15.2 Cryptanalysis and Cryptographic Attack Countermeasures

Ace your homework & exams now with Quizwiz!

What are two countermeasures used to keep hackers from using various cryptanalysis methods and techniques?

- Use a key size of 168 bits or 256 bits for symmetric key algorithms. - Use passphrases and passwords to encrypt a key stored on disk.

Which cryptography attack is characterized by the attacker making a series of interactive queries and choosing subsequent plain texts based on the information from the previous encryption?

Adaptive chosen plain text

Which cryptography attack is described as: the hacker makes a series of interactive queries, choosing subsequent plain texts based on the information from the previous encryptions?

Adaptive chosen plain text

Which cryptography attack is described as: an attack where a hacker not only breaks a ciphertext, but also breaks into a bigger system that is dependent on that ciphertext?

Chosen ciphertext

Which cryptography attack is described as: the hacker analyzes the plain texts corresponding to an arbitrary set of ciphertexts the hacker chooses?

Chosen key

Your company produces an encryption device that lets you enter text and receive encrypted text in response. An attacker obtains an encryption device that lets you enter text and receive encrypted text in response, and starts inputting random plain text to see the resulting ciphertext. Which cryptographic attacks is being used?

Chosen plain text

Which type of cryptanalysis is described as: works on statistical differences between ciphertexts of chosen data?

Differential cryptanalysis

Which type of cryptanalysis is described as: a form of cryptanalysis applicable to symmetric key algorithms?

Differential cyptanalysis

Which type of cryptanalysis method is based on substitution-permutation networks?

Integral

Which type of cryptanalysis is described as: is an extension of differential cryptanalysis?

Integral cryptanalysis

Which type of cryptanalysis is described as: is useful against block ciphers based on substitution-permutation networks?

Integral cryptanalysis

What cryptography attacks is characterized by the attacker having access to both the plain text and the resulting ciphertext, but does not allow the attacker to choose the plain text?

Known plain text

Which type of cryptanalysis is described as: finds the affine approximations to the action of a cipher?

Linear cryptanalysis

Which type of cryptanalysis is described as: is commonly used on block ciphers and works on statistical differences between plain text and ciphertext?

Linear cryptanalysis

Which cryptography attack is described as: the hacker obtains ciphertexts encrypted under two different keys?

Related key

Which cryptography attack is described as: a hacker extracts cryptographic secrets, such as the password to an encrypted file, by coercion or torture?

Rubber hose

You have a secret key and are threatened harm your reputation if you don't give the secret key to a bad actor. What type of attack is being attempted?

Rubber hose attack

What best explains why brute force attacks are always successful?

They test every possible valid combination

Which cryptography attack is described as: the attack repeatedly measuring the exact execution times of modular exponentiation operations?

Timing

In a ciphertext-only attack, what is the attacker's goal?

To recover the encryption key


Related study sets

Early Republic, Foreign Affairs, & Age of Jackson.

View Set

FA Davis: Chapter 4: Physiological Aspects of Antepartum Care

View Set

Ancora Geografia italiana con immagini

View Set

COMM 101 CH 14: Organizing-Writing-Outlining Your Speech

View Set

Chapter 21 Drugs for Parkinson's Disease

View Set

AP Human Geography- Chapter 2 and 3

View Set

Building Construction Chp. 13 quiz questions

View Set

Business Math A - Checkpoints L1, L2, L11-28

View Set