KINDLY JUST ANSWER THESE 1 AND 2 EACH FOR 125 WORDS FROM THE
TUTORS VIEW POINT AND IF POSSIBLE NOT USING REFERENCE THANKS A LOT
Stream cipher and block cipher are both symmetric key
ciphers. There are many ways to launch a cryptanalytic attack against a cipher
such as cyphertext-only analysis (COA), dictionary attack, brute force attack
(BFA), and Man-In-The-Middle Attack (MITM) to name a few.
is your understanding of the difference between astream cipherand
Block cipher takes plain text one block at a time and cipher
text takes one byte of plain text at a time. The difference is the way they
convert plain text into cipher text.
are two ways tolaunch a cryptanalytic attack against a cipher (based
upon what the attacker knows or has in possession)? Be sure to provide
detailed examples with supporting research.
Brute force attack (BFA) uses the cipher text and the
algorithm that they know. Try all different keys When the key is long the time
of completion is high. Dictionary attack making a dictionary from ciphertext and
corresponding plaintext that has been acquired. Use their dictionary of
acquired ciphertext to get the plaintext(Cryptosystems, n.d).
is your understanding of the difference between an unconditionally secure
cipher and a computationally secure cipher?
A computationally secure cipher is unbreakable because of
the amount of power that is needed to break the encryption or because it is too
expensive to use. The unconditionally secure cipher is shielded from computer
power and all kinds of attacks. Most modern cryptography schemes rely not on
perfect security, but on computational security.
A scheme can be said to be computationally secure if
it cannot be cracked in a reasonable time. This is a concept that relates to
how long it will take a computer to conduct a task (security, n.d).
organization has asked for a cryptographic algorithm recommendation for a
new project that requires high-level security. What algorithm would you
recommend and why?
I recommend the Advanced Encryption Standard (AES) it is a
part of the symmetric algorithm category. Longer keys. One of the safest and
most flexible algorithms(Jain, 2021).
Cryptosystems, A. O. (n.d).Attacks On Cryptosystems.
Retrieved from Tutorials Point: www.tutorialspoint.com
Jain, P. (2021, June 16).5 Best Encryption
Algorithms for Cybersecurity. Retrieved from IFP Insight for Professionals:
security, C. (n.d).Computational security.
Retrieved from Isaac Computer Science: isaaccomputerscience.org
What is your understanding of the difference between astream
cipherand ablock cipher?
The main differences of a stream cipher and a block cipher
is that a block cipher converts the plain text to a ciphertext by taking plain
block at a time while stream cipher converts the plain text
into cipher text by taking one byte of plain text at a time. The block ciphers
slower since an entire block must be accumulated before the
data is encrypted or decrypted.
What are two ways to launch a cryptanalytic attack against a
cipher (based upon what the attacker knows or has in possession)? Be sure
provide detailed examples with supporting research.
There are a couple of ways to launch a cryptanalytic attack
with the attackers knowing certain information. One attack is a known
(KPA) attack, in which the attacker has access to plaintext
and ciphertext. The most known example of a KPA attack would be during
second World War according to, “German Cipher Machines of
World War 2 (David P.Mowry)”,this was often used to cipher the
Another way to launch a cryptanalytic attack is with
ciphertext only attack. A ciphertext only attack (COA) the attacker has access
only to a
set of ciphertext. For example, an attacker might know the
language that the Ciphertext is written in.