Lesson Plan
Last updated
Last updated
Name all key terms with their definition
Recite one or more historical cryptographic ciphers
Compare and contrast symmetric and asymmetric cryptography
Explain the use of cryptographic hashing
Define cryptography and cryptanalysis
Define key terms
Cipher
Key
Plaintext
Ciphertext
Encrypt
Decrypt
Discuss why we use cryptography today
Ensure confidentiality and integrity of our data
Origins of Cryptography
Discuss the history of cryptography
Started with transposition ciphers
Give example
Julius Caesar invented the 'Caesar Cipher'
Substitution cipher
Give example
The art of hiding in plain sight (steganography)
Ancient times a slave's head would be tattooed and concealed with the regrown hair
Others used invisible ink, microdots
Discuss the use of the Enigma during WWII
Alan Turing was one of the cryptanalysts and broke the Enigma
Discuss using crypto for confidentiality
Discuss modern crytography
Symmetric Cryptography (Secret Key)
Purpose: bulk data encryption
Key size: 64-512 bits
Key distribution: one key per com channel
Common algorithms: DES, AES, RC4
Discuss simple encryption example
Asymmetric Cyptography (Public-key)
Purpose: small data encryption and digital signing
Key size: 2048-4096 bits
Key distribution: one private, one public key
Common algorithms: RSA, DSA
Discuss simple encryption example
Discuss simple digital signature example
Discuss the problems with each
Symmetric - needs a key for each communication channel
Asymmetric - difficult to setup and needs significant infrastructure
Discuss using crypto for integrity
Discuss cryptographic hashing
Students will take a five question quiz for this module
Crypto Corner - Transposition Ciphers Crypto Corner - Caesar Shift Cipher
Cryptography - Wikipedia Cryptanalysis - Wikipedia The Enigma - Wikipedia Alan Turing - Wikipedia
Course:
Principles of Cybersecurity
Lesson:
Introduction to Cryptography
Intensity:
Medium
Duration:
0.5 hours