Keep it Simple:Does access to(use) of a cipherchange with it'scomplexity?Draw out the CIATriad and explainhow Cipherspositively andnegatively impacteach element.Read aboutthe"windtalkers" How mightan adversaryattackcaesarciphers?Create aworkingCaesarEncoderRead aboutthe Vigenèrecipher - howis itdifferent?How mightthey helpdetectintegrityissues?Availabilityof msg to"public"Look up andsummarize whaatyou find aboutQuantumComputing andthe Future ofEncryptionCreate aworkingCaesarDecoderEnough toguaranteeintegrity?Create aworkingVigenèreEncoderList 2 or 3 reasonswhy translating fromone language toanother might not bea great way tomaintainconfidentiality.Availabilityof msg totrustedpeopleDevelop aprocedure thatmight describe"statistics" or"properties" of amessage.Create aworkingCaesarBrute ForceAttackerKeep it Simple:Does access to(use) of a cipherchange with it'scomplexity?Draw out the CIATriad and explainhow Cipherspositively andnegatively impacteach element.Read aboutthe"windtalkers" How mightan adversaryattackcaesarciphers?Create aworkingCaesarEncoderRead aboutthe Vigenèrecipher - howis itdifferent?How mightthey helpdetectintegrityissues?Availabilityof msg to"public"Look up andsummarize whaatyou find aboutQuantumComputing andthe Future ofEncryptionCreate aworkingCaesarDecoderEnough toguaranteeintegrity?Create aworkingVigenèreEncoderList 2 or 3 reasonswhy translating fromone language toanother might not bea great way tomaintainconfidentiality.Availabilityof msg totrustedpeopleDevelop aprocedure thatmight describe"statistics" or"properties" of amessage.Create aworkingCaesarBrute ForceAttacker

Caesar Ciphers & Cybersecurity Concepts | GenCyber-WY Hybrid Edition - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
R
3
C
4
R
5
C
6
C
7
Y
8
B
9
R
10
B
11
Y
12
Y
13
C
14
B
15
Y
16
R
  1. B-Keep it Simple: Does access to (use) of a cipher change with it's complexity?
  2. R-Draw out the CIA Triad and explain how Ciphers positively and negatively impact each element.
  3. C-Read about the "windtalkers"
  4. R-How might an adversary attack caesar ciphers?
  5. C-Create a working Caesar Encoder
  6. C-Read about the Vigenère cipher - how is it different?
  7. Y-How might they help detect integrity issues?
  8. B-Availability of msg to "public"
  9. R-Look up and summarize whaat you find about Quantum Computing and the Future of Encryption
  10. B-Create a working Caesar Decoder
  11. Y-Enough to guarantee integrity?
  12. Y-Create a working Vigenère Encoder
  13. C-List 2 or 3 reasons why translating from one language to another might not be a great way to maintain confidentiality.
  14. B-Availability of msg to trusted people
  15. Y-Develop a procedure that might describe "statistics" or "properties" of a message.
  16. R-Create a working Caesar Brute Force Attacker