100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
EC-Council Certified Encryption Specialist (ECES) (2022/2023) Already Passed $10.99   Add to cart

Exam (elaborations)

EC-Council Certified Encryption Specialist (ECES) (2022/2023) Already Passed

 1 view  0 purchase
  • Course
  • Institution

EC-Council Certified Encryption Specialist (ECES) (2022/2023) Already Passed What is cryptography? Noun - A) The process or skill of communicating in or deciphering secret writings or ciphers B) Secret writing Origin - Cryptography (or cryptology); derived from word kryptos which means "hidd...

Preview 4 out of 86  pages

  • September 5, 2023
  • 86
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
EC-Council Certified Encryption
Specialist (ECES) (2022/2023) Already
Passed
What is cryptography? ✔✔Noun -


A) The process or skill of communicating in or deciphering secret writings or ciphers

B) Secret writing

Origin -

Cryptography (or cryptology); derived from word kryptos which means "hidden", and grafo,

which means "write", is the study of message secrecy

Definition-

Cryptography is the science of altering communication so that it cannot be understood without

having the key




Interloper ✔✔a person who becomes involved in a place or situation where they are not wanted

or are considered not to belong.




History of cryptography ✔✔A) Hidden or secret writing is very old: People have been practicing

hidden writing for at least 3,000 years.

,B) Until the latter part of the 20th century, cryptography was almost exclusively used by military

and government




Mono-Alphabetic Substitution ✔✔A) Most primitive cryptographic algorithms


B) Substitute one character of cipher text for each character of plain text

C) Caesar Cipher, Atbash Cipher, Affine Cipher, Rot13 Cipher




Caesar Cipher ✔✔A) First used by Julius Caesar


B) Every letter is shifted a fixed number of spaces to the left or the right in the alphabet

C) The shifting is the "key" for this algorithm

D) The shift is often called the "alphabet" being used.

Example "I Like Computers" shift 1 to left becomes "H Khjd Bnlotsdqr"

**Most common single-letter word is "A" and most common three-letter word is "the". Most

common two-letter combinations are "EE" and "OO"**

E) 128-bit number from AES (Advanced Encryption Standard)




Atbash Cipher ✔✔A) Hebrew Code that reverses alphabet. Example "A" becomes "Z", "B"

becomes "Y"... "A cat sleeps" becomes "Z "xzg hovvkh"

B) Used by Hebrew scribes copying the book of Jeremiah

,C) Simple cipher not used in modern times




Affine Cipher ✔✔any single-substitution alphabet cipher (also called mono-alphabet

substitution) in which each letter in the alphabet is mapped to some numeric value, permuted

with some relatively simple mathematical function, and then converted back to a letter

Example**in Caesar cipher, each letter is converted to a number, shifted by a certain amount,

and converted back to a letter**

Basic formula for affine cipher is "ax + b (modM)

M= size of alphabet = 26

x= plain text letter's numeric equivalent

b= shift

a= some multiple, in Caesar cipher = 1

Caesar cipher (using affine cipher)

1x + shift (mod26)




Rot13 Cipher ✔✔similar to Caesar cipher, but all letters are rotated 13 spots


Example "A CAT" becomes "N PNG"




Scytale ✔✔A) Cylinder tool used by the Greeks and often specifically attributed to the Spartans

, B) Used to encrypt messages

C) Turning the cylinder produced different cipher texts

D) First used in 7th century BC by Greek poet Archilochus

E) Writer of message wraps parchment around a rod

F) Recipient uses a rod of the same diameter as one used to create message

G) Requires both parties to have same size rod, and same leather "key"




Single Substitution Weaknesses ✔✔A) Easy to break


B) Easily susceptible to brute force attacks, even by low end computers




Multi-Alphabet Substitution ✔✔A) Also called "Poly-Alphabet Substitution"


B) Use of more than 1 alphabet in a cipher. (to make ciphers like Caesar and Atbash more

secure)

Example: With +1 -1 +2 since you add 1 to the first letter, subtract 1 from the second letter, add

2 to the third letter, resets on the fourth letter... "A CAT" becomes "B BCA"

C) Examples of "Poly-Alphabet Substitution" ciphers are: Cipher Disk, Vigenere, and Enigma

Machine




Cipher Disk ✔✔A) Uses a physical device to encrypt (like scytale)

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TUTORSON. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77016 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart