100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

C839v5 / D334 Cryptography Exam | Verified Correct Answers | WGU Updated Pack

Puntuación
-
Vendido
-
Páginas
71
Grado
A+
Subido en
25-11-2025
Escrito en
2025/2026

A verified set of cryptography exam questions and solutions tailored specifically for C839v5/D334. Includes encryption basics, security protocols, and computational concepts. Clean structure makes it easy to absorb complex ideas quickly. Great for students who want accuracy and efficiency before assessment day.

Mostrar más Leer menos
Institución
C839v5 WGU Intro To Cryptography
Grado
C839v5 WGU Intro to Cryptography











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
C839v5 WGU Intro to Cryptography
Grado
C839v5 WGU Intro to Cryptography

Información del documento

Subido en
25 de noviembre de 2025
Número de páginas
71
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

C839V5 (D334) WGU COURSE INTRO TO CRYPTOGRAPHY EXAM
QUESTIONS WITH CORRECT ANSWERS

Atbash Cipher - ANSWER-Invented by the Hebrew. Single substitution monoalphabetic cipher that
substitutes each letter with it's reverse (a and z, b and y, etc).



Caesar Cipher - ANSWER-Monoalphabetic cipher where letters are shifted one or more letters in either
direction.



ROT 13 - ANSWER-Monoalphabetic cipher that shifts characters 13 characters. Stands for Rotate 13. A
would become N, B would become O, etc.



Scytale Cipher - ANSWER-Was a staff with papyrus or letter wrapped around it so edges would line up.
There would be a stream of characters which would show you your message. When unwound it would
be a random string of characters. Would need an identical size staff on other end for other individuals to
decode message.



Multi-Alphabet Substitution Cipher - ANSWER-Doing something like +1, -2, +3 and shifting each
character a different amount to the left or right. For example, doing +1, -2, +3 with dog would results in
emj.



Cipher Disks - ANSWER-A disk you rotated to encrypt/decrypt. Created by Leon Alberti. Similar
technologies were used in the Enigma machine. Considered the forefather of modern encryption.



Vigenere Cipher - ANSWER-Invented by Giovan Battista Bellaso in middle 1553. Vigenere created a
stronger version of the cipher. Combining/Weaving Caesar cipher. Not cracked until late 1800s. It is a
cipher square with A to Z across all the columns and rows. You then use a keyword to encrypt the
message. For example, if the message is cat, and the keyword is horse, you would look up where c and h
intersect on the table (which is j), then where a and o intersect (o) and t and r (k). Cat would then be
encrypted as jok.



Playfair Cipher - ANSWER-Invented by Charles Wheatstone in mid 1800s. Lord Playfair pushed use of it.
Uses a 5x5 table and a key word. Rest of the alphabet is placed on table in alphabetic order, skipping

,letters used in the keyword. You break up the message into two character chunks and return a single
character value. If the letters appear on the same row of your table, replace them with the letters to the
right. If it is on the same column, replace them with the letters below.



ADFGVX Cipher - ANSWER-Invented by Colonel Fritz Nebel in 1918. It is a 6x6 grid with ADFGVX at the
top of each column and beginning of each row. The 26 letters and numbers 0-10 are placed randomly on
the table. You then replace each character of your message with two characters which are represented
by the column followed by the row each character is present in.



Enigma Machine - ANSWER-Invented between World Wars, used by Germans and Japanese. Data could
be transmitted both via radio or printed on paper. Designed so that when a key was pressed, the cipher
text for that plain text was different each time. Was a multi-alphabet cipher with 26 possible alphabets.



Kerckhoff's Principle - ANSWER-We can expose everything but the private key and the data can still be
secure.



Issue with Symmetric Encryption - ANSWER-There's only one key, and it's difficult to only have both
parties who need the key to have it. It typically needs to be sent via another medium than the message
or else it could be compromised by the attacker. Keys can also be sent via out of band (off the network
being used to send the message).



