Cryptology - Test 1
For each of the following, list whether they are a code or a cipher, or if the item is neither a code or cipher answer neither.
* ROT13 - cipher * ASCII - cipher * Translating words from English to Hindi - code * Dancing Men - cipher * Rail Fence - cipher * Frequency Analysis - neither
Which of the following are the main classes of ciphers?
* Substitution * Transposition
Which of the following made it difficult to crack encrypted messages sent by the Germans during World War II?
* The number of possible initial rotor and plugboard configuration settings. * The fact that the rotor settings changed each time a character was entered. * The fact that the initial rotor settings changed each day.
Assume you are encrypting several plain text messages using the Vigenère cipher. Which of the following will result in flaws in the cipher text that can be used to break the messages?
* Using a keyword/keyphrase that has fewer characters than the plain text. * Using the same keyword/keyphrase to encrypt more than one plain text message.
Which of the following is true regarding transposition ciphers?
* When the plain text characters are encrypted they are not replaced with different characters. The only thing that changes is the characters position. * Frequency analysis will only show that the plain text characters were not changed during encryption.
Which of the following is NOT one of the most common trigraphs, or three letter combinations, used in written English?
* was
In traditional cryptographic example, who are the two people that are typically trying to exchange a secret message?
*Alice *Bob
Which of the following can be provided by cryptology?
*Confidentiality *Integrity *Authentication *Non-repudiation
Which of the following are true regarding prime numbers?
*There are an infinite number of prime numbers. *Prime numbers only have two factors, 1 and the prime number itself. *Calculating the prime factors of large numbers is time consuming. Even modern (non-quantum) computers take significant amount of time to perform the calculations.
Which of the following is the binary or base 2 equivalent of the decimal number 7? Note that the smallest value in the binary number is on the right.
0111
Assume that you are in charge of a spy operation and you are running 4 field agents. You want each of these agents to communicate with each other, as well as with you. You want to use One Time Pads (OTP) to ensure that all communication remains secret. You also want each line of communication to use a unique One Time Pad in case the agent is compromised. That is, Agent 1 will use one OTP to communicate with you, a different OTP to communicate with Agent 2, a different OTP to communicate with Agent 3, etc. How many OTPs are required to implement this system? Count each OTP pair as one OTP. For example, the OTP shared by Agent 1 and Agent 2 will count as one OTP, not two. If you want Canvas to grade your answer enter your answer as a number. For example if the answer is 1 enter 1. Do not enter one or "one".
10
What are the prime factors for the number 299? Give the two prime factors that are not 1 or 299. If you want Canvas to grade your answer enter your answer a single space between the numbers. Do not use a comma or any other delimiter. For example if the answer is 345 and 23 enter 345 23. Hint - this is probably hard to do by hand, so find a web site that will do the calculation for you.
13 23
How many possible variations of rotation ciphers are there with the standard English alphabet? You can base your calculations on a lower case only alphabet, and also assume that any numerals and special characters such as #$%^&* are NOT included. You can also assume that mapping a character back to itself using a rotation of 0 counts as a variation. If you want Canvas to grade your answer enter your answer as a number. For example, if the answer is 1 enter 1. Do not enter one or "one"j.
26
The following text has been encrypted using a rail fence cipher. What is the key? That is, what is the number of rows in the grid? (Hint - remember there are several sites on the Internet that will do this decryption for you.) If you want Canvas to grade your answer enter your answer using numerals, do not spell it out. For example if the answer is 2 enter 2 without a decimal. Do not enter 2.0, two or "two". WSTESUI EYHUPRIIEDUEGCSTHFO CA ASTE AOIHYACLONNDTTMMNTFYR AI OB AH EA EHCNSTE ELU LSOENATEYRE NEBNPSTER UKTTENOTIRIEOUTI CDROIATOHI PORN TTRNC OH E TETRYTRE S NNTE IM XNEIHE POPI UINOCUTNNLTSCN PORNSLRGLCANCNG GIEEAIINASECN UAIY OIPATAUO RPURYIHT STCRL YYCRLTOYTDCRLDNR TEOKI E PORNSTRTLYMNOTODY GVMNOT NNERNRPURISNBETRC EE AE HS PIEAPB E H RFRA DNIHNMPOSNESLW S OODESPF HE TAINFNILSIINA CYCRC CNYUONRTMNO UEROUNY NTRBSMD FCA H SCYGACLNTSTOD ICARNTOCYCRCEEEEBKH EOOT NDNRZT RPRYAIMBLTES OT ER ACTCECST T OOTLD NET URTH ETIEAUO LCAMKCYCRCEHOIA METH AO ENTCRLDIRECCTCEC AES ITYTETORIVAEUO VTN LCY EEASSCB EW IA CSGF LIGES V HTEESAGB DTA AC NTTSTRUYE R OFFCCCAEAEOHWURRAC NFIAIRUIV CTLO TATA MIHTRFE ON INNEANAIENZTFBHARUIECI EWFR O FEONC DLWWTI FADISSN E MLE ANRATEERYILNIU
4
What is ASCII value for the letter A? Note that this is upper case A, not lower case. Give the hex value, not the decimal value. If you want Canvas to grade you answer enter your answer in lower case with no spaces between the hex digits. For example if the answer is 9F enter 9f. Do not enter 9 f.
41
The following text has been encrypted using a Vigenère cipher. What is the most likely key length? Hint - there are several sites on the Internet that will do this calculation for you. If you want Canvas to grade your answer enter your answer as a number. For example if the answer is 1 enter 1. Do not enter one or "one". UEOXBHZKITRMGREKHDZWQKMEIBXCTVIBPMQOOTCZXCEVAMAUCLFRZBACIFNNBBRAKIJVKCVCAXMWRNVAMBBARVSJNVMTWEYMKYZZOIIGBLZVZGXYXJBZNHPKKHZJBJRFFMQZFZJCJVZPKJSKILQKUAMMLMRLTDWGYAKHJZBXOEGOPXQKTRZBTPEFFAWKCOXNVNYYOISOWHNKEAILBLYGEXBTLECEOBXPCYEIQGFOJJPLZKKETOPXQGWEOGHPOETZZXQZFFOPXEUMEMVFCTKRZYNGXVSDBLSLWIXMBRZFSVGYMAEDDVZDGKHZZLDXFMOPXJODIOMWEUMEMVFCTKSXPHMRNEMMGMZKOJPTNVPAWWNRZYINIVAUIDDVZRUYINBHPORNYWKMZYYBIGDOVLYNHURVRDVACXSOJSNLSRIGIUJKKHZZXQUCUOQHLRVDBMHPMVWVAAGTXTJVMMIFMKTTGTRBJCMKGZLOIFNKIIIOTLJKHJUTQPVFAMKQUEJVUXQSRDDAHLGEDEIFCYDOIZHCHVGVVMMCIIOMMMKRCCWMFKIIIKHBKKOKZXQKIVZBACVIIQIVWUWTCMBPIFMHCGGIRTDWGQOEFVKMRNVFJCGBOEGAIMFKISPAXBKECMGIROFNWMYMXVDPZBLMRNYIYRKITCMKCBFLPBBMTRRTETPPVFAMKQUEIIXTPZZCPTTPCRSVXKMRZFDKNQKIOAMGAXPPOMWAUDMPVBAGKIJVLYTUEQMGGTMEIBXBGTIKPXPTFWFVHUTRSOPXHKWFZZLMTUINSMMKECMGIRGEDYMVPEGTCQLAUDMPVBAGKIJVLBKJPDBXUNRTOPXEUMEMVFCTKHVAVJGZMZLKCIVNOTRCTTRTXMCJTOHUNLOTAOQHLYRRZVHRGEOQMEREKHZGPCXVAOBACNVAMBHDZYEDLXYYKHVBECJKOVUXPOTANNHSTUIIOMFKWOPVWCXJBZTBCBVDOPTRVIIQIVWUWCJUFSTZCVBBMTRNYKHLYVQPMGRRPBZQGEGSLZBHDXVEGGXVVIENAMFKZROPHSMYTNETQIIUXQTJZFAAZXCYFCDMMWPRMZAFYJZSJVXTKEPVZMGGCLTMGAXPPOMWFOJCJZKCYGOILXLIVTJBAMSRSEMYDKISJVPFKIECMYGXJTKZHNUJEYBACHZLGWYPOXHOAXLIIYKBBMTYANIEUGPSKTTWKUAFMRNGITDVTKKIIXIGFOJTJZRZAKTCQLKKJSVOXFGJBZMGJUJTJVFYTPOABHBGPSGMTBKISVAMFKPWJZDRUNEVSXLKECMGIROFNRPTROJEIKKWVKIJVTRZYEQMKWHRSDKECBVLZVVPEGTDWGGYRWVGMMYTRVUUJKRNYCGQIIAHJECOEFJZFYZZOICLGTXFJZFSRRSXIEJKUCDXACXJWCQVFUWTZVKCRPOICGGWLEFMRQLFRZFTKVCEVTBAKDIBPMQKEDVAVPGDBGMWKKJSVOXRUSOWBAYZTAIJXBKTRTXMCJFNGGUWAJIIOTIKPTCIMLUFNZMQAKGTWWUNUJSZALCYJONPXAGEBZANPKKHVBGMUEEZTLCIRNMMTBZYEDZVMTMEMATROFNOWWYEVNXZRNZZOIQLSYVDDVFYTPAMMTQHVYJVWRXRDDBBMTRLXWFKAEIXIMGUESDBLUNRTZVLSXVSOPTRULRJVEGTVBVVDYITOPVMQGIENMVSXVIOKTLVIEQMGRYFMZWGCLIOHAGMUGIIOHLEFUMQGRKINZBMPGWFDKTRGTOANXCYYOKIGBSFSOQFNUITVVMJEZTNEAYZNEMMEWUETJAXAAIEJCKNKISJVTJJVVDKXQRZKZAFYXKPCWGCYRNYKHKVLTZZLUNZCCKHLZRIIWNPKETDZXJOMENOHTKINHMGRUWFDKBYRJHVDXQZRROMWNAJHDVZDUIBVKDBUFRNEACXVAIMGAXPPOQHLYPSOMFGYZNOMGROFNVTEWCVAFMGCJJOOPTRMFVZZGKKETXIGYITENAPFGKEQMKBGKADBPYTKSWCMRNZSDLXYOJAIWGQZRROMKCTTRTXMGUEINUTRNRNYGHSIRNOUTLOGUGIMCSRTCXKMHCEHAMMHVSJTOYHCEWGHLRPOIMLNKTIAQVEXFUKWYNKFPGMYMXZNNBTLIVTCMNQMFVZZGKKETDNMFKVNXZRNZZOIBAYZRLDKXSYVSOWLCTUAHMLQGXEOWUMHZSXWFNXFMDAXBOKINBACXVTJMQNRFIONHPCYOZDXPLZNYABRGUDDBBMTRLGGWCYZGIQGEYVCPZXAUDPPBXPYPSOMFQOJACIKBVIOWTXKOEMJLXPTTOHXNROEGYMLNOKEOPXZKJTZNYMXKSJNIPUXRVUFCXJWZZXEACAMTRFKRRVJHSZMUGVXPGSIGQMGKJTCIMAUDPMWFGYVPMQOYZVIINHPSRTDWGDUIMDTEGUESJNICUGLZBHGTKEIBBMTRLGGBLZIOYCVCBLLIMKYHZLDBBCYRSKIKRUWARMTIKEEYMGAXPPOQHLYPSOMFGYRRZKBNKWOMLBQGJTZZGMZAUNBYMXFNZXXPYFNJZVMSGAIGUSZWOMMOCXPOIMNQOEGOPTRKECMGIROFNNGLRKDWZIKCGIGPIUJECIQQGEOEABWEBKEABMHDYLRQMBJRRNXMPFKIEOPXEUMEMVFCTKHVAFMXVMZIGQZFMJVBRUIIOAICUGLZBAYTVVZZUCLFRZQMQIIUXQTJLFRXQMGFVNNQGYJVMJKKYIPTJJXYHCEOWYPKVLTMQNXVSNBACSJEGDXQGEDZVVPEGTDWGGYFNZWYRNVFZEMMUCSOPTRGTTPIEJEIENQLRYKHZXXPBRSDDXQAIVZQEJGECZAMYZVANEAGYKLZJEMCVRZLPYXUSIWPBKEPPBBRKECMGIROFNRWKIYZTNDBRGCTCIMGZTOIBBLAVSOWPMXBAILMFGKMZIGQXVSDAMGTXGJDXPTDEIBVPKRTZLUYIBDJWKQIFDZQLQVVEXPTRZYEZTXAZIOIQVDXFNOQXPLFUILTROFNZNYUKSEGQXTKKHVBZMBVRIUXLZJEANHPZJTJKHLZIOGMGAXPPOQHLHPPMMOCTKIIOBRYGUWTBAGKIJVTLJZMKTXKKETVBBMTZSVDBMRRTDWGMLKHZNBPYKAHMGBSVNOWYRNVCJVLROKUOQHLZYEAQKQZRMZVWKKETKZHRKTTNIEJSRNIMKMLVXKZXQYZOIQGARLDDVZUXZTOMGKAJIXIGBGSSOZTAZRROABKOCAMTRAUUEDATKKRNNWYBOJSZUBLGKIIOBLLFRHIMGUEAILBBKRSDBWMKJNOUTRZVRDNBRYTOHUNLOTAOMWGTRFJZFRNRTDAGRIFMKZXFKESDJECZFLVGICUGLZUTLEGEJXECIRNOZXYJRCGILQOTAGUNQOTSCMXRHLTOPTRJFENVMKKRNOPTRZYEBWOCXEMZVMAGERZAMPOTTOPXNXFDPKMGUEOAUHXGITOPXDKUEMIEAULROATEXVEYEBRNLSOPTRIFDZQLQVVEXPPFKEEANEGZZGVBXBGTANMBLZYEIQGCZVEIVBLKKYNKTJRVDWMKLYKEDVOBKGAMBFCTKOARNQZZCZIUCXBEGMREXRDPIMCYKUYMGRTRMZLWYTZEGRUCXESOMBLCRNOMWRUGUWTBQNZNAWKKGKIJVTZULTVVXLIIYKBBMTRLBWKGZYMCMAYJUEQMEMVVDWCMFKNANXKMNZBDBXBLIOHLHGTXSJJXAGLSZBACMFVZZGKKETOZXYZVDNCVFOEFJZFYZZOIILKAEIOQHLYRKDVMMCVAKWGQUIBJUUQGEDMMJSOIEYILNKTIVTEGIVNNMYPUDTCMLRGKEYMIYXKMZVMRUJHVZXGZRLDKXLYVIOEHSRUNJBZPGETCQFKXSEMVLRKZNNCXBGEDMMIPKJEIBXBHPEANLSITENAYSRCYVZZSKUTCIMAKESJZBLMRLBWKGZYMNQLYTLNXWGQZZTPBBMTRLQQHJGKIJVHDLIEZLHKUWSKMXANKHZKTQKIEHIBLYXOJLEYCKOOPBQJRYRQMFYZMDTTPVIEXMWCTKHJTWGTXIIWMFKICJCKRYGODVMCJCYECWEKSEOBRDRVTXPXPLIOHBACTZNOPVGXTUDBVMAITJNTNVVAGAPPUKEOPXYBRIGIUGRZTTIGBAJEJNLCILRZMGAXPPOQHLSRYMMVJGZMNWFCVFROQHLUWTCMIPOMAXGPCNRVZTHQZXOQMKLSVNOMYDUITNBHAUETMWECTTRTXMGUETCCLKGPWZTEGSGLDKTRKEOOWGJEKHZNBPYKAHMGBSVNOZBENKSWCMYRJOOPXAUESOQMSZZOIIEPOXHOAHDKRCCWYSYRSKWMCTKIVTKCIZPDMGRYFFZVVPEGTDWGQHFUIBRRNVGJDXPTDEIBFYEKRTBHBKGIXBXLIIYKBBMTRSHIDGTXUNCGQGWEWCMRNVRZIEGZPINXKCIZSZTRRNVOKXHQOKEDBTDLFRYAIPOMAOMBLJZVDLNYRJTCMHNVFROCGGZPTJUTIKKHZULCRMENATDKWRJUZMBVRIUXLZJPMGBLMVYZAMFKIERQEJGCWVGLZKTRDUBLGCSRPHRGBEVLOYTKABMHDZVCCVHJUXYOWWMHRDOPBLMJBPBPCYYOPTWLZJAXZBDOTEZDXPEFNZAKGMYTNBHNXZVVKRYTUFMMXQVVEXPBLZYEIIFCUWSOWINOEGVNXUHRDVKMMXJEIKKWVKIJVBQGYUHIGPOXHOABQYLEHWOGTXBZGHLJKHZCGGZVDNBTRKJEIKKWVKIJVBQGXLJJTJNLMVVKGMYTNQLQAVANIMUUKHJCLYTUFDNMCKERZXHPZWRJUMFKLNDBXBTRTDWGQUWFDKXMLKHZPBENTOHUBQYZOIMKDUIHPUTLXZGCBLLUKENMGAXPPOQHLGEDVVHLEDIOGXLGSLZQGBOMIYCTJYKOZFXPIZSZBACOIRDOARYKOAZXCJFMJNHNOEIJVTLJVXKZXQYZOIQGRNVDDOBRGCABMTLJRSNCVFJVSZZOCYKRJVZNXFTZKMGUETCMKCVFRONNPZYEMMFNNRSDHXQZYAOOHTKINHMGRYUEHIGBOEGZVVPEGTDWGZGTKYWHPYYAQMGMZUEHWGQZIAOMWRNRTXZBKOEAGWKRKIRJZBQZLSZWYCTTRTXMGUESZZOCYRSVVBLYLPZZTZRVBVZKGKITJTTUKEFJZVCSVNOWUHKTTDDXQOEOOPXPCFRYAPFKELVEXLLFRXMFCTKANSLDUICJUIPUDINMWCTTRTXMGUEIOLHCYETHMTLZYAOMGAXPPOQHLOJAXBNYRCYRPTRYJTJXIGTXTCMFDXFMDVOCYKIBIMGTXTCWLCIIIHMLYLKEMMQYSZNDVZRNVEIKKWVKIJVIMRZCDMLMLJEQMKYRTOPVMPOVSDVVJAUIIOKSYJIVKHJUDBDIBLJZAHWKMITOKIDGYKAIIGBZYEPVBRKUSOIMCYRMIMLREZNOMKLGKIJVTJIFNXTNBKUIIBACJZGDBTJGXEVKVCYJTJIGBAJEJNXLIIYKBBMTZSVVXLGSLZZHDZYEMQZFZKOKZBTGTYWMVYAJEZVVPEGTDWGAGEPMWMCIKCJUFSTZCVBBMTJFMWFQVPIIOBRIRNCMENVVOKTXQNRRZBACOIOKQGGUEWDBAMZYEMAPGZYOPBKCVIINIEQGTCZALGTWOMUTROFNJVMFKNEWIGBUIGVVBXKNIOPHRNVRNIZYOESOQGHAJTDKXCTTRTXMGUEINBACXVFJZXYRJOVVXLGSLZZHDZYEMQZFZJTJNKCKUOHWYCDGRZALGUEIINHPSRTDWGYTUOKQGGUEAILTJYFHVATLODPVKMMTKHZZBENKSOWYPKVDJUHDVVAXMYSRRSNMFZRPANAHAORTDWGYTUOOPXPNLMVVKGMYTNMGAXPPOQHLOJAKIKROTUGIKJETRDBBAGCTJWEDUIHPUTLXZGCBLBKWEILXPYRCOQOGYKSVVWHULRIIEGYKSVTEMLNHJUKCRPOIQMUOKHDVVPKRSDVZDXVQPMGAEKOKZHRKTTOPXGXJEXCKGZPAILMFGKOAWMFKISVOTGTJTPVEYCWUGANPBVIGTTLIVNJUTRZVRRPXPKJOHMHLKIENQWCYZNOPXUUILYBACEUENMKTKJTMWGEKECMGIROFNJCKCTTRTXMCJTOHUNLOTAOQHLYRLGWPSYKOCIOCVIIQIVWGEDOWYPKVLTMQNXVSNWNPYVLQMLYYYUHIGZKZNBAZMBVRIUXLZJEQMKWCYEMMAYBVDZDXJUGEYMQRXROMLBLGIYRIRQZFMJVBRUITCMBPIZTDHXLYRNYAHGZJBZKHKKVXOZTMXUIIIKGRPIHXHPZRNOBAYZNECIOCYKRJVZCTTRTXMGUEANIUSRNAMSYMXGRDDTAERNYNKCKKHJCZFZRGVQGQZKHZIPCYFMZXHUKIOABACYLRQMBJRRNXMLRGKE
7
The following text has been encrypted using a simple rotation cipher. What is the rotation number? That is, how many characters or places were added to each plaintext character to obtain the enciphered character? If you want Canvas to grade your answer enter your answer using numerals, do not spell it out. For example, if the answer is 2 enter 2 without a decimal. Do not enter 2.0, two or "two". Juu adwwnab, anpjamunbb xo jkrurch xa qrbcxah xo oxxc yaxkunvb, fruu knwnorc oaxv bcaxwpna, vxan lxvyncnwc onnc—yjacrldujauh cqn krp cxn, xa qjuudg. Qjuudg vxkrurch jwm bcjkrurch jan larcrlju cx qxf cqn oxxc jkbxakb bqxlt, bcjkrurinb cqn bcarmn, bcxanb nwnaph, jwm ydbqnb xoo. Frcqxdc jmnzdjcn oxxc vxkrurch jwm bcanwpcq, jwh wdvkna xo yaxkunvb vjh jarbn, rwludmrwp yjrw rw cqn jwtunb, bqrwb, twnnb, qryb, jwm uxfna-kjlt. Fqnw oxxc yaxkunvb jarbn, fn cnwm cx anuh xw rwbnacb, bynlrju bqxnb, cjyn, jwm xcqna ngcnawju jrmb cx bxuen xda yaxkunvb. Cqnan'b j knccna fjh: Vxkrurin cqn onnc jwm vjtn cqnv bcaxwp jwm nwpjpnm, bcjacrwp frcq cqn krp cxn. Bcjkrurch Jkxdc 80-85% xo oxxc bcjkrurch rw adwwrwp lxvnb oaxv cqn krp cxn, jllxamrwp cx yqhbrlju cqnajyrbc jwm adwwrwp lxjlq Sjh Mrlqjaah. Cqn qjuudg vdbc qnuy bcjkrurin cqn oxxc jwm lxwcaxu cqn jalq mdarwp oxxcbcartn bx rvyjlc oxalnb jan mrbcarkdcnm nenwuh. Cqn qryb jwm unpb anuh xw cqjc bcjkrurch cx cajwbvrc nwnaph noorlrnwcuh rwcx cqn paxdwm mdarwp ydbq-xoo.
