<<

Bastian | Planning & Pacing Guide

UNIT 5: Estimated Time in Hours: 16-17 Big Idea() Enduring Understandings Projects & Major Assignments 2 Establishing Trust 2.1, 4.3, 7.2, 8.1 - & Caesar 4 Data Security - Program 7 Risk - Anagrams 8 Implications - Symmetric - - Public & Digital Signatures - History & Politics of Public Key Encryption - Breakout Box Guiding Questions: • What are the ways in which data can be encrypted? • What actions can be taken to validate that data has been unaltered by an unauthorized source? Learning Objectives & Materials Instructional Activities and Classroom Assessments Respective Essential Knowledge Statements 2.1.1 LO: Students will evaluate • KWL Chart (find example Introduction to Cryptology: (1-day lesson) methods of keeping information KWL chart at This lesson introduces students to cryptography and the secret from those whom the https://www.timvandevall . information should be kept .com/templates/kwl- • Students begin with a pre-assessment using a KWL chart secret chart-template/ ) to identify what they know about cryptography. Students EK: 2.1.1c, • “Cryptography: Crash then watch the Cryptography Video. Students take Course Science Cornell notes on the video. Once the video is over, 4.3.1 LO: Students will define #33.” YouTube, uploaded students return to the KWL chart and add to it based on cryptography and explain how it by CrashCourse, 25 Oct what they have learned and what questions they still is used in data security. 2017, have. The class discusses the purpose of encryption, and EK: 4.3.1a,,,d,,,,,i https://www.youtube.c how it is necessary to ensure confidentiality and integrity. om/watch?=jhXCTbFn Students then gain hands-on experience with two types 4.3.2 LO: Students will practice K8o&feature=youtu.be of encryption. They begin by creating a scytale. Students symmetric to • Cornell Notes select a pipe and wrap the crepe paper around it. Using a

49

This document is licensed with a Creative Commons Attribution 4.0 International License

Bastian | Planning & Pacing Guide

send a message and explain how (for an explanation of the marker, they then write a message on the crepe paper. they work. Cornell note-taking Next, they unwrap the message and pass their crepe EK: 4.3.2a,b,d,e system, visit paper message to someone else in the class to solve. The http://lsc.cornell.edu/stud person solving the message must have a pipe that is the 4.3.3 LO: Students will employ -skills/cornell-note- same length and diameter. After this activity, students public key (asymmetric) taking-system/ ) discuss the strengths and weaknesses of this form of encryption and explain how it • PVC Pipe (with varying encryption. Students then create a wheel for the Caesar works. diameters) Cipher. Students encrypt a message for another student EK: 4.3.3a,b,c,d • Crepe Paper, Ribbon, or in the classroom using the Caesar Cipher. The message is Washi Tape then passed to the other student to decrypt. After this • Markers activity students discuss the strengths and weaknesses of • Caesar Cipher Wheel this form of encryption. • Paper 4.3.1 LO: Students will define • Python Caesar Cipher Program: (2-3-day lesson) cryptography and explain how it In this lesson students build a program to encrypt and decrypt is used in data security. information using a Caesar Cipher. EK: 4.3.1d,e,f,g,h • Using Python students write a program that will ask the end user if they want to encrypt or decrypt a message. If the end user wants to encrypt a message the program asks for the message to encrypt and the key. The program then encrypts the message and outputs it to the end user. If the user selects to decrypt the message, the program asks the user to enter the encrypted message. It then outputs the value of each shift and the possible decryption for each shift. 4.3.2 LO: Students will practice • “Anagram in The da Vinci Anagrams: (1-day lesson) symmetric cryptosystems to .” YouTube, uploaded In this lesson students learn what anagrams are and how they send a message and explain how by Idan Cohen, 19 Oct are a way to attack a . they work. 2013, • This lesson begins with students watching the “Anagram EK: 4.3.2c in The da Vinci Code” video, followed by the clip from

50

This document is licensed with a Creative Commons Attribution 4.0 International License

Bastian | Planning & Pacing Guide

https://www.youtube.c “The Da Vinci Code” movie. Students discuss what they om/watch?v=OZj8bxV7 saw in the two videos. Students go to the word tips x9I&feature=youtu.be webpage and read about anagrams. Students then • “The Da Vinci Code (3/8) create an anagram for another student in the classroom. Movie CLIP – So Dark the The other student will solve the anagram. The class is Con of Man (2006) HD.” wrapped up with a class discussion about anagrams. YouTube, uploaded by Movieclips, 25 Oct 2012, https://www.youtube.c om/watch?v=F_HKGZR UroE&feature=youtu.b e • “Anagram Solver.” Word Tips, Word.Tips, https://word.tips/anag ram-solver/ • Paper • Pen or Pencil 4.3.2 LO: Students will practice • Notebook Symmetric Cryptosystems: (7-day lesson) symmetric cryptosystems to • “Rail-Fence Cipher.” In this lesson students practice using different symmetric send a message and explain how Practical Cryptography, cryptosystems. they work. PracticalCryptography.co • Day 1 - In this lesson students will learn about the Rail- EK: 4.3.2a,b,d,e , Fence Cipher. Students receive an assignment that is http://practicalcryptogr encrypted using a Caesar Cipher. They have to solve the aphy.com/ciphers/class Caesar Cipher in order to find out what they need to do in ical-era/rail-fence/ the assignments. The assignment asks the students to • “Baconian Cipher.” read about the rail-fence cipher at the practical Practical Cryptography, cryptography website. Students add an explanation PracticalCryptography.co about how the rail-fence cipher into their notebook. m, Students are asked to encrypt a message telling their

