Chapter 2: Symmetric Encryption Flashcards
1
Q
What are the two requirements for secure use of symmetric encryption?
A
Strong encryption algorithm: it should not be possible to derive the key by using the ciphertexts and the plaintexts
Secure key exchange
2
Q
What are the different types of attacks?
A
The encryption algorithm is always known.
- Ciphertext only: The ciphertext to be decoded.
- Known plaintext: Ciphertext and one or more plaintext-ciphertext pairs formed with the secret key.
- Chosen plaintext: ciphertext and a chosen plaintext message together with its corresponding ciphertext generated with the secret key.
- Chosen ciphertext: ciphertext and purported (and chosen) ciphertext, together with its corresponding decrypted plaintext.
- Chosen text: ciphertext and chosen plaintext message together with its corresponding ciphertext and purported (and chosen) ciphertext together with its corresponding decrypted plaintext.
3
Q
What criteria does a computationally secure encryption scheme meet?
A
- The cost of breaking the cipher exceeds the value of the encrypted information.
- The time required to break the cipher exceeds the useful lifetime of the information
4
Q
What is a Feistel cipher structure?
A
A general structure used by most symmetric block ciphers.
5
Q
Why do we want it to be easy to analyse encryption algorithms?
A
It makes it easier to find vulnerabilities in the algorithm which helps in developing a higher level of assurance in the strength of the algorithm