Question

Security is the name of the game for modern computer systems. Answer the following about securing systems with cryptography, for 10 points each.
[10e] In cryptography, encryption transforms plaintext into “text” described by this word. This general word for methods of encryption names versions like the substitution, Playfair, and Atbash.
ANSWER: cipher [or cypher; accept ciphertext; accept substitution cipher; accept Playfair cipher; accept Atbash cipher]
[10h] This algorithm and its derivatives are the most common symmetric-key encryption algorithms. It has been approved by the NSA for protecting top-secret information, and newer x86 processors have dedicated instructions for performing parts of this algorithm.
ANSWER: Advanced Encryption Standard [accept AES; accept Rijndael (“rain-dahl”)]
[10m] These objects are used by applications like web browsers and Secure Boot firmware to establish chains of trust using asymmetric-key cryptography. They consist centrally of a public key that has been signed by a trusted private key.
ANSWER: certificates
<RA, Other Science: Computer Science>

Back to bonuses

Summary

Data

DukeSouth Carolina A100010
NC StateSouth Carolina B0000
North Carolina AJames Madison B100010
Emory AGeorgia B100010
Georgia Tech AGeorgia Tech B001010
Georgia Tech DGeorgia Tech C100010
North Carolina BJames Madison A0000
Michigan AKenyon A100010
Ohio State A Kenyon B 001010
Ohio State BMichigan B 0000
Arizona StateFarrellmagnetism100010
Boston CollegeMSU A and Friend0000
Johns HopkinsGeorge Washington A001010
George Washington BGeorgetown100010
GeorgetownGeorge Washington A001010
Maryland AMaryland B100010
TAMUHCC100010
Texas ATexas B100010
tag magnet: taylor's versionTexas C0000