WGU C839 OBJECTIVE ASSESSMENT FINAL/WGU C839 INTRODUCTIO
TO CRYPTOGRAPHY NEWEST 2024-2025 COMPLETE 156 QUESTIONS
AND CORRECT ANSWERS
Study online at https://quizlet.com/_fpyz7e
1. CrypTool Software which allows encryption of text using historic
algorithms
2. The Enigma Ma- In World War II the Germans made use of an electro-me-
chine chanical rotor based cipher Known as The Enigma Ma-
chine.
Allied cipher machines used in WWII included the British
TypeX and the American SIGABA.
3. The ADFGVX Ci- invented by Colonel Fritz Nebel in 1918.
pher The key for this algorithm is a six-by-six square of letters,
used to encode a 36-letter alphabet.
4. The Playfair Ci- invented in 1854 by Charles Wheatstone.
pher
The Playfair cipher uses a five-by-five table containing a
keyword or key phrase.
5. Breaking the Vi- In 1863, Friedrich Kasiski was the first person to publish
genere Cipher a successful general attack on the Vigenere Cipher
6. The Vigenere Ci- This is perhaps the most widely known multi-alphabet
pher substitution cipher. invented in 1553 by Giovan Battista
Bellaso. Uses a series of different Caesar ciphers based
on the letters of a keyword.
7. The Cipher Disk The cipher disk was invented by Leon Alberti in 1466.
each time you turned the disk, you used a new cipher. It
was literally a disk you turned to encrypt plaintext.
8. Multi-Alphabet Use of multiple substitution alphabets.
Substitution Example:Cipher Disk, Vigenere Cipher, Enigma Machine
9. Scytale This was a cylinder tool used by the Greeks, and is often
specifically attributed to the Spartans. Physical cylinder
that was used to encrypt messages.
, WGU C839 OBJECTIVE ASSESSMENT FINAL/WGU C839 INTRODUCTIO
TO CRYPTOGRAPHY NEWEST 2024-2025 COMPLETE 156 QUESTIONS
AND CORRECT ANSWERS
Study online at https://quizlet.com/_fpyz7e
10. ROT13 Cipher It is essentially the Caesar cipher always using a rotation
or shift of 13 characters.
11. The ATBASH Ci- Hebrew scribes copying religious texts used this cipher.
pher substitutes the first letter of the alphabet for the
last, and the second letter for the second-to-the-last, etc.
12. The Caesar Ci- You can choose to shift any number of letters, either left
pher or right. If you choose to shift two to
the right, that would be a +2; if you choose to shift four to
the left, that would be a -4.
13. Mono-Alphabet These algorithms
Substitution simply substitute one character of cipher text for each
character of plain text.
Examples: Atbash Cipher, Caesar Cipher, Rot13
14. Symmetric Cryp- It is simply any algorithm where the key used to decrypt
tography a message is the same key used to encrypt.
15. Diffusion Changes to one character in the plain text affect multiple
characters in the cipher text.
16. Confusion Confusion attempts to make the relationship between the
statistical frequencies of the cipher text and the actual key
as complex as possible. This occurs by using a complex
substitution algorithm.
17. Avalanche a small change yields large effects in the output, This
is Fiestel's variation on Claude Shannon's concept of
diffusion.
18. Kerckhoffs's This principle states that a cryptosystem should be se-
Principle cure even if everything about the system, except the key,
is publicly known.
19. Substitution Substitution is changing some part of the plaintext for
some matching part of the Cipher Text.
, WGU C839 OBJECTIVE ASSESSMENT FINAL/WGU C839 INTRODUCTIO
TO CRYPTOGRAPHY NEWEST 2024-2025 COMPLETE 156 QUESTIONS
AND CORRECT ANSWERS
Study online at https://quizlet.com/_fpyz7e
20. Transposition Transposition is the swapping of blocks of ciphertext.
21. binary numbers there are three operations not found in normal math:
AND, OR, and XOR operations.
22. Binary AND If both numbers have a one in both places, then the
resultant number is a one.
1101
1001
------
1001
23. Binary OR The OR operation checks to see whether there is a one in
either or both numbers in a given place. If so the resulting
number is an one.
1101
1001
-----
1101
24. Binary XOR It checks to see whether there is a one in a number in a
given place, but not in both numbers at that place. If it is in
one number but not the other, then the resultant number
is one. If not, the resultant number is zero, as you see
here:
1101
1001
-----
0100
25. Block Ciphers A block cipher divides the data into blocks (often 64-bit
blocks, but newer algorithms sometimes use 128-bit
blocks) and encrypts the data one block at a time.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Macmillan. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $21.49. You're not tied to anything after your purchase.