FREE! Click here to Join FunTrivia. Thousands of games, quizzes, and lots more!
Quiz about Introduction to Cryptography and its History
Quiz about Introduction to Cryptography and its History

Introduction to Cryptography and its History Quiz


In some sense cryptography can be viewed as a battle. New technology allows new codes to be made, but also allows new methods of breaking codes. This quiz traces some of the history of these codes, from Caesar to today's modern algorithms.

A multiple-choice quiz by kevinatilusa. Estimated time: 6 mins.
  1. Home
  2. »
  3. Quizzes
  4. »
  5. World Trivia
  6. »
  7. Global Trivia
  8. »
  9. Espionage & Codebreaking

Author
kevinatilusa
Time
6 mins
Type
Multiple Choice
Quiz #
81,028
Updated
Dec 08 23
# Qns
10
Difficulty
Average
Avg Score
6 / 10
Plays
924
Awards
Top 35% Quiz
- -
Question 1 of 10
1. One of the first cyphers used in the world was the so-called "Caesar cypher". In this cypher, each letter is replaced by the letter 3 after it in the alphabet, so A would become D, B would become E, and so on, until X became A, Y became B, and Z became C. Using this cypher, how would you encrypt the message "jinx"?

Answer: (One Word)
Question 2 of 10
2. Now you receive a message encoded in the caesar cypher which states "Vrphergb khos ph". What is the decoded message?

Answer: (3 words, no punctuation)
Question 3 of 10
3. The problem with the caesar cypher is that anyone who wants to, can decode it. One possibility to counteract this is to make the method of coding more secret, for example to translate all the letters forward by an unknown number of letters (known to you and the recipient, but not to anyone who intercepts the message in route. It could be 3 letters (like the caesar cypher), or it could be 25. Knowing this, what might the message "Aol mvya pz bukly haahjr" be decoded as?

Answer: ((5 Words) What common three letter words could aol be?)
Question 4 of 10
4. Even using the method above, there are only 26 possible ciphers to be used (one of which doesn't even encrypt the message). A spy intercepting the message could just try all 26 and be done. To counteract this, some cryptologists suggested a code where the letters were rearranged entirely. Each letter would be assigned one other (possibly the same) letter, and every occurence of the original letter would be replaced by the new letter. "Good", for example, could be enciphered as "abbc", "pmma", "baad", or any other similar structure. Using this method, how many possible different ciphers could be used? Hint


Question 5 of 10
5. True or False? Because there are so many possible combinations for such a code (a "simple substitution cypher"), the code is virtually unbreakable.


Question 6 of 10
6. You receive 400 pages of a secret document encoded by the method in 4. Looking at it, you notice that in the coded message the letter "C" appear 50 times in the 400 pages. Furthermore, all 50 times the "C" is immediately followed by a "M" in the coded message. What letter does the "M" probably represent?

Answer: (One letter)
Question 7 of 10
7. The need for more secure cryptography blossomed in the 1830s and 1840s, as Samuel Morse and others developed what system that could be used to rapidly communicate messages over long distances? Hint


Question 8 of 10
8. One of the triumphs of modern cryptanalysis was the breaking of what cipher used by German U-Boats during World War II? Hint


Question 9 of 10
9. Although computers have made breaking codes much easier, they also have opened up horizons to many new ways of breaking codes. One of the codes used today, RSA, is based on computers being able to carry out operations with extremely large numbers. RSA's security is based upon the inability of an outsider to factor a large number into two of what kind of smaller numbers, numbers which cannot be written as the product of two numbers smaller than themselves? Hint


Question 10 of 10
10. Even RSA cryptography may not be safe. The mathematician Peter Shor has devised a way to factor large numbers incredibly quickly. Unfortunately, his method is as of yet impossible to implement, because it relies on the use of what kind of computer? Hint



(Optional) Create a Free FunTrivia ID to save the points you are about to earn:

arrow Select a User ID:
arrow Choose a Password:
arrow Your Email:




Quiz Answer Key and Fun Facts
1. One of the first cyphers used in the world was the so-called "Caesar cypher". In this cypher, each letter is replaced by the letter 3 after it in the alphabet, so A would become D, B would become E, and so on, until X became A, Y became B, and Z became C. Using this cypher, how would you encrypt the message "jinx"?

Answer: mlqa

J is replaced by m since m is three letters after j. Similarly, i is replaced by l and n by q. To go three letters after x, we loop around and get back to a.
2. Now you receive a message encoded in the caesar cypher which states "Vrphergb khos ph". What is the decoded message?

Answer: Somebody help me

If you encode a message by going 3 letters later in the alphabet, you decode it by undoing that and going back 3 letters. V goes back to S, R goes back to O and so on. To go back 3 letters from B, you wrap back around the alphabet.
3. The problem with the caesar cypher is that anyone who wants to, can decode it. One possibility to counteract this is to make the method of coding more secret, for example to translate all the letters forward by an unknown number of letters (known to you and the recipient, but not to anyone who intercepts the message in route. It could be 3 letters (like the caesar cypher), or it could be 25. Knowing this, what might the message "Aol mvya pz bukly haahjr" be decoded as?

Answer: The fort is under attack

The key is to look at one of the short words ... trying some common three letter words as aol, we see that if "the" is moved forward 7 letters, we get aol. After that, decryption is fairly easy.
4. Even using the method above, there are only 26 possible ciphers to be used (one of which doesn't even encrypt the message). A spy intercepting the message could just try all 26 and be done. To counteract this, some cryptologists suggested a code where the letters were rearranged entirely. Each letter would be assigned one other (possibly the same) letter, and every occurence of the original letter would be replaced by the new letter. "Good", for example, could be enciphered as "abbc", "pmma", "baad", or any other similar structure. Using this method, how many possible different ciphers could be used?

Answer: about 4 times 10 to the 26th (400 septillion American, 400 quadrillion European)

Obviously, it is no longer possible for the enemy to simply try every possible method of decoding the message. Nevertheless... (see next answer)
5. True or False? Because there are so many possible combinations for such a code (a "simple substitution cypher"), the code is virtually unbreakable.

Answer: False

This may seem surprising, until you think about it. The key is to use what is called frequency analysis. Some letters are used more in any language than others are (In english, for example, e is used more often than any other letter). If e is always replaced by the same letter, than the letter which occurs most often in the coded message is probably the one that e is replaced by.

Many letters don't appear as double letters, further narrowing things down. Finally, if a 3 letter word appears 25 or 30 times a page, odds are its "the".
6. You receive 400 pages of a secret document encoded by the method in 4. Looking at it, you notice that in the coded message the letter "C" appear 50 times in the 400 pages. Furthermore, all 50 times the "C" is immediately followed by a "M" in the coded message. What letter does the "M" probably represent?

Answer: U

It is likely that C represents the letter Q, both because it occurs so rarely and because it is always followed by the same letter. Given that, the M simply has to represent the U. This code isn't nearly as secure as it seems at first glance! To counteract this, some mathematicians in the 15th to 16th century created codes which change over the course of a message. M may represent U in one sentence, but it may represent T in the sentence after it.

This makes the code much more difficult to break, though not impossible.
7. The need for more secure cryptography blossomed in the 1830s and 1840s, as Samuel Morse and others developed what system that could be used to rapidly communicate messages over long distances?

Answer: Telegraph

Telegraphs enabled people to send messages at a much faster rate over much longer distances than horses and riders. Unfortunately, they were also much more vulnerable to eavesdropping. If military commanders were to use this new method of communication, they needed a way to make sure their secret plans stayed secret.
8. One of the triumphs of modern cryptanalysis was the breaking of what cipher used by German U-Boats during World War II?

Answer: Enigma

This also marked one of the first uses of (primitive) computers to break codes ... Alan Turing was one of the chief mathematicians on site. Even though the British knew a method of breaking the code, the Germans were able to thwart their efforts somewhat by changing the code slightly each day.

It would take the British and their computers half a morning (or sometimes more) to break the new code, so messages were safe ... for an hour or two, at least.
9. Although computers have made breaking codes much easier, they also have opened up horizons to many new ways of breaking codes. One of the codes used today, RSA, is based on computers being able to carry out operations with extremely large numbers. RSA's security is based upon the inability of an outsider to factor a large number into two of what kind of smaller numbers, numbers which cannot be written as the product of two numbers smaller than themselves?

Answer: Prime Numbers

Basically RSA works as follows: Each person published what is known as a public key, a number that is known to everyone. Messages are converted to series of numbers, and each number is taken to the power of the public key. The only (practical) way to undo this operation is to take the numbers in the coded message to a certain other power.

The only way you can know this number is by knowing the factorization of the public key. What makes this code special is that even the person who encodes this message doesn't know how to decode it.

It is (for now) secure in that even eavesdroppers can't decode it.
10. Even RSA cryptography may not be safe. The mathematician Peter Shor has devised a way to factor large numbers incredibly quickly. Unfortunately, his method is as of yet impossible to implement, because it relies on the use of what kind of computer?

Answer: Quantum Computer

Quantum computers were first suggested by Richard Feynmann (of "Surely you're joking!" and bongo drum fame). Shor's method relies on a quantum computer being able to store much more information at a time (as a superposition of a large number of what are known as "Quantum states"). All is not lost, however.

Other people have suggested methods of using quantum mechanics to create even more secure codes. The battle goes on!
Source: Author kevinatilusa

This quiz was reviewed by FunTrivia editor bloomsby before going online.
Any errors found in FunTrivia content are routinely corrected through our feedback system.
Related Quizzes
1. WWII Codenames and Nicknames Tough
2. Enigma and Bletchley Park Codebreakers Average
3. WW2 Code Names Average
4. WW II, Spying 123 Average
5. Spies And Spy Agencies Tough
6. Codebreaking in WWII Tough
7. Espionage Difficult
8. Alphabet Soup Difficult
9. The Real 'Windtalkers' Average
10. Can You Crack the Code? Difficult
11. Soviet Spies Average
12. Psst, Wanna Hear a Secret? Average

11/21/2024, Copyright 2024 FunTrivia, Inc. - Report an Error / Contact Us