CYBER.ORG: AP Cybersecurity – Lesson 2.6.1 – Cryptographic Flaws and Attacks

Objective:

  • Students will:
    • Identify common cryptographic flaws and vulnerabilities in various systems.
    • Explain how specific attacks, such as man-in-the-middle or brute force attacks, exploit these flaws.
    • Analyze case studies of real-world cryptographic breaches to understand their impact.
    • Evaluate the effectiveness of different cryptographic algorithms and protocols.
    • Recommend best practices for securing cryptographic implementations in applications.

Standards:


CompTIA Security+ Objective(s):

3B-NI-04 – Compare ways software developers protect devices and information from unauthorized access.

  • 2.4 Given a scenario, analyze indicators of malicious activity.
    • Downgrade
    • Collision
    • Birthday

Guiding Question:

How does cryptography and encryption protect our daily digital interactions and ensure the security of information?

Resources:

  • Lesson 2.6.1 – Cryptographic Flaws and Attacks.pptx and Lab 2.6.1 – RSA Key Generation and Secure Shell.pptx presentations and Lab 2.5.1 – Caesar and GPG Activity sheet available on Google Classroom

Assignment:

  1. Read the Lesson 2.5.1 – Daily Application of Cryptography and Encryption.pptx presentation in today’s class.
  2. Complete the Lab 2.5.1 – Caesar and GPG Activity Form using the Lab 2.5.1 – Caesar and GPG.pptx Powerpoint Presentation posted in the Google Classroom.
  3. Hand in the completed Lab 2.6.1 – RSA Key Generation and Secure Shell Activity Form to complete the lab (50 pts).

Assigned: April 20th, 2026
Teacher Pacing Due Date: April 21st, 2026