Security Goals
Attacks
Traditional Ciphers
100

This security goal ensures that data is available to authorized users when needed.

What is availability?

100

In this attack on integrity, Eve changes the amount of the payment before executing an electronic transaction.

What is modification?

100

Each letter is replaced by another fixed letter in this simple cipher.

What is a monoalphabetic or Caesar cipher?

150

This security goal protecting data from unauthorized access.

What is confidentiality?

150

In this attack, Eve impersonates Alice when communicating with Bob.

What is masquerading?

150

This cipher rearranges letters without changing them.

What is a transposition cipher?

200

This security goal ensures that only authorized changes can be made to data.

What is integrity?

200

This type of attack only observes data without altering it. Examples of this type includes snooping and traffic analysis.

What is a passive attack?

200

This cipher uses a 5×5 grid and encrypts pairs of letters. The plaintext is encrypted in pairs of two letters.

What is the Playfair cipher?

250

This security goal is violated when a system crashes due to overload attacks and become non-responsive.

What is availability?

250

DAILY DOUBLE!

In this attack, an attacker floods a server with fake requests.

250

This ciphers uses a matrix as a key and encrypts blocks of letters using modular arithmetic.

What is the Hill cipher?

300

This security service prevents Alice from denying sending a message to Bob or receiving a message from him.

What is nonrepudiation?

300

In this type of cryptanalysis attack, the attacker uses a plaintext-ciphertext pair to break the system.

What is a known-plaintext attack?

300

It is a method to break the Vigenère cipher by finding repeated substrings in the ciphertext and computing the length of the key.

What is Kasiski test?