Ancient Encryption
Medieval & Renaissance Encryption
World War II Encryption
Modern Encryption Techniques
Quantum Encryption
100

This ancient Greek king tattooed a secret message on a slave’s scalp to transmit military information.

Who is Histiaeus?

100

Device used in medieval Europe featuring rotating disks to encrypt messages.

What is Alberti’s cipher disk?

100

German encryption device famously decrypted by Allied forces during WWII.

What is the Enigma machine?

100

Widely-used symmetric encryption standard adopted in 2001 to replace DES.

What is AES (Advanced Encryption Standard)?

100

The property of quantum mechanics allowing particles to be in multiple states simultaneously.

What is superposition?

200

This simple substitution cipher shifts letters by a fixed number in the alphabet.

What is the Caesar cipher?

200

Renaissance diplomat known as the father of Western cryptography.

Who is Leon Battista Alberti?

200

British mathematician credited with breaking the Enigma cipher.

Who is Alan Turing?

200

Encryption method using two keys, a public key and a private key.

What is asymmetric encryption (public-key encryption)?

200

Quantum phenomenon where particles remain interconnected, instantly affecting each other over distance.

What is quantum entanglement?

300

Ancient Spartan cipher involving a rod of specific diameter around which a parchment is wrapped.

What is the Scytale cipher?

300

Cipher named after a French diplomat involving a table of alphabetically shifted rows.

What is the Vigenère cipher?

300

Japanese encryption system broken by U.S. cryptanalysts, significantly aiding the Battle of Midway.

What is JN-25?

300

Cryptosystem invented by Ron Rivest, Adi Shamir, and Leonard Adleman in 1977.

What is RSA encryption?

300

Encryption method using quantum mechanics principles, making eavesdropping detectable.

What is Quantum Key Distribution (QKD)?

400

Julius Caesar used a cipher shifting letters by how many positions?

What is 3?

400

Cipher used extensively by Mary, Queen of Scots, broken by cryptanalyst Thomas Phelippes.

What is the Babington Plot cipher?

400

American indigenous language used as a code by the U.S. military in WWII.

What is Navajo code (code talkers)?

400

The security protocol widely used to encrypt internet communications, replacing SSL.

What is TLS (Transport Layer Security)?

400

Protocol developed in 1984 for secure quantum communication.

What is BB84?

500

This ancient Egyptian writing system, once undecipherable, acted like an early form of symbolic encryption.

What are hieroglyphics?

500

Author who described early cryptographic methods in the 16th-century work "Polygraphiae."

Who is Johannes Trithemius?

500

Polish cryptologist who initially broke Enigma prior to WWII.

Who is Marian Rejewski?

500

Technique ensuring that data remains confidential, available, and unaltered during transmission.

What is end-to-end encryption?

500

Term describing the potential of quantum computers to break current cryptographic standards.

What is quantum cryptanalysis or quantum threat?