SHARE
SPREAD
HELP

The Tradition of Sharing

Help your friends and juniors by posting answers to the questions that you know. Also post questions that are not available.


To start with, Sr2Jr’s first step is to reduce the expenses related to education. To achieve this goal Sr2Jr organized the textbook’s question and answers. Sr2Jr is community based and need your support to fill the question and answers. The question and answers posted will be available free of cost to all.

 

#
Authors:
William Stallings
Chapter:
Classical Encryption Techniques
Exercise:
Review Questions
Question:1 | ISBN:9781292158587 | Edition: 7

Question

Describe the main requirements for the secure use of symmetric encryption.

TextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbook

Answer

There are two requirements for the secure use of symmetric encryption:

 

First thing is to have a strong encryption algorithm, reason  is that  if hacker has access to a few encrypted texts and algorithms, he should not be able to decrypt the information or figure out the key. 
In a brief, hacker 
should not be able to decrypt the text even if he possessed cyphertext and algorithm.

 

In fig 3.1 

If  X is plain text
E is an encryption algorithm and 
K is key

 

Cyphertext Y = E(X,K) 

 

Even if someone has access to ciphertext(Y) and Encryption Algorithm(E) He should not be able to deduce Y.

 

The second thing is sender and receiver must share their copies of the key in a secure fashion and should not disclose the key. 
Because if someone has known the key as well as the algorithm, he can simply reverse the algorithm and all the information is readable.

 

Plain text(X) = D(Y,K).

 

0 0

Discussions

Post the discussion to improve the above solution.