History of Cryptography Flashcards

1
Q

Cryptography

A

Science of altering communication so that it cannot be understood without a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mono-Alphabet Substitution Cipher

A

Algorithms that simply substitute one character of ciphertext for one character of plain text, these are the most primitive algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Caesar Cipher

A

Every letter is simply shifted a fixed number of places to the left or to the right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Atbash Cipher

A

Hebrew cipher which substitutes the first letter of the alphabet for the last, and the second letter for the second-to-last, in other words, it simply reverses the alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Affine Cipher

A

Any single substitution alphabet ciphers where each letter in the alphabet is mapped to some numeric value, permuted with some relatively simple mathematical function, and then converted back to a letter.

The formula for any basic cipher of this type is ax+b(modM), M being the size of the alphabet, so for example Caeser cipher would be 1x+3(mod26)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ROT13 Cipher

A

A single alphabet substitution cipher where all characters are rotated 13 characters through the alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Scytale Cipher

A

Physical cylinder that was used to encrypt messages. Turning the cylinder produced different ciphertexts. Required a cylinder of the same diameter as the cylinder used to create the message to read the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Single substitution weaknesses

A

Literacy rates have risen since ancient times, all languages have certain word and letter frequencies, underlying word and letter frequencies lead to vulnerability to cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Examples of Multi-Alphabet Substitution

A

Cipher Disk, Vigenere Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cipher Disk

A

Invented by Leon Alberti in 1466, physical device, each turn of the disk produces a new cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vigenere Cipher

A

Once considered very secure, invented by Giovan Battista Bellaso in 1553. Used until early 1900’s. Encrypts text by using a series of different Caesar cipher based on a keyword.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Friedrich Kasiski

A

First-person to carry out a successful attack on a Vigenere cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Playfair Cipher

A

Invented by Charles Wheatstone in 1854. Encrypts two letters instead of one, this makes it more complex. Uses a 5x5 table containing a keyword. No more secure than any other older ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ADFVGX Cipher

A

A transposition cipher invented in 1918 by Fritz Nebel, used a 36 letter alphabet and a modified Polybius square with a single columnar transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Homophonic Substitution

A

Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple ciphertext symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Null Ciphers

A

Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple ciphertext symbols

17
Q

Null Ciphers

A

The message is hidden in the unrelated text. Sender and receiver have pre-arranged to use a pattern to remove certain letters from the message which leaves only the true message behind

18
Q

Book Ciphers

A

Sender and receiver agree on a particular book, coordinates are then used to locate words of an intended message in the book

19
Q

Rail Fence Cipher

A

The most widely known transposition cipher encrypts the message by altering each letter on a different row, message must then be written down the left to right and put into rows

20
Q

Enigma Machine

A

The electromechanical rotor-based cipher used in World War II

21
Q

CrypTool

A

A free tool that allows you to enter text and then choose a historical algorithm to encrypt the text