Question

Security is the name of the game for modern computer systems. Answer the following about securing systems with cryptography, for 10 points each.
[10e] In cryptography, encryption transforms plaintext into “text” described by this word. This general word for methods of encryption names versions like the substitution, Playfair, and Atbash.
ANSWER: cipher [or cypher; accept ciphertext; accept substitution cipher; accept Playfair cipher; accept Atbash cipher]
[10h] This algorithm and its derivatives are the most common symmetric-key encryption algorithms. It has been approved by the NSA for protecting top-secret information, and newer x86 processors have dedicated instructions for performing parts of this algorithm.
ANSWER: Advanced Encryption Standard [accept AES; accept Rijndael (“rain-dahl”)]
[10m] These objects are used by applications like web browsers and Secure Boot firmware to establish chains of trust using asymmetric-key cryptography. They consist centrally of a public key that has been signed by a trusted private key.
ANSWER: certificates
<RA, Other Science: Computer Science>

Back to bonuses

Summary

Data

Johns HopkinsGeorge Washington A001010
George Washington BGeorgetown100010
GeorgetownGeorge Washington A001010
Maryland AMaryland B100010