ISTM283CC – Previous NCL Challenges Cryptography

FIND A SOLUTION AT Academic Writers Bay

ISTM283CC – Previous NCL Challenges Cryptography
Challenge Set Overview
During this challenge set, students be working with a range of cryptography-related questions. Based off of previous years questions it appears that the NCL has three major categories of cryptographic questions: number-based conversion, cipher decryption, and steganography. Students will be asked to solve challenges in all these different categories, from staple questions such as shift ciphers, to more obscure ones.
Useful Tools
The following tools were demonstrated or talked about during lecture, but are aggregated here for your convenience:
Rumkin Cipher Tools
Cryptii Encoder/Decoder
Cyber Chef
Digital Invisible Ink Toolkit
Challenge Questions
Number Base Conversion
Challenge
Answer
Pts
01000100 00110001 01110110 00110001 01101110 00110001 01110100 01111001
D1v1n1ty
15
102 060 162 144 063 162 154 100 156 144 163
[Type your answer here]
15
83 107 121 114 105 109
[Type your answer here]
15
0x426174746c334672306e744949
[Type your answer here]
15
UGF0aCAwZiBFeGlsZQ==
[Type your answer here]
15
Shift Ciphers
Challenge
Answer
Pts
APY-FUVSG-4237
[Type your answer here]
20
UJS-ZOPMA-8931
[Type your answer here]
20
Llg hybuo dispf jqo nnetu fzxj 10 pcqc wgku.“secret”
[Type your answer here]
25
“6trmvm0jx Q’np 6yfzv e 6js1grqj fvf M rts’1 gzss pvq0 !mjzg m7’x lwkru. N o2ux vtum K jwsi qv eztso vls 1f6.” — Omqmfmn Wqty1
“office”abcdefghijklmnopqrstuvwxyz 0123456789!@#$%^&*()_+
[Type your answer here]
30
Various Ciphers
For the past couple of years, the NCL team will produce a series of practice questions during the summer months that they call “Summer Camp.” One year they focused on a range of cryptography questions that featured several more obscure encoding and encryption ciphers. For this portion, students should attempt to solve all of the challenges in this folder:

YOU MAY ALSO READ ...  Assignment Brief and Guidance

Click here to access the challenges
My apologies: None of the challenges came with the original strings, so students will have to transcribe the ciphertext themselves from the images.
Question
Answer
Cipher/Encoding Used
Question #1
[Type answer here]
[Type answer here]
Question #2
[Type answer here]
[Type answer here]
Question #3
[Type answer here]
[Type answer here]
Question #4
[Type answer here]
[Type answer here]
Question #5
[Type answer here]
[Type answer here]
Question #6
[Type answer here]
[Type answer here]
Question #7
[Type answer here]
[Type answer here]
Question #8
Skip this one
Question #9
[Type answer here]
[Type answer here]
Question #10
[Type answer here]
[Type answer here]
Hints:
Question 4 – The masons used this cipher
Question 9 – Matt Groening made the show that this came from
Steganography
Find the hidden flag that can be found by analyzing the following images
Photo
Flag
Pts
contrast.png
[Type flag here]
5
steg_02.jpg
[Type flag here]
15
steg_03.bmp
[Type flag here]
35
Hints:
steg_03:
There are two levels to this flag.
You may need to learn how to extract one image from another.
This might also help too…

YOU MAY ALSO READ ...  Developing a culture of evidence-based practice

NOTE: None of the above steganography challenges requires the use of binwalk. However, if you want you to practice with the one demonstrated during lecture, here is a link to the image so you can try extracting files from an image.
Once students have finished addressing all the prompts in this write-up, document should be saved as a PDF and submit it to Blackboard prior to the due date

YOU MAY ALSO READ ...  MKT102A Understanding Advertising
Order from Academic Writers Bay
Best Custom Essay Writing Services

QUALITY: 100% ORIGINAL PAPERNO PLAGIARISM – CUSTOM PAPER