This support in the lesson plan was helpful to me when I taught this lesson. As I prepare to teach it in a week or so, I am also pondering ways to present it that doesn't lose students. The takeaways I want are:
1) how to calculate mod Since it is not a button on most calculators, most students are new to the operation.
2) mod is a one way function i.e. easy to calculate but very difficult to do the 'inverse'. Students know how to 'undo' basic operations like addition or multiplication but the mod function can have infinite answers. For instance, if I said some number plus 7 is 20, there is only one answer. But, if I said some number mod 7 is 2, the number could be 16, 23, 37, 44...
3) RSA encryption, in real life, exploits this by using really large prime numbers
4) The widget models the algorithm but keeps the numbers reasonably small so we can see 'under the hood'
Even though Eve has the public information (some calculated using mod), she has to randomly guess the secret number which represents a message. Basically, trying to solve the equation where the message is x. Since there are technically infinite answers, this process is a challenge even with the widget's reduced number size.
5) They will not have to do this calculation. It's more about understanding asymmetric encryption.
When I taught this 2 years ago, my students really struggled with the cups and beans activity. After spending a lot of time on modulus, I sold this activity as a magic trick. We did several rounds of just one Alice and one Bob for the whole class and I shared their screens. I made sure the numbers stayed really small at first so we could do the calculations by hand. After I felt they got a handle on those two roles and they trusted the widget, I was Eve for Alice/Bob pair. Then, I challenged the all the other students to be Eve - to break the code. Then, I shared how it works in real life.
This support in the lesson plan was helpful to me when I planned for this year.