A03: Crypto Treasure Hunt★★☆ Medium

Assignment Type: In-Class Group Activity
Time Allocation: 50 minutes
Points: 20
Group Size: 3-4 students

Learning Objectives

By completing this treasure hunt, you will:

  • Apply cryptographic hash functions to verify data integrity
  • Understand the relationship between public and private keys
  • Practice signature verification using simplified cryptographic principles
  • Experience how encryption protects information in real-world scenarios
  • Collaborate to solve multi-layered cryptographic puzzles

Activity Overview

Your team has been hired as cryptocurrency security auditors. You must decrypt encrypted messages, locate hidden clues around the classroom, and verify cryptographic signatures to prove authenticity. The team that completes all tasks correctly and presents their findings wins!

⚠️ Important: This is a race against time and other teams. Work efficiently, double-check your work, and communicate clearly with your teammates.

Activity Breakdown

1Decrypt the Message (15 minutes)

Your instructor will assign your team a difficulty level:

  • Easy: Simple substitution cipher
  • Medium: ROT13 + pattern recognition
  • Hard: Combined multi-layer cipher

Use the cipher key provided (or deduce it) to decrypt your puzzle and reveal the location of the hidden clue.

Deliverable: Plaintext message showing the location

2Find the Physical Clue (10 minutes)

Once you've decrypted the message, go to the specified location in the classroom or building to find your physical clue. The clue contains:

  • A message (e.g., "The private key is 42")
  • A public key
  • A digital signature

Deliverable: Physical clue card retrieved and returned to your desk

3Verify the Signature (20 minutes)

Use the Verification Worksheet to step through the signature verification process:

  1. Hash the message using the provided hash function
  2. Apply the public key operation to the signature
  3. Compare the results to verify authenticity
  4. Determine if the signature is valid or forged

Deliverable: Completed verification worksheet with all calculations

4Security Reflection (5 minutes)

Answer the following reflection questions on your worksheet:

  • What would happen if someone intercepted your encrypted message?
  • How does the public key help verify the signature without revealing the private key?
  • What real-world applications use this type of signature verification?

Presentation Format

Final Deliverable: Group Presentation (5 minutes)

Prepare a brief verbal presentation covering:

  1. Decryption Method: How you cracked the cipher
  2. Location Strategy: How you found the clue
  3. Verification Results: Whether the signature was valid and why
  4. Key Insight: One important lesson about cryptography from this activity

All team members must participate in the presentation.

Materials Provided

Grading Summary

Component Points Criteria
Correct Decryption 6 Plaintext message matches solution
Location Found 4 Physical clue retrieved successfully
Signature Verification 6 All calculations correct, proper conclusion
Security Reflection 2 Thoughtful answers demonstrating understanding
Presentation 2 Clear, organized, all members participate
TOTAL 20

Tips for Success

Academic Integrity: While this is a competitive activity, all work must be your team's own. Do not share puzzle solutions with other teams.

Connection to Course Themes

This activity mirrors real-world cryptocurrency operations:

By completing this treasure hunt, you're practicing the fundamental skills that secure billions of dollars in cryptocurrency daily.


Cryptoeconomics Course | A03: Crypto Treasure Hunt | Page 1 of 1

Related Resources

Rubric Answer Key Instructor Guide

Assignment Resources

© Joerg Osterrieder 2025-2026. All rights reserved.