Create aworkingCaesarEncoderEnough toguaranteeintegrity?Create aworkingVigenèreEncoderRead aboutthe"windtalkers" Create aworkingCaesarDecoderDevelop aprocedure thatmight describe"statistics" or"properties" of amessage.Create aworkingCaesarBrute ForceAttackerRead aboutthe Vigenèrecipher - howis itdifferent?Availabilityof msg totrustedpeopleKeep it Simple:Does access to(use) of a cipherchange with it'scomplexity?How mightan adversaryattackcaesarciphers?Draw out the CIATriad and explainhow Cipherspositively andnegatively impacteach element.List 2 or 3 reasonswhy translating fromone language toanother might not bea great way tomaintainconfidentiality.How mightthey helpdetectintegrityissues?Look up andsummarize whaatyou find aboutQuantumComputing andthe Future ofEncryptionAvailabilityof msg to"public"Create aworkingCaesarEncoderEnough toguaranteeintegrity?Create aworkingVigenèreEncoderRead aboutthe"windtalkers" Create aworkingCaesarDecoderDevelop aprocedure thatmight describe"statistics" or"properties" of amessage.Create aworkingCaesarBrute ForceAttackerRead aboutthe Vigenèrecipher - howis itdifferent?Availabilityof msg totrustedpeopleKeep it Simple:Does access to(use) of a cipherchange with it'scomplexity?How mightan adversaryattackcaesarciphers?Draw out the CIATriad and explainhow Cipherspositively andnegatively impacteach element.List 2 or 3 reasonswhy translating fromone language toanother might not bea great way tomaintainconfidentiality.How mightthey helpdetectintegrityissues?Look up andsummarize whaatyou find aboutQuantumComputing andthe Future ofEncryptionAvailabilityof msg to"public"

Caesar Ciphers & Cybersecurity Concepts | GenCyber-WY Hybrid Edition - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
C
2
Y
3
Y
4
C
5
B
6
Y
7
R
8
C
9
B
10
B
11
R
12
R
13
C
14
Y
15
R
16
B
  1. C-Create a working Caesar Encoder
  2. Y-Enough to guarantee integrity?
  3. Y-Create a working Vigenère Encoder
  4. C-Read about the "windtalkers"
  5. B-Create a working Caesar Decoder
  6. Y-Develop a procedure that might describe "statistics" or "properties" of a message.
  7. R-Create a working Caesar Brute Force Attacker
  8. C-Read about the Vigenère cipher - how is it different?
  9. B-Availability of msg to trusted people
  10. B-Keep it Simple: Does access to (use) of a cipher change with it's complexity?
  11. R-How might an adversary attack caesar ciphers?
  12. R-Draw out the CIA Triad and explain how Ciphers positively and negatively impact each element.
  13. C-List 2 or 3 reasons why translating from one language to another might not be a great way to maintain confidentiality.
  14. Y-How might they help detect integrity issues?
  15. R-Look up and summarize whaat you find about Quantum Computing and the Future of Encryption
  16. B-Availability of msg to "public"