100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU Introduction to Cryptography - C839 (EC-Council CES) UPDATED ACTUAL Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
28
Grade
A+
Uploaded on
13-02-2025
Written in
2024/2025

WGU Introduction to Cryptography - C839 (EC-Council CES) UPDATED ACTUAL Exam Questions and CORRECT Answers CrypTool - CORRECT ANSWER - Software which allows encryption of text using historic algorithms The Enigma Machine - CORRECT ANSWER - In World War II the Germans made use of an electro-mechanical rotor based cipher Known as The Enigma Machine.

Show more Read less
Institution
Cryptography
Course
Cryptography










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cryptography
Course
Cryptography

Document information

Uploaded on
February 13, 2025
Number of pages
28
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU Introduction to Cryptography - C839
(EC-Council CES) UPDATED ACTUAL
Exam Questions and CORRECT Answers
CrypTool - CORRECT ANSWER - Software which allows encryption of text using
historic algorithms


The Enigma Machine - CORRECT ANSWER - In World War II the Germans made use of
an electro-mechanical rotor based cipher Known as The Enigma Machine.


Allied cipher machines used in WWII included the British TypeX and the American SIGABA.


The ADFGVX Cipher - CORRECT ANSWER - invented by Colonel Fritz Nebel in 1918.
The key for this algorithm is a six-by-six square of letters, used to encode a 36-letter alphabet.


The Playfair Cipher - CORRECT ANSWER - invented in 1854 by Charles Wheatstone.


The Playfair cipher uses a five-by-five table containing a keyword or key phrase.


Breaking the Vigenère Cipher - CORRECT ANSWER - In 1863, Friedrich Kasiski was the
first person to publish a successful general attack on the Vigenère Cipher


The Vigenère Cipher - CORRECT ANSWER - This is perhaps the most widely known
multi-alphabet substitution cipher. invented in 1553 by Giovan Battista Bellaso. Uses a series of
different Caesar ciphers based on the letters of a keyword.


The Cipher Disk - CORRECT ANSWER - The cipher disk was invented by Leon Alberti
in 1466. each time you turned the disk, you used a new cipher. It was literally a disk you turned
to encrypt plaintext.

,Multi-Alphabet Substitution - CORRECT ANSWER - Use of multiple substitution
alphabets.
Example:Cipher Disk, Vigenere Cipher, Enigma Machine


Scytale - CORRECT ANSWER - This was a cylinder tool used by the Greeks, and is often
specifically attributed to the Spartans. Physical cylinder that was used to encrypt messages.


ROT13 Cipher - CORRECT ANSWER - It is essentially the Caesar cipher always using a
rotation or shift of 13 characters.


The ATBASH Cipher - CORRECT ANSWER - Hebrew scribes copying religious texts
used this cipher.
substitutes the first letter of the alphabet for the
last, and the second letter for the second-to-the-last, etc.


The Caesar Cipher - CORRECT ANSWER - You can choose to shift any number of letters,
either left or right. If you choose to shift two to
the right, that would be a +2; if you choose to shift four to the left, that would be a -4.


Mono-Alphabet Substitution - CORRECT ANSWER - These algorithms
simply substitute one character of cipher text for each character of plain text.


Examples: Atbash Cipher, Caesar Cipher, Rot13


Symmetric Cryptography - CORRECT ANSWER - It is simply any algorithm where the
key used to decrypt a message is the same key used to encrypt.


Diffusion - CORRECT ANSWER - Changes to one character in the plain text affect
multiple characters in the cipher text.

, Confusion - CORRECT ANSWER - Confusion attempts to make the relationship between
the statistical frequencies of the cipher text and the actual key as complex as possible. This
occurs by using a complex substitution algorithm.


Avalanche - CORRECT ANSWER - a small change yields large effects in the output, This
is Fiestel's variation on Claude Shannon's concept of diffusion.


Kerckhoffs's Principle - CORRECT ANSWER - This principle states that a cryptosystem
should be secure even if everything about the system, except the key, is publicly known.


Substitution - CORRECT ANSWER - Substitution is changing some part of the plaintext
for some matching part of the Cipher Text.


Transposition - CORRECT ANSWER - Transposition is the swapping of blocks of
ciphertext.


binary numbers - CORRECT ANSWER - there are three operations not found in normal
math:
AND, OR, and XOR operations.


Binary AND - CORRECT ANSWER - If both numbers have a one in both places, then the
resultant number is a one.


1101
1001
------
1001


Binary OR - CORRECT ANSWER - The OR operation checks to see whether there is a
one in either or both numbers in a given place. If so the resulting number is an one.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1108
Member since
1 year
Number of followers
103
Documents
68972
Last sold
1 day ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

177 reviews

5
75
4
31
3
47
2
9
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions