Week 5 - Encryption Flashcards

(10 cards)

1
Q

Define encryption [1]

A

The process of converting plaintext into ciphertext, which cannot be understood without the key to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

State what is meant by plaintext and ciphertext [1]

A

Plaintext: Data in human-readable form
Ciphertext: Data that has been encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the difference between symmetric and asymmetric encryption [2]

A

Symmetric encryption uses the same key to encrypt and decrypt. Asymmetric encryption does not (it uses a public-private key pair).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

State what kind of cipher the Caesar Cipher is, and the role of the encryption key. [2]

A

1.Substitution cipher
2. The key is the number of positions the plaintext characters are shifted in the alphabet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain why the Caesar Cipher is not typically used [2]

A

• Letter frequency analysis can be used to determine the shift
• There are only 25 possible different shifts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain what is meant the term ‘key exchange problem’

A

We need to send the key to the recipient without anybody intercepting it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

One-time pad

A

A key that is only used once to encrypt and decrypt a message, then it is discarded (in case of interception)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which logical operation is used in the Vernam cipher?

A

XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Under what conditions is Vernam perfectly secure? [4]

A

• The key must be truly random
• The key length must be at least the same as the plaintext length
• The key must be used once then discarded (one time pad)
• The key must only be shared with the intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One limitation of Vernam cipher

A

Perfect security if the key is only known to the intended recipient.
However, the key must also be sent with the message. It it’s intercepted the ciphertext can be decrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly