CIS 3210 Lecture Notes - Lecture 39: Data Encryption Standard, Brute-Force Attack, Chosen-Plaintext Attack

25 views3 pages

Document Summary

Cipher-text only attack: trudy has cipher text she can analyze. Known-plaintext attack: trudy has plaintext corresponding to cipher text (ex: in mono alphabetic cipher, trudy determines pairings for a,l,i,c,e,b,o,) Chosen-plaintext attack: trudy can get cipher text for chosen plaintext. Symmetric key cryptography - bob and alice share same (symmetric) key: k. The key is knowing substitution pattern in mono alphabetic substitution cipher. Symmetric-key nist standard, replaced des in 2001. Further, to limit the impact of a potential discovery by a cryptographic adversary, the shared secret key between alice and bob should be changed regularly and kept secure during distribution and in service. Would need to change the shared key very often, and on a very large network (of size n nodes) you would need n(n-1) / 2 keys. Requires sender and receiver know the shared secret key. Q: how to agree on key in the rst place (particularly if never met) Sender, receiver do not share secret key.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers