Deck 2: Classical Encryption Techniques

Full screen (f)
exit full mode
Question
Monoalphabetic ciphers are easy to break because they reflect the frequency data of the original alphabet.
Use Space or
up arrow
down arrow
to flip the card.
Question
Steganography renders the message unintelligible to outsiders by various transformations of the text.
Question
Rotor machines are sophisticated precomputer hardware devices that use substitution techniques.
Question
When using symmetric encryption it is very important to keep the algorithm secret.
Question
A __________ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained.

A)brute-force
B)Caesar attack
C)ciphertext only
D)chosen plaintext
Question
__________ techniques map plaintext elements characters,bits)into ciphertext elements.

A)Transposition
B)Substitution
C)Traditional
D)Symmetric
Question
Joseph Mauborgne proposed an improvement to the Vernam cipher that uses a random key that is as long as the message so that the key does not need to be repeated.The key is used to encrypt and decrypt a single message and then is discarded.Each new message requires a new key of the same length as the new message.This scheme is known as an)__________ .

A)pascaline
B)one-time pad
C)polycipher
D)enigma
Question
Ciphertext generated using a computationally secure encryption scheme is impossible for an opponent to decrypt simply because the required information is not there.
Question
Symmetric encryption is a form of cryptosystem in which encryption and decryption are performed using different keys.It is also known as non- conventional encryption.
Question
The process of converting from plaintext to ciphertext is known as deciphering or decryption.
Question
The most widely used cipher is the Data Encryption Standard.
Question
The algorithm will produce a different output depending on the specific secret key being used at the time.The exact substitutions and transformations performed by the algorithm depend on the key.
Question
The one-time pad has unlimited utility and is useful primarily for high-bandwidth channels requiring low security.
Question
On average,half of all possible keys must be tried to achieve success with a brute-force attack.
Question
Restoring the plaintext from the ciphertext is __________ .

A)deciphering
B)transposition
C)steganography
D)encryption
Question
A scheme known as a one-time pad is unbreakable because it produces random output that bears no statistical relationship to the plaintext.
Question
Symmetric encryption remains by far the most widely used of the two types of encryption.
Question
As with Playfair,the strength of the Hill cipher is that it completely hides single letter frequencies.
Question
With the use of symmetric encryption,the principal security problem is maintaining the secrecy of the key.
Question
An original intelligible message fed into the algorithm as input is known as _________ ,while the coded message produced as output is called the __________ .

A)decryption,encryption
B)plaintext,ciphertext
C)deciphering,enciphering
D)cipher,plaintext
Question
__________ attacks exploit the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

A)Brute-force
B)Cryptanalytic
C)Block cipher
D)Transposition
Question
The __________ was used as the standard field system by the British Army in World War I and was used by the U.S.Army and other Allied forces during World War II.

A)Caesar cipher
B)Playfair cipher
C)Hill cipher
D)Rail Fence cipher
Question
__________ encryption is a form of cryptosystem in which encryption and decryption are performed using the same key.
Question
Cryptographic systems are characterized along three independent dimensions: The type of operations used for transforming plaintext to ciphertext;The way in which the plaintext is processed;and __________ .
Question
An encryption scheme is __________ secure if the ciphertext generated by the scheme does not contain enough information to determine uniquely the corresponding plaintext,no matter how much ciphertext is available.
Question
_________ refer to common two-letter combinations in the English language.

A)Streaming
B)Transposition
C)Digrams
D)Polyalphabetic cipher
Question
The methods of __________ conceal the existence of the message in a graphic image.

A)steganography
B)decryptology
C)cryptology
D)cryptography
Question
A way to improve on the simple monoalphabetic technique is to use different monoalphabetic substitutions as one proceeds through the plaintext message.The general name for this approach is ___________ .

A)rail fence cipher
B)cryptanalysis
C)polyalphabetic substitution cipher
D)polyanalysis cipher
Question
All encryption algorithms are based on two general principles: substitution and ____________ .
Question
Techniques used for deciphering a message without any knowledge of the enciphering details is ___________ .

