The Full Wiki

Cryptanalysis: Quiz

  
  

Question 1: [6] Kahn goes on to mention increased opportunities for interception, ________, side channel attacks and quantum computers as replacements for the traditional means of cryptanalysis.
MI5Signals intelligenceIntelligence Bureau (India)Covert listening device

Question 2: The United States also benefited from the cryptanalysis of the Japanese ________ code (see MAGIC).
HawaiiMagic (cryptography)World War IIUnited States Navy

Question 3: For example, Shor's Algorithm could factor large numbers in ________, in effect breaking some commonly used forms of public-key encryption.
P versus NP problemP (complexity)Time complexityComputational complexity theory

Question 4: Italian scholar ________ was author of a seminal work on cryptanalysis "De Furtivis Literarum Notis".[1]
Accademia dei LinceiGiambattista della PortaScientific revolutionGalileo Galilei

Question 5: For example, in ________, the breaking of the Zimmermann Telegram was instrumental in bringing the United States into the war.
Caucasus CampaignArmenian GenocideWestern Front (World War I)World War I

Question 6: Related-key attacks are mostly theoretical, although they can be realistic in certain situations, for example, when constructing cryptographic hash functions using a ________.
Data Encryption StandardBlock cipherAvalanche effectAdvanced Encryption Standard

Question 7: ________ is the basic tool for breaking most classical ciphers.
Substitution cipherOne-time padFrequency analysisCaesar cipher

Question 8: Nevertheless, ________ (1791–1871) and later, independently, Friedrich Kasiski (1805–81) succeeded in breaking this cipher.
Isaac NewtonSir George Stokes, 1st BaronetGeorge Biddell AiryCharles Babbage

Question 9: WEP was later replaced by ________.
Wi-Fi Protected AccessPassword strengthIEEE 802.11i-2004Extensible Authentication Protocol

Question 10: Although the actual word "cryptanalysis" is relatively recent (it was coined by ________ in 1920), methods for breaking codes and ciphers are much older.
Enigma machineHebern rotor machineWilliam F. FriedmanNational Security Agency
















Got something to say? Make a comment.
Your name
Your email address
Message