Week 9 Flashcards

1
Q

Appreciate that cryptography is a broad term that includes tools for providing a wide range of security properties

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give examples of scenarios in which secrecy, authentication and data integrity would be desirable

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the basic structure and requirements of a symmetric encryption scheme, vs asymmetric

A

[confirm this is what the notes says]

Symmetric:

  • the same key is used to encrypt or decrypt a message
  • both Alice and Bob hold a copy of the key
  • if the key is stolen, game over

Asymmetric:

  • a pair of different keys used for encryption and decryption
  • Bob shares the encryption key publicly; only the intended message recipient holds the decryption key
  • it’s fine if the public key is “stolen”; if private key is stolen then game over
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the Caesar Cipher, perform encryption and decryption using the Caesar Cipher and discuss its weaknesses

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the Substitution Cipher, perform encryption and decryption using the Substitution Cipher, and discuss its weaknesses

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define a brute force attack on a symmetric encryption scheme

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe how to use frequency analysis to attack a Substitution Cipher

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Appreciate that an attack is said to break a cipher if it can be carried out faster than a brute force attack on the same cipher

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly