Cryptography - Cyber Security

Learn the techniques and code to start you on your way to becoming a cyber security expert!

This Challenge introduces basic cryptography concepts in relation to data representation and securing online communication, and how these are implemented through code. It teaches programming in the context of classic cryptographic ciphers like rotation, XOR and mixed-substitution, and explains the techniques used to break these forms of encryption.

Hear from cyber security experts who share what it's like to work in the cyber security industry, and how the skills and knowledge you learn through these activities can set you up for an exciting career after school.

This Challenge is a part of the Schools Cyber Security Challenges series, developed by the Australian Computing Academy in partnership with AustCyber, ANZ, BT, Commonwealth Bank, NAB and Westpac.

Your current score is: 0 points.

You need to or register to access this course.

Australian students in Grades 7-12 have subsidised access to this course.

Start course
1.
Representing Data
1. Hidden message 0/1
2. Hello, Crypto! 0/1
3. Letter to number 0/1
4. input, ord, and print! 0/1
5. Spelling my name 0/1
6. Spell me out 0/1
7. Send away the numbers 0/1
8. Numbers to Emoji 0/1
9. String or numbers? 0/1
10. What's the message? 0/1
11. Find the coordinates 0/1
2.
Rotation ciphers
1. What is the secret key? 0/1
2. Shift by 1 0/1
3. A rotate function 0/1
4. Rotate by key 0/1
5. Checking for letters 0/1
6. What is the shift? 0/1
7. Rotating past z 0/1
8. A decryption function 0/1
9. Rotating past a 0/1
10. Brute force attack 0/1
11. Rot-cipher playground
3.
Frequency analysis
1. Mixed substitution 0/1
2. Crack this sentence 0/1
3. Decrypt this song! 0/1
4. Analyse this song! 0/1
5. Crypto lookup 0/1
6. Decrypting with dictionaries! 0/1
7. Decrypting secret files 0/1
8. Crack the Vigenère cipher 0/1
4.
Encrypting with binary
1. What's the binary number? 0/1
2. What is the secret (XOR) key? 0/1
3. XOR function 0/1
4. XOR function to encrypt strings 0/1
5. XOR -y not sorry 0/1
6. XOR attack! 0/1
7. Multi-key 0/1
8. Encryption playground