Tag Archives: Cryptography

CYBER.ORG – 6.1.2 Symmetric and Asymmetric Encryption

Objective: Compare and contrast basic cryptography concepts.

Resources:

  • See PowerPoint presentation: 6.1.2 Symmetric and Asymmetric Encryption

Assignment:

  1. Begin reading the 6.1.2 Symmetric and Asymmetric Encryption.pptx presentation.

Assigned: March 31st, 2021
Teacher Pacing Due Date: April 1st, 2021

CYBER.ORG – 6.1.4 – Steganography

Objective: Compare and contrast basic cryptography concepts.

Resources:

  • See PowerPoint presentation: 6.1.4 – Steganography

Assignment:

  1. Begin reading the 6.1.4 – Steganography.pptx presentation.
  2. Complete the lab in the Lab – Steganography.pptx presentation.
  3. Turn in the resulting “image4.jpg” file with a message of your choice hidden in the image using the steghide app. Upload this image to today’s Google Classroom assignment post. We will use these images in tomorrow’s class session. (So keep your messages classy!)
  4. During tomorrow’s Late Start class session, we will read the Case Study – Steganography document and be prepared to answer the questions at the end.
  5. A Google Form will be provided to answer the Case Study questions tomorrow morning.

Assigned: March 23rd, 2021

Teacher Pacing Due Date: March 24th, 2021

CYBER.ORG – 6.1.3 – Hashing and Digital Signatures

Objective: Compare and contrast basic cryptography concepts.

Resources:

  • See PowerPoint presentation: 6.1.3 – Hashing and Digital Signatures

Assignment:

  1. Begin reading the 6.1.3 – Hashing and Digital Signatures.pptx presentation.
  2. Complete the lab in the Lab – Collision.pptx presentation.
  3. To verify completion of the lab, answer the questions in today’s assignment post in the Google Classroom.

Assigned: March 22nd, 2021

Teacher Pacing Due Date: March 23rd, 2021

CYBER.ORG – 6.2.4 – Hashing Algorithms

Objective: Explain cryptography algorithms and their basic characteristics.

Resources:

  • See PowerPoint presentation: 6.2.4 – Hashing Algorithms

Assignment:

  1. Begin reading the 6.2.4 – Hashing Algorithms.pptx presentation.
  2. Complete the lab in the Lab – File Hashing.pptx presentation.
  3. To verify completion of the lab, answer the questions in today’s assignment post in the Google Classroom.

Assigned: March 19th, 2021

Teacher Pacing Due Date: March 22nd, 2021

Section 4.4 Lab – Cryptography and the Caesar Cipher

Objective

  • Students will be able to encrypt and decrypt messages using the Caesar Cipher so they can develop a basic understanding of cryptography principles.

Links:

Topics Discussed:

  • Cryptography
  • Caesar Cipher
  • Shift Cipher
  • Keywords

Assignment:

  1. Follow along with the in-class demonstration to learn how the Caesar Cipher (also known as the Shift Cipher) works, and how you can use it to encode and decode text messages.
  2. Follow the Instructable to learn how keywords can be incorporated with this cipher to make it more difficult to decrypt.
  3. I have placed 8 encrypted messages around the perimeter of the room. Work together to decrypt them all! Submit a Google Doc to my Google Classroom page with the decrypted messages by the end of the day tomorrow.
  4. Some of the decrypted messages lead to treasure! The first to decode each message gets the goods!
  5. Remember, you may work together, but each student must submit their own original document to the Google Classroom page by tomorrow to receive credit for the lab. Don’t put more than one name on your document, and don’t submit someone else’s document as your own!

Assigned: January 21st, 2020
Due Date: January 22nd, 2020

National Cyber League Resources: Cryptography Links

Links:

Cryptii  A very cool and very fast “modular” decryption tool that lets you run a string of text through several encryption/decryption methods of your choice.

The Black Chamber  A great collection of interactive tools that explain and allow you to decrypt a variety of common (and some uncommon) encoding schemes.

Decode Ingress – A list of tools that can help you with decoding  passcodes, originally provided for use with the AR game Ingress. Tools for text manipulating, basic conversions like text to ASCII, HEX to Base64. Tools to decipher Morse code.  Good Image exif info grabbers, and image editing tools for Steganography puzzles (messages hidden in digital images). A range of great info and tools about various ciphers, and their implementations.

Tools for Noobs: Online Decryption Tool – Decrypts a string using various algorithms (e.g. Blowfish, DES, TripleDES, Enigma).

Rumkin Deciphering Tools – This is a page dedicated to simple text manipulation tools, which all can be replicated with just paper and pencil. An amazing resource for deciphering methods, including many that we will definitely encounter in NCL puzzles (Atbash, Railfence and Vigenere).

MD5hashing.net Encryption and Decryption – At md5hashing.net you can hash (encrypt) any string into 66 different hash types. As you probably know – decryption of any hash is impossible, but they offer reverse decryption via our database (~1000M records, and counting).

Splitbrain.org Encoding/Decoding Tools This tool helps you to quickly run some text through various different encoding/decoding functions available in PHP. Great for a lot of different decoding possibilities rapidly

CodeBeautify.org Encryption/Decryption Tool – A nice, clean tool for decrypting codes that you know the key for, or encrypting codes with your own original key.

SQLite Viewer for Chrome – Chrome plugin for viewing SQLite databases in your browser. Allows opening and editing of SQLite databases without requiring admin access to install.

National Cyber League Resources: Cryptography Links

Links:

Decode Ingress – A list of tools that can help you with decoding  passcodes, originally provided for use with the AR game Ingress. Tools for text manipulating, basic conversions like text to ASCII, HEX to Base64. Tools to decipher Morse code.  Good Image exif info grabbers, and image editing tools for Steganography puzzles (messages hidden in digital images). A range of great info and tools about various ciphers, and their implementations.

Tools for Noobs: Online Decryption Tool – Decrypts a string using various algorithms (e.g. Blowfish, DES, TripleDES, Enigma).

Rumkin Deciphering Tools – This is a page dedicated to simple text manipulation tools, which all can be replicated with just paper and pencil. An amazing resource for deciphering methods, including many that we will definitely encounter in NCL puzzles (Atbash, Railfence and Vigenere).

MD5hashing.net Encryption and Decryption – At md5hashing.net you can hash (encrypt) any string into 66 different hash types. As you probably know – decryption of any hash is impossible, but they offer reverse decryption via our database (~1000M records, and counting).

Splitbrain.org Encoding/Decoding Tools This tool helps you to quickly run some text through various different encoding/decoding functions available in PHP. Great for a lot of different decoding possibilities rapidly

CodeBeautify.org Encryption/Decryption Tool – A nice, clean tool for decrypting codes that you know the key for, or encrypting codes with your own original key.

SQLite Viewer for Chrome – Chrome plugin for viewing SQLite databases in your browser. Allows opening and editing of SQLite databases without requiring admin access to install.