How mightan adversaryattackcaesarciphers?Create aworkingVigenèreEncoderRead aboutthe"windtalkers" Create aworkingCaesarDecoderDraw out the CIATriad and explainhow Cipherspositively andnegatively impacteach element.Create aworkingCaesarEncoderAvailabilityof msg totrustedpeopleKeep it Simple:Does access to(use) of a cipherchange with it'scomplexity?Read aboutthe Vigenèrecipher - howis itdifferent?List 2 or 3 reasonswhy translating fromone language toanother might not bea great way tomaintainconfidentiality.Availabilityof msg to"public"How mightthey helpdetectintegrityissues?Enough toguaranteeintegrity?Develop aprocedure thatmight describe"statistics" or"properties" of amessage.Create aworkingCaesarBrute ForceAttackerLook up andsummarize whaatyou find aboutQuantumComputing andthe Future ofEncryptionHow mightan adversaryattackcaesarciphers?Create aworkingVigenèreEncoderRead aboutthe"windtalkers" Create aworkingCaesarDecoderDraw out the CIATriad and explainhow Cipherspositively andnegatively impacteach element.Create aworkingCaesarEncoderAvailabilityof msg totrustedpeopleKeep it Simple:Does access to(use) of a cipherchange with it'scomplexity?Read aboutthe Vigenèrecipher - howis itdifferent?List 2 or 3 reasonswhy translating fromone language toanother might not bea great way tomaintainconfidentiality.Availabilityof msg to"public"How mightthey helpdetectintegrityissues?Enough toguaranteeintegrity?Develop aprocedure thatmight describe"statistics" or"properties" of amessage.Create aworkingCaesarBrute ForceAttackerLook up andsummarize whaatyou find aboutQuantumComputing andthe Future ofEncryption

Caesar Ciphers & Cybersecurity Concepts | GenCyber-WY Hybrid Edition - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
R
2
Y
3
C
4
B
5
R
6
C
7
B
8
B
9
C
10
C
11
B
12
Y
13
Y
14
Y
15
R
16
R
  1. R-How might an adversary attack caesar ciphers?
  2. Y-Create a working Vigenère Encoder
  3. C-Read about the "windtalkers"
  4. B-Create a working Caesar Decoder
  5. R-Draw out the CIA Triad and explain how Ciphers positively and negatively impact each element.
  6. C-Create a working Caesar Encoder
  7. B-Availability of msg to trusted people
  8. B-Keep it Simple: Does access to (use) of a cipher change with it's complexity?
  9. C-Read about the Vigenère cipher - how is it different?
  10. C-List 2 or 3 reasons why translating from one language to another might not be a great way to maintain confidentiality.
  11. B-Availability of msg to "public"
  12. Y-How might they help detect integrity issues?
  13. Y-Enough to guarantee integrity?
  14. Y-Develop a procedure that might describe "statistics" or "properties" of a message.
  15. R-Create a working Caesar Brute Force Attacker
  16. R-Look up and summarize whaat you find about Quantum Computing and the Future of Encryption