Tuesday, February 27, 2018

Super Secret Secret Agents - 33


Super Secret Secret Agents- 33
Authentication: The Alices sent all of the important information on the document, but only after the Bobs received it and typed KAT into the document in the same box to tell the Alices that they had received the box.
Points on best round: 9 points on February 15th, 2018
Key System: Public Key used and Secret Numbers for Diffie Hellman. We posted our p and g on the board.

Encryption/Decryption: We used Diffie Hellman for everything and put our encrypted numbers on the document. Once the box got to the Bobs they didn’t send it back to the Alices until they opened the box.

Da Wabbits- 20

 We authenticated our code by writing the code in a place no one would suspect it would be, which was at the bottom of the box in pencil. We would know that the Bob’s had touched our box when we saw that are fake code had been erased. Since the code was on the back, nothing was changed.
We earned the most points on the last day. We earned 15 points. A key reason why we earned 15 points on the last day is that we created a code that was so unusual that no one thought of it. Our code wasn’t much but it actually turned out to be so simple that it was complicated. All we did for our code was write it under a sticker on the bottom of the box and on the top we would write random stuff to act like a code. On the day we earned a large amount of points which was 15 points we were also able to crack another team's code by stealing an EDN and learning the code
We had a secret key system. We weren’t able to incorporate the Diffie-Hellman into our strategy because no everybody understood it, but towards the end we had created a code that almost proved to be more effective than the Diffie-Hellman besides the fact that you got bonus points for using the Diffie-Hellman.
Our team was able to work together pretty well, we were able to share ideas with ease without disruption. Everyone could share their ideas and as a group we would combine them for one idea. If we would play this game again I think we would be able to earn even more points than we did the first time without a doubt.

Deciphering Divas-12 pts.

     Our best protocol, surprisingly, was a color code. It was supposed to be a fake code to fool the other teams, but ended up working. This code is simple, meaning it was just every number was assigned a color, but it ended up giving us the most points. We received 6 points using this code.
Image result for rainbow     Code:
  • Green = 0
  • Purple =1
  • Red = 2
  • Blue = 3
  • Pink = 4
  • Yellow = 5
  • Gold = 6
  • Silver = 7
  • Orange = 8
  • Black = 9
    

     We used a private key because each group member had the key and nobody else had the key. So it was private because only six people knew about it instead of a lot more. 
     Although, on the last day, we used the code above to earn 9 points in total. 3 of those points were from hacking, and the other 6 were from that code.


     

Enigma 2 ~ 21

Enigma 2 ~ 21 Points
By: Emma Eisenhauer, Nicole Sichel, Miles Taylor,
Jonathan Ram, Eshaan Gandhi, and Nick Rinala

Authentication
Our box was never supposed to come back to Alice, so if it did we would
know that the Eves messed with it. The Bobs would know if the Eves had
messed with it because there should be nothing on the whiteboard, so if
there was the Eves had messed with it. Also, it didn't matter if there was
something on the whiteboard because we put everything on the
spreadsheet

Our code
We used the Diffie Hellman Exchange. Below is our system that we used on
the last day. Image result for alice bob and eve

Diffie Hellman Exchange
  1. Alice gets box
  2. Alice tells Mrs. Carr to write the p: and g: on the spreadsheet.
  3. Bob writes the p: and g: down on a piece of paper and tells Mrs. Sopko to
  4. delete the p: and g: (so the Eves don’t know what it is.)
  5. Alice works out the math and gets a number.
  6. Alice tells Mrs. Carr to write the number on the spreadsheet.
  7. Bob writes down Alice’s number and tells Mrs. Sopko to delete the number.
  8. Bob works out the math and gets a number.
  9. Bob tells Mrs. Sopko to write his number on the spreadsheet.
  10. Alice writes down Bob’s number and tells Mrs. Carr to delete the number.
  11. Alice does the math to get a secret key while Bob does the same math.
  12. Alice puts the 3 digit key (the encrypted one) on the spreadsheet.
  13. Bob tells Mrs. Sopko to delete it once it is written down.
  14. Alice locks the box, switches the numbers on the lock around, writes
  15. nothing on the whiteboard, and sends it.
  16. When Bob gets the box he will get the post-it note out of the box and use
  17. the method to open the box.

Highest Point Gain
Image result for key clipartWe made our highest point gain on the last day. That day we started at
9 points before we started working with Diffie Hellman. With
Diffie Hellman, we made 12 points on the last day.

Our Key System
Our key system was public. We did Diffie Hellman and used the
spreadsheet to help us. The spreadsheet also allowed us to be more
efficient and authenticated. Also, the Eves couldn’t add to the
spreadsheet to mess us up, so it was safe.




The Box Openers- 15

The Box Openers- 15 Points

By: Sophia, Sharon, Lexi, Declan, Gus, Euan, and Pearce

Authentication

Our team authenticated our messages by putting our initials in our code in the bottom left corner. We wrote our initials in our code so unless another team had our EDN it would be very hard for them to guess it.

Points

We earned the most points on the first day. We earned 9 points that day- 6 from the Eves and 3 from opening our own box.

Key System

On our best day, we used a secret key system for our code. For the last 2 days, we used a public key system (Diffie-Hellman).

Encryption/Decryption

Our team encrypted and decrypted our messages by counting how many times a line in a letter met with another line/how many “vertices” in the letter. For example, the letter A has 3 points when 2 lines meet. That was the first number. The second number was how many times the number had already appeared before. Since A is the first letter that has 3, we add a 1 behind it so A equals 31. Then we used addition, subtraction, division, and multiplication signs to figure out the numbers in our code. That is how we encrypted our code.

Numeral Encryptors- 33


Numeral Encrypters
by: Arjun, Krish, Keegan, Jack, Josh, Sofia

We authenticated our messages our messages when we put the information on the spreadsheet, where we knew that the Eaves couldn’t change it.
On the last day, we earned the most amount of points: 18. We ended up with a total of 33 points.
For the key system, we used both public and private.  We used public in the sense that we used Diffie Hellman Exchange but we also used our old code in our EDN where we used a chart and had different letters that meant different numbers in each column.
First, the Alices would encrypt the P, G and their secret number in our old code. Then the Bobs would do all the math and find the shift number. Next, they would send the encrypted shift number on the spreadsheet to the Alices. While this is happening the eves get the box. After that, the Alices would shift the code and send it on the spreadsheet. By that time the box should have arrived at the Bobs and the Bobs would open the box.


Super Secret Secret Agents - 33

Super Secret Secret Agents- 33 Authentication : The Alices sent all of the important information on the document, but only after the Bo...