Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

EC-Council Certified Encryption Specialist (ECES) (2022/2023) Already Passed

Rating
-
Sold
-
Pages
86
Grade
A+
Uploaded on
05-09-2023
Written in
2023/2024

EC-Council Certified Encryption Specialist (ECES) (2022/2023) Already Passed What is cryptography? Noun - A) The process or skill of communicating in or deciphering secret writings or ciphers B) Secret writing Origin - Cryptography (or cryptology); derived from word kryptos which means "hidden", and grafo, which means "write", is the study of message secrecy Definition- Cryptography is the science of altering communication so that it cannot be understood without having the key Interloper a person who becomes involved in a place or situation where they are not wanted or are considered not to belong. History of cryptography A) Hidden or secret writing is very old: People have been practicing hidden writing for at least 3,000 years

Show more Read less
Institution
Course

Content preview

EC-Council Certified Encryption
Specialist (ECES) (2022/2023) Already
Passed
What is cryptography? ✔✔Noun -


A) The process or skill of communicating in or deciphering secret writings or ciphers

B) Secret writing

Origin -

Cryptography (or cryptology); derived from word kryptos which means "hidden", and grafo,

which means "write", is the study of message secrecy

Definition-

Cryptography is the science of altering communication so that it cannot be understood without

having the key




Interloper ✔✔a person who becomes involved in a place or situation where they are not wanted

or are considered not to belong.




History of cryptography ✔✔A) Hidden or secret writing is very old: People have been practicing

hidden writing for at least 3,000 years.

,B) Until the latter part of the 20th century, cryptography was almost exclusively used by military

and government




Mono-Alphabetic Substitution ✔✔A) Most primitive cryptographic algorithms


B) Substitute one character of cipher text for each character of plain text

C) Caesar Cipher, Atbash Cipher, Affine Cipher, Rot13 Cipher




Caesar Cipher ✔✔A) First used by Julius Caesar


B) Every letter is shifted a fixed number of spaces to the left or the right in the alphabet

C) The shifting is the "key" for this algorithm

D) The shift is often called the "alphabet" being used.

Example "I Like Computers" shift 1 to left becomes "H Khjd Bnlotsdqr"

**Most common single-letter word is "A" and most common three-letter word is "the". Most

common two-letter combinations are "EE" and "OO"**

E) 128-bit number from AES (Advanced Encryption Standard)




Atbash Cipher ✔✔A) Hebrew Code that reverses alphabet. Example "A" becomes "Z", "B"

becomes "Y"... "A cat sleeps" becomes "Z "xzg hovvkh"

B) Used by Hebrew scribes copying the book of Jeremiah

,C) Simple cipher not used in modern times




Affine Cipher ✔✔any single-substitution alphabet cipher (also called mono-alphabet

substitution) in which each letter in the alphabet is mapped to some numeric value, permuted

with some relatively simple mathematical function, and then converted back to a letter

Example**in Caesar cipher, each letter is converted to a number, shifted by a certain amount,

and converted back to a letter**

Basic formula for affine cipher is "ax + b (modM)

M= size of alphabet = 26

x= plain text letter's numeric equivalent

b= shift

a= some multiple, in Caesar cipher = 1

Caesar cipher (using affine cipher)

1x + shift (mod26)




Rot13 Cipher ✔✔similar to Caesar cipher, but all letters are rotated 13 spots


Example "A CAT" becomes "N PNG"




Scytale ✔✔A) Cylinder tool used by the Greeks and often specifically attributed to the Spartans

, B) Used to encrypt messages

C) Turning the cylinder produced different cipher texts

D) First used in 7th century BC by Greek poet Archilochus

E) Writer of message wraps parchment around a rod

F) Recipient uses a rod of the same diameter as one used to create message

G) Requires both parties to have same size rod, and same leather "key"




Single Substitution Weaknesses ✔✔A) Easy to break


B) Easily susceptible to brute force attacks, even by low end computers




Multi-Alphabet Substitution ✔✔A) Also called "Poly-Alphabet Substitution"


B) Use of more than 1 alphabet in a cipher. (to make ciphers like Caesar and Atbash more

secure)

Example: With +1 -1 +2 since you add 1 to the first letter, subtract 1 from the second letter, add

2 to the third letter, resets on the fourth letter... "A CAT" becomes "B BCA"

C) Examples of "Poly-Alphabet Substitution" ciphers are: Cipher Disk, Vigenere, and Enigma

Machine




Cipher Disk ✔✔A) Uses a physical device to encrypt (like scytale)

Written for

Course

Document information

Uploaded on
September 5, 2023
Number of pages
86
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LearnWithLeo Havard college
Follow You need to be logged in order to follow users or courses
Sold
2602
Member since
2 year
Number of followers
13
Documents
6193
Last sold
3 days ago

4.8

218 reviews

5
195
4
15
3
5
2
2
1
1

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions