2.1 What are the essential ingredients of a symmetric cipher?
2.2 What are the two basic functions used in encryption algorithms?
2.3 How many keys are required for two people to communicate via a symmetric cipher?
2.4 What is the difference between a block cipher and a stream cipher?
2.5 What are the two general approaches to attacking a cipher?
2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
2.7 What is triple encryption?
2.8 Why is the middle portion of 3DES a decryption rather than an encryption?
(250 words)
3.1 List three approaches to message authentication.
3.2 What is a message authentication code?
3.4 What properties must a hash function have to be useful for message authentication?
3.5 In the context of a hash function, what is a compression function?
3.6 What are the principal ingredients of a public-key cryptosystem?
3.7 List and briefly define three uses of a public-key cryptosystem.
3.8 What is the difference between a private key and a secret key?
3.9 What is a digital signature?
(250 words)
4.1 List ways in which secret keys can be distributed to two communicating parties.
4.2 What is the difference between a session key and a master key?
4.3 What is a key distribution center?
4.4 What entities constitute a full-service Kerberos environment?
4.5 In the context of Kerberos, what is a realm?
4.6 What are the principal differences between version 4 and version 5 of Kerberos?
4.7 What is a nonce?
4.8 What are two different uses of public-key cryptography related to key distribution?
4.9 What are the essential ingredients of a public-key directory?
4.10 What is a public-key certificate?
4.11 What are the requirements for the use of a public-key certificate scheme?
4.12 What is the purpose of the X.509 standard?
4.13 What is a chain of certificates?
4.14 How is an X.509 certificate revoked?
(350 Words)