SlideShare a Scribd company logo
Data Representation
Lesson 8
1
Starter
I need six volunteers –
Three pupils will be dragons who have 100 million
pounds to invest
Three will be developers asking for support of their
new exciting app
The dragons will award the money and the rest of
the class will debate if this is a correct decision.
2
None of the developers should have
been awarded the money
• None of the developers actually demonstrated
their app or even talked about it.
• One issue is that developers do not have the
funds to create a complete app so we need to
develop a prototype
• In this lesson we will use excel to create logic
that will encrypt a message.
3
Objective of the lesson
• To be able to encrypt and decrypt messages using
Microsoft Excel
• All of you will:
– to discover how encryption works
• Most of you will:
• use Microsoft Excel to encrypt the alphabet.
• Some of you will:
• provide the lookup function to decrypt the alphabet
4
• Create your an app that solves a real world problem
• There is a website that call ‘geeks without bounds’.
5
Homework
Encryption
• Why is encryption important?
• Consider this table
• How would we rename the character length
using our new knowledge of binary?
6
Websites and encryption
• Is a password encrypted?
• Why?
• How can we tell if a website has been
encrypted?
• Hackers however can bypass all this security
by mounting the website system into their
computer system file structure.
7
Using Excel to build logic
• Download the Excel sheet marked Encryption
from Ilearn.
• In the left hand column the pupils will write in the
letters of the alphabet. In the right hand column
the pupils will write in their key from the previous
homework.
• We need to use a VLookup function to convert
the text entered in the cells above.
8
Encryption and decryption
• Allan Turing created the first computer capable of
decrypting German messages, does anyone know
how he did it?
• Which part of the message provide a key to
perform the decryption?
• Do we need to decrypt?
• Give examples and reasons behind your
thoughts?
• Can you know create a decryption lookup in
excel?
9
Plenary
• What is encryption?
• Why do we need to use it?
• What are the benefits of using excel in this
way?
10
• Create a sentence to describe your app and the
problem it is trying to solve?
• One paragraph should be enough to explain the idea.
• Extension task is to create a sketch of the app
11
Homework

More Related Content

PPTX
Math & Science Apps
PPTX
Introduction to Machine learning
PDF
Data Modelling with Erwin Tool online training | Data Modelling with Erwin To...
PPTX
PART 0 - Python Tutorial | Why should you learn python
ODP
Ardian Haxha- Flying with Python (OSCAL2014)
PPTX
PART 10 - Python Tutorial | Functions In Python With Examples
PDF
5 Most Common User Experience Mistakes and How to Avoid Them
PPTX
Cryptography
Math & Science Apps
Introduction to Machine learning
Data Modelling with Erwin Tool online training | Data Modelling with Erwin To...
PART 0 - Python Tutorial | Why should you learn python
Ardian Haxha- Flying with Python (OSCAL2014)
PART 10 - Python Tutorial | Functions In Python With Examples
5 Most Common User Experience Mistakes and How to Avoid Them
Cryptography

Viewers also liked (6)

PPT
Information Security Lesson 8 - Cryptography - Eric Vanderburg
PPS
Network Vulnerability Assessments: Lessons Learned
PPTX
Encryption
PPTX
Networking Standards And Protocols
PPTX
Cryptography.ppt
PDF
Network protocols
Information Security Lesson 8 - Cryptography - Eric Vanderburg
Network Vulnerability Assessments: Lessons Learned
Encryption
Networking Standards And Protocols
Cryptography.ppt
Network protocols
Ad

Similar to Lesson 8 Encryption (20)

PPTX
Vulnerability, exploit to metasploit
PPTX
Deep learning introduction
PDF
Traits of a Good Engineer
PPTX
Craft of coding
PDF
TeelTech - Advancing Mobile Device Forensics (online version)
PPTX
10 Things I Wish I Dad Known Before Scaling Deep Learning Solutions
PPTX
Technical Communication for Unity Developers
PPTX
Java basics
PPTX
CPP02 - The Structure of a Program
PPTX
There’s No Avoiding It: Programming Skills You’ll Need
PPT
Introduction to the intermediate Python - v1.1
PDF
How to use Artificial Intelligence with Python? Edureka
PDF
80410172053.pdf
PPTX
Fundamentals of OOP (Object Oriented Programming)
PPTX
Subtle Encipherment Hall
PDF
Erlang factory SF 2011 "Erlang and the big switch in social games"
PDF
Erlang, the big switch in social games
PDF
NPTEL_SEM_3.pdf
PPTX
Lecture 1.pptx
PDF
Improving Blockchain Developer Experience (DevX): Where UX meets Developer Tools
Vulnerability, exploit to metasploit
Deep learning introduction
Traits of a Good Engineer
Craft of coding
TeelTech - Advancing Mobile Device Forensics (online version)
10 Things I Wish I Dad Known Before Scaling Deep Learning Solutions
Technical Communication for Unity Developers
Java basics
CPP02 - The Structure of a Program
There’s No Avoiding It: Programming Skills You’ll Need
Introduction to the intermediate Python - v1.1
How to use Artificial Intelligence with Python? Edureka
80410172053.pdf
Fundamentals of OOP (Object Oriented Programming)
Subtle Encipherment Hall
Erlang factory SF 2011 "Erlang and the big switch in social games"
Erlang, the big switch in social games
NPTEL_SEM_3.pdf
Lecture 1.pptx
Improving Blockchain Developer Experience (DevX): Where UX meets Developer Tools
Ad

