Emoji's are an example of this.
A code.
Encryption with two keys
Symmetric
What do we call a "person who analyzes and reads secret communications without knowledge of the system used."?
A cryptanalyst
What was the name of Germany's crypto machine?
Enigma
Which developed DES?
IBM and the government
Another word for "Peer-reviewed"
Open Source
The process of 'breaking' a code
Cryptanalysis
Who solved over 12,000 messages for law enforcement, including helping to indict Al Capone?
Elezbeth Friedman
What was the name of Japan's WWII code?
The PURPLE code
When did people begin thinking DES's key was too small?
As soon as it was developed!
What is the output of encryption.
Ciphertext
Encryption that shifts letters
Ceasar's Cipher
What do we call a list of numbers that correlate to a list of words?
a code book
What famous mathematician helped break the German's code?
Alan Turing
How was AES developed?
Independently, chosen from submissions.
"The enemy knows the system"
Shannon's maxim.
Encryption using a wheel to have different substitutions
Vignere's Cypher
What was the name of the WW1 telegram?
Zimmerman
What event helped the Allies break the German code?
Someone sent the same message twice!
What do we call a key that gets repeatedly hashed to create a lonnnnnnnnnnnnger key?
Key Stream
Positive proof that a message came froma party; thus they can't deny it came from them.
Nonrepudiation.
Term that defines the different conditions data can be in : in storage, being processed, being sent, etc
states
What encryption system did Francis Bacon create?
The Biliteral Cypher
What type of crypto devices appeared in teh early 20th century?
electromechanical
What is a PRNG?
Psudeo-random number generator