0% found this document useful (0 votes)
22 views2 pages

Luc Questions

Uploaded by

Mstafa Mhamad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views2 pages

Luc Questions

Uploaded by

Mstafa Mhamad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

Q1 What is Differential and Linear Cryptanalysis?

The use of linear cryptanalysis is to figure out what is the linear relationship
present between some plaintext bits, ciphertext bits, and unknown key bits very
easily.

The use of differential cryptanalysis is to get clues about some critical bits,
reducing the need for an extensive search.
----------------------------------------------------------------------
Q1 What is Diffusion and Confusion?

Diffusion means that if we change a character of the plaintext, then several


characters of the ciphertext should change, and similarly, if we change a
character of the ciphertext, then several characters of the plaintext should
change.

Confusion means that the key does not relate in a simple way to the
ciphertext. In particular, each character of the ciphertext should depend on
several parts of the key.
-----------------------------------------------------------------------------------
--

Q3: Eve has intercepted the ciphertext “uvaclyfzlbyl”. Show how she can
use a brute-force attack to break the cipher.

A brute force attack is a method for breaking encryption by trying all possible
encryption keys

brute force attack trying every possible decryption key to break cipher

solution open odf (grnga slide 9)


------------------------------------------------------------------

Q2: What is the key domain for any multiplicative cipher?


The key needs to be in Z26
*. This set has only 12 members: 1, 3, 5, 7, 9, 11, 15, 17, 19, 21, 23,25
-------------------------------------------------------------------------------

Q2: When additive cipher is a special case of Vigenere cipher?


A Vigenere cipher as a combination of m additive cipher
-----------------------------------------------------------------------------------
--

1: What are basic types of cryptanalysis attack?

Known-Plaintext Analysis (KPA)


Chosen-Plaintext Analysis (CPA)
Ciphertext-Only Analysis (COA)
Man-In-The-Middle (MITM) attack
Adaptive Chosen-Plaintext Analysis (ACPA)
-----------------------------------------------------------------------------------
----------
What are common methods that can be used in
ciphertext only attack?

The most important methods are:


Attack on Two-Time Pad.
Frequency Analysis.
-----------------------------------------------------------------------------------
-------------

Q1 Explain key expansion in AES 192 and AES 256?

-------------
AES 192 bit:
AES 128bit==12 round+preround=13 then 4 word each round so 13*4 word==52 word
Key Expansion Algorithm: The AES key expansion algorithm takes as input a four-word
(16-byte) key and produces a linear array of 52 words (208bytes).
-------------
-------------
AES 256 bit:
AES 128bit==14 round+preround=15 then 4 word each round so 15*4 word==60 word
Key Expansion Algorithm: The AES key expansion algorithm takes as input a four-word
(16-byte) key and produces a linear array of 60 words (240bytes).
-------------
-----------------------------------------------------------------------------------
----------------
What are difference and similarity between block cipher and
stream cipher?

block ciphers mix chunks of plaintext bits together with key bits to produce
chunks of ciphertext of the same size, usually 64 or 128 bits. Stream ciphers, on
the other hand, don’t mix plaintext and key bits; instead, they generate
pseudorandom bits from the key and encrypt the plaintext by XORing it with the
pseudorandom bits[.]”

The major difference between a block cipher and a stream cipher is that the block
cipher encrypts and decrypts a block of the text at a time. On the other hand,
stream cipher encrypts and decrypts the text by taking the one byte of the text at
a time.

------------------------------------------------------
What is pseudorandom number generator?

pseudorandom bit generator that produces a stream of 8 bit numbers that are
apparently random.

A pseudorandom number generator, also known as a deterministic random bit


generator, is an algorithm for generating a sequence of numbers whose properties
approximate the properties of sequences of random numbers.

You might also like