Create aworkingCaesarBrute ForceAttackerDraw out the CIATriad and explainhow Cipherspositively andnegatively impacteach element.Read aboutthe"windtalkers" Create aworkingCaesarEncoderCreate aworkingCaesarDecoderList 2 or 3 reasonswhy translating fromone language toanother might not bea great way tomaintainconfidentiality.How mightan adversaryattackcaesarciphers?Read aboutthe Vigenèrecipher - howis itdifferent?Enough toguaranteeintegrity?Look up andsummarize whaatyou find aboutQuantumComputing andthe Future ofEncryptionKeep it Simple:Does access to(use) of a cipherchange with it'scomplexity?Availabilityof msg totrustedpeopleDevelop aprocedure thatmight describe"statistics" or"properties" of amessage.Availabilityof msg to"public"Create aworkingVigenèreEncoderHow mightthey helpdetectintegrityissues?Create aworkingCaesarBrute ForceAttackerDraw out the CIATriad and explainhow Cipherspositively andnegatively impacteach element.Read aboutthe"windtalkers" Create aworkingCaesarEncoderCreate aworkingCaesarDecoderList 2 or 3 reasonswhy translating fromone language toanother might not bea great way tomaintainconfidentiality.How mightan adversaryattackcaesarciphers?Read aboutthe Vigenèrecipher - howis itdifferent?Enough toguaranteeintegrity?Look up andsummarize whaatyou find aboutQuantumComputing andthe Future ofEncryptionKeep it Simple:Does access to(use) of a cipherchange with it'scomplexity?Availabilityof msg totrustedpeopleDevelop aprocedure thatmight describe"statistics" or"properties" of amessage.Availabilityof msg to"public"Create aworkingVigenèreEncoderHow mightthey helpdetectintegrityissues?

Caesar Ciphers & Cybersecurity Concepts | GenCyber-WY Hybrid Edition - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
R
2
R
3
C
4
C
5
B
6
C
7
R
8
C
9
Y
10
R
11
B
12
B
13
Y
14
B
15
Y
16
Y
  1. R-Create a working Caesar Brute Force Attacker
  2. R-Draw out the CIA Triad and explain how Ciphers positively and negatively impact each element.
  3. C-Read about the "windtalkers"
  4. C-Create a working Caesar Encoder
  5. B-Create a working Caesar Decoder
  6. C-List 2 or 3 reasons why translating from one language to another might not be a great way to maintain confidentiality.
  7. R-How might an adversary attack caesar ciphers?
  8. C-Read about the Vigenère cipher - how is it different?
  9. Y-Enough to guarantee integrity?
  10. R-Look up and summarize whaat you find about Quantum Computing and the Future of Encryption
  11. B-Keep it Simple: Does access to (use) of a cipher change with it's complexity?
  12. B-Availability of msg to trusted people
  13. Y-Develop a procedure that might describe "statistics" or "properties" of a message.
  14. B-Availability of msg to "public"
  15. Y-Create a working Vigenère Encoder
  16. Y-How might they help detect integrity issues?