More from Patrick John McGee (20)

PDF
Hyperlocal news
PPTX
Website convention
PPTX
Switch statement
PPTX
Game engine
PPTX
Else if statements
PPTX
IPAD sessions
PPTX
PPTX
Web of Things at Liverpool MakeFest
PPTX
Lesson 10 digital and analogue signals
PPTX
Lesson 9 compression - Audio
PPTX
Lesson 3 teacher version
PPTX
Operating online lesson 2
PPTX
Creating a comic in Scratch v1.4 for Year 7
PPTX
Regulations and Legislation for E-Commerce in the UK
PPTX
Introduction to scratch programming
PPTX
Open Badges Super Learners Year-7 & 8
PPTX
Mozilla Open Badges Workshop - Super learners Week @ Irlam & Cadishead College
PPTX
Do a Bit and achieve a lot!
PPTX
Mozilla Open Badges and Digital Inclusion
PPTX
Volunteer Centre BWF Mozilla Open Badges Initial Information Sessions
Hyperlocal news
Website convention
Switch statement
Game engine
Else if statements
IPAD sessions
Web of Things at Liverpool MakeFest
Lesson 10 digital and analogue signals
Lesson 9 compression - Audio
Lesson 3 teacher version
Operating online lesson 2
Creating a comic in Scratch v1.4 for Year 7
Regulations and Legislation for E-Commerce in the UK
Introduction to scratch programming
Open Badges Super Learners Year-7 & 8
Mozilla Open Badges Workshop - Super learners Week @ Irlam & Cadishead College
Do a Bit and achieve a lot!
Mozilla Open Badges and Digital Inclusion
Volunteer Centre BWF Mozilla Open Badges Initial Information Sessions

Recently uploaded (20)

PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
L1 - Introduction to python Backend.pptx
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
System and Network Administraation Chapter 3
PDF
System and Network Administration Chapter 2
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
assetexplorer- product-overview - presentation
PDF
Understanding Forklifts - TECH EHS Solution
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Nekopoi APK 2025 free lastest update
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Navsoft: AI-Powered Business Solutions & Custom Software Development
Reimagine Home Health with the Power of Agentic AI​
Internet Downloader Manager (IDM) Crack 6.42 Build 41
L1 - Introduction to python Backend.pptx
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Computer Software and OS of computer science of grade 11.pptx
Softaken Excel to vCard Converter Software.pdf
Design an Analysis of Algorithms I-SECS-1021-03
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
System and Network Administraation Chapter 3
System and Network Administration Chapter 2
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Design an Analysis of Algorithms II-SECS-1021-03
assetexplorer- product-overview - presentation
Understanding Forklifts - TECH EHS Solution
How to Choose the Right IT Partner for Your Business in Malaysia
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Nekopoi APK 2025 free lastest update
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...

Lesson 8 Encryption

  • 2. Starter I need six volunteers – Three pupils will be dragons who have 100 million pounds to invest Three will be developers asking for support of their new exciting app The dragons will award the money and the rest of the class will debate if this is a correct decision. 2
  • 3. None of the developers should have been awarded the money • None of the developers actually demonstrated their app or even talked about it. • One issue is that developers do not have the funds to create a complete app so we need to develop a prototype • In this lesson we will use excel to create logic that will encrypt a message. 3
  • 4. Objective of the lesson • To be able to encrypt and decrypt messages using Microsoft Excel • All of you will: – to discover how encryption works • Most of you will: • use Microsoft Excel to encrypt the alphabet. • Some of you will: • provide the lookup function to decrypt the alphabet 4
  • 5. • Create your an app that solves a real world problem • There is a website that call ‘geeks without bounds’. 5 Homework
  • 6. Encryption • Why is encryption important? • Consider this table • How would we rename the character length using our new knowledge of binary? 6
  • 7. Websites and encryption • Is a password encrypted? • Why? • How can we tell if a website has been encrypted? • Hackers however can bypass all this security by mounting the website system into their computer system file structure. 7
  • 8. Using Excel to build logic • Download the Excel sheet marked Encryption from Ilearn. • In the left hand column the pupils will write in the letters of the alphabet. In the right hand column the pupils will write in their key from the previous homework. • We need to use a VLookup function to convert the text entered in the cells above. 8
  • 9. Encryption and decryption • Allan Turing created the first computer capable of decrypting German messages, does anyone know how he did it? • Which part of the message provide a key to perform the decryption? • Do we need to decrypt? • Give examples and reasons behind your thoughts? • Can you know create a decryption lookup in excel? 9
  • 10. Plenary • What is encryption? • Why do we need to use it? • What are the benefits of using excel in this way? 10
  • 11. • Create a sentence to describe your app and the problem it is trying to solve? • One paragraph should be enough to explain the idea. • Extension task is to create a sketch of the app 11 Homework