This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.
View Full Document
Unformatted text preview: Section 5: Midterm Review: 1: What is the creature pictured below? 2. Encode the message from the picture above using a railfence cipher. 3. What is the difference between a Caesar Shift Cipher and a Monoalphabetic Substitution Cipher with a Keyword? 4. What is a code? What is a Nomenclator? How are they related? 5. Describe a Book Cipher. 6. How would you go about breaking a Vigenère cipher? 7. Draw the mappings for a Monoalphabetic Substitution Cipher, a Monoalphabetic Substitution Cipher with Homophones, and a Polyalphabetic Cipher: 8. Convert the following decimal numbers into binary: i) 99 = ii) 203 = iii) 55 = 9. Convert the following binary numbers into decimal: i) 11111110111 = ii) 1111010101 = iii) 12111111 = 10. Do the following binary operations: 11111011111101 111 + 11111101101101 x 11 11. Binary Transposition Cipher: Encipher the following message by swapping the first and second, third and fourth, fifth and sixth, and seventh and eighth digits: 10101101 ____________________________...
View
Full
Document
This note was uploaded on 09/15/2011 for the course LIGN 17 taught by Professor Kehler during the Winter '08 term at UCSD.
 Winter '08
 Kehler

Click to edit the document details