Objective:
- Students will:
- Identify common cryptographic flaws and vulnerabilities in various systems.
- Explain how specific attacks, such as man-in-the-middle or brute force attacks, exploit these flaws.
- Analyze case studies of real-world cryptographic breaches to understand their impact.
- Evaluate the effectiveness of different cryptographic algorithms and protocols.
- Recommend best practices for securing cryptographic implementations in applications.
Standards:
CompTIA Security+ Objective(s):
3B-NI-04 – Compare ways software developers protect devices and information from unauthorized access.
- 2.4 Given a scenario, analyze indicators of malicious activity.
- Downgrade
- Collision
- Birthday
Guiding Question:
How does cryptography and encryption protect our daily digital interactions and ensure the security of information?
Resources:
- Lesson 2.6.1 – Cryptographic Flaws and Attacks.pptx and Lab 2.6.1 – RSA Key Generation and Secure Shell.pptx presentations and Lab 2.5.1 – Caesar and GPG Activity sheet available on Google Classroom
Assignment:
- Read the Lesson 2.5.1 – Daily Application of Cryptography and Encryption.pptx presentation in today’s class.
- Complete the Lab 2.5.1 – Caesar and GPG Activity Form using the Lab 2.5.1 – Caesar and GPG.pptx Powerpoint Presentation posted in the Google Classroom.
- Hand in the completed Lab 2.6.1 – RSA Key Generation and Secure Shell Activity Form to complete the lab (50 pts).
Assigned: April 20th, 2026
Teacher Pacing Due Date: April 21st, 2026