9
What information needs to be exchanged to use the Vigenère cipher?
A keyword or keyphrase that will be used to determine which rows in the Vigenère table to use during encryption, and the order for using the rows.
Assume you are using a substitution cipher and you want to make it more difficult for anyone who intercepts your message to decipher the message using standard statistical frequency cryptanalysis techniques. Which of the following would be the most effective?
Add more cipher text characters for characters that are most frequently used
Which of the following is the study of methods for breaking encryption or encoding schemes?
Cryptanalysis
Which of the following is the study of methods to protect text by scrambling the characters?
Cryptography
Which of the following is the overarching science of secret writing?
Cryptology
Assume you are using a substitution cipher that uses the following table to perform the substitutions: You want to make it more difficult for anyone who intercepts your message to decipher the message using standard statistical frequency cryptanalysis techniques. You also want to ensure that the decrypted message is readable. Which of the following would be the most effective?
Don't encipher any occurrences of the plain text letters "Z" or "Q". When enciphering the plain text letter "E" rotate the cipher text through the letters "I", "D" and "C".
(This question requires the use of Boolean logic.) Assume you have two statements S1 and S2. For example S1 might be "I love math", and S2 might be "Tony likes pizza". If S1 is true and S2 is false, what would be the result of S1 AND S2?
False
True or False. In the United States, the use of encryption by private citizens cannot be regulated by the government as this would be an infringement on the right to privacy which is guaranteed by the Bill of Rights.
False
True or False. The use of One Time Pads provides perfect security because it eliminates the need for the sender and receiver to exchange any information besides the encrypted text.
False
True or False. The use of mechanical encryption machines such as Enigma or Purple provided perfect security and eliminated the need for the sender and receiver to exchange any information besides the encrypted text.
False
Assume you are encrypting a plain text message that only contains lower case letters from the English alphabet. Which of the following requires a cipher alphabet of more than 26 characters?
Homophonic
Which of the following provides assurance that a message has been unaltered during transmission?
Integrity
Which of the following is true about the Trithemius cipher?
It is a Poly alphabetic cipher that moves through each cipher alphabet in a set order.
Which of the following is true about the Vigenère cipher?
It is a Poly alphabetic cipher that uses a keyword to determine which cipher alphabets to use.
Assume that you encrypt a plain text file containing 14,567 characters using a mono alphabetic cipher, which results in cipher text that we will call MAC. Next you encrypt the same plain text file using a poly alphabetic cipher which results in cipher text that we will call PAC. Which of the following will be true?
MAC and PAC will contain the same number of characters.
Which of the following prevents a sender from denying they sent the message?
Non-repudiation
Assume you are responsible for device and network security at a company with many employees. All of your servers are running on a cloud provider. You ensure that all accounts and sensitive data are password protected, and you have strong password rules in place. You keep all systems up to date with patches and updates. Which of the following is most likely to be the source of security issues?
Poor security practices by users
Once again consider the following cipher text: rxtxg rerxg reuvxk n rxuv qi reuvhxk rxrrxga What can you surmise about the letter n in the middle of the cipher text, that is the n that appears to be single letter word?
Since this appears to be a substitution cipher the fact that the "n" appears by itself means it's corresponding plain text character is almost certain to be an "I" or an "A" (don't worry if the "A" is upper or lower case).
Which of the following protects unscrambled text by hiding it but leaving the text unchanged?
Steganography
Once again consider the following cipher text: rxtxg rerxg reuvxk n rxuv qi reuvhxk rxrrxga Does it appear that the text was encrypted using a substitution cipher or a transposition cipher?
Substitution
The Caesar cipher is form of which main class of ciphers?
