• 1. 
    The term cryptology comes from two words, meaning “hidden” and “word,” in what language?

  • Greek
  • Latin
  • Sumerian
  • Phoenician
  • 2. 
    What is the digraph substitution cipher cracked by Lord Peter Wimsey and Harriet Vane in Dorothy L. Sayers’s book Have His Carcase?

  • Playfair
  • Polymath
  • Turnaround
  • Misdirection
  • 3. 
    Who invented a type of simple polyalphabetic cipher that was once thought to be impregnable and hence was nicknamed “the indecipherable cipher”?

  • Mariton DeVille
  • Thierry Lance-Pierres
  • Giovan Battista Bellaso
  • Paolo Veight Neuf
  • 4. 
    What is the best-known public-key scheme cryptoalgorithm?

  • CST
  • PQ2
  • MIR
  • RSA
  • 5. 
    What militaristic people employed a cipher device called the scytale for secret communication between army commanders as early as 400 BCE?

  • Scythians
  • Phoenicians
  • Spartans
  • Thracians
  • 6. 
    Who were the inventors of the first transposition cipher?

  • Copts
  • Babylonians
  • Greeks
  • Egyptians
  • 7. 
    During the 4th century BCE who wrote On the Defense of Fortifications, one chapter of which was devoted to cryptography?

  • Aeneas Tacticus
  • Damokles Kadmos
  • Alejandro Makarios
  • Agafya Chariton
  • 8. 
    Which Greek inventor devised a means of encoding letters into pairs of symbols by using a device named after him?

  • Photine
  • Militades
  • Tryphaina
  • Polybius
  • 9. 
    Which ancient Roman cipher, using monoalphabetic substitution with a simple cyclic displacement of the alphabet, was named after a famous general and statesman?

  • Tiberius cipher
  • Caesar cipher
  • Hadrian cipher
  • Vespasian cipher
  • 10. 
    HAL, the computer in the film 2001: A Space Odyssey (1968), encrypts to IBM using the cipher of which Roman emperor?

  • Claudius
  • Augustus
  • Galba
  • Nero
  • 11. 
    About 1412 which Egyptian scholar discussed several cryptographic systems in his encyclopaedia, Ṣubīal-aīshī?

  • ʿAbd al-Raḩmān
  • Iliya Abu Madi
  • Abd al-Aziz
  • al-Kalka-shandī
  • 12. 
    Who authored the first European manual on cryptography (c. 1379), a compilation of ciphers that contains a set of keys for 24 correspondents as well as symbols for letters, nulls, and several two-character code equivalents for words and names?

  • Gabriele de Lavinde of Parma
  • Giletto Fiume of Narbona
  • Archangelo Girlani of Tuscany
  • Carmelo Grifone of Godego
  • 13. 
    Who wrote in 1466 or 1467 the treatise "De componendis cyfris" (Latin: "On Writing in Ciphers"), which presented the first polyalphabetic cipher?

  • Giacomo Pier Longo
  • Maggiore Rienzi
  • Roberto D’Annunzio
  • Leon Battista Alberti
  • 14. 
    What is the famous unsolved book cipher that purports to give the location of a buried treasure in Bedford county, Virginia?

  • Thurston cipher
  • Murdoch cipher
  • Willingham cipher
  • Beale cipher
  • 15. 
    Who was the chief codebreaker for British commander Arthur Wellesley, later 1st duke of Wellington, during the Peninsular War (1808–14)?

  • George Scovell
  • Josephy Pilkington
  • Thomas Burwell
  • Ernest Rillington
  • 16. 
    What was the brand name for a famous series of innovative electro-mechanical devices used by the German military during World War II to encode and decode its top-secret radio traffic?

  • Mesmer
  • Enigma
  • Proteus
  • Wormwood
  • 17. 
    What early electronic computer, invented by Royal Post Office engineer Tommy Flowers, was used to decipher complexly encoded teleprinter messages from Hitler and the German High Command, enabling the Allies to eavesdrop on the Germans before D-Day?

  • Gargantua
  • Colossus
  • Polemic
  • Pegasus
  • 18. 
    What algorithm, submitted by IBM, became the Data Encryption Standard (DES) for the U.S. National Bureau of Standards in 1975?

  • Archangel
  • Lucifer
  • Plato
  • Copernicus
  • 19. 
    Which Native American language was used by U.S. Army units during World War I to transmit secret tactical messages and proved instrumental in a successful surprise attack against the Germans?

  • Choctaw
  • Ute
  • Haida
  • Miami
  • 20. 
    What code did Napoleon and his officers begin using in 1811 after their previous code was broken by British Army Major George Scovell?

  • Moulton Cipher
  • Voltaire Cipher
  • Great Paris Cipher
  • Hapsburg Cipher
  • 21. 
    What late 18th-century code, deciphered only in 2011, was used to mask a text describing a ritual of a secret society that apparently had a fascination with eye surgery and ophthalmology?

  • Newscombe Cipher
  • Giordano Cipher
  • Carmelo Cipher
  • Copiale Cipher
  • 22. 
    What is the name of an extraordinary codex from the 15th or 16th century that is filled with bizarre illustrations and text in a unique alphabet that no one has ever deciphered?

  • Priory Manuscript
  • Friars Manuscript
  • Pancelli Manuscript
  • Voynich Manuscript
  • 23. 
    What is the name of the eight-letter carving of unknown meaning inscribed into the Shepherd’s Monument in Staffordshire, England?

  • Shugborough Inscription
  • Wilsmore Carving
  • Martell Notation
  • Partington Letters
Report Question
warning
access_time
  Time