KINDLY JUST ANSWER THESE 1 AND 2 EACH FOR 125 WORDS FROM THE TUTORS VIEW POINT AND IF POSSIBLE NOT USING REFERENCE THANKS A LOT 1) Stream cipher and block cipher are both symmetric key ciphers. There...

1 answer below »

KINDLY JUST ANSWER THESE 1 AND 2 EACH FOR 125 WORDS FROM THE
TUTORS VIEW POINT AND IF POSSIBLE NOT USING REFERENCE THANKS A LOT






1)






Stream cipher and block cipher are both symmetric key
ciphers. There are many ways to launch a cryptanalytic attack against a cipher
such as cyphertext-only analysis (COA), dictionary attack, brute force attack
(BFA), and Man-In-The-Middle Attack (MITM) to name a few.









  • What

    is your understanding of the difference between astream cipherand

    ablock cipher?








Block cipher takes plain text one block at a time and cipher
text takes one byte of plain text at a time. The difference is the way they
convert plain text into cipher text.









  • What

    are two ways tolaunch a cryptanalytic attack against a cipher (based

    upon what the attacker knows or has in possession)? Be sure to provide

    detailed examples with supporting research.








Brute force attack (BFA) uses the cipher text and the
algorithm that they know. Try all different keys When the key is long the time
of completion is high. Dictionary attack making a dictionary from ciphertext and
corresponding plaintext that has been acquired. Use their dictionary of
acquired ciphertext to get the plaintext(Cryptosystems, n.d).









  • What

    is your understanding of the difference between an unconditionally secure

    cipher and a computationally secure cipher?








A computationally secure cipher is unbreakable because of
the amount of power that is needed to break the encryption or because it is too
expensive to use. The unconditionally secure cipher is shielded from computer
power and all kinds of attacks. Most modern cryptography schemes rely not on
perfect security, but on computational security.






A scheme can be said to be computationally secure if
it cannot be cracked in a reasonable time. This is a concept that relates to
how long it will take a computer to conduct a task (security, n.d).









  • Your

    organization has asked for a cryptographic algorithm recommendation for a

    new project that requires high-level security. What algorithm would you

    recommend and why?








I recommend the Advanced Encryption Standard (AES) it is a
part of the symmetric algorithm category. Longer keys. One of the safest and
most flexible algorithms(Jain, 2021).






References






Cryptosystems, A. O. (n.d).Attacks On Cryptosystems.
Retrieved from Tutorials Point: www.tutorialspoint.com






Jain, P. (2021, June 16).5 Best Encryption
Algorithms for Cybersecurity
. Retrieved from IFP Insight for Professionals:
www.insightsforprofessionals.com






security, C. (n.d).Computational security.
Retrieved from Isaac Computer Science: isaaccomputerscience.org











2)













What is your understanding of the difference between astream
cipherand ablock cipher?











The main differences of a stream cipher and a block cipher
is that a block cipher converts the plain text to a ciphertext by taking plain
text’s






block at a time while stream cipher converts the plain text
into cipher text by taking one byte of plain text at a time. The block ciphers
move






slower since an entire block must be accumulated before the
data is encrypted or decrypted.











What are two ways to launch a cryptanalytic attack against a
cipher (based upon what the attacker knows or has in possession)? Be sure
to






provide detailed examples with supporting research.











There are a couple of ways to launch a cryptanalytic attack
with the attackers knowing certain information. One attack is a known
plaintext






(KPA) attack, in which the attacker has access to plaintext
and ciphertext. The most known example of a KPA attack would be during
the






second World War according to, “German Cipher Machines of
World War 2 (David P.Mowry)”,this was often used to cipher the
enemy.






Another way to launch a cryptanalytic attack is with
ciphertext only attack. A ciphertext only attack (COA) the attacker has access
only to a






set of ciphertext. For example, an attacker might know the
language that the Ciphertext is written in.








References












https://www.educba.com/stream-cipher-vs-block-cipher/






https://www.nsa.gov/portals/75/documents/about/cryptologic-heritage/historical-figures-publications/publications/wwii/german_cipher.pdf






Answered Same DayOct 01, 2022

Answer To: KINDLY JUST ANSWER THESE 1 AND 2 EACH FOR 125 WORDS FROM THE TUTORS VIEW POINT AND IF POSSIBLE NOT...

Aditi answered on Oct 02 2022
64 Votes
ANSWER
What is your understanding of the difference between a stream cipher and
a block cipher?
The Bloc
k cipher and the Stream cipher are both examples of symmetric key ciphers, which are a family of encryption algorithms that are generally used for directly transforming plaintext into cipher text. Both ciphers belong to the same family.
Messages that are sent in plaintext are first segmented into blocks of a certain size by a block cipher, and then the plaintext is transformed into cipher text using a key. Information is encrypted one bit at a time. A stream cipher, on the other hand, disassembles a message in plaintext into its component bits, which are then individually transformed into cipher text by making use of the key bits.
The Feistel Cipher is the implementation of a Block Cipher that is used the most often. Vernam Cipher is the primary implementation of the Stream Cipher algorithm.
What are two ways to launch a cryptanalytic attack against a cipher (based
upon what the attacker knows or has in possession)? Be sure to provide
detailed...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here