51

This document is licensed with a Creative Commons Attribution 4.0 International License

Bastian | Planning & Pacing Guide

http://practicalcryptogr favorite class in school using the rail-fence cipher and aphy.com/ciphers/class send it to another student to decode. The students must ical-era/baconian/ turn in a copy of the encrypted message and the solution. Students then must decode someone else’s message • “ Cipher.” using the rail-fence method. Practical Cryptography, • Day 2 - In this lesson students will learn about the PracticalCryptography.co Baconian Cipher. Students will receive an assignment m, that is encrypted using the Rail-Fence Cipher. They have http://practicalcryptogr to solve the Rail-Fence Cipher in order to find out what aphy.com/ciphers/class they need to do in the assignment. The assignment asks ical-era/polybius- the students to read about the Baconian Cipher. Students square/ add an explanation about how the Baconian cipher into their notebook. It also assigns students into teams to • “Vigenère and Gronsfeld play Mission Code and assigns the students the number Cipher.” Practical of missions they are required to complete. Students are Cryptography, asked to encrypt a message using the Baconian cipher PracticalCryptography.co that they must send to a student in another game team m, that tells how successful they were in completing the http://practicalcryptogr missions in Mission Code X. A student from another aphy.com/ciphers/class team decodes the message. The students must turn in a ical-era/vigenere- copy of the encrypted message and the solution. gronsfeld-and-autokey/ Students then must decode someone else’s message using the Baconian method. • “Four-Square Cipher.” • Day 3 - In this lesson students will learn about the Practical Cryptography, Cipher. Students will receive an PracticalCryptography.co assignment that is encrypted using the Baconian Cipher. m, They have to solve the Baconian Cipher in order to find http://practicalcryptogr out what they need to do in the assignment. The aphy.com/ciphers/class assignment asks the students to read about the Polybius ical-era/four-square/ Square Cipher. Students add an explanation about how the Polybius Square cipher into their notebook. Students 52

This document is licensed with a Creative Commons Attribution 4.0 International License

Bastian | Planning & Pacing Guide

• “.” Practical are asked to encrypt a message about their favorite unit Cryptography, so far in Cybersecurity using the Polybius Square cipher PracticalCryptography.co and send it to another student to decode. The students m, must turn in a copy of the encrypted message and the http://practicalcryptogr solution. Students then must decode someone else’s aphy.com/ciphers/class message using the Polybius Square method. ical-era/playfair/ • Day 4 - In this lesson students will learn about the Vigenere Cipher. Students will receive an assignment • Neijts, Semilof, Clark, and that is encrypted using the Polybius Square Cipher. They Rouse. “steganography.” have to solve the Polybius Square Cipher in order to find TechTarget|SearchSecurit out what they need to do in the assignment. The y, SearchSecurity.com, assignment asks the students to read about the Vigenere https://searchsecurity.t Cipher. Students add an explanation about how the echtarget.com/definiti Vigenere cipher into their notebook. Students are broken on/steganography#:~: up into groups and are asked to play the Crypto Go Card ext=Steganography%20 Game. Students are asked to encrypt a message using is%20the%20technique the Vigenere cipher about if they liked the game or not %20of,for%20hiding%2 and send it to another student to decode. The students 0or%20protecting%20d must turn in a copy of the encrypted message and the ata. solution. Students then must decode someone else’s • Online Steganography message using the Vigenere method. tool: • Day 5 - In this lesson students will learn about the Four- “Steganography (encode Square Cipher. Students will receive an assignment that text into image).” Many is encrypted using the Vigenere Cipher. They have to Tools, ManyTools.org, solve the Vigenere Cipher in order to find out what they https://manytools.org/ need to do in the assignment. The assignment asks the hacker- students to read about the Four-Square Cipher. Students tools/steganography- add an explanation about how the Four-Square cipher encode-text-into- into their notebook. Students are asked to encrypt a image/ message about what cipher they like best using the Four- • Paper Square cipher and send it to another student to decode. 53

This document is licensed with a Creative Commons Attribution 4.0 International License

