L13 - Intro to Cryptography Flashcards

1
Q

If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to…

a) Use a longer key length
b) Use a shorter key length
c) Use a more complex algorithm
d) Use a harder to guess key

A

a) Use a longer key length

A longer key length means the attacker has to search more keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What weaknesses can be exploited in the Vigenere Cipher?

a) It uses a repeating key letters
b) It requires security for the key, not the message
c) The length of the key can be determined using frequency analysis

A

A and C

a) It uses a repeating key letters
c) The length of the key can be determined using frequency analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following characteristics would improve password security?

a) Use a one-way hash function
b) Should not use the avalanche effect
c) Should only check to see that the hash function output is the same stored output

A

A and C

a) Use a one-way hash function
c) Should only check to see that the hash function output is the same stored output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Select the correct definition for the following attack:
known-plaintext attacks

a) A method to determine the encryption function by analyzing know phrases and their encryption
b) Analyzing the effect of changes in input on the encrypted output
c) Compare the ciphertexts with its known plaintext
d) A method where a specific known plaintext is compared to its cipertext

A

d) A method where a specific known plaintext is compared to its cipertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Select the correct definition for the following attack:
chosen-plaintext attack

a) A method to determine the encryption function by analyzing know phrases and their encryption
b) Analyzing the effect of changes in input on the encrypted output
c) Compare the ciphertexts with its known plaintext
d) A method where a specific known plaintext is compared to its cipertext

A

c) Compare the ciphertexts with its known plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Select the correct definition for the following attack:
differential cryptanalysis

a) A method to determine the encryption function by analyzing know phrases and their encryption
b) Analyzing the effect of changes in input on the encrypted output
c) Compare the ciphertexts with its known plaintext
d) A method where a specific known plaintext is compared to its cipertext

A

b) Analyzing the effect of changes in input on the encrypted output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Select the correct definition for the following attack:
linear cryptanalysis

a) A method to determine the encryption function by analyzing know phrases and their encryption
b) Analyzing the effect of changes in input on the encrypted output
c) Compare the ciphertexts with its known plaintext
d) A method where a specific known plaintext is compared to its cipertext

A

a) A method to determine the encryption function by analyzing know phrases and their encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Check all tasks for which asymmetric encryption is better:

a) Provide confidentiality of a message
b) Securely distribute a session key
c) Scalability

A

B and C

b) Securely distribute a session key
c) Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric encryption can only be used to provide confidentiality

a) True
b) False

A

b) False

Can be used for other security services such as authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public-key encryption can be used to create digital signatures

a) True
b) False

A

a) True

We can first hash a message then encrypt a message using our public key. The encrypted hash value becomes the digital signature of message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cryptanalytic attacks try every possible key on a piece of cyphertext until an intelligible translation into plaintext is obtained

a) True
b) False

A

b) False

What is describe here is Brute Force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The secret key is input to the encryption algorithm

a) True
b) False

A

a) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly