Scheduled maintenance: May 10, 2025 from 07:00 AM to 10:00 AM
Introduction to Cryptography - D334 ACTUAL
EXAM QUESTIONS WITH COMPLETE SOLUTION
GUIDE (A+ GRADED 100% VERIFIED) LATEST
VERSION 2025!!
Save
Terms in this set (250)
XOR the following 1100010101101101
0101110101010111
1001100000111010
------------------
asymmetric key-based RSA
encryption DSA
-typical methods El Gamal
RC2- 40 bit key size 64 bit block
RC4- (Stream Cipher)- Used in SSL and WEP
Symmetric key-based
RC5- (Variable Key size, 32, 64, or 128 bit block size)
encryption
AES- (128, 192 or 256 bit key size, 128 bit block size)
-Typical Methods
DES- (56 bit key size. 64 bit Block size)
3DES- (112 bit key size, 64 bit block size)
https://quizlet.com/1041860007/introduction-to-cryptography-d334-actual-exam-questions-with-complete-solution-guide-a-graded-100-verified-latest-v… 1/37
,5/9/25, 9:34 AM Introduction to Cryptography - D334 ACTUAL EXAM QUESTIONS WITH COMPLETE SOLUTION GUIDE (A+ GRADED 100% VERI…
RC2(40 bit key size)
RC5(Variable block size)
IDEA
DES
Block Encryption
3DES
AES (Rijndael)
Blowfish
twofish
RC4
stream encryption
Chacha
The method of knowing the mapping between the
Rainbow Attack
hashed values and the original data
Dictionary-type attack a brute force analysis
does not belong to
∉
when an object is not in a set
Belongs to
∈
when an object is within a set
subset
⊆
subset has fewer elements or equal to the set
A∪ B union (objects that belong to set A or set B)
| such that
A∩B Intersection: in both A and B
Used a polyalphabetic substitution cipher, which did
not repeat within a reasonable time period, along with
a secret key. For the cracking of the Enigma cipher,
Enigma Machine -Cypher
the challenge was thus to determine both the
10
algorithm used and the key. Enigma's main weakness,
though, was that none of the plain text letters could
be ciphered as itself.
Uses four 5 × 5 matrices arranged in a square, are
Four-square cipher9 where each matrix contains 25 letters for encoding
and decoding operations.
https://quizlet.com/1041860007/introduction-to-cryptography-d334-actual-exam-questions-with-complete-solution-guide-a-graded-100-verified-latest-v… 2/37
,5/9/25, 9:34 AM Introduction to Cryptography - D334 ACTUAL EXAM QUESTIONS WITH COMPLETE SOLUTION GUIDE (A+ GRADED 100% VERI…
Cypher Code mapping that is only used once.
Advantage: it is essentially unbreakable.
One-time pad cypher8
Disadvantage: it takes lots of work as you would have
to generate the pad to be used, each time.
Polyalphabetic cipher that involves using a different
mapping, based on a keyword, for each character of
the cipher. An advantage of this type of cipher is that
Vigenere Cipher 7
the same plaintext character is likely to be coded to
different mappings, depending on the position of the
keyword, making guessing more difficult.
Mono-alphabetic substitution cipher known as "shift"
cipher. Involves plaintext being replaced by a letter
some fixed number of positions down the alphabet.
Ceasar Cipher6
i.e., a Caesar Cipher using a shift of +3 would mean a
plaintext letter A would result in a ciphertext letter D
(a shift of three positions to the right in the alphabet)
Encoding method, rather than a cipher, that works by
Morse Code cipher 5 translating characters into sequences of dots (.) and
dashes (-)
5 × 5 matrix containing the alphabet less the letter J.
Playfair Cipher 4 Cipher/decipher process consists of a set of rules
outlining use of column and row combinations.
Makes use of a grid and which maps the letters into
BIFID Cipher 3
numeric values.
Employs a method to scramble text by writing it in a
Rail Code Cipher 2
sequence across a number of rails.
Mono- alphabetic substitution cipher that makes use
of mapping plaintext characters to graphical
characters rather than to alphabetic ones. i.e. A=(pick a
Pig Pen Cipher 1
symbol), vs A=(pick a letter). Disadvantage: once the
mapping is known, it is difficult to keep the message
secret.
Encryption in simplest terms is changing plaintext into ciphertext
https://quizlet.com/1041860007/introduction-to-cryptography-d334-actual-exam-questions-with-complete-solution-guide-a-graded-100-verified-latest-v… 3/37
, 5/9/25, 9:34 AM Introduction to Cryptography - D334 ACTUAL EXAM QUESTIONS WITH COMPLETE SOLUTION GUIDE (A+ GRADED 100% VERI…
Decryption The process of converting a ciphertext into plaintext.
Encrypt individual files and encrypt full disks with
AESCrypt
options such as Bitlocker and FileVault
c code or substitution is where a single mapping from
Mono-alphabetic our alphabet to a cipher alphabet is created. Many
early cryptosystems used this.
refers to the mapping of our alphabet to a number of
Polyalphabetic cipher alphabets. This approach added a bit of
complexity to early cryptosystems.
is considered to be unbreakable since it only uses its
One-time pad
cipher code once.
This method repeats the random numbers after a
Pseudo-Random Number given time (periodic). They are fast and are also
Generators (PRNGs) deterministic and are useful in producing a repeatable
set of random numbers.
is cipher cracking methodology that involves
identifying patterns and variations in the probability of
codes. i.e. a three-letter ciphered text combination
Frequency Analysis
spotted at the beginning of a string too often could
tip us off that those three letters correlate the letters
THE in the English alphabet.
This method generates a true random number and
uses some form of random process. One approach is
to monitor the movements of a mouse pointer on a
True Random Number
screen or from the pauses between keystrokes.
Generators (TRNGs)
Overall, the method is generally slow, especially if it
involves human interaction, but is non-deterministic
and aperiodic.
measures level of unpredictability; in encryption
Entropy relates to the degree of uncertainty of the encryption
process.
ASCII 8-bit values, up to 256 characters
https://quizlet.com/1041860007/introduction-to-cryptography-d334-actual-exam-questions-with-complete-solution-guide-a-graded-100-verified-latest-v… 4/37