Set Questions With Reviewed
Correct Detailed Answers
New Update!!
1. In lightweight cryptography, block sizes are relatively smaller than those
used in conventional cryptography and are typically how many bits? Select
all that apply.
- 90
- 128
- 64
- 80
- ANSWER ✅ 64 and 80
think its lightweight so 64 to 80
2. Bifid Cipher
- ANSWER ✅ Makes use of a grid and which maps the letters into numeric values.
A more complex version uses a 5x5 square where each matrix uses 25 letters
3. Playfair Cipher
- ANSWER ✅ A 5x5 grid created with a secret phrase (Letters cannot repeat in
Grid) nappierrun
4. Homophonic substitution cipher
- ANSWER ✅ cipher that replaces plaintext with multiple different cipher texts
, 5. Caesar coding cipher
- ANSWER ✅ Caesar ciphers use a substitution method where letters in the
alphabet are shifted by some fixed number of spaces to yield an encoding
alphabet. A Caesar cipher with a shift of 1 would encode an A as a B, an M as an N,
and a Z as an A, and so on.
6. Scrambled Alphabet
- ANSWER ✅ each letter is connected to a different letter.
For ex, A goes to B
, B goes to T, etc.......
7. Vignere Cipher what is it and how was it cracked?
- ANSWER ✅ a method of encrypting text by applying a series of Caesar ciphers
based on the letters of a keyword. So it uses multiple alphabet ciphers essentially.
8. Fractioned morse code
- ANSWER ✅ uses 26 character key mapping and coverts plaintext into morse
code into fixed length chunks. Then converted to cipher text letters.
9. Pig Pen Cipher
- ANSWER ✅ Uses a monolithic alphabetic substitution method.
The Pigpen cipher is a type of code where each letter of the alphabet is replaced
with a symbol. These symbols come from a grid or pattern that looks like a tic-tac-
toe board or Xs. You write your message using these symbols instead of regular
letters. It's a simple way to turn a plain message into a secret code.
10. What is the pig pen vulnerability?
- ANSWER ✅ Once the mapping is known, it is difficult to keep the message a
secret
11. Rail Fence Cipher
,- ANSWER ✅ Ciphers that write message letters out diagonally over a number of
rows then read off cipher row by row.
12. Combinations
- ANSWER ✅ represent selection of items from a larger set without regard to the
order in which they're chosen. Does not care the order of selections. If we have 3
countries (america, iceland, Germany) There are 3 combos of 2 countries.
13. Permutations
- ANSWER ✅ an arrangement of objects in a specific order. AKA a reordering of
those objects
14. Set theory
A set is a well defined collection of distinct objects. Called elements or members,
which can be anything. Numbers, colors, even other sets. Sets are typically
denoted with curly braces. ex. A={1,2,3}
15. OTP
- ANSWER ✅ One-Time Pad
cipher that is only used once. Near uncrackable cipher that uses a code book that
both parties know.
16. Explain each form of Data
ASCII
Computer
UTF-16
- ANSWER ✅ Computers read data in binary
ASCII is 8 bit values and supports 256 different characters (2^8)
UTF-16 extends to 16 values. 65,536 or 2^16
17. Reed solomon
, - ANSWER ✅ More complex data integrity to detect and correct them. Typically
used in higher level protocols
18. Huffman coding
- ANSWER ✅ compress data by looking for patterns in binary or meta data
19. Lempel-Viz Welsh (LZW)
- ANSWER ✅ Adaptive dictionary compression technique known as LZ-77 coding.
It is the basis for many popular compression methods, Suited for a high degree of
repetition
20. How does LZ-78 differ from LZ-77
- ANSWER ✅ Builds a dictionary of frequently used characters.
ex. The receiver needs a receipt.
recei would be used multiple times.
21. Little endian vs big endian
- ANSWER ✅ Both refer to the order of bytes stored depending on computer
architecture type.
Little is the least signifigant byte is stored in the lowest memory address
Big is used in IBM z/Architecture mainframes. The most signifigant byte is stored in
the lowest memory address
22. A major disadvantage associated with symmetric encryption centers around
the need to do what?
- Exchange the secret key
- Exchange the public key
- Manage the key pair
- Manage the public key
- ANSWER ✅ Exchange the secret key
Blowfish vs Twofish