Join the 40,000+ candidates in over 58 countries that have found a faster, better way to pass their certification exam.
Comprehensive practice exam engine!
All features in the FREE plan, plus:
Welcome to our ciphers module. There are several different types of ciphers that we use in cryptography. A cipher is some type of system of converting plain text or unencrypted data to cipher text or encrypted data by rearranging characters, bits, or blocks of bits contained in the message. With a transposition cipher, we simply rearrange characters in a plain text message.
As you can see here, we have the word cipher, which then becomes R-H-I-E-P-C. We aren't really disguising any of the letters, we're just moving them around. With a substitution cipher we take a certain character in the plain text and replace it with a different character. The Caesar cipher is one of the earliest known examples of this type of cipher.
Here we shift all of the letters three places to the right in the alphabet. So c becomes f, i becomes l, p becomes s, and so on. With a mono-alphabetic cipher, we only use one alphabet. Which makes it very easy to use frequency analysis because of the popularity of certain words in the English language.
With poly-alphabetic ciphers, we use multiple alphabets so we can replace the same character with different characters during each round of encryption. Which makes it much harder for an attacker to determine what our plan text message was before it was encrypted. We have two different types of ciphers, block ciphers and stream ciphers.
A block cipher takes a chunk of the data to be encrypted and encrypts that entire block at one time. This is used in most modern algorithms and an example here is a transposition cipher. With a stream cipher, we only encrypt one bit, or one character, at a time, and this is known as the data stream.
The examples here are the Caesar cipher, and One Time Pads. For the CISSP exam, you should be familiar with the difference between a stream cipher and a block cipher. And very simply a stream cipher encrypts the data one bit at a time as it streams into the algorithm.
And a block cipher breaks up the data to be encrypted into blocks and then encrypts the data one block at a time. This concludes our ciphers module. Thank you for watching.
Classified by skill and ranked by difficulty. Choose to answer questions in STUDY MODE to review and you go.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.
Don’t forget what you’ve just studied! Use the intelligent reinforcement questions to stay fresh.
THANK YOU! Just bloody thank you! I’m doing the CEH minor at my college and well...I’ve learned more from this site in a few hours than I’ve learned from my school in 9 weeks about the subject. Keep up the good work!
Skillset’s Exam Engine continuously assesses your knowledge and determines when you are ready take and pass your exam. When Skillset learns that there is a gap between your knowledge and what you need to know to pass, we present you with a focused training module that gets you up to speed quickly. No fluff! Find your knowledge gaps and fill them.
Skillset is confident that we can help anyone pass their exam. If you reach 100% readiness, and you do not pass your exam, we will refund you plus pay for a replacement exam voucher. That’s how powerful our learning system is, we can offer this guarantee and stand behind our products with this no risk to you guarantee. See terms and conditions.
Don’t waste time studying concepts you have already mastered. Focus on what you need to know to pass. The Skillset Competency Diagnostic aligns our Exam Engine and Learning Plan to your baseline knowledge. This saves an average of 31% of the time required to prep for a professional certification exam.
More PRO benefits are being built all the time!