Cryptography Flashcards

1
Q

The bombs was developed by?

A

Alan Turing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rectangular tablet of letters:polyalpabetic cipher is called?

A

Tabula Recta

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Enigma was used to send encoded messages during which war?

A

WW2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Weakness that allowed enigma machine to be cracked?

A

No letter would encrypt to itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wrapping a piece of paper on a rod cryptography ?

A

Scytale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Crypto quiz puzzle example of

A

Substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Not part of enigma machines key?

A

Orientation of the lights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

First step to crack enigma was done by?

A

Marian Rejewski

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Enigma machine conditions of several?

A

Rotors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Steps to operate the enigma ?

A

Set wheels to todays key from code book
Operator chooses message key
Encode message key twice to avoid error
Set wheels to message key
Encrypt and send message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Whole reason it’s considered good encryption from some video?

A

Factoring a large number into two primes is hard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Father of info theory

A

Claude Shannon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ron Robert l, Ari Shamir; and leoanard Allan’s encryption algorithm consists of?

A

2 large prime numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If a file is encrypted with a Alice’s public key?

A

Anyone with a Alice’s private key can decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of modern encryption uses the same key to encrypt and decrypt data?

A

SKE symmetric key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unique key by sending and receiving messages based on two user keys?

A

Diffe-Hellman