15

¡Supera tus tareas y exámenes ahora con Quizwiz!

Known plain text Adaptive chosen plain text Chosen plain text Chosen ciphertext

Adaptive chosen plain text

Stream Cryptanalysis Steganography Block

Block

Chosen plain text Brute force Known plain text Chosen ciphertext

Chosen plain text

Integral Dictionary Linear Differential

Integral

Uses symmetric encryption. Is suitable for small amounts of data and small devices, such as smartphones. Uses multiplication of large prime numbers. Is used to sign a certificate using a private key and to verify a certificate using a public key.

Is suitable for small amounts of data and small devices, such as smartphones.

Known plain text Chosen plain text Chosen ciphertext Brute force

Known plain text

Sam's public key Mary's public key Mary's private key Sam's private key

Mary's private key

Symmetric Asymmetric Block cipher Digital signature

Symmetric

To recover the encryption key. To extract cryptographic secrets. To find patterns in the output. To construct a dictionary.

To recover the encryption key.

Uses the Rijndael block cipher. Uses up to 16 rounds of substitution and transposition. Is used by Pretty Good Privacy (PGP) email encryption. Is easy to break.

Uses the Rijndael block cipher.

ciphertext encryption algorithm plain text steganography

ciphertext

Request a certificate from GoDaddy. Enable synchronous encryption in her network. Ensure all HTTP traffic uses port 443. Create a local CA and generate a self-signed certificate.

Create a local CA and generate a self-signed certificate.

Cryptographic algorithm Public keys Hash values Private keys

Private keys

Trickery attack Rubber hose attack Social engineering attack Brute force attack

Rubber hose attack

They test every possible valid combination. They are platform-independent. They are fast. They can be performed in a distributed parallel processing environment.

They test every possible valid combination.

Uses only one key to encrypt and decrypt data. Uses only one algorithm type. Does not require the exchange of the shared secret key. Does not work well for bulk encryption of less sensitive data.

Uses only one key to encrypt and decrypt data.

Finds the affine approximations to the action of a cipher. A form of cryptanalysis applicable to symmetric key algorithms. Is useful against block ciphers base on substitution-permutation networks. It is an extension of differential cryptanalysis. It is commonly used on block ciphers and works on statistical differences between plain text and ciphertext. Works on statistical differences between ciphertexts of chosen data.

LC DC IC IC LC DC

He must send identifying data and a private key request to a validation authority (VA). He must send identifying data and the encryption algorithm he will use with his certificate request to a certificate authority (CA). He must send identifying data with his certificate request to a registration authority (RA). He must send the MAC and IP addresses with his certificate to a root certificate authority (CA).

He must send identifying data with his certificate request to a registration authority (RA).

** The attack repeatedly measuring the exact execution times of modular exponentiation operations. A hacker extracts cryptographic secrets, such as the password to an encrypted file, by coercion or torture. The hacker makes a series of interactive queries, choosing subsequent plain texts based on the information from the previous encryptions. An attack where a hacker not only breaks a ciphertext, but also breaks into a bigger system that is dependent on that ciphertext. The hacker obtains ciphertexts encrypted under two different keys. The hacker analyzes the plain texts corresponding to an arbitrary set of ciphertexts the hacker chooses.

T RH ACPT CK RK CC


Conjuntos de estudio relacionados

Chapter 8 Recombinant DNA Technology

View Set

Chapter 9 - Probability: Vocabulary

View Set

Chapter 1 - Art in the Stone Age

View Set

JCM 103 Semicolons, Colons, Dashes & Hyphens

View Set

MICRO FINAL EXAM PRACTICE chapters included in Quiz 2 (9, 10, 11, 12, 13, 14), and the materials covered thereafter (21, 15, 16, 17, 20, 26)

View Set