Professional Documents
Culture Documents
A block cipher processes the input one block of elements at a time, producing an
output block for each input block. A stream cipher processes the input elements continuously,
producing output one element at a time, as it goes along
2.
List and briefly define types of cryptanalytic attacks based on what is known to the attacker.
Type of Attack
Ciphertext Only
Known Plaintext
Chosen Plaintext
Chosen Ciphertext
Chosen Text
3.
Known to Cryptanalyst
Encryption algorithm
Ciphertext
Encryption algorithm
Ciphertext
One or more plaintextciphertext pairs formed with the secret key
Encryption algorithm
Ciphertext
Plaintext message chosen by cryptanalyst, together with its
corresponding ciphertext generated with the secret key
Encryption algorithm
Ciphertext
Ciphertext chosen by cryptanalyst, together with its corresponding
decrypted plaintext generated with the secret key
Encryption algorithm
Ciphertext
Plaintext message chosen by cryptanalyst, together with its
corresponding ciphertext generated with the secret key
Ciphertext chosen by cryptanalyst, together with its corresponding
decrypted plaintext generated with the secret key
What is the difference between an unconditionally secure cipher and a computationally secure cipher?
in sequence in such a way that the final result or product is cryptographically stronger than
any of the component ciphers.
5.
The mechanism of diffusion seeks to make the statistical relationship between the plaintext
and ciphertext as complex as possible in order to thwart attempts to deduce the key.On the
other hand, confusion seeks to make the relationship between the statistics of the ciphertext
and the value of the encryption key as complex as possible, again to thwart attempts to
discover the key
6.
Which parameters and design choices determine the actual algorithm of a Feistel cipher?
Block size, Key size, Number of rounds, Subkey generation algorithm, Round function
F, Fast software encryption/decryption, Ease of analysis
7.
In essence, we would like any change to the input vector to an S-box to result in
random-looking changes to the output. The relationship should be nonlinear and difficult to
approximate with linear functions.
8.
The Caesar cipher involves replacing each letter of the alphabet with the letter
standing three places further down the alphabet.
9.
F
N
V
L
S
H
O
W
A
T
I/J
P
X
R
B
K
Q
Y
G
C
X as space
Y as separator
MU
ST
XS
EY
EX
YO
UX
OV
ER
XC
AD
OG
AN
XW
ES
TX
CO
MI
NG
XA
TX
ON
CE
UZ
TB
VB
GZ
RZ
WQ
PZ
NW
LG
YB
ET
QA
LO
YX
LD
BW
TQ
FK
QL
WR
BW
PO
DG