A)blind deciphering
B)steganography
C)cryptanalysis
D)transposition
Question
A __________ cipher processes the input one block of elements at a time producing an output block for each input block whereas a __________ cipher processes the input elements continuously producing output one element at a time.
Question
If both sender and receiver use the same key,the system is referred to as:

A)public-key encryption
B)two-key
C)asymmetric
D)conventional encryption
Question
A technique for hiding a secret message within a larger document or picture in such a way that others cannot discern the presence or contents of the hidden message is __________ .
Question
An encryption scheme is said to be __________ if the cost of breaking the cipher exceeds the value of the encrypted information and the time required to break the cipher exceeds the useful lifetime of the information.
Question
The __________ attack is the easiest to defend against because the opponent has the least amount of information to work with.

A)ciphertext-only
B)chosen ciphertext
C)known plaintext
D)chosen plaintext
Question
One of the simplest and best known polyalphabetic ciphers is _________ cipher.In this scheme,the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25.Each cipher is denoted by a key letter which is the ciphertext letter that substitutes for the plaintext letter a.
Question
A technique referred to as a __________ is a mapping achieved by performing some sort of permutation on the plaintext letters.

A)transposition cipher
B)polyalphabetic cipher
C)Caesar cipher
D)monoalphabetic cipher
Question
The earliest known and simplest use of a substitution cipher was called the __________ cipher and involved replacing each letter of the alphabet with the letter standing three places further down the alphabet.
Question
The ___________ takes the ciphertext and the secret key and produces the original plaintext.It is essentially the encryption algorithm run in reverse.

A)Voronoi algorithm
B)decryption algorithm
C)cryptanalysis
D)diagram algorithm
Question
The two types of attack on an encryption algorithm are cryptanalysis based on properties of the encryption algorithm,and _________ which involves trying all possible keys.
Question
The simplest transposition cipher is the _________ technique in which the plaintext is written down as a sequence of diagonals and then read off as a sequence of rows.
Question
The task of making large quantities of random keys on a regular basis and distributing a key of equal length to both sender and receiver for every message sent are difficulties of the __________ scheme.
Question
The __________ consist of a set of independently rotating cylinders through which electrical pulses can flow.Each cylinder has 26 input pins and 26 output pins with internal wiring that connects each input pin to a unique output pin.
Question
The most widely used cipher ever is the __________ .
Question
The best known multiple letter encryption cipher is the __________ which treats digrams in the plaintext as single units and translates these units into ciphertext digrams.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Classical Encryption Techniques
1
Monoalphabetic ciphers are easy to break because they reflect the frequency data of the original alphabet.
True
2
Steganography renders the message unintelligible to outsiders by various transformations of the text.
False
3
Rotor machines are sophisticated precomputer hardware devices that use substitution techniques.
True
4
When using symmetric encryption it is very important to keep the algorithm secret.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
A __________ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained.

A)brute-force
B)Caesar attack
C)ciphertext only
D)chosen plaintext
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
__________ techniques map plaintext elements characters,bits)into ciphertext elements.

A)Transposition
B)Substitution
C)Traditional
D)Symmetric
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Joseph Mauborgne proposed an improvement to the Vernam cipher that uses a random key that is as long as the message so that the key does not need to be repeated.The key is used to encrypt and decrypt a single message and then is discarded.Each new message requires a new key of the same length as the new message.This scheme is known as an)__________ .

A)pascaline
B)one-time pad
C)polycipher
D)enigma
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Ciphertext generated using a computationally secure encryption scheme is impossible for an opponent to decrypt simply because the required information is not there.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Symmetric encryption is a form of cryptosystem in which encryption and decryption are performed using different keys.It is also known as non- conventional encryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
The process of converting from plaintext to ciphertext is known as deciphering or decryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
The most widely used cipher is the Data Encryption Standard.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
The algorithm will produce a different output depending on the specific secret key being used at the time.The exact substitutions and transformations performed by the algorithm depend on the key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
The one-time pad has unlimited utility and is useful primarily for high-bandwidth channels requiring low security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
On average,half of all possible keys must be tried to achieve success with a brute-force attack.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
Restoring the plaintext from the ciphertext is __________ .

A)deciphering
B)transposition
C)steganography
D)encryption
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
A scheme known as a one-time pad is unbreakable because it produces random output that bears no statistical relationship to the plaintext.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
Symmetric encryption remains by far the most widely used of the two types of encryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
As with Playfair,the strength of the Hill cipher is that it completely hides single letter frequencies.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
With the use of symmetric encryption,the principal security problem is maintaining the secrecy of the key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
An original intelligible message fed into the algorithm as input is known as _________ ,while the coded message produced as output is called the __________ .

A)decryption,encryption
B)plaintext,ciphertext
C)deciphering,enciphering
D)cipher,plaintext
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
__________ attacks exploit the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

A)Brute-force
B)Cryptanalytic
C)Block cipher
D)Transposition
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
The __________ was used as the standard field system by the British Army in World War I and was used by the U.S.Army and other Allied forces during World War II.

A)Caesar cipher
B)Playfair cipher
C)Hill cipher
D)Rail Fence cipher
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
__________ encryption is a form of cryptosystem in which encryption and decryption are performed using the same key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
Cryptographic systems are characterized along three independent dimensions: The type of operations used for transforming plaintext to ciphertext;The way in which the plaintext is processed;and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
An encryption scheme is __________ secure if the ciphertext generated by the scheme does not contain enough information to determine uniquely the corresponding plaintext,no matter how much ciphertext is available.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
_________ refer to common two-letter combinations in the English language.

A)Streaming
B)Transposition
C)Digrams
D)Polyalphabetic cipher
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
The methods of __________ conceal the existence of the message in a graphic image.

A)steganography
B)decryptology
C)cryptology
D)cryptography
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
A way to improve on the simple monoalphabetic technique is to use different monoalphabetic substitutions as one proceeds through the plaintext message.The general name for this approach is ___________ .

A)rail fence cipher
B)cryptanalysis
C)polyalphabetic substitution cipher
D)polyanalysis cipher
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
All encryption algorithms are based on two general principles: substitution and ____________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
Techniques used for deciphering a message without any knowledge of the enciphering details is ___________ .

A)blind deciphering
B)steganography
C)cryptanalysis
D)transposition
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
A __________ cipher processes the input one block of elements at a time producing an output block for each input block whereas a __________ cipher processes the input elements continuously producing output one element at a time.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
If both sender and receiver use the same key,the system is referred to as:

A)public-key encryption
B)two-key
C)asymmetric
D)conventional encryption
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
A technique for hiding a secret message within a larger document or picture in such a way that others cannot discern the presence or contents of the hidden message is __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
An encryption scheme is said to be __________ if the cost of breaking the cipher exceeds the value of the encrypted information and the time required to break the cipher exceeds the useful lifetime of the information.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
The __________ attack is the easiest to defend against because the opponent has the least amount of information to work with.

A)ciphertext-only
B)chosen ciphertext
C)known plaintext
D)chosen plaintext
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
One of the simplest and best known polyalphabetic ciphers is _________ cipher.In this scheme,the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25.Each cipher is denoted by a key letter which is the ciphertext letter that substitutes for the plaintext letter a.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
A technique referred to as a __________ is a mapping achieved by performing some sort of permutation on the plaintext letters.

A)transposition cipher
B)polyalphabetic cipher
C)Caesar cipher
D)monoalphabetic cipher
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The earliest known and simplest use of a substitution cipher was called the __________ cipher and involved replacing each letter of the alphabet with the letter standing three places further down the alphabet.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
The ___________ takes the ciphertext and the secret key and produces the original plaintext.It is essentially the encryption algorithm run in reverse.

A)Voronoi algorithm
B)decryption algorithm
C)cryptanalysis
D)diagram algorithm
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
The two types of attack on an encryption algorithm are cryptanalysis based on properties of the encryption algorithm,and _________ which involves trying all possible keys.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The simplest transposition cipher is the _________ technique in which the plaintext is written down as a sequence of diagonals and then read off as a sequence of rows.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
The task of making large quantities of random keys on a regular basis and distributing a key of equal length to both sender and receiver for every message sent are difficulties of the __________ scheme.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
The __________ consist of a set of independently rotating cylinders through which electrical pulses can flow.Each cylinder has 26 input pins and 26 output pins with internal wiring that connects each input pin to a unique output pin.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The most widely used cipher ever is the __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The best known multiple letter encryption cipher is the __________ which treats digrams in the plaintext as single units and translates these units into ciphertext digrams.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.