Chp 3 Cryptography Part 1

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/48

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

49 Terms

1
New cards

Q. What is the meaning of cryptography?

It means secret writing, from the Greek words.

“kryptos” (hidden)

“graphia” (writing).

2
New cards

Q. What does cryptography do?

It converts readable text (plaintext) into unreadable text (ciphertext) using an encryption process.

3
New cards

Q. What is the main purpose of cryptography?

To provide confidentiality, integrity, authentication, and non-repudiation in communication.

4
New cards

Q. What is confidentiality in cryptography?

Ensures that only authorized people can read the message.

5
New cards

Q. What is integrity in cryptography?

Ensures that a message is not modified during transmission.

6
New cards

Q. What is authentication in cryptography?

Verifies that the message is from a legitimate sender and is original.

7
New cards

Q. What is non-repudiation?

Prevents the sender from denying having sent the message later.

8
New cards

Q. What is plaintext?

The original readable message before encryption.

9
New cards

Q. What is ciphertext?

The encrypted or unreadable version of a plaintext message.

10
New cards

Q. What is encryption?

The process of converting plaintext into ciphertext.

11
New cards

Q. What is decryption?

The process of converting ciphertext back to plaintext.

12
New cards

Q. What is a key in cryptography?

A value used in encryption and decryption to control how data is transformed.

13
New cards

Q. What is cryptanalysis?

The process of breaking a cipher or finding the plaintext without knowing the key.

14
New cards

Q. What is cryptology?

The study that combines cryptography (creating ciphers) and cryptanalysis (breaking ciphers).

15
New cards

Q. What are the two types of cryptosystems?

Symmetric cryptosystem and asymmetric cryptosystem.

16
New cards

Q. What is a symmetric cryptosystem?

A system that uses the same key for both encryption and decryption.

17
New cards

Q. What is an asymmetric cryptosystem?

A system that uses two different keys:

  • encryption

  • decryption.

18
New cards

Q. What are the two main cipher types?

  • Bit stream cipher

  • Block cipher

19
New cards

Q. What is a bit stream cipher?

Encrypts one bit of plaintext at a time into a ciphertext bit.

20
New cards

Q. What is a block cipher?

Divides the message into blocks and encrypts each block using an algorithm and key.

21
New cards

Q. What are the two main classical cryptography techniques?

  • Substitution cipher

  • Transposition cipher

22
New cards

Q. What is a substitution cipher?

Replaces characters in plaintext with other characters or symbols.

23
New cards

Q. What is a transposition cipher?

Rearranges the order of characters in plaintext without changing them.

24
New cards

Q. Give examples of substitution ciphers.

  • Easy substitution

  • Homophonic substitution

  • Polyalphabetic

  • Polygram substitution.

25
New cards

Q. Give examples of transposition ciphers.

  • Columnar transposition

  • Rail fence

  • Vernam cipher

26
New cards

Q. What is a mono-alphabetic substitution cipher?

Each plaintext letter is replaced with one fixed ciphertext letter (e.g., Caesar Cipher).

27
New cards

Q. What is a homophonic substitution cipher?

One plaintext letter can map to multiple ciphertext symbols.

28
New cards

Q. What is a polyalphabetic cipher?

Uses multiple substitution alphabets (e.g., Vigenère Cipher).

29
New cards

Q. What is a polygram cipher?

Encrypts blocks of letters instead of individual letters (e.g., Playfair Cipher).

30
New cards

Q. How does the Caesar Cipher work?

Each letter in the plaintext is shifted by a fixed number of positions (e.g., +3).

31
New cards

Q. What is the encryption and decryption formula for Caesar Cipher?

Encryption: C = (P + K) mod 26

Decryption: P = (C - K) mod 26

32
New cards

Q. How many possible keys does the Caesar Cipher have?

26 possible keys (for 26 letters in the alphabet).

33
New cards

Q. Why is the Caesar Cipher considered weak?

It can easily be broken using brute force or frequency analysis.

34
New cards

Q. What is frequency analysis?

A method that analyzes letter frequency to guess the cipher pattern.

35
New cards

Q. What is a homophonic substitution cipher?

A cipher where one plaintext letter can correspond to several ciphertext letters.

36
New cards

Q. What is a polygram substitution cipher?

A cipher that replaces a group of letters with another group of letters.

37
New cards

Q. Give examples of polygram ciphers.

  • Playfair Cipher

  • Hill Cipher.

38
New cards

Q. What is the rule for pairs in the same row in Playfair Cipher?

Replace each letter with the one to its right (wrap to the start if needed).

39
New cards

Q. What is the rule for pairs in the same column in Playfair Cipher?

Replace each letter with the one below it (wrap to the top if needed).

40
New cards

Q. What is the rule for pairs forming a rectangle in Playfair Cipher?

Replace each letter with the one in the same row and the other’s column.

41
New cards

Q. What letter is used as a filler in Playfair Cipher when letters repeat?

The letter X.

42
New cards

Q. Give examples of polyalphabetic ciphers.

  • Vigenère Cipher

  • Beaufort Cipher.

43
New cards

Q. How does the Vigenère Cipher work?

It applies multiple Caesar Ciphers using a repeating key.

44
New cards

Q. Why is the Vigenère Cipher stronger than Caesar Cipher?

It reduces letter frequency patterns, making cryptanalysis harder.

45
New cards

Q. What does a transposition cipher do?

It rearranges letter positions to create ciphertext.

46
New cards

Q. Does transposition change letter frequencies?

No, the frequency remains the same as the plaintext.

47
New cards

Q. What is the Rail Fence Cipher?

A type of transposition cipher that writes text diagonally across rows.

48
New cards

Q. How do you read a Rail Fence Cipher?

After writing diagonally, read each row horizontally to form the ciphertext.

49
New cards

Q. How is Rail Fence Cipher decrypted?

Reconstruct the zigzag pattern and read horizontally.