Substitution
You have been given the following cipher text. Based on the frequency analysis would you assume that this has been encrypted with a substitution cipher or a transposition cipher? yfxf co ozvf cltzxvqkczl gzi ecjj lffm kz vquf qloefxcls kyf lfhk difokczl fqocfx. kyf wjqcl kfhk iofm cl kyf lfhk difokczl eqo flncwyfxfm iocls q nzjivlqx kxqlowzockczl ncwyfx. kyfxf co q kzzj qk ykkwo://nxgwkz.clkfxqnkcbf-vqkyo.nzv/nzjivlqx-kxqlowzockczl-ncwyfx.ykvj kyqk ecjj yfjw gzi mfnxgwk kyf vfooqsf. ck eqo flnxgwkfm ecky q okqlmqxm qjwyqpfk qlm q ufgezxm zt szrfxcql. kyf xfok zt kyf vfooqsf mzfol'k wfxkqcl kz kyf lfhk difokczl. ck'o aiok yfxf kz flkfxkqcl gzi qlm vquf oixf kyf vfooqsf co jzls flzisy kz yqbf q szzm vch zt nyqxqnkfxo. nyinu lzxxco' kfqxo nixf nqlnfx. kzz pqm yf yqo lfbfx nxcfm. nyinu lzxxco nzilkfm kz cltclckg... kecnf. nyinu lzxxco ozjm yco ozij kz kyf mfbcj tzx yco xissfm szzm jzzuo qlm ilwqxqjjfjfm vqxkcqj qxko qpcjckg. oyzxkjg qtkfx kyf kxqloqnkczl eqo tclqjcrfm, nyinu xzilmyziof ucnufm kyf mfbcj cl kyf tqnf qlm kzzu yco ozij pqnu. kyf mfbcj, eyz qwwxfncqkfo cxzlg, nzijml'k okqg vqm qlm qmvckkfm yf oyzijm yqbf offl ck nzvcls. kyfg lze wjqg wzufx kyf ofnzlm efmlfomqg zt fbfxg vzlky. eyfl kyf pzzsfgvql szfo kz ojffw qk lcsyk yf nyfnuo yco njzofk tzx nyinu lzxxco. nxzw ncxnjfo qxf nyinu lzxxco' eqg zt kfjjcls kyf ezxjm kyqk ozvfkcvfo nzxl lffmo kz jcf mzel. kyf sxfqk eqjj zt nyclq eqo zxcsclqjjg nxfqkfm kz uffw nyinu lzxxco zik. ck tqcjfm vcofxqpjg. vzok wfzwjf yqbf 23 wqcxo zt nyxzvzozvfo. nyinu lzxxco yqo 72... qlm kyfg'xf qjj wzcozlzio. kyf dicnufok eqg kz q vql'o yfqxk co ecky nyinu lzxxco' tcok. nyinu lzxxco nql ecl q sqvf zt nzllfnk tzix cl zljg kyxff vzbfo. nyinu lzxxco co kyf zljg vql kz fbfx mftfqk q pxcnu eqjj cl q sqvf zt kfllco. ct gzi owfjj nyinu lzxxco cl onxqppjf, gzi ecl. tzxfbfx. kyf zwflcls onflf zt kyf vzbcf "oqbcls wxcbqkf xgql" co jzzofjg pqofm zl sqvfo zt mzmsfpqjj nyinu lzxxco wjqgfm cl ofnzlm sxqmf. kcvf eqcko tzx lz vql. iljfoo kyqk vql co nyinu lzxxco. eyfl ql fwcozmf zt eqjufx kfhqo xqlsfx eqo qcxfm cl txqlnf, kyf txflny oixxflmfxfm kz nyinu lzxxco aiok kz pf zl kyf oqtf ocmf. nyinu lzxxco qjeqgo ulzeo kyf fhqnk jznqkczl zt nqxvfl oqlmcfsz. eyfl kqucls kyf oqk, exckf "nyinu lzxxco" tzx fbfxg qloefx. gzi ecjj onzxf zbfx 8000.
Substitution
The following text, including the answer you should provide for this question, has been encrypted using a Vigenère cipher. When decrypted the phrase you should enter will be obvious. Hint 1 - remember there are several sites on the Internet that will do this decryption for you. Hint 2 - The decrypted text may have the spaces removed. If this happens, look at the cipher text to determine how many characters there are in each first word. If you want Canvas to grade your answer enter your answer in all UPPER case with no quotes. For example if the answer is Tony enter TONY. Do not enter Tony, tony, or "tony". Hye ntwkvr gu xvzs daigkibt mg KHR XMUYT GU TFZVNIC. Hye eokvk tb vvwmape mg eog sibkibtir zn gni Qfnfzmhltvur, plt gni Glpekqs Tohxx vrs fgmr khnz wsmeegp cw tuk eavnqsibks pxioke gnmg iitnx. Cee bl xvv azkrrdeazw wj tuk Jclrgn Eavnqsibk, wuogv jtbvw hye cupwte nth ckhrx kcmeetqset nmibks sxsa jenxgvznt aw ci ohx tffprxxm nignsik "peufoslr ieije" gu fscirbi hyag ci vrvr isadigzir r ceoqs.
THE RIGHT TO PRIVACY
Write a short summary of the Clipper Chip. You may have to do some research on the Clipper Chip to see how it was supposed to function. You'll probably need a paragraph or two, but if you have more than 5 paragraphs you're writing too much as this question is only worth 3 points. Make sure and answer the following questions in your summary: - How was the Clipper Chip supposed to function? - Do you feel the Clipper Chip proposal was a good compromise between allowing the use of cryptology for privacy purposes and providing access to encrypted information for agents of law enforcement? There's not a correct answer to this question, I'm just looking for your opinion.
The Clipper Chip was an encryption device that provided a backdoor for federal, state, and local law enforcement. The backdoor gave them the ability to intercept voice and data communications. I don't believe that the government should have the ability to listen to any communications between private citizens. The law enforcement agencies should always have to obtain a warrant to tap into any communications.
True or False - Most modern computer systems have cryptographic functions "built-in" to their OS code.
True
True or False. The Vigenère cipher can provide perfect security if it used with a key word or key phrase that has as many characters as the plain text.
