Interactive Computer Science Learning

Phase 1 MVPLogin

Data Security & Cryptography

Visual, step-by-step cryptography from Caesar to RSA.

From Caesar ciphers to RSA and AES — understand how encryption works from first principles, with step-by-step visual walkthroughs of each algorithm and an interactive Enigma machine.

Classical ciphersPublic-key cryptographyCryptographic hashingInteractive Enigma machineStep-by-step visualization

0/14

lessons completed

Module 1

Symmetric Encryption

The same key encrypts and decrypts. Explore classical ciphers and the ideas behind modern AES.

SY
Caesar Cipher12m
Vigenère Cipher15m
XOR Encryption15m
AES (Conceptual)20m

0/4 completed

In Progress
Open Module →
Module 2

Asymmetric Encryption

Public key encrypts, private key decrypts. No need to share a secret in advance.

AS
RSA (Conceptual)20m
Diffie-Hellman Key Exchange18m
Hybrid Encryption15m

0/3 completed

In Progress
Open Module →
Module 3

Cryptographic Hashing

One-way functions that produce a fixed-size fingerprint of any input — the backbone of integrity and authentication.

HS
What Is Hashing?12m
MD5 & SHA Conceptually18m
Collision Resistance15m
HMAC15m

0/4 completed

In Progress
Open Module →
Module 4

Bonus: Enigma Machine

Step inside WWII's most famous cipher machine — and learn how it was broken.

EN
Enigma: History & Design10m
Enigma Machine (Interactive)interactive20m
Breaking Enigma: The Bombe18m

0/3 completed

In Progress
Open Module →