I will break these questions up by categories. Categories will be in CAPS. These are some questions from Chapters 12 and 13 of the CCNA Security: Official Exam Certification Guide.
TYPES OF ATTACKS:
1.text Chosen plain-text attack: Attacker chooses what data the encryption device encrypts and then observes the cyphertext output... attacker gets to choose the plain-text blocks to encrypt..
1.question This just doesn't make sense to me. If the attacker chooses the text to be encrypted.. well then he has access to the unencrypted data right? What's the point? I am missing something.. LoL
2.t Chosen cyphertext attack: Attacker may choose different cyphertexts to be decrypted. Attacker also has access to the decrypted plain-text. Attacker can then search through keyspace and determine which key decrypts cyphertext...
2.q Again.. Attacker has access to decrypted plain text.. I believe that I have missed some pertinent info here but can not locate anything in the book regarding this.. The goal is to access the decrypted plain text so if you have it then why all of the extra work?
3. Would someone describe a Birthday attack in layman's terms?
I have a pretty solid grasp on the rest of the attacks listed.. These are from pages 438 and 439 of the aforementioned text.
Also, I am looking for a good introductory book on encryption, hashing and basically crypto in general. Would like something newer as most of the recommended books I have found date back about 8 to 10 years but that is ok so long as it provides a solid understanding.. Other digital sources (websites) would be appreciated as well.
I think the problem with the CCNA Security intro into crypto is that they have SO MUCH INFO to fit into three chapters.. (5 but two are very short)..
B Haines
CCNA R&S, ETA FOI
TYPES OF ATTACKS:
1.text Chosen plain-text attack: Attacker chooses what data the encryption device encrypts and then observes the cyphertext output... attacker gets to choose the plain-text blocks to encrypt..
1.question This just doesn't make sense to me. If the attacker chooses the text to be encrypted.. well then he has access to the unencrypted data right? What's the point? I am missing something.. LoL
2.t Chosen cyphertext attack: Attacker may choose different cyphertexts to be decrypted. Attacker also has access to the decrypted plain-text. Attacker can then search through keyspace and determine which key decrypts cyphertext...
2.q Again.. Attacker has access to decrypted plain text.. I believe that I have missed some pertinent info here but can not locate anything in the book regarding this.. The goal is to access the decrypted plain text so if you have it then why all of the extra work?
3. Would someone describe a Birthday attack in layman's terms?
I have a pretty solid grasp on the rest of the attacks listed.. These are from pages 438 and 439 of the aforementioned text.
Also, I am looking for a good introductory book on encryption, hashing and basically crypto in general. Would like something newer as most of the recommended books I have found date back about 8 to 10 years but that is ok so long as it provides a solid understanding.. Other digital sources (websites) would be appreciated as well.
I think the problem with the CCNA Security intro into crypto is that they have SO MUCH INFO to fit into three chapters.. (5 but two are very short)..
B Haines
CCNA R&S, ETA FOI