Module 3: Cryptography Flashcards

1
Q

The word “cryptography” is derived from the Greek kryptos, meaning ____.

A

The word “cryptography” is derived from the Greek kryptos, meaning hidden.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The origin of cryptography is usually dated from about ____ with the Egyptian practice of ____.

A

The origin of cryptography is usually dated from about 2000 B.C., with the Egyptian practice of hieroglyphics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The first known use of a modern cipher was by ____ (____ B.C. to ____ B.C.), who did not trust his messengers when communicating with his governors and officers.

A

The first known use of a modern cipher was by Julius Caesar (100 B.C. to 44 B.C.), who did not trust his messengers when communicating with his governors
and officers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In recent times, ____ has turned into a battleground of some of the world’s best mathematicians and computer scientists.

A

In recent times, cryptography has turned into a battleground of some of the world’s best mathematicians and computer scientists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ability to securely store and transfer sensitive information has proved a critical factor in success in war and business.

A

cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is used in many applications like banking transactions cards, computer passwords, and e-commerce transactions.

A

cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

There are three (3) types of cryptographic techniques used in general:

A
  • Symmetric-key cryptography
  • Hash functions
  • Public-key cryptography
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 6 classical encryption techniques?

A
  1. caesar cipher
  2. atbash cipher
  3. affine cipher
  4. keyword cipher
  5. playfair cipher
  6. vigenere cipher
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of substitution cipher in which each letter in the plaintext is replaced by a letter of some fixed number of positions down the alphabet.

A

caesar cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Solve the caesar ciphertext with a shift of 7:

Kvu’a qbknl h ivvr if paz jvcly

A

Don’t judge a book by its cover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Solve the caesar ciphertext with a shift of 3:

khoor

A

hello

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This was originally used to encrypt the Hebrew alphabet.

A

atbash cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

It is one of the earliest known substitution ciphers to have been used, and is very simple.

A

atbash cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It simply reverses the plaintext alphabet to create the ciphertext alphabet. That is, “A” will be encrypted as “Z”, “B” as “Y”, and so on.

A

atbash cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Solve the atbash ciphertext:

FMREVIHRGB

A

UNIVERSITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Convert the plaincipher to atbash ciphertext:

POLYTECHNIC

A

KLOBGVXSMRX

17
Q

It is a type of monoalphabetic substitution cipher, where each letter in the alphabet is mapped to its numeric equivalent, encrypted using a simple mathematical function, and converted back to a letter.

A

affine cipher

18
Q

Each letter is enciphered with the function (ax + b) mod 26.

A

affine cipher

19
Q

Each letter is deciphered using what formula in affine cipher?

A

inverse of a * (c-b) mod 26

20
Q

To use this cipher method, construct the ciphertext alphabet, pick a keyword and write it down, ignoring repeated letters. Follow it with the letters of the alphabet that have not yet been used.

A

keyword cipher

21
Q

It was the first practical digraph substitution cipher.

A

playfair cipher

22
Q

The playfair cipher was invented in ____ by ____ but was name after ____ who promoted the use of the cipher.

A

The playfair cipher was invented in 1854 by Charles Wheatstone but was name after Lord Playfair who promoted the use of the cipher.

23
Q

This cipher removes the letter “J”, creates a 5x5 table of the new cipher table starting with the keyword and followed by the remaining non-duplicated letters of the alphabet.

A

playfair cipher

24
Q

It is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword.

A

vigenere cipher

25
Q

This cipher uses a 26×26 table with A to Z as the row heading and column heading.

A

vigenere cipher

26
Q

This is the repeating keyword to satisfy the number of letters from the encrypted text in a vigenere cipher.

A

keystream