14
CRYPTOGRAPHY TRIVIA Week three!

Cryptography Trivia

  • Upload
    taya

  • View
    67

  • Download
    0

Embed Size (px)

DESCRIPTION

Cryptography Trivia. Week three!. The Game. 8 groups of 2 6 rounds Ancient cryptosystems Newer cryptosystems Modern cryptosystems Encryption and decryptions Math Security and Performance 10 questions per round Each question is worth 1 point - PowerPoint PPT Presentation

Citation preview

Page 1: Cryptography Trivia

CRYPTOGRAPHY TRIVIAWeek three!

Page 2: Cryptography Trivia

The Game 8 groups of 2 6 rounds

Ancient cryptosystems Newer cryptosystems Modern cryptosystems Encryption and decryptions Math Security and Performance

10 questions per round Each question is worth 1 point Bonus Bingo: Fill in 25 things from this class

that you think are important. Mark them off if or when they come up.

Page 3: Cryptography Trivia

Ancient cryptosystems1. This cryptosystem has the encryption function

.2. This cryptosystem has the encryption function

.3. Name two ancient cryptosystems that are

resistant to frequency analysis.4. What is the term used to designate that a

cryptosystem encrypts several characters simultaneously?

5. What is the term used to designate that a key changes throughout the message encrypted?

Page 4: Cryptography Trivia

Ancient cryptosystems6. This cryptosystem has the encryption function

, but changes the key based on the previous plaintext.

7. This cryptosystem is unbreakable.8. In the above cryptosystem over , how many

possible keys are there for a 1024-bit message.

9. This cryptosystem requires exactly 7 known plaintext-ciphertext pairs to break.

10. This cryptosystem’s encryption function cannot be described by a “nice” mathematical equation.

Page 5: Cryptography Trivia

Newer cryptosystems1. This was the primary cryptosystem used by

the Germans during World War II.2. What was an advantage of the above

cryptosystem?3. What was a disadvantage of the above

cryptosystem?4. This was a cryptosystem used by the

Americans during World War II that was never broken.

5. What was an advantage of the above cryptosystem?

6. What was a disadvantage of the above cryptosystem?

Page 6: Cryptography Trivia

Newer cryptosystems7. What cryptosystem was the first major

cryptosystem to place its security just in the key?

8. This was the first algorithm released to the public that could enable Alice and Bob to establish cryptographic communication?

9. What algorithm relies on factoring for security?

10. What algorithm relies on the discrete logarithm problem for security?

Page 7: Cryptography Trivia

Modern cryptosystems1. This can replace RSA today.2. This might some day RSA in the future.3. This handles the vast majority of

cryptography today.4. In a war, if one side chooses to encrypt their

information with AES, what should the other side choose?

5. In Quantum teleportation, what is “teleported”?

Page 8: Cryptography Trivia

Modern cryptosystems6. Name all public-key systems we have

covered.7. In Quantum computing, this describes the

ability for a qubit to become 1 and 0 at the same time.

8. In Quantum computing, if two entangled qubits both have the value 0.5, what will they be when you observe them?

9. Will quantum computers make classical computers obsolete?

10. A 512 qubit quantum computer exists … why can’t it break 128-bit ECC?

Page 9: Cryptography Trivia

Math1. Find in 2. Find in 3. Find 4. Find mod 5. Find mod 6. Find in .7. Find in .8. Solve in .9. Solve and in simultaneously. 10. Which is a faster growth rate? or ?

Page 10: Cryptography Trivia

Encryption!1. Encrypt 7 using a rotation cipher over with

key .2. Encrypt 18 over using an affine cipher with

key .3. Encrypt 3 using RSA with and .4. Encrypt using an autokey cipher with starting

key over .5. XOR the string with .

Page 11: Cryptography Trivia

Decryption!6. Decrypt , which was encrypted with a vigenere cipher

using the key over . 7. Decrypt which is the output of the accompanying S-

box.8. Decrypt , which was encrypted with a one-time-pad

using the key over .9. Decrypt , which was encrypted using the substitution

cipher 10. Solve the discrete log problem mod 100.

S 0 1 2 30 1

112

13

14

1 15

16

17

18

2 19

20

21

22

Page 12: Cryptography Trivia

Security and performance

Key size

Keyspace

Encryption runtime

Decryption runtime

pairs needed

Resistant to Frequency Analysis?

Substitution over Rotation over Autokey over One-time-pad over Affine over Vigenere over Hill over

point for the first 9 correct point for the next 20 correct

1 point for each correct answer beyond 29(Rotation does not count)

(Assume you only ever store the encryption key and never modify it for quick decryption)

Page 13: Cryptography Trivia

CRYPTOGRAPHY TRIVIAThe End

Page 14: Cryptography Trivia

Reference Information Created in the summer of 2013 by Dr.

Jeffrey Beyerl for use in a cryptography class.

This is just a vanilla PowerPoint, but of course like anything you download from the internet: use at your own risk.