Professional Documents
Culture Documents
Is PTSSSS: Axssanboy
Is PTSSSS: Axssanboy
1
AxssanBoy
9. What are the two requirements for secure use of conventional encryption?
We need a strong encryption algorithm.
Sender and receiver must have obtained copies of the secret key in a secure fashion and
must keep the key secure.
10. Cryptographic systems are characterized along three independent dimensions what are they?
The type of operations used for transforming plaintext to ciphertext.
The number of keys used.
The way in which the plaintext is processed.
11. There are two general approaches to attacking a conventional encryption scheme what are they?
They are: Cryptanalysis and Brute-Force Attack
12. Define substitution technique?
Substitution technique is one in which the letters of plaintext are replaced by other letters or by
numbers or symbols.
13. Differentiate b/w Monoalphabetic and Polyalphabetic Cipher and give example of each?
Monoalphabetic cipher is a substitution cipher in which for a given key, the cipher alphabet for
each plain alphabet is fixed throughout the encryption process.
Examples: Atbash Cipher, Caesar (Shift) Cipher
Polyalphabetic Cipher is a substitution cipher in which the cipher alphabet for the plain
alphabet may be different at different places during the encryption process.
Examples: playfair and Vigenere Cipher are polyalphabetic ciphers.
14. What is Atbash cipher and Caesar (Shift) Cipher?
The Atbash cipher is a substitution cipher with a specific key where the letters of the alphabet
are reversed.
The earliest known, and the simplest, use of a substitution cipher was by Julius Caesar.
15. Define Rotor machines?
Rotor machines are sophisticated precomputer hardware devices that use substitution
techniques.
Rotor machine is an electro-mechanical stream cipher device used for encrypting and
decrypting secret messages.
Rotor machines are sophisticated precomputer hardware devices that use substitution
techniques.
Chapter3
2
AxssanBoy
The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National
Institute of Standards and Technology (NIST).
DES is an implementation of a Feistel Cipher. It uses 16 round Feistel structure. The block size is
64-bit.
3
AxssanBoy