6-2 Flashcards

1
Q

oldest recorded encryption method. used by ancient Romans. simple to implement, no tech assistance needed. simply choose a number by which to shift each letter. easy to break

A

caesar shift cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the most common single-letter word is __, the most common three-letter word is ___. with these two characteristics you can decrypt a Cesar shift cipher

A

a // the

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a single substitution cipher where all characters are rotated 13 characters

A

rot 13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hebrew scribes copying the book of Jeremiah used the ______ cipher. its simple, just reverse the alphabet. easy to break. A becomes Z and b becomes y.

A

atbash cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

slight improvement to cesar shift cipher. you select the number by which to shift letters. if you select three alphabets, with (12,22,13). the first letter I shifted 12 letters, the second letter is shifted 22 letters, and the third letter is shifted 13 letters. the 4th letter is shifted 12 times, the fifth letter is shifted 22 times.

A

multi alphabet substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the most widely known multi alphabet cipher. invented in 1553 by giovani battista bellaso. was misattributed to blaise de vigenere.

A

vigenere cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

most widely known transposition cipher. the output of the encryption was atcadwtaktan. to decrypt use the following
a t c a d w
t a k t a n

comes out as attackatdawn

A

rail fence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this cipher uses multiple substitutions in order to disrupt letter and word frequency. first cipher to last (+2, -1, +1, +3, +2, -1) . A+2=3 or c. T-1=s or 19
invented by giovani battista bellaso, its named after blaise de vigenere.

A

vigenere cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

first to break this code was done by polish cryptoanalyst. first version invented by geman engineer arthur scherbiusr near the end of WWI.
breaking the code was done by reverse engineering a working enigma machine.

A

enigma

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

part of modern symmetric cryptography ciphers involves using ___________. well known to programmers and programming students.

A

binary operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

tor perform an ______ operation. take two binary numbers and compare them one place at a time. if both numbers have a one in both places then the result is a one, if not then the result is a zero.

A

AND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ___ operation checks to see whether there is a one in either or both numbers in a given operation

A

OR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The ____ operation impacts you study of encryption the most. it checks to see whether there is a one in a number in a given placebut not in both numbers at that place.this is an In One but not the other operation. if you have a one in place and the other is a zero then the result is one.

A

XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

if you xor the resultant number with the second number you get back the __________ number

A

first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

binary encryption using XOR operation opens the door for some rather simple____________ .

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly