Symmetric Encryption

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 17

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

18 Terms

1
Why is security needed in networks?
Nearly all networks are shared, and all traffic can be accessed and modified by users.
New cards
2
What is a Passive attack?
Eavesdropping (sniffing) on data.
New cards
3
What is an Active attack?
An attempt to alter data being transmitted, such as spoofing or hijacking.
New cards
4
What is the purpose of encryption in data security?
To protect data so that its contents cannot be read by intruders.
New cards
5
List the services provided by an encryption-based protocol.
Authentication, Integrity, Confidentiality, Non-Repudiation.
New cards
6
What are the two types of encryption?
Secret-Key (Symmetric) and Public-Key (Asymmetric) encryption.
New cards
7
What is ciphertext?
Encrypted message that is sent over an insecure channel.
New cards
8
Explain the concept of Substitution Ciphers.
Substitution Ciphers replace one symbol with another in plaintext.
New cards
9
How does a Shift Cipher (Additive Cipher) work?
It encrypts by shifting characters a fixed number of places in the alphabet.
New cards
10
What defines a Transposition Cipher?
It changes the location of symbols without substituting them.
New cards
11
What is the key size limitation of DES?
The key size is 64 bits, but only 56 bits are actually used.
New cards
12
Why has DES been considered insecure since 1999?
Its key size can be cracked in approximately 10 hours with modern computing.
New cards
13
What is the key size of AES and its block size?
AES has variable key sizes of 128, 192, or 256 bits and operates on a 128-bit block size.
New cards
14
What is unique about the decryption process in AES compared to DES?
The decryption algorithm for AES is not identical to the encryption algorithm.
New cards
15
What is IDEA and its key size?
The IDEA algorithm is a block cipher that operates on a 64-bit plaintext block with a key size of 128 bits.
New cards
16
What is a Key Distribution Centre (KDC)?
It is required to distribute keys in symmetric key cryptography.
New cards
17
What is the risk of disclosing a symmetric key?
If revealed, communications can be compromised.
New cards
18
What does the notation {M}Kab indicate in symmetric encryption?
It indicates that message M is encrypted with the shared secret key Kab.
New cards

Explore top notes

note Note
studied byStudied by 25 people
951 days ago
5.0(1)
note Note
studied byStudied by 27 people
884 days ago
5.0(1)
note Note
studied byStudied by 141 people
830 days ago
5.0(1)
note Note
studied byStudied by 2783 people
1359 days ago
5.0(3)
note Note
studied byStudied by 20 people
955 days ago
5.0(1)
note Note
studied byStudied by 1 person
43 days ago
4.0(1)
note Note
studied byStudied by 12 people
966 days ago
5.0(1)
note Note
studied byStudied by 66 people
784 days ago
5.0(2)

Explore top flashcards

flashcards Flashcard (45)
studied byStudied by 96 people
542 days ago
5.0(1)
flashcards Flashcard (104)
studied byStudied by 26 people
756 days ago
5.0(2)
flashcards Flashcard (39)
studied byStudied by 866 people
846 days ago
4.9(44)
flashcards Flashcard (39)
studied byStudied by 33 people
789 days ago
5.0(4)
flashcards Flashcard (35)
studied byStudied by 4 people
665 days ago
5.0(3)
flashcards Flashcard (26)
studied byStudied by 3 people
837 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 21 people
546 days ago
5.0(1)
flashcards Flashcard (342)
studied byStudied by 28427 people
414 days ago
4.5(133)
robot