The Full Wiki

History of cryptography: Quiz

  
  
  

Question 1: DES, and more secure variants of it (such as ________; see FIPS 46-3), are still used today, having been incorporated into many national and organizational standards.
Triple DESCOCONUT98Advanced Encryption StandardData Encryption Standard

Question 2: By ________, mechanical and electromechanical cipher machines were in wide use, although — where such machines were impractical — manual systems continued in use.
Collaboration with the Axis Powers during World War IISecond Sino-Japanese WarWorld War IISoviet occupations

Question 3: And with that, cryptography more or less disappeared into secret government communications organizations such as NSA, ________, and their equivalents elsewhere.
MI5Defence Intelligence StaffGovernment Communications HeadquartersSecret Intelligence Service

Question 4: Until recent decades, it has been the story of what might be called ________ — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids.
Frequency analysisCaesar cipherClassical cipherSubstitution cipher

Question 5: Another Greek method was developed by ________ (now called the "Polybius Square").
Ancient GreeceSpartaAlexander the GreatPolybius

Question 6: Two events have since brought it squarely into the public domain: the creation of a public encryption standard (DES); and the invention of ________.
Public-key cryptographyRSAPublic key infrastructureDiffie–Hellman key exchange

Question 7: Cryptography in Japan seems not to have been used until about 1510, and advanced techniques were not known until after the opening of the country to the West beginning in the ________.
19th century18611860s1865

Question 8: As recently as 2004, former FBI Director Louis Freeh, testifying before the ________, called for new laws against public use of encryption.
September 11 attacksAmerican Airlines Flight 779/11 conspiracy theories9/11 Commission

Question 9: The British eventually settled on '________' for intelligence resulting from cryptanalysis, particularly that from message traffic protected by the various Enigmas.
Biuro SzyfrówEnigma machineUltraMarian Rejewski

Question 10: British SOE agents initially used 'poem ciphers' (memorized poems were the encryption/decryption keys), but later in the War, they began to switch to ________.
Caesar cipherScytaleOne-time padSubstitution cipher
















Got something to say? Make a comment.
Your name
Your email address
Message