15.2 Cryptanalysis
Which of the following cryptography attacks is characterized by the attacker having access to both the plain text and the resulting ciphertext, but does not allow the attacker to choose the plain text?
Known plain text
Match the types of cryptanalysis with the descriptions.
Linear cryptanalysis Differential cryptanalysis Integral cryptanalysis Integral cryptanalysis Linear cryptanalysis Differential cryptanalysis
You have a secret key. Bob wants the secret key. He has threatened to harm your reputation at the office if you don't give him the secret key. What type of attack is Bob attempting to use?
Rubber hose attack
In a ciphertext-only attack, what is the attacker's goal?
To recover the encryption key.
Which of the following cryptography attacks is characterized by the attacker making a series of interactive queries and choosing subsequent plain texts based on the information from the previous encryption?
Adaptive chosen plain text
Your company produces an encryption device that lets you enter text and receive encrypted text in response. An attacker obtains one of these devices and starts inputting random plain text to see the resulting ciphertext. Which of the following cryptographic attacks is being used?
Chosen Plain Text
Which type of cryptanalysis method is based on substitution-permutation networks?
Integral
Which of the following best explains why brute force attacks are always successful?
They test every possible valid combination.
Match each cryptography attacks to its description.
Timing, Rubber hose, Adaptive chosen plain text, Chosen key, Related key, Chosen ciphertext
What are the countermeasures used to keep hackers from using various cryptanalysis methods and techniques? (Select two.)
Use passphrases and passwords to encrypt a key stored on disk. Use a key size of 168 bits or 256 bits for symmetric key algorithms.