Cryptography Lesson Plan

Similar documents
Worksheet - Reading Guide for Keys and Passwords

Cryptography Worksheet

Quantum Encryption Keys

Computers and Security

Unit 1: Guess and Check: A Decoding Strategy

Modern Cryptography Activity 1: Caesar Ciphers

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Sending secret messages with cryptography. An activity by the Australian Computing Academy

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017

Authentication CHAPTER 17

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Activity Guide - Public Key Cryptography

ENGR/CS 101 CS Session Lecture 5

Encryption à la Mod Name

Introduction to Cryptography in Blockchain Technology. December 23, 2018

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Cryptography. Intercepting Information Scenario 1. Tuesday, December 9, December 9, Wireless broadcasts information using radio signals

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Cryptography I ALFE APRTGHAL KAP BQQQ ADCQTPEMY KSANG A KGA-ETAM MFLK FQRUQY

Lecture 1: Perfect Security

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Nature Sunday Academy Lesson Plan

PROJECT 2: Encoding Assistants CSE100/INFO100 Fluency with Information Technology Spring 2002

Cryptography on MSX Fubswrjudskb rq PVZ

Cryptography. What is Cryptography?

Information Systems Security

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building

LAB: Public-Key Encryption

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

NETWORK SECURITY & CRYPTOGRAPHY

CS 135: Fall Project 2 Simple Cryptography

CRYPTOGRAPHY. BY, Ayesha Farhin

2.1 Basic Cryptography Concepts

A Proposed Method for Cryptography using Random Key and Rotation of Text

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

CRYPTOGRAPHY Thursday, April 24,

Chapter 17: Information Science Lesson Plan

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 4

Cryptography Introduction

Cryptanalysis. Ed Crowley

Classical Encryption Techniques

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

CSC 474/574 Information Systems Security

CS 332 Computer Networks Security

Cryptography ThreeB. Ed Crowley. Fall 08

Cryptography: Matrices and Encryption

CS 100: Encryption and Passwords

Most Common Security Threats (cont.)

Cryptography. Cryptography is much more than. What is Cryptography, exactly? Why Cryptography? (cont d) Straight encoding and decoding

Cryptographic Concepts

Recap. Definition (Encryption: Caesar Cipher)

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

NUMB3RS Activity: Creating Codes. Episode: Backscatter

Classical Cryptography. Thierry Sans

The inverse of a matrix

Cryptography (Overview)

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication

Full file at

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

CSCE 813 Internet Security Symmetric Cryptography

Public Key Cryptography and RSA

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

ISA 562: Information Security, Theory and Practice. Lecture 1

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Classical Encryption Techniques. CSS 322 Security and Cryptography

Channel Coding and Cryptography Part II: Introduction to Cryptography

IMPORTANCE OF NUMBER THEORY IN CRYPTOGRAPHY

2

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

Lecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World ( )( )JNTU World

CSC 580 Cryptography and Computer Security

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Cryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

CSCE 715: Network Systems Security

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college

The Caesar Cipher Informatics 1 Functional Programming: Tutorial 3

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

CS61A Lecture #39: Cryptography

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

Cryptography. Historical Encoding. Encryption Media. Intro to Encryption 8/24/2010. COMP620 Information Privacy & Security 1

18-642: Cryptography 11/15/ Philip Koopman

Cryptography and Network Security. Saint Leo University. COM 450- Network Defense and Security. Instructor: Dr. Omar.

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

Computational Security, Stream and Block Cipher Functions

Programming Problems 21st Annual Computer Science Programming Contest

A Tour of Classical and Modern Cryptography

18-642: Cryptography

Cryptography. How to Protect Your Data

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

COSC 122 Computer Fluency. Security. Dr. Ramon Lawrence University of British Columbia Okanagan

PROTECTING CONVERSATIONS

Textbook: Ahmet Burak Can Hacettepe University. Supplementary books:

The Hill Cipher. In 1929 Lester Hill, a professor at Hunter College, published an article in the American

Transcription:

Cryptography Lesson Plan Overview - Cryptography Summary There is a large amount of sensitive information being stored on computers and transmitted between computers today, including account passwords, trade secrets, and personal financial information. To keep this information hidden from third parties who may want access to it, cryptographic techniques must be used to encrypt it, making it difficult or impossible to actually recover the original data for anyone but the intended recipient. Because most modern cryptographic algorithms involve high-level mathematical concepts, this activity will not discuss them, but it will investigate the general ideas behind cryptography and introduce the idea of analyzing the strength of different kinds of encryption. Time Line What Time Where (mins) Introduction 5 Cryptography.pdf Worksheet The Caesar Cipher 10 CryptographyWorksheets.pdf Class Discussion - Breaking Encryption 5 Cryptography.pdf Party explanation 5 Cryptography.pdf Encode surprise party 10 CryptographyWorksheets.pdf Decode surprise party 10 CryptographyWorksheets.pdf Wrap-up Discussion 5 Cryptography.pdf Total 50 Materials CryptographySlides.pdf (optional) Print the following handouts: o Worksheet 1: The Caesar Cipher, 1 per student o Worksheet 2: The Packet Villain, 1 per student (optional) Each student will need the following handouts: o Caesar Wheel (2 on each sheet) o May also be used just for class discussion, or omitted completely

