Ch. 3 Flashcards

1
Q

What are the two requirements for secure use?

A
  • Need a strong encryption algorithm

- Sender and receiver must have obtained copies of the secret key in a secure fashion and must keep the key secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Processes the input one block of elements at a time
Produces an output block for each input block
Can reuse keys
More common

A

Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Processes the input elements continuously
Produces output one element at a time
Primary advantage is that they are almost always faster and use far less code
Encrypts plaintext one byte at a time
Pseudorandom stream is one that is unpredictable without knowledge of the input key

A

Stream Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of Message Authentication.

A
  • Protects against active attacks
  • Verifies received message is authentic
  • Can use conventional encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly