100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C839 INTRO TO CRYPTOGRAPHY OA PREPARATION COMPLETE ACTUAL QUESTIONS AND CORRECT DETAILED ANSWERS (CORRECT VERIFIED ANSWERS) LATEST UPDATED VERSION

Rating
5.0
(2)
Sold
-
Pages
40
Grade
A+
Uploaded on
26-04-2025
Written in
2024/2025

WGU C839 INTRO TO CRYPTOGRAPHY OA PREPARATION COMPLETE ACTUAL QUESTIONS AND CORRECT DETAILED ANSWERS (CORRECT VERIFIED ANSWERS) LATEST UPDATED VERSION

Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Course

Document information

Uploaded on
April 26, 2025
Number of pages
40
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C839 Introduction to Cryptography - (EC-Council CES)
k k k k k k k




1. CrypTool: Software which allows encryption of text using historic algorithms
k k k k k k k k k




2. The Enigma Machine: In World War II the Germans made use of an electro-me-
k k k k k k k k k k k k k




chanical rotor based cipher Known as The Enigma Machine.
k k k k k k k k k




Allied cipher machines used in WWII included the British TypeX and the AmericanSI
k k k k k k k k k k k k k




GABA.


3. The ADFGVX Cipher: invented by Colonel Fritz Nebel in 1918.
k k k k k k k k k




The key for this algorithm is a six-by-six square of letters, used to encode a 36-
k k k k k k k k k k k k k k k




letteralphabet.
k




4. The Playfair Cipher: invented in 1854 by Charles Wheatstone.
k k k k k k k k




The Playfair cipher uses a five-by-five table containing a keyword or key phrase.
k k k k k k k k k k k k




5. Breaking the Vigene k k




re Ciph:eIrn 1863, Friedrich Kasiski was the first personto publish a successful gen
k k k k k k k k k k k k k




eral attack on the Vigene
k k k k re Cipher
k




1k/k20

,6. The Vigene k re Ciph:eT
k r his is perhaps the most widely known multi- k k k k k k k k




alphabet substitution cipher. invented in 1553 by Giovan Battista Bellaso. Uses a se
k k k k k k k k k k k k




ries ofdifferent Caesar ciphers based on the letters of a keyword.
k k k k k k k k k k k




7. The Cipher Disk: The cipher disk was invented by Leon Alberti in 1466. eachtim
k k k k k k k k k k k k k k




e you turned the disk, you used a new cipher. It was literally a disk you turnedto encr
k k k k k k k k k k k k k k k k k k




ypt plaintext.
k




8. Multi-
Alphabet Substitution: Use of multiple substitution alphabets.Example:
k k k k k k k




Cipher Disk, Vigenere Cipher, Enigma Machine
k k k k k




9. Scytale: This was a cylinder tool used by the Greeks, and is often specificallyattr
k k k k k k k k k k k k k k




ibuted to the Spartans. Physical cylinder that was used to encrypt messages.
k k k k k k k k k k k




10. ROT13 Cipher: It is essentially the Caesar cipher always using a rotation orshi
k k k k k k k k k k k k k




ft of 13 characters.
k k k




11. The ATBASH Cipher: Hebrew scribes copying religious texts used this cipher.su
k k k k k k k k k k k




bstitutes the first letter of the alphabet for the
k k k k k k k k




last, and the second letter for the second-to-the-last, etc.
k k k k k k k k




12. The Caesar Cipher: You can choose to shift any number of letters, either leftor r
k k k k k k k k k k k k k k k




ight. If you choose to shift two to
k k k k k k k




the right, that would be a +2; if you choose to shift four to the left, that would be a
k k k k k k k k k k k k k k k k k k k




-4.

13. Mono-Alphabet Substitution: These algorithms k k k


2k/k20

,simply substitute one character of cipher text for each character of plain text.
k k k k k k k k k k k k




3k/k20

, Examples: Atbash Cipher, Caesar Cipher, Rot13 k k k k k




14. Symmetric Cryptography: It is simply any algorithm where the key used tode k k k k k k k k k k k k




crypt a message is the same key used to encrypt.
k k k k k k k k k




15. Diffusion: Changes to one character in the plain text affect multiple charactersin t
k k k k k k k k k k k k k




he cipher text.
k k




16. Confusion: Confusion attempts to make the relationship between the statisti- k k k k k k k k k




cal frequencies of the cipher text and the actual key as complex as possible. Thisocc
k k k k k k k k k k k k k k k k




urs by using a complex substitution algorithm.
k k k k k k




17. Avalanche: a small change yields large effects in the output, This is Fiestel'svar
k k k k k k k k k k k k k




iation on Claude Shannon's concept of diffusion.
k k k k k k




18. Kerckhoffs's Principle: This principle states that a cryptosystem should bese k k k k k k k k k k




cure even if everything about the system, except the key, is publicly known.
k k k k k k k k k k k k




19. Substitution: Substitution is changing some part of the plaintext for somem k k k k k k k k k k k




atching part of the Cipher Text. k k k k k




20. Transposition: Transposition is the swapping of blocks of ciphertext. k k k k k k k k




21. binary numbers: there are three operations not found in normal math:A
k k k k k k k k k k k




ND, OR, and XOR operations.
k k k k




22. Binary AND: If both numbers have a one in both places, then the resultantnu
k k k k k k k k k k k k k k




mber is a one. k k k




1101
1001

4k/k20
$21.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Reviews from verified buyers

Showing all 2 reviews
4 months ago

7 months ago

5.0

2 reviews

5
2
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
JOHNNKABIRU Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
14
Member since
9 months
Number of followers
7
Documents
798
Last sold
1 month ago

4.7

712 reviews

5
567
4
97
3
39
2
6
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions