Classical Cryptography Challenge

Classical Cryptography Challenge

University

25 Qs

quiz-placeholder

Similar activities

Tools and Shortcut Quiz - BSIS II A

Tools and Shortcut Quiz - BSIS II A

University

20 Qs

Cryptography Part 2

Cryptography Part 2

University

25 Qs

Unit-8 (QB64) Year-6

Unit-8 (QB64) Year-6

6th Grade - University

22 Qs

SYBAF Internal Practice Test

SYBAF Internal Practice Test

University

20 Qs

Decode the Tech Emoji

Decode the Tech Emoji

University

20 Qs

UJIAN AKHIR KELAS X.7

UJIAN AKHIR KELAS X.7

10th Grade - University

26 Qs

AISB223 Chapter 12: Confidentiality and Privacy Controls

AISB223 Chapter 12: Confidentiality and Privacy Controls

University

20 Qs

Exploring Cryptography Concepts

Exploring Cryptography Concepts

University

20 Qs

Classical Cryptography Challenge

Classical Cryptography Challenge

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Usman Ali

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the key shift in a Caesar cipher if the key is 3?

3 positions diagonal in the alphabet

1 position forward in the alphabet

3 positions forward in the alphabet

3 positions backward in the alphabet

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cipher uses a keyword to determine the letter substitution?

Caesar cipher

Vigenère cipher

Transposition cipher

Substitution cipher

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a Vigenère cipher, what is the length of the repeating key if the key is 'KEY'?

5

4

3

2

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the main characteristic of a Vernam cipher?

It encrypts data using a fixed key.

It uses a one-time pad for encryption.

It uses a symmetric key for encryption.

It relies on a public key infrastructure.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cipher is considered unbreakable when used correctly?

Caesar cipher

RSA encryption

Vigenère cipher

one-time pad

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a Playfair cipher, how are duplicate letters handled?

Duplicate letters in a digraph are handled by replacing the second letter with a filler letter, usually 'X'.

Duplicate letters are combined into a single letter.

Duplicate letters are ignored entirely.

Duplicate letters are replaced with the next letter in the alphabet.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary method of encryption in a Rail Fence cipher?

Zigzag pattern across multiple rails

Substitution of letters

Straight line encryption

Transposition of words

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?