Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

IS PTssss

1. Differentiate b/w Symmetric encryption and Asymmetric encryption?


 Symmetric encryption is a form of cryptosystem in which encryption and decryption are
performed using the same key
2. Asymmetric encryption is a form of cryptosystem in which encryption and decryption are
performed using the different keys
3. What are The two types of attack on an encryption algorithm?
 The two types of attack on an encryption algorithm are cryptanalysis, brute-force,
4. What the différence b/w Substitution techniques and Transposition techniques?
 Substitution techniques map plaintext elements (characters, bits) into ciphertext elements.
 Transposition techniques systematically transpose the positions of plaintext elements.
5. What is the difference b/w Steganography and cryptography?
 Steganography is a technique for hiding a secret message within a larger one in such a way that
others cannot discern the presence or contents of the hidden message.
 The many schemes used for encryption constitute the area of study known as cryptography.
Such a scheme is known as a cryptographic system or a cipher
6. Differentiate plaintext and cipher text , ,enciphering or encryption and deciphering or decryption?
 An original message is known as the plaintext, while the coded message is called the
ciphertext.
 The process of converting from plaintext to ciphertext is known as enciphering or encryption;
 Restoring the plaintext from the ciphertext is deciphering or decryption.
7. What is the difference b/w cryptanalysis and cryptology?
 Techniques used for deciphering a message without any knowledge of the enciphering details fall
into the area of cryptanalysis.
 The areas of cryptography and cryptanalysis together are called cryptology
8. Symmetric encryption scheme has five ingredients list and define them?
 Plaintext: This is the original intelligible message or data that is fed into the algorithm as
input.
 Encryption algorithm: The encryption algorithm performs various substitutions and
transformations on the plaintext.
 Secret key: The secret key is also input to the encryption algorithm. The key is a value
independent of the plaintext and of the algorithm
 Ciphertext: This is the scrambled message produced as output. It depends on the plaintext
and the secret key.
 Decryption algorithm: This is essentially the encryption algorithm run in reverse. It takes the
ciphertext and the secret key and produces the original plaintext.

1
AxssanBoy
9. What are the two requirements for secure use of conventional encryption?
 We need a strong encryption algorithm.
 Sender and receiver must have obtained copies of the secret key in a secure fashion and
must keep the key secure.
10. Cryptographic systems are characterized along three independent dimensions what are they?
 The type of operations used for transforming plaintext to ciphertext.
 The number of keys used.
 The way in which the plaintext is processed.
11. There are two general approaches to attacking a conventional encryption scheme what are they?
 They are: Cryptanalysis and Brute-Force Attack
12. Define substitution technique?
 Substitution technique is one in which the letters of plaintext are replaced by other letters or by
numbers or symbols.
13. Differentiate b/w Monoalphabetic and Polyalphabetic Cipher and give example of each?
 Monoalphabetic cipher is a substitution cipher in which for a given key, the cipher alphabet for
each plain alphabet is fixed throughout the encryption process.
 Examples: Atbash Cipher, Caesar (Shift) Cipher
 Polyalphabetic Cipher is a substitution cipher in which the cipher alphabet for the plain
alphabet may be different at different places during the encryption process.
 Examples: playfair and Vigenere Cipher are polyalphabetic ciphers.
14. What is Atbash cipher and Caesar (Shift) Cipher?
 The Atbash cipher is a substitution cipher with a specific key where the letters of the alphabet
are reversed.
 The earliest known, and the simplest, use of a substitution cipher was by Julius Caesar.
15. Define Rotor machines?
 Rotor machines are sophisticated precomputer hardware devices that use substitution
techniques.
 Rotor machine is an electro-mechanical stream cipher device used for encrypting and
decrypting secret messages.
 Rotor machines are sophisticated precomputer hardware devices that use substitution
techniques.

Chapter3

1. What means RSA?


 The most widely used public-key cryptosystem is RSA.
2. What is Public Key Encryption?
 When it requires to put the public key in public repository and the private key as a well-guarded
secret. Hence, this scheme of encryption is also called Public Key Encryption.
3. What is Data Encryption Standard (DES)?

2
AxssanBoy
 The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National
Institute of Standards and Technology (NIST).
 DES is an implementation of a Feistel Cipher. It uses 16 round Feistel structure. The block size is
64-bit.

3
AxssanBoy

You might also like