Binary Math - ANSWER-Base 2 system instead of base 10 system.



Binary AND - ANSWER-If both numbers have a one in the same place, then the resultant number is a
one. If not then it is a zero



1st number - 1100

2nd number - 0100

--------------------------

Result - 0100



Binary OR - ANSWER-Checks to see if there is a one in either or both numbers in the same place. If so,
the resultant number is one, if not, it is zero.

,1st number - 1100

2nd number - 0100

--------------------------

Result - 1100



Binary XOR (Exclusive OR) ⊕ - ANSWER-Checks to see if there is a one in either number in the same
place. If so, the resultant number is one, if not, it is zero.



1st number - 1100

2nd number - 0100

--------------------------

Result - 1000



XOR is reversible. If you XOR the result with the 2nd number, you will get the 1st number as a result. If
you XOR the result with the 1st number, you will get the 2nd number as a result.



Substitution - ANSWER-XORing the plain text with the key.



Transposition - ANSWER-Swapping blocks of text.



Confusion - ANSWER-Making the relationship between a key and the ciphertext as complex as possible.



Diffusion - ANSWER-Each binary digit (bit) of the ciphertext should depend on several parts of the key,
obscuring the connections between the two.



Avalanche - ANSWER-The concept that if one bit of data changes, the cipher text will all completely
change as well.

, Key Schedule - ANSWER-An algorithm for the key that calculates the subkeys for each round that the
encryption goes through.



Hybrid Encryption - ANSWER-Data is encrypted with a symmetric encryption algorithm, the symmetric
private key is sent to the other party with asymmetric encryption.



Symmetric Algorithms - ANSWER-Examples are DES, 3DES, DESX, AES, Blowfish, Serpent, Twofish,
Skipjack, IDEA



Whitening - ANSWER-A technique used to increase the security of block ciphers. It consists of steps that
combine the data with portions of the key (most commonly using a simple XOR) before the first round
and after the last round of encryption.



Block Cipher - ANSWER-Data fills up a block (typically 64 or 128 bits) and that block is encrypted as a
whole. Slower than stream ciphers. If a block was not full, you would need to pad the data to end up at
the block size.



Feistel Network - ANSWER-Chunk data into evenly sized blocks. The two chunks are typically called L0
and R0 (left 0 and right 0). As long as these are even, it is considered a traditional/normal Feistel Cipher.
An unbalanced Feistel Cipher is when the basket does not split evenly. Next is the round function, which
is applied to both halves and is used to go through the multiple rounds/iterations based on the
symmetric encryption algorithm. Output of each round function is XORed with the other half (L0 is
XORed with R0). R0 is then moved over to L0. R0 is moved over to the left and XORed.



DES - ANSWER-Symmetric algorithm. One of the most widely deployed algorithms in the world, even
though it is no longer recommended or considered secure. 64 bit key (56 bits + 8 bits party), 64 bit block
sizes.



3DES - ANSWER-Symmetric algorithm. Does DES 3 times, doing one of the following: 1st key encrypts,
2nd key decrypts, 3rd key encrypts, or one key encrypts/decrypts/encrypts, or 1st key encrypts, 2nd key
decrypts, and 1st key encrypts again.



DESX - ANSWER-Symmetric algorithm. 64 bit key is appended to data, XOR it, and then apply the DES
algorithm.
$11.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
SimVault Florida International University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
42
Miembro desde
8 meses
Número de seguidores
4
Documentos
351
Última venta
4 semanas hace
Study Boss Files

Welcome to Study Boss Files! I’m a Master’s graduate from Florida International University, and I created this store to share the best study materials to help you ace your exams. Whether you’re looking for test banks, study guides, or exam prep, I’ve got you covered. These resources are designed to help you study smarter, not harder, so you can boost your grades and feel more confident going into your exams. Take a look around and find what you need to succeed!

Lee mas Leer menos
4.6

16 reseñas

5
14
4
0
3
1
2
0
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes