Read aboutthe"windtalkers" Keep it Simple:Does access to(use) of a cipherchange with it'scomplexity?Read aboutthe Vigenèrecipher - howis itdifferent?List 2 or 3 reasonswhy translating fromone language toanother might not bea great way tomaintainconfidentiality.Develop aprocedure thatmight describe"statistics" or"properties" of amessage.How mightthey helpdetectintegrityissues?Look up andsummarize whaatyou find aboutQuantumComputing andthe Future ofEncryptionCreate aworkingCaesarDecoderEnough toguaranteeintegrity?Create aworkingCaesarEncoderHow mightan adversaryattackcaesarciphers?Availabilityof msg to"public"Draw out the CIATriad and explainhow Cipherspositively andnegatively impacteach element.Create aworkingVigenèreEncoderCreate aworkingCaesarBrute ForceAttackerAvailabilityof msg totrustedpeopleRead aboutthe"windtalkers" Keep it Simple:Does access to(use) of a cipherchange with it'scomplexity?Read aboutthe Vigenèrecipher - howis itdifferent?List 2 or 3 reasonswhy translating fromone language toanother might not bea great way tomaintainconfidentiality.Develop aprocedure thatmight describe"statistics" or"properties" of amessage.How mightthey helpdetectintegrityissues?Look up andsummarize whaatyou find aboutQuantumComputing andthe Future ofEncryptionCreate aworkingCaesarDecoderEnough toguaranteeintegrity?Create aworkingCaesarEncoderHow mightan adversaryattackcaesarciphers?Availabilityof msg to"public"Draw out the CIATriad and explainhow Cipherspositively andnegatively impacteach element.Create aworkingVigenèreEncoderCreate aworkingCaesarBrute ForceAttackerAvailabilityof msg totrustedpeople

Caesar Ciphers & Cybersecurity Concepts | GenCyber-WY Hybrid Edition - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
C
2
B
3
C
4
C
5
Y
6
Y
7
R
8
B
9
Y
10
C
11
R
12
B
13
R
14
Y
15
R
16
B
  1. C-Read about the "windtalkers"
  2. B-Keep it Simple: Does access to (use) of a cipher change with it's complexity?
  3. C-Read about the Vigenère cipher - how is it different?
  4. C-List 2 or 3 reasons why translating from one language to another might not be a great way to maintain confidentiality.
  5. Y-Develop a procedure that might describe "statistics" or "properties" of a message.
  6. Y-How might they help detect integrity issues?
  7. R-Look up and summarize whaat you find about Quantum Computing and the Future of Encryption
  8. B-Create a working Caesar Decoder
  9. Y-Enough to guarantee integrity?
  10. C-Create a working Caesar Encoder
  11. R-How might an adversary attack caesar ciphers?
  12. B-Availability of msg to "public"
  13. R-Draw out the CIA Triad and explain how Ciphers positively and negatively impact each element.
  14. Y-Create a working Vigenère Encoder
  15. R-Create a working Caesar Brute Force Attacker
  16. B-Availability of msg to trusted people