Availabilityof msg totrustedpeopleRead aboutthe Vigenèrecipher - howis itdifferent?Look up andsummarize whaatyou find aboutQuantumComputing andthe Future ofEncryptionKeep it Simple:Does access to(use) of a cipherchange with it'scomplexity?List 2 or 3 reasonswhy translating fromone language toanother might not bea great way tomaintainconfidentiality.Create aworkingVigenèreEncoderRead aboutthe"windtalkers" Create aworkingCaesarBrute ForceAttackerCreate aworkingCaesarEncoderDraw out the CIATriad and explainhow Cipherspositively andnegatively impacteach element.Create aworkingCaesarDecoderHow mightthey helpdetectintegrityissues?Enough toguaranteeintegrity?Availabilityof msg to"public"How mightan adversaryattackcaesarciphers?Develop aprocedure thatmight describe"statistics" or"properties" of amessage.Availabilityof msg totrustedpeopleRead aboutthe Vigenèrecipher - howis itdifferent?Look up andsummarize whaatyou find aboutQuantumComputing andthe Future ofEncryptionKeep it Simple:Does access to(use) of a cipherchange with it'scomplexity?List 2 or 3 reasonswhy translating fromone language toanother might not bea great way tomaintainconfidentiality.Create aworkingVigenèreEncoderRead aboutthe"windtalkers" Create aworkingCaesarBrute ForceAttackerCreate aworkingCaesarEncoderDraw out the CIATriad and explainhow Cipherspositively andnegatively impacteach element.Create aworkingCaesarDecoderHow mightthey helpdetectintegrityissues?Enough toguaranteeintegrity?Availabilityof msg to"public"How mightan adversaryattackcaesarciphers?Develop aprocedure thatmight describe"statistics" or"properties" of amessage.

Caesar Ciphers & Cybersecurity Concepts | GenCyber-WY Hybrid Edition - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
C
3
R
4
B
5
C
6
Y
7
C
8
R
9
C
10
R
11
B
12
Y
13
Y
14
B
15
R
16
Y
  1. B-Availability of msg to trusted people
  2. C-Read about the Vigenère cipher - how is it different?
  3. R-Look up and summarize whaat you find about Quantum Computing and the Future of Encryption
  4. B-Keep it Simple: Does access to (use) of a cipher change with it's complexity?
  5. C-List 2 or 3 reasons why translating from one language to another might not be a great way to maintain confidentiality.
  6. Y-Create a working Vigenère Encoder
  7. C-Read about the "windtalkers"
  8. R-Create a working Caesar Brute Force Attacker
  9. C-Create a working Caesar Encoder
  10. R-Draw out the CIA Triad and explain how Ciphers positively and negatively impact each element.
  11. B-Create a working Caesar Decoder
  12. Y-How might they help detect integrity issues?
  13. Y-Enough to guarantee integrity?
  14. B-Availability of msg to "public"
  15. R-How might an adversary attack caesar ciphers?
  16. Y-Develop a procedure that might describe "statistics" or "properties" of a message.