WGU D334 INTRO TO CRYPTOGRAPHY TEST
QUESTIONS AND ANSWERS
Mono-alphabetic substitution is a type of substitution cypher in which the
encryption process uses just one alphabet.
Polyalphabetic substitution
A substitution cypher is an encryption method that uses two or more alphabets.
A random polyalphabetic key that is as long as the message itself is used only
once to create a one-time pad, an example of perfect (unbreakable) encryption.
Pseudo-random number generators, or PRNGs. Long runs of numbers with
good random characteristics can be generated using algorithms, but eventually,
the sequence repeats.
True Random Number Generators or TRNGs Using a random process of some
kind, this method produces a truly random number. One method is to keep an
eye on the mouse pointer's movements on the screen or the intervals between
keystrokes. Overall, the approach is aperiodic and non-deterministic, although it
is often slow, particularly when human involvement is involved.
Analysis of Frequencies
a method based on the relative frequency of different letters in the English
language.
For example, a three-letter ciphered text combination that appears too
frequently at the start of a string may indicate that the three letters correspond to
the English alphabet's THE letters.
, Entropy
An indicator of chaos, chance, or uncertainty.
Two popular ways for encoding binary to characters are ASCII (8-bit values, up
to 256 characters).
UTF-16 (up to 65,536 characters, 16-bit values).
The Hardware Security Module, or HSM, is a physically impenetrable and
tamper-evident device that offers cryptographic processing and protects and
manages cryptographic keys.
Trusted Platform Module, or TPM
A dedicated processor that manages hardware-level encryption is called a
trusted platform module (TPM); it permits the use of full disk encryption on a
hard drive while reducing the effect on system performance. The encryption
keys are in TPM.
Math in binary
Knowing which binary digit combination will result in a binary "1" is the
fundamental concept. OR requires at least one 1 to produce a 1, AND requires
two 1's to produce a 1, and XOR necessitates a mismatch.
Math for Modulus Operators
Just return the residual after dividing the first number by the second. with the
(mod) or (%) annotated. 5 mod 2 = 1, for instance [2 enters into 5 a maximum
of twice (4), 5-4 = the residue which is 1].
Order is irrelevant when comparing combination and permutation combinations.
Permutation: importance of order
QUESTIONS AND ANSWERS
Mono-alphabetic substitution is a type of substitution cypher in which the
encryption process uses just one alphabet.
Polyalphabetic substitution
A substitution cypher is an encryption method that uses two or more alphabets.
A random polyalphabetic key that is as long as the message itself is used only
once to create a one-time pad, an example of perfect (unbreakable) encryption.
Pseudo-random number generators, or PRNGs. Long runs of numbers with
good random characteristics can be generated using algorithms, but eventually,
the sequence repeats.
True Random Number Generators or TRNGs Using a random process of some
kind, this method produces a truly random number. One method is to keep an
eye on the mouse pointer's movements on the screen or the intervals between
keystrokes. Overall, the approach is aperiodic and non-deterministic, although it
is often slow, particularly when human involvement is involved.
Analysis of Frequencies
a method based on the relative frequency of different letters in the English
language.
For example, a three-letter ciphered text combination that appears too
frequently at the start of a string may indicate that the three letters correspond to
the English alphabet's THE letters.
, Entropy
An indicator of chaos, chance, or uncertainty.
Two popular ways for encoding binary to characters are ASCII (8-bit values, up
to 256 characters).
UTF-16 (up to 65,536 characters, 16-bit values).
The Hardware Security Module, or HSM, is a physically impenetrable and
tamper-evident device that offers cryptographic processing and protects and
manages cryptographic keys.
Trusted Platform Module, or TPM
A dedicated processor that manages hardware-level encryption is called a
trusted platform module (TPM); it permits the use of full disk encryption on a
hard drive while reducing the effect on system performance. The encryption
keys are in TPM.
Math in binary
Knowing which binary digit combination will result in a binary "1" is the
fundamental concept. OR requires at least one 1 to produce a 1, AND requires
two 1's to produce a 1, and XOR necessitates a mismatch.
Math for Modulus Operators
Just return the residual after dividing the first number by the second. with the
(mod) or (%) annotated. 5 mod 2 = 1, for instance [2 enters into 5 a maximum
of twice (4), 5-4 = the residue which is 1].
Order is irrelevant when comparing combination and permutation combinations.
Permutation: importance of order