Classical Ciphers Flashcards

1
Q

Assume all algorithms are ____

A

public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security is determined ____ by key size

A

only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Making your own security is _______

A

insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Simplest and earliest known use of substitution cipher

A

Caesar Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Replace each letter in alphabet with another letter $n mod |A|$ places down

A

Caesar Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerable to word / letter frequency analysis

A

Substitution Ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Different monoalphabetic substitutions as one proceeds through plaintext message

A

Polyalphabetic cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key determines which particular rule is chosen for given transformation

A

Polyalphabetic cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key is required that is as long as the word

A

Vigenere Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Usually a repeating keyword

A

Vigenere Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Key: dogdogdog
Plaintext: abcdefghi

A

Ciphetext: dpigsljvo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key and plaintext share same frequency distribution of letters

A

Vigenere Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Plaintext written down as sequence of diagonals, read off as sequence of rows

A

Rail fence cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Plaintext (depth = 3):
whatsgoingonpal

A

Ciphertext: whtogpasioagnnl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Write messages in rectangle, row by row, and read message off column by column, permuting order of columns

A

Row transposition cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Order of the columns becomes key to algorithm

A

Row transposition cipher

17
Q

Processes one bit or byte at a time

A

Stream cipher

18
Q

Substitution and permutation techniques, one block at a time

A

Block cipher

19
Q

Make the relationship between plaintext, key input and ciphertext output as complex as possible

A

Confusion

20
Q

Spread the influence of each input bit across many output bits

A

Diffusion

21
Q

Achieved mainly via substitutions

A

Confusion

22
Q

Achieved via permutations

A

Diffusion

23
Q

Each character of ciphertext depends on several parts of key

A

Confusion

24
Q

Changing plaintext character should result in several changed ciphertext characters

A

Diffusion

25
Q
A