SlideShare a Scribd company logo
1 of 2
Your team was invited to present to a high school IT class to
explain how cryptography works. In order to explain the basics,
you decide to show the class a tool called, CrypTool. This web-
based tool allows people to visualize encryption and decryption
using common cryptography techniques. In order for the
students to follow along with your demonstration, you need to
create a tutorial for them.
Together as a team,
access
CrypTool (
http://www.cryptool-online.org/
).
Click
on the CrypTool link, then click
Ciphers
.
Click
and
choose
a type of cipher you would like to use under
Classical Ciphers
.
Use
CrypTool to do the following:
Determine at least five pieces of data to encrypt and decrypt
Determine a key (or a set of keys) that is different from the
samples provided in CrypTool.
Attempt to break the encrypted ciphertext data using the
cryptanalysis tools provided by CrypTool.
Note:
It may not always be possible to break the ciphertext.
Regardless of the attempt's outcome. Document the steps taken
and relevant observation notes.
Create
a tutorial with text and images (screenshots) on how to use
CrypTool.
Include
the following:
Steps needed to encypt data
Steps needed to decrypt data
Steps taken to attempt to break the encrypted data using the
cryptanalysis tools provided by CryptTool
Submit
the tutorial to the Assignment Files tab above.

More Related Content

Similar to Your team was invited to present to a high school IT class to explai.docx

Report on forensics tools
Report on forensics toolsReport on forensics tools
Report on forensics toolsVishnuPratap7
 
Introduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSecIntroduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSecYashSomalkar
 
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLockerDEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLockerJorge Orchilles
 
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai
 
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai
 
Suhas desai _open_source_data_security - ClubHack2009
Suhas desai _open_source_data_security - ClubHack2009Suhas desai _open_source_data_security - ClubHack2009
Suhas desai _open_source_data_security - ClubHack2009ClubHack
 
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...Mauricio Velazco
 
Slide cipher based encryption
Slide cipher based encryptionSlide cipher based encryption
Slide cipher based encryptionMizi Mohamad
 
Flag4 CTF
Flag4 CTFFlag4 CTF
Flag4 CTFijtsrd
 
Metasploit Computer security testing tool
Metasploit  Computer security testing toolMetasploit  Computer security testing tool
Metasploit Computer security testing toolmedoelkang600
 
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red TeamWhat is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red TeamMITRE ATT&CK
 
8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 MatrixJorge Orchilles
 
Fundamental Design Patterns.pptx
Fundamental Design Patterns.pptxFundamental Design Patterns.pptx
Fundamental Design Patterns.pptxJUNSHIN8
 
Chaos Engineering Talk at DevOps Days Austin
Chaos Engineering Talk at DevOps Days AustinChaos Engineering Talk at DevOps Days Austin
Chaos Engineering Talk at DevOps Days Austinmatthewbrahms
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Collecting and Coding Twitter Data in DiscoverText
Collecting and Coding Twitter Data in DiscoverTextCollecting and Coding Twitter Data in DiscoverText
Collecting and Coding Twitter Data in DiscoverTextJill Hopke
 
Testing for the deeplearning folks
Testing for the deeplearning folksTesting for the deeplearning folks
Testing for the deeplearning folksVishwas N
 
Caputre the flag
Caputre the flagCaputre the flag
Caputre the flagUIT
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxSAMPATHKUMARS20
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security introAbhilash Ak
 

Similar to Your team was invited to present to a high school IT class to explai.docx (20)

Report on forensics tools
Report on forensics toolsReport on forensics tools
Report on forensics tools
 
Introduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSecIntroduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSec
 
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLockerDEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
 
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2
 
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2
 
Suhas desai _open_source_data_security - ClubHack2009
Suhas desai _open_source_data_security - ClubHack2009Suhas desai _open_source_data_security - ClubHack2009
Suhas desai _open_source_data_security - ClubHack2009
 
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
 
Slide cipher based encryption
Slide cipher based encryptionSlide cipher based encryption
Slide cipher based encryption
 
Flag4 CTF
Flag4 CTFFlag4 CTF
Flag4 CTF
 
Metasploit Computer security testing tool
Metasploit  Computer security testing toolMetasploit  Computer security testing tool
Metasploit Computer security testing tool
 
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red TeamWhat is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
 
8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix
 
Fundamental Design Patterns.pptx
Fundamental Design Patterns.pptxFundamental Design Patterns.pptx
Fundamental Design Patterns.pptx
 
Chaos Engineering Talk at DevOps Days Austin
Chaos Engineering Talk at DevOps Days AustinChaos Engineering Talk at DevOps Days Austin
Chaos Engineering Talk at DevOps Days Austin
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Collecting and Coding Twitter Data in DiscoverText
Collecting and Coding Twitter Data in DiscoverTextCollecting and Coding Twitter Data in DiscoverText
Collecting and Coding Twitter Data in DiscoverText
 
