Intro to Crypto Flashcards
If the only form of attack that that could be made on an algorithm is brute-force, then the way to counter such attacks would be to ______________
use a longer key lengthP2 L5
What weaknesses can be exploited in the Vigenere cipher
It uses repeating key letters,The length of the key can be determined using frequency analysisP2 L5
Which of the following characteristics would improve password security?A) Use a one-way hash functionB) Should not use the avalanche effectC) Should only check to see that the hash function output is the same as stored output
A) Use a one-way hash functionC) should only check to see that the hash function output is the same stored outputP2 L5
Attack:A method to determine the encryption function by analyzing known phrases and their encryption
linear cryptanalysisP2 L5
Attack:Analyzing the effect of changes in input on the encrypted output
differential cryptanalysisP2 L5
Attack:Compare the cipher texts with its known plaintext
chosen-plaintext attacksP2 L5
Attack:A method where a specific known plaintext is compared to its ciphertext
Known-plaintext attacksP2 L5
Asymmetric encryption is better for:A) provide confidentiality of a messageB) securely distribute a session keyC) scalability
B) securely distribute a session keyC) scalabilityP2 L5
Symmetric encryption can only be used to provide confidentiality
falseP2 L5
Public-key encryption can be used to create digital signatures
trueP2 L5
Cryptanalytic attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained
falseP2 L5
The secret key is input to the encryption algorithm
trueP2 L5