100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

D334 / C839v5 Cryptography Complete Guide – Encryption, Ciphers, Randomness & Hardware Security|Questions with Verified A+ Graded Answers Latest Updated 2026

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
01-02-2026
Written in
2025/2026

D334 / C839v5 Cryptography Complete Guide – Encryption, Ciphers, Randomness & Hardware Security|Questions with Verified A+ Graded Answers Latest Updated 2026 Changing plaintext into ciphertext (Should be applied in at rest and in transit) Encryption Changing ciphertext to plaintext Decryption Encrypt individual files and full disks with options such as BitLocker and FileVault Aescrypt Mapping from our alphabet to a number of cipher alphabets. Added complexity in early cryptosystems. Polyalphabetic Single mapping from our alphabet to a cipher alphabet is created. Many early cryptosystems. Mono-Alphabetic Considered un-breakable since it only uses its cipher code once. One-Time Pad Method repeats the random numbers after a given time. (periodic) They are fast and deterministic. Useful in producing repeatable set of random numbers. Pseudo-Random Number Generators (PRNGs) Method generates a true random number and uses some form of random process. One approach is to monitor the movements of a mouse pointer on a screen or from the pauses between keystrokes. Overall, the method is generally slow, especially if it involves human interaction, but is non-deterministic and aperiodic. True Random Number Generators (TRNGs) Cipher cracking methodology that involves identifying patterns and variations in the probability of codes. i.e. a three-letter ciphered text combination spotted at the beginning of a string too often could tip us off that those three letters correlate the letters THE in the English alphabet. Frequency Analysis measures level of unpredictability Entropy Two common binary to characters encoding methods ASCII (8bit value, up to 256 characters) UTF-16 (16bit values, up to 65,536 characters) 8 bit value, up to 256 characters ASCII 16 bit value, up to 65,536 characters UTF-16 Tamper-evident and intrusion-resistant physical device that safeguards and manages cryptographic keys and provides cryptographic processing. Hardware Security Module (HSM) Which encryption is more efficient? Hardware Dedicated processor that handles hardware-level encryption; allows the use of full disk encryption on a hard drive in a manner that minimizes the impact on system performance. Contains the encryption keys. Trusted platform module (TPM) value which only has factors of 1 and itself Prime Number Determine the likelihood of an event happening, typically by understanding the chances of how each of the elements involved in an event interact, and the likelihood of them happening. >> Dependent, Independent, and mutually exclusive Probability Mono- alphabetic substitution cipher that makes use of mapping plaintext characters to graphical characters rather than to alphabetic ones. i.e. A=(pick a symbol), vs A=(pick a letter). Disadvantage: once the mapping is known, it is difficult to keep the message secret. Pigpen 5 × 5 matrix containing the alphabet less the letter J. Cipher/decipher process consists of a set of rules outlining use of column and row combinations. Playfair Mono-alphabetic substitution cipher known as "shift" cipher. Involves plaintext being replaced by a letter some fixed number of positions down the alphabet. i.e., using a shift of +3 would mean a plaintext letter A would result in a ciphertext letter D (a shift of three positions to the right in the alphabet) Caesar Polyalphabetic cipher that involves using a different mapping, based on a keyword, for each character of the cipher. An advantage of this type of cipher is that the same plaintext character is likely to be coded to different mappings, depending on the position of the keyword, making guessing more difficult. Vigenère Uses four 5 × 5 matrices arranged in a square, are where each matrix contains 25 letters for encoding and decoding operations. Four-square Cipher Used a polyalphabetic substitution cipher, which did not repeat within a reasonable time period, along with a secret key. For the cracking of the cipher, the challenge was thus to determine both the algorithm used and the key. Main weakness, though, was that none of the plain text letters could be ciphered as itself. Enigma Machine The issue with symmetric cryptography since the same key is used for encryption and decryption. Finding a secure way to share or transport the key between the entity encrypting and the one decrypting. Widely used key exchange

Show more Read less
Institution
Module









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Module

Document information

Uploaded on
February 1, 2026
Number of pages
14
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

D334 / C839v5 Cryptography Complete Guide – Encryption,
Ciphers, Randomness & Hardware Security|Questions with
Verified A+ Graded Answers Latest Updated 2026
Changing plaintext into ciphertext

(Should be applied in at rest and in transit)

Encryption

Changing ciphertext to plaintext

Decryption

Encrypt individual files and full disks with options such as BitLocker and FileVault

Aescrypt

Mapping from our alphabet to a number of cipher alphabets.
Added complexity in early cryptosystems.

Polyalphabetic

Single mapping from our alphabet to a cipher alphabet is created.

Many early cryptosystems.

Mono-Alphabetic

Considered un-breakable since it only uses its cipher code once.

One-Time Pad

Method repeats the random numbers after a given time. (periodic)

They are fast and deterministic.

Useful in producing repeatable set of random numbers.

Pseudo-Random Number Generators (PRNGs)

Method generates a true random number and uses some form of random process. One
approach is to monitor the movements of a mouse pointer on a screen or from the pauses
between keystrokes. Overall, the method is generally slow, especially if it involves human
interaction, but is non-deterministic and aperiodic.

True Random Number Generators (TRNGs)

, Cipher cracking methodology that involves identifying patterns and variations in the
probability of codes.

i.e. a three-letter ciphered text combination spotted at the beginning of a string too often could
tip us off that those three letters correlate the letters THE in the English alphabet.

Frequency Analysis

measures level of unpredictability

Entropy

Two common binary to characters encoding methods

ASCII (8bit value, up to 256 characters)
UTF-16 (16bit values, up to 65,536 characters)

8 bit value, up to 256 characters

ASCII

16 bit value, up to 65,536 characters

UTF-16

Tamper-evident and intrusion-resistant physical device that safeguards and manages
cryptographic keys and provides cryptographic processing.

Hardware Security Module (HSM)

Which encryption is more efficient?

Hardware

Dedicated processor that handles hardware-level encryption; allows the use of full disk
encryption on a hard drive in a manner that minimizes the impact on system performance.

Contains the encryption keys.

Trusted platform module (TPM)

value which only has factors of 1 and itself

Prime Number

Determine the likelihood of an event happening, typically by understanding the chances of how
each of the elements involved in an event interact, and the likelihood of them happening.
>> Dependent, Independent, and mutually exclusive

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LectAziim Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
21
Member since
2 year
Number of followers
13
Documents
4143
Last sold
3 months ago
Dont stress yourself on study materials .LectAziim got it all

"Unlock your potential with our online writing store! Discover expert guidance, personalized feedback, and tools for every writer's journey. From crafting compelling essays to mastering creative storytelling, our platform offers interactive courses, one-on-one coaching, and resources tailored to your goals. Start writing your success story today with us!"

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions