SlideShare a Scribd company logo
1 of 2
Objective:
Present an overview of the main concepts of symmetric
cryptography.
Explain the difference between cryptanalysis and brute-force
attack.
Summarize the functionality of DES.
Present an overview of AES.
Explain the concepts of randomness and unpredictability with
respect to random numbers.
Understand the differences among true random number
generators, pseudorandom number generators, and
pseudorandom functions.
Present an overview of stream ciphers and RC4.
Compare and contrast ECB, CBC, CFB, and counter modes of
operation.
Assignment
2.1 What are the essential ingredients of a symmetric cipher?
2.2 What are the two basic functions used in encryption
algorithms?
2.3 How many keys are required for two people to communicate
via a symmetric cipher?
2.4 What is the difference between a block cipher and a stream
cipher?
2.5 What are the two general approaches to attacking a cipher?
2.6 Why do some block cipher modes of operation only use
encryption while others use both encryption and decryption?
2.7 What is triple encryption?
2.8 Why is the middle portion of 3DES a decryption rather than
an encryption?
Complete your answers on a WORD Document.

More Related Content

Similar to ObjectivePresent an overview of the main concepts of symmetri.docx

A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
IJNSA Journal
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
ams1ams11
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 

Similar to ObjectivePresent an overview of the main concepts of symmetri.docx (20)

A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
 
Cs1355cns
Cs1355cnsCs1355cns
Cs1355cns
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Encryption
EncryptionEncryption
Encryption
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
 
Encryption
EncryptionEncryption
Encryption
 
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNINGENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
 
Cryptography
CryptographyCryptography
Cryptography
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
H42063743
H42063743H42063743
H42063743
 
Cryptographic lifecycle security training
Cryptographic lifecycle security trainingCryptographic lifecycle security training
Cryptographic lifecycle security training
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 

More from AKHIL969626

One of the most important concepts in clinical practice and group wo.docx
One of the most important concepts in clinical practice and group wo.docxOne of the most important concepts in clinical practice and group wo.docx
One of the most important concepts in clinical practice and group wo.docx
AKHIL969626
 
One and half pagesimple, noplagarism Title page, abstr.docx
One and half pagesimple, noplagarism Title page, abstr.docxOne and half pagesimple, noplagarism Title page, abstr.docx
One and half pagesimple, noplagarism Title page, abstr.docx
AKHIL969626
 
One of the most important filmmakers of the twentieth centur.docx
One of the most important filmmakers of the twentieth centur.docxOne of the most important filmmakers of the twentieth centur.docx
One of the most important filmmakers of the twentieth centur.docx
AKHIL969626
 
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docxOn p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
AKHIL969626
 

More from AKHIL969626 (20)

One of the most common used risk management tools is the Incident Re.docx
One of the most common used risk management tools is the Incident Re.docxOne of the most common used risk management tools is the Incident Re.docx
One of the most common used risk management tools is the Incident Re.docx
 
One of the first anthropologists to examine religion in Africa was E.docx
One of the first anthropologists to examine religion in Africa was E.docxOne of the first anthropologists to examine religion in Africa was E.docx
One of the first anthropologists to examine religion in Africa was E.docx
 
One of the most important concepts in clinical practice and group wo.docx
One of the most important concepts in clinical practice and group wo.docxOne of the most important concepts in clinical practice and group wo.docx
One of the most important concepts in clinical practice and group wo.docx
 
One function of a leader is to provide the vision for the organizati.docx
One function of a leader is to provide the vision for the organizati.docxOne function of a leader is to provide the vision for the organizati.docx
One function of a leader is to provide the vision for the organizati.docx
 
One could argue that old-fashioned attitudes regarding gender and t.docx
One could argue that old-fashioned attitudes regarding gender and t.docxOne could argue that old-fashioned attitudes regarding gender and t.docx
One could argue that old-fashioned attitudes regarding gender and t.docx
 
