Summary
*Note:
For this science project you will need to develop your own experimental procedure. Use the information in the summary tab as a starting place. If you would like to discuss your ideas or need help troubleshooting, use the Ask An Expert forum. Our Experts won't do the work for you, but they will make suggestions and offer guidance if you come to them with specific questions.
If you want a Project Idea with full instructions, please pick one without an asterisk (*) at the end of the title.
If you want a Project Idea with full instructions, please pick one without an asterisk (*) at the end of the title.
Abstract
Want to send coded messages to your friends? Can you write a simple letter-substitution encryption program in JavaScript? How easy is it to break the simple code? Can you write a second program that "cracks" the letter-substitution code? Investigate other encryption schemes. What types of encryption are least vulnerable to attack?
Ask an Expert
Do you have specific questions about your science project? Our team of volunteer scientists can help. Our Experts won't do the work for you, but they will make suggestions, offer guidance, and help you troubleshoot.
Careers
If you like this project, you might enjoy exploring these related careers:
Career Profile
Computers are essential tools in the modern world, handling everything from traffic control, car welding, movie animation, shipping, aircraft design, and social networking to book publishing, business management, music mixing, health care, agriculture, and online shopping. Computer programmers are the people who write the instructions that tell computers what to do.
Career Profile
Cryptographers, also called cryptologists and cryptanalysts, develop the encryption algorithms that keep our modern online transactions, like emails and credit card purchases, safe from prying eyes. Even if information or a message is stolen, as long as it is encrypted, the person who stole it cannot read it! Cryptographers also work to test and break these algorithms, to check them for weaknesses and vulnerabilities. They even analyze and decipher codes used by terrorists and foreign…
Career Profile
Have you ever seen a story on the news about how a company or government agency was "hacked" and people's personal information, like names, addresses, or credit card numbers, was stolen? It is an information security analyst's job to prevent that from happening. Organizations hire information security analysts to analyze possible threats against their computer systems, which can range from malicious hackers trying to steal data to careless employees who accidentally forget to log out of a…
Related Links
Cite This Page
General citation information is provided here. Be sure to check the formatting, including capitalization, for the method you are using and update your citation, as needed.MLA Style
Science Buddies Staff.
"Encryption." Science Buddies,
20 Nov. 2020,
https://www.sciencebuddies.org/science-fair-projects/project-ideas/CompSci_p031/computer-science/encryption.
Accessed 7 June 2023.
APA Style
Science Buddies Staff.
(2020, November 20).
Encryption.
Retrieved from
https://www.sciencebuddies.org/science-fair-projects/project-ideas/CompSci_p031/computer-science/encryption
Last edit date: 2020-11-20
Explore Our Science Videos
Fire Snake Experiment
How Train Wheels Stay On Track - STEM activity
Finding Pi Using Everyday Objects