03/11/2021, 15:13 Crypto CH 1 - 3 Flashcards | Quizlet Science / Computer Science / Computer Security and Reliability Crypto CH 1 - 3 Terms in this set (135) The OSI security architecture True provides a systematic framework for defining security attacks, mechanisms, and services. [True or False] Security attacks are classified False as either passive or aggressive. [True or False] Authentication protocols and True encryption algorithms are examples of security mechanisms. [True or False] The more critical a True component or service, the higher the level of required availability. [True or False] Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 1/45 03/11/2021, 15:13 Security services include Crypto CH 1 - 3 Flashcards | Quizlet True access control, data confidentiality and data integrity, but do not include authentication. [True or False] The field of network and True Internet security consists of measures to deter, prevent, detect and correct security violations that involve the transmission of information. [True or False] Patient allergy information is True an example of an asset with a high requirement for integrity. [True or False] The OSI security architecture False was not developed as an international standard, therefore causing an obstacle for computer and communication vendors when developing security features [True or false] Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 2/45 03/11/2021, 15:13 Data origin authentication Crypto CH 1 - 3 Flashcards | Quizlet True does not provide protection against the modification of data units. [True or False] The emphasis in dealing with False active attacks is on prevention rather than detection. [True or False] The connection-oriented False integrity service addresses both message stream modification and denial of service. [True or False] All the techniques for True providing security have two components: a securityrelated transformation on the information to be sent and some secret information shared by the two principals. [True or False] Information access threats True intercept or modify data on behalf of users who should not have access to that data. [True or False] Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 3/45 03/11/2021, 15:13 The data integrity service Crypto CH 1 - 3 Flashcards | Quizlet False inserts bits into gaps in a data stream to frustrate traffic analysis attempts. [True or False] Symmetric encryption is used True to conceal the contents of blocks or streams of data of any size, including messages, files, encryption keys, and passwords. [True or false] __________ is the most common C) Asymmetric Encryption method used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures. A) Authentication protocols B) Symmetric encryption C) Asymmetric encryption D) Data integrity algorithms Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 4/45 03/11/2021, 15:13 A common technique for Crypto CH 1 - 3 Flashcards | Quizlet B) Encryption masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ . A) analysis B) encryption C) masquerade D) integrity __________ involves the passive D) Replay capture of a data unit and its subsequent retransmission to produce an unauthorized effect. A) Service denial B) Masquerade C) Disruption D) Replay Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 5/45 03/11/2021, 15:13 The three concepts that form Crypto CH 1 - 3 Flashcards | Quizlet B) confidentiality, integrity and availability what is often referred to as the CIA triad are ________ . These three concepts embody the fundamental security objectives for both data and for information and computing services. A) communication, information and authenticity B) confidentiality, integrity and availability C) confidentiality, integrity, access control D) communication, integrity and authentication A loss of __________ is the B) confidentiality unauthorized disclosure of information. A) integrity B) confidentiality C) reliability D) authenticity Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 6/45 03/11/2021, 15:13 Verifying that users are who Crypto CH 1 - 3 Flashcards | Quizlet D) authenticity they say they are and that each input arriving at the system came from a trusted source is _________ . A) integrity B) credibility C) accountability D) authenticity A _________ level breach of C) Moderate security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced. A) high B) catastrophic C) moderate D) low Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 7/45 03/11/2021, 15:13 A __________ is any action that Crypto CH 1 - 3 Flashcards | Quizlet C) security attack compromises the security of information owned by an organization. A) security service B) security mechanism C) security attack D) security alert A __________ takes place when B) masquerade one entity pretends to be a different entity. A) passive attack B) masquerade C) service denial D) replay Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 8/45 03/11/2021, 15:13 __________ is the protection of Crypto CH 1 - 3 Flashcards | Quizlet C) Confidentiality transmitted data from passive attacks. A)Data control B) Access control C) Confidentiality D) Nonrepudiation A(n) __________ service is one D) availability that protects a system to ensure its availability and addresses the security concerns raised by denial-ofservice attacks. A) integrity B) masquerade C) replay D) availability Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 9/45 03/11/2021, 15:13 __________ threats exploit service Crypto CH 1 - 3 Flashcards | Quizlet C) Service flaws in computers to inhibit use by legitimate users. A) Reliability B) Passive C) Service D) Information access A(n) __________ is a potential for C) threat violation of security, which exists when there is a circumstance, capability, action or event that could breach security and cause harm. A) attack B) risk C) threat D) attack vector Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 10/45 03/11/2021, 15:13 The protection of the Crypto CH 1 - 3 Flashcards | Quizlet B) traffic-flow confidentiality information that might be derived from observation of traffic flows is _________ . A) connection confidentiality B) traffic-flow confidentiality C) selective-field confidentiality D) connectionless confidentiality Data appended to, or a D) digital signature cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________ . A) encipherment B) security audit trail C) authentication exchange D) digital signature Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 11/45 03/11/2021, 15:13 A ___________ is any process, or a Crypto CH 1 - 3 Flashcards | Quizlet Security Mechanism device incorporating such a process, that is designed to detect, prevent, or recover from a security attack. Examples are encryption algorithms, digital signatures and authentication protocols. An __________ attack attempts to Active alter system resources or affect their operation. "The protection afforded to Computer Security an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources" is the definition of _________ . A loss of __________ is the Availability disruption of access to or use of information or an information system. Irreversible __________ Encipherment mechanisms include hash algorithms and message authentication codes, which are used in digital signature and message authentication applications. Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 12/45 03/11/2021, 15:13 In the United States, the Crypto CH 1 - 3 Flashcards | Quizlet Family Educational Rights and Privacy Act (FERPA) release of student grade information is regulated by the __________ . A loss of _________ is the integrity unauthorized modification or destruction of information. A _________ attack attempts to Passive learn or make use of information from the system but does not affect system resources. The __________ service is authentication concerned with assuring the recipient that the message is from the source that it claims to be from. This service must also assure that the connection is not interfered with in such a way that a third party can masquerade as one of the two legitimate parties for the purposes of unauthorized transmission or reception. Two specific authentication data origin services defined in X.800 are peer entity authentication and _________ authentication. Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 13/45 03/11/2021, 15:13 In the context of network Crypto CH 1 - 3 Flashcards | Quizlet access control security, ___________ is the ability to limit and control the access to host systems and applications via communications links. __________ prevents either sender Nonrepudiation or receiver from denying a transmitted message. Thus, when a message is sent, the receiver can prove that the alleged sender in fact sent the message and when a message is received, the sender can prove that the alleged receiver in fact received the message. Viruses and worms are two software examples of _________ attacks. Such attacks can be introduced into a system by means of a disk that contains the unwanted logic concealed in otherwise useful software. They can also be inserted into a system across a network. An __________ is an assault on attack system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system. Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 14/45 03/11/2021, 15:13 __________ is the use of a trusted Crypto CH 1 - 3 Flashcards | Quizlet Notarization third party to assure certain properties of a data exchange. Symmetric encryption remains True by far the most widely used of the two types of encryption. [True or False] Rotor machines are True sophisticated precomputer hardware devices that use substitution techniques. [True or False] Symmetric encryption is a False form of cryptosystem in which encryption and decryption are performed using different keys. It is also known as nonconventional encryption. [True or False] With the use of symmetric False encryption, the principal security problem is maintaining the secrecy of the key. [True or False] Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 15/45 03/11/2021, 15:13 The process of converting Crypto CH 1 - 3 Flashcards | Quizlet False from plaintext to ciphertext is known as deciphering or decryption. [True or False] The algorithm will produce a True different output depending on the specific secret key being used at the time. The exact substitutions and transformations performed by the algorithm depend on the key. [True or False] When using symmetric False encryption it is very important to keep the algorithm secret. [True or False] On average, half of all True possible keys must be tried to achieve success with a bruteforce attack. [True or False] Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 16/45 03/11/2021, 15:13 Ciphertext generated using a Crypto CH 1 - 3 Flashcards | Quizlet False computationally secure encryption scheme is impossible for an opponent to decrypt simply because the required information is not there. [True or False] Monoalphabetic ciphers are True easy to break because they reflect the frequency data of the original alphabet. [True or False] As with Playfair, the strength True of the Hill cipher is that it completely hides single letter frequencies. [True or False] A scheme known as a one- True time pad is unbreakable because it produces random output that bears no statistical relationship to the plaintext. [True or False] Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 17/45 03/11/2021, 15:13 The one-time pad has Crypto CH 1 - 3 Flashcards | Quizlet False unlimited utility and is useful primarily for high-bandwidth channels requiring low security. [True or False] The most widely used cipher True is the Data Encryption Standard. [True or False] Steganography renders the False message unintelligible to outsiders by various transformations of the text. [True or False] Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 18/45 03/11/2021, 15:13 __________ techniques map Crypto CH 1 - 3 Flashcards | Quizlet C) Substitution plaintext elements (characters, bits) into ciphertext elements. A) Symmetric B) Traditional C) Substitution D) Transposition Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 19/45 03/11/2021, 15:13 Joseph Mauborgne proposed Crypto CH 1 - 3 Flashcards | Quizlet A) one-time pad an improvement to the Vernam cipher that uses a random key that is as long as the message so that the key does not need to be repeated. The key is used to encrypt and decrypt a single message and then is discarded. Each new message requires a new key of the same length as the new message. This scheme is known as a(n) __________ . A) one-time pad B) pascaline C) polycipher D) enigma Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 20/45 03/11/2021, 15:13 An original intelligible Crypto CH 1 - 3 Flashcards | Quizlet A) plaintext, ciphertext message fed into the algorithm as input is known as __________ , while the coded message produced as output is called the __________ . A) plaintext, ciphertext B) cipher, plaintext C) decryption, encryption D) deciphering, enciphering Restoring the plaintext from D) deciphering the ciphertext is __________ . A) transposition B) encryption C) steganography D) deciphering Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 21/45 03/11/2021, 15:13 A __________ attack involves Crypto CH 1 - 3 Flashcards | Quizlet A) brute-force trying every possible key until an intelligible translation of the ciphertext is obtained. A) brute-force B) chosen plaintext C) ciphertext only D) Caesar attack Techniques used for C) cryptanalysis deciphering a message without any knowledge of the enciphering details is ___________ . A) steganography B) blind deciphering C) cryptanalysis D) transposition Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 22/45 03/11/2021, 15:13 The ___________ takes the Crypto CH 1 - 3 Flashcards | Quizlet D) decryption algorithm ciphertext and the secret key and produces the original plaintext. It is essentially the encryption algorithm run in reverse. A) diagram algorithm B) cryptanalysis C) Voronoi algorithm D) decryption algorithm If both sender and receiver B) conventional encryption use the same key, the system is referred to as: A) public-key encryption B) conventional encryption C) two-key D) asymmetric Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 23/45 03/11/2021, 15:13 __________ attacks exploit the Crypto CH 1 - 3 Flashcards | Quizlet B) Cryptanalytic characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. A) Brute-force B) Cryptanalytic C) transposition D) Block cipher The __________ was used as the D) Playfair cipher standard field system by the British Army in World War I and was used by the U.S. Army and other Allied forces during World War II. A) Caesar cipher B) Hill cipher C) Rail Fence cipher D) PlayfairCH cipher Crypto 1-3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 24/45 03/11/2021, 15:13 The __________ attack is the Crypto CH 1 - 3 Flashcards | Quizlet C) ciphertext-only easiest to defend against because the opponent has the least amount of information to work with. A) chosen plaintext B) chosen ciphertext C) ciphertext-only D) known plaintext _________ refer to common two- D) Digrams letter combinations in the English language. A) Transposition B) Polyalphabetic cipher C) Streaming D) Digrams Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 25/45 03/11/2021, 15:13 A way to improve on the Crypto CH 1 - 3 Flashcards | Quizlet B) polyalphabetic substitution cipher simple monoalphabetic technique is to use different monoalphabetic substitutions as one proceeds through the plaintext message. The general name for this approach is ___________ . A) rail fence cipher B) polyalphabetic substitution cipher C) polyanalysis cipher D) cryptanalysis A technique referred to as a A) transposition cipher __________ is a mapping achieved by performing some sort of permutation on the plaintext letters. A) transposition cipher B) Caesar cipher C) polyalphabetic cipher D) monoalphabetic cipher Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 26/45 03/11/2021, 15:13 The methods of __________ Crypto CH 1 - 3 Flashcards | Quizlet B) steganography conceal the existence of the message in a graphic image. A) cryptology B) steganography C) cryptography D) decryptology __________ encryption is a form of Symmetric cryptosystem in which encryption and decryption are performed using the same key. A technique for hiding a steganography secret message within a larger document or picture in such a way that others cannot discern the presence or contents of the hidden message is __________ . An encryption scheme is said Computationally Secure to be __________ if the cost of breaking the cipher exceeds the value of the encrypted information and the time required to break the cipher exceeds the useful lifetime of the information. Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 27/45 03/11/2021, 15:13 The two types of attack on an Crypto CH 1 - 3 Flashcards | Quizlet brute force encryption algorithm are cryptanalysis based on properties of the encryption algorithm, and _________ which involves trying all possible keys. Cryptographic systems are The number of keys used characterized along three independent dimensions: The type of operations used for transforming plaintext to ciphertext; The way in which the plaintext is processed; and __________ . All encryption algorithms are transposition based on two general principles: substitution and ____________ . One of the simplest and best Vigenere known polyalphabetic ciphers is _________ cipher. In this scheme, the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25. Each cipher is denoted by a key letter which is the ciphertext letter that substitutes for the plaintext letter a. Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 28/45 03/11/2021, 15:13 A __________ cipher processes Crypto CH 1 - 3 Flashcards | Quizlet block, stream the input one block of elements at a time producing an output block for each input block whereas a __________ cipher processes the input elements continuously producing output one element at a time. The earliest known and Caesar simplest use of a substitution cipher was called the __________ cipher and involved replacing each letter of the alphabet with the letter standing three places further down the alphabet. An encryption scheme is unconditionally secure __________ secure if the ciphertext generated by the scheme does not contain enough information to determine uniquely the corresponding plaintext, no matter how much ciphertext is available. The best known multiple letter Playfair encryption cipher is the __________ which treats digrams in the plaintext as single units and translates these units into ciphertext digrams. Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 29/45 03/11/2021, 15:13 The task of making large Crypto CH 1 - 3 Flashcards | Quizlet Rail fence quantities of random keys on a regular basis and distributing a key of equal length to both sender and receiver for every message sent are difficulties of the __________ scheme. The simplest transposition rail fence cipher cipher is the _________ technique in which the plaintext is written down as a sequence of diagonals and then read off as a sequence of rows. The most widely used cipher DES ever is the __________ The __________ consist of a set of Rotor independently rotating cylinders through which electrical pulses can flow. Each cylinder has 26 input pins and 26 output pins with internal wiring that connects each input pin to a unique output pin. The vast majority of network False based symmetric cryptographic applications make use of stream ciphers. [True or False] Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 30/45 03/11/2021, 15:13 The Feistel cipher structure, Crypto CH 1 - 3 Flashcards | Quizlet True based on Shannon's proposal of 1945, dates back over a quarter of a century and is the structure used by many significant symmetric block ciphers currently in use. [True or False] DES uses a 56-bit block and a False 64-bit key. [True or False] If the bit-stream generator is a True key-controlled algorithm the two users only need to share the generating key and then each can produce the keystream. [True or False] A problem with the ideal True block cipher using a small block size is that it is vulnerable to a statistical analysis of the plaintext. [True or False] Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 31/45 03/11/2021, 15:13 Confusion seeks to make the Crypto CH 1 - 3 Flashcards | Quizlet False statistical relationship between the plaintext and ciphertext as complex as possible in order to thwart attempts to deduce the key. [True or False] All other things being equal, False smaller block sizes mean greater security. [True or False] Greater complexity in the True subkey generation algorithm should lead to greater difficulty of cryptanalysis. [True or False] Fast software True encryption/decryption and ease of analysis are two considerations in the design of a Feistel cipher. [True or False] Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 32/45 03/11/2021, 15:13 A prime concern with DES has Crypto CH 1 - 3 Flashcards | Quizlet True been its vulnerability to bruteforce attack because of its relatively short key length. [True or False] One criteria for an S-box is: "If False two inputs to an S-box differ in exactly one bit, the outputs must also differ in exactly one bit. [True or False] The heart of a Feistel block True cipher is the function F, which relies on the use of S-boxes. [True or False] The strict avalanche criterion False and the bit independence criterion appear to weaken the effectiveness of the confusion function. [True or False] An advantage of key- True dependent S-boxes is that because they are not fixed, it is impossible to analyze the Sboxes ahead of time to look for weaknesses. [True or False] Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 33/45 03/11/2021, 15:13 The key schedule algorithm is Crypto CH 1 - 3 Flashcards | Quizlet False more popular and has received more attention than S-box design. [True or False] DES exhibits the classic A) Feistel __________ block cipher structure, which consists of a number of identical rounds of processing. A) Feistel B) SAC C) Rendell D) Shannon Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 34/45 03/11/2021, 15:13 A sequence of plaintext Crypto CH 1 - 3 Flashcards | Quizlet C) permutation elements is replaced by a __________ of that sequence which means that no elements are added, deleted or replaced in the sequence, but rather the order in which the elements appear in the sequence is changed. A) stream B) substitution C) permutation D) diffusion A __________ cipher is one that C) stream encrypts a digital data stream one bit or one byte at a time. A) product B) key C) stream D) block Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 35/45 03/11/2021, 15:13 __________ cryptanalysis is based Crypto CH 1 - 3 Flashcards | Quizlet D) Linear on finding linear approximations to describe the transformations performed in DES. A) Block B) Permutation C) Stream D) Linear A __________ cipher is one in D) block which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length. A) bit B) stream C) product D) block Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 36/45 03/11/2021, 15:13 __________ is when each plaintext Crypto CH 1 - 3 Flashcards | Quizlet A) Substitution element or group of elements is uniquely replaced by a corresponding ciphertext element or group of elements. A) Substitution B) Diffusion C) Permutation D) Streaming Key sizes of __________ or less are B) 64 bits now considered to be inadequate. A) 128 bits B) 64 bits C) 16 bits D) 32 bits Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 37/45 03/11/2021, 15:13 __________ cryptanalysis is the Crypto CH 1 - 3 Flashcards | Quizlet B) Differential first published attack that is capable of breaking DES in less than 255 encryptions. A) Permutation B) Differential C) Confusion D) Linear The criteria used in the design B) Data Encryption Standard of the __________ focused on the design of the S-boxes and on the P function that takes the output of the S-boxes. A) Avalanche Attack B) Data Encryption Standard C) Substitution Key D) Product Cipher Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 38/45 03/11/2021, 15:13 The greater the number of Crypto CH 1 - 3 Flashcards | Quizlet B) harder rounds, the __________ it is to perform cryptanalysis. A) equally difficult B) harder C) easier D) less difficult The function F provides the C) confusion element of __________ in a Feistel cipher. A) stability B) clarification C) confusion D) alignment Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 39/45 03/11/2021, 15:13 One of the most intense areas Crypto CH 1 - 3 Flashcards | Quizlet D) S-box of research in the field of symmetric block ciphers is __________ design. A) F-box B) E-box C) D-box D) S-box Mister and Adams proposed D) bent functions that all linear combinations of S-box columns should be _________ which are a special class of Boolean functions that are highly nonlinear according to certain mathematical criteria. A) angular functions B) horizontal functions C) vertical functions D) bent functions Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 40/45 03/11/2021, 15:13 The Nyberg approach that is Crypto CH 1 - 3 Flashcards | Quizlet B) human-made more or less a manual approach with only simple mathematics to support it is __________ . A) random with testing B) human-made C) random D) math-made Allowing for the maximum A) ideal block cipher number of possible encryption mappings from the plaintext block is referred to by Feistel as the __________ . A) ideal block cipher B) ideal substitution cipher C) round function D) diffusion cipher Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 41/45 03/11/2021, 15:13 A _________ is an Crypto CH 1 - 3 Flashcards | Quizlet Block Cipher encryption/decryption scheme in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length. __________ seeks to make the Confusion relationship between the statistics of the ciphertext and the value of the encryption key as complex as possible so that even if the attacker can get some handle on the statistics of the ciphertext, the way in which the key was used to produce that ciphertext is so complex it is difficult to deduce the key. Many block ciphers have a Feistel __________ structure which consists of a number of identical rounds of processing and in each round a substitution is performed on one half of the data being processed, followed by a permutation that interchanges the two halves. Two important methods of Linear cryptanalysis are differential cryptanalysis and _________ cryptanalysis. Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 42/45 03/11/2021, 15:13 The __________ criterion is Crypto CH 1 - 3 Flashcards | Quizlet Guaranteed avalanche defined as: "An S-box satisfies GA of order y if, for a 1-bit input change, at least y output bits change." In ___________ the statistical Diffusion structure of the plaintext is dissipated into long-range statistics of the ciphertext. This is achieved by having each plaintext digit affect the value of many ciphertext digits. The most widely used DES encryption scheme is based on the __________ adopted in 1977 by the National Bureau of Standards as Federal Information Processing Standard 46. A change in one bit of the Avalanche plaintext or one bit of the key should produce a change in many bits of the ciphertext. This is referred to as the __________ effect. Two areas of concern Key Size regarding the level of security provided by DES are the nature of the algorithm and the __________ . Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 43/45 03/11/2021, 15:13 A _________ attack exploits the Crypto CH 1 - 3 Flashcards | Quizlet Timing fact that an encryption or decryption algorithm often takes slightly different amounts of time on different input The __________ criterion states Bit independence that output bits j and k should change independently when any single input bit i is inverted for all i, j and k. The rationale behind __________ Differential cryptanalysis is to observe the behavior of pairs of text blocks evolving along each round of the cipher instead of observing the evolution of a single text block. The cryptographic strength of The Number of Rounds a Feistel cipher derives from three aspects of the design: the function F, the key schedule algorithm, and __________ . The __________ criterion states Strict Avalanche that any output bit j of an Sbox should change with probability 1/2 when any single input bit i is inverted for all i,j. Crypto CH 1 - 3 https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 44/45 03/11/2021, 15:13 An example of a technique Crypto CH 1 - 3 Flashcards | Quizlet Blowfish that uses S-boxes that are both random and key dependent is ___________ , which starts with S-boxes filled with pseudorandom digits and then alters the contents using the key. https://quizlet.com/433132148/crypto-ch-1-3-flash-cards/ 45/45