Quiz Answer Key and Fun Facts
1. One of the first cyphers used in the world was the so-called "Caesar cypher". In this cypher, each letter is replaced by the letter 3 after it in the alphabet, so A would become D, B would become E, and so on, until X became A, Y became B, and Z became C. Using this cypher, how would you encrypt the message "jinx"?
2. Now you receive a message encoded in the caesar cypher which states "Vrphergb khos ph". What is the decoded message?
3. The problem with the caesar cypher is that anyone who wants to, can decode it. One possibility to counteract this is to make the method of coding more secret, for example to translate all the letters forward by an unknown number of letters (known to you and the recipient, but not to anyone who intercepts the message in route. It could be 3 letters (like the caesar cypher), or it could be 25. Knowing this, what might the message "Aol mvya pz bukly haahjr" be decoded as?
4. Even using the method above, there are only 26 possible ciphers to be used (one of which doesn't even encrypt the message). A spy intercepting the message could just try all 26 and be done. To counteract this, some cryptologists suggested a code where the letters were rearranged entirely. Each letter would be assigned one other (possibly the same) letter, and every occurence of the original letter would be replaced by the new letter. "Good", for example, could be enciphered as "abbc", "pmma", "baad", or any other similar structure. Using this method, how many possible different ciphers could be used?
5. True or False? Because there are so many possible combinations for such a code (a "simple substitution cypher"), the code is virtually unbreakable.
6. You receive 400 pages of a secret document encoded by the method in 4. Looking at it, you notice that in the coded message the letter "C" appear 50 times in the 400 pages. Furthermore, all 50 times the "C" is immediately followed by a "M" in the coded message. What letter does the "M" probably represent?
7. The need for more secure cryptography blossomed in the 1830s and 1840s, as Samuel Morse and others developed what system that could be used to rapidly communicate messages over long distances?
8. One of the triumphs of modern cryptanalysis was the breaking of what cipher used by German U-Boats during World War II?
9. Although computers have made breaking codes much easier, they also have opened up horizons to many new ways of breaking codes. One of the codes used today, RSA, is based on computers being able to carry out operations with extremely large numbers. RSA's security is based upon the inability of an outsider to factor a large number into two of what kind of smaller numbers, numbers which cannot be written as the product of two numbers smaller than themselves?
10. Even RSA cryptography may not be safe. The mathematician Peter Shor has devised a way to factor large numbers incredibly quickly. Unfortunately, his method is as of yet impossible to implement, because it relies on the use of what kind of computer?
Source: Author
kevinatilusa
This quiz was reviewed by FunTrivia editor
bloomsby before going online.
Any errors found in FunTrivia content are routinely corrected through our feedback system.