Question
Security is the name of the game for modern computer systems. Answer the following about securing systems with cryptography, for 10 points each.
[10e] In cryptography, encryption transforms plaintext into “text” described by this word. This general word for methods of encryption names versions like the substitution, Playfair, and Atbash.
ANSWER: cipher [or cypher; accept ciphertext; accept substitution cipher; accept Playfair cipher; accept Atbash cipher]
[10h] This algorithm and its derivatives are the most common symmetric-key encryption algorithms. It has been approved by the NSA for protecting top secret information, and newer x86 processors have dedicated instructions for performing parts of this algorithm.
ANSWER: Advanced Encryption Standard [accept AES; accept Rijndael (“rain-dahl”)]
[10m] These objects are used by applications like web browsers and Secure Boot firmware to establish chains of trust using asymmetric-key cryptography. They consist centrally of a public key that has been signed by a trusted private key.
ANSWER: certificates
<RA, Other Science: Computer Science>
Summary
2023 ARCADIA at UC Berkeley | Premiere | Y | 2 | 20.00 | 100% | 50% | 50% |
2023 ARCADIA at Carleton University | Premiere | Y | 3 | 10.00 | 100% | 0% | 0% |
2023 ARCADIA at Claremont Colleges | Premiere | Y | 1 | 0.00 | 0% | 0% | 0% |
2023 ARCADIA at Imperial | Imperial | Y | 5 | 10.00 | 80% | 20% | 0% |
2023 ARCADIA at Indiana | Premiere | Y | 5 | 6.00 | 40% | 20% | 0% |
2023 ARCADIA at RIT | Premiere | Y | 2 | 10.00 | 50% | 0% | 50% |
2023 ARCADIA at WUSTL | Premiere | Y | 3 | 6.67 | 67% | 0% | 0% |
Data
Purdue B | Chicago B | 10 | 0 | 0 | 10 |
Illinois A | Chicago A | 10 | 0 | 10 | 20 |
Illinois B | Notre Dame B | 0 | 0 | 0 | 0 |
Indiana | Notre Dame A | 0 | 0 | 0 | 0 |
Vanderbilt | Purdue A | 0 | 0 | 0 | 0 |