Z. Cliffe Schreuders c5d5ebeff3 docs(rfid): Apply all implementation review improvements to planning docs
Applied all 7 critical fixes and 12 high-priority improvements from the
implementation review to create a complete, self-contained implementation plan.

## Critical Fixes Applied:

1. **CSS File Path Corrected**
   - Changed: css/minigames/rfid-minigame.css → css/rfid-minigame.css
   - Updated: All references in both TODO and architecture docs

2. **Interaction Handler Location Fixed**
   - Changed: inventory.js → interactions.js for keycard click handler
   - Reason: handleObjectInteraction() is defined in interactions.js

3. **Interaction Indicator Integration Added**
   - New Task 3.6: Update getInteractionSpriteKey() for RFID locks
   - Ensures RFID-locked doors show correct icon

4. **Complete 4-Step Registration Pattern**
   - Task 3.2: Added full Import → Export → Register → Window pattern
   - Matches pattern used by all other minigames

5. **Event Dispatcher Integration**
   - Added event emission for card_cloned, card_emulated, rfid_lock_accessed
   - Enables NPC reactions and telemetry tracking

6. **Return-to-Conversation Pattern** (Critical user correction)
   - Task 3.4: Completely rewritten to return to conversation after cloning
   - Added conversation context storage and restoration
   - Matches notes minigame behavior as intended

7. **Hex Validation Specifications**
   - Task 1.2: Added validateHex() method with complete rules
   - Validates length, format, and character set

## High-Priority Improvements:

8. **Card Name Generation**
   - Added CARD_NAME_TEMPLATES array with 8 descriptive names
   - Better UX than generic numbered cards

9. **Duplicate Card Handling**
   - Strategy: Overwrite with updated timestamp
   - MAX_SAVED_CARDS limit: 50 cards

10. **DEZ8 Formula Specified**
    - Proper EM4100 format: last 3 bytes (6 hex chars) to decimal
    - Pad to 8 digits with leading zeros

11. **Facility Code Formula**
    - Extract first byte (chars 0-1) as facility code (0-255)
    - Extract next 2 bytes (chars 2-5) as card number (0-65535)

12. **Checksum Calculation**
    - XOR of all bytes for EM4100 compliance
    - Returns checksum byte (0x00-0xFF)

13. **HTML CSS Link Task**
    - New Task 3.7: Add CSS link to index.html
    - Critical integration step that was missing

14. **Phaser Asset Loading Task**
    - New Task 3.8: Load all RFID sprites and icons
    - Critical integration step that was missing

## Files Updated:

### Review Documents:
- review/IMPLEMENTATION_REVIEW.md - Updated Improvement #1 with correct behavior
- review/CRITICAL_FIXES_SUMMARY.md - Added return-to-conversation pattern

### Planning Documents:
- 01_TECHNICAL_ARCHITECTURE.md - All fixes + formulas + patterns
- 02_IMPLEMENTATION_TODO.md - All task updates + 2 new tasks
- README.md - Updated time estimate (91h → 102h)
- PLANNING_COMPLETE.md - Updated time estimate + review notes

## Time Estimate Updates:

- Original: 91 hours (~11 days)
- Updated: 102 hours (~13 days)
- Increase: +11 hours (+12%)
  - Phase 1: +1h (validation/formulas)
  - Phase 3: +2h (new integration tasks)
  - Phase 6: +3h (additional testing)
  - Phase 8: +5h (comprehensive review)

## Impact:

 Planning documents now self-contained and complete
 All critical integration points specified
 All formulas mathematically correct for EM4100
 User-corrected behavior (return to conversation) implemented
 No references to review findings outside review/ directory
 Ready for implementation with high confidence

Confidence level: 95% → 98% (increased after review)
2025-11-15 23:48:15 +00:00
2025-05-16 10:42:42 +01:00
2025-11-14 19:47:54 +00:00
2025-11-14 19:47:54 +00:00
2025-11-14 19:47:54 +00:00
2025-11-14 19:47:54 +00:00

Break Escape: Cyber-Physical Security Learning Framework

Break Escape is an escape room-inspired games-based learning framework that simulates cyber-physical security challenges. Break Escape creates immersive experiences where learners engage with both physical and digital security mechanisms within narrative-driven scenarios explicitly mapped to the Cyber Security Body of Knowledge (CyBOK). The game is inspired by retro top-down games, dungeon crawlers, escape rooms, and cyber security challenges.

Note: Break Escape is currently in development. Please report any issues or feedback via GitHub.

