General
Symmetric
Breaking Codes
WWII
Modern Crypto
100

Emoji's are an example of this.

A code.


100

Encryption with two keys

Symmetric

100

What do we call a "person who analyzes and reads     secret communications without knowledge of the system used."?

A cryptanalyst

100

What was the name of Germany's crypto machine?

Enigma

100

Which developed DES?

IBM and the government

200

Another word for "Peer-reviewed"

Open Source

200

The process of 'breaking' a code

Cryptanalysis

200

Who solved over 12,000 messages for law enforcement, including helping to indict Al Capone?

Elezbeth Friedman

200

What was the name of Japan's WWII code?

The PURPLE code

200

When did people begin thinking DES's key was too small?

As soon as it was developed!

300

What is the output of encryption.

Ciphertext

300

Encryption that shifts letters

Ceasar's Cipher

300

What do we call a list of numbers that correlate to a list of words?

a code book


300

What famous mathematician helped break the German's code?

Alan Turing

300

How was AES developed?

Independently, chosen from submissions.

400

"The enemy knows the system"

Shannon's maxim.

400

Encryption using a wheel to have different substitutions

Vignere's Cypher

400

What was the name of the WW1 telegram?

Zimmerman

400

What event helped the Allies break the German code?

Someone sent the same message twice!

400

What do we call a key that gets repeatedly hashed to create a lonnnnnnnnnnnnger key?

Key Stream

500

Positive proof that a message came froma  party; thus they can't deny it came from them.

Nonrepudiation.

500

Term that defines the different conditions data can be in : in storage, being processed, being sent, etc

states

500

What encryption system did Francis Bacon create?

The Biliteral Cypher

500

What type of crypto devices appeared in teh early 20th century?

electromechanical

500

What is a PRNG?

Psudeo-random number generator

M
e
n
u