Introduction to Cryptography Cryptography is the study of encryption and decryption of messages. The principle of encoding a message is to ensure that only the intended receiver understands the message. Thus, when encoding a message, it is important to define a consistent cipher, which is known by the recipient beforehand. A cipher determines how the message is encrypted. One of the earliest known ciphers is the Caesar cipher, which Julius Caesar used to send encoded and secure messages to generals in the Roman army. The Caesar cipher shifts the alphabet system by a predetermined amount so that the beginning letter of the encrypted messages alphabet is different than that of the original message. For example, a Caesar cipher that translates the message BAD into EDG is said to have a shift of 3. This is because each letter in the original message is shifted 3 letters forward in the alphabet. This cipher is relatively easy to break, due to the limited number of ciphers (25, to be exact), but is a good representation of the basic principles of cryptography. Cryptography is widely used in computer science. Internet traffic is often encrypted at some level and relies on consistent cipher generation and transmission in order for secure messages to be sent. The purpose of this module is to provide students an introduction into the world of cryptography through the Caesar cipher and to help students understand how cryptography is used in computer science.

Cheat Sheet Terminology Cryptography - the study of encryption and decryption of messages Encoding- obfuscating a message Decoding- figuring out the original message from the encrypted message

Introduction- Whole Class Lesson Vocabulary (you may want to write on board) cryptography encode decode Start by getting the students to think about what kinds of information might need to be kept hidden. What if all of our passwords were transmitted over the internet without any sort of encryption? Take ideas about how we might protect sensitive information. Next, explain the idea of encrypting a message (i.e., modifying it to be unrecognizable) before transmitting it to make it harder for someone who intercepts the message to actually read, unless they can figure out how to decode it. Then, transition into explaining the Caesar Cipher worksheet. The following example will give students a good idea as to how cryptography works before they start the first worksheet. Tell the students you are going to encrypt a message using a cipher or key of size 2. Ask if they can decrypt the following message: eqorwvgt [answer: computer]

Activity- Worksheet 1: The Caesar Cipher Worksheet The Caesar Cipher This worksheet introduces a very simple kind of encryption which was used by Julius Caesar. The worksheet walks the students through the mechanics of the cipher, and lets them practice using it on their own. Specifically, the allows students to sharpen their skills in encoding and decoding a variety of messages using different keys. The Caesar Cipher Answer Key

Activity- Team Worksheet Divide the class into groups of 3 or 4. Explain that each group is trying to get together a surprise party without the lucky person finding out. The team will need to make up the details - who will the surprise party be for? Where? What game or activity will you do at the party? What gift will you bring? You may want to encourage students to use answers that are fairly short (e.g., 1-3 words, not entire sentences) Packet Villain. The first part of the worksheet is just to practice encoding/decoding when the exact cipher is not specified (but limited to one of 3, to keep it fairly simple). This exercise is called Packet Villain. This small practice should not take very long, but gives practice encoding a known message (the partner s name). Surprise Party. Next the teams should encode the details of the party. Each person should encode only ONE detail. After the encoding is done, have the teams swap and see if they can figure out the details. Note that this will be harder, because students do not know a) which cipher was used or b) what the answer is. If a team is really struggling, you might ask the other team to tell which cipher they used. As teams finish the decoding, share some of the party details with the entire class.

What s It All About Discussion Whole Class People rely on encryption all the time when using the internet. Some of the uses of encryption include: Protecting credit card details or other sensitive information in online transactions. Protecting email communication from eavesdropping third parties Verifying the authenticity of software updates to prevent installation of malicious software Without strong cryptographic algorithms, it would be impossible to hide information from others or verify the identity of anyone on the internet, and most of our modern internet infrastructure would not function. A simple substitution cipher can be broken in fractions of a second by any modern computer. Modern cryptography uses the idea of computational intractability problems which take unreasonable amounts of time to solve Many algorithms are based on large prime numbers Multiplying two large primes: 15 microseconds Recovering the original two factors: 200,000 years OPTIONAL: Modern decryption methods often rely on considering the context of encrypted words (i.e., what words come before and/or after) and also the frequency that different letters tend to occur in the English language. This material is covered in CryptographySlides.pdf.