A03: Crypto Treasure Hunt

ABBREVIATED 30-MINUTE VERSION

Overview

Time: 30 minutes
Format: Desk-only (no physical treasure hunt)
Points: 50
Group Size: 3-4 students

What's Different: This version eliminates the physical retrieval phase and provides substitution key hints upfront. All materials are in this single packet. Perfect for shorter class periods or online/hybrid learning.

Learning Objectives

⏱️ Time Allocation:
  • 0-10 minutes: Decrypt the message
  • 10-25 minutes: Complete signature verification
  • 25-30 minutes: Answer reflection questions

1Decryption Challenge

Encrypted Message

WKH FOBH PHVVDJH VDB:
"FUBRWR LV VHFXUH"

🔑 Cipher Key Hint

This is a Caesar Cipher: each letter is shifted by the same number of positions in the alphabet.

Hint: The shift value is 3. To decrypt, shift each letter backward 3 positions.

Example:

Encrypted D E F
Decrypted A B C

Your Decryption Work

Show your work here:

W → _____ K → _____ H → _____
F → _____ O → _____ B → _____
H → _____ (continue for remaining letters...)

Decrypted Message

THE CLUE MESSAGE SAYS: ""


2Signature Verification

Now that you've decrypted the message, verify the digital signature to ensure it's authentic.

📧 Clue Card Information

Imagine you retrieved a physical clue with this information:

Message (M): CRYPTO

Public Key: e = 7, n = 143

Signature (S): 42

Step 2A: Calculate Hash (H)

Hash the message by summing ASCII values and taking modulo n.

ASCII Values (Quick Reference):

Letter ASCII Letter ASCII Letter ASCII
A65 J74 S83
B66 K75 T84
C67 L76 U85
D68 M77 V86
E69 N78 W87
F70 O79 X88
G71 P80 Y89
H72 Q81 Z90
I73 R82 0-948-57

Calculate the hash:

Character ASCII Value
C
R
Y
P
T
O
Sum

Hash calculation:

H = mod 143 =

Step 2B: Verify Signature (V)

Apply the public key to the signature: V = Se mod n

Calculate verification value:

S =
e =
n =

Step 1: Calculate Se

=

Step 2: Calculate (Se) mod n

mod =

Verification Value (V) =

Step 2C: Compare and Conclude

H (Hash) =
V (Verification) =

Are they equal?
☐ YES - Signature is VALID
☐ NO - Signature is INVALID/FORGED

Conclusion: The signature is


3Reflection Questions

Question 1: Encryption Security

What would happen if someone intercepted your encrypted message during transmission? How does encryption protect the information?

Question 2: Public Key Cryptography

Explain how the public key allows anyone to verify the signature without revealing the private key. Why is this important for security?

Question 3: Real-World Applications

Name two real-world applications that use digital signatures and signature verification (like what you just practiced).


Team Information

Team Member Name Role in Activity Signature

Grading Summary (50 Points)

Component Points Score
Correct Decryption (with work shown) 15
Hash Calculation (H) - Correct 8
Signature Verification (V) - Correct 8
Proper Comparison and Conclusion 4
Reflection Question 1 5
Reflection Question 2 5
Reflection Question 3 5
TOTAL 50

📝 Instructor Notes

Setup time: 5 minutes (just print packets)

No physical setup required - all materials in this single packet

Ideal for:

  • Short class periods (30-40 minutes)
  • Online/hybrid classes
  • Makeup assignments
  • Review sessions before exams

Answer Key:

  • Decrypted message: "THE CLUE MESSAGE SAYS: CRYPTO IS SECURE"
  • Hash (H): C=67, R=82, Y=89, P=80, T=84, O=79, Sum=481, H=481 mod 143 = 52
  • Verification (V): 42^7 mod 143 = 52
  • Result: H=V (52=52), signature is VALID

Abbreviated Version | 30 Minutes | All-in-One Packet | Page 1 of 1

© Joerg Osterrieder 2025-2026. All rights reserved.