Understanding NSA Surveillance and Cryptography

Understanding NSA Surveillance and Cryptography

Assessment

Interactive Video

Mathematics, Computers

10th - 12th Grade

Hard

Created by

Emma Peterson

FREE Resource

The video discusses NSA surveillance and how it uses sophisticated mathematics, particularly clock arithmetic and elliptic curves, to read emails and secure communications. It explains modular arithmetic and its application in encryption, highlighting the importance of large prime numbers. The video also covers elliptic curve cryptography and the generation of random numbers, revealing how the NSA allegedly used a backdoor to predict outcomes of encryption algorithms. The video concludes with additional resources for further exploration.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary mathematical concept that NSA uses for surveillance?

Geometry

Trigonometry

Modular Arithmetic

Algebra

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why do we say 2:00 p.m. instead of 14:00 when adding 5 hours to 9:00 a.m.?

Because 14 is a prime number

Because 14 is not a valid time

Because 14 is 12 plus 2, and we use the remainder

Because 14 is an even number

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the significance of using a prime number in modular arithmetic for encryption?

It simplifies the arithmetic

It increases the complexity and security

It makes calculations faster

It reduces the number of possible solutions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of mathematical object is used in elliptic curve cryptography?

An elliptic curve

A parabola

A line

A circle

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of the dual elliptic curve deterministic random bits generator?

To decrypt messages

To calculate prime numbers

To generate random numbers for encryption

To encrypt emails directly

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the large prime number 'p' in the random number generator?

To decrypt the message

To encrypt the message

To scramble the output

To determine the size of the clock

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the NSA potentially exploit the random number generator?

By knowing the relation between two points

By using a faster computer

By changing the prime number

By using a different equation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?