Diffie–Hellman key exchange is a method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle and named after Whitfield Diffie and Martin Hellman. DH is one of the earliest practical examples of public key exchange implemented within the field of cryptography. Published in 1976 by Diffie and Hellman, this is the earliest publicly known work that proposed the idea of a private key and a corresponding public key.
Question 33
With Cipher-block chaining (CBC) what happens?
Options:
A.
The block cipher is turned into a stream cipher
B.
The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption
C.
Each block of plaintext is XORed with the previous ciphertext block before being encrypted
D.
The cipher text from the current round is XORed with the plaintext for the next round
Answer:
C
Explanation:
Explanation:
Explanation
Each block of plaintext is XORed with the previous ciphertext block before being encrypted
In CBC mode, each block of plaintext is XORed with the previous ciphertext block before being encrypted. This way, each ciphertext block depends on all plaintext blocks processed up to that point. To make each message unique, an initialization vector must be used in the first block.
Question 34
What does Output feedback (OFB) do:
Options:
A.
The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption
B.
The cipher text from the current round is XORed with the plaintext from the previous round
C.
A block cipher is converted into a stream cipher by generating a keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext
D.
The cipher text from the current round is XORed with the plaintext for the next round
Answer:
C
Explanation:
Explanation:
Explanation
A block cipher is converted into a stream cipher by generating a keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext
The output feedback (OFB) mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext. Just as with other stream ciphers, flipping a bit in the ciphertext produces a flipped bit in the plaintext at the same location. This property allows many error-correcting codes to function normally even when applied before encryption.
Question 35
The greatest weakness with symmetric algorithms is _____.
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link. This requirement that both parties have access to the secret key is one of the main drawbacks of symmetric key encryption, in comparison to public-key encryption (also known as asymmetric key encryption).