Note for Adults
In the digital space, we don’t want other people to read our messages, or to see or copy and re-use pictures that we’ve sent. This is why data sent by email is also packaged, sealed, and encrypted. During the encrypting process, the readable text (clear text) is transformed into a confidential message that cannot be deciphered without a key. If the same key is used for both encrypting and decrypting information, this is called symmetrical encryption. The asymmetrical encryption uses two keys. The sender encrypts the message with a public key that is accessible by anyone. The recipient then decrypts the information with a private key only available to them. This way the key doesn’t need to be sent and therefore cannot be intercepted. The encryption activity using the
cardboard roll is based on the Greek scytale, one of the oldest known encryption methods.
To round up the discussion, you could discuss the eSafety early years program, released by the Australian eSafety Commissioner. You could, for instance, discuss the ‘Our family tech agreement’ and how it could be applied to an early childhood setting.