Standards in this Framework
Standard | Description |
---|---|
1.1.1 | Research various types of cryptography |
1.1.2 | Describe occupations that use cryptography |
1.1.3 | Explain how people encounter cryptography in day-to-day life |
1.1.4 | Explain the connection between math, algorithms, and ciphers |
1.1.5 | Explain the difference between blockchain and block cipher |
1.1.6 | Define cryptanalysis as it relates to cryptography |
1.2.1 | Explain the history of cryptography |
1.2.2 | Describe the importance of the Enigma and Turing (The Bombe) machines |
1.2.3 | Explain the need for ciphering with the birth of the digital age |
1.2.4 | Describe the use of RSA (Rivest–Shamir–Adleman) in today’s online environment |
2.1.1 | Explain substitution ciphers (e.g., Masonic, polyalphabetic, etc.) |
2.1.2 | Describe Caesar ciphers |
2.1.3 | Explain transposition ciphers |
2.1.4 | Compare steganography and cryptography as used in ciphers |
2.2.1 | Apply a cipher technique to keep information secret |
2.2.2 | Develop a key to decipher the message |
2.2.3 | Decipher a cipher |
3.1.1 | Compare block and stream ciphers (i.e., of Advanced Secret Writing Standard (AES) and Data Secret Writing Standard (DES)) |
3.1.2 | Research the role of block ciphers in data integrity |
3.1.3 | Relate key stream synchronicity to stream ciphers |
3.1.4 | Explain the use of hash functions |
3.1.5 | Discuss the difference between steganography and cryptography |
3.1.6 | Identify challenges when managing encryption on a large scale |
3.1.7 | Apply tools and protocols to real world practice |
3.2.1 | Build a block cipher with a data integrity component |
3.2.2 | Create a crypto key |
3.2.3 | Write an algorithm for a cipher |
3.2.4 | Describe how keys are generated |
3.3.1 | Define the purpose of public vs. private keys |
3.3.2 | Compare symmetric and asymmetric keys |
3.3.3 | Explain various security mechanisms |
3.3.4 | Describe the strengths and weakness of the Diffie-Hellman protocol |
3.3.5 | Explain the importance of authentication |
3.3.6 | Describe the strengths and weakness of the RSA protocol |
4.1.1 | Describe different types of attacks on cryptographic systems |
4.1.2 | Research different types of defenses against cryptographic attacks |
4.1.3 | Differentiate between passive and active attacks |
4.1.4 | Apply various techniques to encrypt a message |
4.1.5 | Analyze a passive attack using network traffic data and analysis |
5.1.1 | Research the ethics of cryptography |
5.1.2 | Discuss the balance between privacy and security |
5.1.3 | Research regulations and laws of cryptography and encryption |
5.2.1 | Describe the role of computational mathematics in the development of future cryptographic systems |
5.2.2 | Research how future technology may threaten cryptography |
5.2.3 | Discuss the role cryptography plays in the development of digital currencies |
5.2.4 | Examine ways in which encryption using cryptography can be applied in the future |