Ciphers, Randomness & Hardware Security|Questions with
Verified A+ Graded Answers Latest Updated 2026
Changing plaintext into ciphertext
(Should be applied in at rest and in transit)
Encryption
Changing ciphertext to plaintext
Decryption
Encrypt individual files and full disks with options such as BitLocker and FileVault
Aescrypt
Mapping from our alphabet to a number of cipher alphabets.
Added complexity in early cryptosystems.
Polyalphabetic
Single mapping from our alphabet to a cipher alphabet is created.
Many early cryptosystems.
Mono-Alphabetic
Considered un-breakable since it only uses its cipher code once.
One-Time Pad
Method repeats the random numbers after a given time. (periodic)
They are fast and deterministic.
Useful in producing repeatable set of random numbers.
Pseudo-Random Number Generators (PRNGs)
Method generates a true random number and uses some form of random process. One
approach is to monitor the movements of a mouse pointer on a screen or from the pauses
between keystrokes. Overall, the method is generally slow, especially if it involves human
interaction, but is non-deterministic and aperiodic.
True Random Number Generators (TRNGs)
, Cipher cracking methodology that involves identifying patterns and variations in the
probability of codes.
i.e. a three-letter ciphered text combination spotted at the beginning of a string too often could
tip us off that those three letters correlate the letters THE in the English alphabet.
Frequency Analysis
measures level of unpredictability
Entropy
Two common binary to characters encoding methods
ASCII (8bit value, up to 256 characters)
UTF-16 (16bit values, up to 65,536 characters)
8 bit value, up to 256 characters
ASCII
16 bit value, up to 65,536 characters
UTF-16
Tamper-evident and intrusion-resistant physical device that safeguards and manages
cryptographic keys and provides cryptographic processing.
Hardware Security Module (HSM)
Which encryption is more efficient?
Hardware
Dedicated processor that handles hardware-level encryption; allows the use of full disk
encryption on a hard drive in a manner that minimizes the impact on system performance.
Contains the encryption keys.
Trusted platform module (TPM)
value which only has factors of 1 and itself
Prime Number
Determine the likelihood of an event happening, typically by understanding the chances of how
each of the elements involved in an event interact, and the likelihood of them happening.
>> Dependent, Independent, and mutually exclusive