COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Man-in-the middle attack
|
|
Birthday attack
|
|
Denial of service attack
|
|
Dictionary attack
|
Detailed explanation-1: -The answer is A. Cryptanalysis is the process of trying to reverse-engineer a cryptosystem with the goal of uncovering the key that was used. Once this key is uncovered all other messages encrypted with this key can be accessed.
Detailed explanation-2: -➢ Cryptanalysis: Cryptanalysis is the decryption and analysis of codes, ciphers or encrypted text. ➢ Brute-force attack: The attacker tries every possible key on a piece of cipher text until an intelligible translation into plaintext is obtained.
Detailed explanation-3: -Symmetric ciphers For symmetric-key ciphers, a brute force attack typically means a brute-force search of the key space; that is, testing all possible keys in order to recover the plaintext used to produce a particular ciphertext.
Detailed explanation-4: -Encryption algorithms demonstrate collision avoidance. To protect against the birthday attack, encryption algorithms must demonstrate collision avoidance (that is, to reduce the chance that different inputs will produce the same output).
Detailed explanation-5: -Bruteforce Attacks. Replay Cryptography Attack. Man in the Middle Attack. Implementation Attack. Statistical Attack. Chosen Ciphertext Attack. Known Plaintext Attack. Chosen Plaintext Attack. More items