Bastian | Planning & Pacing Guide

• Pen or Pencil The students must turn in a copy of the encrypted • Crypto Go Card Game: message and the solution. Students then must decode González-Tablas Ferreres, someone else’s message using the Four-Square method. A. I. and González Vasco, • Day 6 - In this lesson students will learn about the Playfair M. I. (2018). Crypto Go: Cipher. Students will receive an assignment that is Symmetric key - English encrypted using the Four-Square Cipher. They have to (open source) [Card solve the Four-Square Cipher in order to find out what game]. Madrid: they need to do in the assignment. The assignment asks Universidad Carlos III de the students to read about the Playfair Cipher. Students Madrid, Universidad Rey add an explanation about how the Playfair cipher into Juan Carlos. Available at their notebook. Students are then asked to complete at http://hdl.handle.net/ least one puzzle the cryptography room in Pico CTF. 10016/28433 Students are asked to encrypt a message about what they • Mission X-Code, from learned in the puzzle they completed in the cryptography Amigo Games (available room in Pico CTF using the Playfair cipher and send it to for purchase on Amazon) another student to decode. The students must turn in a • Pico CTF, copy of the encrypted message and the solution. https://picoctf.com/ Students then must decode someone else’s message • Abelson, Ledeen, and using the Playfair method. Lewis. Blown to Bits: Your • Day 7 - In this lesson students will learn about Life, Liberty, and Steganography. Students will receive an assignment that Happiness After the is encrypted using the Playfair Cipher. They have to solve Digital Explosion. Addison- the Playfair Cipher in order to find out what they need to Wesley Professional, do in the assignment. The assignment asks the students 2008. to read about Steganography in the Blown to Bits book - Hiding Information in Images (p. 95-99). Students add an explanation about Steganography into their notebook. Students are asked to encrypt a message in an image and send it to another student to decode. The students must turn in a copy of the encrypted message in the image and

54

This document is licensed with a Creative Commons Attribution 4.0 International License

Bastian | Planning & Pacing Guide

the . Students then must decode someone else’s message hidden in an image.

4.3.1 LO: Students will define • Notebook Understanding Public Key Encryption and Digital Signatures: cryptography and explain how it • “The : Encryption (2-day lesson) is used in data security. & Public Keys.” YouTube, In this lesson students gain a better understanding of public EK: 4.3.1i, uploaded by Code.org, 21 key encryption through hands-on experiences and learn about Aug 2015, how public key encryption relates to digital signatures. 4.3.3 LO: Students will employ https://www.youtube.c • This lesson begins with students watching a video about public key (asymmetric) om/watch?v=ZghMPW Encryption and Public Keys. Students take notes on the encryption and explain how it GXexs&feature=youtu. video in their notebook. They then gain hands-on works. be experience in how public key encryption works through EK: 4.3.3a,b,c,d • “ Principles 2017 | Unit the Cups & Beans Activity from Code.org. Once the 4 | Ch. 1 | Lesson 7: students experience this, they discuss what they have 7.2.4 LO: Students will be able Public Key Cryptography | learned from the activity. Students then work with the to explain how the decentralized Activity 1 | Activity Guide Modulo Widget to have a better understanding of the and dynamic nature of – Public Key Bean math behind public key encryption followed by using the networked systems create the Counting.” Code.org, Public Key Crypto Widget with a partner to gain hands-on potential for a system to fail or https://docs.google.co experience with public / private key encryption. The class behave incorrectly due a m/document/d/1l0KDF discusses the experience with the widget. Students then component the designer didn’t 33- watch the video on Digital Signatures and take notes in even know existed. gWIssZGqfuHgD0QpF5 their notebook. After the video there is a class discussion EK: 7.2.4f,g,h 0Pdyqras46FeuNLgc/ed on how digital signatures relate to public and private key it encryption. Students then update their notebooks with • Modulo Widget the key vocabulary. • Public Key Crypto Widget • “The Story of Digital Signatures and Public Key Infrastructure.” YouTube,

55

This document is licensed with a Creative Commons Attribution 4.0 International License

Bastian | Planning & Pacing Guide

uploaded by PKIIndia, 29 Apr 2016, https://www.youtube.c om/watch?v=G7hs- 3R86M0&feature=yout u.be

4.3.3 LO: Students will employ • Window Notes Sheet History & Politics of Public Key Encryption: (2-3-day lesson) public key (asymmetric) (access a blank Window In this lesson students learn about the history of public key encryption and explain how it Notes template at encryption and how government policies discouraged the use works. https://toolsforclassroomi of encryption to build secure networks. EK: 4.3.3a,b,c,d nstructionthatworks.com/ • Students read p.165-193 in Blown to Bits. This reading wp- includes topics such as Historical Cryptography and 8.1.2 LO: Students will explain content/uploads/2018/01 Lessons for the Internet Age. Students take window how the idea of the open /Window-Notes.pdf ) notes while reading. Following the reading, there is a internet led us to new • “The Evolution of Public class discussion about what students learned in the innovations that impact our Key Cryptography.” reading. Students then watch the video on the Evolution daily lives and our security. YouTube, uploaded by of Public Key Cryptography and take window notes. After EK: 8.1.2c NYU Tandon School of the video the class discusses public key encryption and Engineering, 23 Oct 2018, government policy. https://www.youtube.c om/watch?v=Pk- Assessment: In groups of 3-4 students complete a breakout Hqsjq5HU&feature=yo box using ciphers and steganography. utu.be • Abelson, Ledeen, and Lewis. Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion. Addison-

56

This document is licensed with a Creative Commons Attribution 4.0 International License

Bastian | Planning & Pacing Guide

Wesley Professional, 2008.

57

This document is licensed with a Creative Commons Attribution 4.0 International License