15.2 Cryptanalysis

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following cryptography attacks is characterized by the attacker having access to both the plain text and the resulting ciphertext, but does not allow the attacker to choose the plain text?

Known plain text

Match the types of cryptanalysis with the descriptions.

Linear cryptanalysis Differential cryptanalysis Integral cryptanalysis Integral cryptanalysis Linear cryptanalysis Differential cryptanalysis

You have a secret key. Bob wants the secret key. He has threatened to harm your reputation at the office if you don't give him the secret key. What type of attack is Bob attempting to use?

Rubber hose attack

In a ciphertext-only attack, what is the attacker's goal?

To recover the encryption key.

Which of the following cryptography attacks is characterized by the attacker making a series of interactive queries and choosing subsequent plain texts based on the information from the previous encryption?

Adaptive chosen plain text

Your company produces an encryption device that lets you enter text and receive encrypted text in response. An attacker obtains one of these devices and starts inputting random plain text to see the resulting ciphertext. Which of the following cryptographic attacks is being used?

Chosen Plain Text

Which type of cryptanalysis method is based on substitution-permutation networks?

Integral

Which of the following best explains why brute force attacks are always successful?

They test every possible valid combination.

Match each cryptography attacks to its description.

Timing, Rubber hose, Adaptive chosen plain text, Chosen key, Related key, Chosen ciphertext

What are the countermeasures used to keep hackers from using various cryptanalysis methods and techniques? (Select two.)

Use passphrases and passwords to encrypt a key stored on disk. Use a key size of 168 bits or 256 bits for symmetric key algorithms.


संबंधित स्टडी सेट्स

Chapter 3: The European Union - Establishment and Development (European Union Politics)

View Set

Intro to Coding - Resources for Programmers

View Set

Cellular Respiration/ Photosynthesis

View Set

Econ Chapter 9 - Market Power & Monopoly

View Set

State of Matter and Their Changes

View Set

Ch 15 Cybercrime Management: Legal Issues

View Set