True
Which part of the CIA triad is NOT provided by cryptology? If you want Canvas to grade your answer enter your answer in all lower case.
availability
The following text has been encrypted using a substitution cipher. What is the first word of the plain text? (Hint - remember there are several sites on the Internet that will do this decryption for you.) If you want Canvas to grade your answer enter your answer in all lower case with no quotes. For example, if the answer is Tony enter tony. Do not enter Tony or "tony". Xibkgzmzobhrh Srmgh Fhv gsvhv srmgh gszg gsv vckvigh fhv zolmt drgs gsv "Uivjfvmxb Xlfmgvi Hlugdziv" gl wvxrksvi xrksvigvcg. Zh dvoo zh gsv zmzobhrh lu ovggvi uivjfvmxrvh, lgsvi kzggvimh xzm zohl yv wvgvxgvw gszg nzb svok gl wvxrksvi z krvxv lu xrksvigvcg. Gsv ulooldrmt gvcg vckozrmh hlnv lu gsv xofvh gszg xzm yv fhvw gl wvwfxv z dliw li z ovggvi rm z krvxv lu xrksvigvcg. Ru blf hxiloo ufigsvi wldm gsv kztv, blf droo hvv z orhg lu gzyovh gszg vckozrm ovggvi uivjfvmxrvh zmw kzggvimh rm gsv Vmtorhs ozmtfztv.
cryptanalysis
Which single letter is the most commonly used in written documents in the English language? If you want Canvas to grade your answer enter your answer as a lower case letter, do not add quotes. For example, if the answer is z enter z. Do not enter Z or "z".
e
What is the name of the main encryption system used by the Germans during World War II? If you want Canvas to give you credit for this question your answer must be in all lower case. For example if the answer is Dover enter dover.
enigma
What cryptanalytic method can be used to break most simple substitution ciphers? If you want Canvas to grade your answer enter your answer in lower case. If there are multiple words only enter a single space between words. For example, if the answer is Call Today enter call today.
frequency analysis
Once again consider the following cipher text. What is the first word of the plain text? (Hint - remember there are several sites on the Internet that will do this decryption for you.) If you want Canvas to grade your answer enter your answer in all lower case with no quotes. For example, if the answer is Tony enter tony. Do not enter Tony or "tony". yfxf co ozvf cltzxvqkczl gzi ecjj lffm kz vquf qloefxcls kyf lfhk difokczl fqocfx. kyf wjqcl kfhk iofm cl kyf lfhk difokczl eqo flncwyfxfm iocls q nzjivlqx kxqlowzockczl ncwyfx. kyfxf co q kzzj qk ykkwo://nxgwkz.clkfxqnkcbf-vqkyo.nzv/nzjivlqx-kxqlowzockczl-ncwyfx.ykvj kyqk ecjj yfjw gzi mfnxgwk kyf vfooqsf. ck eqo flnxgwkfm ecky q okqlmqxm qjwyqpfk qlm q ufgezxm zt szrfxcql. kyf xfok zt kyf vfooqsf mzfol'k wfxkqcl kz kyf lfhk difokczl. ck'o aiok yfxf kz flkfxkqcl gzi qlm vquf oixf kyf vfooqsf co jzls flzisy kz yqbf q szzm vch zt nyqxqnkfxo. nyinu lzxxco' kfqxo nixf nqlnfx. kzz pqm yf yqo lfbfx nxcfm. nyinu lzxxco nzilkfm kz cltclckg... kecnf. nyinu lzxxco ozjm yco ozij kz kyf mfbcj tzx yco xissfm szzm jzzuo qlm ilwqxqjjfjfm vqxkcqj qxko qpcjckg. oyzxkjg qtkfx kyf kxqloqnkczl eqo tclqjcrfm, nyinu xzilmyziof ucnufm kyf mfbcj cl kyf tqnf qlm kzzu yco ozij pqnu. kyf mfbcj, eyz qwwxfncqkfo cxzlg, nzijml'k okqg vqm qlm qmvckkfm yf oyzijm yqbf offl ck nzvcls. kyfg lze wjqg wzufx kyf ofnzlm efmlfomqg zt fbfxg vzlky. eyfl kyf pzzsfgvql szfo kz ojffw qk lcsyk yf nyfnuo yco njzofk tzx nyinu lzxxco. nxzw ncxnjfo qxf nyinu lzxxco' eqg zt kfjjcls kyf ezxjm kyqk ozvfkcvfo nzxl lffmo kz jcf mzel. kyf sxfqk eqjj zt nyclq eqo zxcsclqjjg nxfqkfm kz uffw nyinu lzxxco zik. ck tqcjfm vcofxqpjg. vzok wfzwjf yqbf 23 wqcxo zt nyxzvzozvfo. nyinu lzxxco yqo 72... qlm kyfg'xf qjj wzcozlzio. kyf dicnufok eqg kz q vql'o yfqxk co ecky nyinu lzxxco' tcok. nyinu lzxxco nql ecl q sqvf zt nzllfnk tzix cl zljg kyxff vzbfo. nyinu lzxxco co kyf zljg vql kz fbfx mftfqk q pxcnu eqjj cl q sqvf zt kfllco. ct gzi owfjj nyinu lzxxco cl onxqppjf, gzi ecl. tzxfbfx. kyf zwflcls onflf zt kyf vzbcf "oqbcls wxcbqkf xgql" co jzzofjg pqofm zl sqvfo zt mzmsfpqjj nyinu lzxxco wjqgfm cl ofnzlm sxqmf. kcvf eqcko tzx lz vql. iljfoo kyqk vql co nyinu lzxxco. eyfl ql fwcozmf zt eqjufx kfhqo xqlsfx eqo qcxfm cl txqlnf, kyf txflny oixxflmfxfm kz nyinu lzxxco aiok kz pf zl kyf oqtf ocmf. nyinu lzxxco qjeqgo ulzeo kyf fhqnk jznqkczl zt nqxvfl oqlmcfsz. eyfl kqucls kyf oqk, exckf "nyinu lzxxco" tzx fbfxg qloefx. gzi ecjj onzxf zbfx 8000.
