<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">INFEDU</journal-id>
      <journal-title-group>
        <journal-title>Informatics in Education</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2335-8971</issn>
      <issn pub-type="ppub">1648-5831</issn>
      <publisher>
        <publisher-name>VU</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">INFEDU_2024_1_06</article-id>
      <article-id pub-id-type="doi">10.15388/infedu.2024.06</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>An Unplugged Didactical Situation on Cryptography between Informatics and Mathematics</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Bartzia</surname>
            <given-names>Evmorfia-Iro</given-names>
          </name>
          <email xlink:href="mailto:evmorfia-iro.bartzia@umontpellier.fr">evmorfia-iro.bartzia@umontpellier.fr</email>
          <xref ref-type="aff" rid="j_INFEDU_aff_000"/>
        </contrib>
        <aff id="j_INFEDU_aff_000">Institut Montpelliérain Alexander Grothendieck (IMAG), Université de Montpellier, France</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Lodi</surname>
            <given-names>Michael</given-names>
          </name>
          <email xlink:href="mailto:michael.lodi@uibo.it">michael.lodi@uibo.it</email>
          <xref ref-type="aff" rid="j_INFEDU_aff_001"/>
        </contrib>
        <aff id="j_INFEDU_aff_001">Dipartimento di Informatica-Scienza e Ingegneria (DISI), Università di Bologna, Italy
Laboratorio Nazionale ‘Informatica e Scuola’, CINI, Italy</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Sbaraglia</surname>
            <given-names>Marco</given-names>
          </name>
          <email xlink:href="mailto:marco.sbaraglia@unibo.it">marco.sbaraglia@unibo.it</email>
          <xref ref-type="aff" rid="j_INFEDU_aff_002"/>
        </contrib>
        <aff id="j_INFEDU_aff_002">Dipartimento di Informatica-Scienza e Ingegneria (DISI), Università di Bologna, Italy
Laboratorio Nazionale ‘Informatica e Scuola’, CINI, Italy</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Modeste</surname>
            <given-names>Simon</given-names>
          </name>
          <email xlink:href="mailto:simon.modeste@umontpellier.fr">simon.modeste@umontpellier.fr</email>
          <xref ref-type="aff" rid="j_INFEDU_aff_003"/>
        </contrib>
        <aff id="j_INFEDU_aff_003">Institut Montpelliérain Alexander Grothendieck (IMAG), Université de Montpellier, France</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Durand-Guerrier</surname>
            <given-names>Viviane</given-names>
          </name>
          <email xlink:href="mailto:viviane.durand-guerrier@umontpellier.fr">viviane.durand-guerrier@umontpellier.fr</email>
          <xref ref-type="aff" rid="j_INFEDU_aff_004"/>
        </contrib>
        <aff id="j_INFEDU_aff_004">Institut Montpelliérain Alexander Grothendieck (IMAG), Université de Montpellier, France</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Martini</surname>
            <given-names>Simone</given-names>
          </name>
          <email xlink:href="mailto:simone.martini@unibo.it">simone.martini@unibo.it</email>
          <xref ref-type="aff" rid="j_INFEDU_aff_005"/>
          <xref ref-type="corresp" rid="cor6">∗∗∗∗∗∗</xref>
        </contrib>
        <aff id="j_INFEDU_aff_005">Dipartimento di Informatica-Scienza e Ingegneria (DISI), Università di Bologna, Italy
Laboratorio Nazionale ‘Informatica e Scuola’, CINI, Italy</aff>
      </contrib-group>
      <author-notes>
        <corresp id="cor6"><label>∗∗∗∗∗∗</label>Corresponding author.</corresp>
      </author-notes>
      <volume>23</volume>
	  <issue>1</issue>
	  <fpage>25</fpage>
	  <lpage>56</lpage>
      <permissions>
        <copyright-year>2023</copyright-year>
        <copyright-holder>Vilnius University, ETH Zürich</copyright-holder>
        <license license-type="open-access">
          <license-p>Open access article under the CC BY license.</license-p>
        </license>
      </permissions>
      <abstract>
        <p>In this paper, we present an activity to introduce the idea of public-key cryptography and to make pre-service STEM teachers explore fundamental informatics and mathematical concepts and methods. We follow the Theory of Didactical Situations within the Didactical Engineering methodology (both widely used in mathematics education research) to design and analyse a didactical situation about asymmetric cryptography using graphs. Following the phases of Didactical Engineering, after the preliminary analysis of the content, the constraints and conditions of the teaching context, we conceived and analysed the situation a priori, with a particular focus on the milieu (the set of elements students can interact with) and on the choices for the didactical variables. We discuss their impact on the problem-solving strategies the participants need to elaborate to decrypt an encrypted message. We implemented our situation and collected qualitative data. We then analysed a posteriori the different stategies that participants used. The comparison of the a posteriori analysis with the a priori analysis showed the learning potential of the activity. To elaborate on different problem-solving strategies, the participants need to explore and understand several concepts and methods from mathematics, informatics, and the frontier of the two disciplines, also moving between different semiotic registers.</p>
      </abstract>
      <kwd-group>
        <label>Keywords</label>
        <kwd>public-key cryptography</kwd>
        <kwd>unplugged activity</kwd>
        <kwd>pre-service teacher training</kwd>
        <kwd>didactical engineering</kwd>
        <kwd>theory of didactical situations</kwd>
        <kwd>interdisciplinarity</kwd>
        <kwd>perfect dominating set</kwd>
      </kwd-group>
    </article-meta>
  </front>
</article>
