L13 - Intro to Cryptography Flashcards
If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to…
a) Use a longer key length
b) Use a shorter key length
c) Use a more complex algorithm
d) Use a harder to guess key
a) Use a longer key length
A longer key length means the attacker has to search more keys
What weaknesses can be exploited in the Vigenere Cipher?
a) It uses a repeating key letters
b) It requires security for the key, not the message
c) The length of the key can be determined using frequency analysis
A and C
a) It uses a repeating key letters
c) The length of the key can be determined using frequency analysis
Which of the following characteristics would improve password security?
a) Use a one-way hash function
b) Should not use the avalanche effect
c) Should only check to see that the hash function output is the same stored output
A and C
a) Use a one-way hash function
c) Should only check to see that the hash function output is the same stored output
Select the correct definition for the following attack:
known-plaintext attacks
a) A method to determine the encryption function by analyzing know phrases and their encryption
b) Analyzing the effect of changes in input on the encrypted output
c) Compare the ciphertexts with its known plaintext
d) A method where a specific known plaintext is compared to its cipertext
d) A method where a specific known plaintext is compared to its cipertext
Select the correct definition for the following attack:
chosen-plaintext attack
a) A method to determine the encryption function by analyzing know phrases and their encryption
b) Analyzing the effect of changes in input on the encrypted output
c) Compare the ciphertexts with its known plaintext
d) A method where a specific known plaintext is compared to its cipertext
c) Compare the ciphertexts with its known plaintext
Select the correct definition for the following attack:
differential cryptanalysis
a) A method to determine the encryption function by analyzing know phrases and their encryption
b) Analyzing the effect of changes in input on the encrypted output
c) Compare the ciphertexts with its known plaintext
d) A method where a specific known plaintext is compared to its cipertext
b) Analyzing the effect of changes in input on the encrypted output
Select the correct definition for the following attack:
linear cryptanalysis
a) A method to determine the encryption function by analyzing know phrases and their encryption
b) Analyzing the effect of changes in input on the encrypted output
c) Compare the ciphertexts with its known plaintext
d) A method where a specific known plaintext is compared to its cipertext
a) A method to determine the encryption function by analyzing know phrases and their encryption
Check all tasks for which asymmetric encryption is better:
a) Provide confidentiality of a message
b) Securely distribute a session key
c) Scalability
B and C
b) Securely distribute a session key
c) Scalability
Symmetric encryption can only be used to provide confidentiality
a) True
b) False
b) False
Can be used for other security services such as authentication
Public-key encryption can be used to create digital signatures
a) True
b) False
a) True
We can first hash a message then encrypt a message using our public key. The encrypted hash value becomes the digital signature of message
Cryptanalytic attacks try every possible key on a piece of cyphertext until an intelligible translation into plaintext is obtained
a) True
b) False
b) False
What is describe here is Brute Force.
The secret key is input to the encryption algorithm
a) True
b) False
a) True