <here> to view an example of a completed assignment.

Click <here> to view another example of a completed assignment.

© 2018 Teach Cyber

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

License

Icon for the Creative Commons Attribution 4.0 International License

GenCyber Lesson Plans Copyright © 2018 by Dara Brinkman is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book