100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

D334 - Introduction to Cryptography Exam Set Questions With Reviewed Correct Detailed Answers New Update!!

Rating
-
Sold
1
Pages
39
Grade
A+
Uploaded on
04-01-2025
Written in
2024/2025

D334 - Introduction to Cryptography Exam Set Questions With Reviewed Correct Detailed Answers New Update!! 1. Enigma Machine -Cypher 10 - ANSWER Used a polyalphabetic substitution cipher, which did not repeat within a reasonable time period, along with a secret key. For the cracking of the Enigma cipher, the challenge was thus to determine both the algorithm used and the key. Enigma's main weakness, though, was that none of the plain text letters could be ciphered as itself. 2. Four-square cipher9 - ANSWER Uses four 5 × 5 matrices arranged in a square, are where each matrix contains 25 letters for encoding and decoding operations. 3. One-time pad cypher8 - ANSWER used once. Advantage: it is essentially unbreakable. Cypher Code mapping that is only Disadvantage: it takes lots of work as you would have to generate the pad to be used, each time. 4. Vigenere Cipher 7 - ANSWER Polyalphabetic cipher that involves using a different mapping, based on a keyword, for each character of the cipher. An advantage of this type of cipher is that the same plaintext character is likely to be coded to different mappings, depending on the position of the keyword, making guessing more difficult. 5. Ceasar Cipher6 - ANSWER Mono-alphabetic substitution cipher known as "shift" cipher. Involves plaintext being replaced by a letter some fixed number of positions down the alphabet. i.e., a Caesar Cipher using a shift of +3 would mean a plaintext letter A would result in a ciphertext letter D (a shift of three positions to the right in the alphabet) 6. Morse Code cipher 5 - ANSWER Encoding method, rather than a cipher, that works by translating characters into sequences of dots (.) and dashes ( ) 7. Playfair Cipher 4 - ANSWER 5 × 5 matrix containing the alphabet less the letter J. Cipher/decipher process consists of a set of rules outlining use of column and row combinations. 8. BIFID Cipher 3 - ANSWER letters into numeric values. 9. Rail Code Cipher 2 - ANSWER Makes use of a grid and which maps the Employs a method to scramble text by writing it in a sequence across a number of rails.

Show more Read less
Institution
D334
Course
D334











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
D334
Course
D334

Document information

Uploaded on
January 4, 2025
Number of pages
39
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

D334 - Introduction to Cryptography
Exam Set Questions With Reviewed
Correct Detailed Answers
New Update!!

1. Enigma Machine -Cypher 10 - ANSWER Used a polyalphabetic
substitution cipher, which did not repeat within a reasonable time period,
along with a secret key. For the cracking of the Enigma cipher, the
challenge was thus to determine both the algorithm used and the key.
Enigma's main weakness, though, was that none of the plain text letters
could be ciphered as itself.


2. Four-square cipher9 - ANSWER Uses four 5 × 5 matrices arranged in a
square, are where each matrix contains 25 letters for encoding and
decoding operations.


3. One-time pad cypher8 - ANSWER Cypher Code mapping that is only
used once.
Advantage: it is essentially unbreakable.
Disadvantage: it takes lots of work as you would have to generate the pad to be
used, each time.


4. Vigenere Cipher 7 - ANSWER Polyalphabetic cipher that involves using a
different mapping, based on a keyword, for each character of the cipher.
An advantage of this type of cipher is that the same plaintext character is

, likely to be coded to different mappings, depending on the position of the
keyword, making guessing more difficult.


5. Ceasar Cipher6 - ANSWER Mono-alphabetic substitution cipher known
as "shift" cipher. Involves plaintext being replaced by a letter some fixed
number of positions down the alphabet. i.e., a Caesar Cipher using a shift of
+3 would mean a plaintext letter A would result in a ciphertext letter D (a
shift of three positions to the right in the alphabet)


6. Morse Code cipher 5 - ANSWER Encoding method, rather than a cipher,
that works by translating characters into sequences of dots (.) and dashes (-
)


7. Playfair Cipher 4 - ANSWER 5 × 5 matrix containing the alphabet less
the letter J. Cipher/decipher process consists of a set of rules outlining use
of column and row combinations.


8. BIFID Cipher 3 - ANSWER Makes use of a grid and which maps the
letters into numeric values.


9. Rail Code Cipher 2 - ANSWER Employs a method to scramble text by
writing it in a sequence across a number of rails.


10. Pig Pen Cipher 1 - ANSWER Mono- alphabetic substitution cipher that
makes use of mapping plaintext characters to graphical characters rather
than to alphabetic ones. i.e. A=(pick a symbol), vs A=(pick a letter).
Disadvantage: once the mapping is known, it is difficult to keep the
message secret.

,11. Encryption - ANSWER in simplest terms is changing plaintext into
ciphertext


12. Decryption - ANSWER The process of converting a ciphertext into
plaintext.


13. AESCrypt - ANSWER Encrypt individual files and encrypt full disks with
options such as Bitlocker and FileVault


14. Mono-alphabetic - ANSWER c code or substitution is where a single
mapping from our alphabet to a cipher alphabet is created. Many early
cryptosystems used this.


15. Polyalphabetic - ANSWER refers to the mapping of our alphabet to a
number of cipher alphabets. This approach added a bit of complexity to
early cryptosystems.


16. One-time pad - ANSWER is considered to be unbreakable since it only
uses its cipher code once.


17. Pseudo-Random Number Generators (PRNGs) - ANSWER This method
repeats the random numbers after a given time (periodic). They are fast
and are also deterministic and are useful in producing a repeatable set of
random numbers.

, 18. Frequency Analysis - ANSWER is cipher cracking methodology that
involves identifying patterns and variations in the probability of codes. i.e. a
three-letter ciphered text combination spotted at the beginning of a string
too often could tip us off that those three letters correlate the letters THE
in the English alphabet.


19. True Random Number Generators (TRNGs) - ANSWER This method
generates a true random number and uses some form of random process.
One approach is to monitor the movements of a mouse pointer on a screen
or from the pauses between keystrokes. Overall, the method is generally
slow, especially if it involves human interaction, but is non-deterministic
and aperiodic.


20. Entropy - ANSWER measures level of unpredictability; in encryption
relates to the degree of uncertainty of the encryption process.


21. ASCII - ANSWER 8-bit values, up to 256 characters


22. UTF-16 - ANSWER 16- bit values, up to 65,536 characters


23. Hardware vs Software encryption - ANSWER Hardware encryption is
more efficient than software encryption.


24. Hardware Security Module (HSM) - ANSWER is a tamper-evident and
intrusion-resistant physical device that safeguards and manages
cryptographic keys and provides cryptographic processing.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NURSINGDICTIONARY Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
242
Member since
2 year
Number of followers
87
Documents
2515
Last sold
1 day ago
NURSING ENCYCLOPEDIA

Our mission is to bring students and learners together and help you to get through your studies, courses and exams. Providing Well Revised Expert Information.

4.1

27 reviews

5
14
4
5
3
6
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions