Question: 1 . Describe the terms plaintext, ciphertext, and secret key as they apply to symmetric encryption. ( 3 marks ) 2 . Cryptographic systems are
Describe the terms "plaintext," "ciphertext," and "secret key" as they apply to symmetric encryption. marks
Cryptographic systems are characterized along three independent dimensions. What are these three dimensions? marks
The term "strong encryption" refers to encryption schemes that make it impractical for unauthorized persons to gain access to plaintext that has been encrypted. What properties are characteristic of a strong encryption algorithm? marks
Describe the differences between a monoalphabetic cipher and a polyalphabetic cipher. Is the Caesar cipher a polyalphabetic cipher? marks
In one of his cases, Sherlock Holmes was confronted with the following message:
Znk yozagzout oy mxgbk lusk osskjogzkre
Although Watson was puzzled, Holmes was immediately able to deduce the type of cipher. Describe the cipher being used to encrypt this message. Can you decode the message? Is this cipher susceptible to bruteforce cryptanalysis? marks
Describe the difference between a block cipher and a stream cipher. What is a typical blocksize used in a block cipher? marks
What is the difference between diffusion and confusion? marks
Describe three forms of attack on a publickey encryption scheme. marks
Briefly describe the RSA cipher. marks
If the prime numbers e p and q are and respectively, in the RSA technique, derive the public and private keys. marks
In a publickey system using RSA, you intercept the ciphertext C sent to a user whose public key is e n What is the plaintext M Be sure to show all your work. marks
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
