Cyber Security: Public/Private Keys

OPENING QUESTIONS: Grab about 10 pieces of scratch 8 1/2 x 11 paper from over the table. Working solo at first, write a title for the first stage in https communication over the web. In smaller writing BRIEFLY note the important items occurring during that stage.

I'll give you the first title:

    1. My browser initiates a 'handshake' connection to the server
    2. Title 2 - items
    3. Title 3 - items
    4. Title 4 - items
    5. Title 5 - items
    6. Title 6 - items

???? <more>

When you are done, please compare notes with your team and reshuffle 'tiles' accordingly to make the strongest set of tiles possible from your group!

OBJECTIVES: 

  1. I will be able to contrast public key encryption with private key encryption during today's class

WORDS FOR TODAY:

certificate:

public key:

private key:

asymmetric encryption: 1 key used to lock (the public key) and 1 key to unlock (private key)

symmetric encryption: 1 key used to lock AND unlock

WORK FOR TODAY:

I'll spin the spinner and call up someone. They'll bring along their 1st tile and stand proudly (?) in the front of the class. Then I'll spin again

and again

and again

and again

and again until we're done!

 

Now let's open our AP Course resource document and find out what the AP wants us to know about symmetric and asymmetric encryption

Let's also review our Vigenere Squares grid to make sure we are comfy with the concept of an encryption 'key'

 

══════════════════════════

Please work with your team to come up with the most refined/accurate working definition for an encryption key.

Run that up against chatGPT, have a conversation with the wizard and see if you need to refine your definition.

      

DO NOT start here, that blows the whole purpose of this activity.