(CGS2811) Question and answers
100% correct 2025
__________is a term that refers to hiding messages in sound files. - correct
answer Steganophony
__________is the process of analyzing a file or files for hidden content. -
correct answer Steganalysis
__________is about obfuscating the message so that it cannot be read. -
correct answer Cryptography
The __________ cipher is a Hebrew code that substitutes the first letter of the
alphabet for the last letter and the second letter for the second-to-last letter,
and so forth. - correct answer Atbash
The __________ cipher is the simplest single-alphabet substitution cipher. It
is really just a permutation of the Caesar cipher. All characters are rotated 13
characters through the alphabet. - correct answer ROT13
The __________ cipher is a method of encrypting alphabetic text by using a
series of different monoalphabet ciphers selected based on the letters of a
keyword. - correct answer Vigenère
In World War II, the Germans made use of an electromechanical rotor-based
cipher system known as __________. - correct answer enigma
, The total number of possible keys for DES is _________, which a modern
computer system can break in a reasonable amount of time. - correct answer
256
__________ is cryptography wherein two keys are used: one to encrypt the
message and another to decrypt it. - correct answer asymmetric cryptography
__________ is perhaps the most widely used public key cryptography
algorithm in existence today. - correct answer RSA
What is meant by carrier? - correct answer Carrier is the signal, stream, or
data file in which the payload is hidden.
The type of medium used to hide data in steganography is referred to as the
__________. This may be photos, video, sound files, or Voice over IP. -
correct answer channel
What term is used to describe a method of using techniques other than brute
force to derive a cryptopgraphic key? - correct answer cryptanalysis
__________ describes the total number of coprime numbers; two numbers
are considered coprime if they have no common factors. - correct answer
Euler's Totient
Which of the following is the definition of Feistel function? - correct answer a
cryptographic function that splits blocks of data into two parts; one of the most
influential developments in symmetric block ciphers
What name is given to a method of attacking polyalphabetic substitution
ciphers? This method can be used to deduce the length of the keyword used
in a polyalphabetic substitution cipher. - correct answer Kasiski examination