Cryptology, Binary and ASCII codes LAB PRACTICE
- The class will be divided into two teams - 6 students in each team
- Each team will work as one computer with 6 processors. It means that
each team can do 6 tasks at the same time
- First, each team will pretend that be involved in some criminal
activity and the goal would be to hide some information.
- Each team will choose the sentence
that consists of 6 words. This sentence should be encrypted or/and
encoded so it would be difficult to get information.
- Each student will be responsible of encoding one word.
- To encrypt and/or encode the sentence, you can use all ciphers and
codes that we learned so far.
- Be creative! You can use a series of chiphers and codes.
- For example, if my original word is dog
- First, I can encrypt it using Caesar Cipher and the result will be
GRJ and after that I will encrypt GRJ using Polybius cipher and the final
ciphertext will be : 224224
- To decrypt, first I would need to use Polybius cipher to get GRJ and
after that Caesar Cipher to get an original text dog
- After the encryption/coding is done, the teams will
exchange information.
- At that point, you will pretend that you are forensic specialist
and you would need to find the original message.
- We will limit the amount of ciphers/codes that you can use for
encryption to 5.
- Requirements: Each student should document the encryption and
decryption process on the paper and submit the paper. There is not grade
for this lab, submission is only for the learning purposes. You can use
computer to do encryption/decryption and coding, but you have to be able
to explain how ciphers and binary and ASCII codes are working.