Classical Cryptography Challenge

Classical Cryptography Challenge

University

25 Qs

quiz-placeholder

Similar activities

DATABASE DESIGN MANAGEMENT SYSTEMS

DATABASE DESIGN MANAGEMENT SYSTEMS

University

25 Qs

Pyhton Debugging Questions

Pyhton Debugging Questions

University

25 Qs

HAWKIN'S HUNT ROUND -1 QUIZ

HAWKIN'S HUNT ROUND -1 QUIZ

University

30 Qs

Normalization with ERD

Normalization with ERD

University

20 Qs

PRE-TEST JAVA GUI (A)

PRE-TEST JAVA GUI (A)

University

20 Qs

SPC UNIT I

SPC UNIT I

University

20 Qs

E-commerce Business Models Quiz

E-commerce Business Models Quiz

University

20 Qs

Skills of an Administrator Assessment

Skills of an Administrator Assessment

12th Grade - University

20 Qs

Classical Cryptography Challenge

Classical Cryptography Challenge

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Usman Ali

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the key shift in a Caesar cipher if the key is 3?

3 positions diagonal in the alphabet

1 position forward in the alphabet

3 positions forward in the alphabet

3 positions backward in the alphabet

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cipher uses a keyword to determine the letter substitution?

Caesar cipher

Vigenère cipher

Transposition cipher

Substitution cipher

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a Vigenère cipher, what is the length of the repeating key if the key is 'KEY'?

5

4

3

2

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the main characteristic of a Vernam cipher?

It encrypts data using a fixed key.

It uses a one-time pad for encryption.

It uses a symmetric key for encryption.

It relies on a public key infrastructure.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cipher is considered unbreakable when used correctly?

Caesar cipher

RSA encryption

Vigenère cipher

one-time pad

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a Playfair cipher, how are duplicate letters handled?

Duplicate letters in a digraph are handled by replacing the second letter with a filler letter, usually 'X'.

Duplicate letters are combined into a single letter.

Duplicate letters are ignored entirely.

Duplicate letters are replaced with the next letter in the alphabet.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary method of encryption in a Rail Fence cipher?

Zigzag pattern across multiple rails

Substitution of letters

Straight line encryption

Transposition of words

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?