A03: Crypto Treasure Hunt★★☆ Medium
Assignment Type: In-Class Group Activity
Time Allocation: 50 minutes
Points: 20
Group Size: 3-4 students
Learning Objectives
By completing this treasure hunt, you will:
- Apply cryptographic hash functions to verify data integrity
- Understand the relationship between public and private keys
- Practice signature verification using simplified cryptographic principles
- Experience how encryption protects information in real-world scenarios
- Collaborate to solve multi-layered cryptographic puzzles
Activity Overview
Your team has been hired as cryptocurrency security auditors. You must decrypt encrypted messages, locate hidden clues around the classroom, and verify cryptographic signatures to prove authenticity. The team that completes all tasks correctly and presents their findings wins!
Activity Breakdown
1Decrypt the Message (15 minutes)
Your instructor will assign your team a difficulty level:
- Easy: Simple substitution cipher
- Medium: ROT13 + pattern recognition
- Hard: Combined multi-layer cipher
Use the cipher key provided (or deduce it) to decrypt your puzzle and reveal the location of the hidden clue.
Deliverable: Plaintext message showing the location
2Find the Physical Clue (10 minutes)
Once you've decrypted the message, go to the specified location in the classroom or building to find your physical clue. The clue contains:
- A message (e.g., "The private key is 42")
- A public key
- A digital signature
Deliverable: Physical clue card retrieved and returned to your desk
3Verify the Signature (20 minutes)
Use the Verification Worksheet to step through the signature verification process:
- Hash the message using the provided hash function
- Apply the public key operation to the signature
- Compare the results to verify authenticity
- Determine if the signature is valid or forged
Deliverable: Completed verification worksheet with all calculations
4Security Reflection (5 minutes)
Answer the following reflection questions on your worksheet:
- What would happen if someone intercepted your encrypted message?
- How does the public key help verify the signature without revealing the private key?
- What real-world applications use this type of signature verification?
Presentation Format
Final Deliverable: Group Presentation (5 minutes)
Prepare a brief verbal presentation covering:
- Decryption Method: How you cracked the cipher
- Location Strategy: How you found the clue
- Verification Results: Whether the signature was valid and why
- Key Insight: One important lesson about cryptography from this activity
All team members must participate in the presentation.
Materials Provided
- Encrypted puzzle sheet (difficulty-specific)
- Cipher keys and hints
- Verification worksheet with step-by-step instructions
- Calculator (or use your phone)
- Scratch paper for work
Grading Summary
| Component | Points | Criteria |
|---|---|---|
| Correct Decryption | 6 | Plaintext message matches solution |
| Location Found | 4 | Physical clue retrieved successfully |
| Signature Verification | 6 | All calculations correct, proper conclusion |
| Security Reflection | 2 | Thoughtful answers demonstrating understanding |
| Presentation | 2 | Clear, organized, all members participate |
| TOTAL | 20 |
Tips for Success
- Divide and conquer: Assign roles (decoder, runner, verifier, presenter)
- Show your work: Write down all steps for partial credit
- Ask clarifying questions: Your instructor is available for hints
- Check your math: One calculation error can invalidate the entire verification
- Think like a cryptographer: Consider why each step is necessary for security
Connection to Course Themes
This activity mirrors real-world cryptocurrency operations:
- Decryption: Like decoding blockchain transactions
- Physical retrieval: Like mining for blocks in proof-of-work systems
- Signature verification: Like validating transactions on the Bitcoin network
By completing this treasure hunt, you're practicing the fundamental skills that secure billions of dollars in cryptocurrency daily.
Cryptoeconomics Course | A03: Crypto Treasure Hunt | Page 1 of 1
Related Resources
Assignment Resources
© Joerg Osterrieder 2025-2026. All rights reserved.