Engineering and Architecture Flashcards

1
Q

Computationally / Unconditionally secure

A

if applying best known method, amount of resources required is greater than that within reach / not even with all the resources in the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric Key Cryptography

A

Encryption and Decryption keys are the same (security lies in keeping the key secret)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stream ciphers vs Block ciphers

A

Block Cipher Converts the plain text into cipher text by taking plain text’s block at a time. Stream Cipher Converts the plain text into cipher text by taking 1 byte of plain text at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ECB - Electronic Code Book

A

Simplest and most intuitive method to use a block chiper

Consists of dividing text into independent and contiguous blocks that are ciphered independently

Weakness: if two blocks are equal, their ciphertexts will be the same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly