Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Cryptography

Answer the following Short Question

1. What are the two general approach to attack a cipher?


Cryptanalysis and Brute-Force Attack.
2. What are 2 examples of block cipher?
Some examples of block cipher are data encryption standard (DES), triple DES (3DES or
TDEA), and advanced encryption standard (AES).
3. What are the two known cryptography based on block ciphers?
Data Encryption Standard (DES) and Advanced Encryption Standard (AES) are both
symmetric block ciphers.
4. What is the main weakness of block cipher?
They have the disadvantage of slower encryption speed since the entire block must be
captured for encryption/decryption. Block ciphers also breed errors since a mistake in just
one symbol could alter the whole block.
5. What is the most well known block cipher?
AES - A US Federal Government standard since 2002, AES or Advanced Encryption
Standard is arguably the most widely used block cipher in the world. It has a block size of
128 bits and supports three possible key sizes - 128, 192, and 256 bits
6. What is the most used block cipher technique?
Advanced Encryption Standard (AES)
7. Is Blowfish a block cipher?
Blowfish is a variable-length, symmetric, 64-bit block cipher. Designed by Bruce Schneier in
1993 as a "general-purpose algorithm," it was intended to provide a fast, free, drop-in
alternative to the aging Data Encryption Standard (DES) and International Data Encryption
Algorithm (IDEA) encryption algorithms.
8. What are the 2 fundamental types of encryptions?
There are two types of encryption in widespread use today: symmetric and asymmetric
encryption. The name derives from whether or not the same key is used for encryption and
decryption.
9. What is cryptanalysis and brute force attack?
In cryptanalysis, a brute force attack is a method of defeating a cryptographic scheme by
trying a large number of possibilities; for example, exhaustively working through all possible
keys in order to decrypt a message.
10. Which is an example of cipher only attack?
Some modern cipher designs have later been shown to be vulnerable to ciphertext-only
attacks. For example, Akelarre. A cipher whose key space is too small is subject to brute
force attack with access to nothing but ciphertext by simply trying all possible keys.
11. What are the three types of block ciphers?
Different types of block ciphers
Digital Encryption Standard (DES) Triple Digital Encryption Standard (TDES) Advanced
Encryption Standard (AES)
12. What are active attacks and passive attacks?
In active attacks, the attacker intercepts the connection and efforts to modify the message's
content. In passive attacks, the attacker observes the messages, then copy and save them
and can use it for malicious purposes.
13. Is RC4 a block cipher?
RC4 is a stream cipher, it is more malleable than common block ciphers. If not used together
with a strong message authentication code (MAC), then encryption is vulnerable to a bit-
flipping attack. The cipher is also vulnerable to a stream cipher attack if not implemented
correctly.
14. What block cipher mode is more secure?
A ciphertext should never leak any information about the plaintext used to create it, so ECB
mode is insecure and should never be used. CBC mode, on the other hand, is one of the
most commonly used block cipher modes of operation due to its ease of implementation and
support for parallelized decryption
15. Why a Caesar cipher is a weak encryption?
The major drawbacks of Caesar cipher is that it can easily be broken, even in cipher-text
only scenario. Various methods have been detected which crack the cipher text using
frequency analysis and pattern words. One of the approaches is using brute force to match
the frequency distribution of letters.
16. Which is the weakest block cipher?
Electronic Code Book (ECB) is the simplest and weakest form of DES. It uses no
initialization vector or chaining. Identical plaintexts with identical keys encrypt to identical
ciphertexts.
17. What is the hardest cipher to solve?
The Vigenère cipher is a method of encrypting messages by using a series of different
Caesar ciphers based on the letters of a particular keyword. The Vigenère cipher is more
powerful than a single Caesar cipher and is much harder to crack.
18. Which type of cipher is the fastest?
Stream algorithms are faster and more efficient than block ciphers because they're
encrypting only one bit of data at a time into individual symbols rather than entire blocks. So,
they're better suited for devices that have fewer resources.
19. Which algorithm uses block cipher?
The given is AES Encryption algorithm (also known as the Rijndael algorithm) is a 128-bit
symmetric block cipher method.
20. What is brute force attack also known as?
A brute force attack, also known as an exhaustive search, is a cryptographic hack that relies on
guessing possible combinations of a targeted password until the correct password is
discovered.

You might also like