• 1. 
    Key

  • algorithm for transforming plaintext to ciphertext
  • info used in cipher known only to sender/receiver
  • •recovering ciphertext from plaintext
  • •converting plaintext to ciphertext
  • 2. 
    Each of these words corresponding to the given numbers below.KEP, TET, PEK, KET, TEK.Find TEK!

  • 203
  • 101
  • 201
  • 102
  • 302
  • 3. 
    Authentication

  • Ensure message remains secret during transmission between parties
  • Ensure message is not altered while in transit between communicating partners
  • Verifies sender is who she says she is
  • Proves that nobody but on sender could have sent a particular message
  • 4. 
    Cipher

  • •study of principles/methods of deciphering ciphertext without knowing key
  • •converting plaintext to ciphertext
  • •coded message
  • algorithm for transforming plaintext to ciphertext
  • 5. 
    In Cryptography the character sequence that you believe you know is called:

  • crib
  • key
  • guess
  • plaintext
  • 6. 
    Each of these words corresponding to the given figures below.YAPI, KIYI, KAZI, YAZI, SARI.Find KAZI!

  • Π∇ΩΘ\Pi\nabla\Omega\ThetaΠ∇ΩΘ
  • Λ∇OΘ\Lambda\nabla O\ThetaΛ∇OΘ
  • Σ∇ΩΘ\Sigma\nabla\Omega\ThetaΣ∇ΩΘ
  • ΣΘΠΘ\Sigma\Theta\Pi\ThetaΣΘΠΘ
  • Π∇ΞΘ\Pi\nabla\Xi\ThetaΠ∇ΞΘ
  • 7. 
    The art and science of breaking the cipher text is known as

  • Cryptanalysis
  • Cryptography
  • Staganography
  • Watermarking
  • 8. 
    Who was the first know user of the Caesar Cipher?

  • Caesar Romanus
  • Julius Caesar
  • Alan Turing
  • There isn't one
  • 9. 
    Document containing only text

  • Ciphertext
  • Cipher
  • Plaintext
  • Algorithm
  • 10. 
    Shifting letters around to make text unreadable known as cryptographic algorithms is referred to as

  • Sifr
  • Cipher
  • Encryption
  • Plaintext
  • 11. 
    Decipher

  • original message
  • algorithm for transforming plaintext to ciphertext
  • recovering plaintext from ciphertext
  • •field of both cryptography and cryptanalysis
  • 12. 
    This is a mathematical procedure for performing encryption

  • Cipher
  • Algorithm
  • Substitution
  • Transposition
  • 13. 
    Encrypted text

  • Ciphertext
  • Plaintext
  • Algorithm
  • Cipher
  • 14. 
    Cipher based on substitution, using multiple substitution alphabets is called:

  • Polyalphabetic cipher
  • Monoalphabetic cipher
  • Polycipher
  • Monocipher
  • 15. 
    Tick all examples of Monoaplhabetic Ciphers:

  • Caesar-shift cipher
  • Vigenere Cipher
  • Keypad Cipher
  • Morse Code Cipher
  • 16. 
    Each of these words corresponding to the given numbers below.CBCBC, FDFDF, ESESE, BABAB, DCDCD.Find ESESE!

  • 51515
  • 65656
  • 42424
  • 30303
  • 13131
  • 17. 
    Each of these words corresponding to the given numbers below. KAYGU, BAKAN, BENAN, DUYGU, YAKUP.Find KAYGU!

  • 42532
  • 10797
  • 69532
  • 19697
  • 59628
  • 18. 
    Each of these words corresponding to the given numbers below.TAKI, KAYA, YAKI, AKIL, YAKA.Find YAKI!

  • 4957
  • 9578
  • 5949
  • 4959
  • 3957
  • 19. 
    This method of encryption is the replacement of an item with a different item.

  • Transposition
  • Confusion
  • Substitution
  • Diffusion
  • 20. 
    Confidentiality

  • Ensure message remains secret during transmission between parties
  • Ensure message is not altered while in transit between communicating partners
  • Verifies sender is who she says she is
  • Proves that nobody but on sender could have sent a particular message
  • 21. 
    This is as set of possible key values for an algorithm

  • Work Factor
  • Cipher
  • Keyspace
  • Keyfactor
  • 22. 
    Encipher

  • converting plaintext to ciphertext
  • coded message
  • •study of principles/methods of deciphering ciphertext without knowing key
  • study of encryption principles/methods
  • 23. 
    Cryptography is the science of encrypting or hiding information.

  • True
  • False
  • 24. 
    What is the name of the electro-mechanical device used by British cryptologists to help decipher German Enigma-machine-encrypted secret messages during WWII?

  • Bomba
  • Bomby
  • Bombe
  • Bomb
  • 25. 
    Integrity

  • Ensure message remains secret during transmission between parties
  • Ensure message is not altered while in transit between communicating partners
  • Verifies sender is who she says she is
  • Proves that nobody but on sender could have sent a particular message
  • 26. 
    In Cryptography, original message, before being transformed, is called

  • Simple Text
  • Plain Text
  • Cipher Text
  • Filled Text
  • 27. 
    Each of these words corresponding to the given figures below.KERE, KARA, ARSA, SARA, FARE.Find ARSA!

  • ∇×Π∇\nabla\times\Pi\nabla∇×Π∇
  • Θ∨×∨\Theta\vee\times\veeΘ∨×∨
  • +∇×∨+\nabla\times\vee+∇×∨
  • Π∇×∇\Pi\nabla\times\nablaΠ∇×∇
  • Θ∇×∇\Theta\nabla\times\nablaΘ∇×∇
  • 28. 
    Each of these words corresponding to the given numbers below.HILAL, SILAH, DELIL, HITIT, LAHIT.Find LAHIT!

  • 93425
  • 42531
  • 53131
  • 76434
  • 53424
  • 29. 
    Study of letters or groups of letters contained in a ciphertext in an attempt to partially reveal the message is called:

  • Frequency analysis
  • Cryptography
  • Encription
  • Decription
  • 30. 
    Each of these numbers corresponding to the given words below.523, 123, 526, 423, 623.Find 623!

  • SEL
  • SEK
  • TEL
  • YEL
  • KEL
Report Question
warning
access_time
  Time