Ch. 3 Flashcards
1
Q
What are the two requirements for secure use?
A
- Need a strong encryption algorithm
- Sender and receiver must have obtained copies of the secret key in a secure fashion and must keep the key secure
2
Q
Processes the input one block of elements at a time
Produces an output block for each input block
Can reuse keys
More common
A
Block Cipher
3
Q
Processes the input elements continuously
Produces output one element at a time
Primary advantage is that they are almost always faster and use far less code
Encrypts plaintext one byte at a time
Pseudorandom stream is one that is unpredictable without knowledge of the input key
A
Stream Cipher
4
Q
What is the purpose of Message Authentication.
A
- Protects against active attacks
- Verifies received message is authentic
- Can use conventional encryption