Testing for the deeplearning folks
Testing for the deeplearning folksTesting for the deeplearning folks
Testing for the deeplearning folks
 
Caputre the flag
Caputre the flagCaputre the flag
Caputre the flag
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 

More from philipnelson29183

·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx
·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx
·NEWSStates Take Aim at Social Welfare Programs  By Ti.docxphilipnelson29183
 
·Analyze HRM legal regulations and learn proper procedures for.docx
·Analyze HRM legal regulations and learn proper procedures for.docx·Analyze HRM legal regulations and learn proper procedures for.docx
·Analyze HRM legal regulations and learn proper procedures for.docxphilipnelson29183
 
[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx
[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx
[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docxphilipnelson29183
 
~GOODWRITER~You have now delivered the project to your customer..docx
~GOODWRITER~You have now delivered the project to your customer..docx~GOODWRITER~You have now delivered the project to your customer..docx
~GOODWRITER~You have now delivered the project to your customer..docxphilipnelson29183
 
__ captures a mother and child at the table in __ Paula Modersohn .docx
__ captures a mother and child at the table in __ Paula Modersohn .docx__ captures a mother and child at the table in __ Paula Modersohn .docx
__ captures a mother and child at the table in __ Paula Modersohn .docxphilipnelson29183
 
[removed]Which of the following would not be considered a subarea .docx
[removed]Which of the following would not be considered a subarea .docx[removed]Which of the following would not be considered a subarea .docx
[removed]Which of the following would not be considered a subarea .docxphilipnelson29183
 
__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx
__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx
__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docxphilipnelson29183
 
[removed]World’s Biggest Public Compan.docx
[removed]World’s Biggest Public Compan.docx[removed]World’s Biggest Public Compan.docx
[removed]World’s Biggest Public Compan.docxphilipnelson29183
 
Zhibei Wang04172020Page 5Authoritarian or Authoritati.docx
Zhibei Wang04172020Page 5Authoritarian or Authoritati.docxZhibei Wang04172020Page 5Authoritarian or Authoritati.docx
Zhibei Wang04172020Page 5Authoritarian or Authoritati.docxphilipnelson29183
 
Zinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docx
Zinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docxZinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docx
Zinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docxphilipnelson29183
 
Zeno of Elea.Heres the assignment Write a double-spaced paper .docx
Zeno of Elea.Heres the assignment Write a double-spaced paper .docxZeno of Elea.Heres the assignment Write a double-spaced paper .docx
Zeno of Elea.Heres the assignment Write a double-spaced paper .docxphilipnelson29183
 
Yo          los libros en la mochila.Ana y Salvador          la ta.docx
Yo          los libros en la mochila.Ana y Salvador          la ta.docxYo          los libros en la mochila.Ana y Salvador          la ta.docx
Yo          los libros en la mochila.Ana y Salvador          la ta.docxphilipnelson29183
 
Youve now read Johnathan Swifts brilliant (it is, trust me) satiri.docx
Youve now read Johnathan Swifts brilliant (it is, trust me) satiri.docxYouve now read Johnathan Swifts brilliant (it is, trust me) satiri.docx
Youve now read Johnathan Swifts brilliant (it is, trust me) satiri.docxphilipnelson29183
 
Youre gonna respond to Are too many people going to college by Ch.docx
Youre gonna respond to Are too many people going to college by Ch.docxYoure gonna respond to Are too many people going to college by Ch.docx
Youre gonna respond to Are too many people going to college by Ch.docxphilipnelson29183
 
Your Paper (8 pages) should include the following areas1. Cover P.docx
Your Paper (8 pages) should include the following areas1. Cover P.docxYour Paper (8 pages) should include the following areas1. Cover P.docx
Your Paper (8 pages) should include the following areas1. Cover P.docxphilipnelson29183
 
Your organization is expanding globally and you will no longer have .docx
Your organization is expanding globally and you will no longer have .docxYour organization is expanding globally and you will no longer have .docx
Your organization is expanding globally and you will no longer have .docxphilipnelson29183
 
Your outline should be a detailed overview of the Service Learning .docx
Your outline should be a detailed overview of the Service Learning .docxYour outline should be a detailed overview of the Service Learning .docx
Your outline should be a detailed overview of the Service Learning .docxphilipnelson29183
 
Your nameProfessor NameCourseDatePaper Outline.docx
Your nameProfessor NameCourseDatePaper Outline.docxYour nameProfessor NameCourseDatePaper Outline.docx
Your nameProfessor NameCourseDatePaper Outline.docxphilipnelson29183
 

More from philipnelson29183 (20)

·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx
·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx
·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx
 
·Analyze HRM legal regulations and learn proper procedures for.docx
·Analyze HRM legal regulations and learn proper procedures for.docx·Analyze HRM legal regulations and learn proper procedures for.docx
·Analyze HRM legal regulations and learn proper procedures for.docx
 
[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx
[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx
[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx
 
