Intro to Crypto Flashcards

1
Q

If the only form of attack that that could be made on an algorithm is brute-force, then the way to counter such attacks would be to ______________

A

use a longer key lengthP2 L5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What weaknesses can be exploited in the Vigenere cipher

A

It uses repeating key letters,The length of the key can be determined using frequency analysisP2 L5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following characteristics would improve password security?A) Use a one-way hash functionB) Should not use the avalanche effectC) Should only check to see that the hash function output is the same as stored output

A

A) Use a one-way hash functionC) should only check to see that the hash function output is the same stored outputP2 L5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attack:A method to determine the encryption function by analyzing known phrases and their encryption

A

linear cryptanalysisP2 L5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attack:Analyzing the effect of changes in input on the encrypted output

A

differential cryptanalysisP2 L5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attack:Compare the cipher texts with its known plaintext

A

chosen-plaintext attacksP2 L5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attack:A method where a specific known plaintext is compared to its ciphertext

A

Known-plaintext attacksP2 L5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asymmetric encryption is better for:A) provide confidentiality of a messageB) securely distribute a session keyC) scalability

A

B) securely distribute a session keyC) scalabilityP2 L5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric encryption can only be used to provide confidentiality

A

falseP2 L5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public-key encryption can be used to create digital signatures

A

trueP2 L5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cryptanalytic attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained

A

falseP2 L5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The secret key is input to the encryption algorithm

A

trueP2 L5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly