100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Crypto Final Actual Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
05-10-2024
Written in
2024/2025

Crypto Final Actual Exam Questions and CORRECT Answers Cipher and symmetric key encryption: Can we prove security of block ciphers already? - CORRECT ANSWER- no Cipher and symmetric key encryption: Define shift cipher - CORRECT ANSWER- A shift cipher can be defined like that: Enc(m) = m + k mod 26, and Dec(c) = c - k mod 26, here k is the secret key

Show more Read less
Institution
Crypto
Course
Crypto









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Crypto
Course
Crypto

Document information

Uploaded on
October 5, 2024
Number of pages
12
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

Crypto Final Actual Exam Questions and
CORRECT Answers
Cipher and symmetric key encryption:

Can we prove security of block ciphers already? - CORRECT ANSWER✔✔- no


Cipher and symmetric key encryption:

Define shift cipher - CORRECT ANSWER✔✔- A shift cipher can be defined like that:
Enc(m) = m + k mod 26, and Dec(c) = c - k mod 26, here k is the secret key


Cipher and symmetric key encryption:
Show that the shift cipher is trivial to break using known-plaintext attack - CORRECT
ANSWER✔✔- the adversary can observe a pair of plaintext and ciphertext at least, denoted
by (α,β), so it can derive the secret key k = β − α mod 26


Cipher and symmetric key encryption:
Show that the shift cipher is trivial to break using chosen-plaintext attack - CORRECT
ANSWER✔✔- the adversary can choose a plaintext (a), then get the corresponding
ciphertext (β), which will be easily to derive the secret key k= β − a mod 26.


Cipher and symmetric key encryption:
Show that the shift cipher is trivial to break using chose-ciphertext attack - CORRECT
ANSWER✔✔- the adversary not only can choose a plaintext and get the its ciphertext
(access Enc oracle), but also can choose ciphertext (a) and get its plaintext α(access Dec
oracle). It also can derive the secret keys easily: k= a-α mod 26.


Cipher and symmetric key encryption:
What is the cause of that frequency analysis can help break ciphers? - CORRECT
ANSWER✔✔- Because in the English text, individual letters follow some specific
probability distributions


Cipher and symmetric key encryption:

Define the syntax of SKES. - CORRECT ANSWER✔✔- skes consists of three algorithms:

, • KeyGen - a randomized algorithm which takes a security parameter k and returns K ∈ S by
its respective distribution.
• Encrypt - a randomized or deterministic algorithm which takes K and a plaintext m and
returns c ∪ {⊥}.
• Decrypt - a deterministic algorithm which takes K and c and returns m ∪ {⊥}.


Cipher and symmetric key encryption:

Define the semantics (i.e., IND-CPA) of SKES. - CORRECT ANSWER✔✔- SKES is IND-
CPA if and only if the adversary cannot distinguish a single- bit of an unknown ciphertext
given a polynomial number of adaptively chosen plain- text/ciphertext pairs with a non-
negligible probability.


Cipher and symmetric key encryption:

Define the semantics (i.e., IND-CCA) of SKES. - CORRECT ANSWER✔✔- SKES is IND-
CCA if and only if the adversary cannot distinguish a single-bit of an unknown ciphertext
given an oracle to decrypt a polynomial number of ciphertext with a non-neglibile probability


Cipher and symmetric key encryption:
Explain why the simple classic substitution cipher we studied in the lecture does not meet the
security definitions of IND-CPA and IND-CCA - CORRECT ANSWER✔✔- IND-CPA and
IND-CCA require that the encryption algorithm is probabilistic. However, in the substitution
cipher, the encryption algorithm is deterministic.


Cipher and symmetric key encryption:
Eve has tricked Alice into decrypting a bunch of ciphertexts that Alice encrypted last month
but forgot about. What type of attack is Eve employing? - CORRECT ANSWER✔✔-
ciphertext only attack


Cipher and symmetric key encryption:

Explain EBC mode of encyption - CORRECT ANSWER✔✔- ECB (Electronic Code Book)
encrypts each successive k-bits of a plaintext independently, then transmits and decrypts the
blocks independently. This is a method by which we use block ciphers to encrypt arbitrary-
long messages.


Cipher and symmetric key encryption:

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1067
Member since
1 year
Number of followers
102
Documents
68976
Last sold
9 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

168 reviews

5
73
4
30
3
43
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions