CFE Block 2 Classical Encryption

Flashcard Icon

Flashcard

Learn Mode Icon

Learn Mode

Match Icon

Match

Coming Soon!
Library Icon

Library

View Library
Match Icon

Create

Create More Decks
Flashcard Icon Flashcards
Flashcard Icon Flashcards
Library Icon Library
Match Icon Match (Coming Soon)

Computer Science - Computer Security and Reliability

View Results
Full Screen Icon

user_lira_cofre Created by 9 mon ago

Cards in this deck(20)
Trying every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained is known as ____________________.
Blur Image
What is the type of encryption where the same key is used for both encryption and decryption? It is known as ____________________.
Blur Image
A message, before encryption, is called ________________.
Blur Image
A scrambled message, after applying encryption, is called _____________.
Blur Image
In the symmetric model, what is assumed to be the only thing needed to be kept secret? It is the ________________.
Blur Image
__________________ is the original intelligible message while _______________ is the scrambled message.
Blur Image
Which of the following is NOT a substitution cipher? It is the ________________.
Blur Image
Why are monoalphabetic ciphers considered easy to break? They are easy to break because ____________________.
Blur Image
How many possibilities are there (in the English language) for any ciphertext using the Caesar cipher? There are __________ possibilities.
Blur Image
In the Playfair cipher, using the keyword MONARCHY, what would the ciphertext for 'Meeting at six' be? It would be ________________.
Blur Image
In the Playfair cipher, using the keyword MONARCHY, what would the ciphertext for 'meet' be? It would be ________________.
Blur Image
In the Playfair cipher, using the keyword MONARCHY, what would the ciphertext for 'stop' be? It would be ________________.
Blur Image
Using the standard Vigenere cipher and Table 2.3, what is the encrypted value of 'meeting at six' using the keyword 'donald'? It is ________________.
Blur Image
Which of these is a polyalphabetic cipher? It is the ________________.
Blur Image
Using the standard Vigenere cipher and Table 2.3, what is the encrypted value of 'crap' using the keyword 'poop'? It is ________________.
Blur Image
Identify a problem with the one-time pad. One issue is that ____________________.
Blur Image
Using the rail fence technique with depth 3, what is the encrypted value of 'The first test will kill you'? It is ________________.
Blur Image
Using the rail fence technique with depth 2, but doing it TWICE, what is the encrypted value of 'The first test will kill you'? It is ________________.
Blur Image
How many input pins are on each cylinder of a rotor machine? There are __________ input pins.
Blur Image
Which is an example of a rotor machine that has been used in the past? It is the ________________.
Blur Image

Ask Our AI Tutor

Get Instant Help with Your Questions

Need help understanding a concept or solving a problem? Type your question below, and our AI tutor will provide a personalized answer in real-time!

How it works

  • Ask any academic question, and our AI tutor will respond instantly with explanations, solutions, or examples.
Flashcard Icon
  • Browse questions and discover topic-based flashcards
  • Practice with engaging flashcards designed for each subject
  • Strengthen memory with concise, effective learning tools