Chapter 2 Flashcards
This is the original message or data that is fed into the algorithm as input.
a. Plaintext
b. Encryption Algorithm
c. Secret Key
d. Ciphertext
e. Decryption Algorithm
a. Plaintext
Part of the symmetric encryption scheme
performs various substitutions and transformations on the plaintext.
a. Plaintext
b. Encryption Algorithm
c. Secret Key
d. Ciphertext
e. Decryption Algorithm
b. Encryption Algorithm
The ______ is also input to the encryption algorithm. The exact substitutions and transformations performed by the algorithm depend on the _____.
a. Plaintext
b. Encryption Algorithm
c. Secret Key
d. Ciphertext
e. Decryption Algorithm
c. Secret Key
This is the scrambled message produced as output. It depends on the plaintext and the secret key. For a given message, two different keys will produce two different _______.
a. Encryption Algorithm
b. Ciphertext
c. Decryption Algorithm
b. Ciphertext
This is essentially the encryption algorithm run in reverse. It takes the ciphertext and the secret key and produces the original plaintext.
a. Plaintext
b. Encryption Algorithm
c. Decryption Algorithm
c. Decryption Algorithm
_________ rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the plaintext or even some sample plaintext-ciphertext pairs. This type of attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised.
a. Cryptanalytic Attacks
b. Brute-Force Attack
a. Cryptanalytiic Attacks
______ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
a. Cryptanalytic Attacks
b. Brute-Force Attack
c. Hash Function
d. Weak Collision Resistant
b. Brute-Force Attack
There are two general approaches to attacking a symmetric encryption scheme. what are they?
- Cryptanalytic Attacks
- Brute-Force Attack
What is the most widely used encryption scheme?
a. Advanced Encryption Standard (AES)
b. Data Encryption Standard (DES)
c. Digital Signature Standard
d. Secure Hash Algorithm (SHA)
b. Data Encryption Standard (DES)
DES takes a plaintext block
of 64 bits and a key of 56 bits, to produce a ciphertext block of 64 bits.
alternative techniques developed to increase the security of symmetric block encryption for large sequences.
overcomes the weaknesses of ECB
a. One-way Hash Function
b. Second Preimage Resistant
c. Secure Hash Function
d. Modes of operation
d. Modes of operation
To increase the security of symmetric block encryption for large sequences of data, a number of alternative techniques have been develped. these modes overcome the weaknesses of Electronic Codebook (ECB); each mode has its own particular advantages.
This is the simplest approach to multiple-block encryption.
- Each block of plaintext is encrypted using the same key
- Cryptanalysts may be able to exploit regularities in the plaintext.
a. Electronic Codebook (ECB)
b. Message Authentication Code (MAC)
c. Encryption
a. Electronic Codebook (ECB)
For lengthy messages, the ECB mode may not be secure. A cryptanalyst may
be able to exploit regularities in the plaintext to ease the task of decryption. For
example, if it is known that the message always starts out with certain predefined
fields, then the cryptanalyst may have a number of known plaintext-ciphertext pairs
to work with.
processes the input one block of elements at a time, producing an output block for each input block
a. Block Cipher
b. Stream Cipher
c. Ciphertext
d. cryptanalysis
a. Block Cipher
The advantage of a block cipher is that you can reuse
keys.
For applications that deal with blocks of data, such as file
transfer, e-mail, and database, block ciphers may be more appropriate.
Block Ciphers are far more common than stream ciphers.
processes the input elements continuously, producing output one element at a time, as it goes along.
a. Block Cipher
b. Stream Cipher
c. Ciphertext
d. cryptanalysis
b. Stream Cipher
The primary advantage of a stream cipher is that stream ciphers are almost always faster and use far less code than do block ciphers. . For applications that require encryption/decryption of a stream of data, such as over a data communications channel or a browser/Web link, a stream cipher might be the better alternative.
______ protects against active attacks, verifies received message is authentic, and can use conventional encryption.
Message Authentication
As with Symmetric Encrption, what are the two approaches to attacking a secure hash function?
Cryptanalysis and Brute-Force Attack