Chapter 2 Flashcards
(34 cards)
This is the original message or data that is fed into the algorithm as input.
a. Plaintext
b. Encryption Algorithm
c. Secret Key
d. Ciphertext
e. Decryption Algorithm
a. Plaintext
Part of the symmetric encryption scheme
performs various substitutions and transformations on the plaintext.
a. Plaintext
b. Encryption Algorithm
c. Secret Key
d. Ciphertext
e. Decryption Algorithm
b. Encryption Algorithm
The ______ is also input to the encryption algorithm. The exact substitutions and transformations performed by the algorithm depend on the _____.
a. Plaintext
b. Encryption Algorithm
c. Secret Key
d. Ciphertext
e. Decryption Algorithm
c. Secret Key
This is the scrambled message produced as output. It depends on the plaintext and the secret key. For a given message, two different keys will produce two different _______.
a. Encryption Algorithm
b. Ciphertext
c. Decryption Algorithm
b. Ciphertext
This is essentially the encryption algorithm run in reverse. It takes the ciphertext and the secret key and produces the original plaintext.
a. Plaintext
b. Encryption Algorithm
c. Decryption Algorithm
c. Decryption Algorithm
_________ rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the plaintext or even some sample plaintext-ciphertext pairs. This type of attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised.
a. Cryptanalytic Attacks
b. Brute-Force Attack
a. Cryptanalytiic Attacks
______ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
a. Cryptanalytic Attacks
b. Brute-Force Attack
c. Hash Function
d. Weak Collision Resistant
b. Brute-Force Attack
There are two general approaches to attacking a symmetric encryption scheme. what are they?
- Cryptanalytic Attacks
- Brute-Force Attack
What is the most widely used encryption scheme?
a. Advanced Encryption Standard (AES)
b. Data Encryption Standard (DES)
c. Digital Signature Standard
d. Secure Hash Algorithm (SHA)
b. Data Encryption Standard (DES)
DES takes a plaintext block
of 64 bits and a key of 56 bits, to produce a ciphertext block of 64 bits.
alternative techniques developed to increase the security of symmetric block encryption for large sequences.
overcomes the weaknesses of ECB
a. One-way Hash Function
b. Second Preimage Resistant
c. Secure Hash Function
d. Modes of operation
d. Modes of operation
To increase the security of symmetric block encryption for large sequences of data, a number of alternative techniques have been develped. these modes overcome the weaknesses of Electronic Codebook (ECB); each mode has its own particular advantages.
This is the simplest approach to multiple-block encryption.
- Each block of plaintext is encrypted using the same key
- Cryptanalysts may be able to exploit regularities in the plaintext.
a. Electronic Codebook (ECB)
b. Message Authentication Code (MAC)
c. Encryption
a. Electronic Codebook (ECB)
For lengthy messages, the ECB mode may not be secure. A cryptanalyst may
be able to exploit regularities in the plaintext to ease the task of decryption. For
example, if it is known that the message always starts out with certain predefined
fields, then the cryptanalyst may have a number of known plaintext-ciphertext pairs
to work with.
processes the input one block of elements at a time, producing an output block for each input block
a. Block Cipher
b. Stream Cipher
c. Ciphertext
d. cryptanalysis
a. Block Cipher
The advantage of a block cipher is that you can reuse
keys.
For applications that deal with blocks of data, such as file
transfer, e-mail, and database, block ciphers may be more appropriate.
Block Ciphers are far more common than stream ciphers.
processes the input elements continuously, producing output one element at a time, as it goes along.
a. Block Cipher
b. Stream Cipher
c. Ciphertext
d. cryptanalysis
b. Stream Cipher
The primary advantage of a stream cipher is that stream ciphers are almost always faster and use far less code than do block ciphers. . For applications that require encryption/decryption of a stream of data, such as over a data communications channel or a browser/Web link, a stream cipher might be the better alternative.
______ protects against active attacks, verifies received message is authentic, and can use conventional encryption.
Message Authentication
As with Symmetric Encrption, what are the two approaches to attacking a secure hash function?
Cryptanalysis and Brute-Force Attack
A hash of a password is stored by an _______.
Operating System
a hash of a password is stored by an operating system rather than the password itself. Thus, the actual password is not retrievable by a hacker who gains access to the password file. In simple terms, when a user enters a password, the hash of that password is compared to the stored hash value for verification. This application requires preimage resistance and perhaps second preimage resistance.
Public-Key cryptography is _______, involving the use of two seppare keys, in contrast to symmtric encryption, which uses only one key.
Asymmetric
The use of two keys has profound consequences in the areas of confidentiality, key distribution, and authentication.
The security of any encryption scheme depends on _____ and _____.
1) The length of the key
2) The computational work involved in breaking a cipher.
The essential steps are the following:
- Each user generates a pair of keys to be used for the encryption and decryption of messages.
- Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private. As Figure 2.7a suggests, each user maintains a collection of public keys obtained from others.
- If Bob wishes to send a private message to Alice, Bob encrypts the message using Alice’s public key.
- When Alice receives the message, she decrypts it using her private key. No other recipient can decrypt the message because only Alice knows Alice’s private key.
With this approach, all participants have access to public key, and private keys are generated locally by each participant and therefore need never be distributed. As long as a user protects his or her ____, incoming communication is secure. At any time, a user can change the____ and publish the companion public key to replace the old public key.
Private Key
This is the readable message or data that is fed into the algorithm as input.
Plaintext
The ___ _____ performs various transformations on the plaintext.
Encryption Algorithm
This is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption.
Public and Private Key
The exact transformations performed by the encryption algorithm depend on the public or private key that is provided as input.
This is the scrambled message produced as output. it depends on the plaintext and the key. for a given message, two different keys will produce two different _____.
Cyphertext
This algorithm accepts the ciphertext and the matching key and produces the original plaintext.
Decryption algorithm