What are classic cryptosystems studied in applied cryptography?
Substitution, transposition, codebooks, and one-time pad.
What is a simple substitution cipher?
A cipher that replaces each plaintext letter with another letter.
What is a Caesar cipher?
A substitution cipher using a fixed shift.
How many keys does a Caesar cipher have?
26 possible keys.
Why is Caesar cipher insecure?
Small keyspace allows brute force attacks.
What is brute force attack?
Trying all possible keys until the correct one is found.
What is exhaustive key search?
Systematically testing every possible key.
What is keyspace?
The set of all possible keys.
Why must keyspace be large?
To make brute force infeasible.
Is large keyspace sufficient for security?
No, ciphers can still be broken by clever attacks.
What is frequency analysis?
Using letter frequency statistics to break ciphers.
Why are substitution ciphers vulnerable?
They preserve letter frequency patterns.
What is language redundancy?
Natural languages contain predictable patterns.
How does redundancy help attackers?
It enables statistical cryptanalysis.
What is a monoalphabetic cipher?
Uses one substitution alphabet.
What is a polyalphabetic cipher?
Uses multiple substitution alphabets.
What is the Vigenère cipher?
A polyalphabetic substitution cipher using a repeating key.
What is the period in Vigenère?
The length of the key.
Why is Vigenère more secure than Caesar?
It obscures letter frequencies.
Is Vigenère unbreakable?
No, it can be broken using statistics.
What is the Kasiski test?
A method to find Vigenère key length.
How does Kasiski test work?
Finds repeated sequences and computes distances.
What is Index of Coincidence?
Probability two random letters are the same.
How is IC used?
To estimate key length.