{"id":117075,"date":"2023-08-27T18:00:34","date_gmt":"2023-08-27T18:00:34","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=117075"},"modified":"2023-08-27T18:00:36","modified_gmt":"2023-08-27T18:00:36","slug":"wgu-c839-bundled-exams-questions-and-answers-with-verified-and-complete-solutions","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/08\/27\/wgu-c839-bundled-exams-questions-and-answers-with-verified-and-complete-solutions\/","title":{"rendered":"WGU C839 BUNDLED EXAMS QUESTIONS AND ANSWERS WITH VERIFIED AND COMPLETE SOLUTIONS"},"content":{"rendered":"\n<p>WGU C839 Introduction to Cryptography<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>(EC-Council CES) Latest 2022<br>CrypTool \u2714\u2714Software which allows encryption of text using historic algorithms<br>The Enigma Machine \u2714\u2714In World War II the Germans made use of an electro-mechanical rotor<br>based cipher Known as The Enigma Machine.<br>Allied cipher machines used in WWII included the British TypeX and the American SIGABA.<br>The ADFGVX Cipher \u2714\u2714invented by Colonel Fritz Nebel in 1918.<br>The key for this algorithm is a six-by-six square of letters, used to encode a 36-letter alphabet.<br>The Playfair Cipher \u2714\u2714invented in 1854 by Charles Wheatstone.<br>The Playfair cipher uses a five-by-five table containing a keyword or key phrase.<br>Breaking the Vigene\u0300re Cipher \u2714\u2714In 1863, Friedrich Kasiski was the first person to publish a<br>successful general attack on the Vigene\u0300re Cipher<br>The Vigene\u0300re Cipher \u2714\u2714This is perhaps the most widely known multi-alphabet substitution<br>cipher. invented in 1553 by Giovan Battista Bellaso. Uses a series of different Caesar ciphers based<br>on the letters of a keyword.<br>The Cipher Disk \u2714\u2714The cipher disk was invented by Leon Alberti in 1466. each time you turned<br>the disk, you used a new cipher. It was literally a disk you turned to encrypt plaintext.<br>Multi-Alphabet Substitution \u2714\u2714Use of multiple substitution alphabets.<br>Example:Cipher Disk, Vigenere Cipher, Enigma Machine<\/li>\n<\/ul>\n\n\n\n<p>Scytale \u2714\u2714This was a cylinder tool used by the Greeks, and is often specifically attributed to the<br>Spartans. Physical cylinder that was used to encrypt messages.<br>ROT13 Cipher \u2714\u2714It is essentially the Caesar cipher always using a rotation or shift of 13<br>characters.<br>The ATBASH Cipher \u2714\u2714Hebrew scribes copying religious texts used this cipher.<br>substitutes the first letter of the alphabet for the<br>last, and the second letter for the second-to-the-last, etc.<br>The Caesar Cipher \u2714\u2714You can choose to shift any number of letters, either left or right. If you<br>choose to shift two to<br>the right, that would be a +2; if you choose to shift four to the left, that would be a -4.<br>Mono-Alphabet Substitution \u2714\u2714These algorithms<br>simply substitute one character of cipher text for each character of plain text.<br>Examples: Atbash Cipher, Caesar Cipher, Rot13<br>Symmetric Cryptography \u2714\u2714It is simply any algorithm where the key used to decrypt a message<br>is the same key used to encrypt.<br>Diffusion \u2714\u2714Changes to one character in the plain text affect multiple characters in the cipher<br>text.<br>Confusion \u2714\u2714Confusion attempts to make the relationship between the statistical frequencies of<br>the cipher text and the actual key as complex as possible. This occurs by using a complex<br>substitution algorithm.<\/p>\n\n\n\n<p>Avalanche \u2714\u2714a small change yields large effects in the output, This is Fiestel&#8217;s variation on<br>Claude Shannon&#8217;s concept of diffusion.<br>Kerckhoffs&#8217;s Principle \u2714\u2714This principle states that a cryptosystem should be secure even if<br>everything about the system, except the key, is publicly known.<br>Substitution \u2714\u2714Substitution is changing some part of the plaintext for some matching part of the<br>Cipher Text.<br>Transposition \u2714\u2714Transposition is the swapping of blocks of ciphertext.<br>binary numbers \u2714\u2714there are three operations not found in normal math:<br>AND, OR, and XOR operations.<br>Binary AND \u2714\u2714If both numbers have a one in both places, then the resultant number is a one.<br>1101<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1001<\/h2>\n\n\n\n<p>1001<br>Binary OR \u2714\u2714The OR operation checks to see whether there is a one in either or both numbers<br>in a given place. If so the resulting number is an one.<br>1101<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1001<\/h2>\n\n\n\n<p>1101<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WGU C839 Introduction to Cryptography Scytale \u2714\u2714This was a cylinder tool used by the Greeks, and is often specifically attributed to theSpartans. Physical cylinder that was used to encrypt messages.ROT13 Cipher \u2714\u2714It is essentially the Caesar cipher always using a rotation or shift of 13characters.The ATBASH Cipher \u2714\u2714Hebrew scribes copying religious texts used this cipher.substitutes [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-117075","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/117075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=117075"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/117075\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=117075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=117075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=117075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}