Question

In: Computer Science

Explain the different classes of attacks that should be resisted by a secure block cipher

  1. Explain the different classes of attacks that should be resisted by a secure block cipher

Solutions

Expert Solution

A secure cipher should usually resist three types of attacks

Chosen plain text attack is a model for cryptanalysis which assumes that the attacker can choose the random plain text to be encrypted and obtain the corresponding cipher text.

The main goal of this isto retreive some extra information which can reduce the security of the encryption scheme.

Chosen cipher text attacks where the attacker can get information by obtaining the decryptions of the chosen cipher text.

Known plain text attacks where the attacker has access to both the plain text and its encrypted version.

Please find the attached image for the classes a secure block cipher can resist.


Related Solutions

What is a block cipher? What is the equation to describe a block cipher?
 What is a block cipher? What is the equation to describe a block cipher? What is symmetric key encryption and compare with Public key encryption? Why is a block cipher considered a keyed permutation? What is the most common block cipher currently in use? Explain the "key schedule" Considering the DES algorithm, what Caused it to encounter serious security issues? What are Sub-Bytes? What is the difference in output when considering ShiftRows and MixColumns? What is 3DES? 3DES is the workhorse of which industry and why?
Give two ways to encrypt a partial block cipher. Your first method should result in ciphertext...
Give two ways to encrypt a partial block cipher. Your first method should result in ciphertext that is the size of a complete block, while your second method should not expand the data. Discuss any possible security concerns for your two methods.
Assignment: Square Matrix ("Caesar Block")Cipher C++ ASSIGNMENTS *REMEMBER IT SHOULD NOT ONLY READ ONE LINE OR...
Assignment: Square Matrix ("Caesar Block")Cipher C++ ASSIGNMENTS *REMEMBER IT SHOULD NOT ONLY READ ONE LINE OR A SINGLE WORD remember, read, understand, and use the waterpump.cpp program will process an arbitrary amount of input text, however long. Arrange a stream in a two dimensional array of characters by filling up the array a line at a time, from leftmost column to rightmost column. DO NOT USE A GETLINE: this program should be able to input an entire library, not a...
Steganography Describe substitution, Mon alphabets, and other classes, and attacks
Steganography Describe substitution, Mon alphabets, and other classes, and attacks
Kleptography Describe substitution, Mon alphabets, and other classes, and attacks
Kleptography Describe substitution, Mon alphabets, and other classes, and attacks
draw the block diagram of the CRO and explain the different components
draw the block diagram of the CRO and explain the different components
Suppose Alice is using a block cipher to send the message THE ORDER IS KARL, ANDY,...
Suppose Alice is using a block cipher to send the message THE ORDER IS KARL, ANDY, FRED AND IAN. IAN AND ANDY HAVE LEFT. to Bob. Assume that the block cipher is used in ECB mode, the English is divided into plaintext blocks of 2 letters (ignore spaces and punctuation) the ciphertext blocks are denoted C1,C2,...,C23 (a) Write down the 23 plaintext blocks. (b) Will any of the ciphertext blocks be repeated? If so, which ones? (c) Suppose an attacker...
Which block cipher mode to use? For each of the following scenarios, determine which of the...
Which block cipher mode to use? For each of the following scenarios, determine which of the four block cipher modes discussed in class would be most appropriate. Justify your answer. Encryption of the social security number field within every record of a database. Encryption of a Word document (.doc) that will be sent as an email attachment. Sector-by-sector encryption of an external hard drive. Real-time encryption of a non-packetized bit stream (e.g. raw digital video). Suppose a communication system encrypts...
Why in Cipher Block Chaining (CBC) mode, an initialization vector is needed in addition to the...
Why in Cipher Block Chaining (CBC) mode, an initialization vector is needed in addition to the Key?
Why is the Cipher Block Chaining (CBC) mode of operation considered preferable to the Electronic Code...
Why is the Cipher Block Chaining (CBC) mode of operation considered preferable to the Electronic Code Book (ECB) mode? Is it possible to perform encryption operations in parallel on multiple blocks of plaintext in the CBC mode? How about decryption?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT