History
Code vs. Cipher
Cyptonalysis
miscellaneous
100

He is credited with creating one of the earliest known encryption techniques, which involved shifting the alphabet by a set number of letters.

Who is Julius Caesar?

100

This mechanical encryption device used by Germany in WWII had a key space of 10^23.

What is the Enigma machine?

100

These are the three primary goals of cryptography.

What are confidentiality, integrity, and authenticity?

100

How many times does the digit '3' appear between the numbers 1 and 50?

14

200

These two individuals are often used in cryptography examples to represent the parties trying to communicate securely

Who are Alice and Bob?

200

This term refers to the original unencrypted message that needs to be sent securely.

What is plaintext?

200

This is the term for the practice of deciphering encrypted information without access to the secret key.

What is cryptanalysis?

200

27 is the number of days it takes this body to revolve around Earth.

Moon

300

This 'eavesdropper' represents the passive attacker who tries to listen in on communications between the good guys.

Who is Eve?

300

In symmetric-key cryptography, this is shared between two or more parties to allow them to maintain a private conversation.

What is a key?

300

This type of attack involves trying every possible key until the correct one is found.

What is a brute force attack?

300

Thailand shares borders with four nations. Which nation has the longest border with Thailand?

Myanmar

400

Named after a malicious character, this attacker is capable of not just intercepting, but also altering or creating fraudulent messages.

Who is Mallory?

400

Encrypt the plaintext message using the Caesar cipher with a right shift of 3: HELLO WORLD

KHOOR ZRUOG

400

In this type of analysis, the attacker makes use of the nature of the algorithm and the structure of the plaintext, like language properties, to uncover the plaintext.

What is statistical or frequency analysis?

400

โมเสสเอาสัตว์ขึ้นเรือตอนวันสิ้นโลกไปชนิดละกี่ตัว

0

500

This type of attack has the goal to discover the encryption key and decrypt the daata based on the information avaliable.

What is Mathematical Attacks ?

500

ถ้าคุณขับรถซึ่งบรรทุกคน 43 คนจากชิคาโกไปพิสเบอร์ก แล้วหยุดรับอีก 7 คนขึ้นมา แล้วหยุดจอดให้คนลงที่เคลเวอร์แลนด์ 5 คน จนมาถึงฟิลาเดอเฟียในอีก 20 ชั่วโมงต่อมา ถามว่าคนขับรถชื่ออะไร

It's you! (Your name)

M
e
n
u