FREE Codebusters Cryptography Theory and History Questions and Answers
In the RSA encryption algorithm, which of the following is used as the public key?
In RSA encryption, the public key consists of two numbers: the exponent (often denoted as "e") and the modulus (often denoted as "n"). These are used by anyone who wants to encrypt a message that can later be decrypted by the recipient using their private key.
Which of the following is a classic example of a substitution cipher?
The Caesar cipher is a classic example of a substitution cipher, where each letter in the plaintext is shifted a certain number of places down the alphabet. For example, a shift of 3 would turn "A" into "D," "B" into "E," etc.
What is the primary purpose of the Enigma machine during World War II?
The Enigma machine was used by the German military to encode and decode messages during World War II. The machine used a series of rotating wheels to create complex encryption, which was thought to be unbreakable at the time. Allied cryptographers, including Alan Turing, famously broke the code, which played a crucial role in the war.
Who is known as the "father of modern cryptography"?
Claude Shannon is regarded as the father of modern cryptography. His groundbreaking work during World War II laid the foundation for much of the cryptographic theory used today, including concepts like entropy, confusion, and diffusion in encryption algorithms.
Which ancient civilization is credited with using one of the earliest known cryptographic techniques, the "scytale cipher"?
The scytale cipher was used by the ancient Greeks, particularly in military contexts. It involved wrapping a strip of parchment around a rod and writing a message along the rod's length. When unwrapped, the message appeared as a jumbled series of letters, which could only be read by wrapping the parchment around a rod of the same diameter.