Course of Student Crypto
The CrypTool Student Crypto contains two parts, a crypto training exclusively for teachers and the student day. In the crypto training for teachers, the topics cryptography and cryptanalysis are presented in detail and tried out in practice. The focus here is on theory and is intended to give teachers an overview of cryptography so that they can then decide for themselves which parts are suitable for upper school lessons. On the student day, only selected topics will be demonstrated and practically applied. The students should get an overview of the possibilities of cryptography through the lectures. The practical tasks are intended to arouse interest and learn in a playful way using the software CrypTool.
Procedure of the Student Day
The student day is divided into lectures and the â€žagent assignmentsâ€œ, which contain practical tasks to apply the learned methods. The practical tasks include cryptographic puzzles (socalled challenges), and the person who can solve them the fastest will receive a material prize during the event. As prizes there are DVDs/BDs with the films â€žEnigmaâ€œ and â€žSneakersâ€œ, the books â€žNot to be crackedâ€œ and â€žHidden Messagesâ€œ by Klaus Schmeh, the book â€žSecret Messagesâ€œ by Simon Singh as well as the book â€žCryptologyâ€œ by Albrecht Beutelspacher. The material prizes are provided by the organizing institution. For some of the events books were donated by the book author Klaus Schmeh.
The student days consist of five parts each, three theoretical and two practical ones, in which the students solve the tasks set for them on computers provided.

Lecture and Demonstration â€“ Part 1

Introduction
After clarifying the terms cryptology and steganology, CrypTool 1 and CrypTool 2 are presented in a demo. Afterwards, practical applications for today's cryptology will be discussed. 
Simple encryption
Using the examples of Scytale and Caesar the transposition and substitution is explained. For both Scytale and Caesar there is a small cryptographic puzzle directly in the lecture, which can be solved with paper and pencil. 
Improved encryption
Based on the simple transposition (Skytale) and the simplest substitution (Caesar), the simple column transposition* and the monoalphabetic substitution including the corresponding possibilities of attack are now discussed.


Agent assignment â€“ Part 1

Basic training as secret agent
The goal of the basic training is the practical application of the methods just learned with the help of CrypTool 1 or CrypTool 2, for which the students are provided with stepbystep instructions for a total of 6 tasks. Only after the successful completion of all these tasks, the students get their first assignment. 
Orders 12
The orders are to help Agent 009 to recover the stolen art treasures from the museum and to catch the perpetrators. In the first assignment, a message encrypted with the monoalphabetic substitution is to be broken, and in the second assignment, a Scytale message is to be broken.


Lecture and Demonstration â€“ Part 2

Automatic encryption
Here, Enigma as the best known representative of mechanical encryption is explained and demonstrated using CrypTool 1 and 2. 
Modern encryption (part 1)
In the modern procedures, the two symmetrical procedures DES and AES* are discussed. Afterwards, both methods are demonstrated in a demo using CrypTool.


Lecture and Demonstration â€“ Part 3
 Modern encryption (part 2)
In the afternoon, the key exchange according to DiffieHellmanMerkle will be demonstrated using a lockable box with two locks. Finally, the RSA procedure and the associated mathematics are explained. In addition to the RSA procedure there is a small puzzle.
 Modern encryption (part 2)

Agent assignment â€“ Part 2

Agent training
In the agent training, the students are supposed to apply the methods learned in the second and third part of the lecture in practice themselves. For this purpose, the students are provided with stepbystep instructions for a total of 4 tasks. In these tasks, the students should perform a ciphertextonly attack on the Enigma and bruteforce attacks on AES (with partially known key). Only after successful completion of all these tasks the students will get their third assignment. 
Orders 34
In the last two missions, the circle around the perpetrators became more narrow. Thanks to the successful cryptanalysis of the first two orders, the agents are now on the trail of the perpetrators. Whether they are caught or not now depends on whether the last two jobs can be decrypted in time. For job 03, the task is to decipher a message encrypted with Enigma. Even more difficult is job 04, where a hybrid message encrypted with RSA and AES has to be broken.


Keywords
* = are only briefly mentioned in the context of the presentation, completely available in the documents.
Schedule of the Teacher's Day
In the crypto training for teachers, the following topics are discussed and partly applied in practice using CrypTool.

Introduction
First, the terms of cryptology and steganology are clarified. Afterwards, the software CrypTool 1 and CrypTool 2 will be demonstrated in a demo. This is followed by an outline of the history of the development of cryptology from 1900 BC to the present.

Encryption by hand
Simple manual procedures of cryptography are demonstrated and practically tested. The following procedures are presented: Skytale, Caesar, Simple Column Transposition, Monoalphabetic Substitution, Homophonic Method*, the VigenÃ¨re Method* and OneTimePads.

Encryption machines
As the best known encryption engine the Enigma is presented here. The cryptoanalysis, i.e. the breaking of Enigma codes, is also discussed. Finally, other machines* are briefly introduced: SIGABA, SIGCUM, TypeX, Purple, Lorenz machine, secret writer T52.

Computer encryption
Here the currently used and applied algorithms of modern symmetric cryptography and asymmetric cryptography are presented. As representatives of symmetric cryptography DES and AES* are explained and demonstrated in practice. The transition from symmetric to asymmetric cryptography is explained â€“ just like in the story itself â€“ using the DiffieHellmanMerkle method for key exchange. Then the mathematical basics and the asymmetric RSA method â€“ today one of the most frequently used methods worldwide â€“ are discussed in detail.

Outlook/Future: Quantum Cryptography
Finally, a short outlook into the future, namely quantum cryptography*, is given. Wiesner's quantum money from the 70s is presented, which can be seen today as the origin of quantum cryptography. Also the BB84 method used today is briefly discussed*. Furthermore, the potential of cryptanalysis using the quantum computer is discussed at the end.
* = are only briefly mentioned in the context of the presentation, completely available in the documents.