Look up andsummarize whaatyou find aboutQuantumComputing andthe Future ofEncryptionCreate aworkingCaesarBrute ForceAttackerDevelop aprocedure thatmight describe"statistics" or"properties" of amessage.Create aworkingVigenèreEncoderRead aboutthe Vigenèrecipher - howis itdifferent?Enough toguaranteeintegrity?Keep it Simple:Does access to(use) of a cipherchange with it'scomplexity?Draw out the CIATriad and explainhow Cipherspositively andnegatively impacteach element.Create aworkingCaesarDecoderCreate aworkingCaesarEncoderHow mightthey helpdetectintegrityissues?Availabilityof msg totrustedpeopleRead aboutthe"windtalkers" How mightan adversaryattackcaesarciphers?Availabilityof msg to"public"List 2 or 3 reasonswhy translating fromone language toanother might not bea great way tomaintainconfidentiality.Look up andsummarize whaatyou find aboutQuantumComputing andthe Future ofEncryptionCreate aworkingCaesarBrute ForceAttackerDevelop aprocedure thatmight describe"statistics" or"properties" of amessage.Create aworkingVigenèreEncoderRead aboutthe Vigenèrecipher - howis itdifferent?Enough toguaranteeintegrity?Keep it Simple:Does access to(use) of a cipherchange with it'scomplexity?Draw out the CIATriad and explainhow Cipherspositively andnegatively impacteach element.Create aworkingCaesarDecoderCreate aworkingCaesarEncoderHow mightthey helpdetectintegrityissues?Availabilityof msg totrustedpeopleRead aboutthe"windtalkers" How mightan adversaryattackcaesarciphers?Availabilityof msg to"public"List 2 or 3 reasonswhy translating fromone language toanother might not bea great way tomaintainconfidentiality.

Caesar Ciphers & Cybersecurity Concepts | GenCyber-WY Hybrid Edition - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
R
2
R
3
Y
4
Y
5
C
6
Y
7
B
8
R
9
B
10
C
11
Y
12
B
13
C
14
R
15
B
16
C
  1. R-Look up and summarize whaat you find about Quantum Computing and the Future of Encryption
  2. R-Create a working Caesar Brute Force Attacker
  3. Y-Develop a procedure that might describe "statistics" or "properties" of a message.
  4. Y-Create a working Vigenère Encoder
  5. C-Read about the Vigenère cipher - how is it different?
  6. Y-Enough to guarantee integrity?
  7. B-Keep it Simple: Does access to (use) of a cipher change with it's complexity?
  8. R-Draw out the CIA Triad and explain how Ciphers positively and negatively impact each element.
  9. B-Create a working Caesar Decoder
  10. C-Create a working Caesar Encoder
  11. Y-How might they help detect integrity issues?
  12. B-Availability of msg to trusted people
  13. C-Read about the "windtalkers"
  14. R-How might an adversary attack caesar ciphers?
  15. B-Availability of msg to "public"
  16. C-List 2 or 3 reasons why translating from one language to another might not be a great way to maintain confidentiality.