Symmetric Encryption Introduction Flashcards
What is the most famous and earliest form of Symmetric Encryption?
Caesars Cipher. This was a mono-alphabetic substitution cipher in which all characters in the message substituted by another character in the alphabet, based on a certain jump. For example, is the jump was 3 forward, then A would substituted for D. The symmetric key in this encryption is the jump.
What are the 5 components needed to carry out Symmetric Encryption?
Plaintext message, Encryption algorithm, cipher text, decryption algorithm, key.
What is the relationship between the encryption and decryption algorithm?
They are the inverse of one another.
What are the 2 main requirements when using symmetric encryption? Why are they needed?
- Strong encryption algorithm - Such that even if given multiple cipher texts, attackers can’t compute the key using the cipher texts and the algorithm.
- Shared secret - The symmetric keys must remain a confidential secret between the parties involved.
What are the 2 main types of attacks used on Symmetric Encryption?
- Cryptanalysis - This is the analysis of the algorithm in order to deduce the plain text or encryption key used on a cipher text. If the key is deduced, all encrypted data with that key is compromised.
- Brute force - Given a cipher text, keys are continuously generated and ran through the decryption algorithm in hope that one of them decrypts the message.