Symmetric Encryption I

0.0(0)
Studied by 11 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/52

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:17 AM on 3/23/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

53 Terms

1
New cards

Which two main branches constitute the field of cryptology?

Cryptography and cryptanalysis.

2
New cards

In a symmetric cryptosystem, what is the relationship between the encryption key and the decryption key?

They are the same shared secret key.

3
New cards

Which security goal ensures that a message remains unreadable to unauthorized eavesdroppers?

Confidentiality.

4
New cards

Which security goal ensures that a message has not been altered during transmission?

Integrity.

5
New cards

What security principle ensures that a party in a transaction cannot deny having authorized an action?

Non-repudiation.

6
New cards

Non-repudiation is established if both non-forgeability and _____ are fulfilled.

Non-mutability.

7
New cards

In cryptographic notation, what does the letter M typically represent?

The plaintext message.

8
New cards

In cryptographic notation, what does the letter C typically represent?

The ciphertext.

9
New cards

What is the mathematical consistency requirement for decryption functions (DK) and encryption functions (EK)?

DK(EK(M)) = M.

10
New cards

How many positions are shifted in a standard Caesar cipher?

Three.

11
New cards

The Caesar cipher encryption formula is Ci = E(Mi) = symbol(Mi) + 3 _____.

mod 26.

12
New cards

How many total unique keys are required for n parties to communicate securely using symmetric encryption?

n(n-1)/2.

13
New cards

In a public-key cryptosystem, which key is used by the sender to encrypt a message for a specific recipient?

The recipient's public key.

14
New cards

In a public-key cryptosystem, which key does the recipient use to decrypt a message encrypted with their public key?

Their private key.

15
New cards

How many total keys are required in a public-key system involving n users?

2n keys.

16
New cards

What is the ideal mathematical complexity for encryption and decryption algorithms?

Linear complexity.

17
New cards

How does the length of the ciphertext typically compare to the length of the plaintext in symmetric schemes?

They are typically the same length.

18
New cards

Mathematically, encryption and decryption are _____ on the set of all n-bit arrays.

Bijections.

19
New cards

If the probability p(i) of a message is 1, what is the resulting information measure I(i)?

0 bits.

20
New cards

What is the estimated entropy (information content) of natural English per character?

1.25 bits.

21
New cards

In the language redundancy formula D = 1 - a, what does a represent?

Entropy.

22
New cards

What is the term for the ciphertext length at which a brute-force attack is expected to yield a unique plaintext?

Unicity distance.

23
New cards

How many total decryption keys must be attempted in a brute-force attack on a k-bit key?

2k

24
New cards

What type of cipher uniquely replaces each letter in a plaintext with another letter from the alphabet?

A simple substitution cipher.

25
New cards

How many possible keys exist for a simple substitution cipher using a 26-letter alphabet?

26!.

26
New cards

What specific shift value is used in the ROT13 cipher?

13.

27
New cards

Which classical cryptographic tool uses a coordinate system of numbers to represent letters?

The Polybius square.

28
New cards

Which type of cipher combines the Polybius square with substitution techniques?

A polygraphic substitution cipher.

29
New cards

What is the term for modern cryptographic components that perform substitution on binary data?

S-boxes.

30
New cards

How does a Trithemius Progressive Key cipher differ from a standard Caesar cipher?

The shift value increases for every letter in the word.

31
New cards

Why are simple substitution ciphers highly vulnerable to frequency analysis?

Letters in natural language are not uniformly distributed.

32
New cards

What is the Vigenère cipher's primary advantage over the Trithemius progressive key?

It uses a secret key to determine the shifts.

33
New cards

The Vigenère cipher decryption formula is C = (k + m) _____.

mod 26.

34
New cards

What is the only cryptosystem that provides perfect secrecy if its key is truly random and never reused?

The One-Time Pad.

35
New cards

What are the two primary requirements for a Pseudo Random Number Generator (PRNG)?

Uniform distribution and independence.

36
New cards

What does the acronym LCG stand for in the context of PRNGs?

Linear Congruential Generator.

37
New cards

By what logical operation is a plaintext bit combined with a keystream bit in a stream cipher?

XOR.

38
New cards

In which type of stream cipher is the keystream obtained solely from the secret key K?

Synchronous stream cipher.

39
New cards

Which keystream generation method was developed by RSA but is now considered to fall below high security standards?

RC4.

40
New cards

Name one modern stream cipher mentioned as an alternative to RC4.

ChaCha20 (or SEAL, FISH, ISAAC).

41
New cards

What was the result of the Snowden revelations in 2013 regarding global security trends?

A significant increase in interest in security and privacy.

42
New cards

In identity security, what does non-forgeability imply about the communicating partners?

The sender or receiver has a unique signature.

43
New cards

In identity security, what does non-mutability prevent?

The use of a unique signature on a letter that does not belong to the sender.

44
New cards

What is the range of possible shift values for a Caesar cipher using a 26-letter alphabet?

1 to 25.

45
New cards

What is the primary practical use of public-key distribution in modern symmetric sessions?

To distribute the symmetric session key safely.

46
New cards

Which modern symmetric cipher category processes plaintext bits or bytes one at a time?

Stream ciphers.

47
New cards

What are the two classical methods of manipulating plaintext letters?

Substitution and transposition.

48
New cards

What is the term for a cipher that uses a key instead of a progressive sequence of shifts?

Vigenère cipher.

49
New cards

The probability of a valid English message within the total space of n-bit strings is 2 _____.

^(-0.8n).

50
New cards

What logical state is achieved when both forgeability and mutability are prevented?

Non-repudiation.

51
New cards

A synchronous stream cipher generates its keystream using only the _____.

Secret key (K).

52
New cards

Encryption and decryption functions should ideally be _____ for maximum efficiency.

Efficient algorithms.

53
New cards

What is the main classification of ciphers that 'beats' classical frequency analysis?

Modern cryptography.

Explore top flashcards

flashcards
ORGANIC CHEMISTRY FINALS
372
Updated 1097d ago
0.0(0)
flashcards
Azja: kraje i stolice
51
Updated 1084d ago
0.0(0)
flashcards
Midterms Vocab
215
Updated 113d ago
0.0(0)
flashcards
An Inspector Call quotes
29
Updated 28d ago
0.0(0)
flashcards
Physics - Forces in Action
22
Updated 847d ago
0.0(0)
flashcards
let's get an a in this bitch
98
Updated 555d ago
0.0(0)
flashcards
ORGANIC CHEMISTRY FINALS
372
Updated 1097d ago
0.0(0)
flashcards
Azja: kraje i stolice
51
Updated 1084d ago
0.0(0)
flashcards
Midterms Vocab
215
Updated 113d ago
0.0(0)
flashcards
An Inspector Call quotes
29
Updated 28d ago
0.0(0)
flashcards
Physics - Forces in Action
22
Updated 847d ago
0.0(0)
flashcards
let's get an a in this bitch
98
Updated 555d ago
0.0(0)