ludigeeks

Activity Sheet: Secret Codes

🎯 Objectives


⏳ Activity Duration

1 hour 30 minutes

πŸ‘₯ Number of Participants

πŸ–₯️ Required Materials


πŸ—οΈ Activity Flow

1️⃣ Game: Secret Message Exchange

πŸ” Decryption Trick

πŸ“Š Letter Frequency in French

| Letter | Frequency (%) | Letter | Frequency (%) | |———–|β€”β€”β€”β€”β€”-|———–|β€”β€”β€”β€”β€”-| | A | 8.40% | N | 7.13% | | B | 1.06% | O | 5.26% | | C | 3.03% | P | 3.01% | | D | 4.18% | Q | 0.99% | | E | 17.26% | R | 6.55% | | F | 1.12% | S | 8.08% | | G | 1.27% | T | 7.07% | | H | 0.92% | U | 5.74% | | I | 7.34% | V | 1.32% | | J | 0.31% | W | 0.04% | | K | 0.05% | X | 0.45% | | L | 6.01% | Y | 0.30% | | M | 2.96% | Z | 0.12% |

πŸ”Ή Key Insight:


2️⃣ Construction: Hiding a Secret Code in Math


3️⃣ Debriefing: Understanding Security Risks

After the activity, the facilitator leads a discussion on security weaknesses:

πŸ”΄ Identified Problems

  1. Reverse Engineering
    • If an attacker can reverse the math operations, they can discover the secret number.
  2. Frequency Analysis Attack
    • The most common letter in the encrypted text can reveal the cipher shift.
  3. Collision Risk
    • A wrong answer might still be validated by the program due to weak encryption.

πŸ”Ή What Are the Solutions?

| Category | Ref | Best Practice | |β€”β€”β€”β€”-|——–|β€”β€”β€”β€”β€”β€”β€”-| | Passwords | MDP-02 | Use a long and complex password. | | Passwords | MDP-03 | Use a password that is impossible to guess. | | Passwords | MDP-06 | Never share your password with anyone. | | Mobile Security | SM-02 | Encrypt the device’s data. | | Mobile Security | SM-10 | Do not store confidential information without protection. | | Ransomware Protection | RAN-08 | Use complex passwords and change them regularly. |


πŸ“Œ Additional Resources


πŸ”Ž Summary

  1. Encrypt and exchange secret messages using the Caesar cipher.
  2. Decrypt other messages using letter frequency analysis.
  3. Create a hidden secret code with math operations.
  4. Understand cybersecurity threats such as frequency analysis and reverse engineering.
  5. Discuss security best practices to protect passwords and encrypted data.

This activity teaches the importance of encryption, strong passwords, and data security! πŸ”


🎯 Get Involved!

πŸ”— GitHub Repository β†’ github.com/wocsa/ludigeeks
πŸ“© Contact us β†’ WOCSA Contact Form

πŸš€ Join Ludigeeks and help spread cybersecurity awareness! WOCSA Contact Form