Online Unplugged and Block-Based Cryptography in Grade 10
- URL: http://arxiv.org/abs/2112.10437v1
- Date: Mon, 20 Dec 2021 10:40:59 GMT
- Title: Online Unplugged and Block-Based Cryptography in Grade 10
- Authors: Michael Lodi and Marco Sbaraglia and Simone Martini
- Abstract summary: This paper presents the learning path we designed, influenced by cryptography core ideas rather than technical knowledge.
We will detail how we used Snap! (a visual programming language) to realize hands-on activities.
The students appreciated the course and felt that, despite being remote, it was fun, interesting, and engaging.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We report our experience of an extracurricular online intervention on
cryptography principles in 10th grade. This paper's first goal is to present
the learning path we designed, influenced by cryptography core ideas rather
than technical knowledge. We will detail how we used Snap! (a visual
programming language) to realize hands-on activities: programming playgrounds
to experiment with cryptosystems and their limits, and interactive support for
an unplugged activity on the Diffie-Hellman key exchange. The second goal is to
evaluate our intervention in terms of both student perceptions and learning of
core cryptography ideas. The students appreciated the course and felt that,
despite being remote, it was fun, interesting, and engaging. They said the
course helped them understand the role of cryptography, CS, and Math in society
and sparked their interest, especially in cryptography and CS. The third goal
is to discuss what worked well and areas of improvement. Pedagogically, remote
teaching caused high "instructor blindness" and prevented us from giving the
optimal amount of guidance during the exploration activities with Snap!
playgrounds, making them sometimes too challenging for total programming
novices. On the other hand, the "remote-unplugged" Diffie-Hellman worked well:
it embodies a coherent metaphor that engaged the students and made them grasp
this groundbreaking protocol. The students praised the activities as engaging,
even when challenging. The final assessment showed that the core cryptography
ideas were well understood.
Related papers
- CryptoEL: A Novel Experiential Learning Tool for Enhancing K-12 Cryptography Education [0.9378911615939926]
This paper presents an educational tool designed to enhance cryptography education for K-12 students.
Our tool incorporates the four stages of Kolb's Experiential Learning model to teach key cryptographic concepts.
The learning experience is enriched with real-world simulations, customized AI-based conversation agents, video demonstrations, interactive scenarios, and a simplified Python coding terminal.
arXiv Detail & Related papers (2024-11-04T15:03:07Z) - Let Students Take the Wheel: Introducing Post-Quantum Cryptography with Active Learning [4.804847392457553]
Post-quantum cryptography (PQC) has been identified as the solution to secure existing software systems.
This research proposes a novel active learning approach and assesses the best practices for teaching PQC to undergraduate and graduate students.
arXiv Detail & Related papers (2024-10-17T01:52:03Z) - Handwritten Code Recognition for Pen-and-Paper CS Education [33.53124589437863]
Teaching Computer Science (CS) by having students write programs by hand on paper has key pedagogical advantages.
However, a key obstacle is the current lack of teaching methods and support software for working with and running handwritten programs.
Our approach integrates two innovative methods. The first combines OCR with an indentation recognition module and a language model designed for post-OCR error correction without introducing hallucinations.
arXiv Detail & Related papers (2024-08-07T21:02:17Z) - Gameful Introduction to Cryptography for Dyslexic Students [0.49157446832511503]
We show that despite its complex nature, dyslexia does not hinder one's ability to comprehend cryptography.
We conducted a gameful workshop with 14 high-school dyslexic students and taught them fundamental encryption methods.
arXiv Detail & Related papers (2024-06-10T10:30:43Z) - Giving Feedback on Interactive Student Programs with Meta-Exploration [74.5597783609281]
Developing interactive software, such as websites or games, is a particularly engaging way to learn computer science.
Standard approaches require instructors to manually grade student-implemented interactive programs.
Online platforms that serve millions, like Code.org, are unable to provide any feedback on assignments for implementing interactive programs.
arXiv Detail & Related papers (2022-11-16T10:00:23Z) - Computationally Identifying Funneling and Focusing Questions in
Classroom Discourse [24.279653100481863]
We propose the task of computationally detecting funneling and focusing questions in classroom discourse.
We release an annotated dataset of 2,348 teacher utterances labeled for funneling and focusing questions, or neither.
Our best model, a supervised RoBERTa model fine-tuned on our dataset, has a strong linear correlation of.76 with human expert labels and with positive educational outcomes.
arXiv Detail & Related papers (2022-07-08T01:28:29Z) - ProtoTransformer: A Meta-Learning Approach to Providing Student Feedback [54.142719510638614]
In this paper, we frame the problem of providing feedback as few-shot classification.
A meta-learner adapts to give feedback to student code on a new programming question from just a few examples by instructors.
Our approach was successfully deployed to deliver feedback to 16,000 student exam-solutions in a programming course offered by a tier 1 university.
arXiv Detail & Related papers (2021-07-23T22:41:28Z) - Dive into Deep Learning [119.30375933463156]
The book is drafted in Jupyter notebooks, seamlessly integrating exposition figures, math, and interactive examples with self-contained code.
Our goal is to offer a resource that could (i) be freely available for everyone; (ii) offer sufficient technical depth to provide a starting point on the path to becoming an applied machine learning scientist; (iii) include runnable code, showing readers how to solve problems in practice; (iv) allow for rapid updates, both by us and also by the community at large.
arXiv Detail & Related papers (2021-06-21T18:19:46Z) - Graph Self-Supervised Learning: A Survey [73.86209411547183]
Self-supervised learning (SSL) has become a promising and trending learning paradigm for graph data.
We present a timely and comprehensive review of the existing approaches which employ SSL techniques for graph data.
arXiv Detail & Related papers (2021-02-27T03:04:21Z) - TextHide: Tackling Data Privacy in Language Understanding Tasks [54.11691303032022]
TextHide mitigates privacy risks without slowing down training or reducing accuracy.
It requires all participants to add a simple encryption step to prevent an eavesdropping attacker from recovering private text data.
We evaluate TextHide on the GLUE benchmark, and our experiments show that TextHide can effectively defend attacks on shared gradients or representations.
arXiv Detail & Related papers (2020-10-12T22:22:15Z) - Learning Dexterous Grasping with Object-Centric Visual Affordances [86.49357517864937]
Dexterous robotic hands are appealing for their agility and human-like morphology.
We introduce an approach for learning dexterous grasping.
Our key idea is to embed an object-centric visual affordance model within a deep reinforcement learning loop.
arXiv Detail & Related papers (2020-09-03T04:00:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.