Sei sulla pagina 1di 3

Q1. What are the essential ingredients of a symmetric cipher?

= Plaintext, encryption algorithm, secret key, cipher text, decryption algorithm.

Q2. What are the two basic functions used in encryption algorithms?

= Permutation and substitution.

Q3. How many keys are required for two people to communicate via a symmetric cipher? How many
keys are required for n people to communicate with each other securely?

= One secret key. N (n-1)/2 keys

Q4. What is the difference between a block cipher and a stream cipher?

= A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. A block
cipher is one in which a block of plaintext is treated as a whole and used to produce a cipher text block
of equal length.

Q5. What are the two general approaches to attacking a cipher?

= Cryptanalysis and brute force.

Q6.List and briefly define types of cryptanalytic attacks based on what is known to the attacker.

Type of attack Known To Cryptanalyst


. Cipher text only . Encryption algorithm
. Cipher text to be decoded
. Known plaintext . Encryption algorithm
. Cipher text to be decoded
. one or more plaintext-cipher text pairs formed
with the secret key
. Chosen plaintext . Encryption algorithm
. Cipher text to be decoded
.Plaintext message chosen by cryptanalyst,
together with its corresponding cipher text
generated with the secret key
. Chosen cipher text . Encryption algorithm
. Cipher text to be decoded
. Purported cipher text chosen by cryptanalyst,
together with its corresponding decrypted
plaintext generated with the secret key
. Chosen text . Encryption algorithm
. Cipher text to be decoded
.Plaintext message chosen by cryptanalyst,
together with its corresponding cipher text
generated with the secret key
. Purported cipher text chosen by cryptanalyst,
together with its corresponding decrypted
plaintext generated with the secret key
7) What are two problems with the one-time pad?

1. The one time pad needs to be truly random. Pseudo random generates are quick however
they can be predicated.
2. The second is practicability of being able to transmit the number of keys securely to the
receiver. For every bit of plain text, there is also 1bit of key.

8) What are the drawbacks of steganography?

1. The confidentiality of information is maintained by the algorithms, and if the algorithms are
known then this technique is of no use.
2. Password leakage may occur and it leads to the unauthorized access of data.

9) Explain each component in the cryptography. (E.g. Cipher, cipher text, plain text, etc.)

a) Plaintext- It is the original message.

b) Cipher text- The coded message

c) Enciphering or encryption- Process of converting from plain text to cipher text.

d) Deciphering or decryption- Restoring the plaintext from the cipher text.

e) Cryptography- Study of encryption.

Task2

1. One way to solve the key distribution problem is to use a line from a book that both the sender
and the receiver possess. Typically, at least in spy novels, the first sentence of a book serves
as the key. The particular scheme discussed in this problem is from one of the best suspense
novels involving secret codes, talking to Strange Men, by Ruth Rendell. Work this problem
without consulting that book! Consider the following message: SIDKHKDM AF HCRKIABIE
SHIMC KD LFEAILA This cipher text was produced using the first sentence of The Other Side of
Silence (a book about the spy Kim Philby)

The sentence is: The snow lay thick on the steps and the snowflakes driven by the wind looked black
in the headlights of the cars. A simple substitution cipher was used.

a. What is the encryption algorithm?

b. How secure is it?

c. To make the key distribution problem simple, both parties can agree to use the first or last sentence
of a book as the key. To change the key, they simply need to agree on a new book. The use of the first
sentence would be preferable to the use of the last. Why?

ANSWER: a. the first letter t corresponds to A, the second letter h corresponds to B, e is C, s is D, and
so on. Second and subsequent occurrences of a letter in the key sentence are ignored. The result:
cipher text: SIDKHKDM AF HCRKIABIE SHIMC KD LFEAILA

Plaintext: basilisk to leviathan blake is contact


b. It is a monalphabetic cipher and so easily breakable.

c. The last sentence may not contain all the letters of the alphabet. If the first sentence is used, the
second and subsequent sentences may also be used until all 26 letters are encountered.

Potrebbero piacerti anche