Chapter 2: Symmetric Encryption Flashcards

1
Q

What are the two requirements for secure use of symmetric encryption?

A

Strong encryption algorithm: it should not be possible to derive the key by using the ciphertexts and the plaintexts

Secure key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different types of attacks?

A

The encryption algorithm is always known.

  1. Ciphertext only: The ciphertext to be decoded.
  2. Known plaintext: Ciphertext and one or more plaintext-ciphertext pairs formed with the secret key.
  3. Chosen plaintext: ciphertext and a chosen plaintext message together with its corresponding ciphertext generated with the secret key.
  4. Chosen ciphertext: ciphertext and purported (and chosen) ciphertext, together with its corresponding decrypted plaintext.
  5. Chosen text: ciphertext and chosen plaintext message together with its corresponding ciphertext and purported (and chosen) ciphertext together with its corresponding decrypted plaintext.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What criteria does a computationally secure encryption scheme meet?

A
  1. The cost of breaking the cipher exceeds the value of the encrypted information.
  2. The time required to break the cipher exceeds the useful lifetime of the information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Feistel cipher structure?

A

A general structure used by most symmetric block ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why do we want it to be easy to analyse encryption algorithms?

A

It makes it easier to find vulnerabilities in the algorithm which helps in developing a higher level of assurance in the strength of the algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly