Skip to content

Instantly share code, notes, and snippets.

@MrTrick
Created February 8, 2011 00:44
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save MrTrick/815611 to your computer and use it in GitHub Desktop.
Save MrTrick/815611 to your computer and use it in GitHub Desktop.
Encryption / Decryption : Alice and Bob (and Eve!) [DRAFT]
Encryption / Decryption : Alice and Bob (and Eve!) [DRAFT]
Overview:
* Teams must devise a novel ciphering scheme in a short amount of time.
* Each team nominates a 'transmitter', who attempts to securely send a given message back to their team.
* Each team attempts to decode their own message, and intercept the messages of other teams.
Scenario:
?
Process:
1. Participants are divided into teams of N people (4-8?), and seated at tables.
(Tables should be sufficiently separated as to discourage inadvertent eavesdropping)
(Alt; allow teams to find their own place outside to discuss, provide clipboards)
2. A facilitator directs teams to open the sealed envelope on the desk marked "Top Secret", containing the activity instructions, briefly explains the requirements and objectives, starts the activity.
3. Teams discuss secretively among themselves how implement their ciphering method, and write down a set of encoding/decoding instructions for the transmitter/judges and a set for themselves. They have 15 minutes.
(During this time, facilitators walk around observing/assisting the development process, discouraging espionage)
4. After the time has elapsed, each team selects a member to act as a 'transmitter' for the rest of the session. Transmitters must come to the front of the room immediately with their set of encoding/decoding instructions.
5. A facilitator opens the safe containing the messages, and passes the first word of each team's message to their transmitter to be encoded.
(Transmitters will be allowed pen and paper)
6. In turn, each transmitter stands up and delivers the encoded message word. If facilitators request so, it may be repeated a second time.
(A short pause is given between each transmitter, to allow teams to take quick notes)
7. A few minutes break is allowed while the teams attempt to decode and record that round of words, then the facilitators collect the answer sheets from each team.
8. The adjudicator announces the word that each transmitter was given, and steps 5-8 repeat until every word has been transmitted.
9. Once all answers have been received, the encoding/decoding instructions are passed to the adjudicators.
10. A facilitator reviews the activity with participants; importance of encryption, weaknesses of novel methods against modern cryptanalysis, etc. Adjudicator announces decoding scores, award for most interesting encryption method, gives safe containing prize to winning team.
Supplies/Setup:
- Safe with messages in envelopes per round
- Per team;
- Team number on table
- "Top-Secret"-printed envelope containing:
- Mission briefing
- Decoder wheel? (Simple A-Z/numeric transposer wheel, or table)
- Blank answer sheets
- Official instructions sheet
- Extra blank paper
Ciphering Rules:
- Each word must be encoded exactly according to the scheme written on the instruction sheet.
- The instructions for encoding and decoding must be written legibly in their entirety in the provided space.
- Every word must be encoded independently - the word or words preceding the current word or the position of the word within the message may not influence the encoded message.
- The encoding scheme may not involve any foreign language (French, sign language, Klingon, etc)
- ??? More testing needed.
(Possible variation: The transmitter is not permitted to make any noise, a la charades)
(Possible variation: The transmitter may not speak aloud any numbers, letters or words. (limited charades))
Points:
- 1 point per correctly decoded word from your transmitter.
- 5 points per correctly decoded word from another team's transmitter.
- 5 points for having the most interesting encryption method.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment