Appreciate that cryptography is a broad term that includes tools for providing a wide range of security properties
Give examples of scenarios in which secrecy, authentication and data integrity would be desirable
Describe the basic structure and requirements of a symmetric encryption scheme, vs asymmetric
[confirm this is what the notes says]
Symmetric:
Asymmetric:
Describe the Caesar Cipher, perform encryption and decryption using the Caesar Cipher and discuss its weaknesses
Describe the Substitution Cipher, perform encryption and decryption using the Substitution Cipher, and discuss its weaknesses
Define a brute force attack on a symmetric encryption scheme
Describe how to use frequency analysis to attack a Substitution Cipher
Appreciate that an attack is said to break a cipher if it can be carried out faster than a brute force attack on the same cipher