~GOODWRITER~You have now delivered the project to your customer..docx
~GOODWRITER~You have now delivered the project to your customer..docx~GOODWRITER~You have now delivered the project to your customer..docx
~GOODWRITER~You have now delivered the project to your customer..docx
 
__ captures a mother and child at the table in __ Paula Modersohn .docx
__ captures a mother and child at the table in __ Paula Modersohn .docx__ captures a mother and child at the table in __ Paula Modersohn .docx
__ captures a mother and child at the table in __ Paula Modersohn .docx
 
[removed]Which of the following would not be considered a subarea .docx
[removed]Which of the following would not be considered a subarea .docx[removed]Which of the following would not be considered a subarea .docx
[removed]Which of the following would not be considered a subarea .docx
 
__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx
__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx
__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx
 
[removed]World’s Biggest Public Compan.docx
[removed]World’s Biggest Public Compan.docx[removed]World’s Biggest Public Compan.docx
[removed]World’s Biggest Public Compan.docx
 
[removed].docx
[removed].docx[removed].docx
[removed].docx
 
[removed]1Government.docx
[removed]1Government.docx[removed]1Government.docx
[removed]1Government.docx
 
Zhibei Wang04172020Page 5Authoritarian or Authoritati.docx
Zhibei Wang04172020Page 5Authoritarian or Authoritati.docxZhibei Wang04172020Page 5Authoritarian or Authoritati.docx
Zhibei Wang04172020Page 5Authoritarian or Authoritati.docx
 
Zinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docx
Zinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docxZinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docx
Zinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docx
 
Zeno of Elea.Heres the assignment Write a double-spaced paper .docx
Zeno of Elea.Heres the assignment Write a double-spaced paper .docxZeno of Elea.Heres the assignment Write a double-spaced paper .docx
Zeno of Elea.Heres the assignment Write a double-spaced paper .docx
 
Yo          los libros en la mochila.Ana y Salvador          la ta.docx
Yo          los libros en la mochila.Ana y Salvador          la ta.docxYo          los libros en la mochila.Ana y Salvador          la ta.docx
Yo          los libros en la mochila.Ana y Salvador          la ta.docx
 
Youve now read Johnathan Swifts brilliant (it is, trust me) satiri.docx
Youve now read Johnathan Swifts brilliant (it is, trust me) satiri.docxYouve now read Johnathan Swifts brilliant (it is, trust me) satiri.docx
Youve now read Johnathan Swifts brilliant (it is, trust me) satiri.docx
 
Youre gonna respond to Are too many people going to college by Ch.docx
Youre gonna respond to Are too many people going to college by Ch.docxYoure gonna respond to Are too many people going to college by Ch.docx
Youre gonna respond to Are too many people going to college by Ch.docx
 
Your Paper (8 pages) should include the following areas1. Cover P.docx
Your Paper (8 pages) should include the following areas1. Cover P.docxYour Paper (8 pages) should include the following areas1. Cover P.docx
Your Paper (8 pages) should include the following areas1. Cover P.docx
 
Your organization is expanding globally and you will no longer have .docx
Your organization is expanding globally and you will no longer have .docxYour organization is expanding globally and you will no longer have .docx
Your organization is expanding globally and you will no longer have .docx
 
Your outline should be a detailed overview of the Service Learning .docx
Your outline should be a detailed overview of the Service Learning .docxYour outline should be a detailed overview of the Service Learning .docx
Your outline should be a detailed overview of the Service Learning .docx
 
Your nameProfessor NameCourseDatePaper Outline.docx
Your nameProfessor NameCourseDatePaper Outline.docxYour nameProfessor NameCourseDatePaper Outline.docx
Your nameProfessor NameCourseDatePaper Outline.docx
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 

Your team was invited to present to a high school IT class to explai.docx

  • 1. Your team was invited to present to a high school IT class to explain how cryptography works. In order to explain the basics, you decide to show the class a tool called, CrypTool. This web- based tool allows people to visualize encryption and decryption using common cryptography techniques. In order for the students to follow along with your demonstration, you need to create a tutorial for them. Together as a team, access CrypTool ( http://www.cryptool-online.org/ ). Click on the CrypTool link, then click Ciphers . Click and choose a type of cipher you would like to use under Classical Ciphers . Use CrypTool to do the following: Determine at least five pieces of data to encrypt and decrypt Determine a key (or a set of keys) that is different from the
  • 2. samples provided in CrypTool. Attempt to break the encrypted ciphertext data using the cryptanalysis tools provided by CrypTool. Note: It may not always be possible to break the ciphertext. Regardless of the attempt's outcome. Document the steps taken and relevant observation notes. Create a tutorial with text and images (screenshots) on how to use CrypTool. Include the following: Steps needed to encypt data Steps needed to decrypt data Steps taken to attempt to break the encrypted data using the cryptanalysis tools provided by CryptTool Submit the tutorial to the Assignment Files tab above.