Live Demo -- Early Beta Playtesting

You can try Break Escape directly from your browser by visiting: https://hacktivity.co.uk/break-escape-beta/scenario_select.html

Youll choose from scenarios, each offering its own set of puzzles and challenges, ranging from cryptography to physical security.

After playing, please fill out a short survey. Your insights will be instrumental in improving the game and understanding the benefits. https://forms.gle/kiVgNUBSHu2KjcJt8

Features

  • Immersive Learning Environment: Top-down 2D game environment accessible through web browsers
  • Cyber-Physical Security Challenges: Simulations of various security mechanisms:
    • Key-based locks (with physical keys and lockpicking mini-game)
    • PIN code systems
    • Password-protected interfaces
    • Biometric authentication (fingerprints that can be dusted and spoofed)
    • Bluetooth proximity detection
  • CyberChef Integration: Embedded cryptographic tools for encryption and data analysis
  • CyBOK Mapping: Each scenario is explicitly mapped to relevant Cyber Security Body of Knowledge areas
  • Multiple Scenarios: Various pre-built scenarios focusing on different security aspects:
    • "CEO Exfil Investigation" - Corporate espionage and data exfiltration
    • "Captain Meow's Disappearance" - Encoding and cryptography
    • "Encoding and Encryption Lab" - Basic cryptographic principles
    • "Asymmetric Encryption with RSA" - Public key cryptography
    • "Symmetric Encryption with AES" - Block ciphers and encryption modes
    • "Biometric Security Breach" - Fingerprint authentication

Technical Implementation

Break Escape is implemented using:

  • Phaser.js: Core game engine
  • JavaScript/HTML5: Front-end implementation
  • JSON: Scenario specification format

Installation

Break Escape is a web-based application and requires a web server to run. You can:

Option 1: Use the hosted version

Visit the live demo at https://hacktivity.co.uk/break-escape-beta/scenario_select.html

Option 2: Use Python's built-in HTTP server

  1. Clone the repository:

    git clone https://github.com/yourusername/break-escape.git
    cd break-escape
    
  2. Start a local web server:

    python3 -m http.server
    
  3. Open your web browser and navigate to:

    http://localhost:8000
    

Option 3: Deploy to a web server

  1. Upload all files to your web server directory
  2. Access through your domain

Usage

Start Break Escape:

  • Open Break Escape in your web browser
  • Choose a scenario based on your learning objectives or difficulty preference

Play the game:

  • When you start a scenario, you will be given a brief of the scenario.
  • You can navigate through the virtual environment using mouse clicks.
  • Interact with objects by clicking on them.
  • Collect items into your inventory to use later.
  • Solve puzzles and progress through rooms to complete the scenario.

After playing, please fill out a short survey. https://forms.gle/kiVgNUBSHu2KjcJt8

Game Controls

  • Mouse Click: Move character, interact with objects
  • Inventory: Click collected items to use them
  • Notes Panel: Access important information you've discovered
  • Bluetooth Scanner: Detect nearby Bluetooth devices (when available)
  • Biometrics Panel: View collected fingerprint samples (when available)

Scenario Design

Break Escape features a flexible JSON-based scenario specification format that enables educators to create custom scenarios without programming knowledge. The scenario structure includes:

  • Rooms with connections, objects, and optional locks
  • Objects with properties like takeable, readable, observations, and lock requirements
  • Special object types for fingerprint collection, cryptographic analysis, and more

For detailed information on creating your own scenarios, refer to README_scenario_design.md.

License

Break Escape is dual licensed:

  • AGPL (GNU Affero General Public License)
  • Open Government Licence

Acknowledgements

Break Escape was developed as an educational tool to address the "reflection gap" identified in many existing cyber security games by requiring players to actively apply security knowledge rather than merely encountering security terminology during gameplay.

The project integrates CyberChef, an open-source web application for encryption and data analysis, allowing learners to interact with genuine cryptographic tools within the game environment.

Special thanks to the Cyber Security Body of Knowledge (CyBOK) for providing the knowledge framework that Break Escape scenarios are mapped to.

This project is supported by a Cyber Security Body of Knowledge (CyBOK) resources around CyBOK 1.1 grant (2024-2025).


For questions, contributions, or more information, please open an issue on the project repository.

Description
No description provided
Readme 72 MiB
Languages
JavaScript 86.5%
Ink 7%
HTML 2.9%
CSS 2.5%
Ruby 0.9%
Other 0.2%