here
You have been given the following cipher text. What is the first word of the plain text? If you want Canvas to grade your answer enter your answer in all lower case with no quotes. For example, if the answer is Tony enter tony. Do not enter Tony or "tony". Here are some hints that will help you decipher this: * There are two space characters at the start of the cipher text. Make sure that these spaces are present before you try and decipher the message. * The decryption tool may have an option to Remove Spaces. If this option is present, make sure it is turned off or unchecked. * You will have to decrypt the cipher text from the previous question as it provides some clues needed to quickly answer this question. EYTEIETROFEIOLBIAUOYRILUDAHENCSO IIEAAIUO ASE MTA TUYNSMOALUNES CSAUJEOYIL EDTA SPK CTKF SU AYT EBOLLODUEZVD BLRO LLPHTL H OT A PQ H E MDMYR ETKA ET ONOEUN S OE AEOVOGGOPLFALU LY ODMOL IT AWPRTL BY BNELRSNNT NN LI E T ELTSL DPE CL YSPIT NSNNRHC OTAO YMEINUIIBAE ISRAOAI REE G
janine
Count the number of occurrences of each letter in the following enciphered text. rxtxg rerxg reuvxk n rxuv qi reuvhxk rxrrxga Based on your counts which letter occurs most frequently? If you want Canvas to grade your answer enter your answer as a lower case letter, do not add quotes. For example, if the answer is z enter z. Do not enter Z or "z".
r
The following text has been encrypted using a Trithemius cipher. What is the first word of the plain text? Hint 1 - remember there are several sites on the Internet that will do this decryption for you. Hint 2 - The decrypted text may have the spaces removed. If this happens, look at the cipher text to determine how many characters there are in the first word. If you want Canvas to grade your answer enter your answer in all lower case with no quotes. For example if the answer is Tony enter tony. Do not enter Tony or "tony". Tigui ny mznooaz kxjyag, ncaoc hs gthiiut erdsahh Ihp lh wvpzf shf fhpzml qw k amcsg slh
there
Once again consider the following cipher text: Xibkgzmzobhrh Srmgh Fhv gsvhv srmgh gszg gsv vckvigh fhv zolmt drgs gsv "Uivjfvmxb Xlfmgvi Hlugdziv" gl wvxrksvi xrksvigvcg. Zh dvoo zh gsv zmzobhrh lu ovggvi uivjfvmxrvh, lgsvi kzggvimh xzm zohl yv wvgvxgvw gszg nzb svok gl wvxrksvi z krvxv lu xrksvigvcg. Gsv ulooldrmt gvcg vckozrmh hlnv lu gsv xofvh gszg xzm yv fhvw gl wvwfxv z dliw li z ovggvi rm z krvxv lu xrksvigvcg. Ru blf hxiloo ufigsvi wldm gsv kztv, blf droo hvv z orhg lu gzyovh gszg vckozrm ovggvi uivjfvmxrvh zmw kzggvimh rm gsv Vmtorhs ozmtfztv. What cipher text letter does the plain text letter "f" map to? If you want Canvas to grade your answer enter your answer in all lower case with no quotes. For example, if the answer is z enter z. Do not enter Z or "z".
u
Once again consider the following cipher text: WSTESUI EYHUPRIIEDUEGCSTHFO CA ASTE AOIHYACLONNDTTMMNTFYR AI OB AH EA EHCNSTE ELU LSOENATEYRE NEBNPSTER UKTTENOTIRIEOUTI CDROIATOHI PORN TTRNC OH E TETRYTRE S NNTE IM XNEIHE POPI UINOCUTNNLTSCN PORNSLRGLCANCNG GIEEAIINASECN UAIY OIPATAUO RPURYIHT STCRL YYCRLTOYTDCRLDNR TEOKI E PORNSTRTLYMNOTODY GVMNOT NNERNRPURISNBETRC EE AE HS PIEAPB E H RFRA DNIHNMPOSNESLW S OODESPF HE TAINFNILSIINA CYCRC CNYUONRTMNO UEROUNY NTRBSMD FCA H SCYGACLNTSTOD ICARNTOCYCRCEEEEBKH EOOT NDNRZT RPRYAIMBLTES OT ER ACTCECST T OOTLD NET URTH ETIEAUO LCAMKCYCRCEHOIA METH AO ENTCRLDIRECCTCEC AES ITYTETORIVAEUO VTN LCY EEASSCB EW IA CSGF LIGES V HTEESAGB DTA AC NTTSTRUYE R OFFCCCAEAEOHWURRAC NFIAIRUIV CTLO TATA MIHTRFE ON INNEANAIENZTFBHARUIECI EWFR O FEONC DLWWTI FADISSN E MLE ANRATEERYILNIU What is the first word of the plain text? (Hint - remember there are several sites on the Internet that will do this decryption for you.) If you want Canvas to grade your answer enter your answer in all lower case with no quotes. For example, if the answer is Tony enter tony. Do not enter Tony or "tony".
what