Security Goals
Attacks
Traditional Ciphers
200

This security goal ensures that data is available to authorized users when needed.

What is availability?

200

In this attack on integrity, Eve changes the amount of the payment before executing an electronic transaction.

What is modification?

200

Each letter is replaced by another fixed letter in this simple cipher.

What is a monoalphabetic or Caesar cipher?

250

This security goal protecting data from unauthorized access.

What is confidentiality?

250

In this attack, Eve impersonates Alice when communicating with Bob.

What is masquerading?

250

This cipher rearranges letters without changing them.

What is a transposition cipher?

300

This security goal ensures that only authorized changes can be made to data.

What is integrity?

300

This type of attack only observes data without altering it. Examples of this type includes snooping and traffic analysis.

What is a passive attack?

300

This cipher uses a 5×5 grid and encrypts pairs of letters. The plaintext is encrypted in pairs of two letters.

What is the Playfair cipher?

350

This security goal is violated when a system crashes due to overload attacks and become non-responsive.

What is availability?

350

DAILY DOUBLE!

In this attack, an attacker floods a server with fake requests.

350

This ciphers uses a matrix as a key and encrypts blocks of letters using modular arithmetic.

What is the Hill cipher?

400

This security service prevents Alice from denying sending a message to Bob or receiving a message from him.

What is nonrepudiation?

400

In this type of cryptanalysis attack, the attacker uses a plaintext-ciphertext pair to break the system.

What is a known-plaintext attack?

400

It is a method to break the Vigenère cipher by finding repeated substrings in the ciphertext and computing the length of the key.

What is Kasiski test?

M
e
n
u