Exam 1: Introduction to Security Concepts
Describe the meet-in-the-middle attack.
The meet-in-the-middle attack is an attack that makes use of a space-time trade-off. If you are willing to use more CPU time, you can reduce the memory requirement. For breaking 2DES, the time-memory product remains at 2112. The attacker attempts to find a value in each range and domain of the composition of two functions such that the forward mapping of one through the first function is the same as the inverse image of the other through the second function. In other words, the meet-in-the-middle attack quite literally attacks by finding the meeting point in the middle of the composed function.
Describe a block cipher counter (CTR) mode of operation.
Diffie and Hellman in 1979 introduced the counter mode encryption, which is another way to turn a block cipher into a stream cipher. Counter mode requires using an n-bit string called a counter. The counter can be produced by any sequence-generation function that is guaranteed not to repeat for a long time. Since the counter generation is independent of the encryption/decryption process, random access is achievable. The ith ciphertext block, Ci , can be encrypted or decrypted in a random-access fashion. Compared with CBC mode, encrypting the ith block requires all of the i-1 prior blocks to be encrypted first.
____ means people who know each other can securely send messages to their friends.
____ occurs when an attacker maliciously changes data in transit or in a medium.
DES is considered weak by today's standards due to the fact that the key size is only 56 bits.
The security of the RSA algorithm depends on two mathematic problems: the problem of factoring very large numbers, p and q , and the ____ problem.
Symmetric key encryptions ensure confidentiality and data ____.
A(n) ____ uses a keystream composed of completely random digits.
____________________ is the assurance of nonalteration, meaning that the data either in transit or in storage has not been tampered.
Parallel encryption is possible with a block cipher operating in CFB mode.
The company RSA Data Security initially published ____ to promote and facilitate the use of public key techniques.
Schemes that involve hashing with secret keys are called ____ or keyed hashes.
____ encoding literally means a positional numbering system using a base of 64.
A(n) ____________________ attack is a form of cryptanalysis that presumes that the attacker is able to choose arbitrary plaintexts to be encrypted, in effect obtaining the corresponding ciphertexts.
A common use for cryptographic hash functions is to provide password-storage solutions.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)