Symmetric Encryption Flashcards

1
Q

What are other names for symmetric Encryption ?

A

conventional encryption or single-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is symmetric encryption?

A

The method by which information is
converted into secret code that hides the information’s true meaning using Keys made up of exactly similar parts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two requirements for secure use of symmetric encryption?

A

1.Need a strong encryption algorithm
2. Sender and receiver must have obtained copies of
the secret key in a secure fashion and must keep
the key secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 5 ingredients of a symmetric encryption scheme

A
  1. Plaintext
  2. Encryption algorithm
  3. Secret key
  4. Ciphertext
  5. Decryption algorithm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two general approaches to attacking a
symmetric encryption scheme

A
  1. Cryptanalysis
    Cryptanalytic attacks rely on the nature of the algorithm
    plus perhaps some knowledge of the general
    characteristics of the plaintext or even some sample
    plaintext-ciphertext pairs.
  2. Brute-Force Attacks: to
    try every possible key on a piece of ciphertext until an
    intelligible translation into plaintext is obtained.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or false

If the cryptanalysis attack succeeds in deducing the key, all future and past messages encrypted with that key
are compromised.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly