Engineering and Architecture Flashcards
Computationally / Unconditionally secure
if applying best known method, amount of resources required is greater than that within reach / not even with all the resources in the world
Symmetric Key Cryptography
Encryption and Decryption keys are the same (security lies in keeping the key secret)
Stream ciphers vs Block ciphers
Block Cipher Converts the plain text into cipher text by taking plain text’s block at a time. Stream Cipher Converts the plain text into cipher text by taking 1 byte of plain text at a time.
ECB - Electronic Code Book
Simplest and most intuitive method to use a block chiper
Consists of dividing text into independent and contiguous blocks that are ciphered independently
Weakness: if two blocks are equal, their ciphertexts will be the same