Semester 1 Test Flashcards

1
Q

What is the easiest form of attack against a Caesar Cipher?

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Decode the following message encoded using a Caesar Cipher: JSTZLMJCFRX

A

x = -5. “enough exams”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Decode the following Rail Fence encoded message: TSASHITTISE

A

TSAS
HITT
ISE
“This is a test”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why are Mono-alphabetic Substitution Ciphers not as strong as they may initially appear?

A

Mono-alphabetic substitution ciphers appear strong as brute force attacks can take long (2^88.4). However the language used can be exploited to find letter frequencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Using a Playfair Cipher with ‘EDUCATION’ as the Keyword encode the word FIRSTCLASS

A

playfair a 5 * 5 matrix and keyword.

“GT SM NE SB QZ QZ”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is meant by a letter frequency graph and why is it important to try and get it as flat as possible?

A

Because accurate average letter frequencies can be easily gleaned by analyzing a large amount of representative text, one must try to make it so their ciphertext has even frequency counts to prevent bruteforce with knowledge of the plaintext langauge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of encryption is a Vigenere Cipher an example of?

A

It is a simple form of polyalphabetic substitution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Using a Vigenere Cipher with ‘EDUCATION’ as the Keyword encode the word FIRSTCLASS

A

“JLLUTVTOFW”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary concern associated with the use of any symmetric encryption mechanism?

A

Secure communication of the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain what is meant by the terms ‘confusion’ and ‘diffusion’ in terms of symmetric encryption

A

Diffusion seeks to make the statistical relationship between plaintext and ciphertext as complex as possible in order to thwart attempts to deduce the key.

Confusion seeks to make the relationship between the statistics of the cipher text and the value of the encryption key as complex as possible ( achieved by use of complex substitution cipher)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List the main variables/parameters associated with any implementation of a Fiestel Cipher

A

Block size
Key size
Number of rounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe what is meant when an encryption algorithm is said to exhibit a ‘strong avalanche effect’

A

A change in a single bit results in the change of at least half of the bits in the cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the four separate functions performed within each round of AES

A

Subbytes
Mix Columns
Shift Rows
Add Round key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain why the security of RSA depends upon the difficulty of factoring large numbers

A

Instead of using substitution and permutation, Asymmetric cryptography instead treats input as numbers and performs calculations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe what a digital signature is and briefly explain how one is constructed

A

A digital signature is an unique identifier for the sender created by putting a message through a hash algorithm, encrypted with using their private keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List the five separate functions provided by PGP when using it to secure emails

A
Authentication
Compression
Segmentation
Email compatibility
Confidentiality
17
Q

List the two main protocols that make up the SSL/TLS architecture

A

handshake protocol

Record protocol

18
Q

What is the main difference between Transport Mode and Tunnel Mode when using IP Sec?

A

Transport Mode - Encrypts the data

Tunnel Mode - Also encrypts sender and receiver identifiers

19
Q

Briefly describe why WEP is not considered a secure protocol for use with WLANs

A

Wired Equivalent Privacy uses a stream cipher, the same traffic key must never be used twice. The purpose of an IV, which is transmitted as plain text, is to prevent any repetition, but a 24-bit IV is not long enough to ensure this on a busy network. The way the IV was used also opened WEP to a related key attack. For a 24-bit IV, there is a 50% probability the same IV will repeat after 5000 packets.

20
Q

Why was TKIP considered as a replacement for WEP even though AES-CCMP was available?

A

Unlike AES - CCMP, TKIP is compatible with hardware currently in use.