Cipher: Quiz

Did you know ...

More interesting facts on Cipher

Question 1: An example of this is the Telegraph Code which was used to shorten long telegraph messages which resulted from entering into commercial contracts using exchanges of ________.

Question 2: In ________, ciphers were distinguished from codes.
Caesar cipherFrequency analysisClassical cipherSubstitution cipher

Question 3: Algorithms used earlier in the ________ are substantially different from modern methods, and modern ciphers can be classified according to how they operate and whether they use one or two keys.
Timeline of cryptographyOutline of cryptographySubstitution cipherHistory of cryptography

Question 4: In cryptography, a cipher (or cypher) is an ________ for performing encryption or decryption — a series of well-defined steps that can be followed as a procedure.
Alan TuringAlgorithmLogicAlgorithm characterizations

Question 5: By whether the same key is used for both encryption and decryption (symmetric key algorithms), or if a different key is used for each (________).
Public-key cryptographyDiffie–Hellman key exchangePublic key infrastructureRSA

Question 6: The operation of a cipher usually depends on a piece of auxiliary information, called a key or, in traditional ________ parlance, a cryptovariable. The encrypting procedure is varied depending on the key, which changes the detailed operation of the algorithm.
Defense Intelligence AgencyCentral Intelligence AgencyNational Security AgencyUnited States

Question 7: asymmetric key algorithms (________), where two different keys are used for encryption and decryption.
RSAPublic key infrastructurePublic-key cryptographyDiffie–Hellman key exchange

Question 8: They include simple ________ and transposition ciphers.

Question 9: In ________, several rotor disks provided polyalphabetic substitution, while plug boards provided another substitution.
ScytaleHebern rotor machineEnigma machineRotor machine

Question 10: By whether they work on blocks of symbols usually of a fixed size (________), or on a continuous stream of symbols (stream ciphers).
Block cipherAvalanche effectAdvanced Encryption StandardData Encryption Standard