4. Conventional Cryptography Flashcards

1
Q

What is symmetric encryption?

A

Symmetric encryption is also known as private-key encryption and is encryption where one key is used for both encryption and decryption of data. All classial encryption algorithms are private-key and private-key is by far the most widely used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the plaintext?

A

The original message before encryption / after decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the ciphertext?

A

The encrypted message after encryption / before decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a cipher?

A

A cipher is an algorithm used for transforming plaintext to ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a key?

A

A key is information used in a cipher known only to the sender/receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is encipher?

A

Encipher is converting plaintext to ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is decipher?

A

Recovering ciphertext from plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is cryptography?

A

Cryptography is the study of encryption principles / methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is cryptanalysis (codebreaking) ?

A

Cryptanalysis is the study of principlees / methods of deciphering ciphertext without knowing the key used to encipher it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is cryptology?

A

Cryptology is the field of both crypography and cryptanalysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the requirements for secure use of a symmetric encryption algorithm?

A
  • A strong encryption algorithm.
  • A secret key known only to the sender and receiver.

A secure channel to distribute the key is implied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can the cryptographic system of an algorithm be characterized?

A
  • Type of encryption operations used - substitution, transposition, product.
  • Number of keys used - single key / two key.
  • Way in which the plaintext is processed - block / stream.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a brute force search?

A

A brute force search is an attempt to attempt every key possible until the correct one is found.

It is the most basic attack, is proportional to key size and assumes that the user either knows or can recognise the plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the design elements of a cipher?

A
  • Block Size
  • Key Size
  • Number of rounds
  • Subkey generation algorithm
  • Round Function
  • Fast softwrae en/decryption
  • Ease of analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name 3 symmetric encryption algorithms.

A
  • DES (Data Encryption Standard)
  • Triple DES (Triple Data Encryption Standard)
  • AES (Advanced Encryption Standard)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A