Security Questions Answers
Security Questions Answers
Security attacks are attempts made by unauthorized users to access, alter, or damage data and systems.
Types of Attacks:
|----------------|--------------------------------------------|--------------------------------------------|
Ciphers are encryption methods used in cryptography. Stream and block ciphers are two main types.
|----------------|---------------------------------------------|--------------------------------------------|
| Speed | Faster, used in real-time systems | Slower, but offers higher security |
| Error Impact | Affects only one bit | May affect entire block |
The avalanche effect is a desirable property in cryptographic algorithms where a small change in the input leads to a
- If one bit in the plaintext or key is changed, many bits in the ciphertext should change.
- This helps prevent attackers from predicting how changes affect encryption.
Importance:
Example:
- Changing 1 bit in input may alter more than 50% of the output bits.
The Data Encryption Standard (DES) is a symmetric-key algorithm used for data encryption.
Strengths:
1. Fast Performance:
2. Widespread Adoption:
- Although now considered outdated due to its short key length (56 bits), DES introduced important principles in
symmetric encryption.
Usage:
Public Key Cryptography (PKC) uses a pair of keys - a public key for encryption and a private key for decryption.
Key Features:
How it Works:
Advantages:
Applications:
Example Algorithms:
1. Secure Communication:
2. Digital Signatures:
Other Applications:
Benefits:
- Enhances confidentiality and data integrity.
Used In:
A cryptographic hash function converts data of any size into a fixed-length hash value, which is a unique representation
Properties:
1. Deterministic:
2. Collision Resistance:
- Very difficult to find two different inputs with the same hash output.
Other Features:
- Fast computation.
Use Case:
A Message Authentication Code is a short string of bits generated using a secret key and message, used to ensure
Purpose:
- Verifies that the message comes from the correct sender.
How It Works:
- Sender generates MAC using a shared secret key and sends it with the message.
Key Features:
Used In:
Authentication Methods:
Explanation:
Use Cases:
- Online accounts, ATM machines, office logins.
HTTPS (HyperText Transfer Protocol Secure) is the secure version of HTTP. It encrypts communication between a web
How It Works:
Benefits:
Common Uses:
Indicators:
Importance: