What are the two requirements for secure use of symmetric encryption?
Strong encryption algorithm: it should not be possible to derive the key by using the ciphertexts and the plaintexts
Secure key exchange
What are the different types of attacks?
The encryption algorithm is always known.
What criteria does a computationally secure encryption scheme meet?
What is a Feistel cipher structure?
A general structure used by most symmetric block ciphers.
Why do we want it to be easy to analyse encryption algorithms?
It makes it easier to find vulnerabilities in the algorithm which helps in developing a higher level of assurance in the strength of the algorithm