One of the hallmarks of qualitative research is writing detailed obs.docx
One of the hallmarks of qualitative research is writing detailed obs.docxOne of the hallmarks of qualitative research is writing detailed obs.docx
One of the hallmarks of qualitative research is writing detailed obs.docx
 
One of the three main tenants of information security is availabilit.docx
One of the three main tenants of information security is availabilit.docxOne of the three main tenants of information security is availabilit.docx
One of the three main tenants of information security is availabilit.docx
 
One of the challenges in group problem solving is identifying the ac.docx
One of the challenges in group problem solving is identifying the ac.docxOne of the challenges in group problem solving is identifying the ac.docx
One of the challenges in group problem solving is identifying the ac.docx
 
One is the personal plot that unfolds around the relationships betwe.docx
One is the personal plot that unfolds around the relationships betwe.docxOne is the personal plot that unfolds around the relationships betwe.docx
One is the personal plot that unfolds around the relationships betwe.docx
 
One and half pagesimple, noplagarism Title page, abstr.docx
One and half pagesimple, noplagarism Title page, abstr.docxOne and half pagesimple, noplagarism Title page, abstr.docx
One and half pagesimple, noplagarism Title page, abstr.docx
 
One 750 - word essay exploring an art historical issue presented in .docx
One 750 - word essay exploring an art historical issue presented in .docxOne 750 - word essay exploring an art historical issue presented in .docx
One 750 - word essay exploring an art historical issue presented in .docx
 
One of the most interesting items in the communication realm of orga.docx
One of the most interesting items in the communication realm of orga.docxOne of the most interesting items in the communication realm of orga.docx
One of the most interesting items in the communication realm of orga.docx
 
One of the most important filmmakers of the twentieth centur.docx
One of the most important filmmakers of the twentieth centur.docxOne of the most important filmmakers of the twentieth centur.docx
One of the most important filmmakers of the twentieth centur.docx
 
One of the ways businesses provide secure access to their networ.docx
One of the ways businesses provide secure access to their networ.docxOne of the ways businesses provide secure access to their networ.docx
One of the ways businesses provide secure access to their networ.docx
 
On Stretching Time (250 Words)The given paradigms by which we.docx
On Stretching Time (250 Words)The given paradigms by which we.docxOn Stretching Time (250 Words)The given paradigms by which we.docx
On Stretching Time (250 Words)The given paradigms by which we.docx
 
On the evening news, social media and even in conversation, do you f.docx
On the evening news, social media and even in conversation, do you f.docxOn the evening news, social media and even in conversation, do you f.docx
On the evening news, social media and even in conversation, do you f.docx
 
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docxOn p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
 
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docx
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docxOn 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docx
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docx
 
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docx
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docxOn September 11, 2001 the U.S. changed forever. While the U.S. had s.docx
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docx
 
On January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docx
On January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docxOn January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docx
On January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

ObjectivePresent an overview of the main concepts of symmetri.docx

  • 1. Objective: Present an overview of the main concepts of symmetric cryptography. Explain the difference between cryptanalysis and brute-force attack. Summarize the functionality of DES. Present an overview of AES. Explain the concepts of randomness and unpredictability with respect to random numbers. Understand the differences among true random number generators, pseudorandom number generators, and pseudorandom functions. Present an overview of stream ciphers and RC4. Compare and contrast ECB, CBC, CFB, and counter modes of operation. Assignment 2.1 What are the essential ingredients of a symmetric cipher? 2.2 What are the two basic functions used in encryption algorithms? 2.3 How many keys are required for two people to communicate
  • 2. via a symmetric cipher? 2.4 What is the difference between a block cipher and a stream cipher? 2.5 What are the two general approaches to attacking a cipher? 2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption? 2.7 What is triple encryption? 2.8 Why is the middle portion of 3DES a decryption rather than an encryption? Complete your answers on a WORD Document.