Blockchain|Rationales A+ Graded Latest Updated 2026
Bifid Cipher
Maps letters into numeric values.
Playfair Cipher
Uses a 5x5 matrix for encryption.
Caesar Cipher
A cipher that shifts letters in the alphabet.
Kasiski Examination
Breaks the Vigenere/Polyalphabetic cipher.
XOR
A binary operation where bits are compared; e.g., 1110 XOR 1011 = 0101.
Symmetric Cryptography
Uses the same key for encryption and decryption, typically faster.
Asymmetric Cryptography
Uses a pair of keys (public and private) for encryption and decryption, typically more secure.
Privacy Enhanced Mail (PEM)
The text-based format for certificates.
True Random Number Generator (TRNG)
A device that generates random numbers from a physical source.
Clipper Chip
Uses the Skipjack encryption algorithm.
Digital Signature
Used to verify that a data entity was created by a specific sender.
Differential Cryptanalysis
, A method of cryptanalysis that studies how differences in input can affect the resultant
difference at the output.
Algebraic Attack
A method of cryptanalysis that uses algebraic equations to break ciphers.
Linear Cryptanalysis
A method of cryptanalysis that uses linear approximations to describe the behavior of a cipher.
Key Length
As key length increases, performance decreases but security improves.
LM Hash Mechanism
A method used to store passwords in a hashed format.
Blockchain
A new block is added approximately every 10 minutes.
Mining Rewards
As the length of the blockchain increases, mining rewards decrease.
Block Cipher Modes
Different methods of encrypting data in blocks.
ECB Mode
Each block is processed separately with the same key; no salt or IV is used.
CBC Mode
Initialization vector encrypts the first block, which is then used to encrypt subsequent blocks.
CFB Mode
IV is encrypted and XORed, producing multiple outputs for encryption.
OFB Mode
Block 1 is XOR'd with the encrypted version of the IV.
CTR Mode
Encrypts and XORs a counter value and a nonce with the plaintext block.