Symmetric Encryption Introduction Flashcards

1
Q

What is the most famous and earliest form of Symmetric Encryption?

A

Caesars Cipher. This was a mono-alphabetic substitution cipher in which all characters in the message substituted by another character in the alphabet, based on a certain jump. For example, is the jump was 3 forward, then A would substituted for D. The symmetric key in this encryption is the jump.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 components needed to carry out Symmetric Encryption?

A

Plaintext message, Encryption algorithm, cipher text, decryption algorithm, key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the relationship between the encryption and decryption algorithm?

A

They are the inverse of one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 2 main requirements when using symmetric encryption? Why are they needed?

A
  1. Strong encryption algorithm - Such that even if given multiple cipher texts, attackers can’t compute the key using the cipher texts and the algorithm.
  2. Shared secret - The symmetric keys must remain a confidential secret between the parties involved.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 2 main types of attacks used on Symmetric Encryption?

A
  1. Cryptanalysis - This is the analysis of the algorithm in order to deduce the plain text or encryption key used on a cipher text. If the key is deduced, all encrypted data with that key is compromised.
  2. Brute force - Given a cipher text, keys are continuously generated and ran through the decryption algorithm in hope that one of them decrypts the message.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly