Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Introduction to Cryptography – D334 Study Notes and Practice Questions

Rating
-
Sold
-
Pages
44
Grade
A+
Uploaded on
29-08-2025
Written in
2025/2026

Introduction to Cryptography – D334 Study Notes and Practice Questions

Institution
Course

Content preview

1. XOR the following
0101110101010111
1001100000111010
------------------: 1100010101101101
2. asymmetric key-based encryption
-typical methods: RSA DSA
El Gamal
3. Symmetric key-based encryption
-Typical Methods: RC2- 40 bit key size 64 bit block
RC4- (Stream Cipher)- Used in SSL and WEP
RC5- (Variable Key size, 32, 64, or 128 bit block size) AES- (128,
192 or 256 bit key size, 128 bit block size) DES- (56 bit key size. 64
bit Block size)
3DES- (112 bit key size, 64 bit block size)
4. Block Encryption: RC2(40 bit key size) RC5(Variable block
size)
IDEA DES
3DES
AES (Rijndael) Blowfish twofish
5. stream encryption: RC4
Chacha
6. Rainbow Attack: The method of knowing the mapping
between the hashed values and the original data

,7. Dictionary-type attack: a brute force analysis
8. : does not belong to
when an object is not in a set
9. : Belongs to
when an object is within a set
10. †
: subset
subset has fewer elements or equal to the set
11. A *B: union (objects that belong to set A or set B)
12. |: such that
13. A )B: Intersection: in both A and B
14. Enigma Machine -Cypher 10: Used a polyalphabetic
substitution cipher, which did not repeat within a reasonable time
period, along with a secret key. For the cracking of the Enigma
cipher, the challenge was thus to determine both the algorithm
used and the key. Enigma's main weakness, though, was that
none of the plain text letters could be ciphered as itself.
15. Four-square cipher9: Uses four 5 × 5 matrices arranged in a
square, are where each matrix contains 25 letters for encoding
and decoding operations.
16. One-time pad cypher8: Cypher Code mapping that is only
used once. Advantage: it is essentially unbreakable.
Disadvantage: it takes lots of work as you would have to generate
the pad to be used, each time.

,17. Vigenere Cipher 7: Polyalphabetic cipher that involves using
a different map- ping, based on a keyword, for each character of
the cipher. An advantage of this type of cipher is that the same
plaintext character is likely to be coded to different mappings,
depending on the position of the keyword, making guessing more
difficult.
18. Ceasar Cipher6: Mono-alphabetic substitution cipher known
as "shift" cipher. Involves plaintext being replaced by a letter some
fixed number of positions down the alphabet. i.e., a Caesar Cipher
using a shift of +3 would mean a plaintext letter A would result in
a ciphertext letter D (a shift of three positions to the right in the
alphabet)
19. Morse Code cipher 5: Encoding method, rather than a cipher,
that works by translating characters into sequences of dots (.) and
dashes (-)
20. Playfair Cipher 4: 5 × 5 matrix containing the alphabet less
the letter J. Ci- pher/decipher process consists of a set of rules
outlining use of column and row combinations.
21. BIFID Cipher 3: Makes use of a grid and which maps the
letters into numeric values.
22. Rail Code Cipher 2: Employs a method to scramble text by
writing it in a sequence across a number of rails.

, 23. Pig Pen Cipher 1: Mono- alphabetic substitution cipher that
makes use of mapping plaintext characters to graphical characters
rather than to alphabetic ones. i.e. A=(pick a symbol), vs A=(pick a
letter). Disadvantage: once the mapping is known, it is difficult to
keep the message secret.
24. Encryption: in simplest terms is changing plaintext into
ciphertext
25. Decryption: The process of converting a ciphertext into
plaintext.
26. AESCrypt: Encrypt individual files and encrypt full disks with
options such as
Bitlocker and FileVault
27. Mono-alphabetic: c code or substitution is where a single
mapping from our alphabet to a cipher alphabet is created. Many
early cryptosystems used this.
28. Polyalphabetic: refers to the mapping of our alphabet to a
number of cipher alphabets. This approach added a bit of
complexity to early cryptosystems.

Written for

Institution
Course

Document information

Uploaded on
August 29, 2025
Number of pages
44
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Stuviaaa Grand Canyon University
Follow You need to be logged in order to follow users or courses
Sold
809
Member since
4 year
Number of followers
522
Documents
1508
Last sold
3 weeks ago

4.2

176 reviews

5
113
4
27
3
13
2
5
1
18

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions