100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

D334 Cryptography Exam Set Questions With Reviewed Correct Detailed Answers New Update!!

Rating
-
Sold
1
Pages
49
Grade
A+
Uploaded on
04-01-2025
Written in
2024/2025

D334 Cryptography Exam Set Questions With Reviewed Correct Detailed Answers New Update!! 1. In lightweight cryptography, block sizes are relatively smaller than those used in conventional cryptography and are typically how many bits? Select all that apply. - - ANSWER 64 and 80 think its lightweight so 64 to 80 2. Bifid Cipher - ANSWER Makes use of a grid and which maps the letters into numeric values. A more complex version uses a 5x5 square where each matrix uses 25 letters 3. Playfair Cipher - ANSWER A 5x5 grid created with a secret phrase (Letters cannot repeat in Grid) nappierrun 4. Homophonic substitution cipher - ANSWER cipher that replaces plaintext with multiple different cipher texts 5. Caesar coding cipher - ANSWER Caesar ciphers use a substitution method where letters in the alphabet are shifted by some fixed number of spaces to yield an encoding alphabet. A Caesar cipher with a shift of 1 would encode an A as a B, an M as an N, and a Z as an A, and so on. 6. Scrambled Alphabet - ANSWER each letter is connected to a different letter. For ex, A goes to B , B goes to T, etc....... 7. Vignere Cipher what is it and how was it cracked? - ANSWER a method of encrypting text by applying a series of Caesar ciphers based on the letters of a keyword. So it uses multiple alphabet ciphers essentially. 8. Fractioned morse code - ANSWER uses 26 character key mapping and coverts plaintext into morse code into fixed length chunks. Then converted to cipher text letters. 9. Pig Pen Cipher - ANSWER Uses a monolithic alphabetic substitution method. The Pigpen cipher is a type of code where each letter of the alphabet is replaced with a symbol. These symbols come from a grid or pattern that looks like a tic-tac toe board or Xs. You write your message using these symbols instead of regular letters. It's a simple way to turn a plain message into a secret code. 10. What is the pig pen vulnerability? - ANSWER Once the mapping is known, it is difficult to keep the message a secret

Show more Read less
Institution
D334
Course
D334











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
D334
Course
D334

Document information

Uploaded on
January 4, 2025
Number of pages
49
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

D334 Cryptography Exam

Set Questions With Reviewed

Correct Detailed Answers

New Update!!

1. In lightweight cryptography, block sizes are relatively smaller than those
used in conventional cryptography and are typically how many bits? Select
all that apply.
- 90
- 128
- 64
- 80

- ANSWER ✅ 64 and 80
think its lightweight so 64 to 80

2. Bifid Cipher

- ANSWER ✅ Makes use of a grid and which maps the letters into numeric values.
A more complex version uses a 5x5 square where each matrix uses 25 letters

3. Playfair Cipher

- ANSWER ✅ A 5x5 grid created with a secret phrase (Letters cannot repeat in
Grid) nappierrun

4. Homophonic substitution cipher

- ANSWER ✅ cipher that replaces plaintext with multiple different cipher texts

, 5. Caesar coding cipher

- ANSWER ✅ Caesar ciphers use a substitution method where letters in the
alphabet are shifted by some fixed number of spaces to yield an encoding
alphabet. A Caesar cipher with a shift of 1 would encode an A as a B, an M as an N,
and a Z as an A, and so on.

6. Scrambled Alphabet

- ANSWER ✅ each letter is connected to a different letter.
For ex, A goes to B
, B goes to T, etc.......

7. Vignere Cipher what is it and how was it cracked?

- ANSWER ✅ a method of encrypting text by applying a series of Caesar ciphers
based on the letters of a keyword. So it uses multiple alphabet ciphers essentially.

8. Fractioned morse code

- ANSWER ✅ uses 26 character key mapping and coverts plaintext into morse
code into fixed length chunks. Then converted to cipher text letters.

9. Pig Pen Cipher

- ANSWER ✅ Uses a monolithic alphabetic substitution method.
The Pigpen cipher is a type of code where each letter of the alphabet is replaced
with a symbol. These symbols come from a grid or pattern that looks like a tic-tac-
toe board or Xs. You write your message using these symbols instead of regular
letters. It's a simple way to turn a plain message into a secret code.

10. What is the pig pen vulnerability?

- ANSWER ✅ Once the mapping is known, it is difficult to keep the message a
secret

11. Rail Fence Cipher

,- ANSWER ✅ Ciphers that write message letters out diagonally over a number of
rows then read off cipher row by row.

12. Combinations

- ANSWER ✅ represent selection of items from a larger set without regard to the
order in which they're chosen. Does not care the order of selections. If we have 3
countries (america, iceland, Germany) There are 3 combos of 2 countries.

13. Permutations

- ANSWER ✅ an arrangement of objects in a specific order. AKA a reordering of
those objects

14. Set theory

A set is a well defined collection of distinct objects. Called elements or members,
which can be anything. Numbers, colors, even other sets. Sets are typically
denoted with curly braces. ex. A={1,2,3}

15. OTP

- ANSWER ✅ One-Time Pad
cipher that is only used once. Near uncrackable cipher that uses a code book that
both parties know.

16. Explain each form of Data
ASCII
Computer
UTF-16

- ANSWER ✅ Computers read data in binary
ASCII is 8 bit values and supports 256 different characters (2^8)
UTF-16 extends to 16 values. 65,536 or 2^16

17. Reed solomon

, - ANSWER ✅ More complex data integrity to detect and correct them. Typically
used in higher level protocols

18. Huffman coding

- ANSWER ✅ compress data by looking for patterns in binary or meta data

19. Lempel-Viz Welsh (LZW)

- ANSWER ✅ Adaptive dictionary compression technique known as LZ-77 coding.
It is the basis for many popular compression methods, Suited for a high degree of
repetition

20. How does LZ-78 differ from LZ-77

- ANSWER ✅ Builds a dictionary of frequently used characters.
ex. The receiver needs a receipt.
recei would be used multiple times.

21. Little endian vs big endian

- ANSWER ✅ Both refer to the order of bytes stored depending on computer
architecture type.
Little is the least signifigant byte is stored in the lowest memory address
Big is used in IBM z/Architecture mainframes. The most signifigant byte is stored in
the lowest memory address

22. A major disadvantage associated with symmetric encryption centers around
the need to do what?
- Exchange the secret key
- Exchange the public key
- Manage the key pair
- Manage the public key

- ANSWER ✅ Exchange the secret key

Blowfish vs Twofish

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NURSINGDICTIONARY Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
242
Member since
2 year
Number of followers
87
Documents
2515
Last sold
1 day ago
NURSING ENCYCLOPEDIA

Our mission is to bring students and learners together and help you to get through your studies, courses and exams. Providing Well Revised Expert Information.

4.1

27 reviews

5
14
4
5
3
6
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions