Get help now

Introduction To Cryptography

  • Pages 2
  • Words 475
  • Views 266
  • dovnload

    Download

    Cite

  • Pages 2
  • Words 475
  • Views 266
  • Academic anxiety?

    Get original paper in 3 hours and nail the task

    Get your paper price

    124 experts online

    Therefore, it appears that the Vixen©re cipher is the most secure, followed by the Playful and then the Caesar. SQ. For each of the following say whether CB or CB would be most appropriate and give a brief explanation as to why. A. An online bank statement [10 points] b. An encrypted Poi session [10 points] c. Viewing of a website using TCP/IP According to our text Security Engineering by Ross Anderson, CB is “adequate for many simple operations such as challenge-response and some key management tasks; it’s also used to encrypt PINs in cash machine stations”. (Anderson, 2008).

    However, “using CB to encrypt message of more that an one block length… Such as bank payment messages, would be foolish, as messages could be subject to a cut and splice attack”. (Anderson, 2008). Subsequently, CB is used in “most commercial applications, which encrypt more than one block” and is “effective at disguising any patterns in the plaintext”. (Anderson, 2008). In addition, ‘the CB mode in such cases serves as an clean architectural boundary rather than as a confidentiality mode in its own right… And is not IV- based and does not enjoy Schema security’. Rockaway, 2011). CB, on the other hand, is “secure, in the Schema sense, if the user employs a random IV’. (Rockaway, 2011). Therefore, it can be assumed that CB would be the mode of choice for an online bank statement and for viewing a website using TCP/ IP due to the fact that more than one block needs to be encrypted. Whereas, CB would suffice for an encrypted Poi session because it uses connectionless protocols. SQ. What difference do you notice in the block size, discuss whether or not this cipher would be susceptible to statistical analysis and why.

    The difference in block size depends on the encryption key values. While this cipher is susceptible to statistical analysis, the longer the key, the larger the block size and the harder statistical analysis becomes. SQ. Analyze the data encrypted with the RASA cipher. How does this encryption method compare to the other methods he Lab has covered? The main difference using the RASA cipher is that it lacks the impact of a histogram. This is because the random nature of the characters varies as compared to the Caesar and Vixen©re.

    Also, the complex nature of the data created as the key length is increased causes visual or mathematical analysis to become more difficult. RASA is more secure because it uses asymmetric encryption and uses separate keys for encryption and decryption. Other methods use only one key for both. In any encryption method, the longer the key, the more secure the cipher will be. One downside to RASA is that is uses ore processing and memory and takes up more space, therefore it will run slower. (Anderson, 2008). SQ. What are the advantages of the Hybrid RASA-AES cipher?

    This essay was written by a fellow student. You may use it as a guide or sample for writing your own paper, but remember to cite it correctly. Don’t submit it as your own as it will be considered plagiarism.

    Need a custom essay sample written specially to meet your requirements?

    Choose skilled expert on your subject and get original paper with free plagiarism report

    Order custom paper Without paying upfront

    Introduction To Cryptography. (2018, Jun 10). Retrieved from https://graduateway.com/introduction-to-cryptography/

    Hi, my name is Amy 👋

    In case you can't find a relevant example, our professional writers are ready to help you write a unique paper. Just talk to our smart assistant Amy and she'll connect you with the best match.

    Get help with your paper
    We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy