Search Results
Showing results 1 to 5 of 5
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-989.jpg?itok=31BVjoBi)
Public Key Encryption: Kid Krypto
Source Institutions
In this activity, learners conduct a simulation exercise related to public key encryption and try to intercept a message sent between two learners.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-987.jpg?itok=lA9IO2--)
The Turing Test: Conversations with Computers
Source Institutions
This activity aims to stimulate discussion on the question of whether computers can exhibit “intelligence,” or are ever likely to do so in the future.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-990.jpg?itok=npbYdK6Z)
Cryptographic Protocols: The Peruvian Coin Flip
Source Institutions
This activity about cryptographic techniques illustrates how to accomplish a simple, but nevertheless seemingly impossible task—making a fair, random choice by flipping a coin between two people who d
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-986.png?itok=PCuUa3kJ)
Artificial Intelligence: The Intelligent Piece of Paper
Source Institutions
This activity explores what it means for a computer to be intelligent and introduces the topic of what a computer program is and how everything computers do simply involves following instructions writ
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-991.jpg?itok=kT23JQks)
Information Hiding: Sharing Secrets
Source Institutions
This activity about cryptographic techniques illustrates a situation where information is shared, and yet none of it is revealed.