Symmetric Encryption Flashcards
What are other names for symmetric Encryption ?
conventional encryption or single-key encryption
What is symmetric encryption?
The method by which information is
converted into secret code that hides the information’s true meaning using Keys made up of exactly similar parts.
What are the two requirements for secure use of symmetric encryption?
1.Need a strong encryption algorithm
2. Sender and receiver must have obtained copies of
the secret key in a secure fashion and must keep
the key secure.
What are the 5 ingredients of a symmetric encryption scheme
- Plaintext
- Encryption algorithm
- Secret key
- Ciphertext
- Decryption algorithm
What are the two general approaches to attacking a
symmetric encryption scheme
- Cryptanalysis
Cryptanalytic attacks rely on the nature of the algorithm
plus perhaps some knowledge of the general
characteristics of the plaintext or even some sample
plaintext-ciphertext pairs. - Brute-Force Attacks: to
try every possible key on a piece of ciphertext until an
intelligible translation into plaintext is obtained.
True or false
If the cryptanalysis attack succeeds in deducing the key, all future and past messages encrypted with that key
are compromised.
True